Home
last modified time | relevance | path

Searched refs:intercept (Results 1 – 8 of 8) sorted by relevance

/arch/s390/kvm/
DMakefile14 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/arch/x86/include/asm/
Dkvm_emulate.h34 u8 intercept; /* which intercept */ member
205 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
290 u8 intercept; member
Dsvm.h61 u64 intercept; member
/arch/x86/kvm/
Dsvm.c114 u64 intercept; member
271 c->intercept = h->intercept | g->intercept; in recalc_intercepts()
362 vmcb->control.intercept |= (1ULL << bit); in set_intercept()
371 vmcb->control.intercept &= ~(1ULL << bit); in clr_intercept()
2090 if (svm->nested.intercept & 1ULL) { in nested_svm_intr()
2111 if (!(svm->nested.intercept & (1ULL << INTERCEPT_NMI))) in nested_svm_nmi()
2153 if (!(svm->nested.intercept & (1ULL << INTERCEPT_IOIO_PROT))) in nested_svm_intercept_ioio()
2176 if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT))) in nested_svm_exit_handled_msr()
2268 if (svm->nested.intercept & exit_bits) in nested_svm_intercept()
2296 dst->intercept = from->intercept; in copy_vmcb_control_area()
[all …]
Dtrace.h509 TP_PROTO(__u16 cr_read, __u16 cr_write, __u32 exceptions, __u64 intercept),
510 TP_ARGS(cr_read, cr_write, exceptions, intercept),
516 __field( __u64, intercept )
523 __entry->intercept = intercept;
528 __entry->intercept)
Demulate.c205 u64 intercept : 8; member
423 enum x86_intercept intercept, in emulator_check_intercept() argument
427 .intercept = intercept, in emulator_check_intercept()
440 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
3669 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
3671 .intercept = x86_intercept_##_i, .check_perm = (_p) }
3680 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
3683 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4572 ctxt->intercept = opcode.intercept; in x86_decode_insn()
4768 rc = emulator_check_intercept(ctxt, ctxt->intercept, in x86_emulate_insn()
[all …]
Dx86.c5017 .intercept = emulator_intercept,
/arch/arm/
DKconfig1654 intercept syscalls that have structure arguments which layout