|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
Re: [Xen-devel] [RESEND] Linux 2.3.23-rc3 on Xen 3.1 crashs
 
On Wed, Aug 29, 2007 at 02:09:23PM +0100, Keir Fraser wrote:
> Sounds like Bastian already worked out the problem is we do not allow
> X86_CR4_MCE to be cleared. Xen should probably just ignore attempts to
> change that bit. Even better would be to remember guest value of that flag
> and return appropriate value on reads of CR4. But that's more than required
> here, I think.
What should happen with the upcoming MCE support in Xen?
> Actually, instead of GPF'ing on 'bad' CR4 writes, we could just log a
> XENLOG_WARNING and return. That would avoid any problems for any other CR4
> bits too.
What is the documented behaviour if a bit is set while the machine lacks
support for it?
Bastian
-- 
The face of war has never changed.  Surely it is more logical to heal
than to kill.
                -- Surak of Vulcan, "The Savage Curtain", stardate 5906.5
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 |   
 
 | 
    | 
  
  
    |   | 
    |