/kernel/linux/linux-5.10/tools/testing/selftests/timers/ |
D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
/kernel/linux/linux-5.10/arch/s390/kvm/ |
D | Makefile | 11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/kernel/linux/linux-5.10/arch/x86/kvm/ |
D | kvm_emulate.h | 36 u8 intercept; /* which intercept */ member 219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 335 u8 intercept; member
|
D | emulate.c | 193 u64 intercept : 8; member 504 enum x86_intercept intercept, in emulator_check_intercept() argument 508 .intercept = intercept, in emulator_check_intercept() 521 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept() 4412 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i } 4414 .intercept = x86_intercept_##_i, .check_perm = (_p) } 4425 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 4428 .intercept = x86_intercept_##_i, .check_perm = (_p) } 5195 ctxt->intercept = x86_intercept_none; in x86_decode_insn() 5400 ctxt->intercept = opcode.intercept; in x86_decode_insn() [all …]
|
/kernel/linux/linux-5.10/Documentation/timers/ |
D | hpet.rst | 24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
|
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/lib/x86_64/ |
D | svm.c | 108 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
|
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/include/x86_64/ |
D | svm.h | 66 u64 intercept; member
|
/kernel/linux/linux-5.10/Documentation/virt/kvm/ |
D | s390-diag.rst | 18 DIAGNOSE calls by the guest cause a mandatory intercept. This implies
|
D | s390-pv-boot.rst | 23 SIE instruction which the UV will intercept and execute on KVM's
|
D | s390-pv.rst | 55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
|
/kernel/linux/linux-5.10/arch/x86/kvm/svm/ |
D | svm.c | 3868 if (info->intercept >= ARRAY_SIZE(x86_intercept_map)) in svm_check_intercept() 3871 icpt_info = x86_intercept_map[info->intercept]; in svm_check_intercept() 3878 if (info->intercept == x86_intercept_cr_read) in svm_check_intercept() 3884 if (info->intercept == x86_intercept_cr_write) in svm_check_intercept() 3888 info->intercept == x86_intercept_clts) in svm_check_intercept() 3898 if (info->intercept == x86_intercept_lmsw) { in svm_check_intercept() 3916 if (info->intercept == x86_intercept_wrmsr) in svm_check_intercept() 3933 if (info->intercept == x86_intercept_in || in svm_check_intercept() 3934 info->intercept == x86_intercept_ins) { in svm_check_intercept() 3943 if (info->intercept == x86_intercept_outs || in svm_check_intercept() [all …]
|
/kernel/linux/linux-5.10/Documentation/admin-guide/laptops/ |
D | sonypi.rst | 32 Another option to intercept the events is to get them directly through the
|
/kernel/linux/linux-5.10/drivers/hwmon/ |
D | lm93.c | 349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local 351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG() 372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local 374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
|
/kernel/linux/linux-5.10/net/ipv6/netfilter/ |
D | Kconfig | 219 The SYNPROXY target allows you to intercept TCP connections and
|
/kernel/linux/linux-5.10/net/ipv4/netfilter/ |
D | Kconfig | 203 The SYNPROXY target allows you to intercept TCP connections and
|
/kernel/linux/linux-5.10/Documentation/process/ |
D | kernel-docs.rst | 264 :Keywords: syscalls, intercept, hide, abuse, symbol table. 266 order to intercept and modify syscalls, make
|
/kernel/linux/linux-5.10/arch/x86/kvm/vmx/ |
D | vmx.c | 7455 bool intercept; in vmx_check_intercept_io() local 7458 if (info->intercept == x86_intercept_in || in vmx_check_intercept_io() 7459 info->intercept == x86_intercept_ins) { in vmx_check_intercept_io() 7475 intercept = nested_cpu_has(vmcs12, in vmx_check_intercept_io() 7478 intercept = nested_vmx_check_io_bitmaps(vcpu, port, size); in vmx_check_intercept_io() 7481 return intercept ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE; in vmx_check_intercept_io() 7491 switch (info->intercept) { in vmx_check_intercept()
|
/kernel/linux/linux-5.10/Documentation/vm/ |
D | page_migration.rst | 163 up and added virtio-balloon specific functions to intercept migration logics.
|
/kernel/linux/linux-5.10/Documentation/userspace-api/ |
D | seccomp_filter.rst | 196 applications like container managers, which wish to intercept particular
|
/kernel/linux/linux-5.10/Documentation/scsi/ |
D | ChangeLog.megaraid_sas | 416 1. Added the megasas_reset_timer routine to intercept cmd timeout and throttle io.
|
/kernel/linux/linux-5.10/Documentation/networking/dsa/ |
D | dsa.rst | 197 slave MDIO bus which allows a specific switch driver to divert and intercept
|
/kernel/linux/linux-5.10/drivers/tty/serial/ |
D | Kconfig | 190 context, and thus is able to intercept the magic sequence.
|
/kernel/linux/linux-5.10/net/netfilter/ |
D | Kconfig | 650 The SYNPROXY expression allows you to intercept TCP connections and
|
/kernel/linux/linux-5.10/arch/arm/ |
D | Kconfig | 1478 intercept syscalls that have structure arguments which layout
|
/kernel/linux/linux-5.10/init/ |
D | Kconfig | 1810 Enable the userfaultfd() system call that allows to intercept and
|