|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-3.4-testing] hvm: handle access to MSR_AMD64_NB_CFG
# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1250695683 -3600
# Node ID 9d2750197fb94b9b411115a37d8ef7d798b81d7a
# Parent 8a75274cb3b5fb779f4eeaec31ec403c1278baba
hvm: handle access to MSR_AMD64_NB_CFG
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
xen-unstable changeset: 20058:c8beb04afbf0
xen-unstable date: Fri Aug 14 10:57:24 2009 +0100
---
xen/arch/x86/hvm/hvm.c | 9 +++++++--
1 files changed, 7 insertions(+), 2 deletions(-)
diff -r 8a75274cb3b5 -r 9d2750197fb9 xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c Wed Aug 19 16:27:25 2009 +0100
+++ b/xen/arch/x86/hvm/hvm.c Wed Aug 19 16:28:03 2009 +0100
@@ -1790,8 +1790,9 @@ int hvm_msr_read_intercept(struct cpu_us
break;
case MSR_K8_ENABLE_C1E:
- /* There's no point in letting the guest see C-States.
- * Further, this AMD-only register may be accessed if this HVM guest
+ case MSR_AMD64_NB_CFG:
+ /*
+ * These AMD-only registers may be accessed if this HVM guest
* has been migrated to an Intel host. This fixes a guest crash
* in this case.
*/
@@ -1884,6 +1885,10 @@ int hvm_msr_write_intercept(struct cpu_u
if ( !mtrr_var_range_msr_set(&v->arch.hvm_vcpu.mtrr,
regs->ecx, msr_content) )
goto gp_fault;
+ break;
+
+ case MSR_AMD64_NB_CFG:
+ /* ignore the write */
break;
default:
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-3.4-testing] hvm: handle access to MSR_AMD64_NB_CFG,
Xen patchbot-3.4-testing <=
|
|
|
|
|