KVM: x86: trap AMD MSRs for the TSeg base and mask
authorPaolo Bonzini <pbonzini@redhat.com>
Fri, 18 Sep 2015 15:33:04 +0000 (17:33 +0200)
committerBen Hutchings <ben@decadent.org.uk>
Tue, 13 Oct 2015 02:46:10 +0000 (03:46 +0100)
commit1ddf94afb9252e2845c41c78df59216ed4bd2fe6
tree7d0b25d4f508b3c8335b19c50887fa280fe2afaf
parent9bf6bf61ff1ff2de8525880e31a82a5be8859db2
KVM: x86: trap AMD MSRs for the TSeg base and mask

commit 3afb1121800128aae9f5722e50097fcf1a9d4d88 upstream.

These have roughly the same purpose as the SMRR, which we do not need
to implement in KVM.  However, Linux accesses MSR_K8_TSEG_ADDR at
boot, which causes problems when running a Xen dom0 under KVM.
Just return 0, meaning that processor protection of SMRAM is not
in effect.

Reported-by: M A Young <m.a.young@durham.ac.uk>
Acked-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
arch/x86/include/asm/msr-index.h
arch/x86/kvm/x86.c