|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [RESEND] Linux 2.3.23-rc3 on Xen 3.1 crashs
On Wed, Aug 29, 2007 at 02:09:23PM +0100, Keir Fraser wrote:
> Sounds like Bastian already worked out the problem is we do not allow
> X86_CR4_MCE to be cleared. Xen should probably just ignore attempts to
> change that bit. Even better would be to remember guest value of that flag
> and return appropriate value on reads of CR4. But that's more than required
> here, I think.
What should happen with the upcoming MCE support in Xen?
> Actually, instead of GPF'ing on 'bad' CR4 writes, we could just log a
> XENLOG_WARNING and return. That would avoid any problems for any other CR4
> bits too.
What is the documented behaviour if a bit is set while the machine lacks
support for it?
Bastian
--
The face of war has never changed. Surely it is more logical to heal
than to kill.
-- Surak of Vulcan, "The Savage Curtain", stardate 5906.5
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|