aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJan Beulich <jbeulich@suse.com>2012-03-15 15:09:18 +0100
committerJan Beulich <jbeulich@suse.com>2012-03-15 15:09:18 +0100
commita13b23fffeff0e95699b299f73cb34900fe5c89e (patch)
treebe15c79b01ea4974bce4852971384ea5a6b356b7
parenta0348c67a6d617d7536271a8cea6cb483ac20476 (diff)
downloadxen-a13b23fffeff0e95699b299f73cb34900fe5c89e.tar.gz
xen-a13b23fffeff0e95699b299f73cb34900fe5c89e.tar.bz2
xen-a13b23fffeff0e95699b299f73cb34900fe5c89e.zip
svm: amend c/s 24990:322300fd2ebd (fake BU_CFG MSR on AMD revF)
Let's restrict such a hack to the known affected family. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> Acked-by: George Dunlap <george.dunlap@eu.citrix.com>
-rw-r--r--xen/arch/x86/hvm/svm/svm.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index f87afd90e2..c05df20bf4 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -1505,7 +1505,7 @@ static int svm_msr_read_intercept(unsigned int msr, uint64_t *msr_content)
if ( rdmsr_safe(msr, *msr_content) == 0 )
break;
- if ( msr == MSR_F10_BU_CFG )
+ if ( boot_cpu_data.x86 == 0xf && msr == MSR_F10_BU_CFG )
{
/* Win2k8 x64 reads this MSR on revF chips, where it
* wasn't publically available; it uses a magic constant