[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v8 12/16] xen/domctl: Add XEN_DOMCTL_vmtrace_op


  • To: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Mon, 1 Feb 2021 13:00:47 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jZp8HxNw9IQ8JWY9bpdc7k0Axvb7N23JXY6ItYc+ObE=; b=NZM9SdiQt0HhSRlkidDsZekPbc7ctyAKmnUYA+3gElx77pMFNb58jH8B/ZDE/lQ75b6Tf5ehnewaDc+pdsek8k7WZUOkRhJlOwFvO6uUyIA9P+gOG7S3qLUHNBuePmsNHd4ui5nlj2QSnyXPTvOWtRsSibSWa4U0mLO/tLD6yot1PxyBmM2fLxoCIttyBbHjHGXJluSjxQZZvTVusVpN2QlPlCOlp3lTLqLRdcCXLz6onSCin/CHZyC1X3J2msvlJ1CidsTN95bQPvfLpi/z55Psl9jp7pNqpZHV+UT4v0B6lAQPdrVIdjwMhSPG5rwycDchvV9K98tTnRq+LgrPIQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dgbK7UQYCjEsLTcKZ21s9QEnsRu+BLPv6ygoVD9Qf4hWaX0gPlDNk/zF/XaAYHyyY7bEi0UjT1LUnQuXjVc8tVbLB7bFqdacDPCnjZqT07jX00yXwhOxBY5ERzgPShTQ6UPjJsxMWAca22uPyoIhHsdTYH9eHNrTYlx7sLEIZXHHOgqo49yRnRVthmdUphFigYntPrN3u0JSSNwFOlh3kHsg8RHb5wqEvVDSy9TvytwOLoLhHa3/KLLrba8168S5exr8YReB79dTdaVKNbKck58MVnOI3IEIxkNZXhI3i8jtQrOMIcillg4t7kYQmr1xk+7hE1G5vALKJYOCS7OrPg==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Michał Leszczyński <michal.leszczynski@xxxxxxx>, "Jan Beulich" <JBeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
  • Delivery-date: Mon, 01 Feb 2021 13:01:34 +0000
  • Ironport-sdr: yAfHMaOzUlyVspQLwDXLD4V5TKdiDy4U4Trz1Pz1bcO3vtJUtJC6jpP6jLBOf8q8FnprQsNZkZ qvomp1IxyhyIgNyxzIpDrOuj222Ut1SmcTxZ2XRFfTLhLi91pam7JOwfXT+iVG2AKjELt37A6X Lo5Nz7P0sN/0xjmSVxqYyIIBBI1hd2kwGqYtuFW1GYkx+/J+Zlptyqkgzh0H3nzw/ZKtOSmPPr cixGBmYGLm7SGMEmIHOaYvMTzpX3ZJqUw0MMtGwOcpd/8s8ZJU0mWlXUyKCrX7fO89lYSujHYl BUQ=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01/02/2021 12:01, Roger Pau Monné wrote:
> On Sat, Jan 30, 2021 at 02:58:48AM +0000, Andrew Cooper wrote:
>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>> index 12b961113e..a64c4e4177 100644
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> @@ -2261,6 +2261,157 @@ static bool vmx_get_pending_event(struct vcpu *v, 
>> struct x86_event *info)
>>      return true;
>>  }
>>  
>> +/*
>> + * We only let vmtrace agents see and modify a subset of bits in 
>> MSR_RTIT_CTL.
>> + * These all pertain to data-emitted into the trace buffer(s).  Must not
>> + * include controls pertaining to the structure/position of the trace
>> + * buffer(s).
>> + */
>> +#define RTIT_CTL_MASK                                                   \
>> +    (RTIT_CTL_TRACE_EN | RTIT_CTL_OS | RTIT_CTL_USR | RTIT_CTL_TSC_EN | \
>> +     RTIT_CTL_DIS_RETC | RTIT_CTL_BRANCH_EN)
>> +
>> +/*
>> + * Status bits restricted to the first-gen subset (i.e. no further CPUID
>> + * requirements.)
>> + */
>> +#define RTIT_STATUS_MASK                                                \
>> +    (RTIT_STATUS_FILTER_EN | RTIT_STATUS_CONTEXT_EN | 
>> RTIT_STATUS_TRIGGER_EN | \
>> +     RTIT_STATUS_ERROR | RTIT_STATUS_STOPPED)
>> +
>> +static int vmtrace_get_option(struct vcpu *v, uint64_t key, uint64_t 
>> *output)
>> +{
>> +    const struct vcpu_msrs *msrs = v->arch.msrs;
>> +
>> +    switch ( key )
>> +    {
>> +    case MSR_RTIT_OUTPUT_MASK:
> Is there any value in returning the raw value of this MSR instead of
> just using XEN_DOMCTL_vmtrace_output_position?

Yes, but for interface reasons.

There are deliberately some common interfaces (for the subset of options
expected to be useful), and some platform-specific ones (because there's
no possible way we encode all of the options in some "common" interface).

Yes - there is some overlap between the two sets - that is unavoidable
IMO.  A user of this interface already needs platform specific knowledge
because it has to interpret the contents of the trace buffer.

Future extensions to this interface would be setting up the CR3 filter
and range filters, which definitely shouldn't be common, and can be
added without new subops in the current model.

> The size of the buffer should be known to user-space, and then setting
> the offset could be done by adding a XEN_DOMCTL_vmtrace_set_output_position?
>
> Also the contents of this MSR depend on whether ToPA mode is used, and
> that's not under the control of the guest. So if Xen is switched to
> use ToPA mode at some point the value of this MSR might not be what a
> user of the interface expects.
>
> From an interface PoV it might be better to offer:
>
> XEN_DOMCTL_vmtrace_get_limit
> XEN_DOMCTL_vmtrace_get_output_position
> XEN_DOMCTL_vmtrace_set_output_position
>
> IMO, as that would be compatible with ToPA if we ever switch to it.

ToPA is definitely more complicated.  We'd need to stitch the disparate
buffers back together into one logical view, at which point
get_output_position becomes more complicated.

As for set_output_position, that's not useful.  You either want to keep
the position as-is, or reset back to 0, hence having a platform-neutral
reset option.

However, based on this reasoning, I think I should drop access to
MSR_RTIT_OUTPUT_MASK entirely.  Neither half is useful for userspace to
access in a platforms-specific way, and disallowing access entirely will
simplify adding ToPA support in the future.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.