summaryrefslogtreecommitdiff
path: root/arch/powerpc/kvm/book3s_hv.c
diff options
context:
space:
mode:
authorPaolo Bonzini <pbonzini@redhat.com>2015-09-18 18:33:04 +0300
committerPaolo Bonzini <pbonzini@redhat.com>2015-09-21 08:41:22 +0300
commit3afb1121800128aae9f5722e50097fcf1a9d4d88 (patch)
tree6bf23ea486d09f71f6f0ef5369a04feead1746a8 /arch/powerpc/kvm/book3s_hv.c
parentebae871a509d3c24b32ff67af2671dadffc58770 (diff)
downloadlinux-3afb1121800128aae9f5722e50097fcf1a9d4d88.tar.xz
KVM: x86: trap AMD MSRs for the TSeg base and mask
These have roughly the same purpose as the SMRR, which we do not need to implement in KVM. However, Linux accesses MSR_K8_TSEG_ADDR at boot, which causes problems when running a Xen dom0 under KVM. Just return 0, meaning that processor protection of SMRAM is not in effect. Reported-by: M A Young <m.a.young@durham.ac.uk> Cc: stable@vger.kernel.org Acked-by: Borislav Petkov <bp@suse.de> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/powerpc/kvm/book3s_hv.c')
0 files changed, 0 insertions, 0 deletions