WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

Re: [Xen-ia64-devel] [Query] fault injection

To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Subject: Re: [Xen-ia64-devel] [Query] fault injection
From: jeet <jeet_sat12@xxxxxxxxxxx>
Date: Wed, 25 Apr 2007 20:28:24 +0530 (IST)
Delivery-date: Wed, 25 Apr 2007 07:56:47 -0700
Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.co.in; h=Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Message-ID; b=yNsjy/sseIm5ah35VAkYerJA7XOPM/xTX7gFTwtkxHmn9FoJ4mwEMPSZOMMlIGZabkKmCCULtZ8gDp4lY/5u/vMXIHWiOdRcEm04FBqdyJYC+Cf8/4KqKkhBCOB+C8MuBrGojidM8FBlNsfHJqCtXE72hRn8iMFHClXD1ecY604=;
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi 

I got it.
It is there in vmx_hpw_miss().

Jeet

----- Original Message ----
From: jeet <jeet_sat12@xxxxxxxxxxx>
To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Sent: Wednesday, 25 April, 2007 10:43:45 AM
Subject: [Xen-ia64-devel] [Query] fault injection

Hi All

I have query regarding the fault injection in guest by vmm

As per intel manuals whenever any iva fault (dtlb miss etc ) is intercepted by 
VMM then all faults except virtualization fault 
are injected in guest.

But I was looking in dtlb_miss handler code for VMX domain but not able to find 
where in code it is injecting dtlb fault to vmx guest?


Another query is that is p2m table is implemented and being used here as in x86?

~Jeet



      Add online presence to your web pages, find out how here - 
http://messenger.yahoo.com/addpresence.php


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel





      Add online presence to your web pages, find out how here - 
http://messenger.yahoo.com/addpresence.php


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>