/Linux-v4.19/arch/x86/kvm/ |
D | x86.h | 52 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue() 58 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt() 65 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue() 70 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
|
D | irq.c | 88 return v->arch.interrupt.injected; in kvm_cpu_has_injectable_intr() 117 return v->arch.interrupt.injected; in kvm_cpu_has_interrupt()
|
D | x86.c | 412 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception() 426 vcpu->arch.exception.injected = true; in kvm_multiple_exception() 429 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 454 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 3370 events->exception.injected = in kvm_vcpu_ioctl_x86_get_vcpu_events() 3372 vcpu->arch.exception.injected) && in kvm_vcpu_ioctl_x86_get_vcpu_events() 3379 events->interrupt.injected = in kvm_vcpu_ioctl_x86_get_vcpu_events() 3380 vcpu->arch.interrupt.injected && !vcpu->arch.interrupt.soft; in kvm_vcpu_ioctl_x86_get_vcpu_events() 3385 events->nmi.injected = vcpu->arch.nmi_injected; in kvm_vcpu_ioctl_x86_get_vcpu_events() 3415 if (events->exception.injected && in kvm_vcpu_ioctl_x86_set_vcpu_events() [all …]
|
D | vmx.c | 12857 if (vcpu->arch.exception.injected) { in vmcs12_save_pending_event() 12878 } else if (vcpu->arch.interrupt.injected) { in vmcs12_save_pending_event()
|
/Linux-v4.19/arch/x86/include/uapi/asm/ |
D | kvm.h | 299 __u8 injected; member 306 __u8 injected; member 312 __u8 injected; member
|
/Linux-v4.19/tools/arch/x86/include/uapi/asm/ |
D | kvm.h | 299 __u8 injected; member 306 __u8 injected; member 312 __u8 injected; member
|
/Linux-v4.19/Documentation/acpi/apei/ |
D | einj.txt | 60 Set the value of the error type being injected. Possible error types 114 in controlling where the errors are injected. Your BIOS may support an 124 signature being injected. The actual data passed is this: 144 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected. 158 # cat available_error_type # See which errors can be injected
|
/Linux-v4.19/Documentation/fault-injection/ |
D | fault-injection.txt | 87 injected. '0' means no messages; '1' will print only a single 104 stacktrace walking. Failure is injected only if some caller 131 specifies the minimum page allocation order to be injected 181 that the fault setup with a previous write to this file was injected. 182 A positive integer N indicates that the fault wasn't yet injected.
|
D | nvme-fault-injection.txt | 6 injected into the nvme_end_request. Users can change the default status
|
/Linux-v4.19/drivers/powercap/ |
D | Kconfig | 39 CPUs for power capping. Idle period can be injected
|
/Linux-v4.19/tools/perf/Documentation/ |
D | perf-inject.txt | 17 this case build-ids (-b option) are read and injected as needed into the event
|
/Linux-v4.19/Documentation/virtual/kvm/devices/ |
D | s390_flic.txt | 23 Passes a buffer and length into the kernel which are then injected into 45 interrupts. No interrupts are injected into the guest.
|
D | arm-vgic-its.txt | 7 The ITS allows MSI(-X) interrupts to be injected into guests. This extension is
|
/Linux-v4.19/Documentation/networking/ |
D | mac80211-injection.txt | 4 mac80211 now allows arbitrary packets to be injected down any Monitor Mode
|
D | gtp.txt | 229 Furthermore, before a received T-PDU is injected into the network
|
/Linux-v4.19/Documentation/ia64/ |
D | err_inject.txt | 42 # loop: times the error will be injected. 43 # interval: In second. every so often one error is injected. 966 printf("\t\t loop: times the error will be injected.\n"); 967 printf("\t\t interval: In second. every so often one error is injected.\n");
|
/Linux-v4.19/Documentation/devicetree/bindings/iio/adc/ |
D | st,stm32-adc.txt | 17 - injected conversions have higher priority, and so have the ability to
|
/Linux-v4.19/Documentation/vm/ |
D | hwpoison.rst | 125 injected failures, not for real memory failures.
|
/Linux-v4.19/arch/x86/include/asm/ |
D | kvm_host.h | 584 bool injected; member 592 bool injected; member
|
/Linux-v4.19/Documentation/virtual/kvm/ |
D | amd-memory-encryption.rst | 234 … __u64 guest_uaddr; /* the guest memory region where the secret should be injected */
|
D | api.txt | 374 but not yet injected into the cpu core. 421 Queues a hardware interrupt vector to be injected. 442 Queues an external interrupt to be injected. This ioctl is overleaded 448 to receive interrupts. When injected, the interrupt is done. 469 Queues an external interrupt to be injected into the virtual CPU. A negative 850 __u8 injected; 857 __u8 injected; 863 __u8 injected; 2319 an event is triggered on the eventfd, an interrupt is injected into 2340 irqchip.pin + 32 corresponds to the injected SPI ID. [all …]
|
D | msr.txt | 171 disabled. Bit 1 is 1 if asynchronous page faults can be injected
|
/Linux-v4.19/Documentation/thermal/ |
D | intel_powerclamp.txt | 205 idle time is injected when such a condition is detected. Currently,
|
/Linux-v4.19/Documentation/media/uapi/cec/ |
D | cec-pin-error-inj.rst | 106 After an error was injected with mode ``once`` the error injection command
|
/Linux-v4.19/Documentation/ |
D | kprobes.txt | 574 course, has no way to distinguish the deliberately injected faults
|