* [PATCH] x86, amd_ucode: Safeguard against #GP
@ 2014-05-21 21:28 Aravind Gopalakrishnan
2014-05-21 21:51 ` Boris Ostrovsky
` (2 more replies)
0 siblings, 3 replies; 10+ messages in thread
From: Aravind Gopalakrishnan @ 2014-05-21 21:28 UTC (permalink / raw)
To: jbeulich, keir, xen-devel; +Cc: boris.ostrovsky, Aravind Gopalakrishnan
When HW tries to load a corrupted patch, it generates #GP
and hangs the system. Use wrmsr_safe instead so that we
fail to load microcode gracefully.
Example on a Fam15h system-
(XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
(XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
0x6012 rev 0x6000637
(XEN) microcode: CPU0 found a matching microcode update with version
0x6000637 (current=0x6000626)
(XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
(XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
---
xen/arch/x86/microcode_amd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
index e83f4b6..23637e2 100644
--- a/xen/arch/x86/microcode_amd.c
+++ b/xen/arch/x86/microcode_amd.c
@@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
spin_lock_irqsave(µcode_update_lock, flags);
- wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
+ wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
/* get patch id after patching */
rdmsrl(MSR_AMD_PATCHLEVEL, rev);
--
1.7.9.5
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-21 21:28 [PATCH] x86, amd_ucode: Safeguard against #GP Aravind Gopalakrishnan
@ 2014-05-21 21:51 ` Boris Ostrovsky
2014-05-21 22:08 ` Andrew Cooper
2014-05-22 8:44 ` Jan Beulich
2 siblings, 0 replies; 10+ messages in thread
From: Boris Ostrovsky @ 2014-05-21 21:51 UTC (permalink / raw)
To: Aravind Gopalakrishnan; +Cc: keir, jbeulich, xen-devel
On 05/21/2014 05:28 PM, Aravind Gopalakrishnan wrote:
> When HW tries to load a corrupted patch, it generates #GP
> and hangs the system. Use wrmsr_safe instead so that we
> fail to load microcode gracefully.
>
> Example on a Fam15h system-
> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
> 0x6012 rev 0x6000637
> (XEN) microcode: CPU0 found a matching microcode update with version
> 0x6000637 (current=0x6000626)
> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>
> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
> ---
> xen/arch/x86/microcode_amd.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
> index e83f4b6..23637e2 100644
> --- a/xen/arch/x86/microcode_amd.c
> +++ b/xen/arch/x86/microcode_amd.c
> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>
> spin_lock_irqsave(µcode_update_lock, flags);
>
> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>
> /* get patch id after patching */
> rdmsrl(MSR_AMD_PATCHLEVEL, rev);
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-21 21:28 [PATCH] x86, amd_ucode: Safeguard against #GP Aravind Gopalakrishnan
2014-05-21 21:51 ` Boris Ostrovsky
@ 2014-05-21 22:08 ` Andrew Cooper
2014-05-22 15:53 ` Aravind Gopalakrishnan
2014-05-22 8:44 ` Jan Beulich
2 siblings, 1 reply; 10+ messages in thread
From: Andrew Cooper @ 2014-05-21 22:08 UTC (permalink / raw)
To: Aravind Gopalakrishnan, jbeulich, keir, xen-devel; +Cc: boris.ostrovsky
On 21/05/2014 22:28, Aravind Gopalakrishnan wrote:
> When HW tries to load a corrupted patch, it generates #GP
> and hangs the system. Use wrmsr_safe instead so that we
> fail to load microcode gracefully.
>
> Example on a Fam15h system-
> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
> 0x6012 rev 0x6000637
> (XEN) microcode: CPU0 found a matching microcode update with version
> 0x6000637 (current=0x6000626)
> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>
> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
I suspect that you will find with a *very* up-to-date master tree, an
early #GP should result in panic() instead of a hang, following
279840d5ea646 (If it doesn't I would be interested to know)
As for the patch itself, is it worth using the failure to purge this
patch from the cache? Nothing good can come of attempting to load the
same patch on a different cpu.
~Andrew
> ---
> xen/arch/x86/microcode_amd.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
> index e83f4b6..23637e2 100644
> --- a/xen/arch/x86/microcode_amd.c
> +++ b/xen/arch/x86/microcode_amd.c
> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>
> spin_lock_irqsave(µcode_update_lock, flags);
>
> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>
> /* get patch id after patching */
> rdmsrl(MSR_AMD_PATCHLEVEL, rev);
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-21 22:08 ` Andrew Cooper
@ 2014-05-22 15:53 ` Aravind Gopalakrishnan
2014-05-22 15:56 ` Andrew Cooper
0 siblings, 1 reply; 10+ messages in thread
From: Aravind Gopalakrishnan @ 2014-05-22 15:53 UTC (permalink / raw)
To: Andrew Cooper, jbeulich, keir, xen-devel; +Cc: boris.ostrovsky
[-- Attachment #1: Type: text/plain, Size: 1375 bytes --]
On 5/21/2014 5:08 PM, Andrew Cooper wrote:
> On 21/05/2014 22:28, Aravind Gopalakrishnan wrote:
>> When HW tries to load a corrupted patch, it generates #GP
>> and hangs the system. Use wrmsr_safe instead so that we
>> fail to load microcode gracefully.
>>
>> Example on a Fam15h system-
>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>> 0x6012 rev 0x6000637
>> (XEN) microcode: CPU0 found a matching microcode update with version
>> 0x6000637 (current=0x6000626)
>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>>
>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
> I suspect that you will find with a *very* up-to-date master tree, an
> early #GP should result in panic() instead of a hang, following
> 279840d5ea646 (If it doesn't I would be interested to know)
The console log states 'Panic on CPU0'. But system is basically hung
after that.
(attached snapshot)
> As for the patch itself, is it worth using the failure to purge this
> patch from the cache? Nothing good can come of attempting to load the
> same patch on a different cpu.
>
>
I don't think we do..
We only save the patch for apply on resume if 'applied_offset' has a
value right?
-Aravind.
[-- Attachment #2: xen-hang-latest-tree.jpg --]
[-- Type: image/jpeg, Size: 1660671 bytes --]
[-- Attachment #3: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-22 15:53 ` Aravind Gopalakrishnan
@ 2014-05-22 15:56 ` Andrew Cooper
2014-05-22 15:59 ` Aravind Gopalakrishnan
0 siblings, 1 reply; 10+ messages in thread
From: Andrew Cooper @ 2014-05-22 15:56 UTC (permalink / raw)
To: Aravind Gopalakrishnan; +Cc: boris.ostrovsky, keir, jbeulich, xen-devel
On 22/05/14 16:53, Aravind Gopalakrishnan wrote:
> On 5/21/2014 5:08 PM, Andrew Cooper wrote:
>> On 21/05/2014 22:28, Aravind Gopalakrishnan wrote:
>>> When HW tries to load a corrupted patch, it generates #GP
>>> and hangs the system. Use wrmsr_safe instead so that we
>>> fail to load microcode gracefully.
>>>
>>> Example on a Fam15h system-
>>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>>> 0x6012 rev 0x6000637
>>> (XEN) microcode: CPU0 found a matching microcode update with version
>>> 0x6000637 (current=0x6000626)
>>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626
>>> failed
>>>
>>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
>> I suspect that you will find with a *very* up-to-date master tree, an
>> early #GP should result in panic() instead of a hang, following
>> 279840d5ea646 (If it doesn't I would be interested to know)
>
> The console log states 'Panic on CPU0'. But system is basically hung
> after that.
> (attached snapshot)
I refer you to the last line :)
You have "noreboot" on your command line
~Andrew
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-22 15:56 ` Andrew Cooper
@ 2014-05-22 15:59 ` Aravind Gopalakrishnan
0 siblings, 0 replies; 10+ messages in thread
From: Aravind Gopalakrishnan @ 2014-05-22 15:59 UTC (permalink / raw)
To: Andrew Cooper; +Cc: boris.ostrovsky, keir, jbeulich, xen-devel
On 5/22/2014 10:56 AM, Andrew Cooper wrote:
> On 22/05/14 16:53, Aravind Gopalakrishnan wrote:
>> On 5/21/2014 5:08 PM, Andrew Cooper wrote:
>>> On 21/05/2014 22:28, Aravind Gopalakrishnan wrote:
>>>> When HW tries to load a corrupted patch, it generates #GP
>>>> and hangs the system. Use wrmsr_safe instead so that we
>>>> fail to load microcode gracefully.
>>>>
>>>> Example on a Fam15h system-
>>>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>>>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>>>> 0x6012 rev 0x6000637
>>>> (XEN) microcode: CPU0 found a matching microcode update with version
>>>> 0x6000637 (current=0x6000626)
>>>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>>>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626
>>>> failed
>>>>
>>>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
>>> I suspect that you will find with a *very* up-to-date master tree, an
>>> early #GP should result in panic() instead of a hang, following
>>> 279840d5ea646 (If it doesn't I would be interested to know)
>> The console log states 'Panic on CPU0'. But system is basically hung
>> after that.
>> (attached snapshot)
> I refer you to the last line :)
>
> You have "noreboot" on your command line
>
Ah. Okay, Will try again.
Thanks,
-Aravind.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-21 21:28 [PATCH] x86, amd_ucode: Safeguard against #GP Aravind Gopalakrishnan
2014-05-21 21:51 ` Boris Ostrovsky
2014-05-21 22:08 ` Andrew Cooper
@ 2014-05-22 8:44 ` Jan Beulich
2014-05-22 15:59 ` Aravind Gopalakrishnan
2 siblings, 1 reply; 10+ messages in thread
From: Jan Beulich @ 2014-05-22 8:44 UTC (permalink / raw)
To: Aravind Gopalakrishnan; +Cc: boris.ostrovsky, keir, xen-devel
>>> On 21.05.14 at 23:28, <aravind.gopalakrishnan@amd.com> wrote:
> When HW tries to load a corrupted patch, it generates #GP
> and hangs the system. Use wrmsr_safe instead so that we
> fail to load microcode gracefully.
>
> Example on a Fam15h system-
> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
> 0x6012 rev 0x6000637
> (XEN) microcode: CPU0 found a matching microcode update with version
> 0x6000637 (current=0x6000626)
> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>
> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
> ---
> xen/arch/x86/microcode_amd.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
> index e83f4b6..23637e2 100644
> --- a/xen/arch/x86/microcode_amd.c
> +++ b/xen/arch/x86/microcode_amd.c
> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>
> spin_lock_irqsave(µcode_update_lock, flags);
>
> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
I think you shouldn't ignore the "return" value here.
Also the last quoted log message above has the two revisions
reversed - mind fixing this at the same time?
Jan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-22 8:44 ` Jan Beulich
@ 2014-05-22 15:59 ` Aravind Gopalakrishnan
2014-05-23 6:05 ` Jan Beulich
0 siblings, 1 reply; 10+ messages in thread
From: Aravind Gopalakrishnan @ 2014-05-22 15:59 UTC (permalink / raw)
To: Jan Beulich; +Cc: boris.ostrovsky, keir, xen-devel
On 5/22/2014 3:44 AM, Jan Beulich wrote:
>>>> On 21.05.14 at 23:28, <aravind.gopalakrishnan@amd.com> wrote:
>> When HW tries to load a corrupted patch, it generates #GP
>> and hangs the system. Use wrmsr_safe instead so that we
>> fail to load microcode gracefully.
>>
>> Example on a Fam15h system-
>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>> 0x6012 rev 0x6000637
>> (XEN) microcode: CPU0 found a matching microcode update with version
>> 0x6000637 (current=0x6000626)
>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>>
>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
>> ---
>> xen/arch/x86/microcode_amd.c | 2 +-
>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>
>> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
>> index e83f4b6..23637e2 100644
>> --- a/xen/arch/x86/microcode_amd.c
>> +++ b/xen/arch/x86/microcode_amd.c
>> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>>
>> spin_lock_irqsave(µcode_update_lock, flags);
>>
>> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
> I think you shouldn't ignore the "return" value here.
Not sure I understand..
Do you mean you want to capture return value and bubble it up? maybe
print a debug message too?
Since we check if patch application succeeded using -
if ( rev != hdr->patch_id )
and return a error val here, would this not be sufficient?
> Also the last quoted log message above has the two revisions
> reversed - mind fixing this at the same time?
>
>
Will fix this.
Thanks,
-Aravind.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-22 15:59 ` Aravind Gopalakrishnan
@ 2014-05-23 6:05 ` Jan Beulich
2014-05-27 18:26 ` Aravind Gopalakrishnan
0 siblings, 1 reply; 10+ messages in thread
From: Jan Beulich @ 2014-05-23 6:05 UTC (permalink / raw)
To: Aravind Gopalakrishnan; +Cc: boris.ostrovsky, keir, xen-devel
>>> On 22.05.14 at 17:59, <aravind.gopalakrishnan@amd.com> wrote:
> On 5/22/2014 3:44 AM, Jan Beulich wrote:
>>>>> On 21.05.14 at 23:28, <aravind.gopalakrishnan@amd.com> wrote:
>>> When HW tries to load a corrupted patch, it generates #GP
>>> and hangs the system. Use wrmsr_safe instead so that we
>>> fail to load microcode gracefully.
>>>
>>> Example on a Fam15h system-
>>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>>> 0x6012 rev 0x6000637
>>> (XEN) microcode: CPU0 found a matching microcode update with version
>>> 0x6000637 (current=0x6000626)
>>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>>>
>>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
>>> ---
>>> xen/arch/x86/microcode_amd.c | 2 +-
>>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>>
>>> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
>>> index e83f4b6..23637e2 100644
>>> --- a/xen/arch/x86/microcode_amd.c
>>> +++ b/xen/arch/x86/microcode_amd.c
>>> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>>>
>>> spin_lock_irqsave(µcode_update_lock, flags);
>>>
>>> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>>> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>> I think you shouldn't ignore the "return" value here.
> Not sure I understand..
> Do you mean you want to capture return value and bubble it up? maybe
> print a debug message too?
Yes.
> Since we check if patch application succeeded using -
> if ( rev != hdr->patch_id )
> and return a error val here, would this not be sufficient?
It might, but I'm of the opinion that errors should never be ignored
_and_ be detected as early as possible.
Jan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] x86, amd_ucode: Safeguard against #GP
2014-05-23 6:05 ` Jan Beulich
@ 2014-05-27 18:26 ` Aravind Gopalakrishnan
0 siblings, 0 replies; 10+ messages in thread
From: Aravind Gopalakrishnan @ 2014-05-27 18:26 UTC (permalink / raw)
To: Jan Beulich; +Cc: boris.ostrovsky, keir, xen-devel
On 5/23/2014 1:05 AM, Jan Beulich wrote:
>>>> On 22.05.14 at 17:59, <aravind.gopalakrishnan@amd.com> wrote:
>> On 5/22/2014 3:44 AM, Jan Beulich wrote:
>>>>>> On 21.05.14 at 23:28, <aravind.gopalakrishnan@amd.com> wrote:
>>>> When HW tries to load a corrupted patch, it generates #GP
>>>> and hangs the system. Use wrmsr_safe instead so that we
>>>> fail to load microcode gracefully.
>>>>
>>>> Example on a Fam15h system-
>>>> (XEN) microcode: CPU0 collect_cpu_info: patch_id=0x6000626
>>>> (XEN) microcode: CPU0 size 7870, block size 2586 offset 76 equivID
>>>> 0x6012 rev 0x6000637
>>>> (XEN) microcode: CPU0 found a matching microcode update with version
>>>> 0x6000637 (current=0x6000626)
>>>> (XEN) traps.c:3073: GPF (0000): ffff82d08016f682 -> ffff82d08022d9f8
>>>> (XEN) microcode: CPU0 update from revision 0x6000637 to 0x6000626 failed
>>>>
>>>> Signed-off-by: Aravind Gopalakrishnan <aravind.gopalakrishnan@amd.com>
>>>> ---
>>>> xen/arch/x86/microcode_amd.c | 2 +-
>>>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>>>
>>>> diff --git a/xen/arch/x86/microcode_amd.c b/xen/arch/x86/microcode_amd.c
>>>> index e83f4b6..23637e2 100644
>>>> --- a/xen/arch/x86/microcode_amd.c
>>>> +++ b/xen/arch/x86/microcode_amd.c
>>>> @@ -191,7 +191,7 @@ static int apply_microcode(int cpu)
>>>>
>>>> spin_lock_irqsave(µcode_update_lock, flags);
>>>>
>>>> - wrmsrl(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>>>> + wrmsr_safe(MSR_AMD_PATCHLOADER, (unsigned long)hdr);
>>> I think you shouldn't ignore the "return" value here.
>> Not sure I understand..
>> Do you mean you want to capture return value and bubble it up? maybe
>> print a debug message too?
> Yes.
>
>> Since we check if patch application succeeded using -
>> if ( rev != hdr->patch_id )
>> and return a error val here, would this not be sufficient?
> It might, but I'm of the opinion that errors should never be ignored
> _and_ be detected as early as possible.
>
>
Have addressed above issues and sending out V2 with Boris' Reviewed-by tag.
Thanks,
-Aravind.
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2014-05-27 18:26 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-05-21 21:28 [PATCH] x86, amd_ucode: Safeguard against #GP Aravind Gopalakrishnan
2014-05-21 21:51 ` Boris Ostrovsky
2014-05-21 22:08 ` Andrew Cooper
2014-05-22 15:53 ` Aravind Gopalakrishnan
2014-05-22 15:56 ` Andrew Cooper
2014-05-22 15:59 ` Aravind Gopalakrishnan
2014-05-22 8:44 ` Jan Beulich
2014-05-22 15:59 ` Aravind Gopalakrishnan
2014-05-23 6:05 ` Jan Beulich
2014-05-27 18:26 ` Aravind Gopalakrishnan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).