Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1246309rdh; Fri, 24 Nov 2023 08:08:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IGr65JKopNp4PenRDVHFDL6WH4eszurSP1Q6eMsOjMpiy5441OvK87SCFd/CQutdjw+THkD X-Received: by 2002:a17:903:2352:b0:1cf:6ce6:5f22 with SMTP id c18-20020a170903235200b001cf6ce65f22mr3814059plh.60.1700842129354; Fri, 24 Nov 2023 08:08:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700842129; cv=none; d=google.com; s=arc-20160816; b=e1ChdAClV0kdn0ZTS/IVfo4G/sG3QVPDLGh7Hgf6gbdYrRIN40G+yoQMhAVNVc7tKj a0PWvmVmjyq8oYkNxJ7gnpWk1aFQyJacdXCF9KVI35lCoj1j6Vw23B8oEWjt3Tpbvby7 Txy4zeVd8hfUTbgwAePck4hfd8kuD33tTv0FSoz2Z8sxCaPkV8IgXjtVGcvy13cqApnw 6HWr9FFRvd4RDJCPrlMPDGr9WC2H4Ye1AjlDzisyAwonp8onjKUuD4IWKyf/EJiXEHtj 1+sv3jrkfKUlZ8/AHSd2YAUZX3w8iqoOY5a10KeO9JQtB4RHUu2nkE4ftwP4V4Dr9Of5 EQSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:autocrypt :from:references:cc:to:content-language:subject:user-agent :mime-version:date:message-id:dkim-signature; bh=cmsrkiY67tdSL4I4FDP974bqK0BocuUfUMFhGGwoOH0=; fh=PqoU14V30GXCTmNIl+FxKg4TPPapoNUXWPgHOTY2mmE=; b=j3fZcmMwS0PfmI9GyD1b8xhDVWw9rjg0dv7MxTh3CZqrbVOO2cnNtkkF/UviUtRNoZ g7KWB3YacmQRF8Rw8Eh+sHgGJRzSZGbjgnIkSuFMV4dJNO+ecNay7lZji8m0KBb8hXI4 K8bk+ePJNjhSu/XaCQC6jVxrRxO8D7wG/JSmiQ8xhXN3knimn1+UN7V1YMW+Y/5ABGy4 aokcO+lJnPgSJk4LRpenP+n2Z9b0e6g8+zdaDP07lfe/0OGSr4fJDrXvv89lPkAj7MxP oCIWqRIjzNXP5jTQXmYsL5zQa3M13TPNuBbd/NY8Ekw4Z45i1ouxU0q9YpFI0jSiwqqB QrKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zz534stY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id n12-20020a170903110c00b001cc5cbf50dbsi3759756plh.493.2023.11.24.08.08.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 08:08:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zz534stY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 4384180C5C9E; Fri, 24 Nov 2023 08:08:46 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230160AbjKXQI2 (ORCPT + 99 others); Fri, 24 Nov 2023 11:08:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38684 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229659AbjKXQI1 (ORCPT ); Fri, 24 Nov 2023 11:08:27 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 58CC2D53 for ; Fri, 24 Nov 2023 08:08:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1700842112; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=cmsrkiY67tdSL4I4FDP974bqK0BocuUfUMFhGGwoOH0=; b=Zz534stYnlfhPYKGEf+Y0/zYMe3Ontdri2HIRSVDGhjfXXBDK2NashIiEty7dT1eRoo3wW CwqZNaGNQiW69tpM0dClD52hNK0twltr+mvhcgFOGmvxdaPzhlNeBRoEaa3VH0Viz/koBU +XeTriLFwRbr3hw2I5UJ1PbE17PuO9k= Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-425-oChJ37fHM9aGEcSC8BpIVQ-1; Fri, 24 Nov 2023 11:08:31 -0500 X-MC-Unique: oChJ37fHM9aGEcSC8BpIVQ-1 Received: by mail-qv1-f72.google.com with SMTP id 6a1803df08f44-67a16ff92abso8727946d6.3 for ; Fri, 24 Nov 2023 08:08:31 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700842110; x=1701446910; h=content-transfer-encoding:in-reply-to:autocrypt:from:references:cc :to:content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=cmsrkiY67tdSL4I4FDP974bqK0BocuUfUMFhGGwoOH0=; b=qn6hTiXX3WejaD4gUPb8Plvw8Po+cAfyKaMHVfk74qrJzxiKkln88oWb8UMrp1dW0w qbKPcFCkjmt1LwkOk3qHqkH1HWjIOP8em88R54vLP9y19RrUb5nLZq+WKZlm4r0cLTlW sYv8axxDMeBMnSIlbMcSs6pJsvdEAEp4FeJdY1QY1ia7dzRbtSX/QCjBJuTN+te8Y5zv h7G2xb31kFrAIAIEJFH9CjAbnQW7UspDz020FYoyFJsZnWkZYt+uzB1vDNahMD44O5kP 5zm8IPmABcsq4DeBZnZ56vUGLJ/iIXCiyQzzKfxth4MngVuHqheb2vxoTqcvluwO26GG Tkbg== X-Gm-Message-State: AOJu0YyeYMcyTzc3ARIVkrIq9KoMnQZOLmR8JeCfhAK92FjCZ27v0HdB UeVopidxtwUGPGFQByZq5rr6jYA5W6l1SL00sZCT5EKx3rky1rGaMqLANQWXpAvkbGhA54rzpNL RK7TYPlFQ0kQG3/AYvHK3RVnw X-Received: by 2002:a0c:efc8:0:b0:66f:bc3f:bd7 with SMTP id a8-20020a0cefc8000000b0066fbc3f0bd7mr3703820qvt.27.1700842110519; Fri, 24 Nov 2023 08:08:30 -0800 (PST) X-Received: by 2002:a0c:efc8:0:b0:66f:bc3f:bd7 with SMTP id a8-20020a0cefc8000000b0066fbc3f0bd7mr3703805qvt.27.1700842110328; Fri, 24 Nov 2023 08:08:30 -0800 (PST) Received: from [10.32.181.74] (nat-pool-mxp-t.redhat.com. [149.6.153.186]) by smtp.googlemail.com with ESMTPSA id p15-20020ad451cf000000b0067a1cf7737bsm333015qvq.130.2023.11.24.08.08.27 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 24 Nov 2023 08:08:29 -0800 (PST) Message-ID: Date: Fri, 24 Nov 2023 17:08:27 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 2/4] KVM: x86: add more information to the kvm_entry tracepoint Content-Language: en-US To: Maxim Levitsky , kvm@vger.kernel.org Cc: Thomas Gleixner , "H. Peter Anvin" , Sean Christopherson , Ingo Molnar , Borislav Petkov , linux-kernel@vger.kernel.org, x86@kernel.org, Dave Hansen References: <20230928103640.78453-1-mlevitsk@redhat.com> <20230928103640.78453-3-mlevitsk@redhat.com> From: Paolo Bonzini Autocrypt: addr=pbonzini@redhat.com; keydata= xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2 CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04 hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0 VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9 AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0 JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w= In-Reply-To: <20230928103640.78453-3-mlevitsk@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 24 Nov 2023 08:08:46 -0800 (PST) On 9/28/23 12:36, Maxim Levitsky wrote: > Add VMX/SVM specific interrupt injection info to vm entry tracepoint. > Also add a flag showing that immediate vm exit is set to happen after > the entry. > > Signed-off-by: Maxim Levitsky > --- > arch/x86/include/asm/kvm-x86-ops.h | 1 + > arch/x86/include/asm/kvm_host.h | 5 ++++- > arch/x86/kvm/svm/svm.c | 17 +++++++++++++++++ > arch/x86/kvm/trace.h | 15 +++++++++++++-- > arch/x86/kvm/vmx/vmx.c | 12 ++++++++++++ > 5 files changed, 47 insertions(+), 3 deletions(-) > > diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h > index f654a7f4cc8c0c..346fed6e3c33aa 100644 > --- a/arch/x86/include/asm/kvm-x86-ops.h > +++ b/arch/x86/include/asm/kvm-x86-ops.h > @@ -99,6 +99,7 @@ KVM_X86_OP(get_l2_tsc_multiplier) > KVM_X86_OP(write_tsc_offset) > KVM_X86_OP(write_tsc_multiplier) > KVM_X86_OP(get_exit_info) > +KVM_X86_OP(get_entry_info) > KVM_X86_OP(check_intercept) > KVM_X86_OP(handle_exit_irqoff) > KVM_X86_OP(sched_in) > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index 383a1d0cc0743b..321721813474f7 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -1679,13 +1679,16 @@ struct kvm_x86_ops { > void (*write_tsc_multiplier)(struct kvm_vcpu *vcpu); > > /* > - * Retrieve somewhat arbitrary exit information. Intended to > + * Retrieve somewhat arbitrary exit/entry information. Intended to > * be used only from within tracepoints or error paths. > */ > void (*get_exit_info)(struct kvm_vcpu *vcpu, u32 *reason, > u64 *info1, u64 *info2, > u32 *exit_int_info, u32 *exit_int_info_err_code); > > + void (*get_entry_info)(struct kvm_vcpu *vcpu, > + u32 *inj_info, u32 *inj_info_error_code); > + > int (*check_intercept)(struct kvm_vcpu *vcpu, > struct x86_instruction_info *info, > enum x86_intercept_stage stage, > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > index 60b130b7f9d510..cd65c04be3d0e2 100644 > --- a/arch/x86/kvm/svm/svm.c > +++ b/arch/x86/kvm/svm/svm.c > @@ -3504,6 +3504,22 @@ static void svm_get_exit_info(struct kvm_vcpu *vcpu, u32 *reason, > *error_code = 0; > } > > +static void svm_get_entry_info(struct kvm_vcpu *vcpu, > + u32 *inj_info, > + u32 *inj_info_error_code) > +{ > + struct vmcb_control_area *control = &to_svm(vcpu)->vmcb->control; > + > + *inj_info = control->event_inj; > + > + if ((*inj_info & SVM_EXITINTINFO_VALID) && > + (*inj_info & SVM_EXITINTINFO_VALID_ERR)) > + *inj_info_error_code = control->event_inj_err; > + else > + *inj_info_error_code = 0; > + > +} > + > static int svm_handle_exit(struct kvm_vcpu *vcpu, fastpath_t exit_fastpath) > { > struct vcpu_svm *svm = to_svm(vcpu); > @@ -4992,6 +5008,7 @@ static struct kvm_x86_ops svm_x86_ops __initdata = { > .required_apicv_inhibits = AVIC_REQUIRED_APICV_INHIBITS, > > .get_exit_info = svm_get_exit_info, > + .get_entry_info = svm_get_entry_info, > > .vcpu_after_set_cpuid = svm_vcpu_after_set_cpuid, > > diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h > index 83843379813ee3..28e8a63368cc02 100644 > --- a/arch/x86/kvm/trace.h > +++ b/arch/x86/kvm/trace.h > @@ -21,14 +21,25 @@ TRACE_EVENT(kvm_entry, > TP_STRUCT__entry( > __field( unsigned int, vcpu_id ) > __field( unsigned long, rip ) > - ), > + __field( u32, inj_info ) > + __field( u32, inj_info_err ) > + __field( bool, req_imm_exit ) > + ), > > TP_fast_assign( > __entry->vcpu_id = vcpu->vcpu_id; > __entry->rip = kvm_rip_read(vcpu); > + __entry->req_imm_exit = vcpu->arch.req_immediate_exit; > + > + static_call(kvm_x86_get_entry_info)(vcpu, > + &__entry->inj_info, > + &__entry->inj_info_err); > ), > > - TP_printk("vcpu %u, rip 0x%lx", __entry->vcpu_id, __entry->rip) > + TP_printk("vcpu %u, rip 0x%lx inj 0x%08x inj_error_code 0x%08x%s", > + __entry->vcpu_id, __entry->rip, > + __entry->inj_info, __entry->inj_info_err, > + __entry->req_imm_exit ? " [req_imm_exit]" : "") > ); > > /* > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index eb7e42235e8811..9dd13f52d4999c 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -6156,6 +6156,17 @@ static void vmx_get_exit_info(struct kvm_vcpu *vcpu, u32 *reason, > } > } > > +static void vmx_get_entry_info(struct kvm_vcpu *vcpu, > + u32 *inj_info, > + u32 *inj_info_error_code) > +{ > + *inj_info = vmcs_read32(VM_ENTRY_INTR_INFO_FIELD); > + if (is_exception_with_error_code(*inj_info)) > + *inj_info_error_code = vmcs_read32(VM_ENTRY_EXCEPTION_ERROR_CODE); > + else > + *inj_info_error_code = 0; > +} > + > static void vmx_destroy_pml_buffer(struct vcpu_vmx *vmx) > { > if (vmx->pml_pg) { > @@ -8297,6 +8308,7 @@ static struct kvm_x86_ops vmx_x86_ops __initdata = { > .get_mt_mask = vmx_get_mt_mask, > > .get_exit_info = vmx_get_exit_info, > + .get_entry_info = vmx_get_entry_info, > > .vcpu_after_set_cpuid = vmx_vcpu_after_set_cpuid, > Reviewed-by: Paolo Bonzini