Hi Dan,

You are right; the low two bits of cr.itir are NOT reserved.
But when tlb happens, the hardware action is,
itir.ps=rr.ps
itir.key=rr.rid
All other fields are set to 0. 


Thanks,
-Anthony 

>-----Original Message-----
>From: Magenheimer, Dan (HP Labs Fort Collins)
[mailto:[EMAIL PROTECTED]
>Sent: 2006?3?30? 6:01
>To: Xu, Anthony; xen-ia64-devel
>Subject: RE: [Xen-ia64-devel] [PATCH] access_reflection fix
>
>Ah but with further examination, I see that setting
>the bits to zero will avoid problems, so I agree
>now that the patch is good.
>
>> -----Original Message-----
>> From: Magenheimer, Dan (HP Labs Fort Collins)
>> Sent: Wednesday, March 29, 2006 11:45 AM
>> To: 'Xu, Anthony'; xen-ia64-devel
>> Subject: RE: [Xen-ia64-devel] [PATCH] access_reflection fix
>>
>> I am reading from an old SDM so this may have changed,
>> but I think the low two bits of cr.itir are NOT reserved,
>> so it is not necessary to write zero to them.
>>
>> See SDM Vol2 3.3.5.5
>>
>> > -----Original Message-----
>> > From: [EMAIL PROTECTED]
>> > [mailto:[EMAIL PROTECTED] On Behalf
>> > Of Xu, Anthony
>> > Sent: Wednesday, March 29, 2006 9:42 AM
>> > To: xen-ia64-devel
>> > Subject: [Xen-ia64-devel] [PATCH] access_reflection fix
>> >
>> > Before injecting fault to guest, VMM need to setup
>> > guest itir by using guest region register.
>> > But the lowest two bits of itir are reserved. VMM need
>> > to reset these two bits.
>> >
>> > Signed-off-by: Anthony Xu <[EMAIL PROTECTED]>
>> >
>> > Thanks,
>> > -Anthony
>> >
>> >
>>

_______________________________________________
Xen-ia64-devel mailing list
[email protected]
http://lists.xensource.com/xen-ia64-devel

Reply via email to