Re: [Xen-devel] [PATCH] KVM: x86: trap AMD MSRs for the TSeg base and mask

2015-09-18 Thread Borislav Petkov
On Fri, Sep 18, 2015 at 05:34:24PM +0200, Paolo Bonzini wrote: > These have roughly the same purpose as the SMRR, which we do not need > to implement in KVM. However, Linux accesses MSR_K8_TSEG_ADDR at > boot, which causes problems when running a Xen dom0 under KVM. > Just return 0, meaning that

[Xen-devel] [PATCH] KVM: x86: trap AMD MSRs for the TSeg base and mask

2015-09-18 Thread Paolo Bonzini
These have roughly the same purpose as the SMRR, which we do not need to implement in KVM. However, Linux accesses MSR_K8_TSEG_ADDR at boot, which causes problems when running a Xen dom0 under KVM. Just return 0, meaning that processor protection of SMRAM is not in effect. Signed-off-by: Paolo