WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [pvops-dom0]Let PV ops guest could handle Machine Check trap

To: Jeremy Fitzhardinge <jeremy@xxxxxxxx>, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>, "Li, Haicheng" <haicheng.li@xxxxxxxxx>
Subject: [Xen-devel] [pvops-dom0]Let PV ops guest could handle Machine Check trap
From: "Ke, Liping" <liping.ke@xxxxxxxxx>
Date: Tue, 22 Sep 2009 14:32:14 +0800
Accept-language: en-US
Acceptlanguage: en-US
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Mon, 21 Sep 2009 23:34:22 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Aco7TmwS8eX3JmkOTW21T3es6prQ+g==
Thread-topic: [pvops-dom0]Let PV ops guest could handle Machine Check trap
Hi, Jeremy and all

This small patch lets pv ops guest handle machine check trap. When non
fatal mce error happens, xen will inject vMCE# to the impacted pv ops guest.
This patch allows pv ops guest could receive machine check trap and enter
its own machine check handler.

Thanks & Regards,
Criping


>From 5efc12fe8214d55e2becc2c4b6ec4a30531d7b60 Mon Sep 17 00:00:00 2001
From: Liping Ke <liping.ke@xxxxxxxxx>
Date: Tue, 22 Sep 2009 10:46:05 +0800
Subject: [PATCH] Let PV guest handle machine check trap.

This patch lets pv ops guest handle machine check trap. When non
fatal mce error happens, XEN will inject vMCE# to the pv ops guest
This patch allows pv ops guest could receive machine check trap 
and enter its own machine check handler.

Signed-off-by: Liping Ke <liping.ke@xxxxxxxxx>
---
 arch/x86/xen/enlighten.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
index 1edf6a8..3399a40 100644
--- a/arch/x86/xen/enlighten.c
+++ b/arch/x86/xen/enlighten.c
@@ -476,7 +476,7 @@ static int cvt_gate_to_trap(int vector, const gate_desc 
*val,
                return 0;
 #ifdef CONFIG_X86_MCE
        } else if (addr == (unsigned long)machine_check) {
-               return 0;
+               addr = (unsigned long)machine_check;
 #endif
        } else {
                /* Some other trap using IST? */
-- 
1.5.1

Attachment: 0001-Let-PV-guest-handle-machine-check-trap.patch
Description: 0001-Let-PV-guest-handle-machine-check-trap.patch

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>