/linux-master/arch/arm64/kernel/ |
H A D | entry-common.c | 21 #include <asm/exception.h> 34 * instrumentable code, or any code which may trigger an exception. 67 * instrumentable code, or any code which may trigger an exception. 101 * instrumentable code, or any code which may trigger an exception. 120 * instrumentable code, or any code which may trigger an exception. 191 * code, instrumentable code, or any code which may trigger an exception. 209 * code, instrumentable code, or any code which may trigger an exception. 229 * Handle IRQ/context state management when entering a debug exception from 231 * kernel code, instrumentable code, or any code which may trigger an exception. 244 * Handle IRQ/context state management when exiting a debug exception fro [all...] |
H A D | traps.c | 40 #include <asm/exception.h> 232 panic("%s: Fatal exception in interrupt", str); 234 panic("%s: Fatal exception", str); 256 pr_info("%s[%d]: unhandled exception: ", tsk->comm, task_pid_nr(tsk)); 365 * If we were single stepping, we want to get the step exception after 511 * Unexpected FPAC exception in the kernel: kill the task before it 870 "Bad EL0 synchronous exception"); 885 pr_emerg("Insufficient stack space to handle exception!"); 938 * The CPU can't make progress. The exception may have 970 * unexpected debug exception [all...] |
H A D | signal.c | 26 #include <asm/exception.h>
|
/linux-master/arch/arm/kernel/ |
H A D | traps.c | 32 #include <asm/exception.h> 47 "address exception", 352 panic("Fatal exception in interrupt"); 354 panic("Fatal exception"); 933 pr_emerg("Insufficient stack space to handle exception!");
|
/linux-master/drivers/irqchip/ |
H A D | irq-armada-370-xp.c | 33 #include <asm/exception.h>
|
H A D | irq-apple-aic.c | 61 #include <asm/exception.h>
|
H A D | irq-gic.c | 46 #include <asm/exception.h>
|
/linux-master/arch/m68k/fpsp040/ |
H A D | round.S | 504 btstb #E3,E_BYTE(%a6) |test for type E3 exception 505 beqs not_E3 |not type E3 exception
|
H A D | do_func.S | 169 fbeq t_dz2 |if = -1, divide by zero exception
|
H A D | satan.S | 397 fmovex X(%a6),%fp0 |last inst - possible exception set
|
H A D | srem_mod.S | 308 fmovex R(%a6),%fp0 | ...no exception
|
H A D | res_func.S | 13 | reportable exception in the conversion. 627 | No frestore is done unless an exception is to be reported. 1653 | ;if the operr exception is enabled. 1898 | Exceptions: Reports inexact 2 exception by setting USER_FPSR bits
|
/linux-master/arch/x86/kvm/vmx/ |
H A D | nested.c | 2861 * VM-entry exception error code, and the VM-entry instruction length. 2892 /* VM-entry exception error code */ 3387 * slightly different). It also specifies what exception to inject otherwise. 3784 * event results in a double-fault exception". It's unclear why the 3786 * while vectoring a different exception (injected events are never 3799 } else if (vcpu->arch.exception.injected) { 3800 nr = vcpu->arch.exception.vector; 3810 if (vcpu->arch.exception.has_error_code) { 3813 vcpu->arch.exception.error_code; 3931 * chooses to inject the exception bac [all...] |
H A D | vmx.c | 894 * certain exception bitmap, we must trap the same exceptions and pass 1756 * any #DB exception pending delivery must be a debug-trap of lower 1761 (!vcpu->arch.exception.pending || 1762 vcpu->arch.exception.vector == DB_VECTOR) && 1793 struct kvm_queued_exception *ex = &vcpu->arch.exception; 2191 * exception bitmap to trap #NM for proper virtualization 5099 * Update instruction length as we may reinject the exception 5196 * Queue the exception here instead of in handle_nm_fault_irqoff(). 5315 kvm_run->debug.arch.exception = ex_no; 5333 kvm_run->ex.exception 8004 vmx_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument [all...] |
/linux-master/drivers/gpu/drm/amd/amdkfd/ |
H A D | cwsr_trap_handler_gfx9.asm | 49 var SINGLE_STEP_MISSED_WORKAROUND = (ASIC_FAMILY <= CHIP_ALDEBARAN) //workaround for lost MODE.DEBUG_EN exception when SAVECTX raised 228 // Let second-level handle non-SAVECTX exception or trap. 265 // Prioritize single step exception over context save.
|
/linux-master/arch/arm64/kvm/ |
H A D | arm.c | 1520 for (i = 0; i < ARRAY_SIZE(events->exception.pad); i++) 1521 if (events->exception.pad[i])
|
/linux-master/arch/powerpc/mm/nohash/ |
H A D | tlb_low_64e.S | 17 #include <asm/exception-64e.h> 596 * info by writing a crazy value in ESR in our exception frame 598 li r14,-1 /* store to exception frame is done later */ 642 * r12 = TLB exception frame in PACA 748 * r12 = TLB exception frame in PACA 860 * relevant information in the first exception frame in the PACA. 949 li r14,-1 /* store to exception frame is done later */ 990 * r12 = TLB exception frame in PACA 1100 * r12 = TLB exception frame in PACA
|
/linux-master/arch/powerpc/kvm/ |
H A D | bookehv_interrupts.S | 22 #include <asm/exception-64e.h> 97 * Make sure CE/ME/RI are set (if appropriate for exception type) 101 * appropriate for the exception type). 246 * Only bolted TLB miss exception handlers are supported for now 421 /* Enable MAS register updates via exception */ 584 /* Disable MAS register updates via exception */
|
/linux-master/fs/nfs/ |
H A D | pnfs.h | 251 struct nfs4_exception *exception);
|
/linux-master/arch/arm64/mm/ |
H A D | fault.c | 34 #include <asm/exception.h> 458 * exception level). Fail safe by not providing an ESR 857 arm64_notify_die("SP/PC alignment exception", regs, SIGBUS, BUS_ADRALN, 891 * In debug exception context, we explicitly disable preemption despite 894 * accidentally schedule in exception context and it will force a warning
|
/linux-master/include/uapi/linux/ |
H A D | kvm.h | 229 __u32 exception; member in struct:kvm_run::__anon894::__anon897
|
/linux-master/arch/loongarch/kernel/ |
H A D | traps.c | 37 #include <asm/exception.h> 427 panic("Fatal exception in interrupt"); 430 panic("Fatal exception"); 513 if (notify_die(DIE_FP, "FP exception", regs, 0, current->thread.trap_nr, 521 die_if_kernel("FP exception in kernel code", regs); 1009 * BTD (Binary Translation Disable exception) can be triggered 1044 pr_err("Caught reserved exception %u on pid:%d [%s] - should not happen\n", 1046 die_if_kernel("do_reserved exception", regs); 1057 pr_err("Cache error exception:\n"); 1137 /* Initialise exception handler [all...] |
/linux-master/tools/include/uapi/linux/ |
H A D | kvm.h | 229 __u32 exception; member in struct:kvm_run::__anon162::__anon165
|
/linux-master/arch/x86/kvm/svm/ |
H A D | svm.c | 419 * NextRIP, e.g. if KVM intercepted an exception that occurred while 424 * Drop the exception/interrupt if emulation fails and effectively 459 struct kvm_queued_exception *ex = &vcpu->arch.exception; 2092 kvm_run->debug.arch.exception = DB_VECTOR; 2106 kvm_run->debug.arch.exception = BP_VECTOR; 3878 * problem (IRET or exception injection or interrupt shadow) 3983 * associated with the original soft exception/interrupt. next_rip is 3987 * the same event, i.e. if the event is a soft exception/interrupt, 3995 * injecting the soft exception/interrupt. That advancement needs to 4051 * Never re-inject a #VC exception 4431 svm_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument [all...] |
/linux-master/arch/m68k/ifpsp060/src/ |
H A D | isp.S | 309 set ichk_flg, 0x10 # chk exception flag 316 set ichk_bit, 0x4 # chk exception bit 333 # "Unimplemented Integer Instruction" exception in an operating # 345 # _real_trace() - "callout" for Trace exception # 346 # _real_chk() - "callout" for Chk exception # 347 # _real_divbyzero() - "callout" for DZ exception # 348 # _real_access() - "callout" for access error exception # 354 # If Trace exception: # 356 # If Chk exception: # 358 # If DZ exception [all...] |