aboutsummaryrefslogtreecommitdiff
path: root/include/crypto/scatterwalk.h
diff options
context:
space:
mode:
authorAndre Przywara <andre.przywara@amd.com>2009-06-24 12:44:34 +0200
committerAvi Kivity <avi@redhat.com>2009-09-10 08:33:03 +0300
commit1fdbd48c242db996107f72ae4140ffe8163e26a8 (patch)
tree39180cfe8ba8268d7c67713446d78f1e19dfd5b0 /include/crypto/scatterwalk.h
parent8f1589d95e5eab1ed287f217a33656e922cdbdd0 (diff)
KVM: ignore reads from AMDs C1E enabled MSR
If the Linux kernel detects an C1E capable AMD processor (K8 RevF and higher), it will access a certain MSR on every attempt to go to halt. Explicitly handle this read and return 0 to let KVM run a Linux guest with the native AMD host CPU propagated to the guest. Signed-off-by: Andre Przywara <andre.przywara@amd.com> Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'include/crypto/scatterwalk.h')
0 files changed, 0 insertions, 0 deletions