[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4 3/3] xen: Expose the PMU to the guests


  • To: Julien Grall <julien@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Mon, 11 Oct 2021 14:11:32 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xxKC7lWVnPNp8WMxqbuowokiyEdbu/+JK4PNgbkbPoY=; b=IdlDWcB/Z7Hag19v0CO9SNe2UIBnoAGx77ABk9uEtJB+DBQIvygqB+wM+BsPEsSVNkHsWgHiD0IFBV2IeFXOHIClZbjFGkxDTBmSVq70YOVbm/zBxlhKFn+wdy79b5RbEECFpb51HsU0iWAA2o3Po/xypjdCf0H8YsqOAK3hpW/ezyOdAcCMw1dhYPw4qJiKhkZQi5E3+Fht0+vQe9ojL2A93fULi+bfO49pcJgJOrQntNoETxw8x4dk139GOjXHTawOxN3x8iHsFDg16/0UUkvwxKdjVHQYOYN10XPeJVrjDmvyQ9jv+hJ+rrAKOwCrcMKLa7D/Eed6poWEf2WIqQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FcHOPe+wq7A9FI3hiyANP4haKjxtXbEsDAb00v4AUaesWXsGPFte9Lz7RcrJN1Dcuw8vTNuvbDGOZ9b7ul8EMk7ilVhsntqoRckvDiGR2wtWcFtd72lW5/7AEjrPX1ulzjJ2rX0Tq6kH5+6RKGimE/cIxdfG+RueWOPy4MK6rr3c7u5549wRddDXZjDk+9HdnC08mIdXIULE1xDQ1rBKS0L2GGX4602FgPeArRGwwyqDyog0XEvgVSI2hSHr29QRW7NHYDNceZZfoehayT0Wxm5ilDd95HeRxSB+N65C5DpZINn4pUTlowKaNDU66ac6D0BbhigJdtZiL4UCSe8K5w==
  • Authentication-results-original: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Cc: Michal Orzel <Michal.Orzel@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Nick Rosbrook <rosbrookn@xxxxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Mon, 11 Oct 2021 14:12:10 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHXvn6Qu4OqYnEUu02nRnOP3J3zSKvNlm2AgABAXYA=
  • Thread-topic: [PATCH v4 3/3] xen: Expose the PMU to the guests

Hi Julien,

> On 11 Oct 2021, at 11:21, Julien Grall <julien@xxxxxxx> wrote:
> 
> Hi Michal,
> 
> On 11/10/2021 10:00, Michal Orzel wrote:
>> Add parameter vpmu to xl domain configuration syntax
>> to enable the access to PMU registers by disabling
>> the PMU traps(currently only for ARM).
>> The current status is that the PMU registers are not
>> virtualized and the physical registers are directly
>> accessible when this parameter is enabled. There is no
>> interrupt support and Xen will not save/restore the
>> register values on context switches.
>> Please note that this feature is experimental.
>> Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx>
>> Signed-off-by: Julien Grall <julien@xxxxxxx>
>> Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
>> ---
>> Changes since v3:
>> -fail if vpmu is set but not supported
>> -rebase on top of latest staging
>> Changes since v2:
>> -remove redundant check from x86 code
>> -do not define bit position and mask separately
>> Changes since v1:
>> -modify vpmu parameter to be common rather than arch specific
>> ---
>>  docs/man/xl.cfg.5.pod.in             | 17 +++++++++++++++++
>>  tools/golang/xenlight/helpers.gen.go |  6 ++++++
>>  tools/golang/xenlight/types.gen.go   |  1 +
>>  tools/include/libxl.h                |  6 ++++++
>>  tools/libs/light/libxl_create.c      | 10 ++++++++++
>>  tools/libs/light/libxl_types.idl     |  2 ++
>>  tools/ocaml/libs/xc/xenctrl.ml       |  1 +
>>  tools/ocaml/libs/xc/xenctrl.mli      |  1 +
>>  tools/xl/xl_parse.c                  |  2 ++
>>  xen/arch/arm/domain.c                | 12 +++++++++---
>>  xen/arch/arm/setup.c                 |  1 +
>>  xen/common/domain.c                  | 10 +++++++++-
>>  xen/include/asm-arm/domain.h         |  1 +
>>  xen/include/public/domctl.h          |  4 +++-
>>  14 files changed, 69 insertions(+), 5 deletions(-)
>> diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
>> index 4b1e3028d2..55c4881205 100644
>> --- a/docs/man/xl.cfg.5.pod.in
>> +++ b/docs/man/xl.cfg.5.pod.in
>> @@ -690,6 +690,23 @@ default.
>>  B<NOTE>: Acceptable values are platform specific.  For Intel Processor
>>  Trace, this value must be a power of 2 between 4k and 16M.
>>  +=item B<vpmu=BOOLEAN>
>> +
>> +Currently ARM only.
>> +
>> +Specifies whether to enable the access to PMU registers by disabling
>> +the PMU traps.
>> +
>> +The PMU registers are not virtualized and the physical registers are 
>> directly
>> +accessible when this parameter is enabled. There is no interrupt support and
>> +Xen will not save/restore the register values on context switches.
>> +
>> +vPMU, by design and purpose, exposes system level performance
>> +information to the guest. Only to be used by sufficiently privileged
>> +domains. This feature is currently in experimental state.
> 
> Please update SUPPORT.MD to mention the support of this feature.
> 
>> +
>> +If this option is not specified then it will default to B<false>.
>> +
>>  =back
>>    =head2 Devices
>> diff --git a/tools/golang/xenlight/helpers.gen.go 
>> b/tools/golang/xenlight/helpers.gen.go
>> index c8669837d8..2449580bad 100644
>> --- a/tools/golang/xenlight/helpers.gen.go
>> +++ b/tools/golang/xenlight/helpers.gen.go
>> @@ -1119,6 +1119,9 @@ return fmt.Errorf("converting field 
>> ArchX86.MsrRelaxed: %v", err)
>>  }
>>  x.Altp2M = Altp2MMode(xc.altp2m)
>>  x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
>> +if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
>> +return fmt.Errorf("converting field Vpmu: %v", err)
>> +}
>>     return nil}
>>  @@ -1600,6 +1603,9 @@ return fmt.Errorf("converting field 
>> ArchX86.MsrRelaxed: %v", err)
>>  }
>>  xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
>>  xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
>> +if err := x.Vpmu.toC(&xc.vpmu); err != nil {
>> +return fmt.Errorf("converting field Vpmu: %v", err)
>> +}
>>     return nil
>>   }
>> diff --git a/tools/golang/xenlight/types.gen.go 
>> b/tools/golang/xenlight/types.gen.go
>> index 45f2cba3d2..b2e8bd1a85 100644
>> --- a/tools/golang/xenlight/types.gen.go
>> +++ b/tools/golang/xenlight/types.gen.go
>> @@ -521,6 +521,7 @@ MsrRelaxed Defbool
>>  }
>>  Altp2M Altp2MMode
>>  VmtraceBufKb int
>> +Vpmu Defbool
>>  }
>>    type DomainBuildInfoTypeUnion interface {
>> diff --git a/tools/include/libxl.h b/tools/include/libxl.h
>> index ec5e3badae..ee73eb06f1 100644
>> --- a/tools/include/libxl.h
>> +++ b/tools/include/libxl.h
>> @@ -508,6 +508,12 @@
>>   */
>>  #define LIBXL_HAVE_PHYSINFO_CAP_VPMU 1
>>  +/*
>> + * LIBXL_HAVE_VPMU indicates that libxl_domain_build_info has a vpmu 
>> parameter,
>> + * which allows to enable the access to PMU registers.
>> + */
>> +#define LIBXL_HAVE_VPMU 1
>> +
>>  /*
>>   * libxl ABI compatibility
>>   *
>> diff --git a/tools/libs/light/libxl_create.c 
>> b/tools/libs/light/libxl_create.c
>> index e356b2106d..2a0234ec16 100644
>> --- a/tools/libs/light/libxl_create.c
>> +++ b/tools/libs/light/libxl_create.c
>> @@ -91,6 +91,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>>      }
>>        libxl_defbool_setdefault(&b_info->device_model_stubdomain, false);
>> +    libxl_defbool_setdefault(&b_info->vpmu, false);
>>        if (libxl_defbool_val(b_info->device_model_stubdomain) &&
>>          !b_info->device_model_ssidref)
>> @@ -622,6 +623,9 @@ int libxl__domain_make(libxl__gc *gc, 
>> libxl_domain_config *d_config,
>>                  create.flags |= XEN_DOMCTL_CDF_nested_virt;
>>          }
>>  +        if ( libxl_defbool_val(b_info->vpmu) )
>> +            create.flags |= XEN_DOMCTL_CDF_vpmu;
>> +
>>          assert(info->passthrough != LIBXL_PASSTHROUGH_DEFAULT);
>>          LOG(DETAIL, "passthrough: %s",
>>              libxl_passthrough_to_string(info->passthrough));
>> @@ -1199,6 +1203,12 @@ int libxl__domain_config_setdefault(libxl__gc *gc,
>>          goto error_out;
>>      }
>>  +    if (libxl_defbool_val(d_config->b_info.vpmu) && !physinfo.cap_vpmu) {
>> +        ret = ERROR_INVAL;
>> +        LOGD(ERROR, domid, "vpmu not supported on this platform\n");
>> +        goto error_out;
>> +    }
>> +
>>      ret = 0;
>>   error_out:
>>      return ret;
>> diff --git a/tools/libs/light/libxl_types.idl 
>> b/tools/libs/light/libxl_types.idl
>> index 993e83acca..b96fb5c47e 100644
>> --- a/tools/libs/light/libxl_types.idl
>> +++ b/tools/libs/light/libxl_types.idl
>> @@ -655,6 +655,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
>>      # Use zero value to disable this feature.
>>      ("vmtrace_buf_kb", integer),
>>  +    ("vpmu", libxl_defbool),
>> +
>>      ], dir=DIR_IN,
>>         copy_deprecated_fn="libxl__domain_build_info_copy_deprecated",
>>  )
>> diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
>> index 7a4030a192..86758babb3 100644
>> --- a/tools/ocaml/libs/xc/xenctrl.ml
>> +++ b/tools/ocaml/libs/xc/xenctrl.ml
>> @@ -70,6 +70,7 @@ type domain_create_flag =
>>      | CDF_IOMMU
>>      | CDF_NESTED_VIRT
>>      | CDF_VPCI
>> +    | CDF_VPMU
>>    type domain_create_iommu_opts =
>>      | IOMMU_NO_SHAREPT
>> diff --git a/tools/ocaml/libs/xc/xenctrl.mli 
>> b/tools/ocaml/libs/xc/xenctrl.mli
>> index 6900513e7f..0fdb0cc169 100644
>> --- a/tools/ocaml/libs/xc/xenctrl.mli
>> +++ b/tools/ocaml/libs/xc/xenctrl.mli
>> @@ -63,6 +63,7 @@ type domain_create_flag =
>>    | CDF_IOMMU
>>    | CDF_NESTED_VIRT
>>    | CDF_VPCI
>> +  | CDF_VPMU
>>    type domain_create_iommu_opts =
>>    | IOMMU_NO_SHAREPT
>> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
>> index 17dddb4cd5..c503b9be00 100644
>> --- a/tools/xl/xl_parse.c
>> +++ b/tools/xl/xl_parse.c
>> @@ -2750,6 +2750,8 @@ skip_usbdev:
>>                      "If it fixes an issue you are having please report to "
>>                      "xen-devel@xxxxxxxxxxxxxxxxxxxx.\n");
>>  +    xlu_cfg_get_defbool(config, "vpmu", &b_info->vpmu, 0);
>> +
>>      xlu_cfg_destroy(config);
>>  }
>>  diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
>> index aae4472479..2f988c790e 100644
>> --- a/xen/arch/arm/domain.c
>> +++ b/xen/arch/arm/domain.c
>> @@ -276,6 +276,8 @@ static void ctxt_switch_to(struct vcpu *n)
>>       * timer. The interrupt needs to be injected into the guest. */
>>      WRITE_SYSREG(n->arch.cntkctl, CNTKCTL_EL1);
>>      virt_timer_restore(n);
>> +
>> +    WRITE_SYSREG(n->arch.mdcr_el2, MDCR_EL2);
>>  }
>>    /* Update per-VCPU guest runstate shared memory area (if registered). */
>> @@ -586,6 +588,10 @@ int arch_vcpu_create(struct vcpu *v)
>>        v->arch.hcr_el2 = get_default_hcr_flags();
>>  +    v->arch.mdcr_el2 = HDCR_TDRA | HDCR_TDOSA | HDCR_TDA;
>> +    if ( !(v->domain->options & XEN_DOMCTL_CDF_vpmu) )
>> +        v->arch.mdcr_el2 |= HDCR_TPM | HDCR_TPMCR;
>> +
>>      if ( (rc = vcpu_vgic_init(v)) != 0 )
>>          goto fail;
>>  @@ -622,9 +628,9 @@ int arch_sanitise_domain_config(struct 
>> xen_domctl_createdomain *config)
>>  {
>>      unsigned int max_vcpus;
>>  -    /* HVM and HAP must be set. IOMMU and VPCI may or may not be */
>> -    if ( (config->flags & ~XEN_DOMCTL_CDF_iommu & ~XEN_DOMCTL_CDF_vpci) !=
>> -         (XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap) )
>> +    /* HVM and HAP must be set. IOMMU, VPCI and VPMU may or may not be */
>> +    if ( (config->flags & ~(XEN_DOMCTL_CDF_iommu | XEN_DOMCTL_CDF_vpci |
>> +          XEN_DOMCTL_CDF_vpmu)) != (XEN_DOMCTL_CDF_hvm | 
>> XEN_DOMCTL_CDF_hap) )
> 
> The split here is not easy to read. Can you introduce two masks (one for the 
> flags that must be set and the other optional) so we don't need to split the 
> optional options over two lines.
> 
>>      {
>>          dprintk(XENLOG_INFO, "Unsupported configuration %#x\n",
>>                  config->flags);
>> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
>> index 49dc90d198..85386a765a 100644
>> --- a/xen/arch/arm/setup.c
>> +++ b/xen/arch/arm/setup.c
>> @@ -108,6 +108,7 @@ static void __init processor_id(void)
>>        identify_cpu(c);
>>      current_cpu_data = *c;
>> +    vpmu_is_available = cpu_has_pmu;
> 
> This wants to be set after the ID registers are sanitized (i.e. after the 
> secondary CPUs have been brought).
> 
> Also, on Armv8, the features supported by 64-bit and 32-bit exception level 
> are separate. I couldn't find anything in the Arm that suggest that if the 
> PMU is implemented by the former, then the latter must be. Do you have the 
> page in hand?

Chapter D7.1 at the end is saying this:

"The Performance Monitors Extension is common to AArch64 operation and AArch32 
operation.”

Is this the justification you are looking for ?

Cheers
Bertrand

> 
>>        if ( c->midr.implementer < ARRAY_SIZE(processor_implementers) &&
>>           processor_implementers[c->midr.implementer] )
>> diff --git a/xen/common/domain.c b/xen/common/domain.c
>> index 262b6c0c3c..8543fb54fd 100644
>> --- a/xen/common/domain.c
>> +++ b/xen/common/domain.c
>> @@ -480,12 +480,14 @@ static int sanitise_domain_config(struct 
>> xen_domctl_createdomain *config)
>>      bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
>>      bool hap = config->flags & XEN_DOMCTL_CDF_hap;
>>      bool iommu = config->flags & XEN_DOMCTL_CDF_iommu;
>> +    bool vpmu = config->flags & XEN_DOMCTL_CDF_vpmu;
>>        if ( config->flags &
>>           ~(XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap |
>>             XEN_DOMCTL_CDF_s3_integrity | XEN_DOMCTL_CDF_oos_off |
>>             XEN_DOMCTL_CDF_xs_domain | XEN_DOMCTL_CDF_iommu |
>> -           XEN_DOMCTL_CDF_nested_virt | XEN_DOMCTL_CDF_vpci) )
>> +           XEN_DOMCTL_CDF_nested_virt | XEN_DOMCTL_CDF_vpci |
>> +           XEN_DOMCTL_CDF_vpmu) )
>>      {
>>          dprintk(XENLOG_INFO, "Unknown CDF flags %#x\n", config->flags);
>>          return -EINVAL;
>> @@ -534,6 +536,12 @@ static int sanitise_domain_config(struct 
>> xen_domctl_createdomain *config)
>>          return -EINVAL;
>>      }
>>  +    if ( vpmu && !vpmu_is_available )
>> +    {
>> +        dprintk(XENLOG_INFO, "vpmu requested but cannot be enabled this 
>> way\n");
>> +        return -EINVAL;
>> +    }
>> +
>>      return arch_sanitise_domain_config(config);
>>  }
>>  diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
>> index c9277b5c6d..14e575288f 100644
>> --- a/xen/include/asm-arm/domain.h
>> +++ b/xen/include/asm-arm/domain.h
>> @@ -166,6 +166,7 @@ struct arch_vcpu
>>        /* HYP configuration */
>>      register_t hcr_el2;
>> +    register_t mdcr_el2;
>>        uint32_t teecr, teehbr; /* ThumbEE, 32-bit guests only */
>>  #ifdef CONFIG_ARM_32
>> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
>> index 4cb3f662c2..a53cbd16f4 100644
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -71,9 +71,11 @@ struct xen_domctl_createdomain {
>>  #define _XEN_DOMCTL_CDF_nested_virt   6
>>  #define XEN_DOMCTL_CDF_nested_virt    (1U << _XEN_DOMCTL_CDF_nested_virt)
>>  #define XEN_DOMCTL_CDF_vpci           (1U << 7)
>> +/* Should we expose the vPMU to the guest? */
>> +#define XEN_DOMCTL_CDF_vpmu           (1U << 8)
>>    /* Max XEN_DOMCTL_CDF_* constant.  Used for ABI checking. */
>> -#define XEN_DOMCTL_CDF_MAX XEN_DOMCTL_CDF_vpci
>> +#define XEN_DOMCTL_CDF_MAX XEN_DOMCTL_CDF_vpmu
>>        uint32_t flags;
>>  
> 
> Cheers,
> 
> -- 
> Julien Grall


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.