[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Trap Handler for NX violation.

  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Necrosoft <necrosoft82@xxxxxxxxx>
  • Date: Tue, 10 Jun 2008 15:15:24 +0200
  • Delivery-date: Tue, 10 Jun 2008 06:15:47 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=bk8PgV/6wR64opfM8daCSfy3W9zTN7m/BGxLLaNmZS2G9SVDuJk+84MQpDLhAVbywP IJZTyQoFEUu2AhG7tPWh2zNJT4wF0ie2Jhf29yONobKhPPnhQSIFusRoPOq7Z1cx+BUW +6u6tvjJ5xdxkdGIoBih7VxT9QuyNku9O8oig=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>


I have a question about NX trap handling in Xen. Assume that you have set the NX/XD bit for a PT entry. I would to know wich is the trap_handler used by Xen when NX violation is triggered.
I'm looking for trap handlers inside entry.S file for X86_32 architecture, but I see no "specific" procedure for that. My be a general_protection procedure is used?

Thank you very much!

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.