From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6845C19F2B for ; Fri, 29 Jul 2022 13:53:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235451AbiG2NxW (ORCPT ); Fri, 29 Jul 2022 09:53:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39022 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236196AbiG2NxS (ORCPT ); Fri, 29 Jul 2022 09:53:18 -0400 Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B3C893B962 for ; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) Received: by mail-pl1-x62f.google.com with SMTP id iw1so4673685plb.6 for ; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc; bh=g4LT+6Vc6EAW7pOz6CH6o1bZ0MDiGNCAo1jgsVCoQag=; b=hmsmQLanMwnWzEgOVGlslRv1ShxsFCWhqRUllHlVRCXoJvohWgLtMX3mpxz5w1QAo5 ojwpxTMrkr07++O/fg1cuHuCk1DTLX/980o0jnaaI45We6DdCyxajzhKUnk6eS9EPuo2 dnf03PVazcRno8nVhB4adrUZGiGCGD75l3+FHAy/HzMVIzRv1Q7IQeBWQj06UXwNGXIZ MJClL/qy7kbIEVvmKjv/dblqvt+ITCVl61rbucdmybcyiD+CDdRKJJY/dGIuKDsiUSVZ HfNaVdJKO+jXoO+tHLasEqoHYwTjm5dxrKAbRC4cvJSzNKPJ8cn1zGqGHr12EUnI0vbC l9gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc; bh=g4LT+6Vc6EAW7pOz6CH6o1bZ0MDiGNCAo1jgsVCoQag=; b=mEdbsjR5Cu8TECsrI6tELtg22+qOqqkBzRRe/aFY+mEjSEGN6jpJf1SxMWVTBnGwhx Jd5QLyiF5ialZ3Swbiz+zcyZb+Ldr7Pkg57tLFuv/Nh0w6LO9YTzGrz2gUvwL4J+SMXT clr+mYR+1/atv50qSUUIbY7j1iQP2D7mb0K5DSKJKWXxyL5hL6AtJ+HMCgvWAihUPHWS y6IYiyB3PwzV9gHGtlpHQcd2/Pr7RiEt1pWzy5clf4hcey80AWo89cS1siUgnChyVoIs HNDXW1OJvOcu0GYZfrPWinQJUwWg+idMQFWlLpzsW7DjNMi/HKfX964d7DZD++gBX5e3 HKLw== X-Gm-Message-State: ACgBeo0YGcZ0IsDOZaLgWw+7xYNor7Qx13KMLY1rBuqH/Bz9lAyc9/7S TVORg902rxEc/D8KNBdo8CDanQ== X-Google-Smtp-Source: AA6agR6kysUOxI+yQ+wn8SjwdttWDeEfbpR2glp/K1ujc4LvCyuxBwvyKJzdpW02VhsqGY4qyhv2GA== X-Received: by 2002:a17:903:40ce:b0:16e:c71b:8b0e with SMTP id t14-20020a17090340ce00b0016ec71b8b0emr228498pld.154.1659102794078; Fri, 29 Jul 2022 06:53:14 -0700 (PDT) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id u1-20020a170902e5c100b001618b70dcc9sm3684540plf.101.2022.07.29.06.53.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Jul 2022 06:53:13 -0700 (PDT) Date: Fri, 29 Jul 2022 13:53:09 +0000 From: Sean Christopherson To: "Shukla, Santosh" Cc: Paolo Bonzini , Vitaly Kuznetsov , Jim Mattson , Joerg Roedel , Maxim Levitsky , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCHv2 5/7] KVM: SVM: Add VNMI support in inject_nmi Message-ID: References: <20220709134230.2397-1-santosh.shukla@amd.com> <20220709134230.2397-6-santosh.shukla@amd.com> <23b43ea0-0a92-e132-ada3-ebe86dbaf673@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <23b43ea0-0a92-e132-ada3-ebe86dbaf673@amd.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 29, 2022, Shukla, Santosh wrote: > Hi Sean, > > On 7/21/2022 3:11 AM, Sean Christopherson wrote: > > On Sat, Jul 09, 2022, Santosh Shukla wrote: > >> + ++vcpu->stat.nmi_injections; > >> + if (is_vnmi_enabled(svm)) { > >> + vmcb = get_vnmi_vmcb(svm); > >> + WARN_ON(vmcb->control.int_ctl & V_NMI_PENDING); > > > > Haven't read the spec, but based on the changelog I assume the flag doesn't get > > cleared until the NMI is fully delivered. That means this WARN will fire if a > > VM-Exit occurs during delivery as KVM will re-inject the event, e.g. if KVM is > > using shadow paging and a #PF handle by KVM occurs during delivery. > > > > Right,. > > > For the above scenario i.e.. if VMEXIT happens during delivery of virtual NMI > then EXITINTINFO will be set accordingly and V_NMI_MASK is saved as 0. > hypervisor will re-inject event in next VMRUN. > > I just wanted to track above scenario,. I will replace it with pr_debug(). No, this is normal (albeit uncommon) behavior, don't print anything. Even if it weren't normal behavior, pr_debug() is usually the wrong choice in KVM.