Lines Matching refs:value

612 			 * and 0x8ff, it just lets the processor take the value
930 if (kvm_set_msr(vcpu, e.index, e.value)) {
933 __func__, i, e.index, e.value);
950 * If the L0 hypervisor stored a more accurate value for the TSC that
952 * VM-exit in L0, use the more accurate value.
959 u64 val = vmx->msr_autostore.guest.val[i].value;
1013 offsetof(struct vmx_msr_entry, value),
1060 * accurate value will be returned by
1062 * instead of reading the value from the vmcs02 VMExit
1354 * must be 1 in the restored value.
2031 * value to first u32 field of eVMCS which should specify eVMCS
2036 * expected to set this CPUID leaf according to the value
2133 * A timer value of zero is architecturally guaranteed to cause
2178 * We don't care what the EPTP value is we just need to guarantee
2487 * vmcs01's EB.PF is 0 so the "or" will take vmcs12's value, and when
3061 * - Bit 10 (corresponding to IA32_EFER.LMA) must equal the value of
3245 * Write an illegal value to VIRTUAL_APIC_PAGE_ADDR to
3433 * the correct value. Smashing vmcs01.GUEST_CR3 is safe because nested
3693 * This function returns the new value we should put in vmcs12.guest_cr0.
3699 * been modified by L2, and L1 knows it. So just leave the old value of
4197 u64 value;
4202 value = ktime_to_ns(remaining) * vcpu->arch.virtual_tsc_khz;
4203 do_div(value, 1000000);
4204 return value >> VMX_MISC_EMULATED_PREEMPTION_TIMER_RATE;
4428 * instead of reading the real value. */
4501 * Only PDPTE load can fail as the value of cr3 was checked on entry and
4517 /* If not VM_EXIT_CLEAR_BNDCFGS, the L2 value propagates to L1. */
4603 return vmx->msr_autoload.guest.val[i].value;
4626 * as vmcs01.GUEST_DR7 contains a userspace defined value
4671 * from the guest value. The intent is to stuff host state as
4693 if (h.value == g.value)
4703 if (kvm_set_msr(vcpu, h.index, h.value)) {
4706 __func__, j, h.index, h.value);
5352 u64 value;
5380 /* Read the field, zero-extended to a u64 value */
5381 value = vmcs12_read_any(vmcs12, field, offset);
5400 /* Read the field, zero-extended to a u64 value */
5401 value = evmcs_read_any(vmx->nested.hv_evmcs, field, offset);
5405 * Now copy part of this value to register or memory, as requested.
5410 kvm_register_write(vcpu, (((instr_info) >> 3) & 0xf), value);
5417 r = kvm_write_guest_virt_system(vcpu, gva, &value, len, &e);
5463 * The value to write might be 32 or 64 bits, depending on L1's long
5465 * possible lengths. The code below first zero-extends the value to 64
5466 * bit (value), and then copies only the appropriate number of
5469 u64 value = 0;
5484 value = kvm_register_read(vcpu, (((instr_info) >> 3) & 0xf));
5490 r = kvm_read_guest_virt(vcpu, gva, &value, len, &e);
5511 * vmcs12, else we may crush a field or consume a stale value.
5521 * from L1 will return a different value than VMREAD from L2 (L1 sees
5522 * the stripped down value, L2 sees the full value as stored by KVM).
5525 value &= 0x1f0ff;
5527 vmcs12_write_any(vmcs12, field, offset, value);
5544 __vmcs_writel(field, value);
6330 * set XSS to a non-zero value---neither in L1 nor in L2.
6387 * EXTERNAL_INTERRUPT, the value for vmcs12->vm_exit_intr_info would