From: David Matlack <dmatlack@google.com>
To: David Edmondson <dme@dme.org>
Cc: linux-kernel@vger.kernel.org, Wanpeng Li <wanpengli@tencent.com>,
Jim Mattson <jmattson@google.com>,
Sean Christopherson <seanjc@google.com>,
Borislav Petkov <bp@alien8.de>,
Vitaly Kuznetsov <vkuznets@redhat.com>,
Joerg Roedel <joro@8bytes.org>,
kvm@vger.kernel.org, Paolo Bonzini <pbonzini@redhat.com>,
Thomas Gleixner <tglx@linutronix.de>,
x86@kernel.org, Ingo Molnar <mingo@redhat.com>,
"H. Peter Anvin" <hpa@zytor.com>
Subject: Re: [PATCH v2 0/2] kvm: x86: Convey the exit reason to user-space on emulation failure
Date: Thu, 8 Jul 2021 20:35:17 +0000 [thread overview]
Message-ID: <YOdhhcjXEHUaMIFc@google.com> (raw)
In-Reply-To: <m2y2ag36od.fsf@dme.org>
On Thu, Jul 08, 2021 at 09:13:38PM +0100, David Edmondson wrote:
> On Thursday, 2021-07-08 at 18:38:18 UTC, David Matlack wrote:
>
> > On Thu, Jul 08, 2021 at 03:17:40PM +0100, David Edmondson wrote:
> >> Apologies if you see two of these - I had some email problems earlier.
> >
> > I only got one! :)
>
> Phew!
>
> >> On Wednesday, 2021-07-07 at 23:20:04 UTC, David Matlack wrote:
> >>
> >> > On Tue, Jul 06, 2021 at 11:12:05AM +0100, David Edmondson wrote:
> >> >> To help when debugging failures in the field, if instruction emulation
> >> >> fails, report the VM exit reason to userspace in order that it can be
> >> >> recorded.
> >> >
> >> > What is the benefit of seeing the VM-exit reason that led to an
> >> > emulation failure?
> >>
> >> I can't cite an example of where this has definitively led in a
> >> direction that helped solve a problem, but we do sometimes see emulation
> >> failures reported in situations where we are not able to reproduce the
> >> failures on demand and the existing information provided at the time of
> >> failure is either insufficient or suspect.
> >>
> >> Given that, I'm left casting about for data that can be made available
> >> to assist in postmortem analysis of the failures.
> >
> > Understood, thanks for the context. My only concern would be that
> > userspace APIs are difficult to change once they exist.
>
> Agreed.
>
> > If it turns out knowing the exit reason does not help with debugging
> > emulation failures we'd still be stuck with exporting it on every
> > emulation failure.
>
> We could stop setting the flag and never export it, but this would waste
> space in the structure and be odd, without doubt.
>
> > My intuition is that the instruction bytes (which are now available with
> > Aaron's patch) and the guest register state (which is queryable through
> > other ioctls) should be sufficient to set up a reproduction of the
> > emulation failure in a kvm-unit-test and the exit reason should not
> > really matter. I'm curious if that's not the case?
>
> The instruction bytes around the reported EIP are all zeroes - the
> register dump looks suspect, and doesn't correspond with the reported
> behaviour of the VM at the time of the failure.
Interesting... Nothing comes to mind but others on this list might have
a suggestion of where to look next.
>
> It's possible that Aaron's changes will help, indeed, given that they
> report state from within the instruction emulator itself. So far I don't
> have a sufficiently reproducible case to be able to see if that is the
> case.
>
> > I'm really not opposed to exporting the exit reason if it is useful, I'm
> > just not sure it will help.
>
> In the emulation failure case we are not in something I would consider a
> fast path, and the overhead of acquiring and reporting the exit reason
> is low.
Agreed. I'm not worried about performance, only code complexity and
bloat in the userspace API. But as you suggested above we could always
stop setting the flag and remove the code that populates the exit reason
if it turns out to not be useful. The field in kvm_run is the only thing
that could be hard to remove in the future.
>
> Do you anticipate a case where it would be inappropriate or expensive to
> report the reason?
>
> >>
> >> >> I'm unsure whether sgx_handle_emulation_failure() needs to be adapted
> >> >> to use the emulation_failure part of the exit union in struct kvm_run
> >> >> - advice welcomed.
> >> >>
> >> >> v2:
> >> >> - Improve patch comments (dmatlack)
> >> >> - Intel should provide the full exit reason (dmatlack)
> >> >> - Pass a boolean rather than flags (dmatlack)
> >> >> - Use the helper in kvm_task_switch() and kvm_handle_memory_failure()
> >> >> (dmatlack)
> >> >> - Describe the exit_reason field of the emulation_failure structure
> >> >> (dmatlack)
> >> >>
> >> >> David Edmondson (2):
> >> >> KVM: x86: Add kvm_x86_ops.get_exit_reason
> >> >> KVM: x86: On emulation failure, convey the exit reason to userspace
> >> >>
> >> >> arch/x86/include/asm/kvm-x86-ops.h | 1 +
> >> >> arch/x86/include/asm/kvm_host.h | 3 +++
> >> >> arch/x86/kvm/svm/svm.c | 6 ++++++
> >> >> arch/x86/kvm/vmx/vmx.c | 11 +++++++----
> >> >> arch/x86/kvm/x86.c | 22 +++++++++++++---------
> >> >> include/uapi/linux/kvm.h | 7 +++++++
> >> >> 6 files changed, 37 insertions(+), 13 deletions(-)
> >> >>
> >> >> --
> >> >> 2.30.2
> >> >>
> >>
> >> dme.
> >> --
> >> It's gettin', it's gettin', it's gettin' kinda hectic.
>
> dme.
> --
> Please forgive me if I act a little strange, for I know not what I do.
next prev parent reply other threads:[~2021-07-08 20:35 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-07-06 10:12 [PATCH v2 0/2] kvm: x86: Convey the exit reason to user-space on emulation failure David Edmondson
2021-07-06 10:12 ` [PATCH v2 1/2] KVM: x86: Add kvm_x86_ops.get_exit_reason David Edmondson
2021-07-06 10:12 ` [PATCH v2 2/2] KVM: x86: On emulation failure, convey the exit reason to userspace David Edmondson
2021-07-09 15:47 ` Sean Christopherson
2021-07-12 15:34 ` David Edmondson
2021-07-07 23:20 ` [PATCH v2 0/2] kvm: x86: Convey the exit reason to user-space on emulation failure David Matlack
2021-07-08 14:17 ` David Edmondson
2021-07-08 18:38 ` David Matlack
2021-07-08 20:13 ` David Edmondson
2021-07-08 20:35 ` David Matlack [this message]
2021-07-09 16:08 ` Sean Christopherson
2021-07-07 23:22 ` David Matlack
2021-07-08 14:20 ` David Edmondson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YOdhhcjXEHUaMIFc@google.com \
--to=dmatlack@google.com \
--cc=bp@alien8.de \
--cc=dme@dme.org \
--cc=hpa@zytor.com \
--cc=jmattson@google.com \
--cc=joro@8bytes.org \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=tglx@linutronix.de \
--cc=vkuznets@redhat.com \
--cc=wanpengli@tencent.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox