/linux-master/drivers/irqchip/ |
H A D | irq-gic-v3-its.c | 38 #include <asm/exception.h>
|
H A D | irq-armada-370-xp.c | 33 #include <asm/exception.h>
|
/linux-master/arch/loongarch/mm/ |
H A D | fault.c | 28 #include <asm/exception.h>
|
H A D | tlb.c | 14 #include <asm/exception.h>
|
/linux-master/arch/arc/kernel/ |
H A D | head.S | 22 ; Setting up Vectror Table (in case exception happens in early boot
|
H A D | entry-arcv2.S | 31 VECTOR mem_service ; Mem exception 39 VECTOR EV_Trap ; Trap exception 182 # reenabled after we return from interrupt/exception.
|
/linux-master/arch/x86/kvm/ |
H A D | x86.c | 588 * In order to reflect the #DB exception payload in guest 656 * If the exception is destined for L2 and isn't being reinjected, 657 * morph it to a VM-Exit if L1 wants to intercept the exception. A 658 * previously injected exception is not checked because it was checked 660 * injected the exception, in which case it's exempt from interception. 669 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) { 673 * On VM-Entry, an exception can be pending if and only 680 vcpu->arch.exception.injected = true; 690 vcpu->arch.exception 7523 translate_nested_gpa(struct kvm_vcpu *vcpu, gpa_t gpa, u64 access, struct x86_exception *exception) argument 7538 kvm_mmu_gva_to_gpa_read(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument 7548 kvm_mmu_gva_to_gpa_write(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument 7560 kvm_mmu_gva_to_gpa_system(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument 7568 kvm_read_guest_virt_helper(gva_t addr, void *val, unsigned int bytes, struct kvm_vcpu *vcpu, u64 access, struct x86_exception *exception) argument 7600 kvm_fetch_guest_virt(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument 7627 kvm_read_guest_virt(struct kvm_vcpu *vcpu, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument 7645 emulator_read_std(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception, bool system) argument 7660 kvm_write_guest_virt_helper(gva_t addr, void *val, unsigned int bytes, struct kvm_vcpu *vcpu, u64 access, struct x86_exception *exception) argument 7690 emulator_write_std(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception, bool system) argument 7706 kvm_write_guest_virt_system(struct kvm_vcpu *vcpu, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument 7766 vcpu_mmio_gva_to_gpa(struct kvm_vcpu *vcpu, unsigned long gva, gpa_t *gpa, struct x86_exception *exception, bool write) argument 7880 emulator_read_write_onepage(unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception, struct kvm_vcpu *vcpu, const struct read_write_emulator_ops *ops) argument 7931 emulator_read_write(struct x86_emulate_ctxt *ctxt, unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception, const struct read_write_emulator_ops *ops) argument 7985 emulator_read_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception) argument 7995 emulator_write_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, const void *val, unsigned int bytes, struct x86_exception *exception) argument 8008 emulator_cmpxchg_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, const void *old, const void *new, unsigned int bytes, struct x86_exception *exception) argument [all...] |
H A D | trace.h | 373 TP_PROTO(unsigned exception, bool has_error, unsigned error_code, 375 TP_ARGS(exception, has_error, error_code, reinjected), 378 __field( u8, exception ) 385 __entry->exception = exception; 392 __print_symbolic(__entry->exception, kvm_trace_sym_exc), 429 TP_PROTO(unsigned write, u32 ecx, u64 data, bool exception), 430 TP_ARGS(write, ecx, data, exception), 436 __field( u8, exception ) 443 __entry->exception [all...] |
/linux-master/arch/x86/kvm/vmx/ |
H A D | vmx.c | 894 * certain exception bitmap, we must trap the same exceptions and pass 1756 * any #DB exception pending delivery must be a debug-trap of lower 1761 (!vcpu->arch.exception.pending || 1762 vcpu->arch.exception.vector == DB_VECTOR) && 1793 struct kvm_queued_exception *ex = &vcpu->arch.exception; 2191 * exception bitmap to trap #NM for proper virtualization 5099 * Update instruction length as we may reinject the exception 5196 * Queue the exception here instead of in handle_nm_fault_irqoff(). 5315 kvm_run->debug.arch.exception = ex_no; 5333 kvm_run->ex.exception 8004 vmx_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument [all...] |
/linux-master/arch/x86/kvm/svm/ |
H A D | svm.c | 419 * NextRIP, e.g. if KVM intercepted an exception that occurred while 424 * Drop the exception/interrupt if emulation fails and effectively 459 struct kvm_queued_exception *ex = &vcpu->arch.exception; 2092 kvm_run->debug.arch.exception = DB_VECTOR; 2106 kvm_run->debug.arch.exception = BP_VECTOR; 3878 * problem (IRET or exception injection or interrupt shadow) 3983 * associated with the original soft exception/interrupt. next_rip is 3987 * the same event, i.e. if the event is a soft exception/interrupt, 3995 * injecting the soft exception/interrupt. That advancement needs to 4051 * Never re-inject a #VC exception 4431 svm_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu.c | 4090 struct x86_exception *exception) 4092 if (exception) 4093 exception->error_code = 0; 4094 return kvm_translate_gpa(vcpu, mmu, vaddr, access, exception); 6134 * table. The main exception, handled here, is SVM's 32-bit NPT. The 6135 * other exception is for shadowing L1's 32-bit or PAE NPT on 64-bit 4088 nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gpa_t vaddr, u64 access, struct x86_exception *exception) argument
|
/linux-master/arch/x86/include/asm/ |
H A D | kvm_host.h | 454 struct x86_exception *exception); 843 struct kvm_queued_exception exception; member in struct:kvm_vcpu_arch 1745 struct x86_exception *exception); 2117 struct x86_exception *exception); 2119 struct x86_exception *exception); 2121 struct x86_exception *exception);
|
/linux-master/tools/include/uapi/linux/ |
H A D | kvm.h | 229 __u32 exception; member in struct:kvm_run::__anon162::__anon165
|
/linux-master/tools/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 285 __u32 exception; member in struct:kvm_debug_exit_arch 341 } exception; member in struct:kvm_vcpu_events
|
/linux-master/tools/arch/arm64/include/uapi/asm/ |
H A D | kvm.h | 192 } exception; member in struct:kvm_vcpu_events
|
/linux-master/arch/x86/include/uapi/asm/ |
H A D | kvm.h | 285 __u32 exception; member in struct:kvm_debug_exit_arch 341 } exception; member in struct:kvm_vcpu_events
|
/linux-master/arch/arm64/kvm/ |
H A D | arm.c | 1520 for (i = 0; i < ARRAY_SIZE(events->exception.pad); i++) 1521 if (events->exception.pad[i])
|
/linux-master/arch/loongarch/kernel/ |
H A D | traps.c | 37 #include <asm/exception.h> 427 panic("Fatal exception in interrupt"); 430 panic("Fatal exception"); 513 if (notify_die(DIE_FP, "FP exception", regs, 0, current->thread.trap_nr, 521 die_if_kernel("FP exception in kernel code", regs); 1009 * BTD (Binary Translation Disable exception) can be triggered 1044 pr_err("Caught reserved exception %u on pid:%d [%s] - should not happen\n", 1046 die_if_kernel("do_reserved exception", regs); 1057 pr_err("Cache error exception:\n"); 1137 /* Initialise exception handler [all...] |
H A D | unwind_orc.c | 5 #include <asm/exception.h>
|
H A D | genex.S | 69 .macro BUILD_HANDLER exception handler prep 71 SYM_CODE_START(handle_\exception) 82 SYM_CODE_END(handle_\exception) 84 SYM_DATA(unwind_hint_\exception, .word 668b - 666b)
|
/linux-master/arch/arm/kernel/ |
H A D | traps.c | 32 #include <asm/exception.h> 47 "address exception", 352 panic("Fatal exception in interrupt"); 354 panic("Fatal exception"); 933 pr_emerg("Insufficient stack space to handle exception!");
|
H A D | iwmmxt.S | 66 * called from prefetch exception handler with interrupts enabled 96 ret r9 @ normal exit from exception
|
/linux-master/tools/testing/selftests/kvm/x86_64/ |
H A D | sync_regs_test.c | 88 * Set an exception as pending *and* injected while KVM is processing events. 90 * requesting that an exception be injected. 97 WRITE_ONCE(events->exception.nr, UD_VECTOR); 102 WRITE_ONCE(events->exception.injected, 1); 103 WRITE_ONCE(events->exception.pending, 1); 112 * Set an invalid exception vector while KVM is processing events. KVM is 123 WRITE_ONCE(events->exception.nr, UD_VECTOR); 124 WRITE_ONCE(events->exception.pending, 1); 125 WRITE_ONCE(events->exception.nr, 255);
|
/linux-master/tools/crypto/ccp/ |
H A D | test_dbc.py | 56 self.assertEqual(error.exception.errno, 2) 85 self.assertEqual(error.exception.errno, 22) 94 self.assertEqual(error.exception.errno, 22) 103 self.assertEqual(error.exception.errno, 22) 111 self.assertEqual(error.exception.errno, 22) 119 self.assertEqual(error.exception.errno, 22) 144 self.assertEqual(error.exception.errno, 22) 151 self.assertEqual(error.exception.errno, 1) 157 self.assertEqual(error.exception.errno, 11) 163 self.assertEqual(error.exception [all...] |
/linux-master/include/uapi/linux/ |
H A D | kvm.h | 229 __u32 exception; member in struct:kvm_run::__anon894::__anon897
|