Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp1865907lql; Wed, 13 Mar 2024 10:10:50 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUHJrdMxq3ZCop08jYWCVrM0gLlNJEPAy78NNVPDTkfO9TBjq4uQjuOM7Qsr9cP3mSP5ra2sVRJmxSNB4AJ6ZYiMuhLzk2kuxsRRXu90w== X-Google-Smtp-Source: AGHT+IHhitIw8JeeZZ0YiEzJ2u+hI1ICMpocSatTy7jHWWCuDARC225QphpZ0k8+37f/VbKupM+g X-Received: by 2002:a17:903:32c3:b0:1db:c390:1fdc with SMTP id i3-20020a17090332c300b001dbc3901fdcmr15894507plr.1.1710349850018; Wed, 13 Mar 2024 10:10:50 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710349850; cv=pass; d=google.com; s=arc-20160816; b=YuvIqP1FbuR4YAS+0VY4tn8lGK4BmgvsZiJnMDf3xGvpYas00RzP7xpptfHt/lwsPQ thqpeYTBnCyGiwKb8TigukVpQAp42IXvlInjbJX7ZZnIx/I6P3E4ChXkZAy0J+iBue+w xCucFbov2JoCggij8GCdb5lvw+EFcnvBypOc/vum4Za2DgnthSioZh2dEJPIDSLbrfQ7 4mb2zSmpkGtObSenTWyQCVr/MHgOOf+9RaBUj80RHG6ovw2HhgRYvuzrt8YzS7rDmTjU faQvXotLKQEw2/R3Jbht0c8hNBxUiFp5jtoHacIjuVyXgzB+aYxUz3XJ8AuOQNxOxXlg 7MNw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=OglK/O5rDO1m3imiI8xtKTfBvERGySLCuBAd4pL7YPc=; fh=g78TLxI1T+wFKAETjXXzHdA8/G9qVVj36bZ/kcTL53g=; b=g6yUWDXOM8s0+UuomJjuLpGrBI5gGSLgcChWQKp8pbn43uIN2BMXM1EjWygOs+YhtJ m1CT7/Z7QSNmZMjfB9tsC/dAdNmCTim/TTo/IhsTnjR/9Y8IcQJjQQhlfPF2c77rQ7zq ey2NdEcSHK5Nn56wa/K2uzbE1Xq/JdSkjvxfMFwLlWW3vTuorHmsvqr6CHGBk4J2ZLUR bypwK75boIwxzz4CBU+owDuHAFQCVyzDYYRM20Mb5kR/TlZlBT6Lcw6wrQagsz6vgjwX pralqaeMCEVKUOMi7weI5NnZySmIYdDrTrsaPIvOdXGBUgVbeGLXbrba/bF1vvzF7C/s xitw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WSLFtJBO; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-101854-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-101854-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id l18-20020a170903121200b001dd61bc8422si9739186plh.254.2024.03.13.10.10.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Mar 2024 10:10:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-101854-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WSLFtJBO; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-101854-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-101854-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 618FFB23655 for ; Wed, 13 Mar 2024 17:00:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4883974E25; Wed, 13 Mar 2024 16:38:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="WSLFtJBO" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3CCB374C1A; Wed, 13 Mar 2024 16:38:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710347891; cv=none; b=dgi3ixWnzutEhQbtgiAqkwWwObdgOc8iiDPWuVEZpOMLlhOoOE40CMG107tjXlZo3Q7o/mgwrfFlrSXG9Klo2MWjW45lf+WzdGFlL0Q6UJ3yHw3U4kbZ5kap+6hvDhPPx8/SWRNHa9LzHUk5LaT597LkuPQ7YeH53MrcpVQGorw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710347891; c=relaxed/simple; bh=eWt5CNSeCkrIAqjqsbX95+C1lHWJJl9703dTTPGx8Xs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=PKveaApFaWkJTdoGuIRzkMrj0pTgl2UpyIifRDAaeDCIOe6m5cvQ1Ottr+k5jy2/U5VqtHMrCCTkKiYfaAEB/j9h7Lw1XlES6Q+Q2f4iJuYQjgwbOMzxA1TneDIU6vMUo8uLszp2OddHk3J4EjhWdUCT12Wfd6IdXkcYekZOScg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=WSLFtJBO; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id D5196C433C7; Wed, 13 Mar 2024 16:38:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1710347890; bh=eWt5CNSeCkrIAqjqsbX95+C1lHWJJl9703dTTPGx8Xs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WSLFtJBO343yTA9lrokyWjMnlrwlyfogdwRTiOJlkY4GXIRa/latFg0OtxcVxp2RA rfJGjk558TQlKhPistq4x2kc9o4xHneJufacla89wJsB6+A74PHUcPv2q847aYEJEF +l83YBGZcqVZkvouRV6Y1NllQ+1Hi7ddpfGdppJ74H9lRFn+69KhxHirpwD/sLAVXR KRyoiWT31W1MgmB2O2UubUBTveyGER0nX55E234DOKcrzERXKkey2HUoITY5KdUmxo JlKDWXIMQ+Nhy7Fnz37qHSvsA7zSU6hQDqftxxJgQRnA0tDfXxgEEmS33MGmIGpWQo x3hxO2tL1EhSQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Nico Boehr , David Hildenbrand , Claudio Imbrenda , Janosch Frank , Sasha Levin Subject: [PATCH 6.6 51/60] KVM: s390: add stat counter for shadow gmap events Date: Wed, 13 Mar 2024 12:36:58 -0400 Message-ID: <20240313163707.615000-52-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240313163707.615000-1-sashal@kernel.org> References: <20240313163707.615000-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.6.22-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-6.6.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 6.6.22-rc1 X-KernelTest-Deadline: 2024-03-15T16:36+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Nico Boehr [ Upstream commit c3235e2dd6956448a562d6b1112205eeebc8ab43 ] The shadow gmap tracks memory of nested guests (guest-3). In certain scenarios, the shadow gmap needs to be rebuilt, which is a costly operation since it involves a SIE exit into guest-1 for every entry in the respective shadow level. Add kvm stat counters when new shadow structures are created at various levels. Also add a counter gmap_shadow_create when a completely fresh shadow gmap is created as well as a counter gmap_shadow_reuse when an existing gmap is being reused. Note that when several levels are shadowed at once, counters on all affected levels will be increased. Also note that not all page table levels need to be present and a ASCE can directly point to e.g. a segment table. In this case, a new segment table will always be equivalent to a new shadow gmap and hence will be counted as gmap_shadow_create and not as gmap_shadow_segment. Signed-off-by: Nico Boehr Reviewed-by: David Hildenbrand Reviewed-by: Claudio Imbrenda Reviewed-by: Janosch Frank Signed-off-by: Janosch Frank Link: https://lore.kernel.org/r/20231009093304.2555344-2-nrb@linux.ibm.com Message-Id: <20231009093304.2555344-2-nrb@linux.ibm.com> Stable-dep-of: fe752331d4b3 ("KVM: s390: vsie: fix race during shadow creation") Signed-off-by: Sasha Levin --- arch/s390/include/asm/kvm_host.h | 7 +++++++ arch/s390/kvm/gaccess.c | 7 +++++++ arch/s390/kvm/kvm-s390.c | 9 ++++++++- arch/s390/kvm/vsie.c | 5 ++++- 4 files changed, 26 insertions(+), 2 deletions(-) diff --git a/arch/s390/include/asm/kvm_host.h b/arch/s390/include/asm/kvm_host.h index 427f9528a7b69..67a298b6cf6e9 100644 --- a/arch/s390/include/asm/kvm_host.h +++ b/arch/s390/include/asm/kvm_host.h @@ -777,6 +777,13 @@ struct kvm_vm_stat { u64 inject_service_signal; u64 inject_virtio; u64 aen_forward; + u64 gmap_shadow_create; + u64 gmap_shadow_reuse; + u64 gmap_shadow_r1_entry; + u64 gmap_shadow_r2_entry; + u64 gmap_shadow_r3_entry; + u64 gmap_shadow_sg_entry; + u64 gmap_shadow_pg_entry; }; struct kvm_arch_memory_slot { diff --git a/arch/s390/kvm/gaccess.c b/arch/s390/kvm/gaccess.c index 6d6bc19b37dcb..ff8349d17b331 100644 --- a/arch/s390/kvm/gaccess.c +++ b/arch/s390/kvm/gaccess.c @@ -1382,6 +1382,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, unsigned long *pgt, int *dat_protection, int *fake) { + struct kvm *kvm; struct gmap *parent; union asce asce; union vaddress vaddr; @@ -1390,6 +1391,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, *fake = 0; *dat_protection = 0; + kvm = sg->private; parent = sg->parent; vaddr.addr = saddr; asce.val = sg->orig_asce; @@ -1450,6 +1452,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, rc = gmap_shadow_r2t(sg, saddr, rfte.val, *fake); if (rc) return rc; + kvm->stat.gmap_shadow_r1_entry++; } fallthrough; case ASCE_TYPE_REGION2: { @@ -1478,6 +1481,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, rc = gmap_shadow_r3t(sg, saddr, rste.val, *fake); if (rc) return rc; + kvm->stat.gmap_shadow_r2_entry++; } fallthrough; case ASCE_TYPE_REGION3: { @@ -1515,6 +1519,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, rc = gmap_shadow_sgt(sg, saddr, rtte.val, *fake); if (rc) return rc; + kvm->stat.gmap_shadow_r3_entry++; } fallthrough; case ASCE_TYPE_SEGMENT: { @@ -1548,6 +1553,7 @@ static int kvm_s390_shadow_tables(struct gmap *sg, unsigned long saddr, rc = gmap_shadow_pgt(sg, saddr, ste.val, *fake); if (rc) return rc; + kvm->stat.gmap_shadow_sg_entry++; } } /* Return the parent address of the page table */ @@ -1618,6 +1624,7 @@ int kvm_s390_shadow_fault(struct kvm_vcpu *vcpu, struct gmap *sg, pte.p |= dat_protection; if (!rc) rc = gmap_shadow_page(sg, saddr, __pte(pte.val)); + vcpu->kvm->stat.gmap_shadow_pg_entry++; ipte_unlock(vcpu->kvm); mmap_read_unlock(sg->mm); return rc; diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index 49cce436444e0..1af55343a606b 100644 --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -66,7 +66,14 @@ const struct _kvm_stats_desc kvm_vm_stats_desc[] = { STATS_DESC_COUNTER(VM, inject_pfault_done), STATS_DESC_COUNTER(VM, inject_service_signal), STATS_DESC_COUNTER(VM, inject_virtio), - STATS_DESC_COUNTER(VM, aen_forward) + STATS_DESC_COUNTER(VM, aen_forward), + STATS_DESC_COUNTER(VM, gmap_shadow_reuse), + STATS_DESC_COUNTER(VM, gmap_shadow_create), + STATS_DESC_COUNTER(VM, gmap_shadow_r1_entry), + STATS_DESC_COUNTER(VM, gmap_shadow_r2_entry), + STATS_DESC_COUNTER(VM, gmap_shadow_r3_entry), + STATS_DESC_COUNTER(VM, gmap_shadow_sg_entry), + STATS_DESC_COUNTER(VM, gmap_shadow_pg_entry), }; const struct kvm_stats_header kvm_vm_stats_header = { diff --git a/arch/s390/kvm/vsie.c b/arch/s390/kvm/vsie.c index e55f489e1fb79..8207a892bbe22 100644 --- a/arch/s390/kvm/vsie.c +++ b/arch/s390/kvm/vsie.c @@ -1210,8 +1210,10 @@ static int acquire_gmap_shadow(struct kvm_vcpu *vcpu, * we're holding has been unshadowed. If the gmap is still valid, * we can safely reuse it. */ - if (vsie_page->gmap && gmap_shadow_valid(vsie_page->gmap, asce, edat)) + if (vsie_page->gmap && gmap_shadow_valid(vsie_page->gmap, asce, edat)) { + vcpu->kvm->stat.gmap_shadow_reuse++; return 0; + } /* release the old shadow - if any, and mark the prefix as unmapped */ release_gmap_shadow(vsie_page); @@ -1219,6 +1221,7 @@ static int acquire_gmap_shadow(struct kvm_vcpu *vcpu, if (IS_ERR(gmap)) return PTR_ERR(gmap); gmap->private = vcpu->kvm; + vcpu->kvm->stat.gmap_shadow_create++; WRITE_ONCE(vsie_page->gmap, gmap); return 0; } -- 2.43.0