Lines Matching refs:intercept
890 * We intercept those #GP and allow access to them anyway
1714 * and generate #DB/#BP as expected, which KVM might intercept.
3329 * intercept CR3 accesses when paging is _disabled_. This is
3338 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or
3340 * intercept them to preserve its identity mapped page tables.
3977 * Mark the desired intercept state in shadow bitmap, this is needed
4021 * Mark the desired intercept state in shadow bitmap, this is needed
4144 * Redo intercept permissions for MSRs that KVM is passing through to
4148 * refreshed since KVM is going to intercept them regardless of what
4501 /* No need to intercept CR3 access or INVPLG when using EPT. */
4529 * Adjust a single secondary execution control bit to intercept/allow an
5281 * is an instruction intercept, i.e. the VM-Exit occurs
6860 * we should not update vmcs02 RVI but instead intercept
7927 bool intercept;
7930 if (info->intercept == x86_intercept_in ||
7931 info->intercept == x86_intercept_ins) {
7947 intercept = nested_cpu_has(vmcs12,
7950 intercept = nested_vmx_check_io_bitmaps(vcpu, port, size);
7953 return intercept ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE;
7963 switch (info->intercept) {
7966 * Because it is marked as EmulateOnUD, we need to intercept it here.