|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2] x86/intel: ensure Global Performance Counter Control is setup correctly
On 11.01.2024 11:32, Roger Pau Monné wrote:
> On Thu, Jan 11, 2024 at 11:00:28AM +0100, Jan Beulich wrote:
>> On 11.01.2024 10:08, Roger Pau Monne wrote:
>>> When Architectural Performance Monitoring is available, the PERF_GLOBAL_CTRL
>>> MSR contains per-counter enable bits that is ANDed with the enable bit in
>>> the
>>> counter EVNTSEL MSR in order for a PMC counter to be enabled.
>>>
>>> So far the watchdog code seems to have relied on the PERF_GLOBAL_CTRL enable
>>> bits being set by default, but at least on some Intel Sapphire and Emerald
>>> Rapids this is no longer the case, and Xen reports:
>>>
>>> Testing NMI watchdog on all CPUs: 0 40 stuck
>>>
>>> The first CPU on each package is started with PERF_GLOBAL_CTRL zeroed, so
>>> PMC0
>>> doesn't start counting when the enable bit in EVNTSEL0 is set, due to the
>>> relevant enable bit in PERF_GLOBAL_CTRL not being set.
>>>
>>> Check and adjust PERF_GLOBAL_CTRL during CPU initialization so that all the
>>> general-purpose PMCs are enabled. Doing so brings the state of the
>>> package-BSP
>>> PERF_GLOBAL_CTRL in line with the rest of the CPUs on the system.
>>>
>>> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
>>> ---
>>> Changes since v1:
>>> - Do the adjustment of PERF_GLOBAL_CTRL even if the watchdog is not used,
>>> and
>>> enable all counters.
>>> ---
>>> Unsure whether printing a warning if the value of PERF_GLOBAL_CTRL is not
>>> correct is of any value, hence I haven't added it.
>>> ---
>>> xen/arch/x86/cpu/intel.c | 18 +++++++++++++++++-
>>> 1 file changed, 17 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/xen/arch/x86/cpu/intel.c b/xen/arch/x86/cpu/intel.c
>>> index dfee64689ffe..40d3eb0e18a7 100644
>>> --- a/xen/arch/x86/cpu/intel.c
>>> +++ b/xen/arch/x86/cpu/intel.c
>>> @@ -533,9 +533,25 @@ static void cf_check init_intel(struct cpuinfo_x86 *c)
>>> init_intel_cacheinfo(c);
>>> if (c->cpuid_level > 9) {
>>> unsigned eax = cpuid_eax(10);
>>> + unsigned int cnt = (uint8_t)(eax >> 8);
>>
>> (Not just) since ./CODING_STYLE wants us to avoid fixed width types where
>> possible, personally I'd prefer "& 0xff" here.
>
> Hm, OK. I got confused and somehow was under the impression we prefer
> to truncate using fixed types rather than masks.
It's on the edge I admit, and iirc e.g. Andrew would rather see
./CODING_STYLE be relaxed some again.
>>> /* Check for version and the number of counters */
>>> - if ((eax & 0xff) && (((eax>>8) & 0xff) > 1))
>>> + if ((eax & 0xff) && (cnt > 1) && (cnt <= 32)) {
>>> + uint64_t global_ctrl;
>>> + unsigned int cnt_mask = (1UL << cnt) - 1;
>>> +
>>> + /*
>>> + * On (some?) Sapphire/Emerald Rapids platforms each
>>> + * package-BSP starts with all the enable bits for the
>>> + * general-purpose PMCs cleared. Adjust so counters
>>> + * can be enabled from EVNTSEL.
>>> + */
>>> + rdmsrl(MSR_CORE_PERF_GLOBAL_CTRL, global_ctrl);
>>> + if ((global_ctrl & cnt_mask) != cnt_mask)
>>> + wrmsrl(MSR_CORE_PERF_GLOBAL_CTRL,
>>> + global_ctrl | cnt_mask);
>>
>> Should there perhaps be a log message?
>
> I had a post-commit remark about that exactly. I can add one.
Oh, sorry, missed that. Imo for firmware bugs it's useful to record.
Further, if such a messages is emitted first, in the (hopefully)
unlikely event of the WRMSR causing an issue, there'll be an immediate
reference of what's going on.
Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |