Function report |
Source Code:arch\x86\kernel\traps.c |
Create Date:2022-07-28 07:31:52 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:In IST context, we explicitly disable preemption. This serves two* purposes: it makes it much less likely that we would accidentally* schedule in IST context and it will force a warning if we somehow* manage to schedule by accident.
Proto:void ist_enter(struct pt_regs *regs)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
struct pt_regs * | regs |
94 | Else |
101 | rcu_nmi_enter() |
Name | Describe |
---|---|
do_double_fault | Runs on an IST stack for x86_64 and on a special task stack for x86_32.* On x86_64, this is more or less a normal kernel entry. Notwithstanding the* SDM's warnings about double faults being unrecoverable, returning works as* expected |
do_int3 | |
do_debug | Our handling of the processor debug registers is non-trivial.* We do not clear them on entry and exit from the kernel. Therefore* it is possible to get a watchpoint trap here from inside the kernel.* However, the code in |
do_machine_check | The actual machine check handler. This only handles real* exceptions when something got corrupted coming in through int 18.* This is executed in NMI context not subject to normal locking rules. This* implies that most kernel services cannot be safely used |
winchip_machine_check | Machine check handler for WinChip C6: |
pentium_machine_check | Machine check handler for Pentium class Intel CPUs: |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |