WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ppc-devel

[XenPPC] [xenppc-unstable] [IA64] VTI: set isr before injecting fault to

To: xen-ppc-devel@xxxxxxxxxxxxxxxxxxx
Subject: [XenPPC] [xenppc-unstable] [IA64] VTI: set isr before injecting fault to guest
From: Xen patchbot-xenppc-unstable <patchbot-xenppc-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Fri, 02 Jun 2006 17:56:34 +0000
Delivery-date: Fri, 02 Jun 2006 10:58:25 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ppc-devel-request@lists.xensource.com?subject=help>
List-id: Xen PPC development <xen-ppc-devel.lists.xensource.com>
List-post: <mailto:xen-ppc-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ppc-devel>, <mailto:xen-ppc-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ppc-devel>, <mailto:xen-ppc-devel-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-ppc-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-ppc-devel-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User awilliam@xxxxxxxxxxx
# Node ID e3d2411fb4868c95e1af593bfbd776bad6e8cfe2
# Parent  7ae164a41569e747932180f5c63c4512d6dce8d4
[IA64] VTI: set isr before injecting fault to guest

This patch intends to fix isr setting before injecting fault to it.
With this small fix, CPU2000 in VTi can pass now.

Signed-off-by: Kevin Tian <kevin.tian@xxxxxxxxx>
Signed-off-by: Zhang xiantao <xiantao.zhang@xxxxxxxxx>
---
 xen/arch/ia64/vmx/vmx_process.c |    1 +
 1 files changed, 1 insertion(+)

diff -r 7ae164a41569 -r e3d2411fb486 xen/arch/ia64/vmx/vmx_process.c
--- a/xen/arch/ia64/vmx/vmx_process.c   Wed May 31 11:27:50 2006 -0600
+++ b/xen/arch/ia64/vmx/vmx_process.c   Wed May 31 11:27:54 2006 -0600
@@ -338,6 +338,7 @@ vmx_hpw_miss(u64 vadr , u64 vec, REGS* r
                 gppa = 
(vadr&((1UL<<data->ps)-1))+(data->ppn>>(data->ps-12)<<data->ps);
                 emulate_io_inst(v, gppa, data->ma);
             }else{
+                vcpu_set_isr(v,misr.val);
                 data_access_rights(v, vadr);
             }
             return IA64_FAULT;

_______________________________________________
Xen-ppc-devel mailing list
Xen-ppc-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ppc-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [XenPPC] [xenppc-unstable] [IA64] VTI: set isr before injecting fault to guest, Xen patchbot-xenppc-unstable <=