/Linux-v5.15/tools/testing/selftests/kvm/x86_64/ |
D | vmx_apic_access_test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 10 * launched with a valid APIC-access address that is backed by a 13 * The second subtest sets the APIC-access address to a (valid) L1 46 uint32_t control; in l1_guest_code() local 54 control = vmreadz(CPU_BASED_VM_EXEC_CONTROL); in l1_guest_code() 55 control |= CPU_BASED_ACTIVATE_SECONDARY_CONTROLS; in l1_guest_code() 56 vmwrite(CPU_BASED_VM_EXEC_CONTROL, control); in l1_guest_code() 57 control = vmreadz(SECONDARY_VM_EXEC_CONTROL); in l1_guest_code() 58 control |= SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES; in l1_guest_code() 59 vmwrite(SECONDARY_VM_EXEC_CONTROL, control); in l1_guest_code() [all …]
|
D | debug_regs.c | 1 // SPDX-License-Identifier: GPL-2.0 84 struct kvm_run *run; in main() local 105 run = vcpu_state(vm, VCPU_ID); in main() 107 /* Test software BPs - int3 */ in main() 109 debug.control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_SW_BP; in main() 112 TEST_ASSERT(run->exit_reason == KVM_EXIT_DEBUG && in main() 113 run->debug.arch.exception == BP_VECTOR && in main() 114 run->debug.arch.pc == CAST_TO_RIP(sw_bp), in main() 116 run->exit_reason, run->debug.arch.exception, in main() 117 run->debug.arch.pc, CAST_TO_RIP(sw_bp)); in main() [all …]
|
D | hyperv_features.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Tests for Hyper-V features enablement 52 static inline u64 hypercall(u64 control, vm_vaddr_t input_address, in hypercall() argument 60 "+c" (control), "+d" (input_address) in hypercall() 69 unsigned char *rip = (unsigned char *)regs->rip; in guest_gp_handler() 79 regs->rip = (uint64_t)&rdmsr_end; in guest_gp_handler() 81 regs->rip = (uint64_t)&wrmsr_end; in guest_gp_handler() 87 regs->rip += 3; in guest_ud_handler() 98 uint64_t control; member 107 while (msr->idx) { in guest_msr() [all …]
|
D | svm_int_ctl_test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 66 struct vmcb *vmcb = svm->vmcb; in l1_guest_code() 75 vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; in l1_guest_code() 78 vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR | INTERCEPT_VINTR); in l1_guest_code() 81 vmcb->control.int_ctl |= V_IRQ_MASK | (0x1 << V_INTR_PRIO_SHIFT); in l1_guest_code() 82 vmcb->control.int_vector = VINTR_IRQ_NUMBER; in l1_guest_code() 84 run_guest(vmcb, svm->vmcb_gpa); in l1_guest_code() 85 GUEST_ASSERT(vmcb->control.exit_code == SVM_EXIT_VMMCALL); in l1_guest_code() 106 struct kvm_run *run = vcpu_state(vm, VCPU_ID); in main() local 110 TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, in main() [all …]
|
D | vmx_tsc_adjust_test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 39 #define TSC_OFFSET_VALUE -(1ll << 48) 74 uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE; in l2_guest_code() 76 wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE); in l2_guest_code() 77 check_ia32_tsc_adjust(-2 * TSC_ADJUST_VALUE); in l2_guest_code() 87 uint32_t control; in l1_guest_code() local 91 wrmsr(MSR_IA32_TSC, rdtsc() - TSC_ADJUST_VALUE); in l1_guest_code() 92 check_ia32_tsc_adjust(-1 * TSC_ADJUST_VALUE); in l1_guest_code() 100 control = vmreadz(CPU_BASED_VM_EXEC_CONTROL); in l1_guest_code() 101 control |= CPU_BASED_USE_MSR_BITMAPS | CPU_BASED_USE_TSC_OFFSETTING; in l1_guest_code() [all …]
|
D | vmx_nested_tsc_scaling_test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 24 #define TSC_OFFSET_L2 ((uint64_t) -33125236320908) 45 thresh_low = expected - tolerance; in compare_tsc_freq() 72 tsc_freq = tsc_end - tsc_start; in check_tsc_freq() 88 uint32_t control; in l1_guest_code() local 100 control = vmreadz(CPU_BASED_VM_EXEC_CONTROL); in l1_guest_code() 101 control |= CPU_BASED_USE_MSR_BITMAPS | CPU_BASED_USE_TSC_OFFSETTING; in l1_guest_code() 102 vmwrite(CPU_BASED_VM_EXEC_CONTROL, control); in l1_guest_code() 104 control = vmreadz(SECONDARY_VM_EXEC_CONTROL); in l1_guest_code() 105 control |= SECONDARY_EXEC_TSC_SCALING; in l1_guest_code() [all …]
|
/Linux-v5.15/tools/perf/Documentation/ |
D | perf-daemon.txt | 1 perf-daemon(1) 6 ---- 7 perf-daemon - Run record sessions on background 11 -------- 22 ----------- 23 This command allows to run simple daemon process that starts and 32 …916507 916508 ... \_ perf record --control=fifo:control,ack -m 10M -e cycles --overwrite --switc… 33 …916507 916509 ... \_ perf record --control=fifo:control,ack -m 20M -e sched:* --overwrite --swit… 38 to produce data periodically, like with --switch-output configuration 41 Each session is started with control setup (with perf record --control [all …]
|
/Linux-v5.15/tools/perf/tests/shell/ |
D | daemon.sh | 3 # SPDX-License-Identifier: GPL-2.0 50 local run=$3 53 local control=$6 70 if [ "${run}" != "${line_run}" ]; then 71 echo "FAILED: wrong run" 85 if [ "${control}" != "${line_control}" ]; then 86 echo "FAILED: wrong control" 105 local line=`perf daemon --config ${config} -x: | head -1` 109 trap - SIGINT SIGTERM 112 perf daemon stop --config ${config} [all …]
|
/Linux-v5.15/fs/btrfs/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 25 Btrfs is a general purpose copy-on-write filesystem with extents, 43 bool "Btrfs POSIX Access Control Lists" 47 POSIX Access Control Lists (ACLs) support permissions for users and 50 If you don't know what Access Control Lists are, say N 59 after a power-loss or kernel panic event the filesystem is 68 to verify the integrity of (super)-block write requests 69 during the run of a regression test, say N 72 bool "Btrfs will run sanity tests upon loading" 75 This will run some basic sanity tests on the free space cache [all …]
|
/Linux-v5.15/drivers/powercap/ |
D | idle_inject.c | 1 // SPDX-License-Identifier: GPL-2.0 19 * The idle + run duration is specified via separate helpers and that allows 34 * It is up to the user of this framework to provide a lock for higher-level 51 * struct idle_inject_thread - task on/off switch structure 53 * @should_run: whether or not to run the task (for the smpboot kthread API) 61 * struct idle_inject_device - idle injection data 64 * @run_duration_us: duration of CPU run time to allow 80 * idle_inject_wakeup - Wake up idle injection threads 91 for_each_cpu_and(cpu, to_cpumask(ii_dev->cpumask), cpu_online_mask) { in idle_inject_wakeup() 93 iit->should_run = 1; in idle_inject_wakeup() [all …]
|
/Linux-v5.15/arch/powerpc/include/asm/ |
D | dbdma.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Definitions for using the Apple Descriptor-Based DMA controller 13 * DBDMA control/status registers. All little-endian. 16 unsigned int control; /* lets you change bits in status */ member 32 /* Bits in control and status registers */ 33 #define RUN 0x8000 macro 43 * DBDMA command structure. These fields are all little-endian! 47 __le16 command; /* command word (has bit-fields) */ 49 __le32 cmd_dep; /* command-dependent field */ 66 #define KEY_STREAM1 0x100 /* control/status stream */ [all …]
|
/Linux-v5.15/arch/x86/include/uapi/asm/ |
D | sgx.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 3 * Copyright(c) 2016-20 Intel Corporation. 12 * enum sgx_page_flags - page control flags 32 * struct sgx_enclave_create - parameter structure for the 41 * struct sgx_enclave_add_pages - parameter structure for the 47 * @flags: page control flags 60 * struct sgx_enclave_init - parameter structure for the 69 * struct sgx_enclave_provision - parameter structure for the 80 * typedef sgx_enclave_user_handler_t - Exit handler function accepted by 82 * @run: The run instance given by the caller [all …]
|
/Linux-v5.15/arch/arm/mach-pxa/include/mach/ |
D | smemc.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 16 #define MDREFR (SMEMC_VIRT + 0x04) /* SDRAM Refresh Control Register */ 17 #define MSC0 (SMEMC_VIRT + 0x08) /* Static Memory Control Register 0 */ 18 #define MSC1 (SMEMC_VIRT + 0x0C) /* Static Memory Control Register 1 */ 19 #define MSC2 (SMEMC_VIRT + 0x10) /* Static Memory Control Register 2 */ 21 #define SXLCR (SMEMC_VIRT + 0x18) /* LCR value to be written to SDRAM-Timing Synchronous Flash */ 22 #define SXCNFG (SMEMC_VIRT + 0x1C) /* Synchronous Static Memory Control Register */ 31 #define BOOT_DEF (SMEMC_VIRT + 0x44) /* Read-Only Boot-Time Register. Contains BOOT_SEL and PKG_SE… 49 #define MECR_NOS (1 << 0) /* Number Of Sockets: 0 -> 1 sock, 1 -> 2 sock */ 50 #define MECR_CIT (1 << 1) /* Card Is There: 0 -> no card, 1 -> card inserted */ [all …]
|
/Linux-v5.15/Documentation/scheduler/ |
D | sched-rt-group.rst | 2 Real-Time group scheduling 12 2.1 System-wide settings 33 are real-time processes). 40 --------------- 50 ---------------- 53 in a given period. We allocate this "run time" for each realtime group which 56 Any time not allocated to a realtime group will be used to run normal priority 57 tasks (SCHED_OTHER). Any allocated run time not used will also be picked up by 63 time dedicated for the graphics. We can then give this group a run time of 0.8 66 This way the graphics group will have a 0.04s period with a 0.032s run time [all …]
|
/Linux-v5.15/drivers/net/ethernet/apple/ |
D | mace.c | 1 // SPDX-License-Identifier: GPL-2.0-only 30 static int port_aaui = -1; 115 int j, rev, rc = -EBUSY; in mace_probe() 120 return -ENODEV; in mace_probe() 123 addr = of_get_property(mace, "mac-address", NULL); in mace_probe() 125 addr = of_get_property(mace, "local-mac-address", NULL); in mace_probe() 127 printk(KERN_ERR "Can't get mac-address for MACE %pOF\n", in mace_probe() 129 return -ENODEV; in mace_probe() 134 * lazy allocate the driver-wide dummy buffer. (Note that we in mace_probe() 140 return -ENOMEM; in mace_probe() [all …]
|
/Linux-v5.15/Documentation/leds/ |
D | leds-lp5523.rst | 9 Contact: Samu Onkalo (samu.p.onkalo-at-nokia.com) 12 ----------- 14 the led class control interface. 15 The name of each channel is configurable in the platform data - name and label. 22 - /sys/class/leds/R1 (name: 'R1') 23 - /sys/class/leds/B1 (name: 'B1') 28 - /sys/class/leds/RGB:channelN (label: 'RGB', N: 0 ~ 8) 33 - /sys/class/leds/lp5523:channelN (N: 0 ~ 8) 36 There are two ways to run LED patterns. 38 1) Legacy interface - enginex_mode, enginex_load and enginex_leds [all …]
|
D | leds-lp55xx.rst | 8 ----------- 14 Device attributes for user-space interface 28 control multi output LED channels such as led current, channel index. 30 general chip control such like the I2C and platform data. 50 - Maximum number of channels 51 - Reset command, chip enable command 52 - Chip specific initialization 53 - Brightness control register access 54 - Setting LED output current 55 - Program memory address access for running patterns [all …]
|
D | leds-lp5521.rst | 10 Contact: Samu Onkalo (samu.p.onkalo-at-nokia.com) 13 ----------- 16 the led class control interface. Channels have generic names: 23 There are two ways to run LED patterns. 25 1) Legacy interface - enginex_mode and enginex_load 26 Control interface for the engines: 31 disabled, load, run 40 echo "run" > engine3_mode 46 2) Firmware interface - LP55xx common interface 48 For the details, please refer to 'firmware' section in leds-lp55xx.txt [all …]
|
/Linux-v5.15/Documentation/hwmon/ |
D | g762.rst | 5 and performs closed-loop or open-loop control of the fan speed. Two 6 modes - PWM or DC - are supported by the device. 9 http://natisbad.org/NAS/ref/GMT_EDS-762_763-080710-0.2.pdf. sysfs 10 bindings are described in Documentation/hwmon/sysfs-interface.rst. 13 /sys/bus/i2c/drivers/g762/ to control the operation of the device. 25 set desired fan speed. This only makes sense in closed-loop 26 fan speed control (i.e. when pwm1_enable is set to 2). 44 in closed-loop control mode, if fan RPM value is 25% out 49 set current fan speed control mode i.e. 1 for manual fan 50 speed control (open-loop) via pwm1 described below, 2 for [all …]
|
/Linux-v5.15/arch/x86/kvm/vmx/ |
D | sgx.c | 1 // SPDX-License-Identifier: GPL-2.0 29 /* Skip vmcs.GUEST_DS retrieval for 64-bit mode to avoid VMREADs. */ in sgx_get_encls_gva() 46 (((u64)*gva + size - 1) > s.limit + 1)); in sgx_get_encls_gva() 50 return fault ? -EINVAL : 0; in sgx_get_encls_gva() 56 vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR; in sgx_handle_emulation_failure() 57 vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION; in sgx_handle_emulation_failure() 58 vcpu->run->internal.ndata = 2; in sgx_handle_emulation_failure() 59 vcpu->run->internal.data[0] = addr; in sgx_handle_emulation_failure() 60 vcpu->run->internal.data[1] = size; in sgx_handle_emulation_failure() 68 return -EFAULT; in sgx_read_hva() [all …]
|
/Linux-v5.15/Documentation/admin-guide/hw-vuln/ |
D | l1tf.rst | 1 L1TF - L1 Terminal Fault 10 ------------------- 15 - Processors from AMD, Centaur and other non Intel vendors 17 - Older processor models, where the CPU family is < 6 19 - A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft, 22 - The Intel XEON PHI family 24 - Intel processors which have the ARCH_CAP_RDCL_NO bit set in the 33 ------------ 38 CVE-2018-3615 L1 Terminal Fault SGX related aspects 39 CVE-2018-3620 L1 Terminal Fault OS, SMM related aspects [all …]
|
/Linux-v5.15/drivers/net/wireless/ath/ath5k/ |
D | ani.h | 40 * enum ath5k_ani_mode - mode for ANI / noise sensitivity 45 * maximizing sensitivity. ANI will not run. 47 * minimizing sensitivity. ANI will not run. 48 * @ATH5K_ANI_MODE_AUTO: Automatically control immunity parameters based on the 60 * struct ath5k_ani_state - ANI state and associated counters 72 * @last_listen: Listen time from previous run (for stats) 73 * @last_ofdm_errors: OFDM timing error count from previous run (for tats) 74 * @last_cck_errors: CCK timing error count from previous run (for stats) 110 /* for manual control */
|
/Linux-v5.15/arch/arm/mach-sa1100/include/mach/ |
D | SA-1100.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * FILE SA-1100.h 9 * System StrongARM SA-1100 12 * SA-1100 microprocessor (Advanced RISC Machine (ARM) 14 * StrongARM SA-1100 data sheet version 2.2. 21 #error You must include hardware.h not SA-1100.h 77 * Universal Serial Bus (USB) Device Controller (UDC) control registers 81 * Controller (UDC) Control Register (read/write). 91 * Controller (UDC) Control/Status register end-point 0 94 * Controller (UDC) Control/Status register end-point 1 [all …]
|
/Linux-v5.15/Documentation/x86/ |
D | sgx.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 * Privileged (ring-0) ENCLS functions orchestrate the construction of the. 15 * Unprivileged (ring-3) ENCLU functions allow an application to enter and 38 with an enclave. It is contained in a BIOS-reserved region of physical memory. 49 ------------------ 51 **SGX Enclave Control Structure (SECS)** 58 **Thread Control Structure (TCS)** 59 Thread Control Structure pages define the entry points to an enclave and 67 ---------------------- 76 remain read-only. EPCM permissions may only impose additional restrictions on [all …]
|
/Linux-v5.15/Documentation/dev-tools/kunit/ |
D | faq.rst | 1 .. SPDX-License-Identifier: GPL-2.0 17 the test's control like hardware. 21 tests to be written in userspace and run on the kernel under test; this is true 37 In short, this means that, yes, you can run KUnit on other architectures, but 40 For more information, see :ref:`kunit-on-non-uml`. 45 test, or an end-to-end test. 47 - A unit test is supposed to test a single unit of code in isolation, hence the 51 external dependencies outside of the test's control like hardware. 52 - An integration test tests the interaction between a minimal set of components, 59 - An end-to-end test usually tests the entire system from the perspective of the [all …]
|