Lines Matching full:intercepts
661 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts()
851 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts()
1039 /* Evaluate instruction intercepts that depend on guest CPUID features. */
1070 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts()
1534 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr()
1785 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0()
2645 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception()
3309 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff); in dump_vmcb()
3310 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16); in dump_vmcb()
3311 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff); in dump_vmcb()
3312 pr_err("%-20s%04x\n", "dr_write:", control->intercepts[INTERCEPT_DR] >> 16); in dump_vmcb()
3313 pr_err("%-20s%08x\n", "exceptions:", control->intercepts[INTERCEPT_EXCEPTION]); in dump_vmcb()
3314 pr_err("%-20s%08x %08x\n", "intercepts:", in dump_vmcb()
3315 control->intercepts[INTERCEPT_WORD3], in dump_vmcb()
3316 control->intercepts[INTERCEPT_WORD4]); in dump_vmcb()
3759 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_update_cr8_intercept()
3921 * more to do at this time as KVM has already enabled IRET intercepts. in svm_enable_nmi_window()
4369 * We need to handle MC intercepts here before the vcpu has a chance to in svm_vcpu_run()