Lines Matching defs:write

325 static bool kvm_msr_ignored_check(u32 msr, u64 data, bool write)
327 const char *op = write ? "wrmsr" : "rdmsr";
1865 * 64-bit code should hence be able to write a non-canonical
2091 /* MSR write failed? See if we should ask user space */
2330 ++version; /* first time write, random junk */
2681 * We also track th most recent recorded KHZ, write and time to
2682 * allow the matching interval to be extended at each write.
2697 * nanosecond time, offset, and write, so if TSCs are in
2746 * Special case: TSC write with a small delta (1 second)
3353 /* An attempt to write a 1 to a reserved bit raises #GP */
3598 version += 1; /* first time write, random junk */
3990 * Userspace is allowed to write '0' to MSRs that KVM reports
4363 * Read or write a bunch of msrs. All parameters are kernel addresses.
4382 * Read or write a bunch of msrs. Parameters are user addresses.
7527 gpa_t gpa, bool write)
7534 trace_vcpu_match_mmio(gva, gpa, write, true);
7543 bool write)
7547 | (write ? PFERR_WRITE_MASK : 0);
7559 trace_vcpu_match_mmio(gva, *gpa, write, false);
7568 return vcpu_is_mmio_gpa(vcpu, gva, *gpa, write);
7592 bool write;
7652 .write = true,
7663 bool write = ops->write;
7677 ret = vcpu_is_mmio_gpa(vcpu, addr, gpa, write);
7679 ret = vcpu_mmio_gva_to_gpa(vcpu, addr, &gpa, exception, write);
7753 vcpu->run->mmio.is_write = vcpu->mmio_is_write = ops->write;
7807 * Emulate the atomic as a straight write to avoid #AC if SLD is
7851 pr_warn_once("emulating exchange as write\n");
8587 * write access need to be emulated.
8602 * retry instruction -> write #PF -> emulation fail -> retry
9374 * Indirection to move queue_work() out of the tk_core.seq write held
9399 * this is invoked with tk_core.seq write held.
10720 * 3) This also orders the write to mode from any reads to the page
11035 * write gpa, len
11040 * write:
11043 * write gpa, len
12711 * CREATE: No shadow pages exist, thus nothing to write-protect
12744 * Initially-all-set does not require write protecting any page,
12764 * the subtly complex checks when removing write access.
12769 * write-protected before returning to userspace, i.e. before
12776 * Specifically, KVM also write-protects guest page tables to
12778 * no CPUs can write to those page before mmu_lock is dropped.
12787 * a guest page table being write-protected (KVM clears the
12788 * MMU-writable flag when write-protecting for shadow paging).
12797 * write access" helpers to ignore MMU-writable entirely.