[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] hvm: handle access to MSR_AMD64_NB_CFG
# HG changeset patch # User Keir Fraser <keir.fraser@xxxxxxxxxx> # Date 1250243844 -3600 # Node ID c8beb04afbf0a7a3a4290df212d1b7fe7d288dca # Parent f4601471c59bff0e42aa8312e93adf81f0f42018 hvm: handle access to MSR_AMD64_NB_CFG Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> --- xen/arch/x86/hvm/hvm.c | 9 +++++++-- 1 files changed, 7 insertions(+), 2 deletions(-) diff -r f4601471c59b -r c8beb04afbf0 xen/arch/x86/hvm/hvm.c --- a/xen/arch/x86/hvm/hvm.c Fri Aug 14 08:36:12 2009 +0100 +++ b/xen/arch/x86/hvm/hvm.c Fri Aug 14 10:57:24 2009 +0100 @@ -1842,8 +1842,9 @@ int hvm_msr_read_intercept(struct cpu_us break; case MSR_K8_ENABLE_C1E: - /* There's no point in letting the guest see C-States. - * Further, this AMD-only register may be accessed if this HVM guest + case MSR_AMD64_NB_CFG: + /* + * These AMD-only registers may be accessed if this HVM guest * has been migrated to an Intel host. This fixes a guest crash * in this case. */ @@ -1947,6 +1948,10 @@ int hvm_msr_write_intercept(struct cpu_u if ( !mtrr_var_range_msr_set(&v->arch.hvm_vcpu.mtrr, regs->ecx, msr_content) ) goto gp_fault; + break; + + case MSR_AMD64_NB_CFG: + /* ignore the write */ break; default: _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |