Home
last modified time | relevance | path

Searched refs:intercept (Results 1 – 25 of 27) sorted by relevance

12

/kernel/linux/linux-5.10/tools/testing/selftests/timers/
Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/kernel/linux/linux-5.10/arch/s390/kvm/
DMakefile11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/kernel/linux/linux-5.10/arch/x86/kvm/
Dkvm_emulate.h36 u8 intercept; /* which intercept */ member
219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
335 u8 intercept; member
Demulate.c193 u64 intercept : 8; member
504 enum x86_intercept intercept, in emulator_check_intercept() argument
508 .intercept = intercept, in emulator_check_intercept()
521 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
4412 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
4414 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4425 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
4428 .intercept = x86_intercept_##_i, .check_perm = (_p) }
5195 ctxt->intercept = x86_intercept_none; in x86_decode_insn()
5400 ctxt->intercept = opcode.intercept; in x86_decode_insn()
[all …]
/kernel/linux/linux-5.10/Documentation/timers/
Dhpet.rst24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/lib/x86_64/
Dsvm.c108 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/include/x86_64/
Dsvm.h66 u64 intercept; member
/kernel/linux/linux-5.10/Documentation/virt/kvm/
Ds390-diag.rst18 DIAGNOSE calls by the guest cause a mandatory intercept. This implies
Ds390-pv-boot.rst23 SIE instruction which the UV will intercept and execute on KVM's
Ds390-pv.rst55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
/kernel/linux/linux-5.10/arch/x86/kvm/svm/
Dsvm.c3868 if (info->intercept >= ARRAY_SIZE(x86_intercept_map)) in svm_check_intercept()
3871 icpt_info = x86_intercept_map[info->intercept]; in svm_check_intercept()
3878 if (info->intercept == x86_intercept_cr_read) in svm_check_intercept()
3884 if (info->intercept == x86_intercept_cr_write) in svm_check_intercept()
3888 info->intercept == x86_intercept_clts) in svm_check_intercept()
3898 if (info->intercept == x86_intercept_lmsw) { in svm_check_intercept()
3916 if (info->intercept == x86_intercept_wrmsr) in svm_check_intercept()
3933 if (info->intercept == x86_intercept_in || in svm_check_intercept()
3934 info->intercept == x86_intercept_ins) { in svm_check_intercept()
3943 if (info->intercept == x86_intercept_outs || in svm_check_intercept()
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/laptops/
Dsonypi.rst32 Another option to intercept the events is to get them directly through the
/kernel/linux/linux-5.10/drivers/hwmon/
Dlm93.c349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local
351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG()
372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local
374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
/kernel/linux/linux-5.10/net/ipv6/netfilter/
DKconfig219 The SYNPROXY target allows you to intercept TCP connections and
/kernel/linux/linux-5.10/net/ipv4/netfilter/
DKconfig203 The SYNPROXY target allows you to intercept TCP connections and
/kernel/linux/linux-5.10/Documentation/process/
Dkernel-docs.rst264 :Keywords: syscalls, intercept, hide, abuse, symbol table.
266 order to intercept and modify syscalls, make
/kernel/linux/linux-5.10/arch/x86/kvm/vmx/
Dvmx.c7455 bool intercept; in vmx_check_intercept_io() local
7458 if (info->intercept == x86_intercept_in || in vmx_check_intercept_io()
7459 info->intercept == x86_intercept_ins) { in vmx_check_intercept_io()
7475 intercept = nested_cpu_has(vmcs12, in vmx_check_intercept_io()
7478 intercept = nested_vmx_check_io_bitmaps(vcpu, port, size); in vmx_check_intercept_io()
7481 return intercept ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE; in vmx_check_intercept_io()
7491 switch (info->intercept) { in vmx_check_intercept()
/kernel/linux/linux-5.10/Documentation/vm/
Dpage_migration.rst163 up and added virtio-balloon specific functions to intercept migration logics.
/kernel/linux/linux-5.10/Documentation/userspace-api/
Dseccomp_filter.rst196 applications like container managers, which wish to intercept particular
/kernel/linux/linux-5.10/Documentation/scsi/
DChangeLog.megaraid_sas416 1. Added the megasas_reset_timer routine to intercept cmd timeout and throttle io.
/kernel/linux/linux-5.10/Documentation/networking/dsa/
Ddsa.rst197 slave MDIO bus which allows a specific switch driver to divert and intercept
/kernel/linux/linux-5.10/drivers/tty/serial/
DKconfig190 context, and thus is able to intercept the magic sequence.
/kernel/linux/linux-5.10/net/netfilter/
DKconfig650 The SYNPROXY expression allows you to intercept TCP connections and
/kernel/linux/linux-5.10/arch/arm/
DKconfig1478 intercept syscalls that have structure arguments which layout
/kernel/linux/linux-5.10/init/
DKconfig1810 Enable the userfaultfd() system call that allows to intercept and

12