[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] NMI: continue in case of PCI SERR erros



>>> On 25.02.11 at 12:27, Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
wrote:
> On Fri, 25 Feb 2011, Jan Beulich wrote:
>> >>> On 25.02.11 at 11:53, Stefano Stabellini 
>> >>> <stefano.stabellini@xxxxxxxxxxxxx>
>> wrote:
>> > Memory parity error is only valid for IBM PC-AT, newer machines use
>> > bit 7 (0x80) of 0x61 port for PCI SERR. While memory errors are
>> > usually reported via MCE.
>> > 
>> > Rename the memory parity error handler to pci serr handler and
>> > print a warning and continue instead of crashing.
>> > 
>> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>> > 
>> > ---
>> > 
>> > diff -r 598d1fc295b6 xen/arch/x86/traps.c
>> > --- a/xen/arch/x86/traps.c Thu Feb 24 09:33:19 2011 +0000
>> > +++ b/xen/arch/x86/traps.c Fri Feb 25 10:37:47 2011 +0000
>> > @@ -3075,23 +3075,12 @@ static void nmi_dom0_report(unsigned int
>> >      send_guest_trap(d, 0, TRAP_nmi);
>> >  }
>> >  
>> > -static void mem_parity_error(struct cpu_user_regs *regs)
>> > +static void pci_serr_error(struct cpu_user_regs *regs)
>> >  {
>> > -    switch ( opt_nmi[0] )
>> > -    {
>> > -    case 'd': /* 'dom0' */
>> > -        nmi_dom0_report(_XEN_NMIREASON_parity_error);
>> > -    case 'i': /* 'ignore' */
>> > -        break;
>> > -    default:  /* 'fatal' */
>> > -        console_force_unlock();
>> > -        printk("\n\nNMI - MEMORY ERROR\n");
>> > -        fatal_trap(TRAP_nmi, regs);
>> > -    }
>> > +    console_force_unlock();
>> > +    printk("\n\nNMI - PCI system error (SERR)\n");
>> 
>> Why do you remove the reporting of the event to Dom0? I'd rather
>> see this part stay and the public headers getting adjusted in a
>> compatible way.
>> 
> 
> Because it might not have anything to do with dom0: I wrote this patch

As you say: might.

> to fix http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1744, that
> is due to Xen trying to mask an MSI-X of a device assigned to a guest on
> shutdown. The device seems to be in a state in which it refuses any
> interactions so it sends a PCI SERR that becomes an NMI and used to
> crash Xen.

I'm certainly agreeing to the part that avoids the crash.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.