[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 1/1] xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32


  • To: Dongli Zhang <dongli.zhang@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, x86@xxxxxxxxxx
  • From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Date: Fri, 5 Nov 2021 16:41:16 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9COEaYkMTdgVd5EKihn+6DfG0s4LaKi3jYGoq4hjSSU=; b=aV/xLgAhYr+xO53iFO366uKKrzFcejFg6C3P/bDVo2rh93uqiwkm5cCPG3XRUYPjRBjey85MYdazCKE9tnZwyEPofqsGUha9ALL2uYluWSPQuDB74lMPotuEbaOUARqB6XoCGP3T86E0MYz8jJNITHgCpjZi7syHrVVVETP22EqPW2o11CY0yybOClUoaECLktifvKHQGj68TRRT3OqLyfncrR46d2QHZSBnhHztSWGkaDLBv2BsznkbtsYMalD4JLYe1fKuOCGM/fLN6l9QfwpwNxmC6banjwBDPBwRzYFUMrc/nS3qiKhU0FTR33EKAlaLTCnQ6gpTCi00TPLTuQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Eq+YL1KnvQSEjKy3aeFoC3sGmXmpOoTGz1OrodXQUqdlZ6TmD85JP5KeFOrpbcFJAERTOSo6VkKj0x14BVU6Gh5o8MXbDtdvtnTmxTabBcfvSahUqau7IcusCZmznBfYWp3oSuD8vDZOPYl8jATb4C/59EYLmCi5GZPoUinYHFvAJb52wKtukOlHHIrDnYt6Giwuzh/trb+O5VggyiMggfK2BfmBAlv5ZLWR8iC9xfF8yW7ddF4q/2yUgScYY6QPjHziHCzN6bwYMQ3e1x2V5xq42sxtraxvPN8GiR8jJRLuYkUslwVxHu/bqdW/+Q5jHEr5tvl2JtOUoSgKUSSXcQ==
  • Authentication-results: oracle.com; dkim=none (message not signed) header.d=none;oracle.com; dmarc=none action=none header.from=oracle.com;
  • Cc: jgross@xxxxxxxx, sstabellini@xxxxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxxxxx, bp@xxxxxxxxx, dave.hansen@xxxxxxxxxxxxxxx, hpa@xxxxxxxxx, joe.jin@xxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx
  • Delivery-date: Fri, 05 Nov 2021 20:42:00 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 11/4/21 1:59 PM, Dongli Zhang wrote:
Hi Boris,

On 11/1/21 10:34 AM, Boris Ostrovsky wrote:
On 10/27/21 9:25 PM, Dongli Zhang wrote:
The sched_clock() can be used very early since
commit 857baa87b642 ("sched/clock: Enable sched clock early"). In addition,
with commit 38669ba205d1 ("x86/xen/time: Output xen sched_clock time from
0"), kdump kernel in Xen HVM guest may panic at very early stage when
accessing &__this_cpu_read(xen_vcpu)->time as in below:

setup_arch()
   -> init_hypervisor_platform()
       -> x86_init.hyper.init_platform = xen_hvm_guest_init()
           -> xen_hvm_init_time_ops()
               -> xen_clocksource_read()
                   -> src = &__this_cpu_read(xen_vcpu)->time;

This is because Xen HVM supports at most MAX_VIRT_CPUS=32 'vcpu_info'
embedded inside 'shared_info' during early stage until xen_vcpu_setup() is
used to allocate/relocate 'vcpu_info' for boot cpu at arbitrary address.

However, when Xen HVM guest panic on vcpu >= 32, since
xen_vcpu_info_reset(0) would set per_cpu(xen_vcpu, cpu) = NULL when
vcpu >= 32, xen_clocksource_read() on vcpu >= 32 would panic.

This patch delays xen_hvm_init_time_ops() to later in
xen_hvm_smp_prepare_boot_cpu() after the 'vcpu_info' for boot vcpu is
registered when the boot vcpu is >= 32.

Another option is to always delay xen_hvm_init_time_ops() for any vcpus
(including vcpu=0). Since to delay xen_hvm_init_time_ops() may lead to
clock backward issue,

This is referring to
https://lists.xenproject.org/archives/html/xen-devel/2021-10/msg01516.html I
assume?
No.

So far there are clock forward (e.g., from 0 to 65345) issue and clock backward
issue (e.g., from 2.432 to 0).

The clock forward issue can be resolved by above link to enforce clock update
during vcpu info registration. However, so far I am only able to reproduce clock
forward when "taskset -c 33 echo c > /proc/sysrq-trigger".

That is, I am not able to see any clock forward drift during regular boot (on
CPU=0), without the fix at hypervisor side.

The clock backward issue is because the native clock source is used if we delay
the initialization of xen clock source. We will see a backward when the source
is switched from native to xen.


   it is preferred to avoid that for regular boot (The
pv_sched_clock=native_sched_clock() is used at the very beginning until
xen_sched_clock() is registered). That requires to adjust
xen_sched_clock_offset. That's why we only delay xen_hvm_init_time_ops()
for vcpu>=32.

We delay only on VCPU>=32 because we want to avoid the clock going backwards due
to hypervisor problem pointed to be the link above, not because we need to
adjust xen_sched_clock_offset (which we could if we wanted).
I will add that.

Just to clarify that so far I am not able to reproduce the clock backward issue
during regular boot (on CPU=0), when the fix is not available at hypervisor 
side.


FTR, Dongli and I had a chat and he is going to provide another version of the 
patch where time initialization is deferred for all vcpus.



-boris





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.