Searched refs:exception (Results 1 - 25 of 213) sorted by last modified time

123456789

/linux-master/drivers/irqchip/
H A Dirq-gic-v3-its.c38 #include <asm/exception.h>
H A Dirq-armada-370-xp.c33 #include <asm/exception.h>
/linux-master/arch/loongarch/mm/
H A Dfault.c28 #include <asm/exception.h>
H A Dtlb.c14 #include <asm/exception.h>
/linux-master/arch/arc/kernel/
H A Dhead.S22 ; Setting up Vectror Table (in case exception happens in early boot
H A Dentry-arcv2.S31 VECTOR mem_service ; Mem exception
39 VECTOR EV_Trap ; Trap exception
182 # reenabled after we return from interrupt/exception.
/linux-master/arch/x86/kvm/
H A Dx86.c588 * In order to reflect the #DB exception payload in guest
656 * If the exception is destined for L2 and isn't being reinjected,
657 * morph it to a VM-Exit if L1 wants to intercept the exception. A
658 * previously injected exception is not checked because it was checked
660 * injected the exception, in which case it's exempt from interception.
669 if (!vcpu->arch.exception.pending && !vcpu->arch.exception.injected) {
673 * On VM-Entry, an exception can be pending if and only
680 vcpu->arch.exception.injected = true;
690 vcpu->arch.exception
7523 translate_nested_gpa(struct kvm_vcpu *vcpu, gpa_t gpa, u64 access, struct x86_exception *exception) argument
7538 kvm_mmu_gva_to_gpa_read(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument
7548 kvm_mmu_gva_to_gpa_write(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument
7560 kvm_mmu_gva_to_gpa_system(struct kvm_vcpu *vcpu, gva_t gva, struct x86_exception *exception) argument
7568 kvm_read_guest_virt_helper(gva_t addr, void *val, unsigned int bytes, struct kvm_vcpu *vcpu, u64 access, struct x86_exception *exception) argument
7600 kvm_fetch_guest_virt(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument
7627 kvm_read_guest_virt(struct kvm_vcpu *vcpu, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument
7645 emulator_read_std(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception, bool system) argument
7660 kvm_write_guest_virt_helper(gva_t addr, void *val, unsigned int bytes, struct kvm_vcpu *vcpu, u64 access, struct x86_exception *exception) argument
7690 emulator_write_std(struct x86_emulate_ctxt *ctxt, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception, bool system) argument
7706 kvm_write_guest_virt_system(struct kvm_vcpu *vcpu, gva_t addr, void *val, unsigned int bytes, struct x86_exception *exception) argument
7766 vcpu_mmio_gva_to_gpa(struct kvm_vcpu *vcpu, unsigned long gva, gpa_t *gpa, struct x86_exception *exception, bool write) argument
7880 emulator_read_write_onepage(unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception, struct kvm_vcpu *vcpu, const struct read_write_emulator_ops *ops) argument
7931 emulator_read_write(struct x86_emulate_ctxt *ctxt, unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception, const struct read_write_emulator_ops *ops) argument
7985 emulator_read_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, void *val, unsigned int bytes, struct x86_exception *exception) argument
7995 emulator_write_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, const void *val, unsigned int bytes, struct x86_exception *exception) argument
8008 emulator_cmpxchg_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, const void *old, const void *new, unsigned int bytes, struct x86_exception *exception) argument
[all...]
H A Dtrace.h373 TP_PROTO(unsigned exception, bool has_error, unsigned error_code,
375 TP_ARGS(exception, has_error, error_code, reinjected),
378 __field( u8, exception )
385 __entry->exception = exception;
392 __print_symbolic(__entry->exception, kvm_trace_sym_exc),
429 TP_PROTO(unsigned write, u32 ecx, u64 data, bool exception),
430 TP_ARGS(write, ecx, data, exception),
436 __field( u8, exception )
443 __entry->exception
[all...]
/linux-master/arch/x86/kvm/vmx/
H A Dvmx.c894 * certain exception bitmap, we must trap the same exceptions and pass
1756 * any #DB exception pending delivery must be a debug-trap of lower
1761 (!vcpu->arch.exception.pending ||
1762 vcpu->arch.exception.vector == DB_VECTOR) &&
1793 struct kvm_queued_exception *ex = &vcpu->arch.exception;
2191 * exception bitmap to trap #NM for proper virtualization
5099 * Update instruction length as we may reinject the exception
5196 * Queue the exception here instead of in handle_nm_fault_irqoff().
5315 kvm_run->debug.arch.exception = ex_no;
5333 kvm_run->ex.exception
8004 vmx_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument
[all...]
/linux-master/arch/x86/kvm/svm/
H A Dsvm.c419 * NextRIP, e.g. if KVM intercepted an exception that occurred while
424 * Drop the exception/interrupt if emulation fails and effectively
459 struct kvm_queued_exception *ex = &vcpu->arch.exception;
2092 kvm_run->debug.arch.exception = DB_VECTOR;
2106 kvm_run->debug.arch.exception = BP_VECTOR;
3878 * problem (IRET or exception injection or interrupt shadow)
3983 * associated with the original soft exception/interrupt. next_rip is
3987 * the same event, i.e. if the event is a soft exception/interrupt,
3995 * injecting the soft exception/interrupt. That advancement needs to
4051 * Never re-inject a #VC exception
4431 svm_check_intercept(struct kvm_vcpu *vcpu, struct x86_instruction_info *info, enum x86_intercept_stage stage, struct x86_exception *exception) argument
[all...]
/linux-master/arch/x86/kvm/mmu/
H A Dmmu.c4090 struct x86_exception *exception)
4092 if (exception)
4093 exception->error_code = 0;
4094 return kvm_translate_gpa(vcpu, mmu, vaddr, access, exception);
6134 * table. The main exception, handled here, is SVM's 32-bit NPT. The
6135 * other exception is for shadowing L1's 32-bit or PAE NPT on 64-bit
4088 nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gpa_t vaddr, u64 access, struct x86_exception *exception) argument
/linux-master/arch/x86/include/asm/
H A Dkvm_host.h454 struct x86_exception *exception);
843 struct kvm_queued_exception exception; member in struct:kvm_vcpu_arch
1745 struct x86_exception *exception);
2117 struct x86_exception *exception);
2119 struct x86_exception *exception);
2121 struct x86_exception *exception);
/linux-master/tools/include/uapi/linux/
H A Dkvm.h229 __u32 exception; member in struct:kvm_run::__anon162::__anon165
/linux-master/tools/arch/x86/include/uapi/asm/
H A Dkvm.h285 __u32 exception; member in struct:kvm_debug_exit_arch
341 } exception; member in struct:kvm_vcpu_events
/linux-master/tools/arch/arm64/include/uapi/asm/
H A Dkvm.h192 } exception; member in struct:kvm_vcpu_events
/linux-master/arch/x86/include/uapi/asm/
H A Dkvm.h285 __u32 exception; member in struct:kvm_debug_exit_arch
341 } exception; member in struct:kvm_vcpu_events
/linux-master/arch/arm64/kvm/
H A Darm.c1520 for (i = 0; i < ARRAY_SIZE(events->exception.pad); i++)
1521 if (events->exception.pad[i])
/linux-master/arch/loongarch/kernel/
H A Dtraps.c37 #include <asm/exception.h>
427 panic("Fatal exception in interrupt");
430 panic("Fatal exception");
513 if (notify_die(DIE_FP, "FP exception", regs, 0, current->thread.trap_nr,
521 die_if_kernel("FP exception in kernel code", regs);
1009 * BTD (Binary Translation Disable exception) can be triggered
1044 pr_err("Caught reserved exception %u on pid:%d [%s] - should not happen\n",
1046 die_if_kernel("do_reserved exception", regs);
1057 pr_err("Cache error exception:\n");
1137 /* Initialise exception handler
[all...]
H A Dunwind_orc.c5 #include <asm/exception.h>
H A Dgenex.S69 .macro BUILD_HANDLER exception handler prep
71 SYM_CODE_START(handle_\exception)
82 SYM_CODE_END(handle_\exception)
84 SYM_DATA(unwind_hint_\exception, .word 668b - 666b)
/linux-master/arch/arm/kernel/
H A Dtraps.c32 #include <asm/exception.h>
47 "address exception",
352 panic("Fatal exception in interrupt");
354 panic("Fatal exception");
933 pr_emerg("Insufficient stack space to handle exception!");
H A Diwmmxt.S66 * called from prefetch exception handler with interrupts enabled
96 ret r9 @ normal exit from exception
/linux-master/tools/testing/selftests/kvm/x86_64/
H A Dsync_regs_test.c88 * Set an exception as pending *and* injected while KVM is processing events.
90 * requesting that an exception be injected.
97 WRITE_ONCE(events->exception.nr, UD_VECTOR);
102 WRITE_ONCE(events->exception.injected, 1);
103 WRITE_ONCE(events->exception.pending, 1);
112 * Set an invalid exception vector while KVM is processing events. KVM is
123 WRITE_ONCE(events->exception.nr, UD_VECTOR);
124 WRITE_ONCE(events->exception.pending, 1);
125 WRITE_ONCE(events->exception.nr, 255);
/linux-master/tools/crypto/ccp/
H A Dtest_dbc.py56 self.assertEqual(error.exception.errno, 2)
85 self.assertEqual(error.exception.errno, 22)
94 self.assertEqual(error.exception.errno, 22)
103 self.assertEqual(error.exception.errno, 22)
111 self.assertEqual(error.exception.errno, 22)
119 self.assertEqual(error.exception.errno, 22)
144 self.assertEqual(error.exception.errno, 22)
151 self.assertEqual(error.exception.errno, 1)
157 self.assertEqual(error.exception.errno, 11)
163 self.assertEqual(error.exception
[all...]
/linux-master/include/uapi/linux/
H A Dkvm.h229 __u32 exception; member in struct:kvm_run::__anon894::__anon897

Completed in 503 milliseconds

123456789