Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1061497pxv; Fri, 16 Jul 2021 00:17:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZ9+mbRa9IOekRcjVsZBe0a8XN3XX4eRlRghf/gITiGSis+XdD9NJsBcIlL5eL66ZpZdXT X-Received: by 2002:a17:906:2c19:: with SMTP id e25mr10412057ejh.477.1626419872540; Fri, 16 Jul 2021 00:17:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626419872; cv=none; d=google.com; s=arc-20160816; b=WASVAMlFbaRN0Om8QCxb48ZUlq4bg6kYgA7YU1fenst1mMY9OeBFaET3I6YQkJrrXE oSt6FF2VGJC4OmfNZaw75q89ok5F71aOlWcOSZfL2dU8uEPNT3/N/QW/0xzttD1CbemM Ljp5YEO19ISHq0C/PpCK997jDmuLReEW8zceIi79n6BfjxhAsFSoYZckDEPCasR4VMLz whlkdNtXHpxC1xpSJGf9IPsTgNNYjmFqiRfEBlqbyzik2UIHc8iavDGMUIyIrMHVtRQU s7yXfCDGWpQMXtI280/CvOWD+JIrbom+DJIRlFdxDHpg6k9eBM0EtQ+no+TaR7y9Dm/L r3Mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=lllAjAyViASaQik+z0XFk8d8gKQAKm3xrZgAtofpIgw=; b=YxuVFQ70m2QaRaGmaJN06PIylgci0v+P9nFPJ8eLYG0ilvsJEj/7O/HAI9BeGV111u FoR1azOxBNQr4mwISq6m/NXsWCm5IGHKxDVqwU9a38fdmS0J4Sgr3RllrTijUgv08q1A YP6iR/4f0np/qnoKEiiURrM75KLtrRuWUyYG8FOcP92S6xvczjXdv104n8/uRd1pul9U EVcooXA2/4IkkWgU4HKNIfu4nX/7hptPUv8vGpqoymUTd63Om7IQjETqJh1do60k1Mj/ TwPrBwOk+NyQFJjwlGsK6aYJjCW+/P9G6OW4cnsITKspWIdEo9p1++NRfRXvpTRK0uSQ QQ2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b6si4151360edu.126.2021.07.16.00.17.30; Fri, 16 Jul 2021 00:17:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235866AbhGPHQi (ORCPT + 99 others); Fri, 16 Jul 2021 03:16:38 -0400 Received: from mga02.intel.com ([134.134.136.20]:23842 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235912AbhGPHQg (ORCPT ); Fri, 16 Jul 2021 03:16:36 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10046"; a="197873276" X-IronPort-AV: E=Sophos;i="5.84,244,1620716400"; d="scan'208";a="197873276" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2021 00:13:41 -0700 X-IronPort-AV: E=Sophos;i="5.84,244,1620716400"; d="scan'208";a="506375025" Received: from arthur-vostro-3668.sh.intel.com ([10.239.13.1]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2021 00:13:36 -0700 From: Zeng Guang To: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, Dave Hansen , Tony Luck , Kan Liang , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Kim Phillips , Jarkko Sakkinen , Jethro Beekman , Kai Huang Cc: x86@kernel.org, linux-kernel@vger.kernel.org, Robert Hu , Gao Chao , Zeng Guang , Robert Hoo Subject: [PATCH 4/6] KVM: VMX: dump_vmcs() reports tertiary_exec_control field as well Date: Fri, 16 Jul 2021 14:48:06 +0800 Message-Id: <20210716064808.14757-5-guang.zeng@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210716064808.14757-1-guang.zeng@intel.com> References: <20210716064808.14757-1-guang.zeng@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Robert Hoo Add tertiary_exec_control field report in dump_vmcs() Signed-off-by: Robert Hoo Signed-off-by: Zeng Guang --- arch/x86/kvm/vmx/vmx.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 728873971913..820fc131d258 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -5749,6 +5749,7 @@ void dump_vmcs(struct kvm_vcpu *vcpu) struct vcpu_vmx *vmx = to_vmx(vcpu); u32 vmentry_ctl, vmexit_ctl; u32 cpu_based_exec_ctrl, pin_based_exec_ctrl, secondary_exec_control; + u64 tertiary_exec_control = 0; unsigned long cr4; int efer_slot; @@ -5766,6 +5767,9 @@ void dump_vmcs(struct kvm_vcpu *vcpu) if (cpu_has_secondary_exec_ctrls()) secondary_exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL); + if (cpu_has_tertiary_exec_ctrls()) + tertiary_exec_control = vmcs_read64(TERTIARY_VM_EXEC_CONTROL); + pr_err("VMCS %p, last attempted VM-entry on CPU %d\n", vmx->loaded_vmcs->vmcs, vcpu->arch.last_vmentry_cpu); pr_err("*** Guest State ***\n"); @@ -5864,8 +5868,9 @@ void dump_vmcs(struct kvm_vcpu *vcpu) vmx_dump_msrs("host autoload", &vmx->msr_autoload.host); pr_err("*** Control State ***\n"); - pr_err("PinBased=%08x CPUBased=%08x SecondaryExec=%08x\n", - pin_based_exec_ctrl, cpu_based_exec_ctrl, secondary_exec_control); + pr_err("PinBased=0x%08x CPUBased=0x%08x SecondaryExec=0x%08x TertiaryExec=0x%016llx\n", + pin_based_exec_ctrl, cpu_based_exec_ctrl, secondary_exec_control, + tertiary_exec_control); pr_err("EntryControls=%08x ExitControls=%08x\n", vmentry_ctl, vmexit_ctl); pr_err("ExceptionBitmap=%08x PFECmask=%08x PFECmatch=%08x\n", vmcs_read32(EXCEPTION_BITMAP), -- 2.25.1