linux-kernel-test/drivers/kvm
Matthew Gregan 2dc7094b56 KVM: Implement IA32_EBL_CR_POWERON msr
Attempting to boot the default 'bsd' kernel of OpenBSD 4.1 i386 in a guest
fails early in the kernel init inside p3_get_bus_clock while trying to read
the IA32_EBL_CR_POWERON MSR.  KVM logs an 'unhandled MSR' message and the
guest kernel faults.

This patch is sufficient to allow OpenBSD to boot, after which it seems to
run fine.  I'm not sure if this is the correct solution for dealing with
this particular MSR, but it works for me.

Signed-off-by: Matthew Gregan <kinetik@flim.org>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-07-16 12:05:40 +03:00
..
Kconfig [S390] Kconfig: refine depends statements. 2007-05-10 15:46:07 +02:00
kvm_main.c KVM: Implement IA32_EBL_CR_POWERON msr 2007-07-16 12:05:40 +03:00
kvm_svm.h KVM: SVM: Only save/restore MSRs when needed 2007-05-03 10:52:32 +03:00
kvm.h KVM: Set cr0.mp for guests 2007-07-16 12:05:40 +03:00
Makefile [PATCH] kvm: userspace interface 2006-12-10 09:57:22 -08:00
mmu.c KVM: Update shadow pte on write to guest pte 2007-07-16 12:05:39 +03:00
paging_tmpl.h KVM: Update shadow pte on write to guest pte 2007-07-16 12:05:39 +03:00
segment_descriptor.h [PATCH] kvm: userspace interface 2006-12-10 09:57:22 -08:00
svm.c KVM: SVM: Allow direct guest access to PC debug port 2007-07-16 12:05:37 +03:00
svm.h KVM: SVM: forbid guest to execute monitor/mwait 2007-05-03 10:52:26 +03:00
vmx.c KVM: Consolidate guest fpu activation and deactivation 2007-07-16 12:05:39 +03:00
vmx.h [PATCH] kvm: vmx: handle triple faults by returning EXIT_REASON_SHUTDOWN to userspace 2007-02-12 09:48:40 -08:00
x86_emulate.c KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00
x86_emulate.h KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00