[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] NMI: continue in case of PCI SERR erros
>>> On 25.02.11 at 12:27, Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> wrote: > On Fri, 25 Feb 2011, Jan Beulich wrote: >> >>> On 25.02.11 at 11:53, Stefano Stabellini >> >>> <stefano.stabellini@xxxxxxxxxxxxx> >> wrote: >> > Memory parity error is only valid for IBM PC-AT, newer machines use >> > bit 7 (0x80) of 0x61 port for PCI SERR. While memory errors are >> > usually reported via MCE. >> > >> > Rename the memory parity error handler to pci serr handler and >> > print a warning and continue instead of crashing. >> > >> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> >> > >> > --- >> > >> > diff -r 598d1fc295b6 xen/arch/x86/traps.c >> > --- a/xen/arch/x86/traps.c Thu Feb 24 09:33:19 2011 +0000 >> > +++ b/xen/arch/x86/traps.c Fri Feb 25 10:37:47 2011 +0000 >> > @@ -3075,23 +3075,12 @@ static void nmi_dom0_report(unsigned int >> > send_guest_trap(d, 0, TRAP_nmi); >> > } >> > >> > -static void mem_parity_error(struct cpu_user_regs *regs) >> > +static void pci_serr_error(struct cpu_user_regs *regs) >> > { >> > - switch ( opt_nmi[0] ) >> > - { >> > - case 'd': /* 'dom0' */ >> > - nmi_dom0_report(_XEN_NMIREASON_parity_error); >> > - case 'i': /* 'ignore' */ >> > - break; >> > - default: /* 'fatal' */ >> > - console_force_unlock(); >> > - printk("\n\nNMI - MEMORY ERROR\n"); >> > - fatal_trap(TRAP_nmi, regs); >> > - } >> > + console_force_unlock(); >> > + printk("\n\nNMI - PCI system error (SERR)\n"); >> >> Why do you remove the reporting of the event to Dom0? I'd rather >> see this part stay and the public headers getting adjusted in a >> compatible way. >> > > Because it might not have anything to do with dom0: I wrote this patch As you say: might. > to fix http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1744, that > is due to Xen trying to mask an MSI-X of a device assigned to a guest on > shutdown. The device seems to be in a state in which it refuses any > interactions so it sends a PCI SERR that becomes an NMI and used to > crash Xen. I'm certainly agreeing to the part that avoids the crash. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |