[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] xen/x86: introduce AMD_MCE_NONFATAL


  • To: Stefano Stabellini <stefano.stabellini@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
  • Date: Tue, 8 Jul 2025 12:25:19 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9GW5CeQwrcdmpiL0T5P0SGzzQlZMiG+uudhkrTeDjjk=; b=blYe5phi1hJxvXvFJv6BLg1VBUeM4/iBRaq5hiU6AmRxJEoAPpcidnGGdOFBkrAqNVHzNeZ38e6e5H9mnz9u7Jd+E9F7a4K5YdUHI3J7vhBKZhiZN8eaADNYT4B6qq2GAiF0Wd53DKT9ptMArPjWziofHlfQ6Q0mTcSc0NsZXqmfcuBc9YBdLbdiZdwQVtP8qajYnWFy2TWaNf8Un5CfONRFWWSE0QeR4EH/Ki1tOjWtgD5S+JbhA8C7v8DGHCfFkiGOw0Hx2nL7RTDxrjnoDT7uts8h3Ea037cnxvLdtTK+88VylHaAOzBcQ9gc9sWTL8Ktng3Mu0ur3KOtBRqlCg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=iKNpm6HCc5yjt8qNIMFtgbdceq2rk5busKwf7HdPK6opwQtUG4M+EYNYpT7GWXCdgmJ0XuxTechIepvh8pMHsR+VDMRzyLUhS2G/vmj6/+SyeJrXRIrIDFjDBqA9ZGnL/tNewVmdGulnHhgDGXhrmy6xABR83AJ5lyR5/urgrYMxUThzAlXtJoD05MdBRkww/pPW8mThbuh9H5TXMCRZf2+/43zOs5qv9P0hfn3XOo6FXQBM2OlWWTNDOk6S/Hw7Zkq6UviZQXlxCC7pftq+R4shO0HB/wSxFx0/QTSJQ5PTTb+OAOSM36ms93KIimGtQqM0ztSHV3uJ9bEwxVy42A==
  • Cc: <jbeulich@xxxxxxxx>, <andrew.cooper3@xxxxxxxxxx>, <roger.pau@xxxxxxxxxx>, <Xenia.Ragiadakou@xxxxxxx>, <Jason.Andryuk@xxxxxxx>
  • Delivery-date: Tue, 08 Jul 2025 10:25:41 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Tue Jul 8, 2025 at 2:07 AM CEST, Stefano Stabellini wrote:
> Today, checking for non-fatal MCE errors on ARM is very invasive: it
> involves a periodic timer interrupting the physical CPU execution at
> regular intervals. Moreover, when the timer fires, the handler sends an
> IPI to all physical CPUs.
>
> Both these actions are disruptive in terms of latency and deterministic
> execution times for real-time workloads. They might miss a deadline due
> to one of these IPIs. Make it possible to disable non-fatal MCE errors
> checking with a new Kconfig option (AMD_MCE_NONFATAL).
>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxx>
> ---
> RFC. I couldn't find a better way to do this.
> ---
>  xen/arch/x86/Kconfig.cpu               | 15 +++++++++++++++
>  xen/arch/x86/cpu/mcheck/amd_nonfatal.c |  3 ++-
>  2 files changed, 17 insertions(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/Kconfig.cpu b/xen/arch/x86/Kconfig.cpu
> index 5fb18db1aa..14e20ad19d 100644
> --- a/xen/arch/x86/Kconfig.cpu
> +++ b/xen/arch/x86/Kconfig.cpu
> @@ -10,6 +10,21 @@ config AMD
>         May be turned off in builds targetting other vendors.  Otherwise,
>         must be enabled for Xen to work suitably on AMD platforms.
>  
> +config AMD_MCE_NONFATAL
> +     bool "Check for non-fatal MCEs on AMD CPUs"
> +     default y
> +     depends on AMD
> +     help
> +       Check for non-fatal MCE errors.
> +
> +       When this option is on (default), Xen regularly checks for
> +       non-fatal MCEs potentially occurring on all physical CPUs. The
> +       checking is done via timers and IPI interrupts, which is
> +       acceptable in most configurations, but not for real-time.
> +
> +       Turn this option off if you plan on deploying real-time workloads
> +       on Xen.
> +

This being in the CPU vendor submenu seems off. I'd expect only a list of
silicon vendors here. I think it ought to be in the regular Kconfig file.

>  config INTEL
>       bool "Support Intel CPUs"
>       default y
> diff --git a/xen/arch/x86/cpu/mcheck/amd_nonfatal.c 
> b/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> index 7d48c9ab5f..812e18f612 100644
> --- a/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> +++ b/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> @@ -191,7 +191,8 @@ static void cf_check mce_amd_work_fn(void *data)
>  
>  void __init amd_nonfatal_mcheck_init(struct cpuinfo_x86 *c)
>  {
> -     if (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)))
> +     if ( !IS_ENABLED(CONFIG_AMD_MCE_NONFATAL) ||
> +          (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON))) )
>               return;
>  
>       /* Assume we are on K8 or newer AMD or Hygon CPU here */

It can be made more general to remove more code. What do you think of removing
all non-fatals and getting rid of the initcall altogether?

        diff --git a/xen/arch/x86/Kconfig.cpu b/xen/arch/x86/Kconfig.cpu
        index 5fb18db1aa..a4b892a1aa 100644
        --- a/xen/arch/x86/Kconfig.cpu
        +++ b/xen/arch/x86/Kconfig.cpu
        @@ -10,6 +10,20 @@ config AMD
                  May be turned off in builds targetting other vendors.  
Otherwise,
                  must be enabled for Xen to work suitably on AMD platforms.

        +config MCE_NONFATAL
        +       bool "Check for non-fatal MCEs"
        +       default y
        +       help
        +         Check for non-fatal MCE errors.
        +
        +         When this option is on (default), Xen regularly checks for
        +         non-fatal MCEs potentially occurring on all physical CPUs. The
        +         checking is done via timers and IPI interrupts, which is
        +         acceptable in most configurations, but not for real-time.
        +
        +         Turn this option off if you plan on deploying real-time 
workloads
        +         on Xen.
        +
         config INTEL
                bool "Support Intel CPUs"
                default y
        diff --git a/xen/arch/x86/cpu/mcheck/Makefile 
b/xen/arch/x86/cpu/mcheck/Makefile
        index e6cb4dd503..c70b441888 100644
        --- a/xen/arch/x86/cpu/mcheck/Makefile
        +++ b/xen/arch/x86/cpu/mcheck/Makefile
        @@ -1,12 +1,12 @@
        -obj-$(CONFIG_AMD) += amd_nonfatal.o
        +obj-$(filter $(CONFIG_AMD),$(CONFIG_MCE_NONFATAL)) += amd_nonfatal.o
         obj-$(CONFIG_AMD) += mce_amd.o
         obj-y += mcaction.o
         obj-y += barrier.o
        -obj-$(CONFIG_INTEL) += intel-nonfatal.o
        +obj-$(filter $(CONFIG_INTEL),$(CONFIG_MCE_NONFATAL)) += 
intel-nonfatal.o
         obj-y += mctelem.o
         obj-y += mce.o
         obj-y += mce-apei.o
         obj-$(CONFIG_INTEL) += mce_intel.o
        -obj-y += non-fatal.o
        +obj-$(CONFIG_MCE_NONFATAL) += non-fatal.o
         obj-y += util.o
         obj-y += vmce.o

... with the Kconfig option probably in the regular x86 Kconfig rather than
Kconfig.cpu

Thoughts?

Cheers,
Alejandro



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.