[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Fix for AMD erratum 383 on Family 10h CPUs



>>> Wei Huang <wei.huang2@xxxxxxx> 17.05.10 20:57 >>>
>This patches implements the workaround of AMD erratum 383 on family 10h 
>CPUs. It destroys the guest VM when a MC error with a special pattern is 
>detected. Without this patch, a guest VM failure can potentially crash 
>Xen hypervisor and the whole system. The erratum will be published in 
>next version of guide.

While I realize that the patch has already been applied, I still have
some reservations:
- It fiddles with bit 47 of MSR_AMD64_DC_CFG *and* marks that the
  erratum is present. Normally I would expect that MSR modifications
  are done to work around an erratum, but here it is completely
  unclear what the modification is good for.
- It clears all MCi_STATUS registers, despite (as I understand it) the
  problem only involving bank 0.
- It flushes the TLBs for the affected domain - shouldn't this be done
  globally, if it is necessary at all?
- Is it guaranteed that the #MC cannot happen when a #VMEXIT is
  already being processed by the CPU?

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.