Searched refs:intercept (Results 1 – 9 of 9) sorted by relevance
/arch/s390/kvm/ |
D | Makefile | 14 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/arch/x86/include/asm/ |
D | kvm_emulate.h | 34 u8 intercept; /* which intercept */ member 219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 313 u8 intercept; member
|
D | svm.h | 61 u64 intercept; member
|
/arch/x86/kvm/ |
D | svm.c | 117 u64 intercept; member 285 c->intercept = h->intercept | g->intercept; in recalc_intercepts() 376 vmcb->control.intercept |= (1ULL << bit); in set_intercept() 385 vmcb->control.intercept &= ~(1ULL << bit); in clr_intercept() 2043 if (svm->nested.intercept & 1ULL) { in nested_svm_intr() 2064 if (!(svm->nested.intercept & (1ULL << INTERCEPT_NMI))) in nested_svm_nmi() 2106 if (!(svm->nested.intercept & (1ULL << INTERCEPT_IOIO_PROT))) in nested_svm_intercept_ioio() 2129 if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT))) in nested_svm_exit_handled_msr() 2221 if (svm->nested.intercept & exit_bits) in nested_svm_intercept() 2249 dst->intercept = from->intercept; in copy_vmcb_control_area() [all …]
|
D | trace.h | 528 TP_PROTO(__u16 cr_read, __u16 cr_write, __u32 exceptions, __u64 intercept), 529 TP_ARGS(cr_read, cr_write, exceptions, intercept), 535 __field( __u64, intercept ) 542 __entry->intercept = intercept; 547 __entry->intercept)
|
D | emulate.c | 214 u64 intercept : 8; member 461 enum x86_intercept intercept, in emulator_check_intercept() argument 465 .intercept = intercept, in emulator_check_intercept() 478 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept() 4253 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i } 4255 .intercept = x86_intercept_##_i, .check_perm = (_p) } 4266 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 4269 .intercept = x86_intercept_##_i, .check_perm = (_p) } 5019 ctxt->intercept = x86_intercept_none; in x86_decode_insn() 5224 ctxt->intercept = opcode.intercept; in x86_decode_insn() [all …]
|
D | vmx.c | 10763 bool intercept; in vmx_check_intercept_io() local 10766 if (info->intercept == x86_intercept_in || in vmx_check_intercept_io() 10767 info->intercept == x86_intercept_ins) { in vmx_check_intercept_io() 10783 intercept = nested_cpu_has(vmcs12, in vmx_check_intercept_io() 10786 intercept = nested_vmx_check_io_bitmaps(vcpu, port, size); in vmx_check_intercept_io() 10788 return intercept ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE; in vmx_check_intercept_io() 10798 switch (info->intercept) { in vmx_check_intercept()
|
D | x86.c | 5189 .intercept = emulator_intercept,
|
/arch/arm/ |
D | Kconfig | 1643 intercept syscalls that have structure arguments which layout
|