Home
last modified time | relevance | path

Searched full:injected (Results 1 – 25 of 157) sorted by relevance

1234567

/linux/tools/testing/selftests/kvm/x86/
H A Dnested_exceptions_test.c16 /* Arbitrary 32-bit error code injected by this test. */
198 TEST_ASSERT(!events.exception.injected, in queue_ss_exception()
199 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception()
203 events.exception.injected = inject; in queue_ss_exception()
211 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions
213 * honors L1 exception intercept controls when a #SS is pending/injected,
257 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
/linux/Documentation/firmware-guide/acpi/apei/
H A Deinj.rst72 Set the value of the error type being injected. Possible error types
156 in controlling where the errors are injected. Your BIOS may support an
166 signature being injected. The actual data passed is this::
186 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
200 # cat available_error_type # See which errors can be injected
212 # cat available_error_type # See which errors can be injected
244 # cat einj_types # See which errors can be injected
/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst67 keys are injected before libnvdimm is loaded by modprobe.
75 is injected with the description format described from earlier in this
116 should be injected and its keyid should be passed in via sysfs.
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv.rst22 starts/stops and injected interrupts while the guest is running.
39 injected on SIE entry via a bit in the interrupt injection control
46 safeguarding; they can only be injected for instructions that have
/linux/arch/x86/kvm/
H A Dx86.h197 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue()
204 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt()
211 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue()
216 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
H A Dirq.c62 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint()
65 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint()
69 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint()
73 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
H A Dx86.c823 ex->injected = false; in kvm_queue_exception_vmexit()
851 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception()
854 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
879 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception()
882 vcpu->arch.exception.injected = false; in kvm_multiple_exception()
929 * re-checking is incorrect if _L1_ injected the exception, in which in kvm_requeue_exception()
934 vcpu->arch.exception.injected = true; in kvm_requeue_exception()
5349 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection()
5536 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events()
5540 !vcpu->arch.exception.injected) in kvm_vcpu_ioctl_x86_get_vcpu_events()
[all …]
/linux/Documentation/security/secrets/
H A Dcoco.rst37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected
68 to which an EFI secret area with 4 secrets was injected during launch::
/linux/Documentation/networking/devlink/
H A Diosm.rst56 PSI RAM and EBL are the RAM images which are injected to the device when the
84 4) Once EBL is injected successfully, then the actual firmware flashing takes
/linux/Documentation/virt/kvm/devices/
H A Ds390_flic.rst26 Passes a buffer and length into the kernel which are then injected into
50 interrupts. No interrupts are injected into the guest.
/linux/net/mac80211/
H A Dwme.c207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr()
209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
/linux/Documentation/ABI/testing/
H A Dsecurityfs-secrets-coco48 Note: The binary format of the secrets table injected by the
/linux/tools/arch/x86/include/uapi/asm/
H A Dkvm.h342 __u8 injected; member
349 __u8 injected; member
355 __u8 injected; member
/linux/arch/s390/kvm/
H A Dkvm-s390.h519 * like e.g. out of memory. In these cases no program check should be injected
523 * has been stored in vcpu->arch.pgm and can be injected with
529 * (program check injected to @vcpu)
/linux/arch/x86/include/uapi/asm/
H A Dkvm.h342 __u8 injected; member
349 __u8 injected; member
355 __u8 injected; member
/linux/drivers/iio/adc/
H A Dstm32-dfsdm-adc.c150 /* hardware injected trigger enable, edge selection */
408 /* Nothing more to do for injected (scan mode/triggered) conversions */ in stm32_dfsdm_start_filter()
544 * Modes | regular | regular | injected | injected | in stm32_dfsdm_filter_configure()
573 /* Use injected conversion for multiple channels */ in stm32_dfsdm_filter_configure()
587 * Continuous conversions not supported in injected mode, in stm32_dfsdm_filter_configure()
1029 /* Enable injected DMA transfer*/ in stm32_dfsdm_adc_dma_start()
/linux/Documentation/virt/kvm/x86/
H A Dmsr.rst211 Bit 1 is 1 if asynchronous page faults can be injected when vcpu is in
245 in MSR_KVM_ASYNC_PF_EN or interrupt #0 can get injected. The MSR is
/linux/Documentation/admin-guide/thermal/
H A Dintel_powerclamp.rst214 idle time is injected when such a condition is detected. Currently,
340 Maximum injected idle time to the total CPU time ratio in percent range
/linux/drivers/edac/
H A Dzynqmp_edac.c244 * To get the Correctable Error injected, the following steps are needed:
288 * To get the Uncorrectable Error injected, the following steps are needed:
H A Dversal_edac.c679 * location the fault is injected.
782 * Upon doing a read to the address the errors are injected.
844 * 2 bit errors are injected.
846 * Upon doing a read to the address the errors are injected.
/linux/Documentation/devicetree/bindings/thermal/
H A Dthermal-idle.yaml40 The exit latency constraint in microsecond for the injected idle state
/linux/arch/loongarch/kvm/
H A Dinterrupt.c111 * Other exceptions are injected by hardware in kvm mode
/linux/tools/perf/Documentation/
H A Dperf-inject.txt17 this case build-ids (-b option) are read and injected as needed into the event
/linux/arch/arm64/kvm/hyp/include/hyp/
H A Dswitch.h367 * SError (injected by KVM or userspace) and vSError are in ___activate_traps()
892 * correct in order to return to after having injected in __fixup_guest_exit()
905 * same PC once the SError has been injected, and replay the in __fixup_guest_exit()
/linux/Documentation/sound/cards/
H A Dpcmtest.rst94 Errors can be injected into the following PCM callbacks:

1234567