| /kernel/linux/linux-6.6/tools/testing/selftests/timers/ |
| D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
| /kernel/linux/linux-5.10/tools/testing/selftests/timers/ |
| D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
| /kernel/linux/linux-6.6/arch/x86/kvm/svm/ |
| D | svm.c | 85 bool always; /* True if intercept is initially cleared */ 134 * intercept the MSR 0x832, and do not setup direct_access_msr. 154 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 155 * Intercept Filtering for more details. 171 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 315 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer() 336 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer() 796 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept() 822 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() 826 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/ |
| D | hyperv_svm_test.c | 102 /* Intercept RDMSR 0xc0000100 */ in guest_code() 103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code() 115 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
|
| D | triple_fault_event_test.c | 50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm() 51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
|
| D | nested_exceptions_test.c | 99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code() 213 * honors L1 exception intercept controls when a #SS is pending/injected, 265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
|
| D | svm_nested_shutdown_test.c | 29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
|
| D | hyperv_evmcs.c | 142 /* Intercept RDMSR 0xc0000100 */ in guest_code() 156 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
|
| /kernel/linux/linux-5.10/arch/s390/kvm/ |
| D | intercept.c | 97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%pK)", viwhy, in handle_validity() 101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity() 239 * Intercept 8 indicates a loop of specification exceptions in handle_prog() 505 * be delivered after a notification intercept (instruction has in handle_pv_sclp() 527 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc() 554 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
|
| D | Makefile | 11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
| /kernel/linux/linux-6.6/Documentation/livepatch/ |
| D | reliable-stacktrace.rst | 163 to intercept when that function returns with a return trampoline, e.g. 166 tracing can intercept returns. 169 kretprobes can intercept returns. 228 Some trampolines do not rewrite the return address in order to intercept
|
| /kernel/linux/linux-6.6/arch/s390/kvm/ |
| D | intercept.c | 97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%p)", viwhy, in handle_validity() 101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity() 254 * Intercept 8 indicates a loop of specification exceptions in handle_prog() 521 * be delivered after a notification intercept (instruction has in handle_pv_sclp() 543 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc() 575 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
|
| D | Makefile | 10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
| /kernel/linux/linux-5.10/arch/x86/kvm/svm/ |
| D | svm.c | 93 bool always; /* True if intercept is always on */ 128 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 129 * Intercept Filtering for more details. 145 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 595 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept() 708 * Set intercept permissions for all direct access MSRs again. They in svm_msr_filter_changed() 1089 * Intercept INVPCID if shadow paging is enabled to sync/free shadow in svm_check_invpcid() 1127 * We intercept those #GP and allow access to them anyway in init_vmcb() 1974 * On an #MC intercept the MCE handler is not called automatically in in svm_handle_mce() 1990 * VMCB is undefined after a SHUTDOWN intercept in shutdown_interception() [all …]
|
| /kernel/linux/linux-5.10/arch/x86/mm/ |
| D | pf_in.h | 16 OTHERS /* Other instructions can not intercept */
|
| /kernel/linux/linux-6.6/arch/x86/mm/ |
| D | pf_in.h | 16 OTHERS /* Other instructions can not intercept */
|
| /kernel/linux/linux-5.10/arch/x86/kvm/ |
| D | kvm_emulate.h | 36 u8 intercept; /* which intercept */ member 219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 335 u8 intercept; member
|
| /kernel/linux/linux-6.6/arch/x86/kvm/ |
| D | kvm_emulate.h | 37 u8 intercept; /* which intercept */ member 210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 328 u8 intercept; member
|
| /kernel/linux/linux-6.6/fs/xfs/ |
| D | xfs_export.h | 44 * 32bits and there is no way for XFS to intercept it. In
|
| /kernel/linux/linux-5.10/fs/xfs/ |
| D | xfs_export.h | 44 * 32bits and there is no way for XFS to intercept it. In
|
| /kernel/linux/linux-5.10/Documentation/timers/ |
| D | hpet.rst | 24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
|
| /kernel/linux/linux-6.6/Documentation/timers/ |
| D | hpet.rst | 24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
|
| /kernel/linux/linux-5.10/tools/perf/tests/ |
| D | openat-syscall.c | 55 pr_debug("evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n", in test__openat_syscall_event()
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kvm/lib/s390x/ |
| D | diag318_test_handler.c | 40 "Unexpected intercept code: 0x%x", run->s390_sieic.icptcode); in diag318_handler()
|
| /kernel/linux/linux-6.6/tools/perf/tests/ |
| D | openat-syscall.c | 59 pr_debug("evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n", in test__openat_syscall_event()
|