[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [Patch 0/3]RAS(Part II)--Intel MCA enalbing in XEN



Hi, Keir

The patches are for MCA enabling in XEN. Those patches based on AMD and SUN's 
MCA related jobs.
We have some discussions with AMD/SUN and did refinements from the last 
sending. Also we rebase it after 
SUN's latest improvements. We will have following patches for recovery actions. 
This is a basic framework 
for Intel MCA.
 
Some implementation notes:
1) When error happens, if the error is fatal (pcc = 1) or can't be recovered 
(pcc = 0, yet no good recovery methods),
    for avoiding losing logs in DOM0, we will reset machine immediately. Most 
of MCA MSRs are sticky. After reboot, 
    MCA polling mechanism will send vIRQ to DOM0 for logging.
2) When MCE# happens, all CPUs enter MCA context. The first CPU who read&clear 
the error MSR bank will be this
    MCE# owner. Necessary locks/synchronization will help to judge the owner 
and select most severe error.
3) For convenience, we will select the most offending CPU to do most of 
processing&recovery job.
4) MCE# happens, we will do three jobs:
    a. Send vIRQ to DOM0 for logging
    b. Send vMCE# to Impacted Guest (Currently Only inject to impacted DOM0)
    c. Guest vMCE MSR virtualization
5) Some further improvement/adds for newer CPUs might be done  later
    a) Connection with recovery actions (cpu/memory online/offline)
    b) More software-recovery identification in severity_scan
    c) More refines and tests for HVM might be done when needed.
 
For discussion details between amd/sun: please refer to the mail thread: 
http://lists.xensource.com/archives/html/xen-devel/2009-02/msg00509.html

Patch Description:
1. intel_mce_base: Basic MCA enabling support For Intel. 
2. vmsr_virtualization: Guest MCE# MSR read/write virtualization support in XEN.
3. interface: xen/dom0 interface, let DOM0 know the recovery details in XEN
    For interface discussion details, please refer to the mail thread:
    http://lists.xensource.com/archives/html/xen-devel/2009-03/msg00322.html
 
About Test:
We did some internal test and the result is just fine.

Any problem, just let me know.
Thanks a lot for your help!
 
Regards,
Criping

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.