[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] mce_wrmsr() and (at least) HVM guests



>-----Original Message-----
>From: Jan Beulich [mailto:JBeulich@xxxxxxxxxx]
>Sent: Monday, January 04, 2010 4:09 PM
>To: Jiang, Yunhong
>Cc: Ke, Liping; xen-devel@xxxxxxxxxxxxxxxxxxx
>Subject: RE: [Xen-devel] mce_wrmsr() and (at least) HVM guests
>
>>>> "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> 23.12.09 04:22 >>>
>>I think it is different for MCG_CTL and MCn_CTL:
>>For MCG_CTL, the SDM spec stated: "IA32_MCG_CTL controls the
>>reporting of machine-check exceptions. If present, writing 1s to this
>>register enables machine-check features and writing all 0s disables
>>machine-check features. All other values are undefined and/or
>>implementation specific.". So I assume current implementation is ok.
>
>I tend to disagree, based on the "and/or implementation specific": As
>long as model specific information is available to the kernel, it may
>validly write other values - as is happening for the specific AMD case.

Hmm, this make sense, originally I thought it's AMD specific.
>
>>For MCn_CTL, the spec only stated that "P6 family processors only
>>allow the writing of all 1s or all 0s to the IA32_MCi_CTL MSR". So
>>yes, current implementation is over-killed, especially I think we
>>should not care about P6 family in Xen environment.
>
>I agree here.
>
>>But the mce_cpu_quirks() give remind me if we should still split the
>>Intel/AMD MCE msr virtualization? For example, will AMD platform
>>allow IA32_MCE_CTL to be not all 1s and 0s?
>
>I don't think so, as per the above.

Agree.

>
>>And also another potential issue raised out. For example, guest has
>>clear one bit in MCn_CTL while physically it is enabled. If a error
>>corresponding to this bit really happen, at least we should not inject
>>a vMCE to guest. We will either kill the guest, or let the guest
>>continues, depends on the error type .
>
>Yes, this would make sense, albeit it seems overkill to me - there
>shouldn't really be disagreement in how specific models get handled.
>Instead, perhaps an unprivileged guest should be permitted to write
>zero bits wherever the underlying real register has them clear (as
>read back from hardware, not as written by Xen or dom0).

What do you mean of "write zero bits wherever the underlying real register has 
them clear"?
>
>>I can cook patches for these issues, after I resolve the vMCE to
>>pvops dom0, hopefully early next week.
>
>That would be great, thanks.

I'm working on this now.

--jyh

>
>Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.