[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v12 for-xen-4.5 03/20] x86/VPMU: Set MSR bitmaps only for HVM/PVH guests
On Thu, Sep 25, 2014 at 03:28:39PM -0400, Boris Ostrovsky wrote: > In preparation for making VPMU code shared with PV make sure that we we update > MSR bitmaps only for HVM/PVH guests > > Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> > Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> > --- > xen/arch/x86/hvm/svm/vpmu.c | 21 +++++++++++++-------- > xen/arch/x86/hvm/vmx/vpmu_core2.c | 8 +++++--- > 2 files changed, 18 insertions(+), 11 deletions(-) > > diff --git a/xen/arch/x86/hvm/svm/vpmu.c b/xen/arch/x86/hvm/svm/vpmu.c > index 8e07a98..c7e0946 100644 > --- a/xen/arch/x86/hvm/svm/vpmu.c > +++ b/xen/arch/x86/hvm/svm/vpmu.c > @@ -244,7 +244,8 @@ static int amd_vpmu_save(struct vcpu *v) > > context_save(v); > > - if ( !vpmu_is_set(vpmu, VPMU_RUNNING) && ctx->msr_bitmap_set ) > + if ( !vpmu_is_set(vpmu, VPMU_RUNNING) && > + has_hvm_container_domain(v->domain) && ctx->msr_bitmap_set ) > amd_vpmu_unset_msr_bitmap(v); > > return 1; > @@ -287,8 +288,9 @@ static int amd_vpmu_do_wrmsr(unsigned int msr, uint64_t > msr_content, > ASSERT(!supported); > > /* For all counters, enable guest only mode for HVM guest */ > - if ( (get_pmu_reg_type(msr) == MSR_TYPE_CTRL) && > - !(is_guest_mode(msr_content)) ) > + if ( has_hvm_container_domain(v->domain) && > + (get_pmu_reg_type(msr) == MSR_TYPE_CTRL) && > + !is_guest_mode(msr_content) ) > { > set_guest_mode(msr_content); > } > @@ -303,8 +305,9 @@ static int amd_vpmu_do_wrmsr(unsigned int msr, uint64_t > msr_content, > apic_write(APIC_LVTPC, PMU_APIC_VECTOR); > vpmu->hw_lapic_lvtpc = PMU_APIC_VECTOR; > > - if ( !((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > - amd_vpmu_set_msr_bitmap(v); > + if ( has_hvm_container_domain(v->domain) && > + !((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > + amd_vpmu_set_msr_bitmap(v); > } > > /* stop saving & restore if guest stops first counter */ > @@ -314,8 +317,9 @@ static int amd_vpmu_do_wrmsr(unsigned int msr, uint64_t > msr_content, > apic_write(APIC_LVTPC, PMU_APIC_VECTOR | APIC_LVT_MASKED); > vpmu->hw_lapic_lvtpc = PMU_APIC_VECTOR | APIC_LVT_MASKED; > vpmu_reset(vpmu, VPMU_RUNNING); > - if ( ((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > - amd_vpmu_unset_msr_bitmap(v); > + if ( has_hvm_container_domain(v->domain) && > + ((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > + amd_vpmu_unset_msr_bitmap(v); > release_pmu_ownship(PMU_OWNER_HVM); > } > > @@ -406,7 +410,8 @@ static void amd_vpmu_destroy(struct vcpu *v) > if ( !vpmu_is_set(vpmu, VPMU_CONTEXT_ALLOCATED) ) > return; > > - if ( ((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > + if ( has_hvm_container_domain(v->domain) && > + ((struct amd_vpmu_context *)vpmu->context)->msr_bitmap_set ) > amd_vpmu_unset_msr_bitmap(v); > > xfree(vpmu->context); > diff --git a/xen/arch/x86/hvm/vmx/vpmu_core2.c > b/xen/arch/x86/hvm/vmx/vpmu_core2.c > index 68b6272..c9f6ae4 100644 > --- a/xen/arch/x86/hvm/vmx/vpmu_core2.c > +++ b/xen/arch/x86/hvm/vmx/vpmu_core2.c > @@ -335,7 +335,8 @@ static int core2_vpmu_save(struct vcpu *v) > __core2_vpmu_save(v); > > /* Unset PMU MSR bitmap to trap lazy load. */ > - if ( !vpmu_is_set(vpmu, VPMU_RUNNING) && cpu_has_vmx_msr_bitmap ) > + if ( !vpmu_is_set(vpmu, VPMU_RUNNING) && > + has_hvm_container_domain(v->domain) && cpu_has_vmx_msr_bitmap ) > core2_vpmu_unset_msr_bitmap(v->arch.hvm_vmx.msr_bitmap); > > return 1; > @@ -448,7 +449,8 @@ static int core2_vpmu_msr_common_check(u32 msr_index, int > *type, int *index) > { > __core2_vpmu_load(current); > vpmu_set(vpmu, VPMU_CONTEXT_LOADED); > - if ( cpu_has_vmx_msr_bitmap ) > + if ( has_hvm_container_domain(current->domain) && > + cpu_has_vmx_msr_bitmap ) > core2_vpmu_set_msr_bitmap(current->arch.hvm_vmx.msr_bitmap); > } > return 1; > @@ -822,7 +824,7 @@ static void core2_vpmu_destroy(struct vcpu *v) > return; > xfree(core2_vpmu_cxt->pmu_enable); > xfree(vpmu->context); > - if ( cpu_has_vmx_msr_bitmap ) > + if ( has_hvm_container_domain(v->domain) && cpu_has_vmx_msr_bitmap ) > core2_vpmu_unset_msr_bitmap(v->arch.hvm_vmx.msr_bitmap); > release_pmu_ownship(PMU_OWNER_HVM); > vpmu_reset(vpmu, VPMU_CONTEXT_ALLOCATED); > -- > 1.8.1.4 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > http://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |