Searched refs:vmexit (Results 1 – 14 of 14) sorted by relevance
| /linux/tools/perf/Documentation/ |
| H A D | perf-kvm.txt | 54 of KVM events. Currently, vmexit, mmio (x86 only) and ioport (x86 only) 97 event to be analyzed. Possible values: vmexit, mmio (x86 only), 98 ioport (x86 only). (default: vmexit) 135 event to be analyzed. Possible values: vmexit, 137 (default: vmexit)
|
| H A D | perf-intel-pt.txt | 1689 …[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba… 1690 …tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit … 1704 …[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc5… 1705 …tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit …
|
| H A D | perf-script.txt | 213 "tr end" for "bE", "vmentry" for "bcg", "vmexit" for "bch".
|
| /linux/tools/virtio/ringtest/ |
| H A D | main.c | 39 vmexit(); in notify() 50 vmexit(); in wait_for_notify()
|
| H A D | main.h | 51 static inline void vmexit(void) in vmexit() function
|
| /linux/arch/x86/kvm/svm/ |
| H A D | nested.c | 1482 int vmexit = NESTED_EXIT_HOST; in nested_svm_intercept() local 1489 vmexit = nested_svm_exit_handled_msr(svm); in nested_svm_intercept() 1492 vmexit = nested_svm_intercept_ioio(svm); in nested_svm_intercept() 1500 vmexit = NESTED_EXIT_DONE; in nested_svm_intercept() 1504 vmexit = NESTED_EXIT_DONE; in nested_svm_intercept() 1508 return vmexit; in nested_svm_intercept() 1513 int vmexit; in nested_svm_exit_handled() local 1515 vmexit = nested_svm_intercept(svm); in nested_svm_exit_handled() 1517 if (vmexit == NESTED_EXIT_DONE) in nested_svm_exit_handled() 1520 return vmexit; in nested_svm_exit_handled()
|
| H A D | svm.c | 3613 int vmexit; in svm_handle_exit() local 3617 vmexit = nested_svm_exit_special(svm); in svm_handle_exit() 3619 if (vmexit == NESTED_EXIT_CONTINUE) in svm_handle_exit() 3620 vmexit = nested_svm_exit_handled(svm); in svm_handle_exit() 3622 if (vmexit == NESTED_EXIT_DONE) in svm_handle_exit() 4607 int vmexit, ret = X86EMUL_CONTINUE; in svm_check_intercept() local 4726 vmexit = nested_svm_exit_handled(svm); in svm_check_intercept() 4728 ret = (vmexit == NESTED_EXIT_DONE) ? X86EMUL_INTERCEPTED in svm_check_intercept()
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 115 [#amd-eibrs-vmexit]_ 128 at the time of the VM exit." [#intel-eibrs-vmexit]_ 244 .. [#amd-eibrs-vmexit] "Extended Feature Enable Register (EFER)" in `AMD64 Architecture Programmer'… 246 .. [#intel-eibrs-vmexit] "Enhanced IBRS" in `Indirect Branch Restricted Speculation <https://www.in…
|
| H A D | srso.rst | 105 (spec_rstack_overflow=ibpb-vmexit) 114 to the above =ibpb-vmexit mitigation because the user/kernel boundary is
|
| H A D | indirect-target-selection.rst | 123 vmexit Equivalent to "=on" if the CPU is affected by guest/host isolation
|
| /linux/Documentation/virt/kvm/ |
| H A D | locking.rst | 51 a vmexit.
|
| H A D | api.rst | 2133 the kernel will ignore the length of guest write and may get a faster vmexit. 4608 causes an KVM_EXIT_SHUTDOWN vmexit. 5007 register on the same device. This last access will cause a vmexit and 7919 a KVM_EXIT_IOAPIC_EOI vmexit will be reported to userspace. 8707 vmexit ensures that all dirty GFNs are flushed to the dirty rings.
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 2428 vmexit: Only deploy mitigation if CPU is affected by 7106 vmexit - On systems which don't have the HW mitigation 7107 available, enable the SW mitigation on vmexit 7202 ibpb-vmexit - Issue IBPB only on VMEXIT
|
| /linux/arch/x86/ |
| H A D | Kconfig | 2538 spec_rstack_overflow={ibpb,ibpb-vmexit} mitigations.
|