From: Avi Kivity <avi@redhat.com>
To: Igor Mammedov <imammedo@redhat.com>
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com,
riel@redhat.com, amit shah <amit.shah@redhat.com>,
mtosatti@redhat.com
Subject: Re: [PATCH] BUG in pv_clock when overflow condition is detected
Date: Thu, 16 Feb 2012 16:03:29 +0200 [thread overview]
Message-ID: <4F3D0CB1.5070707@redhat.com> (raw)
In-Reply-To: <28a9ca8a-4696-4c9c-bd15-f2fa5558740e@zmail16.collab.prod.int.phx2.redhat.com>
On 02/15/2012 07:18 PM, Igor Mammedov wrote:
> > On 02/15/2012 01:23 PM, Igor Mammedov wrote:
> > >>> static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time
> > >>> *shadow)
> > >>> {
> > >>> - u64 delta = native_read_tsc() - shadow->tsc_timestamp;
> > >>> + u64 delta;
> > >>> + u64 tsc = native_read_tsc();
> > >>> + BUG_ON(tsc< shadow->tsc_timestamp);
> > >>> + delta = tsc - shadow->tsc_timestamp;
> > >>> return pvclock_scale_delta(delta, shadow->tsc_to_nsec_mul,
> > >>> shadow->tsc_shift);
> > >>
> > >> Maybe a WARN_ON_ONCE()? Otherwise a relatively minor hypervisor
> > >> bug can
> > >> kill the guest.
> > >
> > >
> > > An attempt to print from this place is not perfect since it often
> > > leads
> > > to recursive calling to this very function and it hang there
> > > anyway.
> > > But if you insist I'll re-post it with WARN_ON_ONCE,
> > > It won't make much difference because guest will hang/stall due
> > > overflow
> > > anyway.
> >
> > Won't a BUG_ON() also result in a printk?
> Yes, it will. But stack will still keep failure point and poking
> with crash/gdb at core will always show where it's BUGged.
>
> In case it manages to print dump somehow (saw it couple times from ~
> 30 test cycles), logs from console or from kernel message buffer
> (again poking with gdb) will show where it was called from.
>
> If WARN* is used, it will still totaly screwup clock and
> "last value" and system will become unusable, requiring looking with
> gdb/crash at the core any way.
>
> So I've just used more stable failure point that will leave trace
> everywhere it manages (maybe in console log, but for sure in stack)
> in case of WARN it might leave trace on console or not and probably
> won't reflect failure point in stack either leaving only kernel
> message buffer for clue.
>
Makes sense. But do get an ack from the Xen people to ensure this
doesn't break for them.
--
error compiling committee.c: too many arguments to function
next prev parent reply other threads:[~2012-02-16 14:03 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-02-13 18:20 [PATCH] BUG in pv_clock when overflow condition is detected Igor Mammedov
2012-02-15 10:49 ` Avi Kivity
2012-02-15 11:23 ` Igor Mammedov
2012-02-15 14:02 ` Avi Kivity
2012-02-15 17:18 ` Igor Mammedov
2012-02-16 14:03 ` Avi Kivity [this message]
2012-02-17 15:25 ` Igor Mammedov
2012-02-20 15:28 ` Konrad Rzeszutek Wilk
2012-02-21 11:35 ` Igor Mammedov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4F3D0CB1.5070707@redhat.com \
--to=avi@redhat.com \
--cc=amit.shah@redhat.com \
--cc=hpa@zytor.com \
--cc=imammedo@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=mtosatti@redhat.com \
--cc=riel@redhat.com \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.