Home
last modified time | relevance | path

Searched full:injects (Results 1 – 25 of 25) sorted by relevance

/linux/tools/virtio/virtio-trace/
H A DREADME113 A host injects read start order to the guest via virtio-serial.
117 A host injects read stop order to the guest via virtio-serial.
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-iio-adc-mcp356444 Internal voltage reference buffer injects a certain quantity of
/linux/Documentation/gpu/amdgpu/
H A Dras.rst58 This test injects errors for each IP.
/linux/Documentation/driver-api/nvdimm/
H A Dfirmware-activate.rst53 expect and injects a quiet period for the memory controller, but 'live'
/linux/Documentation/security/
H A Dsnp-tdx-threat-model.rst236 - A misbehaving host injects malformed input via any communication
243 - A misbehaving host injects a specific input value via any
/linux/Documentation/bpf/
H A Dbpf_prog_run.rst110 redirected to an interface that injects it into the stack), the page will be
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dbpf_mod_race.c24 * thread makes forward progress, and fmod_ret injects an error so that the
/linux/Documentation/firmware-guide/acpi/apei/
H A Deinj.rst148 Injects a CXL error type into the CXL port represented by $dport_dev,
/linux/tools/testing/selftests/drivers/net/mlxsw/
H A Dqos_pfc.sh4 # This test injects a 10-MB burst of traffic with VLAN tag and 802.1p priority
/linux/drivers/edac/
H A Dzynqmp_edac.c228 * zero, it injects errors
/linux/drivers/gpu/drm/ttm/tests/
H A Dttm_bo_test.c133 * A test case heavily inspired by ww_test_edeadlk_normal(). It injects
/linux/drivers/misc/genwqe/
H A Dcard_base.h99 #define GENWQE_INJECT_HARDWARE_FAILURE 0x00000001 /* injects -1 reg reads */
/linux/drivers/hid/i2c-hid/
H A Di2c-hid-dmi-quirks.c34 * driver operates between the i2c-hid layer and the device and injects
/linux/arch/riscv/kvm/
H A Daia_imsic.c687 * The IMSIC SW-file directly injects interrupt via hvip so in kvm_riscv_vcpu_aia_imsic_has_interrupt()
/linux/Documentation/virt/kvm/
H A Dapi.rst587 This injects an edge type external interrupt into the guest once it's ready
598 This injects a level type external interrupt into the guest context. The
4365 vector(s) that i8254 injects. Reinject mode dequeues a tick and injects its
4367 !reinject mode injects an interrupt as soon as a tick arrives.
6150 This ioctl injects an event channel interrupt directly to the guest vCPU.
7984 exception_payload field. Similarly, when userspace injects a #PF (or
8081 access to an MSR is denied. By default, KVM injects #GP on denied accesses.
/linux/arch/microblaze/kernel/
H A Dentry.S1266 * For TMR Inject API which injects the error should
/linux/drivers/firmware/arm_scmi/
H A Draw_mode.c568 * if the user injects messages without using monotonically increasing in scmi_xfer_raw_get_init()
/linux/tools/hv/
H A Dhv_kvp_daemon.c1582 * injects an IPv6 address, the flag is true, but we still need to in kvp_set_ip_info()
/linux/arch/arm64/kvm/vgic/
H A Dvgic-its.c1385 * The INT command injects the LPI associated with that DevID/EvID pair.
/linux/tools/perf/
H A Dbuiltin-inject.c2606 * JIT MMAP injection injects all MMAP events in one go, so it in cmd_inject()
/linux/tools/perf/tests/
H A Dparse-events.c828 * The perf_pmu__test_parse_init injects 'read' term into in test__checkterms_simple()
/linux/arch/x86/kvm/svm/
H A Dsvm.c3596 * case where software directly injects an NMI. in svm_inject_nmi()
/linux/arch/s390/kvm/
H A Dkvm-s390.c5768 * should_handle_per_ifetch()). However, if userspace emulation injects in kvm_arch_vcpu_async_ioctl()
/linux/arch/x86/kvm/vmx/
H A Dvmx.c6040 * SGX, so KVM intercepts all ENCLS leafs and injects a #UD to prevent in handle_encls()
/linux/arch/x86/kvm/
H A Dx86.c14020 * Handles kvm_read/write_guest_virt*() result and either injects #PF or returns