|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 2/2] xen/x86: introduce AMD_MCE_NONFATAL
On Tue, 8 Jul 2025, Jan Beulich wrote:
> On 08.07.2025 12:25, Alejandro Vallejo wrote:
> > On Tue Jul 8, 2025 at 2:07 AM CEST, Stefano Stabellini wrote:
> >> --- a/xen/arch/x86/Kconfig.cpu
> >> +++ b/xen/arch/x86/Kconfig.cpu
> >> @@ -10,6 +10,21 @@ config AMD
> >> May be turned off in builds targetting other vendors. Otherwise,
> >> must be enabled for Xen to work suitably on AMD platforms.
> >>
> >> +config AMD_MCE_NONFATAL
> >> + bool "Check for non-fatal MCEs on AMD CPUs"
> >> + default y
> >> + depends on AMD
> >> + help
> >> + Check for non-fatal MCE errors.
> >> +
> >> + When this option is on (default), Xen regularly checks for
> >> + non-fatal MCEs potentially occurring on all physical CPUs. The
> >> + checking is done via timers and IPI interrupts, which is
> >> + acceptable in most configurations, but not for real-time.
> >> +
> >> + Turn this option off if you plan on deploying real-time workloads
> >> + on Xen.
> >> +
> >
> > This being in the CPU vendor submenu seems off. I'd expect only a list of
> > silicon vendors here. I think it ought to be in the regular Kconfig file.
>
> Whether in this file or the regular one is up for discussion, but yes,
> definitely not inside the vendor menu.
>
> >> --- a/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> >> +++ b/xen/arch/x86/cpu/mcheck/amd_nonfatal.c
> >> @@ -191,7 +191,8 @@ static void cf_check mce_amd_work_fn(void *data)
> >>
> >> void __init amd_nonfatal_mcheck_init(struct cpuinfo_x86 *c)
> >> {
> >> - if (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)))
> >> + if ( !IS_ENABLED(CONFIG_AMD_MCE_NONFATAL) ||
> >> + (!(c->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON))) )
> >> return;
> >>
> >> /* Assume we are on K8 or newer AMD or Hygon CPU here */
> >
> > It can be made more general to remove more code. What do you think of
> > removing
> > all non-fatals and getting rid of the initcall altogether?
>
> I think such a more general approach would be quite a bit better.
I am fine with that, actually better to remove the code then to leave it
around and do nothing.
> > diff --git a/xen/arch/x86/Kconfig.cpu b/xen/arch/x86/Kconfig.cpu
> > index 5fb18db1aa..a4b892a1aa 100644
> > --- a/xen/arch/x86/Kconfig.cpu
> > +++ b/xen/arch/x86/Kconfig.cpu
> > @@ -10,6 +10,20 @@ config AMD
> > May be turned off in builds targetting other vendors.
> > Otherwise,
> > must be enabled for Xen to work suitably on AMD platforms.
> >
> > +config MCE_NONFATAL
> > + bool "Check for non-fatal MCEs"
> > + default y
> > + help
> > + Check for non-fatal MCE errors.
> > +
> > + When this option is on (default), Xen regularly checks for
> > + non-fatal MCEs potentially occurring on all physical CPUs. The
> > + checking is done via timers and IPI interrupts, which is
> > + acceptable in most configurations, but not for real-time.
> > +
> > + Turn this option off if you plan on deploying real-time
> > workloads
> > + on Xen.
> > +
> > config INTEL
> > bool "Support Intel CPUs"
> > default y
> > diff --git a/xen/arch/x86/cpu/mcheck/Makefile
> > b/xen/arch/x86/cpu/mcheck/Makefile
> > index e6cb4dd503..c70b441888 100644
> > --- a/xen/arch/x86/cpu/mcheck/Makefile
> > +++ b/xen/arch/x86/cpu/mcheck/Makefile
> > @@ -1,12 +1,12 @@
> > -obj-$(CONFIG_AMD) += amd_nonfatal.o
> > +obj-$(filter $(CONFIG_AMD),$(CONFIG_MCE_NONFATAL)) += amd_nonfatal.o
> > obj-$(CONFIG_AMD) += mce_amd.o
> > obj-y += mcaction.o
> > obj-y += barrier.o
> > -obj-$(CONFIG_INTEL) += intel-nonfatal.o
> > +obj-$(filter $(CONFIG_INTEL),$(CONFIG_MCE_NONFATAL)) +=
> > intel-nonfatal.o
> > obj-y += mctelem.o
> > obj-y += mce.o
> > obj-y += mce-apei.o
> > obj-$(CONFIG_INTEL) += mce_intel.o
> > -obj-y += non-fatal.o
> > +obj-$(CONFIG_MCE_NONFATAL) += non-fatal.o
> > obj-y += util.o
> > obj-y += vmce.o
> >
> > ... with the Kconfig option probably in the regular x86 Kconfig rather than
> > Kconfig.cpu
> >
> > Thoughts?
> >
> > Cheers,
> > Alejandro
>
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |