| /linux/drivers/cpuidle/governors/ |
| H A D | teo.c | 131 unsigned int intercepts; member 217 teo_decay(&bin->intercepts); in teo_update() 218 total += bin->intercepts; in teo_update() 272 cpu_data->state_bins[idx_duration].intercepts += PULSE; in teo_update() 352 unsigned int prev_intercepts = prev_bin->intercepts; in teo_select() 454 intercept_sum += cpu_data->state_bins[i].intercepts; in teo_select()
|
| /linux/arch/x86/kvm/svm/ |
| H A D | svm.h | 152 u32 intercepts[MAX_INTERCEPT]; member 446 static inline void __vmcb_set_intercept(unsigned long *intercepts, u32 bit) in __vmcb_set_intercept() argument 449 __set_bit(bit, intercepts); in __vmcb_set_intercept() 452 static inline void __vmcb_clr_intercept(unsigned long *intercepts, u32 bit) in __vmcb_clr_intercept() argument 455 __clear_bit(bit, intercepts); in __vmcb_clr_intercept() 458 static inline bool __vmcb_is_intercept(unsigned long *intercepts, u32 bit) in __vmcb_is_intercept() argument 461 return test_bit(bit, intercepts); in __vmcb_is_intercept() 466 __vmcb_set_intercept((unsigned long *)&control->intercepts, bit); in vmcb_set_intercept() 471 __vmcb_clr_intercept((unsigned long *)&control->intercepts, bit); in vmcb_clr_intercept() 476 return __vmcb_is_intercept((unsigned long *)&control->intercepts, bit); in vmcb_is_intercept() [all …]
|
| H A D | nested.c | 141 c->intercepts[i] = h->intercepts[i]; in recalc_intercepts() 167 c->intercepts[i] |= g->intercepts[i]; in recalc_intercepts() 451 to->intercepts[i] = from->intercepts[i]; in __nested_copy_vmcb_control_to_cache() 545 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts)) in nested_sync_control_from_vmcb02() 959 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff, in enter_svm_guest_mode() 960 vmcb12->control.intercepts[INTERCEPT_CR] >> 16, in enter_svm_guest_mode() 961 vmcb12->control.intercepts[INTERCEPT_EXCEPTION], in enter_svm_guest_mode() 962 vmcb12->control.intercepts[INTERCEPT_WORD3], in enter_svm_guest_mode() 963 vmcb12->control.intercepts[INTERCEPT_WORD4], in enter_svm_guest_mode() 964 vmcb12->control.intercepts[INTERCEPT_WORD5]); in enter_svm_guest_mode() [all …]
|
| H A D | svm.c | 645 vmcb->control.intercepts[INTERCEPT_DR] = 0; in clr_dr_intercepts() 3332 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff); in dump_vmcb() 3333 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16); in dump_vmcb() 3334 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff); in dump_vmcb() 3335 pr_err("%-20s%04x\n", "dr_write:", control->intercepts[INTERCEPT_DR] >> 16); in dump_vmcb() 3336 pr_err("%-20s%08x\n", "exceptions:", control->intercepts[INTERCEPT_EXCEPTION]); in dump_vmcb() 3338 control->intercepts[INTERCEPT_WORD3], in dump_vmcb() 3339 control->intercepts[INTERCEPT_WORD4]); in dump_vmcb()
|
| H A D | sev.c | 4638 vmcb->control.intercepts[INTERCEPT_DR] = 0; in sev_es_init_vmcb()
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv.rst | 99 There are two types of SIE secure instruction intercepts: the normal 100 and the notification type. Normal secure instruction intercepts will 106 The notification type intercepts inform KVM about guest environment
|
| /linux/Documentation/driver-api/mei/ |
| H A D | iamt.rst | 47 intercepts the message and routes it to the Intel MEI.
|
| /linux/Documentation/userspace-api/media/v4l/ |
| H A D | libv4l-introduction.rst | 171 This library intercepts calls to
|
| /linux/Documentation/arch/x86/ |
| H A D | sgx.rst | 134 ERESUME. The vDSO function intercepts exceptions that would otherwise generate
|
| /linux/Documentation/networking/ |
| H A D | bridge.rst | 264 The br_netfilter module intercepts packets entering the bridge, performs
|
| /linux/Documentation/virt/hyperv/ |
| H A D | vpci.rst | 100 MMIO range, the Hyper-V host intercepts the accesses and maps
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 109 intercepts during the execution process, this mechanism needs the interpreter
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 2296 table upfront. This is useful to handle validity intercepts for user 4269 on denied accesses, i.e. userspace effectively intercepts the MSR access. If 7589 SUBCHANNEL intercepts. 8142 emulated VM-exit when L1 intercepts a #PF exception that occurs in 8144 the emulated VM-exit when L1 intercepts a #DB exception that occurs in 8288 (which triggers an #AC exception that KVM intercepts). This capability is
|
| /linux/Documentation/networking/device_drivers/ethernet/intel/ |
| H A D | ice.rst | 756 In firmware-based mode, firmware intercepts all LLDP traffic and handles DCBX
|