Home
last modified time | relevance | path

Searched +full:fault +full:- +full:inject (Results 1 – 25 of 166) sorted by relevance

1234567

/kernel/linux/linux-6.6/Documentation/fault-injection/
Dfault-injection.rst2 Fault injection capabilities infrastructure
5 See also drivers/md/md-faulty.c and "every_nth" module option for scsi_debug.
8 Available fault injection capabilities
9 --------------------------------------
11 - failslab
15 - fail_page_alloc
19 - fail_usercopy
23 - fail_futex
25 injects futex deadlock and uaddr fault errors.
27 - fail_sunrpc
[all …]
Dnotifier-error-inject.rst4 Notifier error injection provides the ability to inject artificial errors to
15 ----------------------------------
18 /sys/kernel/debug/notifier-error-inject/pm/actions/<notifier event>/error
26 Example: Inject PM suspend error (-12 = -ENOMEM)::
28 # cd /sys/kernel/debug/notifier-error-inject/pm/
29 # echo -12 > actions/PM_SUSPEND_PREPARE/error
34 ----------------------------------------------
37 /sys/kernel/debug/notifier-error-inject/memory/actions/<notifier event>/error
44 Example: Inject memory hotplug offline error (-12 == -ENOMEM)::
46 # cd /sys/kernel/debug/notifier-error-inject/memory
[all …]
Dindex.rst1 .. SPDX-License-Identifier: GPL-2.0
4 fault-injection
10 fault-injection
11 notifier-error-inject
12 nvme-fault-injection
13 provoke-crashes
Dnvme-fault-injection.rst1 NVMe Fault Injection
3 Linux's fault injection framework provides a systematic way to support
10 Following examples show how to inject an error into the nvme.
16 Example 1: Inject default status code with no retry
17 ---------------------------------------------------
34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2
68 EXT4-fs error (device nvme0n1): ext4_find_entry:1436:
71 Example 2: Inject default status code with retry
72 ------------------------------------------------
92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4
[all …]
/kernel/linux/linux-5.10/Documentation/fault-injection/
Dfault-injection.rst2 Fault injection capabilities infrastructure
5 See also drivers/md/md-faulty.c and "every_nth" module option for scsi_debug.
8 Available fault injection capabilities
9 --------------------------------------
11 - failslab
15 - fail_page_alloc
19 - fail_usercopy
23 - fail_futex
25 injects futex deadlock and uaddr fault errors.
27 - fail_make_request
[all …]
Dnotifier-error-inject.rst4 Notifier error injection provides the ability to inject artificial errors to
15 ----------------------------------
18 /sys/kernel/debug/notifier-error-inject/pm/actions/<notifier event>/error
26 Example: Inject PM suspend error (-12 = -ENOMEM)::
28 # cd /sys/kernel/debug/notifier-error-inject/pm/
29 # echo -12 > actions/PM_SUSPEND_PREPARE/error
34 ----------------------------------------------
37 /sys/kernel/debug/notifier-error-inject/memory/actions/<notifier event>/error
44 Example: Inject memory hotplug offline error (-12 == -ENOMEM)::
46 # cd /sys/kernel/debug/notifier-error-inject/memory
[all …]
Dindex.rst1 .. SPDX-License-Identifier: GPL-2.0
4 fault-injection
10 fault-injection
11 notifier-error-inject
12 nvme-fault-injection
13 provoke-crashes
Dnvme-fault-injection.rst1 NVMe Fault Injection
3 Linux's fault injection framework provides a systematic way to support
10 Following examples show how to inject an error into the nvme.
16 Example 1: Inject default status code with no retry
17 ---------------------------------------------------
34 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc8+ #2
68 EXT4-fs error (device nvme0n1): ext4_find_entry:1436:
71 Example 2: Inject default status code with retry
72 ------------------------------------------------
92 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.15.0-rc8+ #4
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/misc/
Dxlnx,tmr-inject.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/misc/xlnx,tmr-inject.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Xilinx Triple Modular Redundancy(TMR) Inject IP
10 - Appana Durga Kedareswara rao <appana.durga.kedareswara.rao@amd.com>
13 The Triple Modular Redundancy(TMR) Inject core provides functional fault
15 possibility to verify that the TMR subsystem error detection and fault
21 - xlnx,tmr-inject-1.0
35 - compatible
[all …]
/kernel/linux/linux-6.6/drivers/misc/
Dxilinx_tmr_inject.c1 // SPDX-License-Identifier: GPL-2.0
3 * Driver for Xilinx TMR Inject IP.
8 * This driver is developed for TMR Inject IP,The Triple Modular Redundancy(TMR)
9 * Inject provides fault injection.
16 #include <linux/fault-inject.h>
18 /* TMR Inject Register offsets */
33 * struct xtmr_inject_dev - Driver data for TMR Inject
45 MODULE_PARM_DESC(inject_request, "default fault injection attributes");
52 iowrite32(value, xtmr_inject->regs + addr); in xtmr_inject_write()
58 return ioread32(xtmr_inject->regs + addr); in xtmr_inject_read()
[all …]
/kernel/linux/linux-6.6/arch/arm64/kvm/
Dinject_fault.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Fault injection for both 32 and 64bit guests.
5 * Copyright (C) 2012,2013 - ARM Ltd
9 * Copyright (C) 2012 - Virtual Open Systems and Columbia University
74 * an AArch32 fault, it means we managed to trap an EL0 fault. in inject_abt64()
159 * kvm_inject_dabt - inject a data abort into the guest
175 * kvm_inject_pabt - inject a prefetch abort into the guest
204 * Size Fault at level 0, as if exceeding PARange. in kvm_inject_size_fault()
206 * Non-LPAE guests will only get the external abort, as there in kvm_inject_size_fault()
219 * kvm_inject_undefined - inject an undefined instruction into the guest
[all …]
/kernel/linux/linux-5.10/lib/
Dfault-inject-usercopy.c1 // SPDX-License-Identifier: GPL-2.0-only
2 #include <linux/fault-inject.h>
3 #include <linux/fault-inject-usercopy.h>
DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
39 int "Default console loglevel (1-15)"
49 Note: This does not affect the log level of un-prefixed printk()
54 int "quiet console loglevel (1-15)"
65 int "Default message log level (1-7)"
71 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
107 enabled/disabled based on various levels of scope - per source file,
147 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
151 nullarbor:~ # echo -n 'file svcsock.c +p' >
[all …]
DMakefile1 # SPDX-License-Identifier: GPL-2.0
6 ccflags-remove-$(CONFIG_FUNCTION_TRACER) += $(CC_FLAGS_FTRACE)
8 # These files are disabled because they produce lots of non-interesting and/or
16 KCOV_INSTRUMENT_fault-inject.o := n
19 # Use -ffreestanding to ensure that the compiler does not try to "optimize"
21 CFLAGS_string.o := -ffreestanding
27 CFLAGS_string.o += -fno-stack-protector
33 lib-y := ctype.o string.o vsprintf.o cmdline.o \
34 rbtree.o radix-tree.o timerqueue.o xarray.o \
41 lib-$(CONFIG_PRINTK) += dump_stack.o
[all …]
/kernel/linux/linux-6.6/lib/
Dfault-inject-usercopy.c1 // SPDX-License-Identifier: GPL-2.0-only
2 #include <linux/fault-inject.h>
3 #include <linux/fault-inject-usercopy.h>
DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
50 int "Default console loglevel (1-15)"
60 Note: This does not affect the log level of un-prefixed printk()
65 int "quiet console loglevel (1-15)"
76 int "Default message log level (1-7)"
82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
118 enabled/disabled based on various levels of scope - per source file,
158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
162 nullarbor:~ # echo -n 'file svcsock.c +p' >
[all …]
/kernel/linux/linux-5.10/arch/arm64/kvm/
Dinject_fault.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Fault injection for both 32 and 64bit guests.
5 * Copyright (C) 2012,2013 - ARM Ltd
9 * Copyright (C) 2012 - Virtual Open Systems and Columbia University
32 * The EL passed to this function *must* be a non-secure, privileged mode with
40 * For the SPSR_ELx layout for AArch64, see ARM DDI 0487E.a page C5-429.
41 * For the SPSR_ELx layout for AArch32, see ARM DDI 0487E.a page C5-426.
84 // TODO: TCO (if/when ARMv8.5-MemTag is exposed to guests) in enter_exception64()
89 // See ARM DDI 0487E.a, page D5-2579. in enter_exception64()
92 // SCTLR_ELx.SPAN is RES1 when ARMv8.1-PAN is not implemented in enter_exception64()
[all …]
/kernel/linux/linux-6.6/drivers/ufs/core/
Dufs-fault-injection.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 #include <linux/fault-inject.h>
7 #include "ufs-fault-injection.h"
20 * For more details about fault injection, please refer to
21 * Documentation/fault-injection/fault-injection.rst.
26 "Fault injection. trigger_eh=<interval>,<probability>,<space>,<times>");
32 "Fault injection. timeout=<interval>,<probability>,<space>,<times>");
37 const char *fault_str = kp->arg; in ufs_fault_get()
46 if (kp->arg == g_trigger_eh_str) in ufs_fault_set()
48 else if (kp->arg == g_timeout_str) in ufs_fault_set()
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/
Dnested_exceptions_test.c1 // SPDX-License-Identifier: GPL-2.0-only
18 /* Arbitrary 32-bit error code injected by this test. */
34 * Bit '1' is set if the fault occurred when looking up a descriptor in the
48 * led to the double fault.
79 struct vmcb *vmcb = svm->vmcb; in svm_run_l2()
80 struct vmcb_control_area *ctrl = &vmcb->control; in svm_run_l2()
82 vmcb->save.rip = (u64)l2_code; in svm_run_l2()
83 run_guest(vmcb, svm->vmcb_gpa); in svm_run_l2()
88 GUEST_ASSERT_EQ(ctrl->exit_code, (SVM_EXIT_EXCP_BASE + vector)); in svm_run_l2()
89 GUEST_ASSERT_EQ(ctrl->exit_info_1, error_code); in svm_run_l2()
[all …]
/kernel/linux/linux-6.6/arch/x86/kvm/vmx/
Dsgx.c1 // SPDX-License-Identifier: GPL-2.0
28 bool fault; in sgx_get_encls_gva() local
30 /* Skip vmcs.GUEST_DS retrieval for 64-bit mode to avoid VMREADs. */ in sgx_get_encls_gva()
38 fault = true; in sgx_get_encls_gva()
40 fault = is_noncanonical_address(*gva, vcpu); in sgx_get_encls_gva()
43 fault = (s.unusable) || in sgx_get_encls_gva()
47 (((u64)*gva + size - 1) > s.limit + 1)); in sgx_get_encls_gva()
49 if (fault) in sgx_get_encls_gva()
51 return fault ? -EINVAL : 0; in sgx_get_encls_gva()
67 return -EFAULT; in sgx_read_hva()
[all …]
/kernel/linux/linux-5.10/tools/testing/fault-injection/
Dfailcmd.sh2 # SPDX-License-Identifier: GPL-2.0
5 # failcmd.sh - run a command with injecting slab/page allocation failures
8 # failcmd.sh --help
12 # Run command with injecting slab/page allocation failures by fault
24 -p percent
25 --probability=percent
29 -t value
30 --times=value
34 --oom-kill-allocating-task=value
39 -h, --help
[all …]
/kernel/linux/linux-6.6/tools/testing/fault-injection/
Dfailcmd.sh2 # SPDX-License-Identifier: GPL-2.0
5 # failcmd.sh - run a command with injecting slab/page allocation failures
8 # failcmd.sh --help
12 # Run command with injecting slab/page allocation failures by fault
24 -p percent
25 --probability=percent
29 -t value
30 --times=value
34 --oom-kill-allocating-task=value
39 -h, --help
[all …]
/kernel/linux/linux-5.10/mm/
Dfailslab.c1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/fault-inject.h>
19 /* No fault-injection for bootstrap cache */ in __should_failslab()
30 if (failslab.cache_filter && !(s->flags & SLAB_FAILSLAB)) in __should_failslab()
33 return should_fail(&failslab.attr, s->object_size); in __should_failslab()
52 debugfs_create_bool("ignore-gfp-wait", mode, dir, in failslab_debugfs_init()
54 debugfs_create_bool("cache-filter", mode, dir, in failslab_debugfs_init()
/kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/
Dfault.h1 /* SPDX-License-Identifier: GPL-2.0 or BSD-3-Clause */
9 #include <linux/fault-inject.h>
20 struct fault { struct
/kernel/linux/linux-5.10/Documentation/vm/
Dhwpoison.rst43 The code consists of a the high level handler in mm/memory-failure.c,
48 of applications. KVM support requires a recent qemu-kvm release.
51 KVM can inject the machine check into the guest with the proper
113 * madvise(MADV_HWPOISON, ....) (as root) - Poison a page in the
116 * hwpoison-inject module through debugfs ``/sys/kernel/debug/hwpoison/``
118 corrupt-pfn
119 Inject hwpoison fault at PFN echoed into this file. This does
122 unpoison-pfn
123 Software-unpoison page at PFN echoed into this file. This way
130 corrupt-filter-dev-major, corrupt-filter-dev-minor
[all …]

1234567