Home
last modified time | relevance | path

Searched refs:intercept (Results 1 – 8 of 8) sorted by relevance

/arch/s390/kvm/
DMakefile13 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o diag.o
/arch/x86/include/asm/
Dkvm_emulate.h34 u8 intercept; /* which intercept */ member
191 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
259 u8 intercept; member
Dsvm.h58 u64 intercept; member
/arch/x86/kvm/
Dsvm.c105 u64 intercept; member
262 c->intercept = h->intercept | g->intercept; in recalc_intercepts()
338 vmcb->control.intercept |= (1ULL << bit); in set_intercept()
347 vmcb->control.intercept &= ~(1ULL << bit); in clr_intercept()
2056 if (svm->nested.intercept & 1ULL) { in nested_svm_intr()
2077 if (!(svm->nested.intercept & (1ULL << INTERCEPT_NMI))) in nested_svm_nmi()
2119 if (!(svm->nested.intercept & (1ULL << INTERCEPT_IOIO_PROT))) in nested_svm_intercept_ioio()
2138 if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT))) in nested_svm_exit_handled_msr()
2230 if (svm->nested.intercept & exit_bits) in nested_svm_intercept()
2258 dst->intercept = from->intercept; in copy_vmcb_control_area()
[all …]
Dtrace.h554 TP_PROTO(__u16 cr_read, __u16 cr_write, __u32 exceptions, __u64 intercept),
555 TP_ARGS(cr_read, cr_write, exceptions, intercept),
561 __field( __u64, intercept )
568 __entry->intercept = intercept;
573 __entry->intercept)
Demulate.c157 u64 intercept : 8; member
413 enum x86_intercept intercept, in emulator_check_intercept() argument
417 .intercept = intercept, in emulator_check_intercept()
429 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
3284 #define DI(_y, _i) { .flags = (_y), .intercept = x86_intercept_##_i }
3285 #define DIP(_y, _i, _p) { .flags = (_y), .intercept = x86_intercept_##_i, \
3293 { .flags = (_f), .u.execute = (_e), .intercept = x86_intercept_##_i }
3295 { .flags = (_f), .u.execute = (_e), .intercept = x86_intercept_##_i, \
3942 ctxt->intercept = opcode.intercept; in x86_decode_insn()
4069 if (unlikely(ctxt->guest_mode) && ctxt->intercept) { in x86_emulate_insn()
[all …]
Dx86.c4328 .intercept = emulator_intercept,
/arch/arm/
DKconfig1732 intercept syscalls that have structure arguments which layout