WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-changelog

[Xen-changelog] [xen-3.4-testing] hvm: handle access to MSR_AMD64_NB_CFG

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [xen-3.4-testing] hvm: handle access to MSR_AMD64_NB_CFG
From: "Xen patchbot-3.4-testing" <patchbot-3.4-testing@xxxxxxxxxxxxxxxxxxx>
Date: Wed, 19 Aug 2009 08:40:39 -0700
Delivery-date: Wed, 19 Aug 2009 08:41:24 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1250695683 -3600
# Node ID 9d2750197fb94b9b411115a37d8ef7d798b81d7a
# Parent  8a75274cb3b5fb779f4eeaec31ec403c1278baba
hvm: handle access to MSR_AMD64_NB_CFG

Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
xen-unstable changeset:   20058:c8beb04afbf0
xen-unstable date:        Fri Aug 14 10:57:24 2009 +0100
---
 xen/arch/x86/hvm/hvm.c |    9 +++++++--
 1 files changed, 7 insertions(+), 2 deletions(-)

diff -r 8a75274cb3b5 -r 9d2750197fb9 xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c    Wed Aug 19 16:27:25 2009 +0100
+++ b/xen/arch/x86/hvm/hvm.c    Wed Aug 19 16:28:03 2009 +0100
@@ -1790,8 +1790,9 @@ int hvm_msr_read_intercept(struct cpu_us
         break;
 
     case MSR_K8_ENABLE_C1E:
-         /* There's no point in letting the guest see C-States.
-          * Further, this AMD-only register may be accessed if this HVM guest
+    case MSR_AMD64_NB_CFG:
+         /*
+          * These AMD-only registers may be accessed if this HVM guest
           * has been migrated to an Intel host. This fixes a guest crash
           * in this case.
           */
@@ -1884,6 +1885,10 @@ int hvm_msr_write_intercept(struct cpu_u
         if ( !mtrr_var_range_msr_set(&v->arch.hvm_vcpu.mtrr,
                                      regs->ecx, msr_content) )
             goto gp_fault;
+        break;
+
+    case MSR_AMD64_NB_CFG:
+        /* ignore the write */
         break;
 
     default:

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [xen-3.4-testing] hvm: handle access to MSR_AMD64_NB_CFG, Xen patchbot-3.4-testing <=