Home
last modified time | relevance | path

Searched full:intercepts (Results 1 – 25 of 33) sorted by relevance

12

/linux/drivers/cpuidle/governors/
H A Dteo.c46 * Two metrics called "hits" and "intercepts" are associated with each bin.
53 * length). In turn, the "intercepts" metric reflects the relative frequency of
56 * into by the sleep length (these events are also referred to as "intercepts"
59 * The governor also counts "intercepts" with the measured idle duration below
74 * - The sum of the "intercepts" metric for all of the idle states shallower
85 * - For each of them compute the sum of the "intercepts" metrics over all
123 * @intercepts: The "intercepts" metric.
127 unsigned int intercepts; member
135 * @total: Grand total of the "intercepts" and "hits" metrics for all bins.
136 * @tick_intercepts: "Intercepts" before TICK_NSEC.
[all …]
/linux/arch/x86/kvm/svm/
H A Dnested.c142 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts()
168 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts()
414 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache()
502 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02()
873 * Merge guest and host intercepts - must be called with vcpu in in nested_vmcb02_prepare_control()
907 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode()
908 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode()
909 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode()
910 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode()
911 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode()
[all …]
H A Dsvm.h154 u32 intercepts[MAX_INTERCEPT]; member
442 __set_bit(bit, (unsigned long *)&control->intercepts); in vmcb_set_intercept()
448 __clear_bit(bit, (unsigned long *)&control->intercepts); in vmcb_clr_intercept()
454 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb_is_intercept()
460 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb12_is_intercept()
H A Dsvm.c641 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts()
793 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts()
981 /* Evaluate instruction intercepts that depend on guest CPUID features. */
1012 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts()
1459 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr()
1710 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0()
2570 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception()
3254 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff); in dump_vmcb()
3255 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16); in dump_vmcb()
3256 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff); in dump_vmcb()
[all …]
H A Dsev.c2814 * created after SEV/SEV-ES initialization, e.g. to init intercepts. in sev_vm_copy_enc_context_from()
4510 /* Clear intercepts on MSRs that are context switched by hardware. */ in sev_es_recalc_msr_intercepts()
4592 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv.rst99 There are two types of SIE secure instruction intercepts: the normal
100 and the notification type. Normal secure instruction intercepts will
106 The notification type intercepts inform KVM about guest environment
/linux/Documentation/driver-api/mei/
H A Diamt.rst47 intercepts the message and routes it to the Intel MEI.
/linux/Documentation/devicetree/bindings/interrupt-controller/
H A Dfsl,mpic-msi.yaml22 intercepts transactions and reroutes them to the true physical address.
/linux/Documentation/userspace-api/media/v4l/
H A Dlibv4l-introduction.rst171 This library intercepts calls to
/linux/arch/s390/kvm/
H A Dtrace.h196 * Trace point for validity intercepts.
H A Dintercept.c3 * in-kernel handling for sie intercepts
/linux/Documentation/arch/x86/
H A Dsgx.rst134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
/linux/arch/x86/include/asm/
H A Dsvm.h125 u32 intercepts[MAX_INTERCEPT]; member
/linux/Documentation/virt/hyperv/
H A Dvpci.rst100 MMIO range, the Hyper-V host intercepts the accesses and maps
/linux/arch/x86/mm/
H A Dmem_encrypt_amd.c497 * AMD-SEV-ES intercepts the RDMSR to read the X2APIC ID in the in sme_early_init()
/linux/Documentation/networking/
H A Dbridge.rst264 The br_netfilter module intercepts packets entering the bridge, performs
H A Dtls-offload.rst42 intercepts them, inserts record framing, performs encryption (in ``TLS_SW``
/linux/arch/x86/kernel/cpu/
H A Dmshyperv.c679 * default, they are implemented as intercepts by the Windows Hyper-V stack.
/linux/tools/testing/selftests/kvm/
H A Dset_memory_region_test.c233 * repeatedly intercepts the state-2 page fault that occurs when trying in guest_code_delete_memory_region()
/linux/arch/x86/coco/sev/
H A Dvc-handle.c965 * also happen with code instrumentation when the hypervisor intercepts in DEFINE_IDTENTRY_VC_KERNEL()
/linux/include/hyperv/
H A Dhvgdk_mini.h724 /* SynIC intercepts */
/linux/drivers/platform/chrome/
H A Dcros_ec_sensorhub_ring.c311 * Calculate y-intercepts as if m_median is the slope and in cros_ec_sensor_ring_ts_filter_update()
/linux/arch/x86/kvm/
H A Dpmu.c635 * On AMD, _all_ exceptions on RDPMC have priority over SVM intercepts, in kvm_pmu_check_rdpmc_early()
/linux/arch/x86/coco/tdx/
H A Dtdx.c1185 * TDX intercepts the RDMSR to read the X2APIC ID in the parallel in tdx_early_init()
/linux/arch/x86/kvm/vmx/
H A Dvmx.c2606 * intercepts writes to PAT and EFER, i.e. never enables those controls. in setup_vmcs_config()
4169 * x2APIC and LBR MSR intercepts are modified on-demand and cannot be in vmx_recalc_msr_intercepts()
5199 * be reflected to L1 (when it intercepts #NM) before reaching this in handle_exception_nmi()
6040 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls()
8146 /* TODO: check more intercepts... */ in vmx_check_intercept()

12