Home
last modified time | relevance | path

Searched refs:trap (Results 1 – 13 of 13) sorted by relevance

/xen-4.10.0-shim-comet/xen/arch/arm/arm32/
A Dentry.S114 #define DEFINE_TRAP_ENTRY(trap) \ argument
116 trap_##trap: \
124 b do_trap_##trap
126 #define DEFINE_TRAP_ENTRY_NOIRQ(trap) \ argument
128 trap_##trap: \
135 b do_trap_##trap
137 #define DEFINE_TRAP_ENTRY_NOABORT(trap) \ argument
139 trap_##trap: \
146 b do_trap_##trap
/xen-4.10.0-shim-comet/xen/arch/x86/
A Dtraps.c1563 int trap; in async_exception_cleanup() local
1577 trap = __scanbit(curr->async_exception_mask, VCPU_TRAP_NONE); in async_exception_cleanup()
1579 for ( trap = VCPU_TRAP_NONE + 1; trap <= VCPU_TRAP_LAST; ++trap ) in async_exception_cleanup()
1581 curr->async_exception_state(trap).old_mask) == (1 << trap) ) in async_exception_cleanup()
1583 if ( unlikely(trap > VCPU_TRAP_LAST) ) in async_exception_cleanup()
1590 curr->async_exception_mask = curr->async_exception_state(trap).old_mask; in async_exception_cleanup()
/xen-4.10.0-shim-comet/docs/man/
A Dxen-tscmode.pod.7186 instructions to trap. This trap can be detected by Xen, which can
280 non-privileged. HVM domains are configured to always trap this instruction
283 ("pvcpuid") and also trap to Xen. But apps in a PV guest that use a
284 cpuid instruction execute it directly, without a trap to Xen. As a result,
316 While this results in a slow trap, the information changes
/xen-4.10.0-shim-comet/tools/hotplug/Linux/
A Dxen-hotplug-common.sh.in54 trap sigerr ERR
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/svm/
A Dnestedsvm.c847 nsvm_vcpu_vmexit_event(struct vcpu *v, const struct x86_event *trap) in nsvm_vcpu_vmexit_event() argument
851 nestedsvm_vmexit_defer(v, VMEXIT_EXCEPTION_DE + trap->vector, in nsvm_vcpu_vmexit_event()
852 trap->error_code, trap->cr2); in nsvm_vcpu_vmexit_event()
A Dsvm.c1242 unsigned int trap = event->vector, type = event->type; in svm_emul_swint_injection() local
1256 idte_offset = trap * idte_size; in svm_emul_swint_injection()
1259 ec = (trap << 3) | X86_XEC_IDT | in svm_emul_swint_injection()
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/vmx/
A Dvmx.h585 void vmx_inject_extint(int trap, uint8_t source);
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/vmx/
A Dvmx.c1747 static void __vmx_inject_exception(int trap, int type, int error_code) in __vmx_inject_exception() argument
1762 MASK_INSR(trap, INTR_INFO_VECTOR_MASK); in __vmx_inject_exception()
1778 void vmx_inject_extint(int trap, uint8_t source) in vmx_inject_extint() argument
1789 MASK_INSR(trap, INTR_INFO_VECTOR_MASK), in vmx_inject_extint()
1794 __vmx_inject_exception(trap, X86_EVENTTYPE_EXT_INTR, in vmx_inject_extint()
/xen-4.10.0-shim-comet/docs/features/
A Dfeature-levelling.pandoc80 not trap, leaving Xen no direct ability to control the information returned.
/xen-4.10.0-shim-comet/tools/xentrace/
A Dformats142 0x00201003 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) trap [ eip = 0x%(1)08x, trapnr:error = 0x%(2)…
143 0x00201103 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) trap [ rip = 0x%(2)08x%(1)08x, trapnr:error =…
A Dxenalyze.c1316 struct cycle_summary trap[HVM_TRAP_MAX]; member
/xen-4.10.0-shim-comet/docs/misc/
A Dxen-command-line.markdown1619 1. dsb/isb on all EL1 -> EL2 trap entries to categorize SErrors correctly.
1838 > `= trap | native
1840 > Default: `trap`
1847 doesn't trap either instruction, running them in guest context. Setting
/xen-4.10.0-shim-comet/
A D.rootkeys91 423e7e8a96Rk0vPk2939cEa26JBpeQ freebsd-5.3-xen-sparse/i386-xen/i386-xen/trap.c
109 423e7e8csdWimnMBI2HxEDJ30L42kQ freebsd-5.3-xen-sparse/i386-xen/include/trap.h
640 42a6b4b9PjgANTP8Y8JFTToBrV9ssg tools/firmware/vmxassist/trap.S

Completed in 48 milliseconds