* RT patch and XEN
@ 2012-06-27 20:52 Dong Liu
2012-06-27 23:04 ` Sven-Thorsten Dietrich
0 siblings, 1 reply; 9+ messages in thread
From: Dong Liu @ 2012-06-27 20:52 UTC (permalink / raw)
To: linux-rt-users
Hi,
I tried to run PREEMPT_RT patch under XEN, but running into some problem.
My kernel is 3.4.3 with -r11 patch. XEN is 4.1.2. The kernel is running
file as dom0. But as a Paravirtual (PV) domU, the system crashes normal
when there is network traffic. kernel message indicates is
kernel/rtmutex_common.h:75, which is,
BUG_ON(w->lock != lock);
Is this a known problem?
Thanks!
Dong
PS. Here is the kernel message
[ 144.871050] kernel BUG at kernel/rtmutex_common.h:75!
[ 144.871052] invalid opcode: 0000 [#1] PREEMPT SMP
[ 144.871054] CPU 0
[ 144.871054] Modules linked in: 8021q garp stp llc sunrpc binfmt_misc
uinput coretemp crc32c_intel microcode xen_netfront pcspkr x\
en_blkfront [last unloaded: scsi_wait_scan]
[ 144.871060]
[ 144.871062] Pid: 3, comm: ksoftirqd/0 Not tainted
3.4.3-1.el6.alu_preempt_rt.x86_64-rt11 #1
[ 144.871064] RIP: e030:[<ffffffff810bb538>] [<ffffffff810bb538>]
wakeup_next_waiter+0x98/0xa0
[ 144.871071] RSP: e02b:ffff88003e1f1dc0 EFLAGS: 00010096
[ 144.871072] RAX: ffff88003fc00068 RBX: ffff88003fc0c360 RCX:
0000000000000001
[ 144.871073] RDX: 0000000000003978 RSI: 0000000000000000 RDI:
ffffffff81cf5368
[ 144.871075] RBP: ffff88003e1f1df0 R08: 0000000000000001 R09:
0000000000000000
[ 144.871076] R10: 0000000000000004 R11: 0000000000000000 R12:
ffff88003e1ee788
[ 144.871077] R13: ffffffff81cf5350 R14: ffff88003e1ee0c0 R15:
ffff88003fc00068
[ 144.871081] FS: 00007fc492e307c0(0000) GS:ffff88003fc00000(0000)
knlGS:0000000000000000
[ 144.871083] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 144.871084] CR2: 0000003d8be2c0f0 CR3: 00000000397bf000 CR4:
0000000000002660
[ 144.871086] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[ 144.871088] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[ 144.871089] Process ksoftirqd/0 (pid: 3, threadinfo ffff88003e1f0000,
task ffff88003e1ee0c0)
[ 144.871090] Stack:
[ 144.871091] ffff88003e1f0000 ffff88003fc0c360 0000000000000000
000000000000c360
[ 144.871094] ffff88003e1ee0c0 ffff88003e1f0010 ffff88003e1f1e10
ffffffff81611e18
[ 144.871096] 0000000000000000 ffff88003fc0c360 ffff88003e1f1e20
ffffffff81612419
[ 144.871097] Call Trace:
[ 144.871102] [<ffffffff81611e18>] rt_spin_lock_slowunlock+0x28/0xa0
[ 144.871105] [<ffffffff81612419>] rt_spin_unlock+0x29/0x40
[ 144.871108] [<ffffffff81064515>] __thread_do_softirq+0xe5/0x150
[ 144.871110] [<ffffffff81064669>] run_ksoftirqd+0xe9/0x1e0
[ 144.871112] [<ffffffff81064580>] ? __thread_do_softirq+0x150/0x150
[ 144.871114] [<ffffffff81064580>] ? __thread_do_softirq+0x150/0x150
[ 144.871117] [<ffffffff8108092e>] kthread+0x9e/0xb0
[ 144.871119] [<ffffffff8108e4f9>] ? finish_task_switch+0x49/0xf0
[ 144.871122] [<ffffffff8161b064>] kernel_thread_helper+0x4/0x10
[ 144.871124] [<ffffffff81612b7c>] ? retint_restore_args+0x5/0x6
[ 144.871126] [<ffffffff8161b060>] ? gs_change+0x13/0x13
[ 144.871127] Code: c0 0f b6 c0 48 89 43 18 e8 a6 73 55 00 4c 89 ef e8
4e ff ff ff 48 8b 5d d8 4c 8b 65 e0 4c 8b 6d e8 4c 8b 75 f0 \
4c 8b 7d f8 c9 c3 <0f> 0b eb fe 0f 1f 40 00 55 48 89 e5 66 83 07 01 bf
01 00 00 00
[ 144.871140] RIP [<ffffffff810bb538>] wakeup_next_waiter+0x98/0xa0
[ 144.871142] RSP <ffff88003e1f1dc0>
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: RT patch and XEN
2012-06-27 20:52 RT patch and XEN Dong Liu
@ 2012-06-27 23:04 ` Sven-Thorsten Dietrich
2012-06-28 3:16 ` Dong Liu
0 siblings, 1 reply; 9+ messages in thread
From: Sven-Thorsten Dietrich @ 2012-06-27 23:04 UTC (permalink / raw)
To: Dong Liu; +Cc: linux-rt-users
On Jun 27, 2012, at 1:52 PM, Dong Liu wrote:
> Hi,
>
> I tried to run PREEMPT_RT patch under XEN, but running into some problem.
>
> My kernel is 3.4.3 with -r11 patch. XEN is 4.1.2. The kernel is running file as dom0. But as a Paravirtual (PV) domU, the system crashes normal when there is network traffic. kernel message indicates is kernel/rtmutex_common.h:75, which is,
>
> BUG_ON(w->lock != lock);
>
> Is this a known problem?
I would consider this hopeless.
Xen will not get you RT performance nor full preemption, so there is no point in running RT on Xen.
Use KVM
Sven
>
> Thanks!
>
> Dong
>
> PS. Here is the kernel message
>
> [ 144.871050] kernel BUG at kernel/rtmutex_common.h:75!
> [ 144.871052] invalid opcode: 0000 [#1] PREEMPT SMP
> [ 144.871054] CPU 0
> [ 144.871054] Modules linked in: 8021q garp stp llc sunrpc binfmt_misc uinput coretemp crc32c_intel microcode xen_netfront pcspkr x\
> en_blkfront [last unloaded: scsi_wait_scan]
> [ 144.871060]
> [ 144.871062] Pid: 3, comm: ksoftirqd/0 Not tainted 3.4.3-1.el6.alu_preempt_rt.x86_64-rt11 #1
> [ 144.871064] RIP: e030:[<ffffffff810bb538>] [<ffffffff810bb538>] wakeup_next_waiter+0x98/0xa0
> [ 144.871071] RSP: e02b:ffff88003e1f1dc0 EFLAGS: 00010096
> [ 144.871072] RAX: ffff88003fc00068 RBX: ffff88003fc0c360 RCX: 0000000000000001
> [ 144.871073] RDX: 0000000000003978 RSI: 0000000000000000 RDI: ffffffff81cf5368
> [ 144.871075] RBP: ffff88003e1f1df0 R08: 0000000000000001 R09: 0000000000000000
> [ 144.871076] R10: 0000000000000004 R11: 0000000000000000 R12: ffff88003e1ee788
> [ 144.871077] R13: ffffffff81cf5350 R14: ffff88003e1ee0c0 R15: ffff88003fc00068
> [ 144.871081] FS: 00007fc492e307c0(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000
> [ 144.871083] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> [ 144.871084] CR2: 0000003d8be2c0f0 CR3: 00000000397bf000 CR4: 0000000000002660
> [ 144.871086] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [ 144.871088] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [ 144.871089] Process ksoftirqd/0 (pid: 3, threadinfo ffff88003e1f0000, task ffff88003e1ee0c0)
> [ 144.871090] Stack:
> [ 144.871091] ffff88003e1f0000 ffff88003fc0c360 0000000000000000 000000000000c360
> [ 144.871094] ffff88003e1ee0c0 ffff88003e1f0010 ffff88003e1f1e10 ffffffff81611e18
> [ 144.871096] 0000000000000000 ffff88003fc0c360 ffff88003e1f1e20 ffffffff81612419
> [ 144.871097] Call Trace:
> [ 144.871102] [<ffffffff81611e18>] rt_spin_lock_slowunlock+0x28/0xa0
> [ 144.871105] [<ffffffff81612419>] rt_spin_unlock+0x29/0x40
> [ 144.871108] [<ffffffff81064515>] __thread_do_softirq+0xe5/0x150
> [ 144.871110] [<ffffffff81064669>] run_ksoftirqd+0xe9/0x1e0
> [ 144.871112] [<ffffffff81064580>] ? __thread_do_softirq+0x150/0x150
> [ 144.871114] [<ffffffff81064580>] ? __thread_do_softirq+0x150/0x150
> [ 144.871117] [<ffffffff8108092e>] kthread+0x9e/0xb0
> [ 144.871119] [<ffffffff8108e4f9>] ? finish_task_switch+0x49/0xf0
> [ 144.871122] [<ffffffff8161b064>] kernel_thread_helper+0x4/0x10
> [ 144.871124] [<ffffffff81612b7c>] ? retint_restore_args+0x5/0x6
> [ 144.871126] [<ffffffff8161b060>] ? gs_change+0x13/0x13
> [ 144.871127] Code: c0 0f b6 c0 48 89 43 18 e8 a6 73 55 00 4c 89 ef e8 4e ff ff ff 48 8b 5d d8 4c 8b 65 e0 4c 8b 6d e8 4c 8b 75 f0 \
> 4c 8b 7d f8 c9 c3 <0f> 0b eb fe 0f 1f 40 00 55 48 89 e5 66 83 07 01 bf 01 00 00 00
> [ 144.871140] RIP [<ffffffff810bb538>] wakeup_next_waiter+0x98/0xa0
> [ 144.871142] RSP <ffff88003e1f1dc0>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT patch and XEN
2012-06-27 23:04 ` Sven-Thorsten Dietrich
@ 2012-06-28 3:16 ` Dong Liu
0 siblings, 0 replies; 9+ messages in thread
From: Dong Liu @ 2012-06-28 3:16 UTC (permalink / raw)
To: Sven-Thorsten Dietrich; +Cc: linux-rt-users
On 6/27/12 7:04 PM, Sven-Thorsten Dietrich wrote:
>
> On Jun 27, 2012, at 1:52 PM, Dong Liu wrote:
>
>> Hi,
>>
>> I tried to run PREEMPT_RT patch under XEN, but running into some problem.
>>
>> My kernel is 3.4.3 with -r11 patch. XEN is 4.1.2. The kernel is running file as dom0. But as a Paravirtual (PV) domU, the system crashes normal when there is network traffic. kernel message indicates is kernel/rtmutex_common.h:75, which is,
>>
>> BUG_ON(w->lock != lock);
>>
>> Is this a known problem?
>
> I would consider this hopeless.
>
> Xen will not get you RT performance nor full preemption, so there is no point in running RT on Xen.
>
> Use KVM
>
> Sven
>
I also thought of that, because the RT performance or full preemption
also depends on Xen's code, scheduler and spin lock etc. But I just want
to have a system for benchmark comparison.
Running the RT kernel as HVM guest is fine.
Thanks!
Dong
^ permalink raw reply [flat|nested] 9+ messages in thread
* RT Patch and Xen
@ 2018-04-30 11:05 Iain Hunter
2018-05-07 13:15 ` Sebastian Andrzej Siewior
0 siblings, 1 reply; 9+ messages in thread
From: Iain Hunter @ 2018-04-30 11:05 UTC (permalink / raw)
To: linux-rt-users
Hi,
I am using 4.9-rt1 on an Ultrascale+ device which is running Xen.
By default whenever I enable RT Linux then Xen is disabled according
to the patch "arm64/xen: Make XEN depend on !RT" in
https://marc.info/?l=linux-rt-users&m=144509814328860&w=2
Can someone explain the background to this patch (which appears to
still be in latest 4.14 development release)?
Is it simply because Xen drivers in the kernel fail to build due to an
include file problem (which I have worked around)
Is there a fundamental stability problem on 64 bit ARM when RT Linux
is running in a DomU? Initial runs of cyclictest don’t show any.
Thanks,
Iain
-
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT Patch and Xen
2018-04-30 11:05 RT Patch and Xen Iain Hunter
@ 2018-05-07 13:15 ` Sebastian Andrzej Siewior
2018-05-08 15:55 ` Iain Hunter
0 siblings, 1 reply; 9+ messages in thread
From: Sebastian Andrzej Siewior @ 2018-05-07 13:15 UTC (permalink / raw)
To: Iain Hunter; +Cc: linux-rt-users
On 2018-04-30 12:05:52 [+0100], Iain Hunter wrote:
> Hi,
Hi,
> I am using 4.9-rt1 on an Ultrascale+ device which is running Xen.
I strongly suggest to use a more recent kernel.
>
> By default whenever I enable RT Linux then Xen is disabled according
> to the patch "arm64/xen: Make XEN depend on !RT" in
>
> https://marc.info/?l=linux-rt-users&m=144509814328860&w=2
>
>
> Can someone explain the background to this patch (which appears to
> still be in latest 4.14 development release)?
>
> Is it simply because Xen drivers in the kernel fail to build due to an
> include file problem (which I have worked around)
> Is there a fundamental stability problem on 64 bit ARM when RT Linux
> is running in a DomU? Initial runs of cyclictest don’t show any.
I can't find the history behind this. Speaking as of v4.16-RT it builds
and I have no XEN setup.
If CONFIG_DEBUG_PREEMPT, CONFIG_DEBUG_ATOMIC_SLEEP and lockdep isn't
complaining then I might drop that patch with your tested-by :)
> Thanks,
>
> Iain
Sebastian
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT Patch and Xen
2018-05-07 13:15 ` Sebastian Andrzej Siewior
@ 2018-05-08 15:55 ` Iain Hunter
2018-05-15 14:03 ` Sebastian Andrzej Siewior
0 siblings, 1 reply; 9+ messages in thread
From: Iain Hunter @ 2018-05-08 15:55 UTC (permalink / raw)
To: Sebastian Andrzej Siewior; +Cc: linux-rt-users
Hi Sebastian,
On 7 May 2018 at 14:15, Sebastian Andrzej Siewior <bigeasy@linutronix.de> wrote:
> On 2018-04-30 12:05:52 [+0100], Iain Hunter wrote:
>> Hi,
> Hi,
>
>> I am using 4.9-rt1 on an Ultrascale+ device which is running Xen.
>
> I strongly suggest to use a more recent kernel.
>
Latest xilinx kernel is 4.14
>>
>> By default whenever I enable RT Linux then Xen is disabled according
>> to the patch "arm64/xen: Make XEN depend on !RT" in
>>
>> https://marc.info/?l=linux-rt-users&m=144509814328860&w=2
>>
>>
>> Can someone explain the background to this patch (which appears to
>> still be in latest 4.14 development release)?
>>
>> Is it simply because Xen drivers in the kernel fail to build due to an
>> include file problem (which I have worked around)
>> Is there a fundamental stability problem on 64 bit ARM when RT Linux
>> is running in a DomU? Initial runs of cyclictest don’t show any.
>
> I can't find the history behind this. Speaking as of v4.16-RT it builds
> and I have no XEN setup.
> If CONFIG_DEBUG_PREEMPT, CONFIG_DEBUG_ATOMIC_SLEEP and lockdep isn't
> complaining then I might drop that patch with your tested-by :)
>
Is your suggestion that I try just dropping the restriction in the
patch on CONFIG_PREEMPT_RT_FULL and just see if it works?
If it is I will try on 4.14 with latest RT patch as I'd rather stick
with an official Xilinx release.
Thanks, Iain
>> Thanks,
>>
>> Iain
>
> Sebastian
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT Patch and Xen
2018-05-08 15:55 ` Iain Hunter
@ 2018-05-15 14:03 ` Sebastian Andrzej Siewior
2018-06-19 16:19 ` Iain Hunter
0 siblings, 1 reply; 9+ messages in thread
From: Sebastian Andrzej Siewior @ 2018-05-15 14:03 UTC (permalink / raw)
To: Iain Hunter; +Cc: linux-rt-users
On 2018-05-08 16:55:15 [+0100], Iain Hunter wrote:
> Hi Sebastian,
Hi Iain,
> Is your suggestion that I try just dropping the restriction in the
> patch on CONFIG_PREEMPT_RT_FULL and just see if it works?
correct.
> If it is I will try on 4.14 with latest RT patch as I'd rather stick
> with an official Xilinx release.
okay.
> Thanks, Iain
Sebastian
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT Patch and Xen
2018-05-15 14:03 ` Sebastian Andrzej Siewior
@ 2018-06-19 16:19 ` Iain Hunter
2018-06-19 16:26 ` Sebastian Andrzej Siewior
0 siblings, 1 reply; 9+ messages in thread
From: Iain Hunter @ 2018-06-19 16:19 UTC (permalink / raw)
To: Sebastian Andrzej Siewior; +Cc: linux-rt-users
Hi Sebastian,
I have now tested dropping the restriction on Xilinx 4.14 with rt1 and
mainline 4.16.15-rt6. With both of these I can successfully run a Xen
Guest domain (DomU) with at least networking available (scp and ssh
works).
Iain
On 15 May 2018 at 15:03, Sebastian Andrzej Siewior
<bigeasy@linutronix.de> wrote:
> On 2018-05-08 16:55:15 [+0100], Iain Hunter wrote:
>> Hi Sebastian,
> Hi Iain,
>
>> Is your suggestion that I try just dropping the restriction in the
>> patch on CONFIG_PREEMPT_RT_FULL and just see if it works?
> correct.
>
>> If it is I will try on 4.14 with latest RT patch as I'd rather stick
>> with an official Xilinx release.
> okay.
>
>> Thanks, Iain
> Sebastian
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: RT Patch and Xen
2018-06-19 16:19 ` Iain Hunter
@ 2018-06-19 16:26 ` Sebastian Andrzej Siewior
0 siblings, 0 replies; 9+ messages in thread
From: Sebastian Andrzej Siewior @ 2018-06-19 16:26 UTC (permalink / raw)
To: Iain Hunter; +Cc: linux-rt-users
On 2018-06-19 17:19:59 [+0100], Iain Hunter wrote:
> Hi Sebastian,
Hi Iain,
> I have now tested dropping the restriction on Xilinx 4.14 with rt1 and
> mainline 4.16.15-rt6. With both of these I can successfully run a Xen
> Guest domain (DomU) with at least networking available (scp and ssh
> works).
so if it works and there are no more "sleeping while atomic" warnings
nor does lockdep complain then feel free to send a patch to remove this
restriction.
> Iain
Sebastian
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2018-06-19 16:26 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-06-27 20:52 RT patch and XEN Dong Liu
2012-06-27 23:04 ` Sven-Thorsten Dietrich
2012-06-28 3:16 ` Dong Liu
-- strict thread matches above, loose matches on Subject: below --
2018-04-30 11:05 RT Patch and Xen Iain Hunter
2018-05-07 13:15 ` Sebastian Andrzej Siewior
2018-05-08 15:55 ` Iain Hunter
2018-05-15 14:03 ` Sebastian Andrzej Siewior
2018-06-19 16:19 ` Iain Hunter
2018-06-19 16:26 ` Sebastian Andrzej Siewior
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).