[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 3/5] x86/perf: expose LBR format in PERF_CAPABILITIES


  • To: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Fri, 20 May 2022 16:19:19 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=D+k0QVKOVY2sbgCdWnc/pDspJiwA7gfRhAjH6WChs/A=; b=Tjq+vCEjEzX16VNC870sOiPeOQpdP1YA/wSiBds23QyPjdwPBGMBb94dmZA4gHdHkQhpRmGNQGpMgwZHsOOqqmXTmGi1j1tJ4bUbiIvgx3VUWMcZrJyFHgqh+uMdb+eXiie63zFzY/K2ryRCOlFRvSmxqDjnNmIMOWnRZURzBWdNK0l+F4Y++p2uqPP/o0v6MofLNjrRn55pn4AD5VVsi0xMxLuiCbC8iexxEf3buZM1Rg1y2mkZiz2o8KBhf+MW1LWq7NathEKooFQklXqKtW/rKywHwkMMySzKqnDjkRk9p046+2QVwJRVkAVA6LVJbhSA3wF3MBrzSbtMi/TCiQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Xm/mGdVYeMJ5KE1X5MJqlojXueiMNE+Vl0y4+x9WZv4q4fCmQI/oewFAARGItaTRZrYH6dxNS/pvq9hLAUgRoS3O8lRETjMK1gkQCERFHov+OsXiY322n8JeoH79HAGltjqplTNRd3wi3FKsnxMayirlY7ENqc6LSZso2DowjZpi1J5XNZyZXCxr6RrHjo/vw+N0h2+ToqkClRsuBAX1SAVtwyCpS7wVOS64XzEbKA+s0we3lz7IijrFzr7EHMWczFWFti35xeB7p3VY2XgOAwJXBT+5Vydc+MDpkn4o6WIr6sAtlRGONOlvKjoJ7m00t9o22VxGCzuQ0brwm5yiMA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Wei Liu <wl@xxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Fri, 20 May 2022 14:19:34 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 20.05.2022 16:10, Andrew Cooper wrote:
> On 20/05/2022 14:37, Roger Pau Monne wrote:
>> --- a/xen/include/public/arch-x86/cpufeatureset.h
>> +++ b/xen/include/public/arch-x86/cpufeatureset.h
>> @@ -135,7 +135,7 @@ XEN_CPUFEATURE(SSSE3,         1*32+ 9) /*A  Supplemental 
>> Streaming SIMD Extensio
>>  XEN_CPUFEATURE(FMA,           1*32+12) /*A  Fused Multiply Add */
>>  XEN_CPUFEATURE(CX16,          1*32+13) /*A  CMPXCHG16B */
>>  XEN_CPUFEATURE(XTPR,          1*32+14) /*   Send Task Priority Messages */
>> -XEN_CPUFEATURE(PDCM,          1*32+15) /*   Perf/Debug Capability MSR */
>> +XEN_CPUFEATURE(PDCM,          1*32+15) /*S  Perf/Debug Capability MSR */
> 
> This is the bit which requires more toolstack logic to safely enable. 
> Using 's' for off-by-default is fine if we want to get the series in now.
> 
> But before we expose the MSR generally, we need to:
> 
> 1) Put the configuration in msr_policy so the toolstack can reason about it
> 2) Reject migration attempts to destinations where the LBR format changes

Since this could be quite restrictive, and since people needing to know
they need to hide this feature for migration to work, I guess this would
further want qualifying by "did the guest actually use LBRs so far"?

Jan

> 3) Actually put the lBR registers in the migration stream
> 
> ~Andrew




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.