Home
last modified time | relevance | path

Searched full:intercept (Results 1 – 25 of 197) sorted by relevance

12345678

/kernel/linux/linux-6.6/tools/testing/selftests/timers/
Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/kernel/linux/linux-5.10/tools/testing/selftests/timers/
Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/kernel/linux/linux-6.6/arch/x86/kvm/svm/
Dsvm.c85 bool always; /* True if intercept is initially cleared */
134 * intercept the MSR 0x832, and do not setup direct_access_msr.
154 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
155 * Intercept Filtering for more details.
171 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
315 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer()
336 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer()
796 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept()
822 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
826 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/
Dhyperv_svm_test.c102 /* Intercept RDMSR 0xc0000100 */ in guest_code()
103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
115 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
Dtriple_fault_event_test.c50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm()
51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
Dnested_exceptions_test.c99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
213 * honors L1 exception intercept controls when a #SS is pending/injected,
265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
Dsvm_nested_shutdown_test.c29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
Dhyperv_evmcs.c142 /* Intercept RDMSR 0xc0000100 */ in guest_code()
156 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
/kernel/linux/linux-5.10/arch/s390/kvm/
Dintercept.c97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%pK)", viwhy, in handle_validity()
101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity()
239 * Intercept 8 indicates a loop of specification exceptions in handle_prog()
505 * be delivered after a notification intercept (instruction has in handle_pv_sclp()
527 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc()
554 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
DMakefile11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/kernel/linux/linux-6.6/Documentation/livepatch/
Dreliable-stacktrace.rst163 to intercept when that function returns with a return trampoline, e.g.
166 tracing can intercept returns.
169 kretprobes can intercept returns.
228 Some trampolines do not rewrite the return address in order to intercept
/kernel/linux/linux-6.6/arch/s390/kvm/
Dintercept.c97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%p)", viwhy, in handle_validity()
101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity()
254 * Intercept 8 indicates a loop of specification exceptions in handle_prog()
521 * be delivered after a notification intercept (instruction has in handle_pv_sclp()
543 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc()
575 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
DMakefile10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/kernel/linux/linux-5.10/arch/x86/kvm/svm/
Dsvm.c93 bool always; /* True if intercept is always on */
128 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
129 * Intercept Filtering for more details.
145 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
595 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept()
708 * Set intercept permissions for all direct access MSRs again. They in svm_msr_filter_changed()
1089 * Intercept INVPCID if shadow paging is enabled to sync/free shadow in svm_check_invpcid()
1127 * We intercept those #GP and allow access to them anyway in init_vmcb()
1974 * On an #MC intercept the MCE handler is not called automatically in in svm_handle_mce()
1990 * VMCB is undefined after a SHUTDOWN intercept in shutdown_interception()
[all …]
/kernel/linux/linux-5.10/arch/x86/mm/
Dpf_in.h16 OTHERS /* Other instructions can not intercept */
/kernel/linux/linux-6.6/arch/x86/mm/
Dpf_in.h16 OTHERS /* Other instructions can not intercept */
/kernel/linux/linux-5.10/arch/x86/kvm/
Dkvm_emulate.h36 u8 intercept; /* which intercept */ member
219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
335 u8 intercept; member
/kernel/linux/linux-6.6/arch/x86/kvm/
Dkvm_emulate.h37 u8 intercept; /* which intercept */ member
210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
328 u8 intercept; member
/kernel/linux/linux-6.6/fs/xfs/
Dxfs_export.h44 * 32bits and there is no way for XFS to intercept it. In
/kernel/linux/linux-5.10/fs/xfs/
Dxfs_export.h44 * 32bits and there is no way for XFS to intercept it. In
/kernel/linux/linux-5.10/Documentation/timers/
Dhpet.rst24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
/kernel/linux/linux-6.6/Documentation/timers/
Dhpet.rst24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
/kernel/linux/linux-5.10/tools/perf/tests/
Dopenat-syscall.c55 pr_debug("evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n", in test__openat_syscall_event()
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/lib/s390x/
Ddiag318_test_handler.c40 "Unexpected intercept code: 0x%x", run->s390_sieic.icptcode); in diag318_handler()
/kernel/linux/linux-6.6/tools/perf/tests/
Dopenat-syscall.c59 pr_debug("evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n", in test__openat_syscall_event()

12345678