Lines Matching defs:access
323 * Return true if we want to ignore/silent this failed msr access.
807 * else the access will fault indefinitely (and to emulate hardware).
7300 gpa_t translate_nested_gpa(struct kvm_vcpu *vcpu, gpa_t gpa, u64 access,
7309 access |= PFERR_USER_MASK;
7310 t_gpa = mmu->gva_to_gpa(vcpu, mmu, gpa, access, exception);
7320 u64 access = (static_call(kvm_x86_get_cpl)(vcpu) == 3) ? PFERR_USER_MASK : 0;
7321 return mmu->gva_to_gpa(vcpu, mmu, gva, access, exception);
7330 u64 access = (static_call(kvm_x86_get_cpl)(vcpu) == 3) ? PFERR_USER_MASK : 0;
7331 access |= PFERR_WRITE_MASK;
7332 return mmu->gva_to_gpa(vcpu, mmu, gva, access, exception);
7336 /* uses this to access any guest's mapped memory without checking CPL */
7346 struct kvm_vcpu *vcpu, u64 access,
7354 gpa_t gpa = mmu->gva_to_gpa(vcpu, mmu, addr, access, exception);
7383 u64 access = (static_call(kvm_x86_get_cpl)(vcpu) == 3) ? PFERR_USER_MASK : 0;
7388 gpa_t gpa = mmu->gva_to_gpa(vcpu, mmu, addr, access|PFERR_FETCH_MASK,
7408 u64 access = (static_call(kvm_x86_get_cpl)(vcpu) == 3) ? PFERR_USER_MASK : 0;
7417 return kvm_read_guest_virt_helper(addr, val, bytes, vcpu, access,
7427 u64 access = 0;
7430 access |= PFERR_IMPLICIT_ACCESS;
7432 access |= PFERR_USER_MASK;
7434 return kvm_read_guest_virt_helper(addr, val, bytes, vcpu, access, exception);
7438 struct kvm_vcpu *vcpu, u64 access,
7446 gpa_t gpa = mmu->gva_to_gpa(vcpu, mmu, addr, access, exception);
7472 u64 access = PFERR_WRITE_MASK;
7475 access |= PFERR_IMPLICIT_ACCESS;
7477 access |= PFERR_USER_MASK;
7480 access, exception);
7529 /* For APIC access vmexit */
7546 u64 access = ((static_call(kvm_x86_get_cpl)(vcpu) == 3) ? PFERR_USER_MASK : 0)
7556 vcpu->arch.mmio_access, 0, access))) {
7563 *gpa = mmu->gva_to_gpa(vcpu, mmu, gva, access, exception);
7808 * enabled in the host and the access splits a cache line.
8587 * write access need to be emulated.
8631 * if emulation was due to access to shadowed page table
8638 * If the access faults on its page table, it can not
10378 * the vCPU would incorrectly be able to access the vAPIC page via MMIO
10380 * access page is sticky.
10798 * since we do this before handling the vmexit, a DR access vmexit
12764 * the subtly complex checks when removing write access.
12797 * write access" helpers to ignore MMU-writable entirely.
12800 * access-tracked SPTEs is particularly relevant).
13333 u64 access = error_code &
13337 mmu->gva_to_gpa(vcpu, mmu, gva, access, &fault) != INVALID_GPA) {