| /kernel/linux/linux-6.6/Documentation/fault-injection/ |
| D | fault-injection.rst | 2 Fault injection capabilities infrastructure 5 See also drivers/md/md-faulty.c and "every_nth" module option for scsi_debug. 8 Available fault injection capabilities 9 -------------------------------------- 11 - failslab 15 - fail_page_alloc 19 - fail_usercopy 23 - fail_futex 25 injects futex deadlock and uaddr fault errors. 27 - fail_sunrpc [all …]
|
| D | notifier-error-inject.rst | 4 Notifier error injection provides the ability to inject artificial errors to 15 ---------------------------------- 18 /sys/kernel/debug/notifier-error-inject/pm/actions/<notifier event>/error 26 Example: Inject PM suspend error (-12 = -ENOMEM):: 28 # cd /sys/kernel/debug/notifier-error-inject/pm/ 29 # echo -12 > actions/PM_SUSPEND_PREPARE/error 34 ---------------------------------------------- 37 /sys/kernel/debug/notifier-error-inject/memory/actions/<notifier event>/error 44 Example: Inject memory hotplug offline error (-12 == -ENOMEM):: 46 # cd /sys/kernel/debug/notifier-error-inject/memory [all …]
|
| D | index.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 fault-injection 10 fault-injection 11 notifier-error-inject 12 nvme-fault-injection 13 provoke-crashes
|
| D | nvme-fault-injection.rst | 1 NVMe Fault Injection 3 Linux's fault injection framework provides a systematic way to support 10 Following examples show how to inject an error into the nvme. 16 Example 1: Inject default status code with no retry 17 --------------------------------------------------- 34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2 68 EXT4-fs error (device nvme0n1): ext4_find_entry:1436: 71 Example 2: Inject default status code with retry 72 ------------------------------------------------ 92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4 [all …]
|
| /kernel/linux/linux-5.10/Documentation/fault-injection/ |
| D | fault-injection.rst | 2 Fault injection capabilities infrastructure 5 See also drivers/md/md-faulty.c and "every_nth" module option for scsi_debug. 8 Available fault injection capabilities 9 -------------------------------------- 11 - failslab 15 - fail_page_alloc 19 - fail_usercopy 23 - fail_futex 25 injects futex deadlock and uaddr fault errors. 27 - fail_make_request [all …]
|
| D | notifier-error-inject.rst | 4 Notifier error injection provides the ability to inject artificial errors to 15 ---------------------------------- 18 /sys/kernel/debug/notifier-error-inject/pm/actions/<notifier event>/error 26 Example: Inject PM suspend error (-12 = -ENOMEM):: 28 # cd /sys/kernel/debug/notifier-error-inject/pm/ 29 # echo -12 > actions/PM_SUSPEND_PREPARE/error 34 ---------------------------------------------- 37 /sys/kernel/debug/notifier-error-inject/memory/actions/<notifier event>/error 44 Example: Inject memory hotplug offline error (-12 == -ENOMEM):: 46 # cd /sys/kernel/debug/notifier-error-inject/memory [all …]
|
| D | index.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 fault-injection 10 fault-injection 11 notifier-error-inject 12 nvme-fault-injection 13 provoke-crashes
|
| D | nvme-fault-injection.rst | 1 NVMe Fault Injection 3 Linux's fault injection framework provides a systematic way to support 10 Following examples show how to inject an error into the nvme. 16 Example 1: Inject default status code with no retry 17 --------------------------------------------------- 34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2 68 EXT4-fs error (device nvme0n1): ext4_find_entry:1436: 71 Example 2: Inject default status code with retry 72 ------------------------------------------------ 92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4 [all …]
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/misc/ |
| D | xlnx,tmr-inject.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/misc/xlnx,tmr-inject.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Xilinx Triple Modular Redundancy(TMR) Inject IP 10 - Appana Durga Kedareswara rao <appana.durga.kedareswara.rao@amd.com> 13 The Triple Modular Redundancy(TMR) Inject core provides functional fault 15 possibility to verify that the TMR subsystem error detection and fault 21 - xlnx,tmr-inject-1.0 35 - compatible [all …]
|
| /kernel/linux/linux-6.6/drivers/misc/ |
| D | xilinx_tmr_inject.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Driver for Xilinx TMR Inject IP. 8 * This driver is developed for TMR Inject IP,The Triple Modular Redundancy(TMR) 9 * Inject provides fault injection. 16 #include <linux/fault-inject.h> 18 /* TMR Inject Register offsets */ 33 * struct xtmr_inject_dev - Driver data for TMR Inject 45 MODULE_PARM_DESC(inject_request, "default fault injection attributes"); 52 iowrite32(value, xtmr_inject->regs + addr); in xtmr_inject_write() 58 return ioread32(xtmr_inject->regs + addr); in xtmr_inject_read() [all …]
|
| /kernel/linux/linux-6.6/arch/arm64/kvm/ |
| D | inject_fault.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Fault injection for both 32 and 64bit guests. 5 * Copyright (C) 2012,2013 - ARM Ltd 9 * Copyright (C) 2012 - Virtual Open Systems and Columbia University 74 * an AArch32 fault, it means we managed to trap an EL0 fault. in inject_abt64() 159 * kvm_inject_dabt - inject a data abort into the guest 175 * kvm_inject_pabt - inject a prefetch abort into the guest 204 * Size Fault at level 0, as if exceeding PARange. in kvm_inject_size_fault() 206 * Non-LPAE guests will only get the external abort, as there in kvm_inject_size_fault() 219 * kvm_inject_undefined - inject an undefined instruction into the guest [all …]
|
| /kernel/linux/linux-5.10/lib/ |
| D | fault-inject-usercopy.c | 1 // SPDX-License-Identifier: GPL-2.0-only 2 #include <linux/fault-inject.h> 3 #include <linux/fault-inject-usercopy.h>
|
| D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst 39 int "Default console loglevel (1-15)" 49 Note: This does not affect the log level of un-prefixed printk() 54 int "quiet console loglevel (1-15)" 65 int "Default message log level (1-7)" 71 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks 107 enabled/disabled based on various levels of scope - per source file, 147 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' > 151 nullarbor:~ # echo -n 'file svcsock.c +p' > [all …]
|
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 6 ccflags-remove-$(CONFIG_FUNCTION_TRACER) += $(CC_FLAGS_FTRACE) 8 # These files are disabled because they produce lots of non-interesting and/or 16 KCOV_INSTRUMENT_fault-inject.o := n 19 # Use -ffreestanding to ensure that the compiler does not try to "optimize" 21 CFLAGS_string.o := -ffreestanding 27 CFLAGS_string.o += -fno-stack-protector 33 lib-y := ctype.o string.o vsprintf.o cmdline.o \ 34 rbtree.o radix-tree.o timerqueue.o xarray.o \ 41 lib-$(CONFIG_PRINTK) += dump_stack.o [all …]
|
| /kernel/linux/linux-6.6/lib/ |
| D | fault-inject-usercopy.c | 1 // SPDX-License-Identifier: GPL-2.0-only 2 #include <linux/fault-inject.h> 3 #include <linux/fault-inject-usercopy.h>
|
| D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst 50 int "Default console loglevel (1-15)" 60 Note: This does not affect the log level of un-prefixed printk() 65 int "quiet console loglevel (1-15)" 76 int "Default message log level (1-7)" 82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks 118 enabled/disabled based on various levels of scope - per source file, 158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' > 162 nullarbor:~ # echo -n 'file svcsock.c +p' > [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/kvm/ |
| D | inject_fault.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Fault injection for both 32 and 64bit guests. 5 * Copyright (C) 2012,2013 - ARM Ltd 9 * Copyright (C) 2012 - Virtual Open Systems and Columbia University 32 * The EL passed to this function *must* be a non-secure, privileged mode with 40 * For the SPSR_ELx layout for AArch64, see ARM DDI 0487E.a page C5-429. 41 * For the SPSR_ELx layout for AArch32, see ARM DDI 0487E.a page C5-426. 84 // TODO: TCO (if/when ARMv8.5-MemTag is exposed to guests) in enter_exception64() 89 // See ARM DDI 0487E.a, page D5-2579. in enter_exception64() 92 // SCTLR_ELx.SPAN is RES1 when ARMv8.1-PAN is not implemented in enter_exception64() [all …]
|
| /kernel/linux/linux-6.6/drivers/ufs/core/ |
| D | ufs-fault-injection.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 5 #include <linux/fault-inject.h> 7 #include "ufs-fault-injection.h" 20 * For more details about fault injection, please refer to 21 * Documentation/fault-injection/fault-injection.rst. 26 "Fault injection. trigger_eh=<interval>,<probability>,<space>,<times>"); 32 "Fault injection. timeout=<interval>,<probability>,<space>,<times>"); 37 const char *fault_str = kp->arg; in ufs_fault_get() 46 if (kp->arg == g_trigger_eh_str) in ufs_fault_set() 48 else if (kp->arg == g_timeout_str) in ufs_fault_set() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/ |
| D | nested_exceptions_test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 18 /* Arbitrary 32-bit error code injected by this test. */ 34 * Bit '1' is set if the fault occurred when looking up a descriptor in the 48 * led to the double fault. 79 struct vmcb *vmcb = svm->vmcb; in svm_run_l2() 80 struct vmcb_control_area *ctrl = &vmcb->control; in svm_run_l2() 82 vmcb->save.rip = (u64)l2_code; in svm_run_l2() 83 run_guest(vmcb, svm->vmcb_gpa); in svm_run_l2() 88 GUEST_ASSERT_EQ(ctrl->exit_code, (SVM_EXIT_EXCP_BASE + vector)); in svm_run_l2() 89 GUEST_ASSERT_EQ(ctrl->exit_info_1, error_code); in svm_run_l2() [all …]
|
| /kernel/linux/linux-6.6/arch/x86/kvm/vmx/ |
| D | sgx.c | 1 // SPDX-License-Identifier: GPL-2.0 28 bool fault; in sgx_get_encls_gva() local 30 /* Skip vmcs.GUEST_DS retrieval for 64-bit mode to avoid VMREADs. */ in sgx_get_encls_gva() 38 fault = true; in sgx_get_encls_gva() 40 fault = is_noncanonical_address(*gva, vcpu); in sgx_get_encls_gva() 43 fault = (s.unusable) || in sgx_get_encls_gva() 47 (((u64)*gva + size - 1) > s.limit + 1)); in sgx_get_encls_gva() 49 if (fault) in sgx_get_encls_gva() 51 return fault ? -EINVAL : 0; in sgx_get_encls_gva() 67 return -EFAULT; in sgx_read_hva() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/fault-injection/ |
| D | failcmd.sh | 2 # SPDX-License-Identifier: GPL-2.0 5 # failcmd.sh - run a command with injecting slab/page allocation failures 8 # failcmd.sh --help 12 # Run command with injecting slab/page allocation failures by fault 24 -p percent 25 --probability=percent 29 -t value 30 --times=value 34 --oom-kill-allocating-task=value 39 -h, --help [all …]
|
| /kernel/linux/linux-6.6/tools/testing/fault-injection/ |
| D | failcmd.sh | 2 # SPDX-License-Identifier: GPL-2.0 5 # failcmd.sh - run a command with injecting slab/page allocation failures 8 # failcmd.sh --help 12 # Run command with injecting slab/page allocation failures by fault 24 -p percent 25 --probability=percent 29 -t value 30 --times=value 34 --oom-kill-allocating-task=value 39 -h, --help [all …]
|
| /kernel/linux/linux-5.10/mm/ |
| D | failslab.c | 1 // SPDX-License-Identifier: GPL-2.0 2 #include <linux/fault-inject.h> 19 /* No fault-injection for bootstrap cache */ in __should_failslab() 30 if (failslab.cache_filter && !(s->flags & SLAB_FAILSLAB)) in __should_failslab() 33 return should_fail(&failslab.attr, s->object_size); in __should_failslab() 52 debugfs_create_bool("ignore-gfp-wait", mode, dir, in failslab_debugfs_init() 54 debugfs_create_bool("cache-filter", mode, dir, in failslab_debugfs_init()
|
| /kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/ |
| D | fault.h | 1 /* SPDX-License-Identifier: GPL-2.0 or BSD-3-Clause */ 9 #include <linux/fault-inject.h> 20 struct fault { struct
|
| /kernel/linux/linux-5.10/Documentation/vm/ |
| D | hwpoison.rst | 43 The code consists of a the high level handler in mm/memory-failure.c, 48 of applications. KVM support requires a recent qemu-kvm release. 51 KVM can inject the machine check into the guest with the proper 113 * madvise(MADV_HWPOISON, ....) (as root) - Poison a page in the 116 * hwpoison-inject module through debugfs ``/sys/kernel/debug/hwpoison/`` 118 corrupt-pfn 119 Inject hwpoison fault at PFN echoed into this file. This does 122 unpoison-pfn 123 Software-unpoison page at PFN echoed into this file. This way 130 corrupt-filter-dev-major, corrupt-filter-dev-minor [all …]
|