On 26/10/15 15:58, Jan Beulich wrote:
On 26.10.15 at 16:41, wrote:
>> Apply this partial revert fixes the problem for me.
>
> This would need some cleaning up, but I could do that. May I put your
> S-o-b underneath it (with or without the extra cleanup)?
If you want, but I don't think I rea
>>> On 26.10.15 at 16:41, wrote:
> Apply this partial revert fixes the problem for me.
This would need some cleaning up, but I could do that. May I put your
S-o-b underneath it (with or without the extra cleanup)?
Jan
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -502,8 +502,8 @@ voi
On 26/10/15 15:08, Jan Beulich wrote:
On 26.10.15 at 15:58, wrote:
>> On 26/10/15 14:55, Andrew Cooper wrote:
>>> On 26/10/15 14:43, David Vrabel wrote:
On 23/09/15 16:34, Jan Beulich wrote:
> Us extending the GDT limit past the Xen descriptors so far meant that
> guests (includi
>>> On 26.10.15 at 15:58, wrote:
> On 26/10/15 14:55, Andrew Cooper wrote:
>> On 26/10/15 14:43, David Vrabel wrote:
>>> On 23/09/15 16:34, Jan Beulich wrote:
Us extending the GDT limit past the Xen descriptors so far meant that
guests (including user mode programs) accessing any descrip
On 26/10/15 14:43, David Vrabel wrote:
> On 23/09/15 16:34, Jan Beulich wrote:
>> Us extending the GDT limit past the Xen descriptors so far meant that
>> guests (including user mode programs) accessing any descriptor table
>> slot above the original OS'es limit but below the first Xen descriptor
>
On 26/10/15 14:55, Andrew Cooper wrote:
> On 26/10/15 14:43, David Vrabel wrote:
>> On 23/09/15 16:34, Jan Beulich wrote:
>>> Us extending the GDT limit past the Xen descriptors so far meant that
>>> guests (including user mode programs) accessing any descriptor table
>>> slot above the original OS
On 23/09/15 16:34, Jan Beulich wrote:
> Us extending the GDT limit past the Xen descriptors so far meant that
> guests (including user mode programs) accessing any descriptor table
> slot above the original OS'es limit but below the first Xen descriptor
> caused a #PF, converted to a #GP in our #PF
On Wed, Sep 23, 2015 at 09:34:16AM -0600, Jan Beulich wrote:
> Us extending the GDT limit past the Xen descriptors so far meant that
> guests (including user mode programs) accessing any descriptor table
> slot above the original OS'es limit but below the first Xen descriptor
> caused a #PF, conver
On 23/09/15 16:34, Jan Beulich wrote:
Us extending the GDT limit past the Xen descriptors so far meant that
guests (including user mode programs) accessing any descriptor table
slot above the original OS'es limit but below the first Xen descriptor
caused a #PF, converted to a #GP in our #PF handl
Us extending the GDT limit past the Xen descriptors so far meant that
guests (including user mode programs) accessing any descriptor table
slot above the original OS'es limit but below the first Xen descriptor
caused a #PF, converted to a #GP in our #PF handler. Which is quite
different from the na
10 matches
Mail list logo