[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] Revert "EDAC/mce_amd: Do not load edac_mce_amd module on guests"
- To: "Luck, Tony" <tony.luck@xxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Elliott Mitchell <ehem+xen@xxxxxxx>
- From: Yazen Ghannam <yazen.ghannam@xxxxxxx>
- Date: Wed, 13 Sep 2023 12:21:23 -0400
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kFv0IXU+8fmxne5lj6aVNbdmZ4YdZI8WomzU/KcoQzk=; b=NjzrcPELBQsK49YlXDoWgYUvGiuCEKTQY5VLu+n4i2EvmwhuFQET+wK9+Fv3BUbQmIzJOgzkDfqD0lHtnPwwwzsqiPdmrLDBjz1uD/YsWZxYX34MnScnVYAOIzFIzVln3ZR27N+C2/yY/yUVI4IAS32ppcD6TXQDoqOJkxnWtq6M7OvO+IIOmuA2iC2zECfSNuMG5d10QewEkpl5qfQjUY9xNKDFqonh3iBL1YAAQMEjXMoizaR9Rwtka6KHzC+BLjeGdITUKXkjNvpyMsMk18JdjqU6TGSPb7pz7a55tlvHdm5BMyWqwHgp2sdRauqRnrvyWC6YGkTSyr0lbqfSEQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AbAM/ijDNfYDw+PpL+PSBDEOQxx2+Jal8dRl5bhLOhnP/lfBnerivvmZr7em0SkNPoW0o+YyDXOGAyqZX/d4peWeOECIG/SPPRoerCiC6LIMSiBPhRhkKjD4D31v+r32lR+U9RA4+5yU31j/4HMo74rpcaYQkkHgkVoOqWd25P0aK4w5yI8zKhow/umgzt0KaGpeLEMd9kHhtPaeypYMS0kGA7lV19A6TdjVCJNTsIpxv6uqH9Jcq9De2nFZxD7CnNk3gfFQJfTOIEn9MubwN+w4uJK3CkL6iXyikR3y7ExAOmshRFa+SsDIwTnDb06g6pLDOXsNU5hp1uRiaDPqUw==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
- Cc: yazen.ghannam@xxxxxxx, "smita.koralahallichannabasappa@xxxxxxx" <smita.koralahallichannabasappa@xxxxxxx>, "linux-edac@xxxxxxxxxxxxxxx" <linux-edac@xxxxxxxxxxxxxxx>, "linux-kernel@xxxxxxxxxxxxxxx" <linux-kernel@xxxxxxxxxxxxxxx>, "x86@xxxxxxxxxx" <x86@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "rric@xxxxxxxxxx" <rric@xxxxxxxxxx>, "james.morse@xxxxxxx" <james.morse@xxxxxxx>
- Delivery-date: Thu, 14 Sep 2023 04:45:52 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 9/13/23 11:50 AM, Luck, Tony wrote:
>> Also, please note that the EDAC modules don't handle MCE events
>> directly. They act on information passed from the MCE subsystem.
>>
>> Furthermore, there are other EDAC modules that have the same !hypervisor
>> check, so why change only this one?
>
> The older Intel EDAC drivers translated system physical addresses to DIMM
> addresses by digging around in the CONFIG and MMIO space of the memory
> controller devices. It would seem unwise for a VMM to give access to those
> addresses to a guest (in general ... perhaps OK for a Xen style "DOM0" guest
> that is
> handling many tasks for the VMM?).
>
> What system resources do AMD EDAC drivers need access to? Could they
> work inside a guest?
>
The MCE decoder may access some newer MCA registers, or request info
from the MCE subsystem. But this is for informational error decoding. It
won't support any actions that a guest could take.
The AMD64 EDAC module reads system-specific memory controller registers
through non-architectural interfaces. So also unwise or not useful for a
guest to access.
Thanks,
Yazen
|