From: Avi Kivity <avi@redhat.com>
To: Gleb Natapov <gleb@redhat.com>
Cc: kvm@vger.kernel.org, mtosatti@redhat.com, mingo@elte.hu,
a.p.zijlstra@chello.nl, acme@ghostprotocols.net
Subject: Re: [PATCH 2/9] KVM: Expose a version 2 architectural PMU to a guests
Date: Tue, 01 Nov 2011 12:47:18 +0200 [thread overview]
Message-ID: <4EAFCE36.4070509@redhat.com> (raw)
In-Reply-To: <1319993624-20247-3-git-send-email-gleb@redhat.com>
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> From: Avi Kivity <avi@redhat.com>
This has changed significantly, so please update the authorship. You
can say 'based on original patch by ...' to provide due credit.
> Use perf_events to emulate an architectural PMU, version 2.
> +
> +/* mapping between fixed pmc index and arch_events array */
> +int fixed_pmc_events[] = {1, 0, 2};
> +
> +static bool pmc_is_gp(struct kvm_pmc *pmc)
> +{
> + return pmc->type == KVM_PMC_GP;
> +}
> +
> +static inline u64 pmc_bitmask(struct kvm_pmc *pmc)
> +{
> + struct kvm_pmu *pmu = &pmc->vcpu->arch.pmu;
> +
> + return pmc_is_gp(pmc) ? pmu->gp_counter_bitmask :
> + pmu->fixed_counter_bitmask;
> +}
Nicer to just push the bitmask (or bitwidth) into the counter itself.
> +
> +static inline int pmc_to_global_idx(struct kvm_pmc *pmc)
> +{
> + struct kvm_pmu *pmu = &pmc->vcpu->arch.pmu;
> + struct kvm_pmc *counters;
> + int shift;
> +
> + if (pmc_is_gp(pmc)) {
> + counters = pmu->gp_counters;
> + shift = X86_PMC_IDX_GENERIC;
> + } else {
> + counters = pmu->fixed_counters;
> + shift = X86_PMC_IDX_FIXED;
> + }
> +
> + return pmc - counters + shift;
> +}
Again, push the global index into struct kvm_pmc.
> +
> +static void kvm_perf_overflow(struct perf_event *perf_event,
> + struct perf_sample_data *data,
> + struct pt_regs *regs)
> +{
> + struct kvm_pmc *pmc = perf_event->overflow_handler_context;
> + struct kvm_pmu *pmu = &pmc->vcpu->arch.pmu;
> + __set_bit(pmc_to_global_idx(pmc),
> + (unsigned long *)&pmu->global_status);
> +}
> +
> +static void kvm_perf_overflow_intr(struct perf_event *perf_event,
> + struct perf_sample_data *data, struct pt_regs *regs)
> +{
> + struct kvm_pmc *pmc = perf_event->overflow_handler_context;
> + struct kvm_pmu *pmu = &pmc->vcpu->arch.pmu;
> + if (!__test_and_set_bit(pmc_to_global_idx(pmc),
> + (unsigned long *)&pmu->reprogram_pmi)) {
> + kvm_perf_overflow(perf_event, data, regs);
> + kvm_make_request(KVM_REQ_PMU, pmc->vcpu);
> + }
> +}
Is it safe to use the __ versions here?
Do we need to follow kvm_make_request() with kvm_vcpu_kick()? If there
is a skew between the overflow and the host PMI, the guest might have
executed a HLT.
> +
> +static void reprogram_fixed_counter(struct kvm_pmc *pmc, u8 en_pmi, int idx)
> +{
> + unsigned en = en_pmi & 0x3;
> + bool pmi = en_pmi & 0x8;
> +
> + stop_counter(pmc);
> +
> + if (!en || !pmc_enabled(pmc))
> + return;
> +
> + reprogram_counter(pmc, PERF_TYPE_HARDWARE,
> + arch_events[fixed_pmc_events[idx]].event_type,
> + !(en & 0x2), /* exclude user */
> + !(en & 0x1), /* exclude kernel */
> + pmi);
Are there no #defines for those constants?
> +}
> +
> +#define FIXED_EN_PMI(R, I) (((R) >> ((I) * 4)) & 0xf)
function
> + default:
> + if ((pmc = get_gp_pmc(pmu, index, MSR_IA32_PERFCTR0)) ||
> + (pmc = get_fixed_pmc(pmu, index))) {
> + data = (s64)(s32)data;
> + pmc->counter += data - read_pmc(pmc);
> + return 0;
> + } else if ((pmc = get_gp_pmc(pmu, index, MSR_P6_EVNTSEL0))) {
> + if (data == pmc->eventsel)
> + return 0;
> + if (!(data & 0xffffffff00200000ull)) {
> + reprogram_gp_counter(pmc, data);
> + return 0;
> + }
> + }
> + }
> + return 1;
> +}
> +
> +
> +void kvm_pmu_cpuid_update(struct kvm_vcpu *vcpu)
> +{
> + struct kvm_pmu *pmu = &vcpu->arch.pmu;
> + struct kvm_cpuid_entry2 *entry;
> + unsigned bitmap_len;
> +
> + pmu->nr_arch_gp_counters = 0;
> + pmu->nr_arch_fixed_counters = 0;
> + pmu->fixed_counter_bitmask = 0;
> + pmu->version = 0;
> +
> + entry = kvm_find_cpuid_entry(vcpu, 0xa, 0);
> + if (!entry)
> + return;
> +
> + pmu->version = entry->eax & 0xff;
> + if (!pmu->version)
> + return;
> +
> + pmu->nr_arch_gp_counters = min((int)(entry->eax >> 8) & 0xff,
> + X86_PMC_MAX_GENERIC);
> + pmu->gp_counter_bitmask = ((u64)1 << ((entry->eax >> 16) & 0xff)) - 1;
> + bitmap_len = (entry->eax >> 24) & 0xff;
> + pmu->available_event_types = ~entry->ebx & ((1ull << bitmap_len) - 1);
> +
> + if (pmu->version > 1) {
> + pmu->nr_arch_fixed_counters = min((int)(entry->edx) & 0x1f,
> + X86_PMC_MAX_FIXED);
Misplaced parentheses (though no effect on generated code).
> + pmu->fixed_counter_bitmask =
> + ((u64)1 << ((entry->edx >> 5) & 0xff)) - 1;
The user can cause this to be very small (even zero). Can this cause an
NMI storm?
> + pmu->global_ctrl_mask = ~(((1 << pmu->nr_arch_gp_counters) - 1)
> + | (((1ull << pmu->nr_arch_fixed_counters) - 1)
> + << X86_PMC_IDX_FIXED));
> + } else
> + pmu->global_ctrl = (1 << pmu->nr_arch_gp_counters) - 1;
> +}
Nicer to just return early if version < 2; less indentation and easier
to prepare for version 3.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
next prev parent reply other threads:[~2011-11-01 10:47 UTC|newest]
Thread overview: 43+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-10-30 16:53 [PATCH 0/9] KVM in-guest performance monitoring Gleb Natapov
2011-10-30 16:53 ` [PATCH 1/9] KVM: Expose kvm_lapic_local_deliver() Gleb Natapov
2011-10-30 16:53 ` [PATCH 2/9] KVM: Expose a version 2 architectural PMU to a guests Gleb Natapov
2011-11-01 10:47 ` Avi Kivity [this message]
2011-11-01 12:30 ` Gleb Natapov
2011-11-01 13:57 ` Gleb Natapov
2011-11-02 9:54 ` Avi Kivity
2011-11-02 9:56 ` Gleb Natapov
2011-11-02 10:01 ` Avi Kivity
2011-11-02 11:09 ` Gleb Natapov
2011-11-02 12:03 ` Gleb Natapov
2011-11-03 8:31 ` Gleb Natapov
2011-12-15 12:04 ` [PATCH] KVM: x86: Fix build breakage due to anonymous field initialization Jan Kiszka
2011-12-15 12:08 ` Peter Zijlstra
2011-12-15 12:16 ` Jan Kiszka
2011-12-26 12:38 ` Avi Kivity
2011-10-30 16:53 ` [PATCH 3/9] KVM: Add generic RDPMC support Gleb Natapov
2011-10-30 16:53 ` [PATCH 4/9] KVM: SVM: Intercept RDPMC Gleb Natapov
2011-10-30 16:53 ` [PATCH 5/9] KVM: VMX: " Gleb Natapov
2011-10-30 16:53 ` [PATCH 6/9] perf: expose perf capability to other modules Gleb Natapov
2011-11-01 10:49 ` Avi Kivity
2011-11-01 15:49 ` David Ahern
2011-11-01 16:13 ` Gleb Natapov
2011-11-01 16:20 ` David Ahern
2011-11-01 16:41 ` Gleb Natapov
2011-11-02 7:42 ` Frederic Weisbecker
2011-11-07 14:45 ` Will Deacon
2011-11-10 8:58 ` Frederic Weisbecker
2011-11-10 12:12 ` Jason Wessel
2011-11-15 18:34 ` Frederic Weisbecker
2011-10-30 16:53 ` [PATCH 7/9] KVM: Expose the architectural performance monitoring CPUID leaf Gleb Natapov
2011-11-01 10:51 ` Avi Kivity
2011-11-01 11:25 ` Gleb Natapov
2011-11-01 15:49 ` David Ahern
2011-11-01 16:18 ` Gleb Natapov
2011-11-01 16:24 ` David Ahern
2011-11-01 16:40 ` Gleb Natapov
2011-11-01 17:43 ` David Ahern
2011-11-02 11:18 ` Gleb Natapov
2011-10-30 16:53 ` [PATCH 8/9] KVM: x86 emulator: fix RDPMC privilege check Gleb Natapov
2011-10-30 16:53 ` [PATCH 9/9] KVM: x86 emulator: implement RDPMC (0F 33) Gleb Natapov
2011-10-30 16:57 ` [PATCH 0/9] KVM in-guest performance monitoring Gleb Natapov
-- strict thread matches above, loose matches on Subject: below --
2011-11-03 12:31 Gleb Natapov
2011-11-03 12:31 ` [PATCH 2/9] KVM: Expose a version 2 architectural PMU to a guests Gleb Natapov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4EAFCE36.4070509@redhat.com \
--to=avi@redhat.com \
--cc=a.p.zijlstra@chello.nl \
--cc=acme@ghostprotocols.net \
--cc=gleb@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=mingo@elte.hu \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.