Searched refs:new_eptp (Results 1 - 3 of 3) sorted by relevance

/linux-master/arch/x86/kvm/
H A Dmmu.h112 gpa_t new_eptp);
/linux-master/arch/x86/kvm/vmx/
H A Dnested.c2723 static bool nested_vmx_check_eptp(struct kvm_vcpu *vcpu, u64 new_eptp) argument
2728 switch (new_eptp & VMX_EPTP_MT_MASK) {
2742 switch (new_eptp & VMX_EPTP_PWL_MASK) {
2756 if (CC(!kvm_vcpu_is_legal_gpa(vcpu, new_eptp) || ((new_eptp >> 7) & 0x1f)))
2760 if (new_eptp & VMX_EPTP_AD_ENABLE_BIT) {
5879 u64 new_eptp; local
5887 &new_eptp, index * 8, 8))
5894 if (vmcs12->ept_pointer != new_eptp) {
5895 if (!nested_vmx_check_eptp(vcpu, new_eptp))
[all...]
/linux-master/arch/x86/kvm/mmu/
H A Dmmu.c5473 gpa_t new_eptp)
5476 u8 level = vmx_eptp_page_walk_level(new_eptp);
5496 kvm_mmu_new_pgd(vcpu, new_eptp);
5471 kvm_init_shadow_ept_mmu(struct kvm_vcpu *vcpu, bool execonly, int huge_page_level, bool accessed_dirty, gpa_t new_eptp) argument

Completed in 136 milliseconds