Home
last modified time | relevance | path

Searched refs:injected (Results 1 – 7 of 7) sorted by relevance

/qemu/linux-headers/asm-x86/
H A Dkvm.h335 __u8 injected; member
342 __u8 injected; member
348 __u8 injected; member
/qemu/qapi/
H A Dmisc-i386.json245 # @secret: the launch secret data to be injected encoded in base64
247 # @gpa: the guest physical address where secret will be injected.
H A Drun-state.json320 # @inject-nmi: a non-maskable interrupt is injected into the first
H A Dblock-core.json3822 # injected; defaults to "all read, write, write-zeroes, discard,
/qemu/docs/system/
H A Dreplay.rst174 injected into the network device. All interactions with network backend
/qemu/target/i386/kvm/
H A Dkvm.c745 /* If we get an action required MCE, it has been injected by KVM in kvm_arch_on_sigbus_vcpu()
766 "GUEST addr 0x%" HWADDR_PRIx " of type %s injected", in kvm_arch_on_sigbus_vcpu()
770 "GUEST addr 0x%" HWADDR_PRIx " of type %s injected", in kvm_arch_on_sigbus_vcpu()
3826 /* FRED injected-event data (0x2052). */ in kvm_msr_entry_add_vmx()
5041 events.exception.injected = env->exception_injected; in kvm_put_vcpu_events()
5045 events.interrupt.injected = (env->interrupt_injected >= 0); in kvm_put_vcpu_events()
5049 events.nmi.injected = env->nmi_injected; in kvm_put_vcpu_events()
5108 env->exception_injected = events.exception.injected; in kvm_get_vcpu_events()
5116 events.interrupt.injected ? events.interrupt.nr : -1; in kvm_get_vcpu_events()
5119 env->nmi_injected = events.nmi.injected; in kvm_get_vcpu_events()
[all...]
/qemu/docs/devel/
H A Dmulti-process.rst387 be injected into the guest. For example, a PCI device object may use