Lines Matching refs:intercept
878 * We intercept those #GP and allow access to them anyway
3116 * intercept CR3 accesses when paging is _disabled_. This is
3125 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or
3127 * intercept them to preserve its identity mapped page tables.
3839 * Mark the desired intercept state in shadow bitmap, this is needed
3884 * Mark the desired intercept state in shadow bitmap, this is needed
4024 * Set intercept permissions for all potentially passed through MSRs
4272 * Adjust a single secondary execution control bit to intercept/allow an
4971 * is an instruction intercept, i.e. the VM-Exit occurs
6440 * we should not update vmcs02 RVI but instead intercept
7493 bool intercept;
7496 if (info->intercept == x86_intercept_in ||
7497 info->intercept == x86_intercept_ins) {
7513 intercept = nested_cpu_has(vmcs12,
7516 intercept = nested_vmx_check_io_bitmaps(vcpu, port, size);
7519 return intercept ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE;
7529 switch (info->intercept) {
7532 * Because it is marked as EmulateOnUD, we need to intercept it here.