Lines Matching refs:intercept
85 bool always; /* True if intercept is initially cleared */
132 * intercept the MSR 0x832, and do not setup direct_access_msr.
152 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
169 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
313 /* #GP intercept is still needed for vmware backdoor */
334 * Never intercept #GP for SEV guests, KVM can't
794 /* Set the shadow bitmaps to the desired intercept states */
820 * If the L01 MSR bitmap does not intercept the MSR, then we need to
824 * If the L02 MSR bitmap does not intercept the MSR, then we need to
909 void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept)
913 if (intercept == svm->x2avic_msrs_intercepted)
926 !intercept, !intercept);
929 svm->x2avic_msrs_intercepted = intercept;
943 * Set intercept permissions for all direct access MSRs again. They
1218 * We must intercept SYSENTER_EIP and SYSENTER_ESP
1238 /* No need to intercept these MSRs */
1270 * We intercept those #GP and allow access to them anyway
1659 * Recalculating intercepts may have cleared the VINTR intercept. If
2191 * On an #MC intercept the MCE handler is not called automatically in
2215 * VMCB is undefined after a SHUTDOWN intercept. INIT the vCPU to put
2428 * If VGIF is enabled, the STGI intercept is only added to
2430 * Likewise, clear the VINTR intercept, we will set it
2449 * in use, we still rely on the VINTR intercept (rather than
3099 * We only intercept the MSR_IA32_SYSENTER_{EIP|ESP} msrs
3101 * In this case we use this intercept to track the high
3246 * For an INVPCID intercept:
3830 * 1, because that's a separate STGI/VMRUN intercept. The next time we
3831 * get that intercept, this function will be called again though and
3832 * we'll get the vintr intercept. However, if the vGIF feature is
3873 * KVM can't intercept and single-step IRET to detect when NMIs are
4448 if (info->intercept >= ARRAY_SIZE(x86_intercept_map))
4451 icpt_info = x86_intercept_map[info->intercept];
4458 if (info->intercept == x86_intercept_cr_read)
4464 if (info->intercept == x86_intercept_cr_write)
4468 info->intercept == x86_intercept_clts)
4478 if (info->intercept == x86_intercept_lmsw) {
4496 if (info->intercept == x86_intercept_wrmsr)
4513 if (info->intercept == x86_intercept_in ||
4514 info->intercept == x86_intercept_ins) {
4523 if (info->intercept == x86_intercept_outs ||
4524 info->intercept == x86_intercept_ins)
4771 * doesn't intercept #UD or #GP for SEV guests, but this path is still