Home
last modified time | relevance | path

Searched full:injected (Results 1 – 25 of 172) sorted by relevance

1234567

/Linux-v6.6/tools/testing/selftests/kvm/x86_64/
Dnested_exceptions_test.c18 /* Arbitrary 32-bit error code injected by this test. */
198 TEST_ASSERT(!events.exception.injected, in queue_ss_exception()
199 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception()
203 events.exception.injected = inject; in queue_ss_exception()
211 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions
213 * honors L1 exception intercept controls when a #SS is pending/injected,
257 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
Ducna_injection_test.c13 * proper UCNA errors can be injected to a vCPU with MCG_CMCI_P and
54 * Record states about the injected UCNA.
165 * Lowest 6 bits is the recoverable address LSB, i.e., the injected MCE in inject_ucna()
233 "First injected UCNAs should get exposed via registers."); in test_ucna_injection()
235 "Second injected UCNAs should get exposed via registers."); in test_ucna_injection()
Dsync_regs_test.c85 * Set an exception as pending *and* injected while KVM is processing events.
87 * requesting that an exception be injected.
99 WRITE_ONCE(events->exception.injected, 1); in race_events_inj_pen()
191 * to the unhandled #GPs being injected. VMX preserves state in race_sync_regs()
/Linux-v6.6/arch/x86/kvm/
Dirq.c51 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint()
54 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint()
58 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint()
62 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
Dx86.h110 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue()
117 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt()
124 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue()
129 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
Dx86.c632 ex->injected = false; in kvm_queue_exception_vmexit()
658 * previously injected exception is not checked because it was checked in kvm_multiple_exception()
660 * injected the exception, in which case it's exempt from interception. in kvm_multiple_exception()
669 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception()
680 vcpu->arch.exception.injected = true; in kvm_multiple_exception()
691 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
716 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception()
719 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
4972 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection()
5159 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events()
[all …]
/Linux-v6.6/Documentation/firmware-guide/acpi/apei/
Deinj.rst65 Set the value of the error type being injected. Possible error types
122 in controlling where the errors are injected. Your BIOS may support an
132 signature being injected. The actual data passed is this::
152 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
166 # cat available_error_type # See which errors can be injected
/Linux-v6.6/drivers/s390/cio/
Dcio_inject.c27 * @crw: The data which needs to be injected as new CRW.
63 * Retrieve an injected CRW data. Return 0 on success, 1 if no
64 * injected-CRW is available. The function reproduces the return
/Linux-v6.6/Documentation/ABI/testing/
Ddebugfs-cxl9 aligned and the length of the injected poison is 64-bytes. If
13 to Injected. In addition, the device adds a poison creation
Dsecurityfs-secrets-coco48 Note: The binary format of the secrets table injected by the
/Linux-v6.6/Documentation/driver-api/nvdimm/
Dsecurity.rst67 keys are injected before libnvdimm is loaded by modprobe.
75 is injected with the description format described from earlier in this
116 should be injected and its keyid should be passed in via sysfs.
/Linux-v6.6/Documentation/virt/kvm/s390/
Ds390-pv.rst22 starts/stops and injected interrupts while the guest is running.
39 injected on SIE entry via a bit in the interrupt injection control
46 safeguarding; they can only be injected for instructions that have
/Linux-v6.6/Documentation/devicetree/bindings/iio/adc/
Dnxp,imx93-adc.yaml32 ECH (End of Chain), JEOC (End of Injected Conversion) and
33 JECH (End of injected Chain).
/Linux-v6.6/Documentation/networking/devlink/
Diosm.rst56 PSI RAM and EBL are the RAM images which are injected to the device when the
84 4) Once EBL is injected successfully, then the actual firmware flashing takes
/Linux-v6.6/Documentation/security/secrets/
Dcoco.rst37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected
68 to which an EFI secret area with 4 secrets was injected during launch::
/Linux-v6.6/Documentation/fault-injection/
Dfault-injection.rst107 injected. '0' means no messages; '1' will print only a single
125 stacktrace walking. Failure is injected only if some caller
154 specifies the minimum page allocation order to be injected
232 that the fault setup with a previous write to this file was injected.
233 A positive integer N indicates that the fault wasn't yet injected.
/Linux-v6.6/Documentation/virt/kvm/devices/
Ds390_flic.rst26 Passes a buffer and length into the kernel which are then injected into
50 interrupts. No interrupts are injected into the guest.
/Linux-v6.6/arch/x86/kernel/cpu/sgx/
Dvirt.c324 * @trapnr: trap number injected to guest in case of ECREATE error
328 * which should be injected to guest in case of any ECREATE error.
397 * @trapnr: trap number injected to guest in case of EINIT error
/Linux-v6.6/tools/arch/x86/include/uapi/asm/
Dkvm.h336 __u8 injected; member
343 __u8 injected; member
349 __u8 injected; member
/Linux-v6.6/arch/x86/include/uapi/asm/
Dkvm.h336 __u8 injected; member
343 __u8 injected; member
349 __u8 injected; member
/Linux-v6.6/net/mac80211/
Dwme.c207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr()
209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
/Linux-v6.6/include/uapi/linux/
Ddevlink.h323 * processed by devlink and not injected to the
329 * are processed by devlink and injected to
334 * packets are injected to the kernel's Rx path,
/Linux-v6.6/drivers/powercap/
DKconfig59 CPUs for power capping. Idle period can be injected
/Linux-v6.6/drivers/iio/adc/
Dstm32-dfsdm-adc.c147 /* hardware injected trigger enable, edge selection */
405 /* Nothing more to do for injected (scan mode/triggered) conversions */ in stm32_dfsdm_start_filter()
541 * Modes | regular | regular | injected | injected | in stm32_dfsdm_filter_configure()
570 /* Use injected conversion for multiple channels */ in stm32_dfsdm_filter_configure()
584 * Continuous conversions not supported in injected mode, in stm32_dfsdm_filter_configure()
959 /* Enable injected DMA transfer*/ in stm32_dfsdm_adc_dma_start()
/Linux-v6.6/arch/s390/kvm/
Dkvm-s390.h421 * like e.g. out of memory. In these cases no program check should be injected
425 * has been stored in vcpu->arch.pgm and can be injected with
431 * (program check injected to @vcpu)

1234567