Searched refs:VM_ENTRY_LOAD_GUEST_PAT (Results 1 – 4 of 4) sorted by relevance
244 #define VM_ENTRY_LOAD_GUEST_PAT 0x00004000 macro312 (vmx_vmentry_control & VM_ENTRY_LOAD_GUEST_PAT)
702 shadow_cntrl &= ~(VM_ENTRY_LOAD_GUEST_PAT in nvmx_update_entry_control()1112 if ( control & VM_ENTRY_LOAD_GUEST_PAT ) in load_shadow_guest_state()2302 data = VM_ENTRY_LOAD_GUEST_PAT | in nvmx_msr_read_intercept()
448 opt = (VM_ENTRY_LOAD_GUEST_PAT | VM_ENTRY_LOAD_GUEST_EFER | in vmx_init_vmcs_config()1107 vmentry_ctl &= ~VM_ENTRY_LOAD_GUEST_PAT; in construct_vmcs()
1071 Allow EPT to be enabled when VMX feature `VM_ENTRY_LOAD_GUEST_PAT` is not1075 Due to CVE-2013-2212, VMX feature `VM_ENTRY_LOAD_GUEST_PAT` is by default1080 does not provide `VM_ENTRY_LOAD_GUEST_PAT`.
Completed in 14 milliseconds