Lines Matching defs:mode

219 /* Default is SYSTEM mode, 1 for host-guest mode */
739 * Eat all faults as all other faults on VMXOFF faults are mode related, i.e.
741 * magically in RM, VM86, compat mode, or at CPL>0.
1110 * LMA and LME handled by hardware; SCE meaningless outside long mode.
1115 /* SCE is meaningful only in long mode on Intel */
1297 * to/from long-mode by setting MSR_EFER.LMA.
1723 * mode, but just finding out that we are in 64-bit mode is
1865 * The SYSCALL MSRs are only needed on long mode guests, and only
2988 * is in the middle of the transition from real mode to
2989 * protected mode it is safe to assume that RPL 0 is a good
3006 * Update real mode segment cache. It may be not up-to-date if segment
3007 * register was written while vcpu was in a guest mode.
3061 "when entering protected mode (seg=%d)", seg);
3151 pr_debug_ratelimited("%s: tss fixup for long mode. \n",
3441 * is in force while we are in guest mode. Do not let guests control
3476 * SMEP/SMAP/PKU is disabled if CPU is in non-paging mode in
3479 * mode.
3599 * state vmexit when "unrestricted guest" mode is turned on.
3755 if (tr.type != 3 && tr.type != 11) /* TODO: Check if guest is in IA32e mode */
3799 /* real mode guest state checks */
3814 /* protected mode guest state checks */
3889 /* Set up identity-mapping pagetable for EPT in real mode */
4046 u8 mode;
4054 mode = MSR_BITMAP_MODE_X2APIC;
4056 mode |= MSR_BITMAP_MODE_X2APIC_APICV;
4058 mode = 0;
4061 if (mode == vmx->x2apic_msr_bitmap_mode)
4064 vmx->x2apic_msr_bitmap_mode = mode;
4071 * mode, only the current timer count needs on-demand emulation by KVM.
4073 if (mode & MSR_BITMAP_MODE_X2APIC_APICV)
4084 !(mode & MSR_BITMAP_MODE_X2APIC));
4086 if (mode & MSR_BITMAP_MODE_X2APIC_APICV) {
4166 if (vcpu->mode == IN_GUEST_MODE) {
4178 * Case 1: vCPU stays in non-root mode. Sending a notification
4181 * Case 2: vCPU exits to root mode and is still runnable. The
4186 * Case 3: vCPU exits to root mode and is blocked. vcpu_block()
4221 * This pairs with the smp_mb_*() after setting vcpu->mode in
4224 * vcpu->mode != IN_GUEST_MODE. The extra barrier is needed as
4228 * vcpu->requests and the load from vcpu->mode.
4240 * 1. If target vcpu is running(non-root mode), send posted interrupt
4242 * 2. If target vcpu isn't running(root mode), kick it to pick up the
4267 * after setting vcpu->mode in vcpu_enter_guest(), thus the vCPU is
4269 * posted interrupt "fails" because vcpu->mode != IN_GUEST_MODE.
4403 * IA32e mode, and loading of EFER and PERF_GLOBAL_CTRL are toggled dynamically.
5112 * from user space while in guest debugging mode.
5140 * Cause the #SS fault with 0 error code in VM86 mode.
5154 * Forward all other exceptions that are valid in real mode.
5155 * FIXME: Breaks guest debugging in real mode, needs to be fixed with
5175 * - Guest CPL == 3 (user mode)
5323 * user space while in guest debugging mode. Reading it for
5339 * Handle split lock. Depending on detection mode this will
6465 * mode as if vcpus is in root mode, the PML buffer must has been
6666 * This code is only executed when the flush mode is 'cond' or
7053 * real mode.
7250 * transitioning from a less privileged predictor mode, regardless of
8365 * Though SYSCALL is only supported in 64-bit mode on Intel CPUs, kvm
8366 * will emulate SYSCALL in legacy mode if the vendor string in guest
8653 * mitigation mode.