[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V2] x86, amd_ucode: Safeguard against #GP



>>> On 30.05.14 at 18:21, <andrew.cooper3@xxxxxxxxxx> wrote:
> The unhandled #GP fault certainly should be wrapped with wrmsr_safe(), 
> and an error/warning presented to the user.  In the case that a bad 
> ucode is discovered, it should be discarded and the server allowed to 
> boot.  It is substantially more useful for the server to come up and say 
> "I couldn't load that bit of microcode you wanted me to", than to sit in 
> a reboot loop because you made a typo in the bootloader config, and have 
> to get someone in the datacenter to poke the physical server.

But this isn't due to a typo somewhere, but due to a corrupted
microcode blob.

Besides that no matter which BKDG I look at, I can't seem to find any
indication of there being room for a #GP here if the MSR itself is
implemented. While I don't question its presence in reality, I'd prefer
if this was documented properly for a patch to recover from it to go
in.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.