* Avi Kivity <[EMAIL PROTECTED]> wrote: > >that did the trick. The only messages remaining are: > > > > kvm: unhandled wrmsr: 0xc1 > > inject_general_protection: rip 0xc011b8ae > > > > > > That's a performance counter. What guest triggers it?
a 32-bit Linux bzImage: c011b8ae: 0f 30 wrmsr (gdb) list *0xc011b8ae 0xc011b8ae is in setup_apic_nmi_watchdog (include/asm/msr.h:36). 31 static inline void wrmsrl (unsigned long msr, unsigned long long val) 32 { 33 unsigned long lo, hi; 34 lo = (unsigned long) val; 35 hi = val >> 32; 36 wrmsr (msr, lo, hi); 37 } 38 39 /* wrmsr with exception handling */ 40 #define wrmsr_safe(msr,a,b) ({ int ret__; the guest also obviously crashes due to this #GPF. [ 2.6.20-rc2-rt2 kernel of course ;-) ] Ingo ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys - and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV _______________________________________________ kvm-devel mailing list kvm-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/kvm-devel