[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] xen/x86: introduce AMD_MCE_NONFATAL


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Stefano Stabellini <stefano.stabellini@xxxxxxx>
  • Date: Tue, 8 Jul 2025 10:13:25 -0700
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=i6ayzJXoYHvJHgMgTaIVaDpXxx2nzK7b2z3p1T5AeV8=; b=jGH/rANVZJUJnNHI8WjTAbUaSQEj8OHPNrFIWju55xVeblq70sgk8FU2JyEIEZA1KtGWdew0N/NG0tB7Lp2qgkHNLB3CG5/zB3GKY4Naubu/oKi1fs84N33Ez0scm2xpevrZoe+Wkn/oO3f8DyCUwk90FUidQUJTcaGddCIWibf1sFetDn1ZVS+zoB/Mqmss6x3De2ImJ4tSDQpFHRf3eF2qHzA/jNZiUZk7LS+QNAFEHNqD8O8o/rz0Qkf+SiU02DgIVl9xrs1BRtBsNT0xPpApR8Zs2H/XHzgZQNoKYUasPXPchJ0NzeAC+4/Gkm8FNYtOQGV8pE807qgm3VE4ZA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QI3ryxCZRQUzibFpoCW6CNZt0F1eNtC8vackqpx2MJsFIT4nmYDpcSYMncbd4wAsYTtc5iuKsMwPkaYTcauJBngSAnm1Y9s15lKG+XFyjDqsLNiC+8OsSY4aMbcN6xnRL7CKKSZxgZa38kv6dp83ANhr/jjoYizc6lHppLkOZO/1aTtR87wSNsLLyhlZrXHZFBP9NvFrGbfIhh/2cloCfbvB6o8k5SLjjb6BKiCjBbZ2F5xvwKpi59/yDru61g4WELVvq/PmqSewkXAogI1zoveSv3tjYqcC0iFRGsOq28oXjH2P8FjeeXsWEOXTq0WmV9Ze8Kj+fB8ilDaGS9U/Sg==
  • Cc: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxx>, <andrew.cooper3@xxxxxxxxxx>, <roger.pau@xxxxxxxxxx>, <Xenia.Ragiadakou@xxxxxxx>, <Jason.Andryuk@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 08 Jul 2025 17:13:36 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Tue, 8 Jul 2025, Jan Beulich wrote:
> On 08.07.2025 12:25, Alejandro Vallejo wrote:
> > On Tue Jul 8, 2025 at 2:07 AM CEST, Stefano Stabellini wrote:
> >> --- a/xen/arch/x86/Kconfig.cpu
> >> +++ b/xen/arch/x86/Kconfig.cpu
> >> @@ -10,6 +10,21 @@ config AMD
> >>      May be turned off in builds targetting other vendors.  Otherwise,
> >>      must be enabled for Xen to work suitably on AMD platforms.
> >>  
> >> +config AMD_MCE_NONFATAL
> >> +  bool "Check for non-fatal MCEs on AMD CPUs"
> >> +  default y
> >> +  depends on AMD
> >> +  help
> >> +    Check for non-fatal MCE errors.
> >> +
> >> +    When this option is on (default), Xen regularly checks for
> >> +    non-fatal MCEs potentially occurring on all physical CPUs. The
> >> +    checking is done via timers and IPI interrupts, which is
> >> +    acceptable in most configurations, but not for real-time.
> >> +
> >> +    Turn this option off if you plan on deploying real-time workloads
> >> +    on Xen.
> >> +
> > 
> > This being in the CPU vendor submenu seems off. I'd expect only a list of
> > silicon vendors here. I think it ought to be in the regular Kconfig file.
> 
> Whether in this file or the regular one is up for discussion, but yes,
> definitely not inside the vendor menu.
> 
> >> --- a/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> >> +++ b/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> >> @@ -191,7 +191,8 @@ static void cf_check mce_amd_work_fn(void *data)
> >>  
> >>  void __init amd_nonfatal_mcheck_init(struct cpuinfo_x86 *c)
> >>  {
> >> -  if (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)))
> >> +  if ( !IS_ENABLED(CONFIG_AMD_MCE_NONFATAL) ||
> >> +       (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON))) )
> >>            return;
> >>  
> >>    /* Assume we are on K8 or newer AMD or Hygon CPU here */
> > 
> > It can be made more general to remove more code. What do you think of 
> > removing
> > all non-fatals and getting rid of the initcall altogether?
> 
> I think such a more general approach would be quite a bit better.

I am fine with that, actually better to remove the code then to leave it
around and do nothing.

 
> >     diff --git a/xen/arch/x86/Kconfig.cpu b/xen/arch/x86/Kconfig.cpu
> >     index 5fb18db1aa..a4b892a1aa 100644
> >     --- a/xen/arch/x86/Kconfig.cpu
> >     +++ b/xen/arch/x86/Kconfig.cpu
> >     @@ -10,6 +10,20 @@ config AMD
> >               May be turned off in builds targetting other vendors.  
> > Otherwise,
> >               must be enabled for Xen to work suitably on AMD platforms.
> > 
> >     +config MCE_NONFATAL
> >     +       bool "Check for non-fatal MCEs"
> >     +       default y
> >     +       help
> >     +         Check for non-fatal MCE errors.
> >     +
> >     +         When this option is on (default), Xen regularly checks for
> >     +         non-fatal MCEs potentially occurring on all physical CPUs. The
> >     +         checking is done via timers and IPI interrupts, which is
> >     +         acceptable in most configurations, but not for real-time.
> >     +
> >     +         Turn this option off if you plan on deploying real-time 
> > workloads
> >     +         on Xen.
> >     +
> >      config INTEL
> >             bool "Support Intel CPUs"
> >             default y
> >     diff --git a/xen/arch/x86/cpu/mcheck/Makefile 
> > b/xen/arch/x86/cpu/mcheck/Makefile
> >     index e6cb4dd503..c70b441888 100644
> >     --- a/xen/arch/x86/cpu/mcheck/Makefile
> >     +++ b/xen/arch/x86/cpu/mcheck/Makefile
> >     @@ -1,12 +1,12 @@
> >     -obj-$(CONFIG_AMD) += amd_nonfatal.o
> >     +obj-$(filter $(CONFIG_AMD),$(CONFIG_MCE_NONFATAL)) += amd_nonfatal.o
> >      obj-$(CONFIG_AMD) += mce_amd.o
> >      obj-y += mcaction.o
> >      obj-y += barrier.o
> >     -obj-$(CONFIG_INTEL) += intel-nonfatal.o
> >     +obj-$(filter $(CONFIG_INTEL),$(CONFIG_MCE_NONFATAL)) += 
> > intel-nonfatal.o
> >      obj-y += mctelem.o
> >      obj-y += mce.o
> >      obj-y += mce-apei.o
> >      obj-$(CONFIG_INTEL) += mce_intel.o
> >     -obj-y += non-fatal.o
> >     +obj-$(CONFIG_MCE_NONFATAL) += non-fatal.o
> >      obj-y += util.o
> >      obj-y += vmce.o
> > 
> > ... with the Kconfig option probably in the regular x86 Kconfig rather than
> > Kconfig.cpu
> > 
> > Thoughts?
> > 
> > Cheers,
> > Alejandro
> 



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.