Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp302703imn; Fri, 29 Jul 2022 07:21:03 -0700 (PDT) X-Google-Smtp-Source: AA6agR52OvdwlCyC+oX3Pdz2jlRiFwPcVxdi4WxIsWwPIpkmqlnMHm8iCs4bvD5DYgipvd3ZXfrE X-Received: by 2002:a17:902:9698:b0:16d:b36e:6e3f with SMTP id n24-20020a170902969800b0016db36e6e3fmr4122951plp.80.1659104462818; Fri, 29 Jul 2022 07:21:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659104462; cv=none; d=google.com; s=arc-20160816; b=gspJpt4G3Xa3aBrxteGaUd8gH5AmpWCc0yvPsywpGyYgrBz4gmOctmJs4W7tooHiRl VUHDz1YQAdXYD6a4ZYhvyFllmjZAYIwmwItV2LStKdfXWaJtoqXYe9V3Snx7G+/KKvcV JhUrdMdIIs0npLU55BlWfe4nv+hAg5hP/7i5PpQhkwiYdhTLfbtL9Vs9E8AAGMRk4SLZ FOeebRy33kiD7hEYWOlKX9OsU9lEhnPFGdAtG3sFH9kRi8orm1VVz8OU27HioDXJrIW/ Ot3+WbgzWAH0aiSZZxNBBhMWGVGm7ktWkfe/X3dG2hEg3n1ovXLDUUkuiXT/tylbFQnA nNAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=g4LT+6Vc6EAW7pOz6CH6o1bZ0MDiGNCAo1jgsVCoQag=; b=GklVpqWKjEhy7ergkcXBD5Wrw1oiVmzGa5mK+hgc/SiVPFOmXMqaS0Qq/26d0qdJi4 k/DBGZzjFbBlYs3y/7s8+hKxQTTZV4CCg4oSD11iMLFVheGW5FSTqD7PyTLEur6Ka8t3 MRuqvRg0KdtjI35Oym47BI+MOvlCj7JAHD8vDxuph15mWkfxHZLvmQeoufPbhFd5u9xc RfdI83oPYw5KkovDCMdVd7e79BPtR74M9qkB3Tf/tnU19HNR4rIFjcezXSw7uuTcKkhV 37bN2cPvajHF7FR5StTERczXIsLeN03zdB76E+RwPpU+y1672bhBvgVEQaErZeceGU27 /A7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=hmsmQLan; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w23-20020a627b17000000b0052534e6f7a8si3775576pfc.34.2022.07.29.07.20.46; Fri, 29 Jul 2022 07:21:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=hmsmQLan; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235869AbiG2NxV (ORCPT + 99 others); Fri, 29 Jul 2022 09:53:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39022 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236196AbiG2NxS (ORCPT ); Fri, 29 Jul 2022 09:53:18 -0400 Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B3C893B962 for ; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) Received: by mail-pl1-x62f.google.com with SMTP id iw1so4673685plb.6 for ; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc; bh=g4LT+6Vc6EAW7pOz6CH6o1bZ0MDiGNCAo1jgsVCoQag=; b=hmsmQLanMwnWzEgOVGlslRv1ShxsFCWhqRUllHlVRCXoJvohWgLtMX3mpxz5w1QAo5 ojwpxTMrkr07++O/fg1cuHuCk1DTLX/980o0jnaaI45We6DdCyxajzhKUnk6eS9EPuo2 dnf03PVazcRno8nVhB4adrUZGiGCGD75l3+FHAy/HzMVIzRv1Q7IQeBWQj06UXwNGXIZ MJClL/qy7kbIEVvmKjv/dblqvt+ITCVl61rbucdmybcyiD+CDdRKJJY/dGIuKDsiUSVZ HfNaVdJKO+jXoO+tHLasEqoHYwTjm5dxrKAbRC4cvJSzNKPJ8cn1zGqGHr12EUnI0vbC l9gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc; bh=g4LT+6Vc6EAW7pOz6CH6o1bZ0MDiGNCAo1jgsVCoQag=; b=mEdbsjR5Cu8TECsrI6tELtg22+qOqqkBzRRe/aFY+mEjSEGN6jpJf1SxMWVTBnGwhx Jd5QLyiF5ialZ3Swbiz+zcyZb+Ldr7Pkg57tLFuv/Nh0w6LO9YTzGrz2gUvwL4J+SMXT clr+mYR+1/atv50qSUUIbY7j1iQP2D7mb0K5DSKJKWXxyL5hL6AtJ+HMCgvWAihUPHWS y6IYiyB3PwzV9gHGtlpHQcd2/Pr7RiEt1pWzy5clf4hcey80AWo89cS1siUgnChyVoIs HNDXW1OJvOcu0GYZfrPWinQJUwWg+idMQFWlLpzsW7DjNMi/HKfX964d7DZD++gBX5e3 HKLw== X-Gm-Message-State: ACgBeo0YGcZ0IsDOZaLgWw+7xYNor7Qx13KMLY1rBuqH/Bz9lAyc9/7S TVORg902rxEc/D8KNBdo8CDanQ== X-Received: by 2002:a17:903:40ce:b0:16e:c71b:8b0e with SMTP id t14-20020a17090340ce00b0016ec71b8b0emr228498pld.154.1659102794078; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id u1-20020a170902e5c100b001618b70dcc9sm3684540plf.101.2022.07.29.06.53.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Jul 2022 06:53:13 -0700 (PDT) Date: Fri, 29 Jul 2022 13:53:09 +0000 From: Sean Christopherson To: "Shukla, Santosh" Cc: Paolo Bonzini , Vitaly Kuznetsov , Jim Mattson , Joerg Roedel , Maxim Levitsky , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCHv2 5/7] KVM: SVM: Add VNMI support in inject_nmi Message-ID: References: <20220709134230.2397-1-santosh.shukla@amd.com> <20220709134230.2397-6-santosh.shukla@amd.com> <23b43ea0-0a92-e132-ada3-ebe86dbaf673@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <23b43ea0-0a92-e132-ada3-ebe86dbaf673@amd.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 29, 2022, Shukla, Santosh wrote: > Hi Sean, > > On 7/21/2022 3:11 AM, Sean Christopherson wrote: > > On Sat, Jul 09, 2022, Santosh Shukla wrote: > >> + ++vcpu->stat.nmi_injections; > >> + if (is_vnmi_enabled(svm)) { > >> + vmcb = get_vnmi_vmcb(svm); > >> + WARN_ON(vmcb->control.int_ctl & V_NMI_PENDING); > > > > Haven't read the spec, but based on the changelog I assume the flag doesn't get > > cleared until the NMI is fully delivered. That means this WARN will fire if a > > VM-Exit occurs during delivery as KVM will re-inject the event, e.g. if KVM is > > using shadow paging and a #PF handle by KVM occurs during delivery. > > > > Right,. > > > For the above scenario i.e.. if VMEXIT happens during delivery of virtual NMI > then EXITINTINFO will be set accordingly and V_NMI_MASK is saved as 0. > hypervisor will re-inject event in next VMRUN. > > I just wanted to track above scenario,. I will replace it with pr_debug(). No, this is normal (albeit uncommon) behavior, don't print anything. Even if it weren't normal behavior, pr_debug() is usually the wrong choice in KVM.