[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Xen/MCE: adjust for future new vMCE model



Jan Beulich wrote:
>>>> On 04.07.12 at 15:08, "Liu, Jinsong" <jinsong.liu@xxxxxxxxx> wrote:
>> --- a/xen/arch/x86/cpu/mcheck/vmce.c Wed Jun 27 09:36:43 2012 +0200
>> +++ b/xen/arch/x86/cpu/mcheck/vmce.c Thu Jul 05 04:28:48 2012 +0800
>>  @@ -19,36 +19,42 @@ #include "mce.h"
>>  #include "x86_mca.h"
>> 
>> +/*
>> + * Emulalte 2 banks for guest
>> + * Bank0: reserved for 'bank0 quirk' occur at some very old
>> processors: + *   1). Intel cpu whose family-model valuse < 06-1A; +
>> *   2). AMD K7 + * Bank1: used to transfer error info to guest
>> + */
>> +#define GUEST_BANK_NUM 2
>> +
>>  #define dom_vmce(x)   ((x)->arch.vmca_msrs)
>> 
>>  static uint64_t __read_mostly g_mcg_cap;
>> 
>> -/* Real value in physical CTL MSR */
>> -static uint64_t __read_mostly h_mcg_ctl;
>> -static uint64_t *__read_mostly h_mci_ctrl;
>> -
>>  int vmce_init_msr(struct domain *d)
>>  {
>>      dom_vmce(d) = xmalloc(struct domain_mca_msrs);      if (
>>          !dom_vmce(d) ) return -ENOMEM;
>> 
>> -    dom_vmce(d)->mci_ctl = xmalloc_array(uint64_t, nr_mce_banks);
>> +    dom_vmce(d)->mci_ctl = xmalloc_array(uint64_t, GUEST_BANK_NUM);
>>      if ( !dom_vmce(d)->mci_ctl )
>>      {
>>          xfree(dom_vmce(d));
>>          return -ENOMEM;
>>      }
>>      memset(dom_vmce(d)->mci_ctl, ~0,
>> -           nr_mce_banks * sizeof(*dom_vmce(d)->mci_ctl));
>> +           GUEST_BANK_NUM * sizeof(*dom_vmce(d)->mci_ctl));
>> 
>>      dom_vmce(d)->mcg_status = 0x0;
>> -    dom_vmce(d)->mcg_ctl = ~(uint64_t)0x0;
>>      dom_vmce(d)->nr_injection = 0;
>> 
>>      INIT_LIST_HEAD(&dom_vmce(d)->impact_header);
>>      spin_lock_init(&dom_vmce(d)->lock);
>> 
>> +    g_mcg_cap = MCG_TES_P | MCG_SER_P | GUEST_BANK_NUM; +
>>      return 0;
>>  }
>> 
>> @@ -68,7 +74,7 @@
>> 
>>  int vmce_restore_vcpu(struct vcpu *v, uint64_t caps)  {
>> -    if ( caps & ~g_mcg_cap & ~MCG_CAP_COUNT & ~MCG_CTL_P )
>> +    if ( caps & ~g_mcg_cap & ~MCG_CAP_COUNT )
> 
> Shouldn't you also check bank count being GUEST_BANK_NUM?
> 
>>      {
>>          dprintk(XENLOG_G_ERR, "%s restore: unsupported MCA
>>                  capabilities" " %#" PRIx64 " for d%d:v%u
>>      (supported: %#Lx)\n", @@ -93,9 +99,10 @@ switch ( msr &
>>      (MSR_IA32_MC0_CTL | 3) ) {
>>      case MSR_IA32_MC0_CTL:
>> -        if ( bank < nr_mce_banks )
>> -            *val = vmce->mci_ctl[bank] &
>> -                   (h_mci_ctrl ? h_mci_ctrl[bank] : ~0UL);
>> +        if ( bank < GUEST_BANK_NUM ) {
> 
> This being false is impossible afaict (provided guest's MCG_CAP
> is never permitted to hold other than GUEST_BANK_NUM).
> 
> However, if the intention is to support an eventual future need
> to grow that number, than an else clause would be needed
> setting *val to ~0. But read on...
> 
>> +            BUG_ON( vmce->mci_ctl[bank] != ~0UL );
>> +            *val = vmce->mci_ctl[bank];
> 
> Why do you retain the (per-domain!) array if all slots are always
> expected to be ~0 anyway?
> 
>> +        }
>>          mce_printk(MCE_VERBOSE, "MCE: rdmsr MC%u_CTL 0x%"PRIx64"\n",
>>                     bank, *val);
>>          break;
>> @@ -187,11 +194,9 @@
>>                     *val);
>>          break;
>>      case MSR_IA32_MCG_CTL:
>> -        /* Always 0 if no CTL support */
>> -        if ( cur->arch.mcg_cap & MCG_CTL_P )
>> -            *val = vmce->mcg_ctl & h_mcg_ctl;
>> -        mce_printk(MCE_VERBOSE, "MCE: rdmsr MCG_CTL 0x%"PRIx64"\n",
>> -                   *val);
>> +        BUG_ON( cur->arch.mcg_cap & MCG_CTL_P );
>> +        mce_printk(MCE_QUIET, "MCE: no MCG_CTL\n"); +        ret =
>>          -1; break;
>>      default:
>>          ret = mce_bank_msr(cur, msr) ? bank_mce_rdmsr(cur, msr,
>>      val) : 0; @@ -220,8 +225,10 @@ switch ( msr & (MSR_IA32_MC0_CTL
>>      | 3) ) {
>>      case MSR_IA32_MC0_CTL:
>> -        if ( bank < nr_mce_banks )
>> -            vmce->mci_ctl[bank] = val;
>> +        /*
>> +         * if guest crazy clear any bit of MCi_CTL,
>> +         * treat it as not implement and ignore write change it. + 
>>          */ break;
>>      case MSR_IA32_MC0_STATUS:
>>          if ( entry && (entry->bank == bank) )
>> @@ -305,7 +312,9 @@
>>      switch ( msr )
>>      {
>>      case MSR_IA32_MCG_CTL:
>> -        vmce->mcg_ctl = val;
>> +        BUG_ON( cur->arch.mcg_cap & MCG_CTL_P );
>> +        mce_printk(MCE_QUIET, "MCE: no MCG_CTL\n"); +        ret =
>>          -1; break;
>>      case MSR_IA32_MCG_STATUS:
>>          vmce->mcg_status = val;
>> @@ -520,52 +529,6 @@
>>  }
>>  #endif
>> 
>> -int vmce_init(struct cpuinfo_x86 *c)
>> -{
>> -    u64 value;
>> -    unsigned int i;
>> -
>> -    if ( !h_mci_ctrl )
>> -    {
>> -        h_mci_ctrl = xmalloc_array(uint64_t, nr_mce_banks);
>> -        if (!h_mci_ctrl)
>> -        {
>> -            dprintk(XENLOG_INFO, "Failed to alloc h_mci_ctrl\n");
>> -            return -ENOMEM;
>> -        }
>> -        /* Don't care banks before firstbank */
>> -        memset(h_mci_ctrl, ~0,
>> -               min(firstbank, nr_mce_banks) * sizeof(*h_mci_ctrl));
>> -        for (i = firstbank; i < nr_mce_banks; i++)
>> -            rdmsrl(MSR_IA32_MCx_CTL(i), h_mci_ctrl[i]);
>> -    }
>> -
>> -    rdmsrl(MSR_IA32_MCG_CAP, value);
>> -    /* For Guest vMCE usage */
>> -    g_mcg_cap = value & (MCG_CAP_COUNT | MCG_CTL_P | MCG_TES_P |
>> MCG_SER_P); 
>> -    if (value & MCG_CTL_P)
>> -        rdmsrl(MSR_IA32_MCG_CTL, h_mcg_ctl);
>> -
>> -    return 0;
>> -}
>> -
>> -static int mca_ctl_conflict(struct mcinfo_bank *bank, struct domain
>> *d) -{ 
>> -    int bank_nr;
>> -
>> -    if ( !bank || !d || !h_mci_ctrl )
>> -        return 1;
>> -
>> -    /* Will MCE happen in host if If host mcg_ctl is 0? */
>> -    if ( ~d->arch.vmca_msrs->mcg_ctl & h_mcg_ctl )
>> -        return 1;
>> -
>> -    bank_nr = bank->mc_bank;
>> -    if (~d->arch.vmca_msrs->mci_ctl[bank_nr] & h_mci_ctrl[bank_nr] )
>> -        return 1;
>> -    return 0;
>> -}
>> -
>>  static int is_hvm_vmce_ready(struct mcinfo_bank *bank, struct
>>      domain *d)  { struct vcpu *v;
>> @@ -619,14 +582,6 @@
>>      if (no_vmce)
>>          return 0;
>> 
>> -    /* Guest has different MCE ctl value setting */
>> -    if (mca_ctl_conflict(bank, d))
>> -    {
>> -        dprintk(XENLOG_WARNING,
>> -          "No vmce, guest has different mca control setting\n");
>> -        return 0;
>> -    }
>> -
>>      return 1;
>>  }
>> 
> 
> Also I seem to recall that there was going to be a need to
> save/restore MCi_CTL2, but there's nothing being done in that
> direction.
> 
> Jan

Yes, but that would be done at new vMCE.
Current vMCE didn't enable MCG_CMCI_P, and MCi_CTL2 are not used, so we don't 
save/restore MCi_CTL2 at this version.

Thanks,
Jinsong

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.