Re: [Xen-devel] [PATCH 2/5] xen/x86-64: clean up warnings aboutIST-usingtraps

From: Jeremy Fitzhardinge
Date: Fri May 08 2009 - 11:31:25 EST


Ingo Molnar wrote:
Yes. Also, patches 1-2-3 really just do the same thing, one fixes the other one. Would be nice to have a single patch for that whole ugly topic of 64-bit Xen not handling ISTs properly.

Well, 1 is sufficient on its own to fix the breakpoint/watchpoint problem. Looks like I need to do something similar with stack. The 2,3 are more general cleanups that aren't essential to the functional fix, and should definitely be folded together.

If this was a CPU we'd say "sorry, dont run Linux on it then" ...

?? Guests don't really need IST because all the tricky traps that really require it (NMI, MCE, etc) are handled by Xen. The stack exception was an oversight on my part, because I thought it was something that would only happen with a bad kernel stack (but I guess that's doublefault).

I've applied the reservation fix to x86/urgent, and the #5 patch to x86/xen (it's more of a cleanup, not a fix for .30, right?).

Right.

J
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/