Lines Matching defs:read
785 static void set_shadow_msr_intercept(struct kvm_vcpu *vcpu, u32 msr, int read,
795 if (read)
796 set_bit(slot, svm->shadow_msr_intercept.read);
798 clear_bit(slot, svm->shadow_msr_intercept.read);
840 u32 msr, int read, int write)
854 if (read && !kvm_msr_allowed(vcpu, msr, KVM_MSR_FILTER_READ))
855 read = 0;
867 read ? clear_bit(bit_read, &tmp) : set_bit(bit_read, &tmp);
877 int read, int write)
879 set_shadow_msr_intercept(vcpu, msr, read, write);
880 set_msr_interception_bitmap(vcpu, msrpm, msr, read, write);
949 u32 read = test_bit(i, svm->shadow_msr_intercept.read);
952 set_msr_interception_bitmap(vcpu, svm->msrpm, msr, read, write);
2707 WARN(1, "unhandled read from CR%d", cr);
3123 * TSC_AUX is usually changed only during boot and never read
3648 * apic->apicv_active must be read after vcpu->mode.
3686 * the read of guest_mode. This guarantees that either VMRUN will see
4329 * the guest read/write access to the host's XSS.
4765 * and cannot be decrypted by KVM, i.e. KVM would read cyphertext and
4806 * read guest memory at CS:RIP and vmcb.GuestIntrBytes will incorrectly
4863 * userspace will kill the guest, and letting the emulator read garbage