Home
last modified time | relevance | path

Searched refs:intercept (Results 1 - 25 of 26) sorted by relevance

12

/kernel/linux/linux-5.10/tools/testing/selftests/timers/
H A Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/kernel/linux/linux-6.6/tools/testing/selftests/timers/
H A Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/kernel/linux/linux-5.10/arch/x86/kvm/
H A Dkvm_emulate.h36 u8 intercept; /* which intercept */ member
219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
335 u8 intercept; member
H A Demulate.c172 #define Intercept ((u64)1 << 48) /* Has valid intercept field */
193 u64 intercept : 8; member
504 enum x86_intercept intercept, in emulator_check_intercept()
508 .intercept = intercept, in emulator_check_intercept()
521 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
4412 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
4414 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4425 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
4428 .intercept
503 emulator_check_intercept(struct x86_emulate_ctxt *ctxt, enum x86_intercept intercept, enum x86_intercept_stage stage) emulator_check_intercept() argument
[all...]
H A Dx86.c4366 * so that the L1 hypervisor can intercept #PF before in kvm_vcpu_ioctl_x86_get_vcpu_events()
4367 * CR2 is modified (or intercept #DB before DR6 is in kvm_vcpu_ioctl_x86_get_vcpu_events()
7132 .intercept = emulator_intercept,
/kernel/linux/linux-5.10/arch/s390/kvm/
H A DMakefile11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/kernel/linux/linux-6.6/arch/s390/kvm/
H A DMakefile10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/
H A Dsvm_nested_shutdown_test.c29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
H A Dsvm_int_ctl_test.c74 vmcb->control.intercept &= ~(BIT(INTERCEPT_INTR) | BIT(INTERCEPT_VINTR)); in l1_guest_code()
H A Dtriple_fault_event_test.c50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm()
51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
H A Dhyperv_svm_test.c103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
H A Dsvm_nested_soft_inject_test.c94 vmcb->control.intercept |= BIT(INTERCEPT_NMI) | BIT(INTERCEPT_HLT); in l1_guest_code()
H A Dnested_exceptions_test.c99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
213 * honors L1 exception intercept controls when a #SS is pending/injected,
265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
/kernel/linux/linux-6.6/arch/x86/kvm/
H A Dkvm_emulate.h37 u8 intercept; /* which intercept */ member
210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
328 u8 intercept; member
H A Demulate.c173 #define Intercept ((u64)1 << 48) /* Has valid intercept field */
195 u8 intercept; member
467 enum x86_intercept intercept, in emulator_check_intercept()
471 .intercept = intercept, in emulator_check_intercept()
484 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
3987 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
3989 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4000 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
4003 .intercept
466 emulator_check_intercept(struct x86_emulate_ctxt *ctxt, enum x86_intercept intercept, enum x86_intercept_stage stage) emulator_check_intercept() argument
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/lib/x86_64/
H A Dsvm.c108 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/lib/x86_64/
H A Dsvm.c99 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
/kernel/linux/linux-6.6/arch/x86/kvm/svm/
H A Dsvm.c85 bool always; /* True if intercept is initially cleared */
132 * intercept the MSR 0x832, and do not setup direct_access_msr.
152 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
169 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
313 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer()
334 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer()
794 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept()
820 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
824 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
909 void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept) in svm_set_x2apic_msr_interception() argument
[all...]
/kernel/linux/linux-5.10/arch/x86/kvm/svm/
H A Dsvm.c93 bool always; /* True if intercept is always on */
128 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
145 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
595 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept()
708 * Set intercept permissions for all direct access MSRs again. They in svm_msr_filter_changed()
1127 * We intercept those #GP and allow access to them anyway in init_vmcb()
1974 * On an #MC intercept the MCE handler is not called automatically in in svm_handle_mce()
1990 * VMCB is undefined after a SHUTDOWN intercept in shutdown_interception()
2110 * If VGIF is enabled, the STGI intercept is only added to in svm_set_gif()
2112 * Likewise, clear the VINTR intercept, w in svm_set_gif()
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/include/x86_64/
H A Dsvm.h66 u64 intercept; member
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/include/x86_64/
H A Dsvm.h87 u64 intercept; member
/kernel/linux/linux-5.10/drivers/hwmon/
H A Dlm93.c349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local
351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG()
372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local
374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
/kernel/linux/linux-6.6/drivers/hwmon/
H A Dlm93.c349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local
351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG()
372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local
374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
/kernel/linux/linux-5.10/arch/x86/kvm/vmx/
H A Dvmx.c878 * We intercept those #GP and allow access to them anyway in update_exception_bitmap()
3116 * intercept CR3 accesses when paging is _disabled_. This is in vmx_set_cr0()
3125 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or in vmx_set_cr0()
3127 * intercept them to preserve its identity mapped page tables. in vmx_set_cr0()
3839 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_disable_intercept_for_msr()
3884 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_enable_intercept_for_msr()
4024 * Set intercept permissions for all potentially passed through MSRs in vmx_msr_filter_changed()
4272 * Adjust a single secondary execution control bit to intercept/allow an
4971 * is an instruction intercept, i.e. the VM-Exit occurs in handle_exception_nmi()
6440 * we should not update vmcs02 RVI but instead intercept in vmx_hwapic_irr_update()
7493 bool intercept; vmx_check_intercept_io() local
[all...]
/kernel/linux/linux-6.6/arch/x86/kvm/vmx/
H A Dvmx.c890 * We intercept those #GP and allow access to them anyway in vmx_update_exception_bitmap()
1714 * and generate #DB/#BP as expected, which KVM might intercept. in skip_emulated_instruction()
3329 * intercept CR3 accesses when paging is _disabled_. This is in vmx_set_cr0()
3338 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or in vmx_set_cr0()
3340 * intercept them to preserve its identity mapped page tables. in vmx_set_cr0()
3977 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_disable_intercept_for_msr()
4021 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_enable_intercept_for_msr()
4144 * Redo intercept permissions for MSRs that KVM is passing through to in vmx_msr_filter_changed()
4148 * refreshed since KVM is going to intercept them regardless of what in vmx_msr_filter_changed()
4501 /* No need to intercept CR in vmx_exec_control()
7927 bool intercept; vmx_check_intercept_io() local
[all...]

Completed in 63 milliseconds

12