Searched refs:intercepts (Results 1 - 7 of 7) sorted by relevance

/linux-master/drivers/cpuidle/governors/
H A Dteo.c49 * Two metrics called "hits" and "intercepts" are associated with each bin.
56 * length). In turn, the "intercepts" metric reflects the relative frequency of
60 * situations are referred to as "intercepts" below).
63 * intercepts (that is, intercepts that have occurred during the last
74 * - The sum of the "hits" and "intercepts" metrics for the candidate state
79 * - The sum of the "intercepts" metrics for all of the idle states shallower
84 * - The sum of the numbers of recent intercepts for all of the idle states
94 * - For each of them compute the sum of the "intercepts" metrics and the sum
95 * of the numbers of recent intercepts ove
177 unsigned int intercepts; member in struct:teo_bin
[all...]
/linux-master/drivers/net/wireless/ath/ath9k/
H A Deeprom.c496 int intercepts; local
499 intercepts = AR9287_PD_GAIN_ICEPTS;
501 intercepts = AR5416_PD_GAIN_ICEPTS;
519 maxPwrT4[i] = data_9287[idxL].pwrPdg[i][intercepts - 1];
523 intercepts,
529 maxPwrT4[i] = data_4k[idxL].pwrPdg[i][intercepts - 1];
533 intercepts,
539 maxPwrT4[i] = data_def[idxL].pwrPdg[i][intercepts - 1];
543 intercepts,
569 min(pPwrL[intercepts
[all...]
/linux-master/arch/x86/kvm/svm/
H A Dnested.c138 c->intercepts[i] = h->intercepts[i];
164 c->intercepts[i] |= g->intercepts[i];
343 to->intercepts[i] = from->intercepts[i];
431 !test_bit(INTERCEPT_VINTR, (unsigned long *)svm->nested.ctl.intercepts))
767 * Merge guest and host intercepts - must be called with vcpu in
801 trace_kvm_nested_intercepts(vmcb12->control.intercepts[INTERCEPT_CR] & 0xffff,
802 vmcb12->control.intercepts[INTERCEPT_C
[all...]
H A Dsvm.h126 u32 intercepts[MAX_INTERCEPT]; member in struct:vmcb_ctrl_area_cached
382 __set_bit(bit, (unsigned long *)&control->intercepts);
388 __clear_bit(bit, (unsigned long *)&control->intercepts);
394 return test_bit(bit, (unsigned long *)&control->intercepts);
400 return test_bit(bit, (unsigned long *)&control->intercepts);
H A Dsvm.c752 vmcb->control.intercepts[INTERCEPT_DR] = 0;
1171 /* Evaluate instruction intercepts that depend on guest CPUID features. */
1214 * in VMCB and clear intercepts to avoid #VMEXIT.
1643 * Recalculating intercepts may have cleared the VINTR intercept. If
1894 * SEV-ES guests must always keep the CR intercepts cleared. CR
2742 * SEV-ES intercepts DR7 only to disable guest debugging and the guest issues a VMGEXIT
3325 pr_err("%-20s%04x\n", "cr_read:", control->intercepts[INTERCEPT_CR] & 0xffff);
3326 pr_err("%-20s%04x\n", "cr_write:", control->intercepts[INTERCEPT_CR] >> 16);
3327 pr_err("%-20s%04x\n", "dr_read:", control->intercepts[INTERCEPT_DR] & 0xffff);
3328 pr_err("%-20s%04x\n", "dr_write:", control->intercepts[INTERCEPT_D
[all...]
H A Dsev.c2101 * created after SEV/SEV-ES initialization, e.g. to init intercepts.
3065 vmcb->control.intercepts[INTERCEPT_DR] = 0;
3086 /* Clear intercepts on selected MSRs */
/linux-master/arch/x86/include/asm/
H A Dsvm.h123 u32 intercepts[MAX_INTERCEPT]; member in struct:vmcb_control_area

Completed in 273 milliseconds