[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v7] x86/emulate: Send vm_event from emulate


  • To: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  • From: Jan Beulich <JBeulich@xxxxxxxx>
  • Date: Fri, 19 Jul 2019 13:38:54 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=suse.com;dmarc=pass action=none header.from=suse.com;dkim=pass header.d=suse.com;arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gUzzPW2U2E4Ejxe5VpVDzWCDFvw8NiQloTcx8U1aMoE=; b=VOProNnfS5t7/1L3KKRUFr2gpaojMzycD6iw9J9saJxlp/Lqf4Ru4w0xX834t3dOcmek7R1vaKyqc/bkZ284HQINh35MRqNbLMDoPRiHSJkz/Z2hZWQhgWEP8ug1kTwHpYVkrW6A9bbQrVcSjnBSirI6GqkU4QGPZE4BISVEAd4Au1wQH3tup2dgt7pLVptl1js+d3VtJbwfjB2DZ5qN/fBE6eOAKQTkuk6BZ0LsiP8coAQui5JUsRIGyZwdAIwEu42ObXiqYJgZl2AU7u4hiYMTWjtBuZltp/1tQpiTUjDom4qklVX0GiCYDQT9e77VqDJ21tLzztZwVyGRFqkTxw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aojNXiXlQIzcTZhKaA/nMi1xR2wegxW6J8olz8/rlpIAsLmZC6kt7jO/ND8dcJ6crolAdMIOyS4nfcnvUJD0xM/sN5hGBSasXGOsyLgye7iWN+mJk9oWbwUCK1n8f3BwiOqXYfTk61mdaUSrbdtQ2R3CIaKxp67RHvebyNlGf6EIaw8tAvo4XYw4Kbp74ruAj+JnCLKIVys6wXTSFcIUYpxvGV7Hn+UGUPDzM63xrzTtdvJQ6qr2XHxj7955DyRKmVbMNJtPD5biAu3Ym/XmFWKYtGZL7Qrlub7FcHNUa7+Bx9WyZXkiG79xUNV/qvWK27FkyVj8fgCnkkI7qxWS1w==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=JBeulich@xxxxxxxx;
  • Cc: PetreOvidiu PIRCALABU <ppircalabu@xxxxxxxxxxxxxxx>, "tamas@xxxxxxxxxxxxx" <tamas@xxxxxxxxxxxxx>, "wl@xxxxxxx" <wl@xxxxxxx>, "george.dunlap@xxxxxxxxxxxxx" <george.dunlap@xxxxxxxxxxxxx>, "andrew.cooper3@xxxxxxxxxx" <andrew.cooper3@xxxxxxxxxx>, "paul.durrant@xxxxxxxxxx" <paul.durrant@xxxxxxxxxx>, Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "roger.pau@xxxxxxxxxx" <roger.pau@xxxxxxxxxx>
  • Delivery-date: Fri, 19 Jul 2019 13:39:53 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHVMY4Gmux1Y/IiSU2ZKtKyOfOCuKbQbceAgAGLzgCAAC22AP//4gTfgAACLQA=
  • Thread-topic: [PATCH v7] x86/emulate: Send vm_event from emulate

On 19.07.2019 15:30, Razvan Cojocaru wrote:
> On 7/19/19 4:18 PM, Jan Beulich wrote:
>> On 19.07.2019 14:34, Alexandru Stefan ISAILA wrote:
>>> On 18.07.2019 15:58, Jan Beulich wrote:
>>>> On 03.07.2019 12:56, Alexandru Stefan ISAILA wrote:
>>>>> A/D bit writes (on page walks) can be considered benign by an 
>>>>> introspection
>>>>> agent, so receiving vm_events for them is a pessimization. We try here to
>>>>> optimize by fitering these events out.
>>>>
>>>> But you add the sending of more events - how does "filter out" match
>>>> the actual implementation?
>>>
>>> The events are send only if there is a mem access violation therefore we
>>> are filtering and only sending the events that are interesting to
>>> introspection.
>>
>> Where is it that you prevent any event from being sent? As said,
>> reading the patch I only see new sending sites to get added.
> 
> If we don't emulate, we would receive the page-walk-generated events
> _and_ the touching-the-page-the-instruction-is-touching events.

Since the patch here alters emulation paths only, how do you know
whether to emulate? In order to not receive undue events it would
seem to me that you'd first have to intercept the guest on insns
of interest ... Overall I think that the patch description, while
it has improved, is still lacking sufficient information for a
person like me (not knowing much about your monitor tools) to be
able to sensibly review this (which includes understanding the
precise scenario you want to improve).

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.