Searched refs:accessed_dirty (Results 1 – 3 of 3) sorted by relevance
/linux-6.12.1/arch/x86/kvm/mmu/ |
D | paging_tmpl.h | 311 unsigned index, accessed_dirty, pte_pkey; in FNAME() local 432 accessed_dirty = have_ad ? pte_access & PT_GUEST_ACCESSED_MASK : 0; in FNAME() 462 accessed_dirty &= pte >> in FNAME() 465 if (unlikely(!accessed_dirty)) { in FNAME()
|
D | mmu.c | 5602 kvm_calc_shadow_ept_root_page_role(struct kvm_vcpu *vcpu, bool accessed_dirty, in kvm_calc_shadow_ept_root_page_role() argument 5615 role.base.ad_disabled = !accessed_dirty; in kvm_calc_shadow_ept_root_page_role() 5627 int huge_page_level, bool accessed_dirty, in kvm_init_shadow_ept_mmu() argument 5633 kvm_calc_shadow_ept_root_page_role(vcpu, accessed_dirty, in kvm_init_shadow_ept_mmu()
|
/linux-6.12.1/arch/x86/kvm/ |
D | mmu.h | 88 int huge_page_level, bool accessed_dirty,
|