[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] xen/x86: introduce AMD_MCE_NONFATAL


  • To: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 8 Jul 2025 15:28:50 +0200
  • Autocrypt: addr=jbeulich@xxxxxxxx; keydata= xsDiBFk3nEQRBADAEaSw6zC/EJkiwGPXbWtPxl2xCdSoeepS07jW8UgcHNurfHvUzogEq5xk hu507c3BarVjyWCJOylMNR98Yd8VqD9UfmX0Hb8/BrA+Hl6/DB/eqGptrf4BSRwcZQM32aZK 7Pj2XbGWIUrZrd70x1eAP9QE3P79Y2oLrsCgbZJfEwCgvz9JjGmQqQkRiTVzlZVCJYcyGGsD /0tbFCzD2h20ahe8rC1gbb3K3qk+LpBtvjBu1RY9drYk0NymiGbJWZgab6t1jM7sk2vuf0Py O9Hf9XBmK0uE9IgMaiCpc32XV9oASz6UJebwkX+zF2jG5I1BfnO9g7KlotcA/v5ClMjgo6Gl MDY4HxoSRu3i1cqqSDtVlt+AOVBJBACrZcnHAUSuCXBPy0jOlBhxPqRWv6ND4c9PH1xjQ3NP nxJuMBS8rnNg22uyfAgmBKNLpLgAGVRMZGaGoJObGf72s6TeIqKJo/LtggAS9qAUiuKVnygo 3wjfkS9A3DRO+SpU7JqWdsveeIQyeyEJ/8PTowmSQLakF+3fote9ybzd880fSmFuIEJldWxp Y2ggPGpiZXVsaWNoQHN1c2UuY29tPsJgBBMRAgAgBQJZN5xEAhsDBgsJCAcDAgQVAggDBBYC AwECHgECF4AACgkQoDSui/t3IH4J+wCfQ5jHdEjCRHj23O/5ttg9r9OIruwAn3103WUITZee e7Sbg12UgcQ5lv7SzsFNBFk3nEQQCACCuTjCjFOUdi5Nm244F+78kLghRcin/awv+IrTcIWF hUpSs1Y91iQQ7KItirz5uwCPlwejSJDQJLIS+QtJHaXDXeV6NI0Uef1hP20+y8qydDiVkv6l IreXjTb7DvksRgJNvCkWtYnlS3mYvQ9NzS9PhyALWbXnH6sIJd2O9lKS1Mrfq+y0IXCP10eS FFGg+Av3IQeFatkJAyju0PPthyTqxSI4lZYuJVPknzgaeuJv/2NccrPvmeDg6Coe7ZIeQ8Yj t0ARxu2xytAkkLCel1Lz1WLmwLstV30g80nkgZf/wr+/BXJW/oIvRlonUkxv+IbBM3dX2OV8 AmRv1ySWPTP7AAMFB/9PQK/VtlNUJvg8GXj9ootzrteGfVZVVT4XBJkfwBcpC/XcPzldjv+3 HYudvpdNK3lLujXeA5fLOH+Z/G9WBc5pFVSMocI71I8bT8lIAzreg0WvkWg5V2WZsUMlnDL9 mpwIGFhlbM3gfDMs7MPMu8YQRFVdUvtSpaAs8OFfGQ0ia3LGZcjA6Ik2+xcqscEJzNH+qh8V m5jjp28yZgaqTaRbg3M/+MTbMpicpZuqF4rnB0AQD12/3BNWDR6bmh+EkYSMcEIpQmBM51qM EKYTQGybRCjpnKHGOxG0rfFY1085mBDZCH5Kx0cl0HVJuQKC+dV2ZY5AqjcKwAxpE75MLFkr wkkEGBECAAkFAlk3nEQCGwwACgkQoDSui/t3IH7nnwCfcJWUDUFKdCsBH/E5d+0ZnMQi+G0A nAuWpQkjM1ASeQwSHEeAWPgskBQL
  • Cc: andrew.cooper3@xxxxxxxxxx, roger.pau@xxxxxxxxxx, Xenia.Ragiadakou@xxxxxxx, Jason.Andryuk@xxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 08 Jul 2025 13:29:03 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 08.07.2025 12:25, Alejandro Vallejo wrote:
> On Tue Jul 8, 2025 at 2:07 AM CEST, Stefano Stabellini wrote:
>> --- a/xen/arch/x86/Kconfig.cpu
>> +++ b/xen/arch/x86/Kconfig.cpu
>> @@ -10,6 +10,21 @@ config AMD
>>        May be turned off in builds targetting other vendors.  Otherwise,
>>        must be enabled for Xen to work suitably on AMD platforms.
>>  
>> +config AMD_MCE_NONFATAL
>> +    bool "Check for non-fatal MCEs on AMD CPUs"
>> +    default y
>> +    depends on AMD
>> +    help
>> +      Check for non-fatal MCE errors.
>> +
>> +      When this option is on (default), Xen regularly checks for
>> +      non-fatal MCEs potentially occurring on all physical CPUs. The
>> +      checking is done via timers and IPI interrupts, which is
>> +      acceptable in most configurations, but not for real-time.
>> +
>> +      Turn this option off if you plan on deploying real-time workloads
>> +      on Xen.
>> +
> 
> This being in the CPU vendor submenu seems off. I'd expect only a list of
> silicon vendors here. I think it ought to be in the regular Kconfig file.

Whether in this file or the regular one is up for discussion, but yes,
definitely not inside the vendor menu.

>> --- a/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
>> +++ b/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
>> @@ -191,7 +191,8 @@ static void cf_check mce_amd_work_fn(void *data)
>>  
>>  void __init amd_nonfatal_mcheck_init(struct cpuinfo_x86 *c)
>>  {
>> -    if (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)))
>> +    if ( !IS_ENABLED(CONFIG_AMD_MCE_NONFATAL) ||
>> +         (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON))) )
>>              return;
>>  
>>      /* Assume we are on K8 or newer AMD or Hygon CPU here */
> 
> It can be made more general to remove more code. What do you think of removing
> all non-fatals and getting rid of the initcall altogether?

I think such a more general approach would be quite a bit better.

Jan

>       diff --git a/xen/arch/x86/Kconfig.cpu b/xen/arch/x86/Kconfig.cpu
>       index 5fb18db1aa..a4b892a1aa 100644
>       --- a/xen/arch/x86/Kconfig.cpu
>       +++ b/xen/arch/x86/Kconfig.cpu
>       @@ -10,6 +10,20 @@ config AMD
>                 May be turned off in builds targetting other vendors.  
> Otherwise,
>                 must be enabled for Xen to work suitably on AMD platforms.
> 
>       +config MCE_NONFATAL
>       +       bool "Check for non-fatal MCEs"
>       +       default y
>       +       help
>       +         Check for non-fatal MCE errors.
>       +
>       +         When this option is on (default), Xen regularly checks for
>       +         non-fatal MCEs potentially occurring on all physical CPUs. The
>       +         checking is done via timers and IPI interrupts, which is
>       +         acceptable in most configurations, but not for real-time.
>       +
>       +         Turn this option off if you plan on deploying real-time 
> workloads
>       +         on Xen.
>       +
>        config INTEL
>               bool "Support Intel CPUs"
>               default y
>       diff --git a/xen/arch/x86/cpu/mcheck/Makefile 
> b/xen/arch/x86/cpu/mcheck/Makefile
>       index e6cb4dd503..c70b441888 100644
>       --- a/xen/arch/x86/cpu/mcheck/Makefile
>       +++ b/xen/arch/x86/cpu/mcheck/Makefile
>       @@ -1,12 +1,12 @@
>       -obj-$(CONFIG_AMD) += amd_nonfatal.o
>       +obj-$(filter $(CONFIG_AMD),$(CONFIG_MCE_NONFATAL)) += amd_nonfatal.o
>        obj-$(CONFIG_AMD) += mce_amd.o
>        obj-y += mcaction.o
>        obj-y += barrier.o
>       -obj-$(CONFIG_INTEL) += intel-nonfatal.o
>       +obj-$(filter $(CONFIG_INTEL),$(CONFIG_MCE_NONFATAL)) += 
> intel-nonfatal.o
>        obj-y += mctelem.o
>        obj-y += mce.o
>        obj-y += mce-apei.o
>        obj-$(CONFIG_INTEL) += mce_intel.o
>       -obj-y += non-fatal.o
>       +obj-$(CONFIG_MCE_NONFATAL) += non-fatal.o
>        obj-y += util.o
>        obj-y += vmce.o
> 
> ... with the Kconfig option probably in the regular x86 Kconfig rather than
> Kconfig.cpu
> 
> Thoughts?
> 
> Cheers,
> Alejandro




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.