Home
last modified time | relevance | path

Searched full:intercepts (Results 1 – 25 of 30) sorted by relevance

12

/linux/drivers/cpuidle/governors/
H A Dteo.c46 * Two metrics called "hits" and "intercepts" are associated with each bin.
53 * In turn, the "intercepts" metric reflects the relative frequency of non-timer
55 * from the sleep length (these events are also referred to as "intercepts"
58 * The governor also counts "intercepts" with the measured idle duration below
73 * - The sum of the "intercepts" metric for all of the idle states shallower
77 * Also find the idle state with the maximum intercepts metric (if there are
78 * multiple states with the maximum intercepts metric, choose the one with
86 * descending order, starting at the state with the maximum intercepts
89 * - For each of them compute the sum of the "intercepts" metrics over all
127 * @intercepts: The "intercepts" metric.
[all …]
/linux/arch/x86/kvm/svm/
H A Dsvm.h152 u32 intercepts[MAX_INTERCEPT]; member
446 static inline void __vmcb_set_intercept(unsigned long *intercepts, u32 bit) in __vmcb_set_intercept() argument
449 __set_bit(bit, intercepts); in __vmcb_set_intercept()
452 static inline void __vmcb_clr_intercept(unsigned long *intercepts, u32 bit) in __vmcb_clr_intercept() argument
455 __clear_bit(bit, intercepts); in __vmcb_clr_intercept()
458 static inline bool __vmcb_is_intercept(unsigned long *intercepts, u32 bit) in __vmcb_is_intercept() argument
461 return test_bit(bit, intercepts); in __vmcb_is_intercept()
466 __vmcb_set_intercept((unsigned long *)&control->intercepts, bit); in vmcb_set_intercept()
471 __vmcb_clr_intercept((unsigned long *)&control->intercepts, bit); in vmcb_clr_intercept()
476 return __vmcb_is_intercept((unsigned long *)&control->intercepts, bit); in vmcb_is_intercept()
[all …]
H A Dnested.c141 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts()
167 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts()
442 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache()
536 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02()
916 * Merge guest and host intercepts - must be called with vcpu in in nested_vmcb02_prepare_control()
950 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode()
951 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode()
952 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode()
953 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode()
954 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode()
[all …]
H A Dsvm.c645 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts()
839 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts()
888 * In this case, even though LBR_CTL does not need an update, intercepts in svm_update_lbrv()
889 * do, so always recalculate the intercepts here. in svm_update_lbrv()
1012 /* Evaluate instruction intercepts that depend on guest CPUID features. */
1038 * always set if vls is enabled. If the intercepts are set, the bit is in svm_recalc_instruction_intercepts()
1047 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts()
1510 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr()
1761 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0()
2643 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception()
[all …]
H A Dsev.c2831 * created after SEV/SEV-ES initialization, e.g. to init intercepts. in sev_vm_copy_enc_context_from()
4556 /* Clear intercepts on MSRs that are context switched by hardware. */ in sev_es_recalc_msr_intercepts()
4638 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv.rst99 There are two types of SIE secure instruction intercepts: the normal
100 and the notification type. Normal secure instruction intercepts will
106 The notification type intercepts inform KVM about guest environment
/linux/Documentation/driver-api/mei/
H A Diamt.rst47 intercepts the message and routes it to the Intel MEI.
/linux/Documentation/devicetree/bindings/interrupt-controller/
H A Dfsl,mpic-msi.yaml22 intercepts transactions and reroutes them to the true physical address.
/linux/Documentation/userspace-api/media/v4l/
H A Dlibv4l-introduction.rst171 This library intercepts calls to
/linux/arch/s390/kvm/
H A Dtrace.h196 * Trace point for validity intercepts.
/linux/Documentation/arch/x86/
H A Dsgx.rst134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
/linux/drivers/hv/
H A Dmshv_root_main.c620 * mshv_handle_gpa_intercept - Handle GPA (Guest Physical Address) intercepts.
623 * This function processes GPA intercepts by identifying the memory region
652 /* Only movable memory ranges are supported for GPA intercepts */ in mshv_handle_gpa_intercept()
H A Dmshv_synic.c500 /* Enable intercepts */ in mshv_synic_init()
H A Dmshv_vtl_main.c243 /* Enable intercepts */ in mshv_vtl_synic_enable_regs()
/linux/Documentation/virt/hyperv/
H A Dvpci.rst100 MMIO range, the Hyper-V host intercepts the accesses and maps
/linux/arch/x86/mm/
H A Dmem_encrypt_amd.c497 * AMD-SEV-ES intercepts the RDMSR to read the X2APIC ID in the in sme_early_init()
/linux/Documentation/networking/
H A Dbridge.rst264 The br_netfilter module intercepts packets entering the bridge, performs
/linux/tools/testing/selftests/kvm/
H A Dset_memory_region_test.c233 * repeatedly intercepts the state-2 page fault that occurs when trying in guest_code_delete_memory_region()
/linux/arch/x86/kvm/vmx/
H A Dvmx.c2757 * intercepts writes to PAT and EFER, i.e. never enables those controls. in setup_vmcs_config()
4412 * x2APIC and LBR MSR intercepts are modified on-demand and cannot be in vmx_recalc_msr_intercepts()
5443 /* When using EPT, KVM intercepts #PF only to detect illegal GPAs. */ in vmx_handle_page_fault()
5464 * If EPT is enabled, fixup and inject the #PF. KVM intercepts #PFs in vmx_handle_page_fault()
5499 * be reflected to L1 (when it intercepts #NM) before reaching this in handle_exception_nmi()
6335 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls()
8381 /* TODO: check more intercepts... */ in vmx_check_intercept()
/linux/include/hyperv/
H A Dhvgdk_mini.h738 /* SynIC intercepts */
/linux/arch/x86/coco/tdx/
H A Dtdx.c1185 * TDX intercepts the RDMSR to read the X2APIC ID in the parallel in tdx_early_init()
/linux/Documentation/virt/kvm/
H A Dapi.rst2296 table upfront. This is useful to handle validity intercepts for user
4269 on denied accesses, i.e. userspace effectively intercepts the MSR access. If
7589 SUBCHANNEL intercepts.
8142 emulated VM-exit when L1 intercepts a #PF exception that occurs in
8144 the emulated VM-exit when L1 intercepts a #DB exception that occurs in
8288 (which triggers an #AC exception that KVM intercepts). This capability is
/linux/Documentation/networking/device_drivers/ethernet/intel/
H A Dice.rst756 In firmware-based mode, firmware intercepts all LLDP traffic and handles DCBX
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst109 intercepts during the execution process, this mechanism needs the interpreter
/linux/drivers/char/ipmi/
H A Dipmi_si_intf.c1799 * data returned. This intercepts such commands, and causes userspace

12