diff options
author | Jan Beulich <jbeulich@suse.com> | 2012-03-15 15:09:18 +0100 |
---|---|---|
committer | Jan Beulich <jbeulich@suse.com> | 2012-03-15 15:09:18 +0100 |
commit | a13b23fffeff0e95699b299f73cb34900fe5c89e (patch) | |
tree | be15c79b01ea4974bce4852971384ea5a6b356b7 | |
parent | a0348c67a6d617d7536271a8cea6cb483ac20476 (diff) | |
download | xen-a13b23fffeff0e95699b299f73cb34900fe5c89e.tar.gz xen-a13b23fffeff0e95699b299f73cb34900fe5c89e.tar.bz2 xen-a13b23fffeff0e95699b299f73cb34900fe5c89e.zip |
svm: amend c/s 24990:322300fd2ebd (fake BU_CFG MSR on AMD revF)
Let's restrict such a hack to the known affected family.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Acked-by: George Dunlap <george.dunlap@eu.citrix.com>
-rw-r--r-- | xen/arch/x86/hvm/svm/svm.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index f87afd90e2..c05df20bf4 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -1505,7 +1505,7 @@ static int svm_msr_read_intercept(unsigned int msr, uint64_t *msr_content) if ( rdmsr_safe(msr, *msr_content) == 0 ) break; - if ( msr == MSR_F10_BU_CFG ) + if ( boot_cpu_data.x86 == 0xf && msr == MSR_F10_BU_CFG ) { /* Win2k8 x64 reads this MSR on revF chips, where it * wasn't publically available; it uses a magic constant |