|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [Patch 0/3]RAS(Part II)--Intel MCA enalbing in XEN
Ke, Liping wrote:
The patches are for MCA enabling in XEN. Those patches based on AMD and SUN's
MCA related jobs.
We have some discussions with AMD/SUN and did refinements from the last sending. Also we rebase it after
SUN's latest improvements. We will have following patches for recovery actions. This is a basic framework
for Intel MCA.
I looked the patches over a little more closely, and merged them with my
-unstable tree. I found a few minor issues:
* some compile issues with printk format strings in the case of DEBUG
and 32bit
* in severity_scan, use mca_rdmsrl and mca_wrmsrl to work correctly for
simulated errors using injection
* in severity_scan, if the MSR values were injected for debugging
purposes, don't panic but keep going, since the injected values will be
lost at reboot, and this is just a simulated #MC anyway, there is no
danger of losing state
I'll attach a little patch to fix these issues. I haven't tested this
patch yet, although the compile fixes have been "tested".
Finally, one final question:
2) When MCE# happens, all CPUs enter MCA context. The first CPU who read&clear
the error MSR bank will be this
MCE# owner. Necessary locks/synchronization will help to judge the owner
and select most severe error.
Is it always true (at least, for Intel CPUs of family 6 and 15) that
when a #MC happens, *all* CPUs will receive a #MC trap? I couldn't find
this anywhere in the documentation.
If this is true, I'll change the MCE injection code to simulate #MC on
all CPUs in the case of an Intel system.
- Frank
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|