[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] SVM patch to ensure that PAE bit is set for 32bit guests on 32bit PAE,



# HG changeset patch
# User kaf24@xxxxxxxxxxxxxxxxxxxx
# Node ID b769efb6b1091068baf170b54b35189a3c776f5c
# Parent  09203dffee8a9f5825f7388561d3b464847639bc
SVM patch to ensure that PAE bit is set for 32bit guests on 32bit PAE,
by using paging levels>=3 rather than ifdef i386.  This patch fixes
the "black screen" hang issue when building w/XEN_TARGET_X86_PAE=y on
32bit.

Tested linux debian and win2003EE guests with pae=1.  The linux
guest boots without error, while the windows guest sometimes hits a
bug() in shadow.c.  Both VT and SVM encounter the same bug.

Signed-off-by: Tom Woller <thomas.woller@xxxxxxx>

diff -r 09203dffee8a -r b769efb6b109 xen/include/asm-x86/hvm/svm/vmcb.h
--- a/xen/include/asm-x86/hvm/svm/vmcb.h        Thu Apr 20 13:42:31 2006 +0100
+++ b/xen/include/asm-x86/hvm/svm/vmcb.h        Thu Apr 20 17:04:58 2006 +0100
@@ -473,10 +473,10 @@ enum {
 #define VMCB_EFLAGS_RESERVED_1          0x00000002 /* bitmap for 1 */
 
 /* These bits in the CR4 are owned by the host */
-#ifdef __i386__
-#define SVM_CR4_HOST_MASK (0)
+#if CONFIG_PAGING_LEVELS >= 3
+#define SVM_CR4_HOST_MASK (X86_CR4_PAE)
 #else
-#define SVM_CR4_HOST_MASK (X86_CR4_PAE)
+#define SVM_CR4_HOST_MASK 0
 #endif
 
 

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.