[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] Fix for AMD erratum 383 on Family 10h CPUs
>>> Wei Huang <wei.huang2@xxxxxxx> 17.05.10 20:57 >>> >This patches implements the workaround of AMD erratum 383 on family 10h >CPUs. It destroys the guest VM when a MC error with a special pattern is >detected. Without this patch, a guest VM failure can potentially crash >Xen hypervisor and the whole system. The erratum will be published in >next version of guide. While I realize that the patch has already been applied, I still have some reservations: - It fiddles with bit 47 of MSR_AMD64_DC_CFG *and* marks that the erratum is present. Normally I would expect that MSR modifications are done to work around an erratum, but here it is completely unclear what the modification is good for. - It clears all MCi_STATUS registers, despite (as I understand it) the problem only involving bank 0. - It flushes the TLBs for the affected domain - shouldn't this be done globally, if it is necessary at all? - Is it guaranteed that the #MC cannot happen when a #VMEXIT is already being processed by the CPU? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |