From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xen.org>
Cc: "Kevin Tian" <kevin.tian@intel.com>,
"Wei Liu" <wei.liu2@citrix.com>,
"Jan Beulich" <JBeulich@suse.com>,
"Andrew Cooper" <andrew.cooper3@citrix.com>,
"Jun Nakajima" <jun.nakajima@intel.com>,
"Roger Pau Monné" <roger.pau@citrix.com>
Subject: [PATCH 2/6] x86: Improvements to ler debugging
Date: Mon, 28 May 2018 15:27:54 +0100 [thread overview]
Message-ID: <1527517678-1779-3-git-send-email-andrew.cooper3@citrix.com> (raw)
In-Reply-To: <1527517678-1779-1-git-send-email-andrew.cooper3@citrix.com>
* Command line documentation for what the option does.
* Implement a canonicalise_addr() helper and replace the opencoded use in
sign_extend_msr()
* Canonicalise the ler pointers and print symbol information.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: Wei Liu <wei.liu2@citrix.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
---
docs/misc/xen-command-line.markdown | 6 ++++++
xen/arch/x86/hvm/vmx/vmx.c | 7 +------
xen/arch/x86/x86_64/traps.c | 7 ++++++-
xen/include/asm-x86/x86_64/page.h | 8 ++++++++
4 files changed, 21 insertions(+), 7 deletions(-)
diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown
index 8712a83..1212ebd 100644
--- a/docs/misc/xen-command-line.markdown
+++ b/docs/misc/xen-command-line.markdown
@@ -1245,6 +1245,12 @@ if left disabled by the BIOS.
### ler (x86)
> `= <boolean>`
+> Default: 0
+
+This option is intended for debugging purposes only. Enable MSR_DEBUGCTL.LBR
+in hypervisor context to be able to dump the Last Interrupt/Exception To/From
+record with other registers.
+
### loglvl
> `= <level>[/<rate-limited level>]` where level is `none | error | warning | info | debug | all`
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index 33d39f6..8049264 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -4183,12 +4183,7 @@ static void sign_extend_msr(u32 msr, int type)
struct vmx_msr_entry *entry;
if ( (entry = vmx_find_msr(msr, type)) != NULL )
- {
- if ( entry->data & VADDR_TOP_BIT )
- entry->data |= CANONICAL_MASK;
- else
- entry->data &= ~CANONICAL_MASK;
- }
+ entry->data = canonicalise_addr(entry->data);
}
static void bdw_erratum_bdf14_fixup(void)
diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c
index b040185..ed02b78 100644
--- a/xen/arch/x86/x86_64/traps.c
+++ b/xen/arch/x86/x86_64/traps.c
@@ -150,7 +150,12 @@ void show_registers(const struct cpu_user_regs *regs)
rdmsrl(ler_msr, from);
rdmsrl(ler_msr + 1, to);
- printk("ler: %016lx -> %016lx\n", from, to);
+
+ /* Upper bits may store metadata. Re-canonicalise for printing. */
+ printk("ler: from %016"PRIx64" [%ps]\n",
+ from, _p(canonicalise_addr(from)));
+ printk(" to %016"PRIx64" [%ps]\n",
+ to, _p(canonicalise_addr(to)));
}
}
diff --git a/xen/include/asm-x86/x86_64/page.h b/xen/include/asm-x86/x86_64/page.h
index 05a0334..4fe0205 100644
--- a/xen/include/asm-x86/x86_64/page.h
+++ b/xen/include/asm-x86/x86_64/page.h
@@ -34,6 +34,14 @@
#ifndef __ASSEMBLY__
+static inline unsigned long canonicalise_addr(unsigned long addr)
+{
+ if ( addr & VADDR_TOP_BIT )
+ return addr | CANONICAL_MASK;
+ else
+ return addr & ~CANONICAL_MASK;
+}
+
#include <asm/types.h>
#include <xen/pdx.h>
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-05-28 14:27 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-28 14:27 [PATCH 0/6] x86/vmx: Misc fixes and improvements Andrew Cooper
2018-05-28 14:27 ` [PATCH 1/6] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit Andrew Cooper
2018-05-29 10:33 ` Jan Beulich
2018-05-29 18:08 ` Andrew Cooper
2018-05-30 7:32 ` Jan Beulich
2018-05-30 10:28 ` Andrew Cooper
2018-05-30 10:49 ` Jan Beulich
2018-05-30 17:34 ` [PATCH v2 " Andrew Cooper
2018-06-01 9:28 ` Jan Beulich
2018-06-05 7:54 ` Tian, Kevin
2018-05-28 14:27 ` Andrew Cooper [this message]
2018-05-29 11:39 ` [PATCH 2/6] x86: Improvements to ler debugging Jan Beulich
2018-05-29 18:09 ` Andrew Cooper
2018-06-05 7:55 ` Tian, Kevin
2018-05-28 14:27 ` [PATCH 3/6] x86/pat: Simplify host PAT handling Andrew Cooper
2018-05-29 11:40 ` Jan Beulich
2018-06-06 9:39 ` Roger Pau Monné
2018-05-28 14:27 ` [PATCH 4/6] x86/vmx: Simplify PAT handling during vcpu construction Andrew Cooper
2018-05-29 11:41 ` Jan Beulich
2018-06-05 7:57 ` Tian, Kevin
2018-06-06 9:42 ` Roger Pau Monné
2018-05-28 14:27 ` [PATCH 5/6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() Andrew Cooper
2018-05-29 11:43 ` Jan Beulich
2018-06-05 8:00 ` Tian, Kevin
2018-06-06 9:45 ` Roger Pau Monné
2018-06-06 10:11 ` Andrew Cooper
2018-05-28 14:27 ` [PATCH 6/6] x86/vmx: Drop VMX signal for full real-mode Andrew Cooper
2018-06-05 8:01 ` Tian, Kevin
2018-06-06 10:03 ` Roger Pau Monné
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1527517678-1779-3-git-send-email-andrew.cooper3@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=JBeulich@suse.com \
--cc=jun.nakajima@intel.com \
--cc=kevin.tian@intel.com \
--cc=roger.pau@citrix.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).