Hi, this patch fixes a xen_apic_write warnings in Dom0 [ 0.020294] ------------[ cut here ]------------ [ 0.020311] WARNING: at arch/x86/xen/enlighten.c:730 xen_apic_write+0x15/0x17() [ 0.020318] Hardware name: empty [ 0.020323] Modules linked in: [ 0.020334] Pid: 1, comm: swapper/0 Not tainted 3.3.8 #7 [ 0.020340] Call Trace: [ 0.020354] [<ffffffff81050379>] warn_slowpath_common+0x80/0x98 [ 0.020369] [<ffffffff810503a6>] warn_slowpath_null+0x15/0x17 [ 0.020378] [<ffffffff810034df>] xen_apic_write+0x15/0x17 [ 0.020392] [<ffffffff8101cb2b>] perf_events_lapic_init+0x2e/0x30 [ 0.020410] [<ffffffff81ee4dd0>] init_hw_perf_events+0x250/0x407 [ 0.020419] [<ffffffff81ee4b80>] ? check_bugs+0x2d/0x2d [ 0.020430] [<ffffffff81002181>] do_one_initcall+0x7a/0x131 [ 0.020444] [<ffffffff81edbbf9>] kernel_init+0x91/0x15d [ 0.020456] [<ffffffff817caaa4>] kernel_thread_helper+0x4/0x10 [ 0.020471] [<ffffffff817c347c>] ? retint_restore_args+0x5/0x6 [ 0.020481] [<ffffffff817caaa0>] ? gs_change+0x13/0x13 [ 0.020500] ---[ end trace a7919e7f17c0a725 ]--- Kernel function check_hw_exists() writes 0xabcd to msr 0xc0010201 (Performance Event Counter 0) and read it again to check if it is running as dom0. Early amd cpus does not reset perf counters during warm reboot. If the kernel is booted with bare metal and then as a dom0, the content of msr 0xc0010201 will stay and the checking will pass and PMU will be enabled unexpectedly. Signed-off-by: Wei Wang <wei.wang2@amd.com> Thanks Wei _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel
Jan Beulich
2012-Oct-15 11:12 UTC
Re: [PATCH] x86/amd: Fix xen_apic_write warnings in Dom0
>>> On 09.10.12 at 10:06, Wei Wang <wei.wang2@amd.com> wrote: >--- a/xen/arch/x86/cpu/amd.c >+++ b/xen/arch/x86/cpu/amd.c >@@ -485,6 +485,17 @@ static void __devinit init_amd(struct cpuinfo_x86 *c) > if (c->x86 > 0x11) > set_bit(X86_FEATURE_ARAT, c->x86_capability); > >+ /* >+ * Prior to Family 0x14, perf counters are not reset during warm reboot. >+ * We have to reset them manually. >+ */ >+ if (c->x86 < 0x14) { >+ wrmsrl(MSR_K7_PERFCTR0, 0); >+ wrmsrl(MSR_K7_PERFCTR1, 0); >+ wrmsrl(MSR_K7_PERFCTR2, 0); >+ wrmsrl(MSR_K7_PERFCTR3, 0); >+ }This collides with the NMI watchdog setup: smp_callin() calls setup_local_APIC() _before_ calling smp_store_cpu_info(), and hence you write zero again to an MSR possibly already in use. Since setup_k7_watchdog() itself does the clearing of the MSRs in question already, I would think that the most simple adjustment to your patch would be to make the condition if (nmi_watchdog != NMI_LOCAL_APIC && c->x86 < 0x14) { If you agree (and Keir doesn''t object), I would commit it that way. Jan>+ > if (cpuid_edx(0x80000007) & (1 << 10)) { > rdmsr(MSR_K7_HWCR, l, h); > l |= (1 << 27); /* Enable read-only APERF/MPERF bit */
Keir Fraser
2012-Oct-15 12:09 UTC
Re: [PATCH] x86/amd: Fix xen_apic_write warnings in Dom0
On 15/10/2012 12:12, "Jan Beulich" <JBeulich@suse.com> wrote:>>>> On 09.10.12 at 10:06, Wei Wang <wei.wang2@amd.com> wrote: >> --- a/xen/arch/x86/cpu/amd.c >> +++ b/xen/arch/x86/cpu/amd.c >> @@ -485,6 +485,17 @@ static void __devinit init_amd(struct cpuinfo_x86 *c) >> if (c->x86 > 0x11) >> set_bit(X86_FEATURE_ARAT, c->x86_capability); >> >> + /* >> + * Prior to Family 0x14, perf counters are not reset during warm reboot. >> + * We have to reset them manually. >> + */ >> + if (c->x86 < 0x14) { >> + wrmsrl(MSR_K7_PERFCTR0, 0); >> + wrmsrl(MSR_K7_PERFCTR1, 0); >> + wrmsrl(MSR_K7_PERFCTR2, 0); >> + wrmsrl(MSR_K7_PERFCTR3, 0); >> + } > > This collides with the NMI watchdog setup: smp_callin() calls > setup_local_APIC() _before_ calling smp_store_cpu_info(), and > hence you write zero again to an MSR possibly already in use. > Since setup_k7_watchdog() itself does the clearing of the MSRs > in question already, I would think that the most simple > adjustment to your patch would be to make the condition > > if (nmi_watchdog != NMI_LOCAL_APIC && c->x86 < 0x14) { > > If you agree (and Keir doesn''t object), I would commit it that way.Sounds good. Acked-by: Keir Fraser <keir@xen.org>> Jan > >> + >> if (cpuid_edx(0x80000007) & (1 << 10)) { >> rdmsr(MSR_K7_HWCR, l, h); >> l |= (1 << 27); /* Enable read-only APERF/MPERF bit */ > >
On 10/15/2012 02:09 PM, Keir Fraser wrote:> On 15/10/2012 12:12, "Jan Beulich"<JBeulich@suse.com> wrote: > >>>>> On 09.10.12 at 10:06, Wei Wang<wei.wang2@amd.com> wrote: >>> --- a/xen/arch/x86/cpu/amd.c >>> +++ b/xen/arch/x86/cpu/amd.c >>> @@ -485,6 +485,17 @@ static void __devinit init_amd(struct cpuinfo_x86 *c) >>> if (c->x86> 0x11) >>> set_bit(X86_FEATURE_ARAT, c->x86_capability); >>> >>> + /* >>> + * Prior to Family 0x14, perf counters are not reset during warm reboot. >>> + * We have to reset them manually. >>> + */ >>> + if (c->x86< 0x14) { >>> + wrmsrl(MSR_K7_PERFCTR0, 0); >>> + wrmsrl(MSR_K7_PERFCTR1, 0); >>> + wrmsrl(MSR_K7_PERFCTR2, 0); >>> + wrmsrl(MSR_K7_PERFCTR3, 0); >>> + } >> >> This collides with the NMI watchdog setup: smp_callin() calls >> setup_local_APIC() _before_ calling smp_store_cpu_info(), and >> hence you write zero again to an MSR possibly already in use. >> Since setup_k7_watchdog() itself does the clearing of the MSRs >> in question already, I would think that the most simple >> adjustment to your patch would be to make the condition >> >> if (nmi_watchdog != NMI_LOCAL_APIC&& c->x86< 0x14) { >> >> If you agree (and Keir doesn''t object), I would commit it that way. > > Sounds good. > > Acked-by: Keir Fraser<keir@xen.org>Sounds good to me too. Acked Thanks, Wei>> Jan >> >>> + >>> if (cpuid_edx(0x80000007)& (1<< 10)) { >>> rdmsr(MSR_K7_HWCR, l, h); >>> l |= (1<< 27); /* Enable read-only APERF/MPERF bit */ >> >> > > >