| /linux/tools/testing/selftests/timers/ |
| H A D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
| /linux/arch/x86/kvm/svm/ |
| H A D | svm.c | 93 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 110 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 236 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer() 257 * Never intercept #GP for SEV guests, KVM can't in svm_get_interrupt_shadow() 668 * If the L01 MSR bitmap does not intercept the MSR, then we need to in svm_set_intercept_for_msr() 672 * If the L02 MSR bitmap does not intercept the MSR, then we need to in svm_set_intercept_for_msr() 727 bool intercept = !(svm->vmcb->control.misc_ctl2 & SVM_MISC2_ENABLE_V_LBR); in svm_recalc_lbr_msr_intercepts() 729 if (intercept == svm->lbr_msrs_intercepted) in svm_vcpu_free_msrpm() 732 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTBRANCHFROMIP, MSR_TYPE_RW, intercept); in svm_vcpu_free_msrpm() 733 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTBRANCHTOIP, MSR_TYPE_RW, intercept); 713 bool intercept = !(svm->vmcb->control.virt_ext & LBR_CTL_ENABLE_MASK); svm_recalc_lbr_msr_intercepts() local 736 bool intercept = !kvm_vcpu_has_mediated_pmu(vcpu); svm_recalc_pmu_msr_intercepts() local [all...] |
| H A D | avic.c | 123 bool intercept) in avic_set_x2apic_msr_interception() 144 * Note! Always intercept LVTT, as TSC-deadline timer mode in avic_set_x2apic_msr_interception() 159 if (intercept == svm->x2avic_msrs_intercepted) in avic_set_x2apic_msr_interception() 167 MSR_TYPE_RW, intercept); in __avic_get_max_physical_id() 169 svm->x2avic_msrs_intercepted = intercept; in __avic_get_max_physical_id() 219 /* Disabling MSR intercept for x2APIC registers */ in avic_activate_vmcb() 228 /* Enabling MSR intercept for x2APIC registers */ in avic_deactivate_vmcb() 251 /* Enabling MSR intercept for x2APIC registers */ in avic_ga_log_notifier() 112 avic_set_x2apic_msr_interception(struct vcpu_svm * svm,bool intercept) avic_set_x2apic_msr_interception() argument
|
| /linux/arch/x86/kvm/ |
| H A D | kvm_emulate.h | 38 u8 intercept; /* which intercept */ member 224 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 362 u8 intercept; 360 u8 intercept; global() member
|
| H A D | emulate.c | 169 #define Intercept ((u64)1 << 48) /* Has valid intercept field */ 192 u8 intercept; member 414 enum x86_intercept intercept, in emulator_check_intercept() argument 418 .intercept = intercept, in emulator_check_intercept() 434 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept() 3949 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i } 3951 .intercept = x86_intercept_##_i, .check_perm = (_p) } 3961 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 3964 .intercept [all...] |
| /linux/arch/x86/kvm/vmx/ |
| H A D | vmx.c | 899 * related to #VE for VMX, intercept unexpected #VE and warn on it. 906 * We intercept those #GP and allow access to them anyway in vmx_read_guest_seg_base() 1812 * and generate #DB/#BP as expected, which KVM might intercept. in vmx_check_emulate_instruction() 3442 * intercept CR3 accesses when paging is _disabled_. This is in vmx_flush_tlb_gva() 3451 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or in vmx_flush_tlb_guest() 3453 * intercept them to preserve its identity mapped page tables. in vmx_flush_tlb_guest() 4185 bool intercept = !has_mediated_pmu; 4207 MSR_TYPE_RW, intercept); in vmx_set_intercept_for_msr() 4209 intercept || !fw_writes_is_enabled(vcpu)); in vmx_set_intercept_for_msr() 4220 MSR_TYPE_RW, intercept); in vmx_update_msr_bitmap_x2apic() 4294 bool intercept = !has_mediated_pmu; vmx_recalc_pmu_msr_intercepts() local 4345 bool intercept; vmx_recalc_msr_intercepts() local [all...] |
| /linux/Documentation/timers/ |
| H A D | hpet.rst | 24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
|
| /linux/Documentation/livepatch/ |
| H A D | reliable-stacktrace.rst | 163 to intercept when that function returns with a return trampoline, e.g. 166 tracing can intercept returns. 169 kretprobes can intercept returns. 228 Some trampolines do not rewrite the return address in order to intercept
|
| /linux/tools/testing/selftests/kvm/x86/ |
| H A D | nested_exceptions_test.c | 98 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 23 SIE instruction which the UV will intercept and execute on KVM's
|
| H A D | s390-pv.rst | 55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | errata.rst | 57 intercept the #DB, temporarily disable the breakpoint, single-step over the
|
| /linux/Documentation/dev-tools/kunit/api/ |
| H A D | functionredirection.rst | 32 A simpler way to intercept and replace some of the function calls is to use
|
| /linux/drivers/hwmon/ |
| H A D | lm93.c | 349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local 351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG() 372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local 374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
|
| /linux/net/ipv6/netfilter/ |
| H A D | Kconfig | 227 The SYNPROXY target allows you to intercept TCP connections and
|
| /linux/Documentation/hid/ |
| H A D | hid-bpf.rst | 92 With eBPF, we can intercept any HID command emitted to the device and 96 kernel/bpf program because we can intercept any incoming command.
|
| /linux/net/ipv4/netfilter/ |
| H A D | Kconfig | 213 The SYNPROXY target allows you to intercept TCP connections and
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 50 1. The attacker could intercept all PCR extends coming from the system
|
| /linux/Documentation/userspace-api/ |
| H A D | seccomp_filter.rst | 196 applications like container managers, which wish to intercept particular
|
| /linux/Documentation/scsi/ |
| H A D | ChangeLog.megaraid_sas | 416 1. Added the megasas_reset_timer routine to intercept cmd timeout and throttle io.
|
| /linux/tools/arch/x86/kcpuid/ |
| H A D | cpuid.csv | 864 0x8000000a, 0, edx, 10, pausefilter , Pause intercept filter 875 0x8000000a, 0, edx, 24, tlbsync_int , TLBSYNC intercept + INVLPGB/TLBSYNC in VMCB
|
| /linux/mm/ |
| H A D | Kconfig | 1354 Enable the userfaultfd() system call that allows to intercept and
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 4315 Similarly, if userspace wishes to intercept on denied accesses, 8064 longer intercept some instructions for improved latency in some 8246 This capability allows userspace to intercept RDMSR and WRMSR instructions if 8263 KVM_MSR_EXIT_REASON_UNKNOWN intercept accesses to unknown (to KVM) MSRs 8264 KVM_MSR_EXIT_REASON_INVAL intercept accesses that are architecturally 8266 KVM_MSR_EXIT_REASON_FILTER intercept accesses that are denied by userspace
|
| /linux/net/netfilter/ |
| H A D | Kconfig | 654 The SYNPROXY expression allows you to intercept TCP connections and
|
| /linux/arch/arm/ |
| H A D | Kconfig | 1171 intercept syscalls that have structure arguments which layout
|