From mboxrd@z Thu Jan 1 00:00:00 1970 From: Joerg Roedel Subject: [PATCH 0/2] AMD Erratum 383 workaround for KVM Date: Mon, 17 May 2010 14:43:33 +0200 Message-ID: <1274100215-26467-1-git-send-email-joerg.roedel@amd.com> Mime-Version: 1.0 Content-Type: text/plain Cc: , Elsie Wahlig , Bhavna Sarathy , Boris Ostrovsky To: Avi Kivity , Marcelo Tosatti Return-path: Received: from va3ehsobe004.messaging.microsoft.com ([216.32.180.14]:23900 "EHLO VA3EHSOBE004.bigfish.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755244Ab0EQMok (ORCPT ); Mon, 17 May 2010 08:44:40 -0400 Sender: kvm-owner@vger.kernel.org List-ID: Hi, these two patches implement the workaround for AMD Erratum 383 into KVM. This is necessary to prevent the host to crash if a guest triggers the erratum. For details on the erratum please see page 96 of http://support.amd.com/us/Processor_TechDocs/41322.pdf The workaround implemented in these patches will be documented in the next update of the revision guide. Joerg Diffstat: arch/x86/include/asm/msr-index.h | 1 + arch/x86/kvm/svm.c | 98 +++++++++++++++++++++++++++++++++++++- 2 files changed, 98 insertions(+), 1 deletions(-) Shortlog: Joerg Roedel (2): KVM: SVM: Handle MCEs early in the vmexit process KVM: SVM: Implement workaround for Erratum 383