Home
last modified time | relevance | path

Searched refs:accessed_dirty (Results 1 – 3 of 3) sorted by relevance

/OK3568_Linux_fs/kernel/arch/x86/kvm/mmu/
H A Dpaging_tmpl.h317 unsigned index, accessed_dirty, pte_pkey; in FNAME() local
424 accessed_dirty = have_ad ? pte_access & PT_GUEST_ACCESSED_MASK : 0; in FNAME()
452 accessed_dirty &= pte >> in FNAME()
455 if (unlikely(!accessed_dirty)) { in FNAME()
H A Dmmu.c4650 kvm_calc_shadow_ept_root_page_role(struct kvm_vcpu *vcpu, bool accessed_dirty, in kvm_calc_shadow_ept_root_page_role() argument
4661 role.base.ad_disabled = !accessed_dirty; in kvm_calc_shadow_ept_root_page_role()
4679 bool accessed_dirty, gpa_t new_eptp) in kvm_init_shadow_ept_mmu() argument
4684 kvm_calc_shadow_ept_root_page_role(vcpu, accessed_dirty, in kvm_init_shadow_ept_mmu()
4695 context->ept_ad = accessed_dirty; in kvm_init_shadow_ept_mmu()
/OK3568_Linux_fs/kernel/arch/x86/kvm/
H A Dmmu.h64 bool accessed_dirty, gpa_t new_eptp);