[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3] x86/vpmu_intel: Fix hypervisor crash by masking PC bit in MSR_P6_EVNTSEL
> From: Jan Beulich > Sent: Friday, May 5, 2017 6:16 PM > > >>> On 04.05.17 at 23:30, <mohit.gambhir@xxxxxxxxxx> wrote: > > Setting Pin Control (PC) bit (19) in MSR_P6_EVNTSEL results in a General > > Protection Fault and thus results in a hypervisor crash. This behavior has > > been observed on two generations of Intel processors namely, Haswell and > > Broadwell. Other Intel processor generations were not tested. However, it > > does seem to be a possible erratum that hasn't yet been confirmed by Intel. > > > > To fix the problem this patch masks PC bit and returns an error in > > case any guest tries to write to it on any Intel processor. In addition > > to the fact that setting this bit crashes the hypervisor on Haswell and > > Broadwell, the PC flag bit toggles a hardware pin on the physical CPU > > every time the programmed event occurs and the hardware behavior in > > response to the toggle is undefined in the SDM, which makes this bit > > unsafe to be used by guests and hence should be masked on all machines. > > > > Signed-off-by: Mohit Gambhir <mohit.gambhir@xxxxxxxxxx> > > Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> > > Iirc the intention was to have this in 4.9, in which case you should > have Cc-ed Juline (now added). > Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |