Hi folks, On Tue, Aug 02, 2022 at 10:49:07AM +0100, Alexandru Elisei wrote: > > > > A funkier approach might be to defer pinning of the buffer until the SPE is > > > > enabled and avoid pinning all of VM memory that way, although I can't > > > > immediately tell how flexible the architecture is in allowing you to cache > > > > the base/limit values. > > > > > > I was investigating this approach, and Mark raised a concern that I think > > > might be a showstopper. > > > > > > Let's consider this scenario: > > > > > > Initial conditions: guest at EL1, profiling disabled (PMBLIMITR_EL1.E = 0, > > > PMBSR_EL1.S = 0, PMSCR_EL1.{E0SPE,E1SPE} = {0,0}). > > > > > > 1. Guest programs the buffer and enables it (PMBLIMITR_EL1.E = 1). > > > 2. Guest programs SPE to enable profiling at **EL0** > > > (PMSCR_EL1.{E0SPE,E1SPE} = {1,0}). > > > 3. Guest changes the translation table entries for the buffer. The > > > architecture allows this. > > > > The architecture also allows MMIO accesses to use writeback addressing > > modes, but it doesn't provide a mechanism to virtualise them sensibly. > > > > So I'd prefer that we don't pin all of guest memory just to satisfy a corner > > case -- as long as the impact of a guest doing this funny sequence is > > constrained to the guest, then I think pinning only what is required is > > probably the most pragmatic approach. > > > > Is it ideal? No, of course not, and we should probably try to get the debug > > architecture extended to be properly virtualisable, but in the meantime > > having major operating systems as guests and being able to use SPE without > > pinning seems like a major design goal to me. > > > > In any case, that's just my thinking on this and I defer to Oliver and > > Marc on the ultimate decision. Thanks for chiming in Will, very much agree that pragmatism is likely the best route forward. While fun to poke at all the pitfalls of virtualizing SPE, pulling tricks in KVM probably has marginal return over a simpler approach. > Thank you for the input. > > To summarize the approaches we've discussed so far: > > 1. Pinning the entire guest memory > - Heavy handed and not ideal. > - Tried this approach in v5 of the SPE series [1], patches #2-#12. > > 2. Mapping the guest SPE buffer on demand, page by page, as a result of stage 2 > faults reported by SPE. > - Not feasible, because the entire contents of the buffer must be discarded is > PMBSR_EL1.DL is set to 1 when taking the fault. > - Requires KVM to walk the guest's stage 1 tables, because SPE reports the VA, > not the IPA. > > 3. Pinning the guest SPE buffer when profiling becomes enabled*: > - There is the corner case described above, when profiling becomes enabled as a > result of an ERET to EL0. This can happen when the buffer is enabled and > PMSCR_EL1.{E0SPE,E1SPE} = {1,0}; > - The previous buffer is unpinned when a new buffer is pinned, to avoid SPE > stage 2 faults when draining the buffer, which is performed with profiling > disabled. > - Also requires KVM to walk the guest's stage 1 tables. > > 4. Pin the entire guest SPE buffer after the first stage 2 fault reported by > SPE. > - Gets rid of the corner case at 3. > - Same approach to buffer unpinning as 3. > - Introduces a blackout window before the first record is written. > - Also requires KVM to walk the guest's stage 1 tables. > > As for the corner case at 3, I proposed either: > > a) Mandate that guest operating systems must never modify the buffer > translation entries if the buffer is enabled and > PMSCR_EL1.{E0SPE,E1SPE} = {1,0}. > > b) Pin the entire buffer as a result of the first stage 2 fault reported by SPE, > but **only** for this corner case. For all other cases, the buffer is pinned > when profiling becomes enabled, to eliminate the blackout window. Guest > operating systems can be modified to not change the translation entries for the > buffer if this blackout window is not desirable. > > Pinning as a result of the **first** stage 2 fault should work, because there > are no prior records that would have to be discarded if PMSBR_EL1.DL = 1. > > I hope I haven't missed anything. Thoughts and suggestions more than welcome. Thanks Alex for pulling together all of the context here. Unless there's any other strong opinions on the topic, it seems to me that option #4 (pin on S2 fault) is probably the best approach for the initial implementation. No amount of tricks in KVM can work around the fact that SPE has some serious issues w.r.t. virtualization. With that, we should probably document the behavior of SPE as a known erratum of KVM. If folks complain about EL1 profile blackout, eagerly pinning when profiling is enabled could layer on top quite easily by treating it as a synthetic S2 fault and triggering the implementation of #4. Having said that I don't believe it is a hard requirement for enabling some flavor of SPE for guests. Walking guest S1 in KVM doesn't sound too exciting although it'll need to be done eventually. Do you feel like this is an OK route forward, or have I missed something? -- Thanks, Oliver _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm