/openbmc/u-boot/arch/sandbox/include/asm/ |
H A D | eth.h | 24 * @return 0 if injected, -EAGAIN if not 37 * @return 0 if injected, -EAGAIN if not 48 * @return 0 if injected, -EOVERFLOW if not 58 * @return 0 if injected, -EOVERFLOW if not
|
/openbmc/linux/tools/testing/selftests/kvm/x86_64/ |
H A D | nested_exceptions_test.c | 18 /* Arbitrary 32-bit error code injected by this test. */ 198 TEST_ASSERT(!events.exception.injected, in queue_ss_exception() 199 "Vector %d unexpectedly injected", events.exception.nr); in queue_ss_exception() 203 events.exception.injected = inject; in queue_ss_exception() 211 * Verify KVM_{G,S}ET_EVENTS play nice with pending vs. injected exceptions 213 * honors L1 exception intercept controls when a #SS is pending/injected, 257 * #SS interception and re-enter L2 to request #GP (via injected #SS). in main()
|
H A D | ucna_injection_test.c | 13 * proper UCNA errors can be injected to a vCPU with MCG_CMCI_P and 54 * Record states about the injected UCNA. 165 * Lowest 6 bits is the recoverable address LSB, i.e., the injected MCE in inject_ucna() 233 "First injected UCNAs should get exposed via registers."); in test_ucna_injection() 235 "Second injected UCNAs should get exposed via registers."); in test_ucna_injection()
|
H A D | sync_regs_test.c | 85 * Set an exception as pending *and* injected while KVM is processing events. 87 * requesting that an exception be injected. 99 WRITE_ONCE(events->exception.injected, 1); in race_events_inj_pen() 191 * to the unhandled #GPs being injected. VMX preserves state in race_sync_regs()
|
/openbmc/linux/arch/x86/kvm/ |
H A D | irq.c | 51 * FIXME: interrupt.injected represents an interrupt whose in kvm_cpu_has_extint() 54 * on interrupt.injected to know if there is a pending in kvm_cpu_has_extint() 58 * pending interrupt or should re-inject an injected in kvm_cpu_has_extint() 62 return v->arch.interrupt.injected; in kvm_cpu_has_extint()
|
H A D | x86.h | 110 vcpu->arch.exception.injected = false; in kvm_clear_exception_queue() 117 vcpu->arch.interrupt.injected = true; in kvm_queue_interrupt() 124 vcpu->arch.interrupt.injected = false; in kvm_clear_interrupt_queue() 129 return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || in kvm_event_needs_reinjection()
|
/openbmc/linux/Documentation/firmware-guide/acpi/apei/ |
H A D | einj.rst | 65 Set the value of the error type being injected. Possible error types 122 in controlling where the errors are injected. Your BIOS may support an 132 signature being injected. The actual data passed is this:: 152 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected. 166 # cat available_error_type # See which errors can be injected
|
/openbmc/linux/drivers/s390/cio/ |
H A D | cio_inject.c | 27 * @crw: The data which needs to be injected as new CRW. 63 * Retrieve an injected CRW data. Return 0 on success, 1 if no 64 * injected-CRW is available. The function reproduces the return
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | debugfs-cxl | 9 aligned and the length of the injected poison is 64-bytes. If 13 to Injected. In addition, the device adds a poison creation
|
/openbmc/linux/Documentation/devicetree/bindings/iio/adc/ |
H A D | nxp,imx93-adc.yaml | 32 ECH (End of Chain), JEOC (End of Injected Conversion) and 33 JECH (End of injected Chain).
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 67 keys are injected before libnvdimm is loaded by modprobe. 75 is injected with the description format described from earlier in this 116 should be injected and its keyid should be passed in via sysfs.
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv.rst | 22 starts/stops and injected interrupts while the guest is running. 39 injected on SIE entry via a bit in the interrupt injection control 46 safeguarding; they can only be injected for instructions that have
|
/openbmc/u-boot/drivers/net/ |
H A D | sandbox.c | 55 * returns 0 if injected, -EAGAIN if not 110 * returns 0 if injected, -EAGAIN if not 168 * returns 0 if injected, -EOVERFLOW if not 209 * returns 0 if injected, -EOVERFLOW if not
|
/openbmc/linux/Documentation/security/secrets/ |
H A D | coco.rst | 37 ``KVM_SEV_LAUNCH_SECRET`` command (see [sev]_). The structure of the injected 68 to which an EFI secret area with 4 secrets was injected during launch::
|
/openbmc/linux/Documentation/networking/devlink/ |
H A D | iosm.rst | 56 PSI RAM and EBL are the RAM images which are injected to the device when the 84 4) Once EBL is injected successfully, then the actual firmware flashing takes
|
/openbmc/openbmc/poky/meta/conf/ |
H A D | abi_version.conf | 10 # HASHEQUIV_HASH_VERSION is injected into the output hash calculation used by
|
/openbmc/linux/Documentation/fault-injection/ |
H A D | fault-injection.rst | 107 injected. '0' means no messages; '1' will print only a single 125 stacktrace walking. Failure is injected only if some caller 154 specifies the minimum page allocation order to be injected 232 that the fault setup with a previous write to this file was injected. 233 A positive integer N indicates that the fault wasn't yet injected.
|
/openbmc/linux/Documentation/virt/kvm/devices/ |
H A D | s390_flic.rst | 26 Passes a buffer and length into the kernel which are then injected into 50 interrupts. No interrupts are injected into the guest.
|
/openbmc/webui-vue/public/ |
H A D | index.html | 16 <!-- built files will be auto injected -->
|
/openbmc/linux/tools/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 336 __u8 injected; member 343 __u8 injected; member 349 __u8 injected; member
|
/openbmc/linux/arch/x86/kernel/cpu/sgx/ |
H A D | virt.c | 324 * @trapnr: trap number injected to guest in case of ECREATE error 328 * which should be injected to guest in case of any ECREATE error. 397 * @trapnr: trap number injected to guest in case of EINIT error
|
/openbmc/linux/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 336 __u8 injected; member 343 __u8 injected; member 349 __u8 injected; member
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/qad/ |
H A D | qad_git.bb | 4 intervention as Q.A.D allows inputs to be injected via http/https requests. \
|
/openbmc/linux/net/mac80211/ |
H A D | wme.c | 207 /* don't overwrite the QoS field of injected frames */ in ieee80211_set_qos_hdr() 209 /* do take into account Ack policy of injected frames */ in ieee80211_set_qos_hdr()
|
/openbmc/qemu/block/ |
H A D | copy-before-write.h | 4 * The driver performs Copy-Before-Write (CBW) operation: it is injected above
|