[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] RE: [VTD-NEO][patch 6/6] Intel VT-d/Neocleus 1:1 mreged code for PCI passthrough


  • To: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
  • Date: Thu, 20 Sep 2007 10:26:44 +0100
  • Delivery-date: Thu, 20 Sep 2007 02:27:24 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AcfvUQE/NSLHf0ZTRFaUb5meDjaqbALsHd9QABfyc/cAAcZWbw==
  • Thread-topic: [Xen-devel] RE: [VTD-NEO][patch 6/6] Intel VT-d/Neocleus 1:1 mreged code for PCI passthrough

On 20/9/07 09:35, "Keir Fraser" <Keir.Fraser@xxxxxxxxxxxx> wrote:

>> These changes were tested against 15909.  The changes made by cs# 15910
>> breaks even non-vtd vmx guest bring-up.  It causes xen crash complaining
>> about:
>> 
>>  "(XEN) Failed vm entry (exit reason 0x80000021) caused by invalid guest
>> state (0)"
> 
> How is the guest state broken? Does guest rflags have bit 1 set?

Ah, it's broken for 64-bit hypervisor. I'm just testing a fix.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.