/linux-6.12.1/Documentation/ABI/testing/ |
D | debugfs-cxl | 9 aligned and the length of the injected poison is 64-bytes. If 13 to Injected. In addition, the device adds a poison creation 69 was enumerated in RCH mode, a CXL 1.1 error is injected, otherwise 70 a CXL 2.0 error is injected.
|
D | securityfs-secrets-coco | 48 Note: The binary format of the secrets table injected by the
|
/linux-6.12.1/tools/testing/selftests/kvm/x86_64/ |
D | nested_exceptions_test.c | 16 /* Arbitrary 32-bit error code injected by this test. */ 196 TEST_ASSERT(!events.exception.injected, in queue_ss_exception() 197 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception() 201 events.exception.injected = inject; in queue_ss_exception() 209 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions 211 * honors L1 exception intercept controls when a #SS is pending/injected, 255 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
|
D | ucna_injection_test.c | 13 * proper UCNA errors can be injected to a vCPU with MCG_CMCI_P and 51 * Record states about the injected UCNA. 162 * Lowest 6 bits is the recoverable address LSB, i.e., the injected MCE in inject_ucna() 230 "First injected UCNAs should get exposed via registers."); in test_ucna_injection() 232 "Second injected UCNAs should get exposed via registers."); in test_ucna_injection()
|
D | sync_regs_test.c | 86 * Set an exception as pending *and* injected while KVM is processing events. 88 * requesting that an exception be injected. 100 WRITE_ONCE(events->exception.injected, 1); in race_events_inj_pen() 189 * to the unhandled #GPs being injected. VMX preserves state in race_sync_regs()
|
D | triple_fault_event_test.c | 38 /* L2 should triple fault after a triple fault event injected. */ in l1_guest_code_vmx()
|
/linux-6.12.1/arch/x86/kvm/ |
D | irq.c | 51 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint() 54 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint() 58 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint() 62 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
|
D | x86.h | 133 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue() 140 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt() 147 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue() 152 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
|
D | x86.c | 828 ex->injected = false; in kvm_queue_exception_vmexit() 848 * previously injected exception is not checked because it was checked in kvm_multiple_exception() 850 * injected the exception, in which case it's exempt from interception. in kvm_multiple_exception() 859 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception() 870 vcpu->arch.exception.injected = true; in kvm_multiple_exception() 881 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 906 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception() 909 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 5159 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection() 5346 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events() [all …]
|
/linux-6.12.1/Documentation/firmware-guide/acpi/apei/ |
D | einj.rst | 69 Set the value of the error type being injected. Possible error types 144 in controlling where the errors are injected. Your BIOS may support an 154 signature being injected. The actual data passed is this:: 174 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected. 188 # cat available_error_type # See which errors can be injected 211 # cat einj_types # See which errors can be injected
|
/linux-6.12.1/drivers/s390/cio/ |
D | cio_inject.c | 27 * @crw: The data which needs to be injected as new CRW. 63 * Retrieve an injected CRW data. Return 0 on success, 1 if no 64 * injected-CRW is available. The function reproduces the return
|
/linux-6.12.1/Documentation/devicetree/bindings/iio/adc/ |
D | nxp,imx93-adc.yaml | 32 ECH (End of Chain), JEOC (End of Injected Conversion) and 33 JECH (End of injected Chain).
|
/linux-6.12.1/Documentation/driver-api/nvdimm/ |
D | security.rst | 67 keys are injected before libnvdimm is loaded by modprobe. 75 is injected with the description format described from earlier in this 116 should be injected and its keyid should be passed in via sysfs.
|
/linux-6.12.1/Documentation/virt/kvm/s390/ |
D | s390-pv.rst | 22 starts/stops and injected interrupts while the guest is running. 39 injected on SIE entry via a bit in the interrupt injection control 46 safeguarding; they can only be injected for instructions that have
|
/linux-6.12.1/Documentation/networking/devlink/ |
D | iosm.rst | 56 PSI RAM and EBL are the RAM images which are injected to the device when the 84 4) Once EBL is injected successfully, then the actual firmware flashing takes
|
/linux-6.12.1/Documentation/security/secrets/ |
D | coco.rst | 37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected 68 to which an EFI secret area with 4 secrets was injected during launch::
|
/linux-6.12.1/Documentation/virt/kvm/devices/ |
D | s390_flic.rst | 26 Passes a buffer and length into the kernel which are then injected into 50 interrupts. No interrupts are injected into the guest.
|
/linux-6.12.1/arch/x86/kernel/cpu/sgx/ |
D | virt.c | 324 * @trapnr: trap number injected to guest in case of ECREATE error 328 * which should be injected to guest in case of any ECREATE error. 397 * @trapnr: trap number injected to guest in case of EINIT error
|
/linux-6.12.1/Documentation/fault-injection/ |
D | fault-injection.rst | 107 injected. '0' means no messages; '1' will print only a single 125 stacktrace walking. Failure is injected only if some caller 162 specifies the minimum page allocation order to be injected 240 that the fault setup with a previous write to this file was injected. 241 A positive integer N indicates that the fault wasn't yet injected.
|
/linux-6.12.1/net/mac80211/ |
D | wme.c | 207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr() 209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
|
/linux-6.12.1/include/uapi/linux/ |
D | devlink.h | 325 * processed by devlink and not injected to the 331 * are processed by devlink and injected to 336 * packets are injected to the kernel's Rx path,
|
/linux-6.12.1/drivers/powercap/ |
D | Kconfig | 59 CPUs for power capping. Idle period can be injected
|
/linux-6.12.1/arch/x86/include/uapi/asm/ |
D | kvm.h | 337 __u8 injected; member 344 __u8 injected; member 350 __u8 injected; member
|
/linux-6.12.1/tools/arch/x86/include/uapi/asm/ |
D | kvm.h | 337 __u8 injected; member 344 __u8 injected; member 350 __u8 injected; member
|
/linux-6.12.1/arch/s390/kvm/ |
D | kvm-s390.h | 459 * like e.g. out of memory. In these cases no program check should be injected 463 * has been stored in vcpu->arch.pgm and can be injected with 469 * (program check injected to @vcpu)
|