/linux/tools/testing/selftests/kvm/x86/ |
H A D | nested_exceptions_test.c | 16 /* Arbitrary 32-bit error code injected by this test. */ 198 TEST_ASSERT(!events.exception.injected, in queue_ss_exception() 199 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception() 203 events.exception.injected = inject; in queue_ss_exception() 211 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions 213 * honors L1 exception intercept controls when a #SS is pending/injected, 257 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
|
/linux/Documentation/firmware-guide/acpi/apei/ |
H A D | einj.rst | 72 Set the value of the error type being injected. Possible error types 156 in controlling where the errors are injected. Your BIOS may support an 166 signature being injected. The actual data passed is this:: 186 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected. 200 # cat available_error_type # See which errors can be injected 212 # cat available_error_type # See which errors can be injected 244 # cat einj_types # See which errors can be injected
|
/linux/drivers/s390/cio/ |
H A D | cio_inject.c | 27 * @crw: The data which needs to be injected as new CRW. 63 * Retrieve an injected CRW data. Return 0 on success, 1 if no 64 * injected-CRW is available. The function reproduces the return
|
/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 67 keys are injected before libnvdimm is loaded by modprobe. 75 is injected with the description format described from earlier in this 116 should be injected and its keyid should be passed in via sysfs.
|
/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv.rst | 22 starts/stops and injected interrupts while the guest is running. 39 injected on SIE entry via a bit in the interrupt injection control 46 safeguarding; they can only be injected for instructions that have
|
/linux/arch/x86/kvm/ |
H A D | x86.h | 197 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue() 204 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt() 211 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue() 216 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
|
H A D | irq.c | 62 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint() 65 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint() 69 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint() 73 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
|
H A D | x86.c | 833 ex->injected = false; in kvm_queue_exception_vmexit() 861 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { in kvm_multiple_exception() 864 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 889 * Synthesize #DF. Clear the previously injected or pending in kvm_multiple_exception() 892 vcpu->arch.exception.injected = false; in kvm_multiple_exception() 939 * re-checking is incorrect if _L1_ injected the exception, in which in kvm_requeue_exception() 944 vcpu->arch.exception.injected = true; in kvm_requeue_exception() 5389 * instruction boundary and with no events half-injected. in kvm_vcpu_ready_for_interrupt_injection() 5576 * of the injected exception. in kvm_vcpu_ioctl_x86_get_vcpu_events() 5580 !vcpu->arch.exception.injected) in kvm_vcpu_ioctl_x86_get_vcpu_events() [all …]
|
/linux/Documentation/security/secrets/ |
H A D | coco.rst | 37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected 68 to which an EFI secret area with 4 secrets was injected during launch::
|
/linux/Documentation/networking/devlink/ |
H A D | iosm.rst | 56 PSI RAM and EBL are the RAM images which are injected to the device when the 84 4) Once EBL is injected successfully, then the actual firmware flashing takes
|
/linux/Documentation/virt/kvm/devices/ |
H A D | s390_flic.rst | 26 Passes a buffer and length into the kernel which are then injected into 50 interrupts. No interrupts are injected into the guest.
|
/linux/arch/x86/kernel/cpu/sgx/ |
H A D | virt.c | 324 * @trapnr: trap number injected to guest in case of ECREATE error 328 * which should be injected to guest in case of any ECREATE error. 397 * @trapnr: trap number injected to guest in case of EINIT error
|
/linux/net/mac80211/ |
H A D | wme.c | 207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr() 209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
|
/linux/include/uapi/linux/ |
H A D | devlink.h | 330 * processed by devlink and not injected to the 336 * are processed by devlink and injected to 341 * packets are injected to the kernel's Rx path,
|
/linux/Documentation/ABI/testing/ |
H A D | securityfs-secrets-coco | 48 Note: The binary format of the secrets table injected by the
|
/linux/tools/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 337 __u8 injected; member 344 __u8 injected; member 350 __u8 injected; member
|
/linux/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 342 __u8 injected; member 349 __u8 injected; member 355 __u8 injected; member
|
/linux/Documentation/virt/kvm/x86/ |
H A D | msr.rst | 211 Bit 1 is 1 if asynchronous page faults can be injected when vcpu is in 245 in MSR_KVM_ASYNC_PF_EN or interrupt #0 can get injected. The MSR is
|
/linux/Documentation/admin-guide/thermal/ |
H A D | intel_powerclamp.rst | 214 idle time is injected when such a condition is detected. Currently, 340 Maximum injected idle time to the total CPU time ratio in percent range
|
/linux/drivers/edac/ |
H A D | zynqmp_edac.c | 244 * To get the Correctable Error injected, the following steps are needed: 288 * To get the Uncorrectable Error injected, the following steps are needed:
|
/linux/Documentation/devicetree/bindings/thermal/ |
H A D | thermal-idle.yaml | 40 The exit latency constraint in microsecond for the injected idle state
|
/linux/arch/loongarch/kvm/ |
H A D | interrupt.c | 100 * Other exceptions are injected by hardware in kvm mode
|
/linux/tools/perf/Documentation/ |
H A D | perf-inject.txt | 17 this case build-ids (-b option) are read and injected as needed into the event
|
/linux/arch/loongarch/include/asm/ |
H A D | kvm_vcpu.h | 110 /* only one exception can be injected */ in kvm_queue_exception()
|
/linux/Documentation/sound/cards/ |
H A D | pcmtest.rst | 94 Errors can be injected into the following PCM callbacks:
|