[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RESEND] Linux 2.3.23-rc3 on Xen 3.1 crashs
On Wed, Aug 29, 2007 at 02:09:23PM +0100, Keir Fraser wrote: > Sounds like Bastian already worked out the problem is we do not allow > X86_CR4_MCE to be cleared. Xen should probably just ignore attempts to > change that bit. Even better would be to remember guest value of that flag > and return appropriate value on reads of CR4. But that's more than required > here, I think. What should happen with the upcoming MCE support in Xen? > Actually, instead of GPF'ing on 'bad' CR4 writes, we could just log a > XENLOG_WARNING and return. That would avoid any problems for any other CR4 > bits too. What is the documented behaviour if a bit is set while the machine lacks support for it? Bastian -- The face of war has never changed. Surely it is more logical to heal than to kill. -- Surak of Vulcan, "The Savage Curtain", stardate 5906.5 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |