linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Igor Mammedov <imammedo@redhat.com>
To: Avi Kivity <avi@redhat.com>
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
	tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com,
	riel@redhat.com, amit.shah@redhat.com, mtosatti@redhat.com
Subject: Re: [PATCH] BUG in pv_clock when overflow condition is detected
Date: Wed, 15 Feb 2012 12:23:17 +0100	[thread overview]
Message-ID: <4F3B95A5.3050704@redhat.com> (raw)
In-Reply-To: <4F3B8DC9.8040100@redhat.com>

On 02/15/2012 11:49 AM, Avi Kivity wrote:
> On 02/13/2012 08:20 PM, Igor Mammedov wrote:
>> BUG when overflow occurs at pvclock.c:pvclock_get_nsec_offset
>>
>>      u64 delta = native_read_tsc() - shadow->tsc_timestamp;
>>
>> this might happen at an attempt to read an uninitialized yet clock.
>> It won't prevent stalls and hangs but at least it won't do it silently.
>>
>> Signed-off-by: Igor Mammedov<imammedo@redhat.com>
>> ---
>>   arch/x86/kernel/pvclock.c |    5 ++++-
>>   1 files changed, 4 insertions(+), 1 deletions(-)
>>
>> diff --git a/arch/x86/kernel/pvclock.c b/arch/x86/kernel/pvclock.c
>> index 42eb330..35a6190 100644
>> --- a/arch/x86/kernel/pvclock.c
>> +++ b/arch/x86/kernel/pvclock.c
>> @@ -43,7 +43,10 @@ void pvclock_set_flags(u8 flags)
>>
>>   static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time *shadow)
>>   {
>> -	u64 delta = native_read_tsc() - shadow->tsc_timestamp;
>> +	u64 delta;
>> +	u64 tsc = native_read_tsc();
>> +	BUG_ON(tsc<  shadow->tsc_timestamp);
>> +	delta = tsc - shadow->tsc_timestamp;
>>   	return pvclock_scale_delta(delta, shadow->tsc_to_nsec_mul,
>>   				   shadow->tsc_shift);
>
> Maybe a WARN_ON_ONCE()?  Otherwise a relatively minor hypervisor bug can
> kill the guest.

An attempt to print from this place is not perfect since it often leads
to recursive calling to this very function and it hang there anyway.
But if you insist I'll re-post it with WARN_ON_ONCE,
It won't make much difference because guest will hang/stall due overflow
anyway.

If there is an intention to keep guest functional after the event then
maybe this patch is a way to go
   http://www.spinics.net/lists/kvm/msg68463.html
this way clock will be re-silent to this kind of errors, like bare-metal
one is.

-- 
Thanks,
  Igor

  reply	other threads:[~2012-02-15 11:23 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-02-13 18:20 [PATCH] BUG in pv_clock when overflow condition is detected Igor Mammedov
2012-02-15 10:49 ` Avi Kivity
2012-02-15 11:23   ` Igor Mammedov [this message]
2012-02-15 14:02     ` Avi Kivity
2012-02-15 17:18       ` Igor Mammedov
2012-02-16 14:03         ` Avi Kivity
2012-02-17 15:25           ` Igor Mammedov
2012-02-20 15:28             ` Konrad Rzeszutek Wilk
2012-02-21 11:35               ` Igor Mammedov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4F3B95A5.3050704@redhat.com \
    --to=imammedo@redhat.com \
    --cc=amit.shah@redhat.com \
    --cc=avi@redhat.com \
    --cc=hpa@zytor.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mingo@redhat.com \
    --cc=mtosatti@redhat.com \
    --cc=riel@redhat.com \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).