| /linux/drivers/cpuidle/governors/ |
| H A D | teo.c | 46 * Two metrics called "hits" and "intercepts" are associated with each bin. 53 * In turn, the "intercepts" metric reflects the relative frequency of non-timer 55 * from the sleep length (these events are also referred to as "intercepts" 58 * The governor also counts "intercepts" with the measured idle duration below 73 * - The sum of the "intercepts" metric for all of the idle states shallower 77 * Also find the idle state with the maximum intercepts metric (if there are 78 * multiple states with the maximum intercepts metric, choose the one with 86 * descending order, starting at the state with the maximum intercepts 89 * - For each of them compute the sum of the "intercepts" metrics over all 127 * @intercepts: The "intercepts" metric. [all …]
|
| /linux/arch/x86/kvm/svm/ |
| H A D | svm.h | 152 u32 intercepts[MAX_INTERCEPT]; member 446 static inline void __vmcb_set_intercept(unsigned long *intercepts, u32 bit) in __vmcb_set_intercept() argument 449 __set_bit(bit, intercepts); in __vmcb_set_intercept() 452 static inline void __vmcb_clr_intercept(unsigned long *intercepts, u32 bit) in __vmcb_clr_intercept() argument 455 __clear_bit(bit, intercepts); in __vmcb_clr_intercept() 458 static inline bool __vmcb_is_intercept(unsigned long *intercepts, u32 bit) in __vmcb_is_intercept() argument 461 return test_bit(bit, intercepts); in __vmcb_is_intercept() 466 __vmcb_set_intercept((unsigned long *)&control->intercepts, bit); in vmcb_set_intercept() 471 __vmcb_clr_intercept((unsigned long *)&control->intercepts, bit); in vmcb_clr_intercept() 476 return __vmcb_is_intercept((unsigned long *)&control->intercepts, bit); in vmcb_is_intercept() [all …]
|
| H A D | nested.c | 141 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts() 167 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts() 442 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache() 536 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02() 916 * Merge guest and host intercepts - must be called with vcpu in in nested_vmcb02_prepare_control() 950 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode() 951 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode() 952 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode() 953 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode() 954 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode() [all …]
|
| H A D | svm.c | 645 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts() 839 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts() 888 * In this case, even though LBR_CTL does not need an update, intercepts in svm_update_lbrv() 889 * do, so always recalculate the intercepts here. in svm_update_lbrv() 1012 /* Evaluate instruction intercepts that depend on guest CPUID features. */ 1038 * always set if vls is enabled. If the intercepts are set, the bit is in svm_recalc_instruction_intercepts() 1047 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts() 1510 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr() 1761 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0() 2643 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception() [all …]
|
| H A D | sev.c | 2831 * created after SEV/SEV-ES initialization, e.g. to init intercepts. in sev_vm_copy_enc_context_from() 4556 /* Clear intercepts on MSRs that are context switched by hardware. */ in sev_es_recalc_msr_intercepts() 4638 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv.rst | 99 There are two types of SIE secure instruction intercepts: the normal 100 and the notification type. Normal secure instruction intercepts will 106 The notification type intercepts inform KVM about guest environment
|
| /linux/Documentation/driver-api/mei/ |
| H A D | iamt.rst | 47 intercepts the message and routes it to the Intel MEI.
|
| /linux/Documentation/devicetree/bindings/interrupt-controller/ |
| H A D | fsl,mpic-msi.yaml | 22 intercepts transactions and reroutes them to the true physical address.
|
| /linux/Documentation/userspace-api/media/v4l/ |
| H A D | libv4l-introduction.rst | 171 This library intercepts calls to
|
| /linux/arch/s390/kvm/ |
| H A D | trace.h | 196 * Trace point for validity intercepts.
|
| /linux/Documentation/arch/x86/ |
| H A D | sgx.rst | 134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
|
| /linux/drivers/hv/ |
| H A D | mshv_root_main.c | 620 * mshv_handle_gpa_intercept - Handle GPA (Guest Physical Address) intercepts. 623 * This function processes GPA intercepts by identifying the memory region 652 /* Only movable memory ranges are supported for GPA intercepts */ in mshv_handle_gpa_intercept()
|
| H A D | mshv_synic.c | 500 /* Enable intercepts */ in mshv_synic_init()
|
| H A D | mshv_vtl_main.c | 243 /* Enable intercepts */ in mshv_vtl_synic_enable_regs()
|
| /linux/Documentation/virt/hyperv/ |
| H A D | vpci.rst | 100 MMIO range, the Hyper-V host intercepts the accesses and maps
|
| /linux/arch/x86/mm/ |
| H A D | mem_encrypt_amd.c | 497 * AMD-SEV-ES intercepts the RDMSR to read the X2APIC ID in the in sme_early_init()
|
| /linux/Documentation/networking/ |
| H A D | bridge.rst | 264 The br_netfilter module intercepts packets entering the bridge, performs
|
| /linux/tools/testing/selftests/kvm/ |
| H A D | set_memory_region_test.c | 233 * repeatedly intercepts the state-2 page fault that occurs when trying in guest_code_delete_memory_region()
|
| /linux/arch/x86/kvm/vmx/ |
| H A D | vmx.c | 2757 * intercepts writes to PAT and EFER, i.e. never enables those controls. in setup_vmcs_config() 4412 * x2APIC and LBR MSR intercepts are modified on-demand and cannot be in vmx_recalc_msr_intercepts() 5443 /* When using EPT, KVM intercepts #PF only to detect illegal GPAs. */ in vmx_handle_page_fault() 5464 * If EPT is enabled, fixup and inject the #PF. KVM intercepts #PFs in vmx_handle_page_fault() 5499 * be reflected to L1 (when it intercepts #NM) before reaching this in handle_exception_nmi() 6335 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls() 8381 /* TODO: check more intercepts... */ in vmx_check_intercept()
|
| /linux/include/hyperv/ |
| H A D | hvgdk_mini.h | 738 /* SynIC intercepts */
|
| /linux/arch/x86/coco/tdx/ |
| H A D | tdx.c | 1185 * TDX intercepts the RDMSR to read the X2APIC ID in the parallel in tdx_early_init()
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 2296 table upfront. This is useful to handle validity intercepts for user 4269 on denied accesses, i.e. userspace effectively intercepts the MSR access. If 7589 SUBCHANNEL intercepts. 8142 emulated VM-exit when L1 intercepts a #PF exception that occurs in 8144 the emulated VM-exit when L1 intercepts a #DB exception that occurs in 8288 (which triggers an #AC exception that KVM intercepts). This capability is
|
| /linux/Documentation/networking/device_drivers/ethernet/intel/ |
| H A D | ice.rst | 756 In firmware-based mode, firmware intercepts all LLDP traffic and handles DCBX
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 109 intercepts during the execution process, this mechanism needs the interpreter
|
| /linux/drivers/char/ipmi/ |
| H A D | ipmi_si_intf.c | 1799 * data returned. This intercepts such commands, and causes userspace
|