svm: amend c/s 24990:322300fd2ebd (fake BU_CFG MSR on AMD revF)
authorJan Beulich <jbeulich@suse.com>
Thu, 15 Mar 2012 14:09:18 +0000 (15:09 +0100)
committerJan Beulich <jbeulich@suse.com>
Thu, 15 Mar 2012 14:09:18 +0000 (15:09 +0100)
Let's restrict such a hack to the known affected family.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
Acked-by: George Dunlap <george.dunlap@eu.citrix.com>
xen/arch/x86/hvm/svm/svm.c

index f87afd90e2c7fafced5cb85eecf1ecabd32bc63c..c05df20bf46246c8b4f0bc4ee8d11e9f2b7c06d7 100644 (file)
@@ -1505,7 +1505,7 @@ static int svm_msr_read_intercept(unsigned int msr, uint64_t *msr_content)
         if ( rdmsr_safe(msr, *msr_content) == 0 )
             break;
 
-        if ( msr == MSR_F10_BU_CFG )
+        if ( boot_cpu_data.x86 == 0xf && msr == MSR_F10_BU_CFG )
         {
             /* Win2k8 x64 reads this MSR on revF chips, where it
              * wasn't publically available; it uses a magic constant