[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-ia64-devel] [Query] fault injection


  • To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
  • From: jeet <jeet_sat12@xxxxxxxxxxx>
  • Date: Wed, 25 Apr 2007 10:43:45 +0530 (IST)
  • Delivery-date: Tue, 24 Apr 2007 22:12:25 -0700
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.co.in; h=Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Message-ID; b=sLBwbSEGmxe356qTvPrBX8K5bSqNkdfSjq4Kznjl49Qv5WqmxCqSZB7Oyiyfp8slKKeeavOt891RvtcC/+VCPwXwTqhoAVHYZrylgfWFh8qIhPyptsynh3/Bx0/1qsl4o5ZuB0YAfp2quyW9id+BQDtmULn+sV9B65BtrRVeShw=;
  • List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>

Hi All

I have query regarding the fault injection in guest by vmm

As per intel manuals whenever any iva fault (dtlb miss etc ) is intercepted by 
VMM then all faults except virtualization fault 
are injected in guest.

But I was looking in dtlb_miss handler code for VMX domain but not able to find 
where in code it is injecting dtlb fault to vmx guest?


Another query is that is p2m table is implemented and being used here as in x86?

~Jeet



      Add online presence to your web pages, find out how here - 
http://messenger.yahoo.com/addpresence.php


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.