KVM: Add extra information in kvm_page_fault trace point
authorWonhyuk Yang <vvghjk1234@gmail.com>
Tue, 10 May 2022 07:10:00 +0000 (16:10 +0900)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 26 Sep 2022 16:02:30 +0000 (12:02 -0400)
Currently, kvm_page_fault trace point provide fault_address and error
code. However it is not enough to find which cpu and instruction
cause kvm_page_faults. So add vcpu id and instruction pointer in
kvm_page_fault trace point.

Cc: Baik Song An <bsahn@etri.re.kr>
Cc: Hong Yeon Kim <kimhy@etri.re.kr>
Cc: Taeung Song <taeung@reallinux.co.kr>
Cc: linuxgeek@linuxgeek.io
Signed-off-by: Wonhyuk Yang <vvghjk1234@gmail.com>
Link: https://lore.kernel.org/r/20220510071001.87169-1-vvghjk1234@gmail.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/mmu/mmu.c
arch/x86/kvm/svm/svm.c
arch/x86/kvm/trace.h
arch/x86/kvm/vmx/vmx.c

index 32b60a6..40feb5e 100644 (file)
@@ -4302,7 +4302,7 @@ int kvm_handle_page_fault(struct kvm_vcpu *vcpu, u64 error_code,
 
        vcpu->arch.l1tf_flush_l1d = true;
        if (!flags) {
-               trace_kvm_page_fault(fault_address, error_code);
+               trace_kvm_page_fault(vcpu, fault_address, error_code);
 
                if (kvm_event_needs_reinjection(vcpu))
                        kvm_mmu_unprotect_page_virt(vcpu, fault_address);
index 26a3483..ec2b42a 100644 (file)
@@ -1975,7 +1975,7 @@ static int npf_interception(struct kvm_vcpu *vcpu)
        u64 fault_address = svm->vmcb->control.exit_info_2;
        u64 error_code = svm->vmcb->control.exit_info_1;
 
-       trace_kvm_page_fault(fault_address, error_code);
+       trace_kvm_page_fault(vcpu, fault_address, error_code);
        return kvm_mmu_page_fault(vcpu, fault_address, error_code,
                        static_cpu_has(X86_FEATURE_DECODEASSISTS) ?
                        svm->vmcb->control.insn_bytes : NULL,
index 2120d7c..331bdb0 100644 (file)
@@ -394,20 +394,26 @@ TRACE_EVENT(kvm_inj_exception,
  * Tracepoint for page fault.
  */
 TRACE_EVENT(kvm_page_fault,
-       TP_PROTO(unsigned long fault_address, unsigned int error_code),
-       TP_ARGS(fault_address, error_code),
+       TP_PROTO(struct kvm_vcpu *vcpu, unsigned long fault_address,
+                unsigned int error_code),
+       TP_ARGS(vcpu, fault_address, error_code),
 
        TP_STRUCT__entry(
+               __field(        unsigned int,   vcpu_id         )
+               __field(        unsigned long,  guest_rip       )
                __field(        unsigned long,  fault_address   )
                __field(        unsigned int,   error_code      )
        ),
 
        TP_fast_assign(
+               __entry->vcpu_id        = vcpu->vcpu_id;
+               __entry->guest_rip      = kvm_rip_read(vcpu);
                __entry->fault_address  = fault_address;
                __entry->error_code     = error_code;
        ),
 
-       TP_printk("address %lx error_code %x",
+       TP_printk("vcpu %u rip 0x%lx address 0x%lx error_code %x",
+                 __entry->vcpu_id, __entry->guest_rip,
                  __entry->fault_address, __entry->error_code)
 );
 
index c9b49a0..3eae410 100644 (file)
@@ -5638,7 +5638,7 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
                vmcs_set_bits(GUEST_INTERRUPTIBILITY_INFO, GUEST_INTR_STATE_NMI);
 
        gpa = vmcs_read64(GUEST_PHYSICAL_ADDRESS);
-       trace_kvm_page_fault(gpa, exit_qualification);
+       trace_kvm_page_fault(vcpu, gpa, exit_qualification);
 
        /* Is it a read fault? */
        error_code = (exit_qualification & EPT_VIOLATION_ACC_READ)