From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754145AbcGUUZr (ORCPT ); Thu, 21 Jul 2016 16:25:47 -0400 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:56512 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753945AbcGUUZp (ORCPT ); Thu, 21 Jul 2016 16:25:45 -0400 Date: Thu, 21 Jul 2016 16:24:40 -0400 From: Dave Jones To: Bandan Das CC: Paolo Bonzini , Linux Kernel , Radim =?utf-8?B?S3LEjW3DocWZ?= , Subject: Re: RFC: silencing kvm unimplemented msr spew. Message-ID: <20160721202440.GA10908@fb.com> Mail-Followup-To: Dave Jones , Bandan Das , Paolo Bonzini , Linux Kernel , Radim =?utf-8?B?S3LEjW3DocWZ?= , kvm@vger.kernel.org References: <20160715192729.GA4712@fb.com> <110045299.8101686.1468855610053.JavaMail.zimbra@redhat.com> <20160719195856.GA31453@fb.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.0 (2016-04-01) X-Originating-IP: [2620:10d:c091:200::a:6412] X-ClientProxiedBy: SN1PR11CA0026.namprd11.prod.outlook.com (10.164.10.36) To CO2PR15MB0058.namprd15.prod.outlook.com (10.161.86.149) X-MS-Office365-Filtering-Correlation-Id: 4ee9ef76-bb5b-4d8e-8fbc-08d3b1a51f8c X-Microsoft-Exchange-Diagnostics: 1;CO2PR15MB0058;2:BeTgFv2zpUcqUvqfKdm3VePDiHJAKevRz0PIN5GZggU+q+EgPQ+SO+AmW6ld7In5kuHPjq85PwqCnBTeQiCUX1AZVUsqJf7LxChtoqbK+M8X8VwAGClGpOSwcILCD/ZJmDpJn57YwXIKzcsnMMZhlTjQRgCQo5obQGY7fWdTiXR4A0DHZy3uwfe3miINA0QK;3:7WwQIX5vkgs1jVz1enZJW/DwxcBudA3as37EMYWFRVcEdW0T0zHWTRM+vVlMA64/cC3svXs/39Z+rW3NG1I5lLUTH2oAFD5l8RRDo9ZKNwLIdvHZfthmPG2SpXHD6+7z X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CO2PR15MB0058; X-Microsoft-Exchange-Diagnostics: 1;CO2PR15MB0058;25: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;31:FvD5p0lC6mctWkDKC2K+ngtS9fT/WOwplMwwzDD0vAUI0pkmH7Uko+QkFVWWAw+Si3WplWLO68choGDQjRQ8F6VT/APVAI86JcPJC3W/0enBUyM0sXVPysfXDgvjrEXagZuESeTO2syvkhPBrVJq1ybYsjT2rOXxwq0YBUikO8lfXviA39rZ2F8SsSib6n7D5zqZxZEPRp4e7/GXl+W5GA== X-Microsoft-Exchange-Diagnostics: 1;CO2PR15MB0058;20:ra5aqPmG1V1lAGtodnUxzCdk9u5Sy1O4ioBCvo8E0qXLkSVD8TaypAdQ1bMdFTRH/heZblPMfgBC2zLZHHsJtEip8D4UzVJzg43fNYbiLmmGQMaXbLVCYGA0LdXNXLAWRWz/YAXoFg3lVlshq0wCLzj0OQjwDIB1ygmFw4HsPzk=;4:XYjh4rg+FNGQvQ8+T1oVfrnF2MgHQUbzpPGfqI3t1kmxQrISuGoE3hqoebgHpf3hwKnW4EZCd0ecXrVNRizml1Yw9mAdAWaNB4ebLpJF1VX3s38C1atqKFloNpqCfCTkqJF5YSfMb+cj8MGKt10YPTEH8Pxf2uPrq9OKeF+4oRo82piDb/r9Af6FU/3T76rtAaZ0LJf2EPMJuX5jfwpeU6ybUK81Rtgxju2QbrOSEEa9yOSsuIZ7DuSo2bFy+2wcsbrgUDm4/4yCQQSetDLT3pNo5FPiqDtIXi1uM3brQoFNg3I7UuA7cYeKS63358LEnXXdspAKJCzIyN6Dvezq88PhKCtar0c4ulJC9v3h7P8qUjHHUdIfvdUeefDM5pLx X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046);SRVR:CO2PR15MB0058;BCL:0;PCL:0;RULEID:;SRVR:CO2PR15MB0058; X-Forefront-PRVS: 0010D93EFE X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(7916002)(199003)(24454002)(189002)(586003)(1076002)(42186005)(97756001)(23726003)(189998001)(50466002)(6116002)(86362001)(110136002)(4001350100001)(47776003)(97736004)(8676002)(305945005)(4326007)(7736002)(81156014)(68736007)(93886004)(7846002)(21086003)(54356999)(105586002)(33656002)(101416001)(77096005)(76176999)(81166006)(2906002)(83506001)(36756003)(46406003)(50986999)(2950100001)(106356001)(92566002)(18370500001)(51496004)(44646005)(3826002)(42262002);DIR:OUT;SFP:1102;SCL:1;SRVR:CO2PR15MB0058;H:fb.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;CO2PR15MB0058;23:yN7FZQ5++0corgTI2dVG8EmIeMm6rM9hBw0sy0wj2?= =?us-ascii?Q?UwVsePWAL4IXbokbeHuyWTBjIwdZPVRBhUu0FxeJK6y1cxIeEesXgdbYqSL/?= =?us-ascii?Q?I4RmYIuKtKvBxQuHFhtCGnWErT96gv8680pV+2AKvrBWYRfBHHlnJ+hQSRdD?= =?us-ascii?Q?ZhDwwwVG89eSLypiHDnEAbt3ypa894TKWnZyd+r9Qx62isDfVJGM5AYQDNb5?= =?us-ascii?Q?4LXWrxaZ3x0NoWajVPFEGTmeyNcD3QYivhiwqkcvkTl2zbynh8SVZMzeGa7n?= =?us-ascii?Q?qehNi6HX2r2Zl4cYUt39SKCJm7FOLuKgRaGmz9TisG+rTShatgsGTjbUlBBE?= =?us-ascii?Q?y6+jFwpNUPqshfWwbqdJ0N44SVbhigWPdO/zj4imdzcIeeMRSdopzSBoDw0H?= =?us-ascii?Q?acTjo9ijFMLw+FP+AnXK+CTKsR1/+ljjRcUuswJMi9uMkqrzwf7dbnuOmc9G?= =?us-ascii?Q?x7+PRI5KRSJywzsmACWFc2cWW+PUYPERlbdseuNKBz/q99/tdU1N7jYmvHuv?= =?us-ascii?Q?Xmh86/tJERyJHZbHCdmhd10DI/TfGhXvjRLcOVFwKlGpKecYmxTHivnT8Ajz?= =?us-ascii?Q?QUMSFYlRytYSPHaaYu/0L5xbmkg0a+Kxnt/lojuYvplcgwjftTeJTXFhV0vC?= =?us-ascii?Q?jCeV7P9kAosvHbO10Zezve6uXEtaRQvGn1AD0Yh8dKsGpwUVmkLpLoa9U5hG?= =?us-ascii?Q?qaJ2tbS9jBwwxJmaVVAAUVD22Pl1o5NGWa+c5aXUaTnHqBnuj+MQkWXHQfdw?= =?us-ascii?Q?INMN02+harLMpaj18zdql45guWNFp9RQgmcZ2kI8r3YRLsF0CLA7mHTp+si4?= =?us-ascii?Q?wSc7Cs/Un4ZI4s6AbUmLloTsWF8rS6Hwo1n5WatEj/PKdbRykbwu+ZaaCy3o?= =?us-ascii?Q?uibkmN8LTAosrweqPu9l9W3LetIs9s8pghv13EFauHCb4qAqLCZ76D9h5mBZ?= =?us-ascii?Q?2qEX7XdcjB8vZgXnccPu/ruFQWze5FcK7iD+f/HG4kIActBOQA+OkONd8PaX?= =?us-ascii?Q?pHuJgXRz62LufXCfQnn/aIQYS8lRkZbNxDltc5TRgub04NL1VTD1Ygq4nyVR?= =?us-ascii?Q?2YbtbtVsaAyjiTbGEdkSfyNT1OB1CCHutvSLJoKM/GlKYcZqtUgdnFpZ17dQ?= =?us-ascii?Q?4E/GlmbESz4KqFEjp0NHrzYE5oNXoCt/Mq8iBQcGRT3veXegrg6wzAF8Yn+R?= =?us-ascii?Q?Y817iAOyHShIMU=3D?= X-Microsoft-Exchange-Diagnostics: 1;CO2PR15MB0058;6:+0vR2HhMy9jZTUbPdpmeGZ5eB7xx53H2+9isZLvMPhx6wswxkzu1rkT2zplV7BYYK9j2KhfuI8/IUrLXAbQ0Nfnpxv15GgSs9O9TnFb7X+CUrkw2r8Uigolp8D3Y1dK/A0tYHDBNqN0m0CI6n0op2M8w7oNq2d99gip9GuKxojBbDL6EJ7GkVxwXpBDWdsqMVc1Sds1pkEUhNtMuVIYLROTvxn9DOXI2gV47x50+Vw0aR/XKuI6kSXG+Xwb47KG16SmpwE26vNeKa4lTGUyvaTH/gTh6bkYBSQ3+uzOM62s=;5:YtqwGhQkYrqqy/tkHrDEuSR6XTGH58pFUrjUMsyAZ+6UXAQJVYYJSSG+Un4brUXi3A2JsoWjfNblmBOkji22Na6UQ7M6Q//6+AdRJBAoJY/Y8DNADWl/neS5hfQrd3S30pJAlsOJncgR/ybpES5eCw==;24:1wLL5z1Vf4Kww9/uczqMnhO6BnvO+e94rB/6rbO+vPIlV7k/7t1CcEfLqneDbWLgqOZdsWbruxeceNDXYgEza9QBQRU+GMEM6nMEc44LcjM=;7:CK+YTcYH9sPl6fM+RpuTlGSIMJsnnPTw9m+UpAu5mPw58O/ooZDY+ZYnh/ZsTntGl1nKrudXqkAoGJz4GzbRn7b4O7Q2HFA7dzeSixzcVBHakHcxMQhRTz6ORV/3ROgJFYDz5mAJrDX5OBkec1abEeWtSg5Kzj132k1MYf6znJF5tI4Mbh0g0Xiw3WBJSj3Ma/sX2gASlAU9UAZLAaE4DAQzYONAEk5/+/Mo/S/DVAhgoH02toTFW53FaWmHatgP SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;CO2PR15MB0058;20:puBeArIhX5zD6T0T1L4RcXv6n8tCd1Rb6mSWQq2ZqzEgW1PsbumHM06T9rkVPeBFVmlXwSRJSD4jlSzqu2UnkB6B1rft2t2O5KTIYPPyoJoKiGzg9llEf0WMRUohfv1GStWWcTwDvfMeijZSU2vf0FaDf2n6Jm1VzJKmSe6fEUY= X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2016 20:25:13.5498 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR15MB0058 X-OriginatorOrg: fb.com X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2016-07-21_11:,, signatures=0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 19, 2016 at 04:24:31PM -0400, Bandan Das wrote: > Heh, actually after speaking about this to Paolo a while back, I had this sleeping > in my local branch for a while. Same as what you suggested (without the ratelimiting) > > diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c > index def97b3..c6e6f64 100644 > --- a/arch/x86/kvm/mmu.c > +++ b/arch/x86/kvm/mmu.c > @@ -4952,7 +4952,7 @@ void kvm_mmu_invalidate_mmio_sptes(struct kvm *kvm, struct kvm_memslots *slots) > * zap all shadow pages. > */ > if (unlikely((slots->generation & MMIO_GEN_MASK) == 0)) { > - printk_ratelimited(KERN_DEBUG "kvm: zapping shadow pages for mmio generation wraparound\n"); > + kvm_debug("zapping shadow pages for mmio generation wraparound\n"); > kvm_mmu_invalidate_zap_all_pages(kvm); > } > } > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index 7da5dd2..02d09f9 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -2229,7 +2229,7 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > if (kvm_pmu_is_valid_msr(vcpu, msr)) > return kvm_pmu_set_msr(vcpu, msr_info); > if (!ignore_msrs) { > - vcpu_unimpl(vcpu, "unhandled wrmsr: 0x%x data %llx\n", > + vcpu_debug(vcpu, "unhandled wrmsr: 0x%x data %llx\n", > msr, data); > return 1; > } else { > @@ -2441,7 +2441,7 @@ int kvm_get_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > if (kvm_pmu_is_valid_msr(vcpu, msr_info->index)) > return kvm_pmu_get_msr(vcpu, msr_info->index, &msr_info->data); > if (!ignore_msrs) { > - vcpu_unimpl(vcpu, "unhandled rdmsr: 0x%x\n", msr_info->index); > + vcpu_debug(vcpu, "unhandled rdmsr: 0x%x\n", msr_info->index); > return 1; > } else { > vcpu_unimpl(vcpu, "ignored rdmsr: 0x%x\n", msr_info->index); > > I had the same reasoning regarding dynamic debugging which I think is > enabled by default on most builds anyway. Yeah, that's close. Though I would have done the same for the other side of the if's too. (Still evaluating which mode is actually more useful for us). Paolo, would you prefer this, or the other approach you already ack'd ? Dave