Re: [REGRESSION] 5.3-rc1: r8169: remove 1000/Half from supported modes

2019-07-26 Thread Bernhard Held

On 26.07.19 at 22:24, Heiner Kallweit wrote:

On 26.07.2019 22:16, Bernhard Held wrote:

Hi Heiner,

with commit a6851c613fd7 "r8169: remove 1000/Half from supported modes" my 
RTL8111B GB-link stops working. It thinks that it established a link, however nothing is 
actually transmitted. Setting the mode with `mii-tool -F 100baseTx-HD` establishes a 
successful connection.


Can you provide standard ethtool output w/ and w/o this patch? Also a full 
dmesg output
with the patch would be helpful.
Is "100baseTx-HD" a typo and you mean GBit? And any special reason why you set 
half duplex?



The requested files are attached.

mii-tool doesn't offer GBit settings. I used HD only while playing around, both 
FD and HD are working.

Hope it helps!
Bernhard
[0.00] Linux version 5.3.0-rc1-linus+ (berny@quad) (gcc version 9.1.1 
20190723 [gcc-9-branch revision 273734] (SUSE Linux)) #597 SMP PREEMPT Fri Jul 
26 21:33:15 CEST 2019
[0.00] Command line: BOOT_IMAGE=/vmlinuz-5.3.0-rc1-linus+ 
root=/dev/mapper/VGMX300-root resume=/dev/sda2 showopts radeon.dpm=1 
plymouth.enable=0 memmap=1$0xe4fd net.ifnames=0 
kvm-intel.vmentry_l1d_flush=never noibrs noibpb nospectre_v1 no_stf_barrier 
mitigations=off
[0.00] KERNEL supported cpus:
[0.00]   Intel GenuineIntel
[0.00]   zhaoxin   Shanghai  
[0.00] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point 
registers'
[0.00] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[0.00] x86/fpu: Enabled xstate features 0x3, context size is 576 bytes, 
using 'standard' format.
[0.00] BIOS-provided physical RAM map:
[0.00] BIOS-e820: [mem 0x-0x0009dbff] usable
[0.00] BIOS-e820: [mem 0x0009f800-0x0009] reserved
[0.00] BIOS-e820: [mem 0x000f-0x000f] reserved
[0.00] BIOS-e820: [mem 0x0010-0xcfed] usable
[0.00] BIOS-e820: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] BIOS-e820: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] BIOS-e820: [mem 0xcfef-0xcfef] reserved
[0.00] BIOS-e820: [mem 0xd000-0xdfff] reserved
[0.00] BIOS-e820: [mem 0xfec0-0x] reserved
[0.00] BIOS-e820: [mem 0x0001-0x0001afff] usable
[0.00] NX (Execute Disable) protection: active
[0.00] user-defined physical RAM map:
[0.00] user: [mem 0x-0xe4fc] usable
[0.00] user: [mem 0xe4fd-0xe4fd] reserved
[0.00] user: [mem 0xe4fe-0x0009dbff] usable
[0.00] user: [mem 0x0009f800-0x0009] reserved
[0.00] user: [mem 0x000f-0x000f] reserved
[0.00] user: [mem 0x0010-0xcfed] usable
[0.00] user: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] user: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] user: [mem 0xcfef-0xcfef] reserved
[0.00] user: [mem 0xd000-0xdfff] reserved
[0.00] user: [mem 0xfec0-0x] reserved
[0.00] user: [mem 0x0001-0x0001afff] usable
[0.00] SMBIOS 2.4 present.
[0.00] DMI: Gigabyte Technology Co., Ltd. G33-DS3R/G33-DS3R, BIOS F7L 
07/31/2009
[0.00] tsc: Fast TSC calibration using PIT
[0.00] tsc: Detected 3000.288 MHz processor
[0.003646] e820: update [mem 0x-0x0fff] usable ==> reserved
[0.003648] e820: remove [mem 0x000a-0x000f] usable
[0.003651] last_pfn = 0x1b max_arch_pfn = 0x4
[0.003655] MTRR default type: uncachable
[0.003655] MTRR fixed ranges enabled:
[0.003656]   0-9 write-back
[0.003657]   A-B uncachable
[0.003657]   C-CDFFF write-protect
[0.003658]   CE000-E uncachable
[0.003658]   F-F write-through
[0.003659] MTRR variable ranges enabled:
[0.003660]   0 base 00 mask 0F write-back
[0.003661]   1 base 00E000 mask 0FE000 uncachable
[0.003662]   2 base 00D000 mask 0FF000 uncachable
[0.003663]   3 base 01 mask 0F write-back
[0.003664]   4 base 01C000 mask 0FC000 uncachable
[0.003664]   5 base 01B000 mask 0FF000 uncachable
[0.003665]   6 base 00CFF0 mask 00 uncachable
[0.003666]   7 disabled
[0.005930] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
[0.006189] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.006194] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.006195] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.006196] mtrr: y

[REGRESSION] 5.3-rc1: r8169: remove 1000/Half from supported modes

2019-07-26 Thread Bernhard Held

Hi Heiner,

with commit a6851c613fd7 "r8169: remove 1000/Half from supported modes" my 
RTL8111B GB-link stops working. It thinks that it established a link, however nothing is 
actually transmitted. Setting the mode with `mii-tool -F 100baseTx-HD` establishes a 
successful connection.

Reverting a6851c613fd7 (while considering the file name change) fixes 
autonegotiation for me.

Kind regards
Bernhard


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-29 Thread Bernhard Held

On 08/28/2017 at 06:56 PM, Nadav Amit wrote:

Bernhard Held <berny...@gmx.de> wrote:


On 08/27/2017 at 02:35 PM, Adam Borowski wrote:

4.13-rc5 retested fails
Crashed only after two hours or so of testing.
4.13-rc4 apparently works
It survived several hours of varied tests (like 5 debian-installer runs, a
win10 point release upgrade, some hurd package building, openbsd, etc),
all while the host was likewise busy.
Thus: to the best of my knowledge, the problem is between 4.13-rc4 and 4.13-rc5
but I wouldn't bet my life on it.


I get crashes with Win10 in kvm with 4.13-rc5. 4.13-rc4 works for me. THP seems 
to accelerate the crash, but that's not 100% sure.

There's still no crash after reverting merge 27df70 on 4.13-rc7. There are 21 
commits in this merge, 10 are mm-related:

$ git log 4e082e9ba7cd..e86b298bebf7 --pretty=oneline --abbrev-commit
e86b298bebf7 userfaultfd: replace ENOSPC with ESRCH in case mm has gone during 
copy/zeropage
f357e345eef7 zram: rework copy of compressor name in comp_algorithm_store()
aac2fea94f7a rmap: do not call mmu_notifier_invalidate_page() under ptl
d041353dc98a mm: fix list corruptions on shmem shrinklist
af54aed94bf3 mm/balloon_compaction.c: don't zero ballooned pages
c0a6a5ae6b5d MAINTAINERS: copy virtio on balloon_compaction.c
b3a81d0841a9 mm: fix KSM data corruption
99baac21e458 mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
0a2dd266dd6b mm: make tlb_flush_pending global
56236a59556c mm: refactor TLB gathering API
a9b802500ebb Revert "mm: numa: defer TLB flush for THP migration as long as 
possible"
0a2c40487f3e mm: migrate: fix barriers around tlb_flush_pending
16af97dc5a89 mm: migrate: prevent racy access to tlb_flush_pending
9eeb52ae712e fault-inject: fix wrong should_fail() decision in task context
4e98ebe5f435 test_kmod: fix small memory leak on filesystem tests
9c56771316ef test_kmod: fix the lock in register_test_dev_kmod()
434b06ae23ba test_kmod: fix bug which allows negative values on two config 
options
a4afe8cdec16 test_kmod: fix spelling mistake: "EMTPY" -> "EMPTY"
5af10dfd0afc userfaultfd: hugetlbfs: remove superfluous page unlock in 
VM_SHARED case
75dddef32514 mm: ratelimit PFNs busy info message
d507e2ebd2c7 mm: fix global NR_SLAB_.*CLAIMABLE counter reads


Don’t blame me for the TLB stuff... My money is on aac2fea94f7a .


Amit, thanks for your courage to expose your patch!

I'm more and more confident that aac2fea94f7a is the culprit. Maybe it just 
accelerates the triggering of the splash. To be more sure the kernel needs to 
be tested for a couple of days. It would be great if others could assist in 
testing aac2fea94f7a.

Have fun,
Bernhard


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-29 Thread Bernhard Held

On 08/28/2017 at 06:56 PM, Nadav Amit wrote:

Bernhard Held  wrote:


On 08/27/2017 at 02:35 PM, Adam Borowski wrote:

4.13-rc5 retested fails
Crashed only after two hours or so of testing.
4.13-rc4 apparently works
It survived several hours of varied tests (like 5 debian-installer runs, a
win10 point release upgrade, some hurd package building, openbsd, etc),
all while the host was likewise busy.
Thus: to the best of my knowledge, the problem is between 4.13-rc4 and 4.13-rc5
but I wouldn't bet my life on it.


I get crashes with Win10 in kvm with 4.13-rc5. 4.13-rc4 works for me. THP seems 
to accelerate the crash, but that's not 100% sure.

There's still no crash after reverting merge 27df70 on 4.13-rc7. There are 21 
commits in this merge, 10 are mm-related:

$ git log 4e082e9ba7cd..e86b298bebf7 --pretty=oneline --abbrev-commit
e86b298bebf7 userfaultfd: replace ENOSPC with ESRCH in case mm has gone during 
copy/zeropage
f357e345eef7 zram: rework copy of compressor name in comp_algorithm_store()
aac2fea94f7a rmap: do not call mmu_notifier_invalidate_page() under ptl
d041353dc98a mm: fix list corruptions on shmem shrinklist
af54aed94bf3 mm/balloon_compaction.c: don't zero ballooned pages
c0a6a5ae6b5d MAINTAINERS: copy virtio on balloon_compaction.c
b3a81d0841a9 mm: fix KSM data corruption
99baac21e458 mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
0a2dd266dd6b mm: make tlb_flush_pending global
56236a59556c mm: refactor TLB gathering API
a9b802500ebb Revert "mm: numa: defer TLB flush for THP migration as long as 
possible"
0a2c40487f3e mm: migrate: fix barriers around tlb_flush_pending
16af97dc5a89 mm: migrate: prevent racy access to tlb_flush_pending
9eeb52ae712e fault-inject: fix wrong should_fail() decision in task context
4e98ebe5f435 test_kmod: fix small memory leak on filesystem tests
9c56771316ef test_kmod: fix the lock in register_test_dev_kmod()
434b06ae23ba test_kmod: fix bug which allows negative values on two config 
options
a4afe8cdec16 test_kmod: fix spelling mistake: "EMTPY" -> "EMPTY"
5af10dfd0afc userfaultfd: hugetlbfs: remove superfluous page unlock in 
VM_SHARED case
75dddef32514 mm: ratelimit PFNs busy info message
d507e2ebd2c7 mm: fix global NR_SLAB_.*CLAIMABLE counter reads


Don’t blame me for the TLB stuff... My money is on aac2fea94f7a .


Amit, thanks for your courage to expose your patch!

I'm more and more confident that aac2fea94f7a is the culprit. Maybe it just 
accelerates the triggering of the splash. To be more sure the kernel needs to 
be tested for a couple of days. It would be great if others could assist in 
testing aac2fea94f7a.

Have fun,
Bernhard


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-28 Thread Bernhard Held

On 08/28/2017 at 06:01 PM, Takashi Iwai wrote:

On Mon, 28 Aug 2017 17:26:05 +0200,
Bernhard Held wrote:

I get crashes with Win10 in kvm


Did you get the crash reliably?
I've been struggling how to trigger it efficiently, but currently in
vain.  The memory pressure isn't a single key to trigger it, as it
seems...


Yes, I get the crash pretty reliable with Win10 in kvm after 10 to 30 minutes. 
Some workload in Windows seems to be necessary to trigger the bug.


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-28 Thread Bernhard Held

On 08/28/2017 at 06:01 PM, Takashi Iwai wrote:

On Mon, 28 Aug 2017 17:26:05 +0200,
Bernhard Held wrote:

I get crashes with Win10 in kvm


Did you get the crash reliably?
I've been struggling how to trigger it efficiently, but currently in
vain.  The memory pressure isn't a single key to trigger it, as it
seems...


Yes, I get the crash pretty reliable with Win10 in kvm after 10 to 30 minutes. 
Some workload in Windows seems to be necessary to trigger the bug.


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-28 Thread Bernhard Held

On 08/27/2017 at 02:35 PM, Adam Borowski wrote:

4.13-rc5 retested fails
Crashed only after two hours or so of testing.

4.13-rc4 apparently works
It survived several hours of varied tests (like 5 debian-installer runs, a
win10 point release upgrade, some hurd package building, openbsd, etc),
all while the host was likewise busy.

Thus: to the best of my knowledge, the problem is between 4.13-rc4 and 4.13-rc5
but I wouldn't bet my life on it.


I get crashes with Win10 in kvm with 4.13-rc5. 4.13-rc4 works for me. THP seems 
to accelerate the crash, but that's not 100% sure.

There's still no crash after reverting merge 27df70 on 4.13-rc7. There are 21 
commits in this merge, 10 are mm-related:

$ git log 4e082e9ba7cd..e86b298bebf7 --pretty=oneline --abbrev-commit
e86b298bebf7 userfaultfd: replace ENOSPC with ESRCH in case mm has gone during 
copy/zeropage
f357e345eef7 zram: rework copy of compressor name in comp_algorithm_store()
aac2fea94f7a rmap: do not call mmu_notifier_invalidate_page() under ptl
d041353dc98a mm: fix list corruptions on shmem shrinklist
af54aed94bf3 mm/balloon_compaction.c: don't zero ballooned pages
c0a6a5ae6b5d MAINTAINERS: copy virtio on balloon_compaction.c
b3a81d0841a9 mm: fix KSM data corruption
99baac21e458 mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
0a2dd266dd6b mm: make tlb_flush_pending global
56236a59556c mm: refactor TLB gathering API
a9b802500ebb Revert "mm: numa: defer TLB flush for THP migration as long as 
possible"
0a2c40487f3e mm: migrate: fix barriers around tlb_flush_pending
16af97dc5a89 mm: migrate: prevent racy access to tlb_flush_pending
9eeb52ae712e fault-inject: fix wrong should_fail() decision in task context
4e98ebe5f435 test_kmod: fix small memory leak on filesystem tests
9c56771316ef test_kmod: fix the lock in register_test_dev_kmod()
434b06ae23ba test_kmod: fix bug which allows negative values on two config 
options
a4afe8cdec16 test_kmod: fix spelling mistake: "EMTPY" -> "EMPTY"
5af10dfd0afc userfaultfd: hugetlbfs: remove superfluous page unlock in 
VM_SHARED case
75dddef32514 mm: ratelimit PFNs busy info message
d507e2ebd2c7 mm: fix global NR_SLAB_.*CLAIMABLE counter reads

Any hint on what to test first is welcome!

Bernhard


Re: kvm splat in mmu_spte_clear_track_bits

2017-08-28 Thread Bernhard Held

On 08/27/2017 at 02:35 PM, Adam Borowski wrote:

4.13-rc5 retested fails
Crashed only after two hours or so of testing.

4.13-rc4 apparently works
It survived several hours of varied tests (like 5 debian-installer runs, a
win10 point release upgrade, some hurd package building, openbsd, etc),
all while the host was likewise busy.

Thus: to the best of my knowledge, the problem is between 4.13-rc4 and 4.13-rc5
but I wouldn't bet my life on it.


I get crashes with Win10 in kvm with 4.13-rc5. 4.13-rc4 works for me. THP seems 
to accelerate the crash, but that's not 100% sure.

There's still no crash after reverting merge 27df70 on 4.13-rc7. There are 21 
commits in this merge, 10 are mm-related:

$ git log 4e082e9ba7cd..e86b298bebf7 --pretty=oneline --abbrev-commit
e86b298bebf7 userfaultfd: replace ENOSPC with ESRCH in case mm has gone during 
copy/zeropage
f357e345eef7 zram: rework copy of compressor name in comp_algorithm_store()
aac2fea94f7a rmap: do not call mmu_notifier_invalidate_page() under ptl
d041353dc98a mm: fix list corruptions on shmem shrinklist
af54aed94bf3 mm/balloon_compaction.c: don't zero ballooned pages
c0a6a5ae6b5d MAINTAINERS: copy virtio on balloon_compaction.c
b3a81d0841a9 mm: fix KSM data corruption
99baac21e458 mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
0a2dd266dd6b mm: make tlb_flush_pending global
56236a59556c mm: refactor TLB gathering API
a9b802500ebb Revert "mm: numa: defer TLB flush for THP migration as long as 
possible"
0a2c40487f3e mm: migrate: fix barriers around tlb_flush_pending
16af97dc5a89 mm: migrate: prevent racy access to tlb_flush_pending
9eeb52ae712e fault-inject: fix wrong should_fail() decision in task context
4e98ebe5f435 test_kmod: fix small memory leak on filesystem tests
9c56771316ef test_kmod: fix the lock in register_test_dev_kmod()
434b06ae23ba test_kmod: fix bug which allows negative values on two config 
options
a4afe8cdec16 test_kmod: fix spelling mistake: "EMTPY" -> "EMPTY"
5af10dfd0afc userfaultfd: hugetlbfs: remove superfluous page unlock in 
VM_SHARED case
75dddef32514 mm: ratelimit PFNs busy info message
d507e2ebd2c7 mm: fix global NR_SLAB_.*CLAIMABLE counter reads

Any hint on what to test first is welcome!

Bernhard


Re: [PATCH v2] X86: don't report PAT on CPUs that don't support it

2017-06-07 Thread Bernhard Held

On 06/07/2017 at 12:49 AM, Mikulas Patocka wrote:

Hi

Here I send the second version of the patch. It drops the change from
boot_cpu_has(X86_FEATURE_PAT) to this_cpu_has(X86_FEATURE_PAT) (that
caused kernel to be unbootable for some people).

Another change is that setup_arch() calls init_cache_modes() if PAT is
disabled, so that init_cache_modes() is always called.

Mikulas


[PATCH v2] Works for me!

CHeers,
Bernhard


Re: [PATCH v2] X86: don't report PAT on CPUs that don't support it

2017-06-07 Thread Bernhard Held

On 06/07/2017 at 12:49 AM, Mikulas Patocka wrote:

Hi

Here I send the second version of the patch. It drops the change from
boot_cpu_has(X86_FEATURE_PAT) to this_cpu_has(X86_FEATURE_PAT) (that
caused kernel to be unbootable for some people).

Another change is that setup_arch() calls init_cache_modes() if PAT is
disabled, so that init_cache_modes() is always called.

Mikulas


[PATCH v2] Works for me!

CHeers,
Bernhard


Re: [tip:x86/urgent] x86/PAT: Fix Xorg regression on CPUs that don't support PAT

2017-05-30 Thread Bernhard Held

On 05/30/2017 at 07:59 PM, Mikulas Patocka wrote:



On Tue, 30 May 2017, Dominik Brodowski wrote:


Same boot problem here (Intel(R) Core(TM) i5-5200U CPU on a Dell XPS 13),
git-bisected to the same patch...

On Mon, May 29, 2017 at 06:50:57PM -0400, Mikulas Patocka wrote:

Please do the following three tests and test if the kernel boots.

1. use the PAT patch and revert the change to the function pat_enabled()
- i.e. change it to the original:
bool pat_enabled(void)
{
return !!__pat_enabled;
}


No joy.


2. use the PAT patch and revert the change to the function pat_ap_init
- i.e. change it to the original:
static void pat_ap_init(u64 pat)
{
if (!boot_cpu_has(X86_FEATURE_PAT)) {


Joy.


It is interesting - does it mean that the boot cpu does have PAT and the
secondary CPUs don't? Please send /proc/cpuinfo with all the cores active.

This part of the patch is not required anyway, so I will resubmit the
patch with this part disabled (and with an added call to
init_cache_modes() as Andy suggested).

Mikulas


3. use the full PAT patch and apply the below patch on the top of it.


No joy.


Same result here., only #2 boots.

processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 0
cpu cores   : 4
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.70
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 1
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 3
cpu cores   : 4
apicid  : 3
initial apicid  : 3
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.98
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 2
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 2
cpu cores   : 4
apicid  : 2
initial apicid  : 2
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5900.00
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 3
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 1
cpu cores   : 4
apicid  : 1
initial apicid  : 1
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.98
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power 

Re: [tip:x86/urgent] x86/PAT: Fix Xorg regression on CPUs that don't support PAT

2017-05-30 Thread Bernhard Held

On 05/30/2017 at 07:59 PM, Mikulas Patocka wrote:



On Tue, 30 May 2017, Dominik Brodowski wrote:


Same boot problem here (Intel(R) Core(TM) i5-5200U CPU on a Dell XPS 13),
git-bisected to the same patch...

On Mon, May 29, 2017 at 06:50:57PM -0400, Mikulas Patocka wrote:

Please do the following three tests and test if the kernel boots.

1. use the PAT patch and revert the change to the function pat_enabled()
- i.e. change it to the original:
bool pat_enabled(void)
{
return !!__pat_enabled;
}


No joy.


2. use the PAT patch and revert the change to the function pat_ap_init
- i.e. change it to the original:
static void pat_ap_init(u64 pat)
{
if (!boot_cpu_has(X86_FEATURE_PAT)) {


Joy.


It is interesting - does it mean that the boot cpu does have PAT and the
secondary CPUs don't? Please send /proc/cpuinfo with all the cores active.

This part of the patch is not required anyway, so I will resubmit the
patch with this part disabled (and with an added call to
init_cache_modes() as Andy suggested).

Mikulas


3. use the full PAT patch and apply the below patch on the top of it.


No joy.


Same result here., only #2 boots.

processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 0
cpu cores   : 4
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.70
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 1
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 3
cpu cores   : 4
apicid  : 3
initial apicid  : 3
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.98
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 2
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 2
cpu cores   : 4
apicid  : 2
initial apicid  : 2
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5900.00
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power management:

processor   : 3
vendor_id   : GenuineIntel
cpu family  : 6
model   : 23
model name  : Intel(R) Xeon(R) CPU   E5450  @ 3.00GHz
stepping: 10
microcode   : 0xa0b
cpu MHz : 2000.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 1
cpu cores   : 4
apicid  : 1
initial apicid  : 1
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm 
constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 
monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm 
tpr_shadow vnmi flexpriority dtherm
bugs:
bogomips: 5999.98
clflush size: 64
cache_alignment : 64
address sizes   : 38 bits physical, 48 bits virtual
power 

Re: [tip:x86/urgent] x86/PAT: Fix Xorg regression on CPUs that don't support PAT

2017-05-28 Thread Bernhard Held

Hi,

this patch breaks the boot of my kernel. The last message is "Booting
the kernel.".

My setup might be unusual: I'm running a Xenon E5450 (LGA 771) in a
Gigbayte G33-DS3R board (LGA 775). The BIOS is patched with the
microcode of the E5450 and recognizes the CPU.

Please find below the dmesg of a the latest kernel w/o the PAT-patch.
I'm happy to provide more information or to test patches.

Have fun,
Bernhard

[0.00] Linux version 4.12.0-rc2-linus+ (berny@quad) (gcc version 6.3.1 
20170202 [gcc-6-branch revision 245119] (SUSE Linux) ) #152 SMP PREEMPT Sun May 
28 19:26:20 CEST 2017
[0.00] Command line: BOOT_IMAGE=/vmlinuz-4.12.0-rc2-linus+ 
root=/dev/mapper/VGMX300-root resume=/dev/sda2 showopts radeon.dpm=1 
memmap=1$0xe4fd net.ifnames=0
[0.00] KERNEL supported cpus:
[0.00]   Intel GenuineIntel
[0.00] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point 
registers'
[0.00] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[0.00] x86/fpu: Enabled xstate features 0x3, context size is 576 bytes, 
using 'standard' format.
[0.00] e820: BIOS-provided physical RAM map:
[0.00] BIOS-e820: [mem 0x-0x0009dbff] usable
[0.00] BIOS-e820: [mem 0x0009f800-0x0009] reserved
[0.00] BIOS-e820: [mem 0x000f-0x000f] reserved
[0.00] BIOS-e820: [mem 0x0010-0xcfed] usable
[0.00] BIOS-e820: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] BIOS-e820: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] BIOS-e820: [mem 0xcfef-0xcfef] reserved
[0.00] BIOS-e820: [mem 0xd000-0xdfff] reserved
[0.00] BIOS-e820: [mem 0xfec0-0x] reserved
[0.00] BIOS-e820: [mem 0x0001-0x0001afff] usable
[0.00] NX (Execute Disable) protection: active
[0.00] e820: user-defined physical RAM map:
[0.00] user: [mem 0x-0xe4fc] usable
[0.00] user: [mem 0xe4fd-0xe4fd] reserved
[0.00] user: [mem 0xe4fe-0x0009dbff] usable
[0.00] user: [mem 0x0009f800-0x0009] reserved
[0.00] user: [mem 0x000f-0x000f] reserved
[0.00] user: [mem 0x0010-0xcfed] usable
[0.00] user: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] user: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] user: [mem 0xcfef-0xcfef] reserved
[0.00] user: [mem 0xd000-0xdfff] reserved
[0.00] user: [mem 0xfec0-0x] reserved
[0.00] user: [mem 0x0001-0x0001afff] usable
[0.00] SMBIOS 2.4 present.
[0.00] DMI: Gigabyte Technology Co., Ltd. G33-DS3R/G33-DS3R, BIOS F7L 
07/31/2009
[0.00] tsc: Fast TSC calibration using PIT
[0.00] e820: update [mem 0x-0x0fff] usable ==> reserved
[0.00] e820: remove [mem 0x000a-0x000f] usable
[0.00] e820: last_pfn = 0x1b max_arch_pfn = 0x4
[0.00] MTRR default type: uncachable
[0.00] MTRR fixed ranges enabled:
[0.00]   0-9 write-back
[0.00]   A-B uncachable
[0.00]   C-CDFFF write-protect
[0.00]   CE000-E uncachable
[0.00]   F-F write-through
[0.00] MTRR variable ranges enabled:
[0.00]   0 base 00 mask 0F write-back
[0.00]   1 base 00E000 mask 0FE000 uncachable
[0.00]   2 base 00D000 mask 0FF000 uncachable
[0.00]   3 base 01 mask 0F write-back
[0.00]   4 base 01C000 mask 0FC000 uncachable
[0.00]   5 base 01B000 mask 0FF000 uncachable
[0.00]   6 base 00CFF0 mask 00 uncachable
[0.00]   7 disabled
[0.00] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WC  UC- WT
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] total RAM covered: 6143M
[0.00] Found optimal setting for mtrr clean up
[0.00]  gran_size: 64K  chunk_size: 2M  num_reg: 7  lose cover RAM: 
0G
[0.00] e820: update [mem 0xcff0-0x] usable ==> reserved
[0.00] 

Re: [tip:x86/urgent] x86/PAT: Fix Xorg regression on CPUs that don't support PAT

2017-05-28 Thread Bernhard Held

Hi,

this patch breaks the boot of my kernel. The last message is "Booting
the kernel.".

My setup might be unusual: I'm running a Xenon E5450 (LGA 771) in a
Gigbayte G33-DS3R board (LGA 775). The BIOS is patched with the
microcode of the E5450 and recognizes the CPU.

Please find below the dmesg of a the latest kernel w/o the PAT-patch.
I'm happy to provide more information or to test patches.

Have fun,
Bernhard

[0.00] Linux version 4.12.0-rc2-linus+ (berny@quad) (gcc version 6.3.1 
20170202 [gcc-6-branch revision 245119] (SUSE Linux) ) #152 SMP PREEMPT Sun May 
28 19:26:20 CEST 2017
[0.00] Command line: BOOT_IMAGE=/vmlinuz-4.12.0-rc2-linus+ 
root=/dev/mapper/VGMX300-root resume=/dev/sda2 showopts radeon.dpm=1 
memmap=1$0xe4fd net.ifnames=0
[0.00] KERNEL supported cpus:
[0.00]   Intel GenuineIntel
[0.00] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point 
registers'
[0.00] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[0.00] x86/fpu: Enabled xstate features 0x3, context size is 576 bytes, 
using 'standard' format.
[0.00] e820: BIOS-provided physical RAM map:
[0.00] BIOS-e820: [mem 0x-0x0009dbff] usable
[0.00] BIOS-e820: [mem 0x0009f800-0x0009] reserved
[0.00] BIOS-e820: [mem 0x000f-0x000f] reserved
[0.00] BIOS-e820: [mem 0x0010-0xcfed] usable
[0.00] BIOS-e820: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] BIOS-e820: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] BIOS-e820: [mem 0xcfef-0xcfef] reserved
[0.00] BIOS-e820: [mem 0xd000-0xdfff] reserved
[0.00] BIOS-e820: [mem 0xfec0-0x] reserved
[0.00] BIOS-e820: [mem 0x0001-0x0001afff] usable
[0.00] NX (Execute Disable) protection: active
[0.00] e820: user-defined physical RAM map:
[0.00] user: [mem 0x-0xe4fc] usable
[0.00] user: [mem 0xe4fd-0xe4fd] reserved
[0.00] user: [mem 0xe4fe-0x0009dbff] usable
[0.00] user: [mem 0x0009f800-0x0009] reserved
[0.00] user: [mem 0x000f-0x000f] reserved
[0.00] user: [mem 0x0010-0xcfed] usable
[0.00] user: [mem 0xcfee-0xcfee2fff] ACPI NVS
[0.00] user: [mem 0xcfee3000-0xcfee] ACPI data
[0.00] user: [mem 0xcfef-0xcfef] reserved
[0.00] user: [mem 0xd000-0xdfff] reserved
[0.00] user: [mem 0xfec0-0x] reserved
[0.00] user: [mem 0x0001-0x0001afff] usable
[0.00] SMBIOS 2.4 present.
[0.00] DMI: Gigabyte Technology Co., Ltd. G33-DS3R/G33-DS3R, BIOS F7L 
07/31/2009
[0.00] tsc: Fast TSC calibration using PIT
[0.00] e820: update [mem 0x-0x0fff] usable ==> reserved
[0.00] e820: remove [mem 0x000a-0x000f] usable
[0.00] e820: last_pfn = 0x1b max_arch_pfn = 0x4
[0.00] MTRR default type: uncachable
[0.00] MTRR fixed ranges enabled:
[0.00]   0-9 write-back
[0.00]   A-B uncachable
[0.00]   C-CDFFF write-protect
[0.00]   CE000-E uncachable
[0.00]   F-F write-through
[0.00] MTRR variable ranges enabled:
[0.00]   0 base 00 mask 0F write-back
[0.00]   1 base 00E000 mask 0FE000 uncachable
[0.00]   2 base 00D000 mask 0FF000 uncachable
[0.00]   3 base 01 mask 0F write-back
[0.00]   4 base 01C000 mask 0FC000 uncachable
[0.00]   5 base 01B000 mask 0FF000 uncachable
[0.00]   6 base 00CFF0 mask 00 uncachable
[0.00]   7 disabled
[0.00] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WC  UC- WT
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] mtrr: your BIOS has configured an incorrect mask, fixing it.
[0.00] total RAM covered: 6143M
[0.00] Found optimal setting for mtrr clean up
[0.00]  gran_size: 64K  chunk_size: 2M  num_reg: 7  lose cover RAM: 
0G
[0.00] e820: update [mem 0xcff0-0x] usable ==> reserved
[0.00] 

[PATCH] tcp_bbr: fix Kconfig to be able to make BBR the default congestion algorithm

2016-11-30 Thread Bernhard Held

Add missing line to be able to make BBR the default
congestion algorithm.

Signed-off-by: Bernhard Held <berny...@gmx.de>
---
 net/ipv4/Kconfig | 1 +
 1 file changed, 1 insertion(+)

diff --git a/net/ipv4/Kconfig b/net/ipv4/Kconfig
index 300b068..b54b3ca 100644
--- a/net/ipv4/Kconfig
+++ b/net/ipv4/Kconfig
@@ -715,6 +715,7 @@ config DEFAULT_TCP_CONG
default "reno" if DEFAULT_RENO
default "dctcp" if DEFAULT_DCTCP
default "cdg" if DEFAULT_CDG
+   default "bbr" if DEFAULT_BBR
default "cubic"

 config TCP_MD5SIG


[PATCH] tcp_bbr: fix Kconfig to be able to make BBR the default congestion algorithm

2016-11-30 Thread Bernhard Held

Add missing line to be able to make BBR the default
congestion algorithm.

Signed-off-by: Bernhard Held 
---
 net/ipv4/Kconfig | 1 +
 1 file changed, 1 insertion(+)

diff --git a/net/ipv4/Kconfig b/net/ipv4/Kconfig
index 300b068..b54b3ca 100644
--- a/net/ipv4/Kconfig
+++ b/net/ipv4/Kconfig
@@ -715,6 +715,7 @@ config DEFAULT_TCP_CONG
default "reno" if DEFAULT_RENO
default "dctcp" if DEFAULT_DCTCP
default "cdg" if DEFAULT_CDG
+   default "bbr" if DEFAULT_BBR
default "cubic"

 config TCP_MD5SIG