/Linux-v6.1/tools/testing/selftests/kvm/x86_64/ |
D | nested_exceptions_test.c | 18 /* Arbitrary 32-bit error code injected by this test. */ 203 TEST_ASSERT(!events.exception.injected, in queue_ss_exception() 204 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception() 208 events.exception.injected = inject; in queue_ss_exception() 216 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions 218 * honors L1 exception intercept controls when a #SS is pending/injected, 262 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
|
D | ucna_injection_test.c | 13 * proper UCNA errors can be injected to a vCPU with MCG_CMCI_P and 54 * Record states about the injected UCNA. 169 * Lowest 6 bits is the recoverable address LSB, i.e., the injected MCE in inject_ucna() 247 "First injected UCNAs should get exposed via registers."); in test_ucna_injection() 249 "Second injected UCNAs should get exposed via registers."); in test_ucna_injection()
|
D | triple_fault_event_test.c | 38 /* L2 should triple fault after a triple fault event injected. */ in l1_guest_code_vmx()
|
/Linux-v6.1/arch/x86/kvm/ |
D | irq.c | 51 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint() 54 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint() 58 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint() 62 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
|
D | x86.h | 95 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue() 102 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt() 109 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue() 114 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
|
D | x86.c | 623 ex->injected = false; in kvm_queue_exception_vmexit() 649 * previously injected exception is not checked because it was checked in kvm_multiple_exception() 651 * injected the exception, in which case it's exempt from interception. in kvm_multiple_exception() 660 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception() 671 vcpu->arch.exception.injected = true; in kvm_multiple_exception() 682 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 707 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception() 710 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 4858 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection() 5050 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events() [all …]
|
/Linux-v6.1/Documentation/firmware-guide/acpi/apei/ |
D | einj.rst | 65 Set the value of the error type being injected. Possible error types 122 in controlling where the errors are injected. Your BIOS may support an 132 signature being injected. The actual data passed is this:: 152 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected. 166 # cat available_error_type # See which errors can be injected
|
/Linux-v6.1/drivers/s390/cio/ |
D | cio_inject.c | 27 * @crw: The data which needs to be injected as new CRW. 63 * Retrieve an injected CRW data. Return 0 on success, 1 if no 64 * injected-CRW is available. The function reproduces the return
|
/Linux-v6.1/Documentation/virt/kvm/s390/ |
D | s390-pv.rst | 22 starts/stops and injected interrupts while the guest is running. 39 injected on SIE entry via a bit in the interrupt injection control 46 safeguarding; they can only be injected for instructions that have
|
/Linux-v6.1/Documentation/driver-api/nvdimm/ |
D | security.rst | 67 keys are injected before libnvdimm is loaded by modprobe. 75 is injected with the description format described from earlier in this 116 should be injected and its keyid should be passed in via sysfs.
|
/Linux-v6.1/Documentation/fault-injection/ |
D | fault-injection.rst | 101 injected. '0' means no messages; '1' will print only a single 119 stacktrace walking. Failure is injected only if some caller 148 specifies the minimum page allocation order to be injected 226 that the fault setup with a previous write to this file was injected. 227 A positive integer N indicates that the fault wasn't yet injected.
|
/Linux-v6.1/Documentation/networking/devlink/ |
D | iosm.rst | 56 PSI RAM and EBL are the RAM images which are injected to the device when the 84 4) Once EBL is injected successfully, then the actual firmware flashing takes
|
D | devlink-trap.rst | 92 are only processed by ``devlink`` and not injected to the kernel's Rx path. 97 processed by ``devlink`` and injected to the kernel's Rx path. Changing the 102 For example, ARP request and IGMP query packets. Packets are injected to
|
/Linux-v6.1/Documentation/security/secrets/ |
D | coco.rst | 37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The strucutre of the injected 68 to which an EFI secret area with 4 secrets was injected during launch::
|
/Linux-v6.1/arch/x86/include/uapi/asm/ |
D | kvm.h | 338 __u8 injected; member 345 __u8 injected; member 351 __u8 injected; member
|
/Linux-v6.1/tools/arch/x86/include/uapi/asm/ |
D | kvm.h | 338 __u8 injected; member 345 __u8 injected; member 351 __u8 injected; member
|
/Linux-v6.1/Documentation/virt/kvm/devices/ |
D | s390_flic.rst | 26 Passes a buffer and length into the kernel which are then injected into 50 interrupts. No interrupts are injected into the guest.
|
/Linux-v6.1/arch/x86/kernel/cpu/sgx/ |
D | virt.c | 321 * @trapnr: trap number injected to guest in case of ECREATE error 325 * which should be injected to guest in case of any ECREATE error. 394 * @trapnr: trap number injected to guest in case of EINIT error
|
/Linux-v6.1/net/mac80211/ |
D | wme.c | 252 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr() 254 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
|
/Linux-v6.1/include/uapi/linux/ |
D | devlink.h | 323 * processed by devlink and not injected to the 329 * are processed by devlink and injected to 334 * packets are injected to the kernel's Rx path,
|
/Linux-v6.1/drivers/powercap/ |
D | Kconfig | 43 CPUs for power capping. Idle period can be injected
|
/Linux-v6.1/drivers/iio/adc/ |
D | stm32-dfsdm-adc.c | 146 /* hardware injected trigger enable, edge selection */ 404 /* Nothing more to do for injected (scan mode/triggered) conversions */ in stm32_dfsdm_start_filter() 540 * Modes | regular | regular | injected | injected | in stm32_dfsdm_filter_configure() 569 /* Use injected conversion for multiple channels */ in stm32_dfsdm_filter_configure() 583 * Continuous conversions not supported in injected mode, in stm32_dfsdm_filter_configure() 958 /* Enable injected DMA transfer*/ in stm32_dfsdm_adc_dma_start()
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | securityfs-secrets-coco | 48 Note: The binary format of the secrets table injected by the
|
/Linux-v6.1/arch/s390/kvm/ |
D | kvm-s390.h | 429 * like e.g. out of memory. In these cases no program check should be injected 433 * has been stored in vcpu->arch.pgm and can be injected with 439 * (program check injected to @vcpu)
|
/Linux-v6.1/Documentation/devicetree/bindings/thermal/ |
D | thermal-idle.yaml | 40 The exit latency constraint in microsecond for the injected idle state
|