[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [PATCH] x86 MTRR access dumping
From: |
Carl-Daniel Hailfinger |
Subject: |
Re: [Qemu-devel] [PATCH] x86 MTRR access dumping |
Date: |
Sun, 23 Nov 2008 02:26:13 +0100 |
User-agent: |
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.17) Gecko/20080922 SUSE/1.1.12-0.1 SeaMonkey/1.1.12 |
On 21.11.2008 22:30, Carl-Daniel Hailfinger wrote:
> Some x86 BIOS and lots of x86 operating systems use MSRs not currently
> implemented in Qemu. The most notable unimplemented MSRs are the MTRRs
> (Memory Type Range Registers). This patch against latest svn dumps any
> accesses to unhandled MSRs and decodes the MTRR accesses.
>
> I used this code to check MTRR accesses of coreboot (a replacement
> firmware for x86 BIOS) inside qemu and the patch works fine.
>
> Of course, writing these MTRRs should be persistent, so their state
> needs to be saved somehow.
>
> I thought I'd post my current code and ask for comments before I continue.
> Any comments on coding style, technical restrictions and other stuff are
> appreciated.
>
Sample output from a recent ReactOS boot:
Unhandled MSR 0x0000008b was written: 0x0000000000000000
Unhandled MSR 0x0000008b was read
Regards,
Carl-Daniel
--
http://www.hailfinger.org/