Home
last modified time | relevance | path

Searched full:intercepts (Results 1 – 25 of 32) sorted by relevance

12

/linux/drivers/cpuidle/governors/
H A Dteo.c46 * Two metrics called "hits" and "intercepts" are associated with each bin.
53 * length). In turn, the "intercepts" metric reflects the relative frequency of
56 * into by the sleep length (these events are also referred to as "intercepts"
59 * The governor also counts "intercepts" with the measured idle duration below
74 * - The sum of the "intercepts" metric for all of the idle states shallower
85 * - For each of them compute the sum of the "intercepts" metrics over all
123 * @intercepts: The "intercepts" metric.
127 unsigned int intercepts; member
135 * @total: Grand total of the "intercepts" and "hits" metrics for all bins.
136 * @tick_intercepts: "Intercepts" before TICK_NSEC.
[all …]
/linux/arch/x86/kvm/svm/
H A Dnested.c142 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts()
168 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts()
414 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache()
502 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02()
865 * Merge guest and host intercepts - must be called with vcpu in in nested_vmcb02_prepare_control()
899 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode()
900 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode()
901 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode()
902 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode()
903 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode()
[all …]
H A Dsvm.h150 u32 intercepts[MAX_INTERCEPT]; member
438 __set_bit(bit, (unsigned long *)&control->intercepts); in vmcb_set_intercept()
444 __clear_bit(bit, (unsigned long *)&control->intercepts); in vmcb_clr_intercept()
450 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb_is_intercept()
456 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb12_is_intercept()
H A Dsvm.c661 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts()
851 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts()
1039 /* Evaluate instruction intercepts that depend on guest CPUID features. */
1070 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts()
1534 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr()
1785 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0()
2645 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception()
3309 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff); in dump_vmcb()
3310 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16); in dump_vmcb()
3311 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff); in dump_vmcb()
[all …]
H A Dsev.c2773 * created after SEV/SEV-ES initialization, e.g. to init intercepts. in sev_vm_copy_enc_context_from()
4441 /* Clear intercepts on MSRs that are context switched by hardware. */ in sev_es_recalc_msr_intercepts()
4520 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv.rst99 There are two types of SIE secure instruction intercepts: the normal
100 and the notification type. Normal secure instruction intercepts will
106 The notification type intercepts inform KVM about guest environment
/linux/Documentation/driver-api/mei/
H A Diamt.rst47 intercepts the message and routes it to the Intel MEI.
/linux/Documentation/devicetree/bindings/interrupt-controller/
H A Dfsl,mpic-msi.yaml22 intercepts transactions and reroutes them to the true physical address.
/linux/Documentation/userspace-api/media/v4l/
H A Dlibv4l-introduction.rst171 This library intercepts calls to
/linux/arch/s390/kvm/
H A Dtrace.h196 * Trace point for validity intercepts.
H A Dintercept.c3 * in-kernel handling for sie intercepts
H A Dvsie.c1359 * Addressing exceptions are always presentes as intercepts. in vsie_run()
/linux/Documentation/arch/x86/
H A Dsgx.rst134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
/linux/arch/x86/include/asm/
H A Dsvm.h125 u32 intercepts[MAX_INTERCEPT]; member
/linux/Documentation/virt/hyperv/
H A Dvpci.rst100 MMIO range, the Hyper-V host intercepts the accesses and maps
/linux/Documentation/networking/
H A Dbridge.rst264 The br_netfilter module intercepts packets entering the bridge, performs
H A Dtls-offload.rst42 intercepts them, inserts record framing, performs encryption (in ``TLS_SW``
/linux/tools/testing/selftests/kvm/
H A Dset_memory_region_test.c233 * repeatedly intercepts the state-2 page fault that occurs when trying in guest_code_delete_memory_region()
/linux/arch/arm64/kvm/hyp/nvhe/
H A Dffa.c11 * This driver hooks into the SMC trapping logic for the host and intercepts
/linux/arch/x86/coco/sev/
H A Dvc-handle.c953 * also happen with code instrumentation when the hypervisor intercepts in DEFINE_IDTENTRY_VC_KERNEL()
/linux/drivers/platform/chrome/
H A Dcros_ec_sensorhub_ring.c311 * Calculate y-intercepts as if m_median is the slope and in cros_ec_sensor_ring_ts_filter_update()
/linux/arch/x86/coco/tdx/
H A Dtdx.c1185 * TDX intercepts the RDMSR to read the X2APIC ID in the parallel in tdx_early_init()
/linux/arch/x86/kvm/vmx/
H A Dvmx.c2576 * intercepts writes to PAT and EFER, i.e. never enables those controls. in setup_vmcs_config()
4119 * x2APIC and LBR MSR intercepts are modified on-demand and cannot be in vmx_recalc_msr_intercepts()
5127 * be reflected to L1 (when it intercepts #NM) before reaching this in handle_exception_nmi()
5961 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls()
8017 /* TODO: check more intercepts... */ in vmx_check_intercept()
/linux/Documentation/virt/kvm/
H A Dapi.rst2292 table upfront. This is useful to handle validity intercepts for user
4247 on denied accesses, i.e. userspace effectively intercepts the MSR access. If
7408 SUBCHANNEL intercepts.
7937 emulated VM-exit when L1 intercepts a #PF exception that occurs in
7939 the emulated VM-exit when L1 intercepts a #DB exception that occurs in
8083 (which triggers an #AC exception that KVM intercepts). This capability is
/linux/Documentation/networking/device_drivers/ethernet/intel/
H A Dice.rst756 In firmware-based mode, firmware intercepts all LLDP traffic and handles DCBX

12