[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] svm: amend c/s 24990:322300fd2ebd (fake BU_CFG MSR on AMD revF)
On Thu, 2012-03-15 at 12:34 +0000, Jan Beulich wrote: > Let's restrict such a hack to the known affected family. > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> I haven't tested it, but in principle: Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Thanks Jan. I'll see if I can get this back-ported to the XS patchqueue, so we can test to make sure it works on all the hardware we have available. -George > > --- a/xen/arch/x86/hvm/svm/svm.c > +++ b/xen/arch/x86/hvm/svm/svm.c > @@ -1505,7 +1505,7 @@ static int svm_msr_read_intercept(unsign > if ( rdmsr_safe(msr, *msr_content) == 0 ) > break; > > - if ( msr == MSR_F10_BU_CFG ) > + if ( boot_cpu_data.x86 == 0xf && msr == MSR_F10_BU_CFG ) > { > /* Win2k8 x64 reads this MSR on revF chips, where it > * wasn't publically available; it uses a magic constant > > > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |