Lines Matching refs:exit
201 /* Default doubles per-vcpu window every exit. */
205 /* Default resets per-vcpu window every exit to ple_window. */
970 unsigned long entry, unsigned long exit)
973 vm_exit_controls_clearbit(vmx, exit);
1028 unsigned long entry, unsigned long exit,
1036 vm_exit_controls_setbit(vmx, exit);
1707 * vmcs.GUEST_RIP points at the exit point of the enclave, not
1751 * Recognizes a pending MTF VM-exit and records the nested state for later
2695 pr_warn_once("Inconsistent VM-Entry/VM-Exit pair, entry = %x, exit = %x\n",
5393 /* called to set cr0 as appropriate for a mov-to-cr0 exit. */
5548 * As the vm-exit takes precedence over the debug trap, we
5667 /* EOI-induced VM exit is trap-like and thus no need to adjust IP */
5791 * would also use advanced VM-exit information for EPT violations to
5937 * so the vcpu must be CPL=0 if it gets a PAUSE exit.
6065 * Notify VM exit happened while executing iret from NMI,
6084 * The exit handlers return 1 if the exit was handled fully and guest execution
6442 * PML full exit occurs as something is horribly wrong.
6455 * Mark them dirty on every exit from L2 to prevent them from
6506 * The vm-exit can be triggered again after return to guest that
6579 vcpu_unimpl(vcpu, "vmx: unexpected exit reason 0x%x\n",
6896 * wants to exit on interrupts, KVM_REQ_EVENT is needed to synthesize a
6897 * VM-Exit to L1. If L1 doesn't want to exit, the interrupt is injected
6959 /* if exit due to PF check for async PF */
6962 /* if exit due to NM, handle before interrupts are enabled */
7048 * If the VM exit sets the valid bit in the IDT-vectoring
7050 * If the VM exit is due to a double fault.
7296 * Don't enter VMX if guest state is invalid, let the exit handler
8003 * exit, i.e. KVM is within its rights to allow L2 to execute