From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH] KVM: X86: emaulate access to MSR_IA32_MCG_CTL Date: Tue, 12 Feb 2008 14:42:22 +0200 Message-ID: <47B1942E.9040705@qumranet.com> References: <1202758107-19202-1-git-send-email-joerg.roedel@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: kvm-devel@lists.sourceforge.net, Markus Rechberger To: Joerg Roedel Return-path: In-Reply-To: <1202758107-19202-1-git-send-email-joerg.roedel@amd.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: kvm-devel-bounces@lists.sourceforge.net Errors-To: kvm-devel-bounces@lists.sourceforge.net List-Id: kvm.vger.kernel.org Joerg Roedel wrote: > Injecting an GP when accessing this MSR lets Windows crash when running some > stress test tools in KVM. So this patch emulates access to this MSR. > > Applied, thanks. > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index dee6bce..817cad0 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -497,6 +497,10 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data) > pr_unimpl(vcpu, "%s: MSR_IA32_MCG_STATUS 0x%llx, nop\n", > __FUNCTION__, data); > break; > + case MSR_IA32_MCG_CTL: > + pr_unimpl(vcpu, "%s: MSR_IA32_MCG_CTL 0x%llx, nop\n", > + __FUNCTION__, data); > + break; > But please check patches for broken whitespace. -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/