| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <53A6E0B9.10408@gmail.com> Date: Sun, 22 Jun 2014 16:57:13 +0300 From: Avi Kivity <avi.kivity@...il.com> To: Andi Kleen <andi@...stfloor.org>, peterz@...radead.org CC: gleb@...nel.org, pbonzini@...hat.com, eranian@...gle.com, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, Andi Kleen <ak@...ux.intel.com> Subject: Re: [PATCH 4/4] kvm: Implement PEBS virtualization On 05/30/2014 04:12 AM, Andi Kleen wrote: > From: Andi Kleen <ak@...ux.intel.com> > > PEBS (Precise Event Bases Sampling) profiling is very powerful, > allowing improved sampling precision and much additional information, > like address or TSX abort profiling. cycles:p and :pp uses PEBS. > > This patch enables PEBS profiling in KVM guests. > > PEBS writes profiling records to a virtual address in memory. Since > the guest controls the virtual address space the PEBS record > is directly delivered to the guest buffer. We set up the PEBS state > that is works correctly.The CPU cannot handle any kinds of faults during > these guest writes. > > To avoid any problems with guest pages being swapped by the host we > pin the pages when the PEBS buffer is setup, by intercepting > that MSR. > > Typically profilers only set up a single page, so pinning that is not > a big problem. The pinning is limited to 17 pages currently (64K+1) > > In theory the guest can change its own page tables after the PEBS > setup. The host has no way to track that with EPT. But if a guest > would do that it could only crash itself. It's not expected > that normal profilers do that. > > Talking a bit with Gleb about this, I think this is impossible. First, it's not sufficient to pin the debug store area, you also have to pin the guest page tables that are used to map the debug store. But even if you do that, as soon as the guest fork()s, it will create a new pgd which the host will be free to swap out. The processor can then attempt a PEBS store to an unmapped address which will fail, even though the guest is configured correctly. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists