From patchwork Thu Sep 28 10:36:36 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Maxim Levitsky X-Patchwork-Id: 14672 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:cae8:0:b0:403:3b70:6f57 with SMTP id r8csp3489641vqu; Thu, 28 Sep 2023 10:47:00 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF9XqEzXp/A/pwddoBAkmAuWt+tWJt7iJnZJl22KYXngfaLP12w+Y+/u1ZenmOM0rFHaL/I X-Received: by 2002:a05:6a00:10c9:b0:690:c701:e0ed with SMTP id d9-20020a056a0010c900b00690c701e0edmr1849041pfu.0.1695923220432; Thu, 28 Sep 2023 10:47:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695923220; cv=none; d=google.com; s=arc-20160816; b=ALm2KvLcsbpPYNISv7pD2UZdJhrueo7fnn1+TcIlvy/xh/monbzYENTlhqxYf+6Dyk TM6Uz/dTXYaNZ9CEnyplgdYPR2NGaE37Z8Yk1oYmvN91wgselsRrM8JEgiupITg3FOik cfkJt8aA4R4mBS3pJbSd46wnEnALXZIcghakdz9pdlOx927wuMp2m665PXTWeMyfsjYD P56zlSniVdADdRSx5900D9du4BahRePNtLFmqaWhE4y888t+l1C7N3rVPuJ+s/P/M51P 4HAKyXL8jCfkTVFR/r8T9CYrQsWx0bBAdPI7DhtMmZzSnhP3VIuglxCcwo1KhejyF54q HF+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/M1XGsBjJpvK/GnlGAlPbx2DaQFA1wRSQ+/UPgks3eY=; fh=KbWefN6sg4WxAaYSOFhghLxZ0mosl7xBLFYLk+WwcxA=; b=u/Jm88IQcRy7XfInEasp0ir4TeCF8QDDvp10CoDPA7SJJGJR1Jhcmx67BrP2Q6DUiS bHSysyXss4OzzmjB9nD8BuSKHp+8IGcqXCyG88kO9i8f3KsWEeuZMFJi2aVar1DdMBi8 l4ShTIEsR7DCxA4lpNe6D3y1Nev2wyyCLj24F7RKAiv/UNBNhbwC4MUSny3LNxCIAFIr kKOjZMYqgn0rMIBLNnDUn04e8QS/Stmf5JXpeJ+SK6149FPu+uCgbo4KAhKQuB5vgDZc 2fPULCL3Plc+eyvn2Vqy8/Q56Q00K/J0GvcgpYPV38EDUglZtArpdniPrgrjFIpUHRTd hhOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fFOI2Yzg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id r200-20020a632bd1000000b00578afd89baasi18873778pgr.744.2023.09.28.10.47.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Sep 2023 10:47:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fFOI2Yzg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id C84A982DD0AB; Thu, 28 Sep 2023 03:37:48 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231294AbjI1Khg (ORCPT + 21 others); Thu, 28 Sep 2023 06:37:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40708 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230517AbjI1Khf (ORCPT ); Thu, 28 Sep 2023 06:37:35 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9BF5012A for ; Thu, 28 Sep 2023 03:36:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1695897407; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=/M1XGsBjJpvK/GnlGAlPbx2DaQFA1wRSQ+/UPgks3eY=; b=fFOI2Yzg91qQ1Un36Pd1EsBBXsDuUxGcbu9ckdsfU2abAwO0/Kia9dl4bNRRpKfGE2zdLN M8MT9GE4uyzoGm13NV8+c4Xau4M6BAbQPDJ7AxjSYZC5XxCatmM6AibwFsdxch377oXBQ3 0ZBl55AmUzEXv9TAXaWtK3/xqQ2kPGA= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-286-hcFT5IvcOmeAj929CVKO_g-1; Thu, 28 Sep 2023 06:36:44 -0400 X-MC-Unique: hcFT5IvcOmeAj929CVKO_g-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 13162802D38; Thu, 28 Sep 2023 10:36:44 +0000 (UTC) Received: from localhost.localdomain (unknown [10.45.226.141]) by smtp.corp.redhat.com (Postfix) with ESMTP id BA59F492B16; Thu, 28 Sep 2023 10:36:41 +0000 (UTC) From: Maxim Levitsky To: kvm@vger.kernel.org Cc: Thomas Gleixner , "H. Peter Anvin" , Sean Christopherson , Ingo Molnar , Paolo Bonzini , Borislav Petkov , linux-kernel@vger.kernel.org, x86@kernel.org, Dave Hansen , Maxim Levitsky Subject: [PATCH v3 0/4] KVM: x86: tracepoint updates Date: Thu, 28 Sep 2023 13:36:36 +0300 Message-Id: <20230928103640.78453-1-mlevitsk@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 28 Sep 2023 03:37:48 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778304386344908916 X-GMAIL-MSGID: 1778304386344908916 This patch series is intended to add some selected information to the kvm tracepoints to make it easier to gather insights about running nested guests. This patch series was developed together with a new x86 performance analysis tool that I developed recently (https://gitlab.com/maximlevitsky/kvmon) which aims to be a better kvm_stat, and allows you at glance to see what is happening in a VM, including nesting. Best regards, Maxim Levitsky Maxim Levitsky (4): KVM: x86: refactor req_immediate_exit logic KVM: x86: add more information to the kvm_entry tracepoint KVM: x86: add information about pending requests to kvm_exit tracepoint KVM: x86: add new nested vmexit tracepoints arch/x86/include/asm/kvm-x86-ops.h | 2 +- arch/x86/include/asm/kvm_host.h | 10 +-- arch/x86/kvm/svm/nested.c | 22 ++++++ arch/x86/kvm/svm/svm.c | 22 +++++- arch/x86/kvm/trace.h | 105 +++++++++++++++++++++++++++-- arch/x86/kvm/vmx/nested.c | 27 ++++++++ arch/x86/kvm/vmx/vmx.c | 30 +++++---- arch/x86/kvm/vmx/vmx.h | 2 - arch/x86/kvm/x86.c | 34 +++++----- 9 files changed, 208 insertions(+), 46 deletions(-) --- 2.26.3