search for: fetch_cod

Displaying 2 results from an estimated 2 matches for "fetch_cod".

Did you mean: fetch_code
2008 Mar 28
0
[14/17][PATCH] kvm/ia64: Add guest interruption injection support.
...gt;cr_iip; >+ /* >+ * When the FP trap occurs, the trapping instruction is >completed. >+ * If ipsr.ri == 0, there is the trapping instruction in >previous >+ * bundle. >+ */ >+ if (!fp_fault && (ia64_psr(regs)->ri == 0)) >+ fault_ip -= 16; >+ >+ if (fetch_code(v, fault_ip, &bundle)) >+ return -EAGAIN; >+ >+ if (!bundle.i64[0] && !bundle.i64[1]) { >+ return -EACCES; >+ } >+ >+ ret = vmm_fp_emulate(fp_fault, &bundle, &regs->cr_ipsr, >&regs->ar_fpsr, >+ &isr, &regs->pr, &regs->c...
2008 Mar 28
0
[14/17][PATCH] kvm/ia64: Add guest interruption injection support.
...gt;cr_iip; >+ /* >+ * When the FP trap occurs, the trapping instruction is >completed. >+ * If ipsr.ri == 0, there is the trapping instruction in >previous >+ * bundle. >+ */ >+ if (!fp_fault && (ia64_psr(regs)->ri == 0)) >+ fault_ip -= 16; >+ >+ if (fetch_code(v, fault_ip, &bundle)) >+ return -EAGAIN; >+ >+ if (!bundle.i64[0] && !bundle.i64[1]) { >+ return -EACCES; >+ } >+ >+ ret = vmm_fp_emulate(fp_fault, &bundle, &regs->cr_ipsr, >&regs->ar_fpsr, >+ &isr, &regs->pr, &regs->c...