This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-changelog] [IA64] VTI: set isr before injecting fault to guest

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [IA64] VTI: set isr before injecting fault to guest
From: Xen patchbot-unstable <patchbot-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Thu, 01 Jun 2006 12:08:30 +0000
Delivery-date: Thu, 01 Jun 2006 05:12:49 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User awilliam@xxxxxxxxxxx
# Node ID e3d2411fb4868c95e1af593bfbd776bad6e8cfe2
# Parent  7ae164a41569e747932180f5c63c4512d6dce8d4
[IA64] VTI: set isr before injecting fault to guest

This patch intends to fix isr setting before injecting fault to it.
With this small fix, CPU2000 in VTi can pass now.

Signed-off-by: Kevin Tian <kevin.tian@xxxxxxxxx>
Signed-off-by: Zhang xiantao <xiantao.zhang@xxxxxxxxx>
 xen/arch/ia64/vmx/vmx_process.c |    1 +
 1 files changed, 1 insertion(+)

diff -r 7ae164a41569 -r e3d2411fb486 xen/arch/ia64/vmx/vmx_process.c
--- a/xen/arch/ia64/vmx/vmx_process.c   Wed May 31 11:27:50 2006 -0600
+++ b/xen/arch/ia64/vmx/vmx_process.c   Wed May 31 11:27:54 2006 -0600
@@ -338,6 +338,7 @@ vmx_hpw_miss(u64 vadr , u64 vec, REGS* r
                 gppa = 
                 emulate_io_inst(v, gppa, data->ma);
+                vcpu_set_isr(v,misr.val);
                 data_access_rights(v, vadr);
             return IA64_FAULT;

Xen-changelog mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [IA64] VTI: set isr before injecting fault to guest, Xen patchbot-unstable <=