Searched refs:new_eptp (Results 1 – 3 of 3) sorted by relevance
| /Linux-v5.10/arch/x86/kvm/ |
| D | mmu.h | 64 bool accessed_dirty, gpa_t new_eptp);
|
| /Linux-v5.10/arch/x86/kvm/vmx/ |
| D | nested.c | 2635 static bool nested_vmx_check_eptp(struct kvm_vcpu *vcpu, u64 new_eptp) in nested_vmx_check_eptp() argument 2641 switch (new_eptp & VMX_EPTP_MT_MASK) { in nested_vmx_check_eptp() 2655 switch (new_eptp & VMX_EPTP_PWL_MASK) { in nested_vmx_check_eptp() 2669 if (CC(new_eptp >> maxphyaddr || ((new_eptp >> 7) & 0x1f))) in nested_vmx_check_eptp() 2673 if (new_eptp & VMX_EPTP_AD_ENABLE_BIT) { in nested_vmx_check_eptp() 5443 u64 new_eptp; in nested_vmx_eptp_switching() local 5456 &new_eptp, index * 8, 8)) in nested_vmx_eptp_switching() 5459 accessed_dirty = !!(new_eptp & VMX_EPTP_AD_ENABLE_BIT); in nested_vmx_eptp_switching() 5465 if (vmcs12->ept_pointer != new_eptp) { in nested_vmx_eptp_switching() 5466 if (!nested_vmx_check_eptp(vcpu, new_eptp)) in nested_vmx_eptp_switching() [all …]
|
| /Linux-v5.10/arch/x86/kvm/mmu/ |
| D | mmu.c | 4645 bool accessed_dirty, gpa_t new_eptp) in kvm_init_shadow_ept_mmu() argument 4648 u8 level = vmx_eptp_page_walk_level(new_eptp); in kvm_init_shadow_ept_mmu() 4653 __kvm_mmu_new_pgd(vcpu, new_eptp, new_role.base, true, true); in kvm_init_shadow_ept_mmu()
|