diff options
author | Paolo Bonzini <[email protected]> | 2015-09-18 17:33:04 +0200 |
---|---|---|
committer | Paolo Bonzini <[email protected]> | 2015-09-21 07:41:22 +0200 |
commit | 3afb1121800128aae9f5722e50097fcf1a9d4d88 (patch) | |
tree | 6bf23ea486d09f71f6f0ef5369a04feead1746a8 /tools/perf/scripts/python/bin/export-to-postgresql-report | |
parent | ebae871a509d3c24b32ff67af2671dadffc58770 (diff) |
KVM: x86: trap AMD MSRs for the TSeg base and mask
These have roughly the same purpose as the SMRR, which we do not need
to implement in KVM. However, Linux accesses MSR_K8_TSEG_ADDR at
boot, which causes problems when running a Xen dom0 under KVM.
Just return 0, meaning that processor protection of SMRAM is not
in effect.
Reported-by: M A Young <[email protected]>
Cc: [email protected]
Acked-by: Borislav Petkov <[email protected]>
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/bin/export-to-postgresql-report')
0 files changed, 0 insertions, 0 deletions