[PATCH&RFC 1/2] OS_MCA Recovery from poisoned memory read

From: Hidetoshi Seto <seto.hidetoshi_at_jp.fujitsu.com>
Date: 2004-08-05 21:03:00

This is the latest OS_MCA handler which try to do recovery from
multibit-ECC/poisoned memory-read error on user-land.

Along the way, I already posted some prototypes of the OS_MCA
handler to IA64ML requesting for comments.  The most urgent
problem was that I couldn't test my patch enough because of the
lack of tools such as error(MCA) injections.

However, with Tony's great cooperation, today's patch have
passed all of my running tests on Intel's Tiger4.  Of course,
I confirmed that the handler kills a user process which
encounters MCA caused by memory read, and that the system
is prevented from down after the MCA in the situation.
Also, the isolation of erroneous/poisoned memory is realized
by PG_Reserved flag.

This handler actually recover your system from memory-read MCA.

This time, I suppose a functional pointer for OS_MCA.
Because it:
   - allows OS_MCA module:
       - rmmod if you want
   - allows handler replacement on runtime:
       - easy to debug/test/update?
   - allows platform specific handling:
       - increase the reliability of generic kernel

I'd like to request for comment about this functional pointer.
If no one want to do such complicated trick, I will make a little
fix for my patch to work all the time as a default handler.

Here are separated patches:
  1 - enable OS_MCA for errors other than TLB errors
  2 - OS_MCA handler for memory read recovery
       (well tested on Intel Tiger4.)

I'd also appreciate it if anyone having good test environment
could apply my patch and could report how it works.
(especially reports on non-Tiger/non-Intel platform are welcome.)


Signed-off-by: Hidetoshi Seto <seto.hidetoshi@jp.fujitsu.com>

diff -Nur linux-2.6.8-rc3/arch/ia64/kernel/mca.c linux-2.6.8-rc3-mcadrv-v2/arch/ia64/kernel/mca.c
--- linux-2.6.8-rc3/arch/ia64/kernel/mca.c	2004-08-04 06:27:37.000000000 +0900
+++ linux-2.6.8-rc3-mcadrv-v2/arch/ia64/kernel/mca.c	2004-08-04 18:08:39.000000000 +0900
@@ -828,6 +828,12 @@
+/* This is a function pointer to other error recovery from MCA */
+int (*ia64_mca_ucmc_other_recover_fp)
+	(void*,ia64_mca_sal_to_os_state_t*,ia64_mca_os_to_sal_state_t*)
+	= NULL;
  * ia64_mca_ucmc_handler
@@ -849,11 +855,20 @@
 	pal_processor_state_info_t *psp = (pal_processor_state_info_t *)
-	int recover = psp->tc && !(psp->cc || psp->bc || psp->rc || psp->uc);
+	int recover; 
 	/* Get the MCA error record and log it */
+	/* No error other than TLB error exist in this SAL error record */
+	recover = (psp->tc && !(psp->cc || psp->bc || psp->rc || psp->uc))
+	/* Extra error recovery */
+	   || (ia64_mca_ucmc_other_recover_fp 
+		&& ia64_mca_ucmc_other_recover_fp(
+			&ia64_sal_to_os_handoff_state,
+			&ia64_os_to_sal_handoff_state)); 
 	 *  Wakeup all the processors which are spinning in the rendezvous
 	 *  loop.
diff -Nur linux-2.6.8-rc3/include/asm-ia64/mca.h linux-2.6.8-rc3-mcadrv-v2/include/asm-ia64/mca.h
--- linux-2.6.8-rc3/include/asm-ia64/mca.h	2004-08-04 06:27:13.000000000 +0900
+++ linux-2.6.8-rc3-mcadrv-v2/include/asm-ia64/mca.h	2004-08-04 18:08:39.000000000 +0900
@@ -114,6 +114,7 @@
 extern void ia64_monarch_init_handler(void);
 extern void ia64_slave_init_handler(void);
 extern void ia64_mca_cmc_vector_setup(void);
+extern int  (*ia64_mca_ucmc_other_recover_fp)(void *,ia64_mca_sal_to_os_state_t *,ia64_mca_os_to_sal_state_t *);
 #endif /* !__ASSEMBLY__ */
 #endif /* _ASM_IA64_MCA_H */

To unsubscribe from this list: send the line "unsubscribe linux-ia64" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Received on Thu Aug 5 07:04:55 2004

This archive was generated by hypermail 2.1.8 : 2005-08-02 09:20:29 EST