[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v8 16/20] xenctx: Fix handling of !guest_protected_mode



On Tue, 2014-04-01 at 14:35 -0400, Don Slutz wrote:
> On 04/01/14 10:14, Ian Campbell wrote:
> > On Thu, 2014-03-27 at 15:05 -0400, Don Slutz wrote:
> >> Start with adding the code to the 64 bit path that the 32 bit path
> >> has.
> > One for people who keep x86 in their brains, is it possible for a
> > processor to be in 64-bit non-protected mode?
> 
> Not in the way the question is asked.  This case is:
> 
> Breakpoint 1, instr_pointer (ctx=ctx@entry=0x7fffffffd040) at xenctx.c:413
> 413     {
> (gdb) p ctxt_word_size
> $1 = 8
> (gdb) p guest_word_size
> $2 = 4
> 
> I.E. the context is in 64, the guest is not.

Ah, I missed that thanks.

Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.