Home
last modified time | relevance | path

Searched full:injected (Results 1 – 25 of 185) sorted by relevance

12345678

/linux-6.12.1/Documentation/ABI/testing/
Ddebugfs-cxl9 aligned and the length of the injected poison is 64-bytes. If
13 to Injected. In addition, the device adds a poison creation
69 was enumerated in RCH mode, a CXL 1.1 error is injected, otherwise
70 a CXL 2.0 error is injected.
Dsecurityfs-secrets-coco48 Note: The binary format of the secrets table injected by the
/linux-6.12.1/tools/testing/selftests/kvm/x86_64/
Dnested_exceptions_test.c16 /* Arbitrary 32-bit error code injected by this test. */
196 TEST_ASSERT(!events.exception.injected, in queue_ss_exception()
197 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception()
201 events.exception.injected = inject; in queue_ss_exception()
209 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions
211 * honors L1 exception intercept controls when a #SS is pending/injected,
255 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
Ducna_injection_test.c13 * proper UCNA errors can be injected to a vCPU with MCG_CMCI_P and
51 * Record states about the injected UCNA.
162 * Lowest 6 bits is the recoverable address LSB, i.e., the injected MCE in inject_ucna()
230 "First injected UCNAs should get exposed via registers."); in test_ucna_injection()
232 "Second injected UCNAs should get exposed via registers."); in test_ucna_injection()
Dsync_regs_test.c86 * Set an exception as pending *and* injected while KVM is processing events.
88 * requesting that an exception be injected.
100 WRITE_ONCE(events->exception.injected, 1); in race_events_inj_pen()
189 * to the unhandled #GPs being injected. VMX preserves state in race_sync_regs()
Dtriple_fault_event_test.c38 /* L2 should triple fault after a triple fault event injected. */ in l1_guest_code_vmx()
/linux-6.12.1/arch/x86/kvm/
Dirq.c51 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint()
54 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint()
58 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint()
62 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
Dx86.h133 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue()
140 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt()
147 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue()
152 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
Dx86.c828 ex->injected = false; in kvm_queue_exception_vmexit()
848 * previously injected exception is not checked because it was checked in kvm_multiple_exception()
850 * injected the exception, in which case it's exempt from interception. in kvm_multiple_exception()
859 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception()
870 vcpu->arch.exception.injected = true; in kvm_multiple_exception()
881 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
906 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception()
909 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
5159 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection()
5346 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events()
[all …]
/linux-6.12.1/Documentation/firmware-guide/acpi/apei/
Deinj.rst69 Set the value of the error type being injected. Possible error types
144 in controlling where the errors are injected. Your BIOS may support an
154 signature being injected. The actual data passed is this::
174 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
188 # cat available_error_type # See which errors can be injected
211 # cat einj_types # See which errors can be injected
/linux-6.12.1/drivers/s390/cio/
Dcio_inject.c27 * @crw: The data which needs to be injected as new CRW.
63 * Retrieve an injected CRW data. Return 0 on success, 1 if no
64 * injected-CRW is available. The function reproduces the return
/linux-6.12.1/Documentation/devicetree/bindings/iio/adc/
Dnxp,imx93-adc.yaml32 ECH (End of Chain), JEOC (End of Injected Conversion) and
33 JECH (End of injected Chain).
/linux-6.12.1/Documentation/driver-api/nvdimm/
Dsecurity.rst67 keys are injected before libnvdimm is loaded by modprobe.
75 is injected with the description format described from earlier in this
116 should be injected and its keyid should be passed in via sysfs.
/linux-6.12.1/Documentation/virt/kvm/s390/
Ds390-pv.rst22 starts/stops and injected interrupts while the guest is running.
39 injected on SIE entry via a bit in the interrupt injection control
46 safeguarding; they can only be injected for instructions that have
/linux-6.12.1/Documentation/networking/devlink/
Diosm.rst56 PSI RAM and EBL are the RAM images which are injected to the device when the
84 4) Once EBL is injected successfully, then the actual firmware flashing takes
/linux-6.12.1/Documentation/security/secrets/
Dcoco.rst37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected
68 to which an EFI secret area with 4 secrets was injected during launch::
/linux-6.12.1/Documentation/virt/kvm/devices/
Ds390_flic.rst26 Passes a buffer and length into the kernel which are then injected into
50 interrupts. No interrupts are injected into the guest.
/linux-6.12.1/arch/x86/kernel/cpu/sgx/
Dvirt.c324 * @trapnr: trap number injected to guest in case of ECREATE error
328 * which should be injected to guest in case of any ECREATE error.
397 * @trapnr: trap number injected to guest in case of EINIT error
/linux-6.12.1/Documentation/fault-injection/
Dfault-injection.rst107 injected. '0' means no messages; '1' will print only a single
125 stacktrace walking. Failure is injected only if some caller
162 specifies the minimum page allocation order to be injected
240 that the fault setup with a previous write to this file was injected.
241 A positive integer N indicates that the fault wasn't yet injected.
/linux-6.12.1/net/mac80211/
Dwme.c207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr()
209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
/linux-6.12.1/include/uapi/linux/
Ddevlink.h325 * processed by devlink and not injected to the
331 * are processed by devlink and injected to
336 * packets are injected to the kernel's Rx path,
/linux-6.12.1/drivers/powercap/
DKconfig59 CPUs for power capping. Idle period can be injected
/linux-6.12.1/arch/x86/include/uapi/asm/
Dkvm.h337 __u8 injected; member
344 __u8 injected; member
350 __u8 injected; member
/linux-6.12.1/tools/arch/x86/include/uapi/asm/
Dkvm.h337 __u8 injected; member
344 __u8 injected; member
350 __u8 injected; member
/linux-6.12.1/arch/s390/kvm/
Dkvm-s390.h459 * like e.g. out of memory. In these cases no program check should be injected
463 * has been stored in vcpu->arch.pgm and can be injected with
469 * (program check injected to @vcpu)

12345678