From mboxrd@z Thu Jan 1 00:00:00 1970 From: Keir Fraser Subject: Re: [PATCH] svm: amend c/s 24990:322300fd2ebd (fake BU_CFG MSR on AMD revF) Date: Thu, 15 Mar 2012 13:54:33 +0000 Message-ID: References: <4F61EFF80200007800078A9E@nat28.tlf.novell.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <4F61EFF80200007800078A9E@nat28.tlf.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich , xen-devel Cc: George Dunlap List-Id: xen-devel@lists.xenproject.org On 15/03/2012 12:34, "Jan Beulich" wrote: > Let's restrict such a hack to the known affected family. > > Signed-off-by: Jan Beulich Acked-by: Keir Fraser > --- a/xen/arch/x86/hvm/svm/svm.c > +++ b/xen/arch/x86/hvm/svm/svm.c > @@ -1505,7 +1505,7 @@ static int svm_msr_read_intercept(unsign > if ( rdmsr_safe(msr, *msr_content) == 0 ) > break; > > - if ( msr == MSR_F10_BU_CFG ) > + if ( boot_cpu_data.x86 == 0xf && msr == MSR_F10_BU_CFG ) > { > /* Win2k8 x64 reads this MSR on revF chips, where it > * wasn't publically available; it uses a magic constant > > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xen.org > http://lists.xen.org/xen-devel