Received: by 10.192.165.148 with SMTP id m20csp1726160imm; Thu, 3 May 2018 04:33:04 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpUpaDX/XPzeUEb5qJeszQXy2PlNdgm+cFj2BhnaClfToL977hYwhnj1l2ebtOZ8az8QgeH X-Received: by 10.98.150.92 with SMTP id c89mr22835556pfe.37.1525347184684; Thu, 03 May 2018 04:33:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525347184; cv=none; d=google.com; s=arc-20160816; b=eIPZe2C9YP7e+xMcHF9nqqsxm0kPbb6TjWOzkcDeCSmCIsiSq0HiVZ8tyimw33MxzW vDxiNWDhbMPEQXYyWCR9kX+Wk7zPZfdeORa7VGlzA8p7epungyTHZWkQFb2ZrBwlzlpZ L3kaq1dtmKsJgAPAFuz6Jq7nhy+NPA0BUbC4JB3ceVf3EORUH4lS+VxveXTy/OiBlKVZ CvezTbTUiVCsPHfqzZNgvf50f/VgrUzTr7X+tb2xVrOCEnVdLo0HTwj+775IYAxihfpC ixq8OIQoIdvH62LPl8lCFIr1LQ7xDGMNgNt0pPo8xOI9RMGqf6k3C5OAUH4c5b+zHUAL Vgxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=1q0TQsoPSJ22MC9dDKCKexwu2wOWVXqE61UL1HZu4GA=; b=jft6dNw6tC1QCYPMU2I6ox8+f/SXptvvqtleleqW7YTvoNaZuGnD8/nGHBqias4NDe CXapKzqOfhMEFNDRk7lF3tQRq5KI3EbdgHIRx/GtLSLWnBJq1FRpz6RkPS3+s2FA94IX y6yW8l8JvWB8Knd2eanXNIbObGQIZnRPVUnODu7CrpMJ/wEyzhgGaG5XDVfXmjxx9xcn II+VV0AaoCccb+O4s18n7qS55VG0LE0a7sQN/jBLZQwMZkvAeGbgj14FyJXpIIw6b/P6 gCd+L47Apfbn5cH56T3SjDtzMFTWRoypK2WlY7fSua+qmmBV0Y2Gz1I/dpnNZHi8MBPP SrtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h186-v6si11194517pge.324.2018.05.03.04.32.48; Thu, 03 May 2018 04:33:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751346AbeECLce (ORCPT + 99 others); Thu, 3 May 2018 07:32:34 -0400 Received: from mga17.intel.com ([192.55.52.151]:62460 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750947AbeECLca (ORCPT ); Thu, 3 May 2018 07:32:30 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 May 2018 04:32:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,358,1520924400"; d="scan'208";a="52874479" Received: from um.fi.intel.com (HELO um) ([10.237.72.212]) by orsmga001.jf.intel.com with ESMTP; 03 May 2018 04:32:26 -0700 Received: from ash by um with local (Exim 4.90_1) (envelope-from ) id 1fECTI-0006N9-Aj; Thu, 03 May 2018 14:32:24 +0300 Date: Thu, 3 May 2018 14:32:23 +0300 From: Alexander Shishkin To: Luwei Kang Cc: kvm@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, pbonzini@redhat.com, rkrcmar@redhat.com, linux-kernel@vger.kernel.org, joro@8bytes.org, peterz@infradead.org, chao.p.peng@linux.intel.com Subject: Re: [PATCH v7 06/13] KVM: x86: Add Intel Processor Trace virtualization mode Message-ID: <20180503113223.x2ykby6wglppgdwf@um.fi.intel.com> References: <1525349323-9938-1-git-send-email-luwei.kang@intel.com> <1525349323-9938-7-git-send-email-luwei.kang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1525349323-9938-7-git-send-email-luwei.kang@intel.com> User-Agent: NeoMutt/20171215 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 03, 2018 at 08:08:36PM +0800, Luwei Kang wrote: > From: Chao Peng > > Intel PT virtualization can be work in one of 3 possible modes: > a. system-wide: trace both host/guest and output to host buffer; > b. host-only: only trace host and output to host buffer; > c. host-guest: trace host/guest simultaneous and output to their > respective buffer. You also need to explain what this patch is doing, how and why. I think I figured it out from reading the rest of the patch, but it should really be mentioned in the description. > @@ -5,6 +5,12 @@ > #define PT_CPUID_LEAVES 2 > #define PT_CPUID_REGS_NUM 4 /* number of regsters (eax, ebx, ecx, edx) */ > > +enum pt_mode { > + PT_MODE_SYSTEM = 0, > + PT_MODE_HOST, > + PT_MODE_HOST_GUEST, > +}; > + > enum pt_capabilities { > PT_CAP_max_subleaf = 0, > PT_CAP_cr3_filtering, > @@ -187,6 +188,10 @@ > static unsigned int ple_window_max = KVM_VMX_DEFAULT_PLE_WINDOW_MAX; > module_param(ple_window_max, uint, 0444); > > +/* Default is SYSTEM mode. */ > +static int __read_mostly pt_mode = PT_MODE_SYSTEM; > +module_param(pt_mode, int, S_IRUGO); So, it's an explicit module parameter? One apparent problem with this is that one would need to reload kvm module(s) to be able to use PT, which is not ideal. > + > extern const ulong vmx_return; > > struct kvm_vmx { > @@ -1488,6 +1493,19 @@ static inline bool cpu_has_vmx_vmfunc(void) > SECONDARY_EXEC_ENABLE_VMFUNC; > } > > +static inline bool cpu_has_vmx_intel_pt(void) > +{ > + u64 vmx_msr; > + > + rdmsrl(MSR_IA32_VMX_MISC, vmx_msr); > + return vmx_msr & MSR_IA32_VMX_MISC_INTEL_PT; This is an implicit cast. return !!(...) would clarify your intention. Also, does it make sense to write an accessor to pt_pmu.vmx instead? > +} > + > +static inline bool cpu_has_vmx_pt_use_gpa(void) > +{ > + return vmcs_config.cpu_based_2nd_exec_ctrl & SECONDARY_EXEC_PT_USE_GPA; > +} I can deduce the meaning of the previous one, but not this one, and there's no explanation. > @@ -5780,6 +5810,28 @@ static u32 vmx_exec_control(struct vcpu_vmx *vmx) > return exec_control; > } > > +static u32 vmx_vmexit_control(struct vcpu_vmx *vmx) > +{ > + u32 vmexit_control = vmcs_config.vmexit_ctrl; > + > + if (pt_mode == PT_MODE_SYSTEM) > + vmexit_control &= ~(VM_EXIT_CLEAR_IA32_RTIT_CTL | > + VM_EXIT_PT_CONCEAL_PIP); Ok, so what we really want to know is: is there an encompassing PT event on this cpu when we go into VMLAUNCH/VMRESTORE, right? We can find this out from the pt_ctx and avoid the pt_mode entirely. IOW, instead of having the 3 modes that you describe at the top, you can use something like the following: 1. Do we have an event in pt_ctx? * No -> Set up the context for VMX. * Yes -> 2. Is attr.exclude_guest set? * No -> Guest trace goes to the host's buffer, do nothing. * Yes -> Set up/switch the context for VMX. Regards, -- Alex