From patchwork Wed Jun 24 10:44:35 2009 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andre Przywara X-Patchwork-Id: 32142 Received: from vger.kernel.org (vger.kernel.org [209.132.176.167]) by demeter.kernel.org (8.14.2/8.14.2) with ESMTP id n5OAfESe014319 for ; Wed, 24 Jun 2009 10:41:15 GMT Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752130AbZFXKlH (ORCPT ); Wed, 24 Jun 2009 06:41:07 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751733AbZFXKlH (ORCPT ); Wed, 24 Jun 2009 06:41:07 -0400 Received: from va3ehsobe001.messaging.microsoft.com ([216.32.180.11]:50113 "EHLO VA3EHSOBE001.bigfish.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751131AbZFXKlF (ORCPT ); Wed, 24 Jun 2009 06:41:05 -0400 Received: from mail139-va3-R.bigfish.com (10.7.14.238) by VA3EHSOBE001.bigfish.com (10.7.40.21) with Microsoft SMTP Server id 8.1.340.0; Wed, 24 Jun 2009 10:41:07 +0000 Received: from mail139-va3 (localhost.localdomain [127.0.0.1]) by mail139-va3-R.bigfish.com (Postfix) with ESMTP id 29FFF16F820E; Wed, 24 Jun 2009 10:41:07 +0000 (UTC) X-SpamScore: 3 X-BigFish: VPS3(zzzz1202hzzz32i17ch43j63h) X-Spam-TCS-SCL: 2:0 Received: by mail139-va3 (MessageSwitch) id 1245840065826224_26946; Wed, 24 Jun 2009 10:41:05 +0000 (UCT) Received: from ausb3extmailp01.amd.com (unknown [163.181.251.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail139-va3.bigfish.com (Postfix) with ESMTP id 99208C60057; Wed, 24 Jun 2009 10:41:05 +0000 (UTC) Received: from ausb3twp01.amd.com ([163.181.250.37]) by ausb3extmailp01.amd.com (Switch-3.2.7/Switch-3.2.7) with ESMTP id n5OAexDK015083; Wed, 24 Jun 2009 05:41:02 -0500 X-WSS-ID: 0KLQOC9-01-XG9-01 Received: from sausexbh1.amd.com (sausexbh1.amd.com [163.181.22.101]) by ausb3twp01.amd.com (Tumbleweed MailGate 3.5.1) with ESMTP id 293021943D7; Wed, 24 Jun 2009 05:40:56 -0500 (CDT) Received: from SAUSEXMB3.amd.com ([163.181.22.202]) by sausexbh1.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 24 Jun 2009 05:41:01 -0500 Received: from SDRSEXMB1.amd.com ([172.20.3.116]) by SAUSEXMB3.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 24 Jun 2009 05:41:00 -0500 Received: from localhost.localdomain ([165.204.15.42]) by SDRSEXMB1.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 24 Jun 2009 12:40:45 +0200 From: Andre Przywara To: avi@redhat.com CC: kvm@vger.kernel.org, Andre Przywara Subject: [PATCH 3/4] ignore PCI ECS I/O enablement Date: Wed, 24 Jun 2009 12:44:35 +0200 Message-ID: <1245840276-12702-3-git-send-email-andre.przywara@amd.com> X-Mailer: git-send-email 1.6.1.3 In-Reply-To: <1245840276-12702-2-git-send-email-andre.przywara@amd.com> References: <1245840276-12702-1-git-send-email-andre.przywara@amd.com> <1245840276-12702-2-git-send-email-andre.przywara@amd.com> X-OriginalArrivalTime: 24 Jun 2009 10:40:45.0477 (UTC) FILETIME=[3AD1FD50:01C9F4B8] MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org Linux guests will try to enable access to the extended PCI config space via the I/O ports 0xCF8/0xCFC on AMD Fam10h CPU. Since we (currently?) don't use ECS, simply ignore this write attempt. Signed-off-by: Andre Przywara --- arch/x86/kvm/x86.c | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index a148f4c..e6e61ee 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -804,6 +804,8 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data) return 1; } break; + case MSR_AMD64_NB_CFG: + break; case MSR_IA32_DEBUGCTLMSR: if (!data) { /* We support the non-activated case already */