[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v7 0/9] xen/x86: various XPTI speedups



On 13/04/18 11:59, Andrew Cooper wrote:
> On 12/04/18 19:09, Juergen Gross wrote:
>> This patch series aims at reducing the overhead of the XPTI Meltdown
>> mitigation.
> 
> Sadly, there are still problems. 
> 
> (XEN) [   13.486805] Dom0 has maximum 2 VCPUs
> (XEN) [   13.486824] ----[ Xen-4.11.0-5.0.3-d  x86_64  debug=y   Not tainted 
> ]----
> (XEN) [   13.486826] CPU:    0
> (XEN) [   13.486828] RIP:    e008:[<ffff82d0802885f4>] 
> switch_cr3_cr4+0x58/0x116
> (XEN) [   13.486833] RFLAGS: 0000000000010086   CONTEXT: hypervisor
> (XEN) [   13.486836] rax: 00000000000000df   rbx: 0000000000000282   rcx: 
> ffff82d0804b7fff
> (XEN) [   13.486839] rdx: 0000000000152660   rsi: 00000000001526e0   rdi: 
> 8000001071d4a000
> (XEN) [   13.486841] rbp: ffff82d0804b78d8   rsp: ffff82d0804b78a8   r8:  
> 0000000000000000
> (XEN) [   13.486844] r9:  0000ffff0000ffff   r10: 00ff00ff00ff00ff   r11: 
> 0f0f0f0f0f0f0f0f
> (XEN) [   13.486847] r12: 8000001071d4a000   r13: 0000000057ea8000   r14: 
> 00000000001526e0
> (XEN) [   13.486849] r15: ffff83107326f000   cr0: 000000008005003b   cr4: 
> 0000000000152660
> (XEN) [   13.486851] cr3: 0000000057ea8000   cr2: 0000000000000000
> (XEN) [   13.486853] fsb: 0000000000000000   gsb: 0000000000000000   gss: 
> 0000000000000000
> (XEN) [   13.486855] ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   
> cs: e008
> (XEN) [   13.486859] Xen code around <ffff82d0802885f4> 
> (switch_cr3_cr4+0x58/0x116):
> (XEN) [   13.486860]  00 00 66 0f 38 82 4d d0 <41> 0f 22 dc 4c 39 f2 75 56 4c 
> 89 ea 81 e2 ff 0f
> (XEN) [   13.486869] Xen stack trace from rsp=ffff82d0804b78a8:
> (XEN) [   13.486870]    ffff82d0804b78d8 ffff82d0804466a2 ffff83005a1f1000 
> 0000000000000002
> (XEN) [   13.486874]    ffffffff82000000 ffff830000060fa0 ffff82d0804b7d68 
> ffff82d08044349e
> (XEN) [   13.486878]    0000000000000000 ffff830000060fa0 ffffffff82000000 
> 0000000000000ff0
> (XEN) [   13.486881]    0000000000000000 0000001071d4c000 ffff831071d4b000 
> ffff831071d4c000
> (XEN) [   13.486884]    ffffffff81d49000 0000000000000000 0000000000000013 
> ffff831071d4dff8
> (XEN) [   13.486887]    0000001071d5c000 ffff831071d4d000 ffffffff81d5e000 
> ffffffff81000000
> (XEN) [   13.486891]    0000000001072000 0000001071d5d000 ffffffff81d4a000 
> ffffffff81d49000
> (XEN) [   13.486894]    ffff831071d4c080 0000000000002000 0000000001070000 
> ffffffff81d49000
> (XEN) [   13.486897]    ffffffff82000000 ffff831071d4aff8 0000000000002000 
> 0000000000000001
> (XEN) [   13.486900]    0000008000200000 0000008000000000 000000000000570a 
> 0000000000040000
> (XEN) [   13.486903]    0000000000000000 ffffffff80000000 ffff831071d4dff0 
> ffff82d080485580
> (XEN) [   13.486907]    ffff83005a1f1000 0000000005709ac2 0000000000000000 
> ffff832079bd182c
> (XEN) [   13.486910]    ffff832079bd19e8 0000000000000000 0000000000000000 
> 0000000000000000
> (XEN) [   13.486913]    0000000000000001 ffff82d0803fd5e8 ffffffff81b051f0 
> 0000000000000001
> (XEN) [   13.486916]    ffff82d0803fd436 ffffffff81001000 0000000000000001 
> ffff82d0803fd410
> (XEN) [   13.486919]    ffffffff80000000 0000000000000001 ffff82d0803fd429 
> 0000000000000000
> (XEN) [   13.486923]    0000000000000002 ffff82d0803fd578 ffff832079bd1868 
> 0000000000000002
> (XEN) [   13.486926]    ffff82d0803fd3d4 ffff832079bd183c 0000000000000002 
> ffff82d0803fd584
> (XEN) [   13.486929]    ffff832079bd1854 0000000000000002 ffff82d0803fd3cd 
> ffff832079bd1944
> (XEN) [   13.486933]    0000000000000002 ffff82d0803fd592 ffff832079bd1930 
> 0000000000000002
> (XEN) [   13.486936] Xen call trace:
> (XEN) [   13.486938]    [<ffff82d0802885f4>] switch_cr3_cr4+0x58/0x116
> (XEN) [   13.486942]    [<ffff82d08044349e>] dom0_construct_pv+0x1bb1/0x29e3
> (XEN) [   13.486945]    [<ffff82d0804470ba>] construct_dom0+0x8c/0xb86
> (XEN) [   13.486949]    [<ffff82d080437fd3>] __start_xen+0x23c4/0x2629
> (XEN) [   13.486952]    [<ffff82d0802000f3>] __high_start+0x53/0x58
> (XEN) [   13.486954]
> (XEN) [   14.047278]
> (XEN) [   14.049274] ****************************************
> (XEN) [   14.054734] Panic on CPU 0:
> (XEN) [   14.058026] GENERAL PROTECTION FAULT
> (XEN) [   14.062099] [error_code=0000]
> (XEN) [   14.065565] ****************************************
> (XEN) [   14.071024]
> (XEN) [   14.073018] Reboot in five seconds...
> 
> The faulting instruction is `mov %r12, %cr3` which is trying to use
> noflush while %cr4.pcide is clear.

While I can see how that happened I'm not sure why I didn't hit this
when testing my series. Could it be some cpus won't GP in this case?

Could you try the series without the last patch? Maybe it would be
possible to commit some of the patches at least.

I'm just about to leave for the Linux root conference in Kiev, so the
patch attached is only compile tested. You might want to try that.


Juergen

Attachment: fixup.patch
Description: Text Data

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.