[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH] x86,amd: Remove unused wrmsr_amd



After Andrew's commit 07884c9, all writes to password-protected
MSR's are performed using wrmsr_amd_safe.

Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@xxxxxxx>
---
 xen/arch/x86/cpu/amd.c |   11 -----------
 1 file changed, 11 deletions(-)

diff --git a/xen/arch/x86/cpu/amd.c b/xen/arch/x86/cpu/amd.c
index ea158cb..3bf8410 100644
--- a/xen/arch/x86/cpu/amd.c
+++ b/xen/arch/x86/cpu/amd.c
@@ -45,17 +45,6 @@ integer_param("cpuid_mask_thermal_ecx", 
opt_cpuid_mask_thermal_ecx);
 s8 __read_mostly opt_allow_unsafe;
 boolean_param("allow_unsafe", opt_allow_unsafe);
 
-static inline void wrmsr_amd(unsigned int index, unsigned int lo, 
-               unsigned int hi)
-{
-       asm volatile (
-               "wrmsr"
-               : /* No outputs */
-               : "c" (index), "a" (lo), 
-               "d" (hi), "D" (0x9c5a203a)
-       );
-}
-
 static inline int rdmsr_amd_safe(unsigned int msr, unsigned int *lo,
                                 unsigned int *hi)
 {
-- 
1.7.9.5


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.