lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CY5PR11MB6365676799EBF86B3931D336DC499@CY5PR11MB6365.namprd11.prod.outlook.com>
Date:   Thu, 15 Sep 2022 02:46:14 +0000
From:   "Wang, Wei W" <wei.w.wang@...el.com>
To:     "Liang, Kan" <kan.liang@...ux.intel.com>,
        "Li, Xiaoyao" <xiaoyao.li@...el.com>,
        Peter Zijlstra <peterz@...radead.org>,
        "Arnaldo Carvalho de Melo" <acme@...nel.org>,
        Mark Rutland <mark.rutland@....com>,
        Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
        Jiri Olsa <jolsa@...nel.org>,
        Namhyung Kim <namhyung@...nel.org>,
        "Christopherson,, Sean" <seanjc@...gle.com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        "Liang, Kan" <kan.liang@...el.com>,
        "Kleen, Andi" <andi.kleen@...el.com>
CC:     "linux-perf-users@...r.kernel.org" <linux-perf-users@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "kvm@...r.kernel.org" <kvm@...r.kernel.org>
Subject: RE: [RFC PATCH 0/2] KVM: VMX: Fix VM entry failure on
 PT_MODE_HOST_GUEST while host is using PT

On Thursday, September 15, 2022 4:26 AM, Liang, Kan wrote:
> The perf_event_disable() eventually invokes the intel_pt_stop().
> We already expose the intel_pt_stop()/cpu_emergency_stop_pt() to other
> modules. I don't think we have to use the perf_event_disable(). Also, the
> perf_event_disable() requires extra codes.
> 
> I went through the discussions. I agree with Sean's suggestion.
> We should only put the logic in the KVM but all the MSR access details into the PT
> driver. 

Even the driver itself doesn’t drive the save/restore of the MSRs, it is drived by perf.
1. If we make KVM a user of perf, we should do this via perf_event_disable/enable_*.
2. If we make KVM an alternative to perf (i.e. have direct control over PMU HW),
we can do this via driver interfaces like perf.
Per my experience, we should go for 1. Probably need Peter's opinions on this.

> But I prefer a more generic and straightforward function name, e.g.,
> intel_pt_stop_save()/intel_pt_start_load(), in case other modules may want to
> save/restore the PT information in their context switch later.
> 
> Thanks,
> Kan
> 
> >
> >> It seems perf_event_disable() is not used widely by other kernel
> >> component. 

Because there are not lots of kernel users.
You can check another user, watchdog_hld.c, perf_event_enable/disable are used there.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ