]> git.baikalelectronics.ru Git - kernel.git/commit
KVM: x86: trap AMD MSRs for the TSeg base and mask
authorPaolo Bonzini <pbonzini@redhat.com>
Fri, 18 Sep 2015 15:33:04 +0000 (17:33 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 21 Sep 2015 05:41:22 +0000 (07:41 +0200)
commitba40cdbd00bf6138ab1399978082644c5d89f805
tree6bf23ea486d09f71f6f0ef5369a04feead1746a8
parentb09b9e95dbafd8414617fafd5a5f13c94ae16d1b
KVM: x86: trap AMD MSRs for the TSeg base and mask

These have roughly the same purpose as the SMRR, which we do not need
to implement in KVM.  However, Linux accesses MSR_K8_TSEG_ADDR at
boot, which causes problems when running a Xen dom0 under KVM.
Just return 0, meaning that processor protection of SMRAM is not
in effect.

Reported-by: M A Young <m.a.young@durham.ac.uk>
Cc: stable@vger.kernel.org
Acked-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/include/asm/msr-index.h
arch/x86/kvm/x86.c