Searched refs:new_eptp (Results 1 - 3 of 3) sorted by relevance
/linux-master/arch/x86/kvm/ |
H A D | mmu.h | 112 gpa_t new_eptp);
|
/linux-master/arch/x86/kvm/vmx/ |
H A D | nested.c | 2723 static bool nested_vmx_check_eptp(struct kvm_vcpu *vcpu, u64 new_eptp) argument 2728 switch (new_eptp & VMX_EPTP_MT_MASK) { 2742 switch (new_eptp & VMX_EPTP_PWL_MASK) { 2756 if (CC(!kvm_vcpu_is_legal_gpa(vcpu, new_eptp) || ((new_eptp >> 7) & 0x1f))) 2760 if (new_eptp & VMX_EPTP_AD_ENABLE_BIT) { 5879 u64 new_eptp; local 5887 &new_eptp, index * 8, 8)) 5894 if (vmcs12->ept_pointer != new_eptp) { 5895 if (!nested_vmx_check_eptp(vcpu, new_eptp)) [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu.c | 5473 gpa_t new_eptp) 5476 u8 level = vmx_eptp_page_walk_level(new_eptp); 5496 kvm_mmu_new_pgd(vcpu, new_eptp); 5471 kvm_init_shadow_ept_mmu(struct kvm_vcpu *vcpu, bool execonly, int huge_page_level, bool accessed_dirty, gpa_t new_eptp) argument
|
Completed in 136 milliseconds