[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-unstable bisection] complete test-amd64-amd64-qemuu-nested-intel


  • To: osstest service owner <osstest-admin@xxxxxxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Tue, 24 Dec 2019 15:23:58 +0100
  • Authentication-results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@xxxxxxxxxx; spf=Pass smtp.mailfrom=roger.pau@xxxxxxxxxx; spf=None smtp.helo=postmaster@xxxxxxxxxxxxxxx
  • Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 24 Dec 2019 14:24:49 +0000
  • Ironport-sdr: /d8xvClhaWr7wy9Ylu6/rvltsh6kqlVEwiw/RmTRsccxUZwpfYk2PAYV3uVp9/jVOKRttQCdp4 mgT6r2Zbq0v0BjgI1udU+/7cyIPXGa+aEw5qlImX6Adm4CHvPtdXShfhH2qB2NDokzeExXNyS6 18f5reUQ4HUlnai4W5HLpZ7dceZlIzYLsPr2w6Fs6jXyNQDF6HMAHDABNn2R0Ygaj1Ty4cZjib WNpmSXvkqQwjaYhoygk68WfDWXhyVOin+RKw2aXLRBezP1/T4dkk/AKww0Lim4eqECCWQxS3ZP l6U=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Sun, Dec 22, 2019 at 08:52:02PM +0000, osstest service owner wrote:
> branch xen-unstable
> xenbranch xen-unstable
> job test-amd64-amd64-qemuu-nested-intel
> testid debian-hvm-install/l1/l2
> 
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
> Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
> Tree: qemuu git://xenbits.xen.org/qemu-xen.git
> Tree: xen git://xenbits.xen.org/xen.git
> 
> *** Found and reproduced problem changeset ***
> 
>   Bug is in tree:  xen git://xenbits.xen.org/xen.git
>   Bug introduced:  b1710040ca9628a6517bfc06f87dcbb670f8743e
>   Bug not present: 3d05407025ed1f83f492f81ba8175fa26b1e2fb3
>   Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/145120/
> 
> 
>   commit b1710040ca9628a6517bfc06f87dcbb670f8743e
>   Author: Roger Pau Monn?? <roger.pau@xxxxxxxxxx>
>   Date:   Fri Dec 20 16:29:22 2019 +0100
>   
>       x86/apic: allow enabling x2APIC mode regardless of interrupt remapping
>       
>       x2APIC mode doesn't mandate interrupt remapping, and hence can be
>       enabled independently. This patch enables x2APIC when available,
>       regardless of whether there's interrupt remapping support.
>       
>       This is beneficial specially when running on virtualized environments,
>       since it reduces the amount of vmexits. For example when sending an
>       IPI in xAPIC mode Xen performs at least 3 different accesses to the
>       APIC MMIO region, while when using x2APIC mode a single wrmsr is used.
>       
>       The following numbers are from a lock profiling of a Xen PV shim
>       running a Linux PV kernel with 32 vCPUs and xAPIC mode:
>       
>       (XEN) Global lock flush_lock: addr=ffff82d0804af1c0, lockval=03190319, 
> not locked
>       (XEN)   lock:656153(892606463454), block:602183(9495067321843)
>       
>       Average lock time:   1360363ns
>       Average block time: 15767743ns
>       
>       While the following are from the same configuration but with the shim
>       using x2APIC mode:
>       
>       (XEN) Global lock flush_lock: addr=ffff82d0804b01c0, lockval=1adb1adb, 
> not locked
>       (XEN)   lock:1841883(1375128998543), block:1658716(10193054890781)
>       
>       Average lock time:   746588ns
>       Average block time: 6145147ns
>       
>       Enabling x2APIC has halved the average lock time, thus reducing
>       contention.
>       
>       Signed-off-by: Roger Pau Monn?? <roger.pau@xxxxxxxxxx>
>       Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

This change causes a vmlaunch failure on debina* boxes, but not
others (ie: tried to reproduce it on albana0 and failed). Here is the
relevant trace:

Dec 23 20:06:54.444025 (XEN) d3v0 VMLAUNCH error: 0x7
Dec 23 20:08:32.848081 (XEN) *** Guest State ***
Dec 23 20:08:32.848091 (XEN) CR0: actual=0x0000000000000031, 
shadow=0x0000000000000011, gh_mask=ffffffffffffffff
Dec 23 20:08:32.860079 (XEN) CR4: actual=0x0000000000002050, 
shadow=0x0000000000000000, gh_mask=fffffffffff8f870
Dec 23 20:08:32.860091 (XEN) CR3 = 0x0000000000000000
Dec 23 20:08:32.872075 (XEN) RSP = 0x0000000000000000 (0x0000000000000000)  RIP 
= 0x0000000000100036 (0x0000000000100036)
Dec 23 20:08:32.872086 (XEN) RFLAGS=0x00000002 (0x00000002)  DR7 = 
0x0000000000000400
Dec 23 20:08:32.884078 (XEN) Sysenter RSP=0000000000000000 
CS:RIP=0000:0000000000000000
Dec 23 20:08:32.884088 (XEN)        sel  attr  limit   base
Dec 23 20:08:32.884094 (XEN)   CS: 0000 0c09b ffffffff 0000000000000000
Dec 23 20:08:32.896078 (XEN)   DS: 0000 0c093 ffffffff 0000000000000000
Dec 23 20:08:32.896087 (XEN)   SS: 0000 0c093 ffffffff 0000000000000000
Dec 23 20:08:32.908080 (XEN)   ES: 0000 10000 00000000 0000000000000000
Dec 23 20:08:32.908088 (XEN)   FS: 0000 10000 00000000 0000000000000000
Dec 23 20:08:32.908094 (XEN)   GS: 0000 10000 00000000 0000000000000000
Dec 23 20:08:32.920077 (XEN) GDTR:            00000000 0000000000000000
Dec 23 20:08:32.920086 (XEN) LDTR: 0000 10000 00000000 0000000000000000
Dec 23 20:08:32.920091 (XEN) IDTR:            00000000 0000000000000000
Dec 23 20:08:32.932106 (XEN)   TR: 0000 0008b 00000067 0000000000000000
Dec 23 20:08:32.932115 (XEN) EFER(VMCS) = 0x0000000000000000  PAT = 
0x0007040600070406
Dec 23 20:08:32.944076 (XEN) PreemptionTimer = 0x00000000  SM Base = 0x00000000
Dec 23 20:08:32.944086 (XEN) DebugCtl = 0x0000000000000000  DebugExceptions = 
0x0000000000000000
Dec 23 20:08:32.956075 (XEN) Interruptibility = 00000000  ActivityState = 
00000000
Dec 23 20:08:32.956085 (XEN) InterruptStatus = 0000
Dec 23 20:08:32.956090 (XEN) *** Host State ***
Dec 23 20:08:32.956095 (XEN) RIP = 0xffff82d08033ba20 (vmx_asm_vmexit_handler)  
RSP = 0xffff83047c637f70
Dec 23 20:08:32.968082 (XEN) CS=e008 SS=0000 DS=0000 ES=0000 FS=0000 GS=0000 
TR=e040
Dec 23 20:08:32.968091 (XEN) FSBase=0000000000000000 GSBase=0000000000000000 
TRBase=ffff83047c640000
Dec 23 20:08:32.980107 (XEN) GDTBase=ffff83047c630000 IDTBase=ffff83047c63c000
Dec 23 20:08:32.980116 (XEN) CR0=0000000080050033 CR3=000000045a98b000 
CR4=00000000003526e0
Dec 23 20:08:32.992080 (XEN) Sysenter RSP=ffff83047c637fa0 
CS:RIP=e008:ffff82d08038d440
Dec 23 20:08:32.992090 (XEN) EFER = 0x0000000000000d01  PAT = 0x0000050100070406
Dec 23 20:08:33.004078 (XEN) *** Control State ***
Dec 23 20:08:33.004086 (XEN) PinBased=0000003f CPUBased=b6a075fe 
SecondaryExec=000014fb
Dec 23 20:08:33.016077 (XEN) EntryControls=000011ff ExitControls=002fefff
Dec 23 20:08:33.016086 (XEN) ExceptionBitmap=00060002 PFECmask=00000000 
PFECmatch=00000000
Dec 23 20:08:33.016093 (XEN) VMEntry: intr_info=00000000 errcode=00000000 
ilen=00000000
Dec 23 20:08:33.028084 (XEN) VMExit: intr_info=00000000 errcode=00000000 
ilen=00000004
Dec 23 20:08:33.028093 (XEN)         reason=0000001b 
qualification=0000000000000000
Dec 23 20:08:33.040081 (XEN) IDTVectoring: info=00000000 errcode=00000000
Dec 23 20:08:33.040090 (XEN) TSC Offset = 0xffff297781d67b60  TSC Multiplier = 
0x0000000000000000
Dec 23 20:08:33.052076 (XEN) TPR Threshold = 0x00  PostedIntrVec = 0xf4
Dec 23 20:08:33.052085 (XEN) EPT pointer = 0x000000047f72301e  EPTP index = 
0x0000
Dec 23 20:08:33.064087 (XEN) PLE Gap=00000080 Window=00001000
Dec 23 20:08:33.064096 (XEN) Virtual processor ID = 0x8f0f VMfunc controls = 
0000000000000000
Dec 23 20:08:33.064103 (XEN) domain_crash called from vmcs.c:1830
Dec 23 20:08:33.076076 (XEN) Domain 3 (vcpu#0) crashed on cpu#6:
Dec 23 20:08:33.076085 (XEN) ----[ Xen-4.14-unstable  x86_64  debug=y   Not 
tainted ]----
Dec 23 20:08:33.076092 (XEN) CPU:    6
Dec 23 20:08:33.088079 (XEN) RIP:    0000:[<0000000000100036>]
Dec 23 20:08:33.088087 (XEN) RFLAGS: 0000000000000002   CONTEXT: hvm guest 
(d3v0)
Dec 23 20:08:33.088094 (XEN) rax: 0000000000000000   rbx: 00000000001aa000   
rcx: 0000000000000000
Dec 23 20:08:33.100078 (XEN) rdx: 0000000000000000   rsi: 0000000000000000   
rdi: 0000000000000000
Dec 23 20:08:33.100087 (XEN) rbp: 0000000000000000   rsp: 0000000000000000   
r8:  0000000000000000
Dec 23 20:08:33.112039 (XEN) r9:  0000000000000000   r10: 0000000000000000   
r11: 0000000000000000
Dec 23 20:08:33.124074 (XEN) r12: 0000000000000000   r13: 0000000000000000   
r14: 0000000000000000
Dec 23 20:08:33.124084 (XEN) r15: 0000000000000000   cr0: 0000000000000031   
cr4: 0000000000002050
Dec 23 20:08:33.136075 (XEN) cr3: 0000000000000000   cr2: 0000000000000000
Dec 23 20:08:33.136084 (XEN) fsb: 0000000000000000   gsb: 0000000000000000   
gss: 0000000000000000
Dec 23 20:08:33.148050 (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 
0000   cs: 0000

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.