/linux/drivers/cpuidle/governors/ |
H A D | teo.c | 46 * Two metrics called "hits" and "intercepts" are associated with each bin. 53 * length). In turn, the "intercepts" metric reflects the relative frequency of 56 * into by the sleep length (these events are also referred to as "intercepts" 59 * The governor also counts "intercepts" with the measured idle duration below 74 * - The sum of the "intercepts" metric for all of the idle states shallower 85 * - For each of them compute the sum of the "intercepts" metrics over all 123 * @intercepts: The "intercepts" metric. 127 unsigned int intercepts; member 135 * @total: Grand total of the "intercepts" and "hits" metrics for all bins. 136 * @tick_intercepts: "Intercepts" before TICK_NSEC. [all …]
|
/linux/arch/x86/kvm/svm/ |
H A D | nested.c | 142 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts() 168 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts() 414 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache() 502 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02() 865 * Merge guest and host intercepts - must be called with vcpu in in nested_vmcb02_prepare_control() 899 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode() 900 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode() 901 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode() 902 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode() 903 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode() [all …]
|
H A D | svm.h | 150 u32 intercepts[MAX_INTERCEPT]; member 438 __set_bit(bit, (unsigned long *)&control->intercepts); in vmcb_set_intercept() 444 __clear_bit(bit, (unsigned long *)&control->intercepts); in vmcb_clr_intercept() 450 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb_is_intercept() 456 return test_bit(bit, (unsigned long *)&control->intercepts); in vmcb12_is_intercept()
|
H A D | svm.c | 661 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts() 851 * x2APIC intercepts are modified on-demand and cannot be filtered by in svm_recalc_msr_intercepts() 1039 /* Evaluate instruction intercepts that depend on guest CPUID features. */ 1070 * in VMCB and clear intercepts to avoid #VMEXIT. in svm_recalc_instruction_intercepts() 1534 * Recalculating intercepts may have cleared the VINTR intercept. If in svm_set_vintr() 1785 * SEV-ES guests must always keep the CR intercepts cleared. CR in svm_set_cr0() 2645 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT in dr_interception() 3309 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff); in dump_vmcb() 3310 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16); in dump_vmcb() 3311 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff); in dump_vmcb() [all …]
|
H A D | sev.c | 2773 * created after SEV/SEV-ES initialization, e.g. to init intercepts. in sev_vm_copy_enc_context_from() 4441 /* Clear intercepts on MSRs that are context switched by hardware. */ in sev_es_recalc_msr_intercepts() 4520 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
|
/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv.rst | 99 There are two types of SIE secure instruction intercepts: the normal 100 and the notification type. Normal secure instruction intercepts will 106 The notification type intercepts inform KVM about guest environment
|
/linux/Documentation/driver-api/mei/ |
H A D | iamt.rst | 47 intercepts the message and routes it to the Intel MEI.
|
/linux/Documentation/devicetree/bindings/interrupt-controller/ |
H A D | fsl,mpic-msi.yaml | 22 intercepts transactions and reroutes them to the true physical address.
|
/linux/Documentation/userspace-api/media/v4l/ |
H A D | libv4l-introduction.rst | 171 This library intercepts calls to
|
/linux/arch/s390/kvm/ |
H A D | trace.h | 196 * Trace point for validity intercepts.
|
H A D | intercept.c | 3 * in-kernel handling for sie intercepts
|
H A D | vsie.c | 1359 * Addressing exceptions are always presentes as intercepts. in vsie_run()
|
/linux/Documentation/arch/x86/ |
H A D | sgx.rst | 134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
|
/linux/arch/x86/include/asm/ |
H A D | svm.h | 125 u32 intercepts[MAX_INTERCEPT]; member
|
/linux/Documentation/virt/hyperv/ |
H A D | vpci.rst | 100 MMIO range, the Hyper-V host intercepts the accesses and maps
|
/linux/Documentation/networking/ |
H A D | bridge.rst | 264 The br_netfilter module intercepts packets entering the bridge, performs
|
H A D | tls-offload.rst | 42 intercepts them, inserts record framing, performs encryption (in ``TLS_SW``
|
/linux/tools/testing/selftests/kvm/ |
H A D | set_memory_region_test.c | 233 * repeatedly intercepts the state-2 page fault that occurs when trying in guest_code_delete_memory_region()
|
/linux/arch/arm64/kvm/hyp/nvhe/ |
H A D | ffa.c | 11 * This driver hooks into the SMC trapping logic for the host and intercepts
|
/linux/arch/x86/coco/sev/ |
H A D | vc-handle.c | 953 * also happen with code instrumentation when the hypervisor intercepts in DEFINE_IDTENTRY_VC_KERNEL()
|
/linux/drivers/platform/chrome/ |
H A D | cros_ec_sensorhub_ring.c | 311 * Calculate y-intercepts as if m_median is the slope and in cros_ec_sensor_ring_ts_filter_update()
|
/linux/arch/x86/coco/tdx/ |
H A D | tdx.c | 1185 * TDX intercepts the RDMSR to read the X2APIC ID in the parallel in tdx_early_init()
|
/linux/arch/x86/kvm/vmx/ |
H A D | vmx.c | 2576 * intercepts writes to PAT and EFER, i.e. never enables those controls. in setup_vmcs_config() 4119 * x2APIC and LBR MSR intercepts are modified on-demand and cannot be in vmx_recalc_msr_intercepts() 5127 * be reflected to L1 (when it intercepts #NM) before reaching this in handle_exception_nmi() 5961 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls() 8017 /* TODO: check more intercepts... */ in vmx_check_intercept()
|
/linux/Documentation/virt/kvm/ |
H A D | api.rst | 2292 table upfront. This is useful to handle validity intercepts for user 4247 on denied accesses, i.e. userspace effectively intercepts the MSR access. If 7408 SUBCHANNEL intercepts. 7937 emulated VM-exit when L1 intercepts a #PF exception that occurs in 7939 the emulated VM-exit when L1 intercepts a #DB exception that occurs in 8083 (which triggers an #AC exception that KVM intercepts). This capability is
|
/linux/Documentation/networking/device_drivers/ethernet/intel/ |
H A D | ice.rst | 756 In firmware-based mode, firmware intercepts all LLDP traffic and handles DCBX
|