[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RESEND] Linux 2.3.23-rc3 on Xen 3.1 crashs



On Wed, Aug 29, 2007 at 02:09:23PM +0100, Keir Fraser wrote:
> Sounds like Bastian already worked out the problem is we do not allow
> X86_CR4_MCE to be cleared. Xen should probably just ignore attempts to
> change that bit. Even better would be to remember guest value of that flag
> and return appropriate value on reads of CR4. But that's more than required
> here, I think.

What should happen with the upcoming MCE support in Xen?

> Actually, instead of GPF'ing on 'bad' CR4 writes, we could just log a
> XENLOG_WARNING and return. That would avoid any problems for any other CR4
> bits too.

What is the documented behaviour if a bit is set while the machine lacks
support for it?

Bastian

-- 
The face of war has never changed.  Surely it is more logical to heal
than to kill.
                -- Surak of Vulcan, "The Savage Curtain", stardate 5906.5

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.