|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen staging-4.18] x86/intel: Fix PERF_GLOBAL fixup when virtualised
commit 5a66ba0572b2b987a6a1d0c5b4752315556c8d28
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Mon Feb 17 13:31:06 2025 +0100
Commit: Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Mon Feb 17 13:31:06 2025 +0100
x86/intel: Fix PERF_GLOBAL fixup when virtualised
Logic using performance counters needs to look at
MSR_MISC_ENABLE.PERF_AVAILABLE before touching any other resources.
When virtualised under ESX, Xen dies with a #GP fault trying to read
MSR_CORE_PERF_GLOBAL_CTRL.
Factor this logic out into a separate function (it's already too squashed to
the RHS), and insert a check of MSR_MISC_ENABLE.PERF_AVAILABLE.
This also avoids setting X86_FEATURE_ARCH_PERFMON if MSR_MISC_ENABLE says
that
PERF is unavailable, although oprofile (the only consumer of this flag)
cross-checks too.
Fixes: 6bdb965178bb ("x86/intel: ensure Global Performance Counter Control
is setup correctly")
Reported-by: Jonathan Katz <jonathan.katz@xxxxxxxxx>
Link: https://xcp-ng.org/forum/topic/10286/nesting-xcp-ng-on-esx-8
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Tested-by: Jonathan Katz <jonathan.katz@xxxxxxxxx>
master commit: dd05d265b8abda4cc7206b29cd71b77fb46658bf
master date: 2025-01-28 11:19:45 +0000
---
xen/arch/x86/cpu/intel.c | 64 ++++++++++++++++++++++++++++--------------------
1 file changed, 37 insertions(+), 27 deletions(-)
diff --git a/xen/arch/x86/cpu/intel.c b/xen/arch/x86/cpu/intel.c
index 0dc7c27601..31f68cd6bd 100644
--- a/xen/arch/x86/cpu/intel.c
+++ b/xen/arch/x86/cpu/intel.c
@@ -535,39 +535,49 @@ static void intel_log_freq(const struct cpuinfo_x86 *c)
printk("%u MHz\n", (factor * max_ratio + 50) / 100);
}
+static void init_intel_perf(struct cpuinfo_x86 *c)
+{
+ uint64_t val;
+ unsigned int eax, ver, nr_cnt;
+
+ if ( c->cpuid_level <= 9 ||
+ ({ rdmsrl(MSR_IA32_MISC_ENABLE, val);
+ !(val & MSR_IA32_MISC_ENABLE_PERF_AVAIL); }) )
+ return;
+
+ eax = cpuid_eax(10);
+ ver = eax & 0xff;
+ nr_cnt = (eax >> 8) & 0xff;
+
+ if ( ver && nr_cnt > 1 && nr_cnt <= 32 )
+ {
+ unsigned int cnt_mask = (1UL << nr_cnt) - 1;
+
+ /*
+ * On (some?) Sapphire/Emerald Rapids platforms each package-BSP
+ * starts with all the enable bits for the general-purpose PMCs
+ * cleared. Adjust so counters can be enabled from EVNTSEL.
+ */
+ rdmsrl(MSR_CORE_PERF_GLOBAL_CTRL, val);
+
+ if ( (val & cnt_mask) != cnt_mask )
+ {
+ printk("FIRMWARE BUG: CPU%u invalid PERF_GLOBAL_CTRL: %#"PRIx64"
adjusting to %#"PRIx64"\n",
+ smp_processor_id(), val, val | cnt_mask);
+ wrmsrl(MSR_CORE_PERF_GLOBAL_CTRL, val | cnt_mask);
+ }
+
+ __set_bit(X86_FEATURE_ARCH_PERFMON, c->x86_capability);
+ }
+}
+
static void cf_check init_intel(struct cpuinfo_x86 *c)
{
/* Detect the extended topology information if available */
detect_extended_topology(c);
init_intel_cacheinfo(c);
- if (c->cpuid_level > 9) {
- unsigned eax = cpuid_eax(10);
- unsigned int cnt = (eax >> 8) & 0xff;
-
- /* Check for version and the number of counters */
- if ((eax & 0xff) && (cnt > 1) && (cnt <= 32)) {
- uint64_t global_ctrl;
- unsigned int cnt_mask = (1UL << cnt) - 1;
-
- /*
- * On (some?) Sapphire/Emerald Rapids platforms each
- * package-BSP starts with all the enable bits for the
- * general-purpose PMCs cleared. Adjust so counters
- * can be enabled from EVNTSEL.
- */
- rdmsrl(MSR_CORE_PERF_GLOBAL_CTRL, global_ctrl);
- if ((global_ctrl & cnt_mask) != cnt_mask) {
- printk("CPU%u: invalid PERF_GLOBAL_CTRL: %#"
- PRIx64 " adjusting to %#" PRIx64 "\n",
- smp_processor_id(), global_ctrl,
- global_ctrl | cnt_mask);
- wrmsrl(MSR_CORE_PERF_GLOBAL_CTRL,
- global_ctrl | cnt_mask);
- }
- __set_bit(X86_FEATURE_ARCH_PERFMON, c->x86_capability);
- }
- }
+ init_intel_perf(c);
if ( !cpu_has(c, X86_FEATURE_XTOPOLOGY) )
{
--
generated by git-patchbot for /home/xen/git/xen.git#staging-4.18
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |