Searched refs:vmexit (Results 1 – 11 of 11) sorted by relevance
| /linux/tools/perf/Documentation/ |
| H A D | perf-kvm.txt | 54 of KVM events. Currently, vmexit, mmio (x86 only) and ioport (x86 only) 97 event to be analyzed. Possible values: vmexit, mmio (x86 only), 98 ioport (x86 only). (default: vmexit) 135 event to be analyzed. Possible values: vmexit, 137 (default: vmexit)
|
| H A D | perf-script.txt | 211 "tr end" for "bE", "vmentry" for "bcg", "vmexit" for "bch".
|
| /linux/tools/virtio/ringtest/ |
| H A D | main.c | 39 vmexit(); in notify() 50 vmexit(); in wait_for_notify()
|
| H A D | main.h | 51 static inline void vmexit(void) in vmexit() function
|
| /linux/arch/x86/kvm/svm/ |
| H A D | nested.c | 1426 int vmexit = NESTED_EXIT_HOST; in nested_svm_intercept() local 1430 vmexit = nested_svm_exit_handled_msr(svm); in nested_svm_intercept() 1433 vmexit = nested_svm_intercept_ioio(svm); in nested_svm_intercept() 1441 vmexit = NESTED_EXIT_DONE; in nested_svm_intercept() 1445 vmexit = NESTED_EXIT_DONE; in nested_svm_intercept() 1450 vmexit = NESTED_EXIT_DONE; in nested_svm_intercept() 1454 return vmexit; in nested_svm_intercept() 1459 int vmexit; in nested_svm_exit_handled() local 1461 vmexit = nested_svm_intercept(svm); in nested_svm_exit_handled() 1463 if (vmexit == NESTED_EXIT_DONE) in nested_svm_exit_handled() [all …]
|
| H A D | svm.c | 3530 int vmexit; in svm_handle_exit() local 3534 vmexit = nested_svm_exit_special(svm); in svm_handle_exit() 3536 if (vmexit == NESTED_EXIT_CONTINUE) in svm_handle_exit() 3537 vmexit = nested_svm_exit_handled(svm); in svm_handle_exit() 3539 if (vmexit == NESTED_EXIT_DONE) in svm_handle_exit() 4502 int vmexit, ret = X86EMUL_CONTINUE; in svm_check_intercept() local 4622 vmexit = nested_svm_exit_handled(svm); in svm_check_intercept() 4624 ret = (vmexit == NESTED_EXIT_DONE) ? X86EMUL_INTERCEPTED in svm_check_intercept()
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 115 [#amd-eibrs-vmexit]_ 128 at the time of the VM exit." [#intel-eibrs-vmexit]_ 244 .. [#amd-eibrs-vmexit] "Extended Feature Enable Register (EFER)" in `AMD64 Architecture Programmer'… 246 .. [#intel-eibrs-vmexit] "Enhanced IBRS" in `Indirect Branch Restricted Speculation <https://www.in…
|
| H A D | indirect-target-selection.rst | 123 vmexit Equivalent to "=on" if the CPU is affected by guest/host isolation
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 2134 the kernel will ignore the length of guest write and may get a faster vmexit. 4609 causes an KVM_EXIT_SHUTDOWN vmexit. 5008 register on the same device. This last access will cause a vmexit and 7814 a KVM_EXIT_IOAPIC_EOI vmexit will be reported to userspace. 8570 vmexit ensures that all dirty GFNs are flushed to the dirty rings.
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 2415 vmexit: Only deploy mitigation if CPU is affected by 6996 vmexit - On systems which don't have the HW mitigation 6997 available, enable the SW mitigation on vmexit 7092 ibpb-vmexit - Issue IBPB only on VMEXIT
|
| /linux/arch/x86/ |
| H A D | Kconfig | 2528 spec_rstack_overflow={ibpb,ibpb-vmexit} mitigations.
|