From: Jes Sorensen <Jes.Sorensen@xxxxxxxxxx> We regularly see bug reports over this one, however it is a write to a read-only register which some operating systems (including Linux) tend to write to once in a while. Ignore the writes since they do no harm. Signed-off-by: Jes Sorensen <Jes.Sorensen@xxxxxxxxxx> --- arch/x86/kvm/x86.c | 6 ++++++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4014d6c..2e1ae7f 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -1439,6 +1439,12 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data) pr_unimpl(vcpu, "unimplemented perfctr wrmsr: " "0x%x data 0x%llx\n", msr, data); break; + case MSR_IA32_PERF_STATUS: + /* + * Write to read-only register, has no effect, so + * lets not bother users with a warning about this. + */ + break; case HV_X64_MSR_GUEST_OS_ID ... HV_X64_MSR_SINT15: if (kvm_hv_msr_partition_wide(msr)) { int r; -- 1.7.1 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html