[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v12 for-xen-4.5 16/20] x86/VPMU: Handle PMU interrupts for PV guests



On 10/01/2014 09:18 AM, Jan Beulich wrote:
On 01.10.14 at 14:53, <boris.ostrovsky@xxxxxxxxxx> wrote:
On 10/01/2014 02:49 AM, Jan Beulich wrote:
On 30.09.14 at 18:37, <boris.ostrovsky@xxxxxxxxxx> wrote:
On 09/30/2014 11:44 AM, Jan Beulich wrote:
+            {
+                r->cs = cur_regs->cs;
+                if ( sampled->arch.flags & TF_kernel_mode )
+                    r->cs &= ~3;
And once again I wonder how the consumer of this data is to tell
apart guest kernel and hypervisor addresses.
Based on the RIP --- perf, for example, searches through various symbol
tables.
That doesn't help when profiling HVM/PVH guests - addresses are
ambiguous in that case.
Hypervisor traces are only sent to dom0, which is currently PV only. The
key here, of course, is the word 'currently'.
So you completely ignore PVH Dom0? Experimental or not, I don't
think that's the way to go.
As I mentioned in an earlier reply, I will set domain_id in the reported
structure to DOMID_XEN when we are reporting hypervisor sample.

Furthermore the check around this is
once again using sampled, not sampling.
Which check are you referring to?
The if() right outside (above) the still visible patch context.

Why should it be 'sampling'? I am collecting registers from sampled vcpu so I need to look at that domain's flags to determine the mode, don't I?



Looking at the separation of hypervisor vs guest context to report
again

              /* Non-privileged domains are always in XENPMU_MODE_SELF mode */
              if ( (vpmu_mode & XENPMU_MODE_SELF) ||
                   (!is_hardware_domain(sampled->domain) &&
                    !is_idle_vcpu(sampled)) )
                  cur_regs = guest_cpu_user_regs();
              else
                  cur_regs = regs;

I now additionally wonder why the condition here isn't just the SELF
check: If the interrupt happened while in the hypervisor, why would
you override this unconditionally to report a guest sample instead?
Shouldn't the profiling domain tell you what it wants in that case
(global vs guest local view)?
The second part of the check (!is_hardware_domain(sampled->domain) &&
!is_idle_vcpu(sampled)) is to prevent sending hypervisor sample to a
non-privileged guest. vpmu_mode may be, for example, XENPMU_MODE_HV but
that only means that dom0 can get hypervisor samples.
Right, but that's not what the code above does: Instead of sending
the hypervisor sample to Dom0 it converts it to a guest mode one.

Oh, I see --- when we get interrupted while in a non-privileged guest's context (but in hypervisor) I send guest's registers, not Xen's.

I think just SELF check is not sufficient though, we need to make sure that we are not sending hypervisor sample to non-dom0. So if ( (vpmu_mode & XENPMU_MODE_SELF) || !is_hardware_domain(sampling->domain) )

-boris


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.