aboutsummaryrefslogtreecommitdiffstats
path: root/xen/include/asm-x86/amd.h
Commit message (Collapse)AuthorAgeFilesLines
* xen: Remove x86_32 build target.Keir Fraser2012-09-121-2/+0
| | | | Signed-off-by: Keir Fraser <keir@xen.org>
* x86-64: refine the XSA-9 fixJan Beulich2012-08-201-0/+2
| | | | | | | | | | | | | | Our product management wasn't happy with the "solution" for XSA-9, and demanded that customer systems must continue to boot. Rather than having our and perhaps other distros carry non-trivial patches, allow for more fine grained control (panic on boot, deny guest creation, or merely warn) by means of a single line change. Also, as this was found to be a problem with remotely managed systems, don't default to boot denial (just deny guest creation). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org>
* x86-64: detect processors subject to AMD erratum #121 and refuse to bootJan Beulich2012-06-121-0/+3
| | | | | | | | | | | Processors with this erratum are subject to a DoS attack by unprivileged guest users. This is XSA-9 / CVE-2012-2934. Signed-off-by: Jan Beulich <JBeulich@suse.com> Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
* x86/AMD: fold redundant parameters of cpu_has_amd_erratum()Jan Beulich2011-12-191-2/+2
| | | | | | | | | | | The boolean 'osvw' indicator and 'osvw_id' can be folded - the function can as well distinguish the non-OSVW case by checking for a negative 'osvw_id'. That way the whole variable argument list processing is only needed on the legacy code path. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Boris Ostrovsky <boris.ostrovsky@amd.com> Acked-by: Wei Huang <wei.huang2@amd.com>
* x86/emulator: workaround for AMD erratum 573Jan Beulich2011-12-161-0/+6
| | | | | | | | | | | | | | | | | The only cases where we might end up emulating fsincos (as any other x87 operations without memory operands) are - when a HVM guest is in real mode (not applicable on AMD) - between two half page table updates in PAE mode (unlikely, and not doing the emulation here does affect only performance, not correctness) - when a guest maliciously (or erroneously) modifies an (MMIO or page table update) instruction under emulation (unspecified behavior) Hence, in order to avoid the erratum to cause harm to the entire host, don't emulate fsincos on the affected AMD CPU families. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org>
* x86/AMD: Remove AMD_ERRATUM_400 definitionBoris Ostrovsky2011-10-101-4/+0
| | | | | | | | | | | | | AMD_ERRATUM_400 was used to determine whether the processor supports Always Running APIC Counter (ARAT) feature in init_amd(). Now that ARAT support is based solely on family number this macro is no longer needed. Keep it in comments section as an example in case we ever need to use it for somethnig else. Signed-off-by: Boris Ostrovsky <boris.ostrovsky@amd.com> Committed-by: Jan Beulich <jbeulich@suse.com>
* x86: set ARAT feature flag for non-buggy AMD CPUsJan Beulich2011-05-011-0/+4
| | | | | | This is the equivalent of a recent Linux change. Signed-off-by: Jan Beulich <jbeulich@novell.com>
* Update AMD CPU feature flags 0x80000001:ECX for Xen HypervisorKeir Fraser2011-01-081-3/+3
| | | | | | | | This patch syncs-up AMD CPU feature flags 0x80000001:ECX with the latest Linux kernel. Several new features are added. Some of existing features' names are changed as well. Signed-off-by: Wei Huang <wei.huang2@amd.com>
* x86-64: enable MMCONFIG on AMD Fam10 systems even if the BIOS didn'tKeir Fraser2010-11-041-0/+7
| | | | | | | | Code for this has been in Linux since 2.6.26, and since Xen itself wants to use the MMCONFIG access method when possible, clone it (fixing some rather obvious bugs in that code at once). Signed-off-by: Jan Beulich <jbeulich@novell.com>
* AMD OSVW (OS Visible Workaround) for XenKeir Fraser2010-07-021-0/+138
This path enables AMD OSVW (OS Visible Workaround) feature for Xen. New AMD errata will have a OSVW id assigned in the future. OS is supposed to check OSVW status MSR to find out whether CPU has a specific erratum. Legacy errata are also supported in this patch: traditional family/model/stepping approach will be used if OSVW feature isn't applicable. This patch is adapted from Hans Rosenfeld's patch submitted to Linux kernel. Signed-off-by: Wei Huang <wei.huang2@amd.com> Signed-off-by: Hans Rosenfeld <hands.rosenfeld@amd.com> Acked-by: Jan Beulich <jbeulich@novell.com>