/linux/tools/testing/selftests/timers/ |
H A D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
/linux/arch/s390/kvm/ |
H A D | Makefile | 10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/linux/tools/testing/selftests/kvm/x86_64/ |
H A D | svm_nested_shutdown_test.c | 29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
|
H A D | svm_int_ctl_test.c | 74 vmcb->control.intercept &= ~(BIT(INTERCEPT_INTR) | BIT(INTERCEPT_VINTR)); in l1_guest_code()
|
H A D | triple_fault_event_test.c | 51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
|
H A D | svm_nested_soft_inject_test.c | 94 vmcb->control.intercept |= BIT(INTERCEPT_NMI) | BIT(INTERCEPT_HLT); in l1_guest_code()
|
H A D | hyperv_svm_test.c | 102 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
|
H A D | nested_exceptions_test.c | 97 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
|
/linux/Documentation/timers/ |
H A D | hpet.rst | 24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
|
/linux/arch/x86/kvm/svm/ |
H A D | svm.c | 897 void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept) in svm_set_x2apic_msr_interception() argument 901 if (intercept == svm->x2avic_msrs_intercepted) in svm_set_x2apic_msr_interception() 914 !intercept, !intercept); in svm_set_x2apic_msr_interception() 917 svm->x2avic_msrs_intercepted = intercept; in svm_set_x2apic_msr_interception() 4512 if (info->intercept >= ARRAY_SIZE(x86_intercept_map)) in svm_check_intercept() 4515 icpt_info = x86_intercept_map[info->intercept]; in svm_check_intercept() 4522 if (info->intercept == x86_intercept_cr_read) in svm_check_intercept() 4528 if (info->intercept == x86_intercept_cr_write) in svm_check_intercept() 4532 info->intercept == x86_intercept_clts) in svm_check_intercept() 4542 if (info->intercept == x86_intercept_lmsw) { in svm_check_intercept() [all …]
|
/linux/tools/testing/selftests/kvm/lib/x86_64/ |
H A D | svm.c | 99 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
|
/linux/Documentation/livepatch/ |
H A D | reliable-stacktrace.rst | 163 to intercept when that function returns with a return trampoline, e.g. 166 tracing can intercept returns. 169 kretprobes can intercept returns. 228 Some trampolines do not rewrite the return address in order to intercept
|
/linux/tools/testing/selftests/kvm/include/x86_64/ |
H A D | svm.h | 87 u64 intercept; member
|
/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv-boot.rst | 23 SIE instruction which the UV will intercept and execute on KVM's
|
H A D | s390-pv.rst | 55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
|
/linux/Documentation/dev-tools/kunit/api/ |
H A D | functionredirection.rst | 32 A simpler way to intercept and replace some of the function calls is to use
|
/linux/Documentation/admin-guide/laptops/ |
H A D | sonypi.rst | 32 Another option to intercept the events is to get them directly through the
|
/linux/drivers/hwmon/ |
H A D | lm93.c | 349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local 351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG() 372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local 374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
|
/linux/Documentation/hid/ |
H A D | hid-bpf.rst | 92 With eBPF, we can intercept any HID command emitted to the device and 96 kernel/bpf program because we can intercept any incoming command.
|
/linux/Documentation/security/tpm/ |
H A D | tpm-security.rst | 50 1. The attacker could intercept all PCR extends coming from the system
|
/linux/Documentation/userspace-api/ |
H A D | seccomp_filter.rst | 196 applications like container managers, which wish to intercept particular
|
/linux/Documentation/scsi/ |
H A D | ChangeLog.megaraid_sas | 416 1. Added the megasas_reset_timer routine to intercept cmd timeout and throttle io.
|
/linux/tools/arch/x86/kcpuid/ |
H A D | cpuid.csv | 838 0x8000000a, 0, edx, 10, pausefilter , Pause intercept filter 849 0x8000000a, 0, edx, 24, tlbsync_int , TLBSYNC intercept + INVLPGB/TLBSY…
|
/linux/mm/ |
H A D | Kconfig | 1220 Enable the userfaultfd() system call that allows to intercept and
|
/linux/net/netfilter/ |
H A D | Kconfig | 673 The SYNPROXY expression allows you to intercept TCP connections and
|