Home
last modified time | relevance | path

Searched refs:intercept (Results 1 – 25 of 27) sorted by relevance

12

/linux/tools/testing/selftests/timers/
H A Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/linux/arch/x86/kvm/svm/
H A Dsvm.c713 bool intercept = !(svm->vmcb->control.virt_ext & LBR_CTL_ENABLE_MASK); in svm_recalc_lbr_msr_intercepts() local
715 if (intercept == svm->lbr_msrs_intercepted) in svm_recalc_lbr_msr_intercepts()
718 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTBRANCHFROMIP, MSR_TYPE_RW, intercept); in svm_recalc_lbr_msr_intercepts()
719 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTBRANCHTOIP, MSR_TYPE_RW, intercept); in svm_recalc_lbr_msr_intercepts()
720 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTINTFROMIP, MSR_TYPE_RW, intercept); in svm_recalc_lbr_msr_intercepts()
721 svm_set_intercept_for_msr(vcpu, MSR_IA32_LASTINTTOIP, MSR_TYPE_RW, intercept); in svm_recalc_lbr_msr_intercepts()
724 svm_set_intercept_for_msr(vcpu, MSR_IA32_DEBUGCTLMSR, MSR_TYPE_RW, intercept); in svm_recalc_lbr_msr_intercepts()
726 svm->lbr_msrs_intercepted = intercept; in svm_recalc_lbr_msr_intercepts()
736 bool intercept = !kvm_vcpu_has_mediated_pmu(vcpu); in svm_recalc_pmu_msr_intercepts() local
746 MSR_TYPE_RW, intercept); in svm_recalc_pmu_msr_intercepts()
[all …]
H A Davic.c112 bool intercept) in avic_set_x2apic_msr_interception() argument
148 if (intercept == svm->x2avic_msrs_intercepted) in avic_set_x2apic_msr_interception()
156 MSR_TYPE_RW, intercept); in avic_set_x2apic_msr_interception()
158 svm->x2avic_msrs_intercepted = intercept; in avic_set_x2apic_msr_interception()
/linux/arch/x86/kvm/
H A Dkvm_emulate.h38 u8 intercept; /* which intercept */ member
224 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
360 u8 intercept; member
H A Demulate.c192 u8 intercept; member
414 enum x86_intercept intercept, in emulator_check_intercept() argument
418 .intercept = intercept, in emulator_check_intercept()
434 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
3937 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
3939 .intercept = x86_intercept_##_i, .check_perm = (_p) }
3949 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
3952 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4859 ctxt->intercept = x86_intercept_none; in x86_decode_insn()
5126 ctxt->intercept = opcode.intercept; in x86_decode_insn()
[all …]
/linux/arch/x86/kvm/vmx/
H A Dvmx.c4294 bool intercept = !has_mediated_pmu; in vmx_recalc_pmu_msr_intercepts() local
4316 MSR_TYPE_RW, intercept); in vmx_recalc_pmu_msr_intercepts()
4318 intercept || !fw_writes_is_enabled(vcpu)); in vmx_recalc_pmu_msr_intercepts()
4329 MSR_TYPE_RW, intercept); in vmx_recalc_pmu_msr_intercepts()
4334 intercept = kvm_need_perf_global_ctrl_intercept(vcpu); in vmx_recalc_pmu_msr_intercepts()
4336 MSR_TYPE_RW, intercept); in vmx_recalc_pmu_msr_intercepts()
4338 MSR_TYPE_RW, intercept); in vmx_recalc_pmu_msr_intercepts()
4340 MSR_TYPE_RW, intercept); in vmx_recalc_pmu_msr_intercepts()
4345 bool intercept; in vmx_recalc_msr_intercepts() local
4393 intercept = !guest_cpu_cap_has(vcpu, X86_FEATURE_SHSTK); in vmx_recalc_msr_intercepts()
[all …]
/linux/Documentation/timers/
H A Dhpet.rst24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
/linux/Documentation/livepatch/
H A Dreliable-stacktrace.rst163 to intercept when that function returns with a return trampoline, e.g.
166 tracing can intercept returns.
169 kretprobes can intercept returns.
228 Some trampolines do not rewrite the return address in order to intercept
/linux/tools/testing/selftests/kvm/x86/
H A Dnested_exceptions_test.c98 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst23 SIE instruction which the UV will intercept and execute on KVM's
H A Ds390-pv.rst55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
/linux/Documentation/virt/kvm/x86/
H A Derrata.rst57 intercept the #DB, temporarily disable the breakpoint, single-step over the
/linux/Documentation/dev-tools/kunit/api/
H A Dfunctionredirection.rst32 A simpler way to intercept and replace some of the function calls is to use
/linux/drivers/hwmon/
H A Dlm93.c349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local
351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG()
372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local
374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
/linux/net/ipv6/netfilter/
H A DKconfig227 The SYNPROXY target allows you to intercept TCP connections and
/linux/Documentation/hid/
H A Dhid-bpf.rst92 With eBPF, we can intercept any HID command emitted to the device and
96 kernel/bpf program because we can intercept any incoming command.
/linux/net/ipv4/netfilter/
H A DKconfig213 The SYNPROXY target allows you to intercept TCP connections and
/linux/Documentation/security/tpm/
H A Dtpm-security.rst50 1. The attacker could intercept all PCR extends coming from the system
/linux/Documentation/userspace-api/
H A Dseccomp_filter.rst196 applications like container managers, which wish to intercept particular
/linux/Documentation/scsi/
H A DChangeLog.megaraid_sas416 1. Added the megasas_reset_timer routine to intercept cmd timeout and throttle io.
/linux/tools/arch/x86/kcpuid/
H A Dcpuid.csv841 0x8000000a, 0, edx, 10, pausefilter , Pause intercept filter
852 0x8000000a, 0, edx, 24, tlbsync_int , TLBSYNC intercept + INVLPGB/TLBSYNC in VMCB
/linux/mm/
H A DKconfig1355 Enable the userfaultfd() system call that allows to intercept and
/linux/Documentation/virt/kvm/
H A Dapi.rst4313 Similarly, if userspace wishes to intercept on denied accesses,
8062 longer intercept some instructions for improved latency in some
8244 This capability allows userspace to intercept RDMSR and WRMSR instructions if
8261 KVM_MSR_EXIT_REASON_UNKNOWN intercept accesses to unknown (to KVM) MSRs
8262 KVM_MSR_EXIT_REASON_INVAL intercept accesses that are architecturally
8264 KVM_MSR_EXIT_REASON_FILTER intercept accesses that are denied by userspace
/linux/net/netfilter/
H A DKconfig669 The SYNPROXY expression allows you to intercept TCP connections and
/linux/arch/arm/
H A DKconfig1171 intercept syscalls that have structure arguments which layout

12