[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFC] RAS(Part II)--MCA enalbing in XEN
Hi, all These patches are for MCA enabling in XEN. It is sent as RFC firstly to collect some feedbacks for refinement if needed before the final patch. We also attach one description txt documents for your reference. Some implementation notes: 1) When error happens, if the error is fatal (pcc = 1) or can't be recovered (pcc = 0, yet no good recovery methods), for avoiding losing logs in DOM0, we will reset machine immediately. Most of MCA MSRs are sticky. After reboot, MCA polling mechanism will send vIRQ to DOM0 for logging. 2) When MCE# happens, all CPUs enter MCA context. The first CPU who read&clear the error MSR bank will be this MCE# owner. Necessary locks/synchronization will help to judge the owner and select most severe error. 3) For convenience, we will select the most offending CPU to do most of processing&recovery job. 4) MCE# happens, we will do three jobs: a. Send vIRQ to DOM0 for logging b. Send vMCE# to Impacted Guest (Currently Only inject to impacted DOM0) c. Guest vMCE MSR virtualization 5) Some further improvement/adds might be done if needed: a) Impacted DOM judgement algorithm. b) Now vMCE# injection is controlled by centralized data(vmce_data). The injection algorithm is a bit complex. We might change the algorithm which's based on PER_DOM data if you preferred. Notes for understanding: 1) If several banks impact one domain, yet those banks belong to the same pCPU, it will be injected only once. 2) If more than one bank impact one domain, yet error banks belong to different pCPU, ith will be injected nr_num(pCPU) times. 3) We use centralized data [two arrays impact_domid, impact_cpus map in vmce_data] to represent the injection algorithm. Combined the two array item (idx, impact_domid) and (idx, impact_cpus) into one item (idx, impact_domid, impact_cpus). This item records the impact_domain id and the error pCPU map (Finding UC errors on this CPU which impact this domain). Then, we can judge how to inject the vMCE (domid, impact_times[nr_pCPUs]). 4) Although data structure is ready, we only inject vMCE# to DOMD0 currently. c) Connection with recovery actions (cpu/memory online/offline) d) More refines and tests for HVM might be done when needed. Patch Description: 1. basic_mca_support: Enable MCA support in XEN. 2. vmsr_virtualization: Guest MCE# MSR read/write virtualization support in XEN. 3. mce_dom0: Cooperating with XEN, DOM0 add vIRQ and vMCE# handler. Translate XEN log to DOM0, re-use Linux kernel and MCELOG mechanisms and MCE handler. This is mainly a demonstration patch. About Test: We did some internal test and the result is just fine. Any feedback is welcome and thanks a lot for your help! :-) Regards, Criping Attachment:
MCA_desc.txt Attachment:
basic_mca_support.patch Attachment:
vmsr_virtualization.patch Attachment:
mce_dom0.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |