From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH 0/2] AMD Erratum 383 workaround for KVM Date: Wed, 19 May 2010 19:13:57 +0300 Message-ID: <4BF40E45.6000900@redhat.com> References: <1274100215-26467-1-git-send-email-joerg.roedel@amd.com> <20100519120326.GQ9007@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: Marcelo Tosatti , "Ostrovsky, Boris" , "Wahlig, Elsie" , "kvm@vger.kernel.org" , "Sarathy, Bhavna" To: Joerg Roedel Return-path: Received: from mx1.redhat.com ([209.132.183.28]:53882 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750900Ab0ESQOC (ORCPT ); Wed, 19 May 2010 12:14:02 -0400 In-Reply-To: <20100519120326.GQ9007@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: On 05/19/2010 03:03 PM, Joerg Roedel wrote: > On Mon, May 17, 2010 at 08:43:33AM -0400, Joerg Roedel wrote: > >> these two patches implement the workaround for AMD Erratum 383 into KVM. >> This is necessary to prevent the host to crash if a guest triggers the >> erratum. >> For details on the erratum please see page 96 of >> >> http://support.amd.com/us/Processor_TechDocs/41322.pdf >> >> The workaround implemented in these patches will be documented in the >> next update of the revision guide. >> > Hey Marcelo, Avi, > > have you had a chance to look at this? Any opinions? > > Sorry, holiday here. Patches applied, thanks. -- Do not meddle in the internals of kernels, for they are subtle and quick to panic.