[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Need help in debugging partially blocked hypervisor



Very detailed explanation indeed. What you described is the same as I saw 
months ago.
But unluckily, I do not know the root cause yet. It seems to me that unmasking 
of PMI in local APIC will immediately generate a new NMI in the system if one 
of the enabled counter is zero at that time. 
That is why I was asking you whether you could try to set that counter to some 
value other than zero (for example, 0x1) before unmasking(in your case, it is 
Fixed Counter 1 0x30a) PMI in vpmu_do_interrupt and see whether it helped.

When I met this problem, I remember that I tried two approaches:
1> Setting the counter to non-zero before unmasking PMI in vpmu_do_interrupt;
2> Remove unmasking PMI from vpmu_do_interrupt and unmask *physical PMI* when 
guest vcpu unmasks virtual PMI.
I remember that approach 2 can fix this issue. But I do not remember the result 
of approach 1, since I met this about one year ago.
It is my understanding that approach 2 is quite same as approach 1, since 
normally guest will set the counter to some negative value (for example, 
-100000) before unmasking virtual PMI.
However, approach 2 looks cleaner and more reasonable.

Can you have a try and let me know the result? If both can not work, there 
might be some problems that I have not met before.

BTW: Sorry, I did not see your patch to enable NHM vpmu before. So, there is no 
need for me to work on that now. :)

Haitao


Dietmar Hahn wrote:
> Hi Haitao,
> 
>> Can I know how you enabled vPMU on Nehalem? This is not supported in
>> current Xen.
> 
> http://lists.xensource.com/archives/html/xen-devel/2009-09/msg00829.html
> 
>> 
>> Concerning vpmu support, I totally agree that we can disable this
>> feature by default. If anyone really wants to use it, he can use boot
>> options to turn it on.
> 
> Yes, that's OK for me.
> 
>> I am preparing a patch for that. And I will
>> send a patch to enable NHM vpmu together.
>> 
>> For the problem that Dietmar met, I think I once met this before. Can
>> you add some code in vpmu_do_interrupt that sets the counter you are
>> using to a value other than zero? Please let me know if that can
>> help. 
> 
> I don't set the counter to zero. I use 0-val to set the counter.
> Actually I testet on Nehalem with
> - General Perf-counter #2 (0xc3) with CPU_CLK_UNHALTED and val=1100000
> - Fixed counter #1 (0x30a) and val=1100000
> The thing is that in normal case the overflows of both counters appear
> nearly at the same time.
> As described I added some extra tracer for xentrace in
> core2_vpmu_do_interrupt() so the code looks like:
> 
>     rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS, msr_content);     -> 1. Step
>       {
>               uint32_t HAHN_l, HAHN_h;
>               HAHN_l = (uint32_t) msr_content;
>               HAHN_h = (uint32_t) (msr_content >> 32);
>               HVMTRACE_3D(HAHN_TR2, v, 1, HAHN_h, HAHN_l);      -> 2. Step
>       }
>     if ( !msr_content )
>         return 0;
>     core2_vpmu_cxt->global_ovf_status |= msr_content;
>     msr_content = 0xC000000700000000 | ((1 << core2_get_pmc_count())
>     - 1); wrmsrl(MSR_CORE_PERF_GLOBAL_OVF_CTRL, msr_content);   -> 3.
> Step 
> 
>     rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS, msr_content);     -> 4. Step
>       {
>         uint32_t HAHN_l, HAHN_h;
>         HAHN_l = (uint32_t) msr_content;
>         HAHN_h = (uint32_t) (msr_content >> 32);
>         HVMTRACE_3D(HAHN_TR2, v, 0xa, HAHN_h, HAHN_l);    -> 5. Step
> 
>         rdmsrl(0xc3, msr_content);                        -> 6. Step
>         General counter #2 HAHN_l = (uint32_t) msr_content;
>         HAHN_h = (uint32_t) (msr_content >> 32);
>         HVMTRACE_3D(HAHN_TR2, v, 0xc3, HAHN_h, HAHN_l);
>         rdmsrl(0x30a, msr_content);                       -> 7. Step
>         Fixed counter #1 HAHN_l = (uint32_t) msr_content;
>         HAHN_h = (uint32_t) (msr_content >> 32);
>         HVMTRACE_3D(HAHN_TR2, v, 0x30a, HAHN_h, HAHN_l);
>       }
> 
> With these tracers I got the following output:
> 
> Last good NMI:
> Both counter cause the NMI. Resetting works OK.
> The counter itself were running further.
> 2. Step: par1 = 0x01,  high = 0x0002, low =  0x0004 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 5. Step: par1 = 0x0a,  high = 0x0000, low =  0x0000 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 6. Step: par1 = 0xc3,  high = 0x0000, low =  0x03c4 ]  rdmsrl(0xc3) 
> -> #2 general counter 
> 7. Step: par1 = 0x30a, high = 0x0000, low =  0x02da ]  rdmsrl(0x30a)
> -> #1 fixed counter 
> 
> NMI from where things goes wrong:
> Both counter cause the NMI. Resetting works NOT correct, only for the
> general counter!
> The general counter (caused the NMI) seems to be stopped!
> 2. Step: par1 = 0x01,  high = 0x0002, low =  0x0004 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 5. Step: par1 = 0x0a,  high = 0x0002, low =  0x0000 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 6. Step: par1 = 0xc3,  high = 0x0000, low =  0x00ec ]  rdmsrl(0xc3) 
> -> #2 general counter 
> 7. Step: par1 = 0x30a, high = 0x0000, low =  0x0000 ]  rdmsrl(0x30a)
> -> #1 fixed counter 
> 
> Wrong NMI:
> Only the fixed counter causes the NMI (which was not resetted during
> NMI handling above!) Both counter seems to be stopped!
> 2. Step: par1 = 0x01,  high = 0x0002, low =  0x0000 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 5. Step: par1 = 0x0a,  high = 0x0002, low =  0x0000 ] 
> rdmsrl(MSR_CORE_PERF_GLOBAL_STATUS) 
> 6. Step: par1 = 0xc3,  high = 0x0000, low =  0x00ec ]  rdmsrl(0xc3) 
> -> #2 general counter 
> 7. Step: par1 = 0x30a, high = 0x0000, low =  0x0000 ]  rdmsrl(0x30a)
> -> #1 fixed counter 
> 
> And this state remains forever!
> I hope my explanations are understandable ;-)
> 
> Until now I can see this behavior only on a Nehalem processor.
> 
> Thanks.
> Dietmar
> 
>> 
>> Best Regards
>> Shan Haitao
>> 
>> 2009/10/30 Keir Fraser <keir.fraser@xxxxxxxxxxxxx>:
>>> On 30/10/2009 12:20, "Dietmar Hahn" <dietmar.hahn@xxxxxxxxxxxxxx>
>>> wrote: 
>>> 
>>>> I searched the intel processor spec but couldn't find any help.
>>>> So my questions is, what is wrong here?
>>>> Can anybody with more knowledge point me in the right direction,
>>>> what can I still do to find the real cause of this?
>>> 
>>> You should probably Cc one of the Intel guys who implemented this
>>> stuff -- I've added Haitao Shan. 
>>> 
>>> Meanwhile I'd be interested to know whether things work okay for
>>> you, minus performance counters and the hypervisor hang, if you
>>> return immediately from vpmu_initialise(). Really at minimum we
>>> need such a fix, perhaps with a boot paremeter to re-enable the
>>> feature, for 3.4.2 release; allowing guests to hose the hypervisor
>>> like this is of course not on. 
>>> 
>>>  -- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.