diff options
author | Andre Przywara <andre.przywara@amd.com> | 2009-06-24 12:44:34 +0200 |
---|---|---|
committer | Avi Kivity <avi@redhat.com> | 2009-09-10 08:33:03 +0300 |
commit | 1fdbd48c242db996107f72ae4140ffe8163e26a8 (patch) | |
tree | 39180cfe8ba8268d7c67713446d78f1e19dfd5b0 /include/crypto/scatterwalk.h | |
parent | 8f1589d95e5eab1ed287f217a33656e922cdbdd0 (diff) |
KVM: ignore reads from AMDs C1E enabled MSR
If the Linux kernel detects an C1E capable AMD processor (K8 RevF and
higher), it will access a certain MSR on every attempt to go to halt.
Explicitly handle this read and return 0 to let KVM run a Linux guest
with the native AMD host CPU propagated to the guest.
Signed-off-by: Andre Przywara <andre.przywara@amd.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'include/crypto/scatterwalk.h')
0 files changed, 0 insertions, 0 deletions