Chris Lalancette
2009-Jan-16 14:32 UTC
[Xen-devel] [PATCH]: Let dom0 write to the APERF and MPERF MSR''s
All,
If dom0 is controlling the frequency scaling (which it still is in RHEL-5),
and it''s using the new acpi-cpufreq code from upstream (which it is in
5.3),
then it will attempt to wrmsr() to the MSR_IA32_APERF and MSR_IA32_MPERF
MSR''s
(to do performance measuring, I believe). With the current hypervisor, this
results in a lot of:
(XEN) traps.c:1761:d0 Domain attempted WRMSR 00000000000000e8 from
00000029:d7ca940f to 00000000:00000000.
messages. I believe it is safe to let the dom0 do this MSR write, so the
attached patch just allows the write to go through. This eliminates the message
spam, and probably allows acpi-cpufreq work to a certain extent (although I have
not verified the latter).
The patch was generated and tested on a RHEL-5 (3.1-based) hypervisor, but
should apply with a little massaging to xen-unstable.
Signed-off-by: Chris Lalancette <clalance@redhat.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel