Skip to content
Commit 3afb1121 authored by Paolo Bonzini's avatar Paolo Bonzini
Browse files

KVM: x86: trap AMD MSRs for the TSeg base and mask



These have roughly the same purpose as the SMRR, which we do not need
to implement in KVM.  However, Linux accesses MSR_K8_TSEG_ADDR at
boot, which causes problems when running a Xen dom0 under KVM.
Just return 0, meaning that processor protection of SMRAM is not
in effect.

Reported-by: default avatarM A Young <m.a.young@durham.ac.uk>
Cc: stable@vger.kernel.org
Acked-by: default avatarBorislav Petkov <bp@suse.de>
Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
parent ebae871a
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment