[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [Patch 0/3]RAS(Part II)--Intel MCA enalbing in XEN
Ke, Liping wrote: The patches are for MCA enabling in XEN. Those patches based on AMD and SUN's MCA related jobs.We have some discussions with AMD/SUN and did refinements from the last sending. Also we rebase it after SUN's latest improvements. We will have following patches for recovery actions. This is a basic framework for Intel MCA. I looked the patches over a little more closely, and merged them with my -unstable tree. I found a few minor issues: * some compile issues with printk format strings in the case of DEBUG and 32bit * in severity_scan, use mca_rdmsrl and mca_wrmsrl to work correctly for simulated errors using injection * in severity_scan, if the MSR values were injected for debugging purposes, don't panic but keep going, since the injected values will be lost at reboot, and this is just a simulated #MC anyway, there is no danger of losing state I'll attach a little patch to fix these issues. I haven't tested this patch yet, although the compile fixes have been "tested". Finally, one final question: 2) When MCE# happens, all CPUs enter MCA context. The first CPU who read&clear the error MSR bank will be this MCE# owner. Necessary locks/synchronization will help to judge the owner and select most severe error. Is it always true (at least, for Intel CPUs of family 6 and 15) that when a #MC happens, *all* CPUs will receive a #MC trap? I couldn't find this anywhere in the documentation. If this is true, I'll change the MCE injection code to simulate #MC on all CPUs in the case of an Intel system. - Frank _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |