|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-changelog
[Xen-changelog] [xen-unstable] hvm: handle access to	MSR_AMD64_NB_CFG
 
# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1250243844 -3600
# Node ID c8beb04afbf0a7a3a4290df212d1b7fe7d288dca
# Parent  f4601471c59bff0e42aa8312e93adf81f0f42018
hvm: handle access to MSR_AMD64_NB_CFG
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
---
 xen/arch/x86/hvm/hvm.c |    9 +++++++--
 1 files changed, 7 insertions(+), 2 deletions(-)
diff -r f4601471c59b -r c8beb04afbf0 xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c    Fri Aug 14 08:36:12 2009 +0100
+++ b/xen/arch/x86/hvm/hvm.c    Fri Aug 14 10:57:24 2009 +0100
@@ -1842,8 +1842,9 @@ int hvm_msr_read_intercept(struct cpu_us
         break;
 
     case MSR_K8_ENABLE_C1E:
-         /* There's no point in letting the guest see C-States.
-          * Further, this AMD-only register may be accessed if this HVM guest
+    case MSR_AMD64_NB_CFG:
+         /*
+          * These AMD-only registers may be accessed if this HVM guest
           * has been migrated to an Intel host. This fixes a guest crash
           * in this case.
           */
@@ -1947,6 +1948,10 @@ int hvm_msr_write_intercept(struct cpu_u
         if ( !mtrr_var_range_msr_set(&v->arch.hvm_vcpu.mtrr,
                                      regs->ecx, msr_content) )
             goto gp_fault;
+        break;
+
+    case MSR_AMD64_NB_CFG:
+        /* ignore the write */
         break;
 
     default:
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
 |   
 
| <Prev in Thread] | 
Current Thread | 
[Next in Thread> |  
- [Xen-changelog] [xen-unstable] hvm: handle access to	MSR_AMD64_NB_CFG,
Xen patchbot-unstable <=
  
 |  
  
 | 
    | 
  
  
    |   | 
    |