Searched refs:trap (Results 1 – 13 of 13) sorted by relevance
/xen-4.10.0-shim-comet/xen/arch/arm/arm32/ |
A D | entry.S | 114 #define DEFINE_TRAP_ENTRY(trap) \ argument 116 trap_##trap: \ 124 b do_trap_##trap 126 #define DEFINE_TRAP_ENTRY_NOIRQ(trap) \ argument 128 trap_##trap: \ 135 b do_trap_##trap 137 #define DEFINE_TRAP_ENTRY_NOABORT(trap) \ argument 139 trap_##trap: \ 146 b do_trap_##trap
|
/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | traps.c | 1563 int trap; in async_exception_cleanup() local 1577 trap = __scanbit(curr->async_exception_mask, VCPU_TRAP_NONE); in async_exception_cleanup() 1579 for ( trap = VCPU_TRAP_NONE + 1; trap <= VCPU_TRAP_LAST; ++trap ) in async_exception_cleanup() 1581 curr->async_exception_state(trap).old_mask) == (1 << trap) ) in async_exception_cleanup() 1583 if ( unlikely(trap > VCPU_TRAP_LAST) ) in async_exception_cleanup() 1590 curr->async_exception_mask = curr->async_exception_state(trap).old_mask; in async_exception_cleanup()
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xen-tscmode.pod.7 | 186 instructions to trap. This trap can be detected by Xen, which can 280 non-privileged. HVM domains are configured to always trap this instruction 283 ("pvcpuid") and also trap to Xen. But apps in a PV guest that use a 284 cpuid instruction execute it directly, without a trap to Xen. As a result, 316 While this results in a slow trap, the information changes
|
/xen-4.10.0-shim-comet/tools/hotplug/Linux/ |
A D | xen-hotplug-common.sh.in | 54 trap sigerr ERR
|
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/svm/ |
A D | nestedsvm.c | 847 nsvm_vcpu_vmexit_event(struct vcpu *v, const struct x86_event *trap) in nsvm_vcpu_vmexit_event() argument 851 nestedsvm_vmexit_defer(v, VMEXIT_EXCEPTION_DE + trap->vector, in nsvm_vcpu_vmexit_event() 852 trap->error_code, trap->cr2); in nsvm_vcpu_vmexit_event()
|
A D | svm.c | 1242 unsigned int trap = event->vector, type = event->type; in svm_emul_swint_injection() local 1256 idte_offset = trap * idte_size; in svm_emul_swint_injection() 1259 ec = (trap << 3) | X86_XEC_IDT | in svm_emul_swint_injection()
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/vmx/ |
A D | vmx.h | 585 void vmx_inject_extint(int trap, uint8_t source);
|
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/vmx/ |
A D | vmx.c | 1747 static void __vmx_inject_exception(int trap, int type, int error_code) in __vmx_inject_exception() argument 1762 MASK_INSR(trap, INTR_INFO_VECTOR_MASK); in __vmx_inject_exception() 1778 void vmx_inject_extint(int trap, uint8_t source) in vmx_inject_extint() argument 1789 MASK_INSR(trap, INTR_INFO_VECTOR_MASK), in vmx_inject_extint() 1794 __vmx_inject_exception(trap, X86_EVENTTYPE_EXT_INTR, in vmx_inject_extint()
|
/xen-4.10.0-shim-comet/docs/features/ |
A D | feature-levelling.pandoc | 80 not trap, leaving Xen no direct ability to control the information returned.
|
/xen-4.10.0-shim-comet/tools/xentrace/ |
A D | formats | 142 0x00201003 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) trap [ eip = 0x%(1)08x, trapnr:error = 0x%(2)… 143 0x00201103 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) trap [ rip = 0x%(2)08x%(1)08x, trapnr:error =…
|
A D | xenalyze.c | 1316 struct cycle_summary trap[HVM_TRAP_MAX]; member
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | xen-command-line.markdown | 1619 1. dsb/isb on all EL1 -> EL2 trap entries to categorize SErrors correctly. 1838 > `= trap | native 1840 > Default: `trap` 1847 doesn't trap either instruction, running them in guest context. Setting
|
/xen-4.10.0-shim-comet/ |
A D | .rootkeys | 91 423e7e8a96Rk0vPk2939cEa26JBpeQ freebsd-5.3-xen-sparse/i386-xen/i386-xen/trap.c 109 423e7e8csdWimnMBI2HxEDJ30L42kQ freebsd-5.3-xen-sparse/i386-xen/include/trap.h 640 42a6b4b9PjgANTP8Y8JFTToBrV9ssg tools/firmware/vmxassist/trap.S
|
Completed in 48 milliseconds