Lines Matching defs:value

167  * advancement entirely.  Any other value is used as-is and disables adaptive
181 * Flags to manipulate forced emulation behavior (any non-zero value will
204 * Restoring the host value for MSRs that are only consumed when running in
206 * returns to userspace, i.e. the kernel can run with the guest's value.
432 u64 value;
436 rdmsrl_safe(kvm_uret_msrs_list[i], &value);
437 msrs->values[i].host = value;
438 msrs->values[i].curr = value;
442 int kvm_set_user_return_msr(unsigned slot, u64 value, u64 mask)
448 value = (value & mask) | (msrs->values[slot].host & ~mask);
449 if (value == msrs->values[slot].curr)
451 err = wrmsrl_safe(kvm_uret_msrs_list[slot], value);
455 msrs->values[slot].curr = value;
1865 * value on AMD. Making the address canonical ensures that
1867 * value, and that something deterministic happens if the guest
2234 * writes of the same value, e.g. to allow userspace to blindly stuff
2472 /* set tsc_scaling_ratio to a safe value */
2735 * userspace explicitly writes a zero value.
2752 * value written by userspace (on any vCPU) should not be subject
2929 * reports the TSC value from which it do so. Returns true if host is
2943 * Calculates CLOCK_MONOTONIC and reports the TSC value from which it did
2957 * Calculates CLOCK_REALTIME and reports the TSC value from which it did
2982 * RDTSC value.
3092 * per-CPU value (which may be zero if a CPU is going offline). Note, tsc_khz
4297 * return L1's TSC value to ensure backwards-compatible
4325 * Conservative value valid for even the basic CPU models.
5655 guest_xcrs->xcrs[0].value = vcpu->arch.xcr0;
5673 guest_xcrs->xcrs[i].value);
8071 * successful, as the old value is written back on failure. Note, for
8073 * back the original value and the access is atomic, but KVM's ABI is
8074 * that all writes are dirty logged, regardless of the value written.
8244 unsigned long value)
8247 return kvm_set_dr(emul_to_vcpu(ctxt), dr, value);
8258 unsigned long value;
8262 value = kvm_read_cr0(vcpu);
8265 value = vcpu->arch.cr2;
8268 value = kvm_read_cr3(vcpu);
8271 value = kvm_read_cr4(vcpu);
8274 value = kvm_get_cr8(vcpu);
8281 return value;
8972 * rflags is the old, "raw" value of the flags. The new value has
9497 * protected IPI, and all callers wishing to update the value
9504 * correct TSC value must be set before the request. However,
9809 * A min value is not calculated because it will always
10386 * value pushed on the stack. Trap-like exception and all #DBs
10730 * exiting to the userspace. Otherwise, the value will be returned to the
11027 * can (a) read the correct value of the debug registers, (b) set
12634 * The caller should always use IS_ERR() to check the return value
12851 * mmio generation may have reached its maximum value.
13535 int kvm_spec_ctrl_test_value(u64 value)
13538 * test that setting IA32_SPEC_CTRL to given value
13550 else if (wrmsrl_safe(MSR_IA32_SPEC_CTRL, value))
13588 * KVM_EXIT_INTERNAL_ERROR for cases not currently handled by KVM. Return value