[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] RE: [PATCH] guest MSR access in the realmode emulation


  • To: "Keir Fraser" <Keir.Fraser@xxxxxxxxxxxx>
  • From: "Kamble, Nitin A" <nitin.a.kamble@xxxxxxxxx>
  • Date: Thu, 31 Jan 2008 12:56:23 -0800
  • Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 31 Jan 2008 12:57:51 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: Achj7G6orTD0LM/fEdycggAX8io7RQAXzbWQ
  • Thread-topic: [PATCH] guest MSR access in the realmode emulation

That's right, I realized it later on. I was planning to change it the
same way.

Thanks & Regards,

Nitin

Linux Open Source Technology Center, Intel Corporation

------------------------------------------------------------------------
--------

The Mind is like a parachute; it works much better when it's open.

>-----Original Message-----
>From: Keir Fraser [mailto:Keir.Fraser@xxxxxxxxxxxx]
>Sent: Thursday, January 31, 2008 1:34 AM
>To: Kamble, Nitin A
>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
>Subject: Re: [PATCH] guest MSR access in the realmode emulation
>
>You can't directly access the physical EFER. I've modified the patch to
go
>via the intercept routines in vmx.c and checked it in.
>
> Thanks,
> Keir
>
>On 31/1/08 01:58, "Nitin A Kamble" <nitin.a.kamble@xxxxxxxxx> wrote:
>
>> Hi Keir,
>>   Our QA guys found out that SMP windows guest was not booting with
the
>> new realmode code. I looked into it and found out the realmode msr
>> access is missing from the new realmode code.
>>    Attached is the patch to implement the MSR access in the new
realmode
>> emulation code.
>>
>> Signed-off-by: Nitin A Kamble <nitin.a.kamble@xxxxxxxxx>
>


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.