Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Jan 2019 23:55:38 +0000
From:      bugzilla-noreply@freebsd.org
To:        virtualization@FreeBSD.org
Subject:   [Bug 235010] bhyve: Linux guest crash due to unhandled MSR
Message-ID:  <bug-235010-27103-9DlQZPfdcD@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-235010-27103@https.bugs.freebsd.org/bugzilla/>
References:  <bug-235010-27103@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235010

--- Comment #5 from commit-hook@freebsd.org ---
A commit references this bug:

Author: cem
Date: Fri Jan 18 23:54:51 UTC 2019
New revision: 343166
URL: https://svnweb.freebsd.org/changeset/base/343166

Log:
  vmm(4): Mask Spectre feature bits on AMD hosts

  For parity with Intel hosts, which already mask out the CPUID feature
  bits that indicate the presence of the SPEC_CTRL MSR, do the same on
  AMD.

  Eventually we may want to have a better support story for guests, but
  for now, limit the damage of incorrectly indicating an MSR we do not yet
  support.

  Eventually, we may want a generic CPUID override system for
  administrators, or for minimum supported feature set in heterogenous
  environments with failover.  That is a much larger scope effort than
  this bug fix.

  PR:           235010
  Reported by:  Rys Sommefeldt <rys AT sommefeldt.com>
  Sponsored by: Dell EMC Isilon

Changes:
  head/sys/amd64/vmm/x86.c

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-235010-27103-9DlQZPfdcD>