Home
last modified time | relevance | path

Searched refs:intercept (Results 1 – 25 of 35) sorted by relevance

12

/linux-6.6.21/tools/testing/selftests/timers/ !
Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/linux-6.6.21/arch/s390/kvm/ !
DMakefile10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/linux-6.6.21/arch/x86/kvm/ !
Dkvm_emulate.h37 u8 intercept; /* which intercept */ member
210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
328 u8 intercept; member
Demulate.c195 u8 intercept; member
467 enum x86_intercept intercept, in emulator_check_intercept() argument
471 .intercept = intercept, in emulator_check_intercept()
484 return ctxt->ops->intercept(ctxt, &info, stage); in emulator_check_intercept()
3987 #define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
3989 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4000 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
4003 .intercept = x86_intercept_##_i, .check_perm = (_p) }
4777 ctxt->intercept = x86_intercept_none; in x86_decode_insn()
4985 ctxt->intercept = opcode.intercept; in x86_decode_insn()
[all …]
/linux-6.6.21/tools/testing/selftests/kvm/x86_64/ !
Dsvm_nested_shutdown_test.c29 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code()
Dsvm_int_ctl_test.c74 vmcb->control.intercept &= ~(BIT(INTERCEPT_INTR) | BIT(INTERCEPT_VINTR)); in l1_guest_code()
Dtriple_fault_event_test.c51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
Dhyperv_svm_test.c103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
Dsvm_nested_soft_inject_test.c94 vmcb->control.intercept |= BIT(INTERCEPT_NMI) | BIT(INTERCEPT_HLT); in l1_guest_code()
Dnested_exceptions_test.c99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
/linux-6.6.21/Documentation/timers/ !
Dhpet.rst24 platform code which uses timer 0 or 1 as the main timer to intercept HPET
/linux-6.6.21/tools/testing/selftests/kvm/lib/x86_64/ !
Dsvm.c99 ctrl->intercept = (1ULL << INTERCEPT_VMRUN) | in generic_svm_setup()
/linux-6.6.21/Documentation/devicetree/bindings/arm/mediatek/ !
Dmediatek,mt7622-wed.yaml15 intercept and handle access to the WLAN DMA queues and PCIe interrupts
/linux-6.6.21/arch/x86/kvm/svm/ !
Dsvm.c909 void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept) in svm_set_x2apic_msr_interception() argument
913 if (intercept == svm->x2avic_msrs_intercepted) in svm_set_x2apic_msr_interception()
926 !intercept, !intercept); in svm_set_x2apic_msr_interception()
929 svm->x2avic_msrs_intercepted = intercept; in svm_set_x2apic_msr_interception()
4448 if (info->intercept >= ARRAY_SIZE(x86_intercept_map)) in svm_check_intercept()
4451 icpt_info = x86_intercept_map[info->intercept]; in svm_check_intercept()
4458 if (info->intercept == x86_intercept_cr_read) in svm_check_intercept()
4464 if (info->intercept == x86_intercept_cr_write) in svm_check_intercept()
4468 info->intercept == x86_intercept_clts) in svm_check_intercept()
4478 if (info->intercept == x86_intercept_lmsw) { in svm_check_intercept()
[all …]
/linux-6.6.21/Documentation/livepatch/ !
Dreliable-stacktrace.rst163 to intercept when that function returns with a return trampoline, e.g.
166 tracing can intercept returns.
169 kretprobes can intercept returns.
228 Some trampolines do not rewrite the return address in order to intercept
/linux-6.6.21/tools/testing/selftests/kvm/include/x86_64/ !
Dsvm.h87 u64 intercept; member
/linux-6.6.21/Documentation/virt/kvm/s390/ !
Ds390-pv-boot.rst23 SIE instruction which the UV will intercept and execute on KVM's
Ds390-diag.rst18 DIAGNOSE calls by the guest cause a mandatory intercept. This implies
Ds390-pv.rst55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
/linux-6.6.21/Documentation/dev-tools/kunit/api/ !
Dfunctionredirection.rst32 A simpler way to intercept and replace some of the function calls is to use
/linux-6.6.21/Documentation/admin-guide/laptops/ !
Dsonypi.rst32 Another option to intercept the events is to get them directly through the
/linux-6.6.21/drivers/hwmon/ !
Dlm93.c349 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_FROM_REG() local
351 return (slope * reg + intercept + 500) / 1000; in LM93_IN_FROM_REG()
372 const long intercept = uv_min - slope * lm93_vin_reg_min[nr]; in LM93_IN_TO_REG() local
374 u8 result = ((uv - intercept + (slope/2)) / slope); in LM93_IN_TO_REG()
/linux-6.6.21/net/ipv6/netfilter/ !
DKconfig214 The SYNPROXY target allows you to intercept TCP connections and
/linux-6.6.21/Documentation/hid/ !
Dhid-bpf.rst92 With eBPF, we can intercept any HID command emitted to the device and
96 kernel/bpf program because we can intercept any incoming command.
/linux-6.6.21/net/ipv4/netfilter/ !
DKconfig201 The SYNPROXY target allows you to intercept TCP connections and

12