/kernel/linux/linux-5.10/tools/testing/selftests/timers/ |
H A D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
/kernel/linux/linux-6.6/tools/testing/selftests/timers/ |
H A D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
/kernel/linux/linux-5.10/arch/x86/kvm/ |
H A D | kvm_emulate.h | 36 u8 intercept; /* which intercept */ member 219 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 335 u8 intercept; member
|
H A D | emulate.c | 172 #define Intercept ((u64)1 << 48) /* Has valid intercept field */ 193 u64 intercept : 8; member 504 enum x86_intercept intercept, in emulator_check_intercept() 508 .intercept = intercept, in emulator_check_intercept() 521 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept() 4412 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i } 4414 .intercept = x86_intercept_##_i, .check_perm = (_p) } 4425 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 4428 .intercept 503 emulator_check_intercept(struct x86_emulate_ctxt *ctxt, enum x86_intercept intercept, enum x86_intercept_stage stage) emulator_check_intercept() argument [all...] |
H A D | x86.c | 4366 * so that the L1 hypervisor can intercept #PF before in kvm_vcpu_ioctl_x86_get_vcpu_events() 4367 * CR2 is modified (or intercept #DB before DR6 is in kvm_vcpu_ioctl_x86_get_vcpu_events() 7132 .intercept = emulator_intercept,
|
/kernel/linux/linux-5.10/arch/s390/kvm/ |
H A D | Makefile | 11 kvm-objs := $(common-objs) kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/kernel/linux/linux-6.6/arch/s390/kvm/ |
H A D | Makefile | 10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/ |
H A D | svm_nested_shutdown_test.c | 29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
|
H A D | svm_int_ctl_test.c | 74 vmcb->control.intercept &= ~(BIT(INTERCEPT_INTR) | BIT(INTERCEPT_VINTR)); in l1_guest_code()
|
H A D | triple_fault_event_test.c | 50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm() 51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
|
H A D | hyperv_svm_test.c | 103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
|
H A D | svm_nested_soft_inject_test.c | 94 vmcb->control.intercept |= BIT(INTERCEPT_NMI) | BIT(INTERCEPT_HLT); in l1_guest_code()
|
H A D | nested_exceptions_test.c | 99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code() 213 * honors L1 exception intercept controls when a #SS is pending/injected, 265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
|
/kernel/linux/linux-6.6/arch/x86/kvm/ |
H A D | kvm_emulate.h | 37 u8 intercept; /* which intercept */ member 210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 328 u8 intercept; member
|
H A D | emulate.c | 173 #define Intercept ((u64)1 << 48) /* Has valid intercept field */ 195 u8 intercept; member 467 enum x86_intercept intercept, in emulator_check_intercept() 471 .intercept = intercept, in emulator_check_intercept() 484 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept() 3987 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i } 3989 .intercept = x86_intercept_##_i, .check_perm = (_p) } 4000 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 4003 .intercept 466 emulator_check_intercept(struct x86_emulate_ctxt *ctxt, enum x86_intercept intercept, enum x86_intercept_stage stage) emulator_check_intercept() argument [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/lib/x86_64/ |
H A D | svm.c | 108 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
|
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/lib/x86_64/ |
H A D | svm.c | 99 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
|
/kernel/linux/linux-6.6/arch/x86/kvm/svm/ |
H A D | svm.c | 85 bool always; /* True if intercept is initially cleared */ 132 * intercept the MSR 0x832, and do not setup direct_access_msr. 152 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 169 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 313 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer() 334 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer() 794 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept() 820 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() 824 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() 909 void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept) in svm_set_x2apic_msr_interception() argument [all...] |
/kernel/linux/linux-5.10/arch/x86/kvm/svm/ |
H A D | svm.c | 93 bool always; /* True if intercept is always on */ 128 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 145 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 595 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept() 708 * Set intercept permissions for all direct access MSRs again. They in svm_msr_filter_changed() 1127 * We intercept those #GP and allow access to them anyway in init_vmcb() 1974 * On an #MC intercept the MCE handler is not called automatically in in svm_handle_mce() 1990 * VMCB is undefined after a SHUTDOWN intercept in shutdown_interception() 2110 * If VGIF is enabled, the STGI intercept is only added to in svm_set_gif() 2112 * Likewise, clear the VINTR intercept, w in svm_set_gif() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/include/x86_64/ |
H A D | svm.h | 66 u64 intercept; member
|
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/include/x86_64/ |
H A D | svm.h | 87 u64 intercept; member
|
/kernel/linux/linux-5.10/drivers/hwmon/ |
H A D | lm93.c | 349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local 351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG() 372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local 374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
|
/kernel/linux/linux-6.6/drivers/hwmon/ |
H A D | lm93.c | 349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local 351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG() 372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local 374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
|
/kernel/linux/linux-5.10/arch/x86/kvm/vmx/ |
H A D | vmx.c | 878 * We intercept those #GP and allow access to them anyway in update_exception_bitmap() 3116 * intercept CR3 accesses when paging is _disabled_. This is in vmx_set_cr0() 3125 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or in vmx_set_cr0() 3127 * intercept them to preserve its identity mapped page tables. in vmx_set_cr0() 3839 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_disable_intercept_for_msr() 3884 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_enable_intercept_for_msr() 4024 * Set intercept permissions for all potentially passed through MSRs in vmx_msr_filter_changed() 4272 * Adjust a single secondary execution control bit to intercept/allow an 4971 * is an instruction intercept, i.e. the VM-Exit occurs in handle_exception_nmi() 6440 * we should not update vmcs02 RVI but instead intercept in vmx_hwapic_irr_update() 7493 bool intercept; vmx_check_intercept_io() local [all...] |
/kernel/linux/linux-6.6/arch/x86/kvm/vmx/ |
H A D | vmx.c | 890 * We intercept those #GP and allow access to them anyway in vmx_update_exception_bitmap() 1714 * and generate #DB/#BP as expected, which KVM might intercept. in skip_emulated_instruction() 3329 * intercept CR3 accesses when paging is _disabled_. This is in vmx_set_cr0() 3338 * Lastly, honor L1's desires, i.e. intercept CR3 loads and/or in vmx_set_cr0() 3340 * intercept them to preserve its identity mapped page tables. in vmx_set_cr0() 3977 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_disable_intercept_for_msr() 4021 * Mark the desired intercept state in shadow bitmap, this is needed in vmx_enable_intercept_for_msr() 4144 * Redo intercept permissions for MSRs that KVM is passing through to in vmx_msr_filter_changed() 4148 * refreshed since KVM is going to intercept them regardless of what in vmx_msr_filter_changed() 4501 /* No need to intercept CR in vmx_exec_control() 7927 bool intercept; vmx_check_intercept_io() local [all...] |