Searched refs:GUEST_CR3 (Results 1 - 10 of 10) sorted by relevance

/linux-master/tools/testing/selftests/kvm/x86_64/
H A Dvmx_tsc_adjust_test.c98 save_cr3 = vmreadz(GUEST_CR3);
99 vmwrite(GUEST_CR3, -1ull);
104 vmwrite(GUEST_CR3, save_cr3);
/linux-master/arch/x86/kvm/vmx/
H A Dvmcs_shadow_fields.h65 SHADOW_FIELD_RW(GUEST_CR3, guest_cr3)
H A Dvmcs12.c123 FIELD(GUEST_CR3, guest_cr3),
H A Dhyperv_evmcs.c103 EVMCS1_FIELD(GUEST_CR3, guest_cr3,
H A Dnested.c2669 * Immediately write vmcs02.GUEST_CR3. It will be propagated to vmcs12
2676 vmcs_writel(GUEST_CR3, vmcs12->guest_cr3);
3468 * Overwrite vmcs01.GUEST_CR3 with L1's CR3 if EPT is disabled *and*
3472 * GUEST_CR3 holds KVM's shadow CR3, not L1's "real" CR3, which causes
3474 * vmcs01.GUEST_CR3 results in the unwind naturally setting arch.cr3 to
3475 * the correct value. Smashing vmcs01.GUEST_CR3 is safe because nested
3476 * VM-Exits, and the unwind, reset KVM's MMU, i.e. vmcs01.GUEST_CR3 is
3478 * L1. Don't stuff vmcs01.GUEST_CR3 when using nested early checks as
3481 * path would need to manually save/restore vmcs01.GUEST_CR3.
3484 vmcs_writel(GUEST_CR3, vcp
[all...]
H A Dvmx.c2490 vcpu->arch.cr3 = vmcs_readl(GUEST_CR3);
3310 * (correctly) stop reading vmcs.GUEST_CR3 because it thinks
3348 * GUEST_CR3 is still vmx->ept_identity_map_addr if EPT + !URG.
3397 else /* vmcs.GUEST_CR3 is already up-to-date. */
3406 vmcs_writel(GUEST_CR3, guest_cr3);
6284 pr_err("CR3 = 0x%016lx\n", vmcs_readl(GUEST_CR3));
/linux-master/tools/testing/selftests/kvm/include/x86_64/
H A Dvmx.h256 GUEST_CR3 = 0x00006802, enumerator in enum:vmcs_field
H A Devmcs.h408 case GUEST_CR3:
849 case GUEST_CR3:
/linux-master/tools/testing/selftests/kvm/lib/x86_64/
H A Dvmx.c339 vmwrite(GUEST_CR3, vmreadz(HOST_CR3));
/linux-master/arch/x86/include/asm/
H A Dvmx.h330 GUEST_CR3 = 0x00006802, enumerator in enum:vmcs_field

Completed in 176 milliseconds