16c00db4bb
Pull AFS fixes from David Howells: "Here's a set of patches that fix a number of bugs in the in-kernel AFS client, including: - Fix directory locking to not use individual page locks for directory reading/scanning but rather to use a semaphore on the afs_vnode struct as the directory contents must be read in a single blob and data from different reads must not be mixed as the entire contents may be shuffled about between reads. - Fix address list parsing to handle port specifiers correctly. - Only give up callback records on a server if we actually talked to that server (we might not be able to access a server). - Fix some callback handling bugs, including refcounting, whole-volume callbacks and when callbacks actually get broken in response to a CB.CallBack op. - Fix some server/address rotation bugs, including giving up if we can't probe a server; giving up if a server says it doesn't have a volume, but there are more servers to try. - Fix the decoding of fetched statuses to be OpenAFS compatible. - Fix the handling of server lookups in Cache Manager ops (such as CB.InitCallBackState3) to use a UUID if possible and to handle no server being found. - Fix a bug in server lookup where not all addresses are compared. - Fix the non-encryption of calls that prevents some servers from being accessed (this also requires an AF_RXRPC patch that has already gone in through the net tree). There's also a patch that adds tracepoints to log Cache Manager ops that don't find a matching server, either by UUID or by address" * tag 'afs-fixes-20180514' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs: afs: Fix the non-encryption of calls afs: Fix CB.CallBack handling afs: Fix whole-volume callback handling afs: Fix afs_find_server search loop afs: Fix the handling of an unfound server in CM operations afs: Add a tracepoint to record callbacks from unlisted servers afs: Fix the handling of CB.InitCallBackState3 to find the server by UUID afs: Fix VNOVOL handling in address rotation afs: Fix AFSFetchStatus decoder to provide OpenAFS compatibility afs: Fix server rotation's handling of fileserver probe failure afs: Fix refcounting in callback registration afs: Fix giving up callbacks on server destruction afs: Fix address list parsing afs: Fix directory page locking
166 lines
4.3 KiB
C
166 lines
4.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <errno.h>
|
|
#include "../../util/kvm-stat.h"
|
|
#include <asm/svm.h>
|
|
#include <asm/vmx.h>
|
|
#include <asm/kvm.h>
|
|
|
|
define_exit_reasons_table(vmx_exit_reasons, VMX_EXIT_REASONS);
|
|
define_exit_reasons_table(svm_exit_reasons, SVM_EXIT_REASONS);
|
|
|
|
static struct kvm_events_ops exit_events = {
|
|
.is_begin_event = exit_event_begin,
|
|
.is_end_event = exit_event_end,
|
|
.decode_key = exit_event_decode_key,
|
|
.name = "VM-EXIT"
|
|
};
|
|
|
|
const char *vcpu_id_str = "vcpu_id";
|
|
const int decode_str_len = 20;
|
|
const char *kvm_exit_reason = "exit_reason";
|
|
const char *kvm_entry_trace = "kvm:kvm_entry";
|
|
const char *kvm_exit_trace = "kvm:kvm_exit";
|
|
|
|
/*
|
|
* For the mmio events, we treat:
|
|
* the time of MMIO write: kvm_mmio(KVM_TRACE_MMIO_WRITE...) -> kvm_entry
|
|
* the time of MMIO read: kvm_exit -> kvm_mmio(KVM_TRACE_MMIO_READ...).
|
|
*/
|
|
static void mmio_event_get_key(struct perf_evsel *evsel, struct perf_sample *sample,
|
|
struct event_key *key)
|
|
{
|
|
key->key = perf_evsel__intval(evsel, sample, "gpa");
|
|
key->info = perf_evsel__intval(evsel, sample, "type");
|
|
}
|
|
|
|
#define KVM_TRACE_MMIO_READ_UNSATISFIED 0
|
|
#define KVM_TRACE_MMIO_READ 1
|
|
#define KVM_TRACE_MMIO_WRITE 2
|
|
|
|
static bool mmio_event_begin(struct perf_evsel *evsel,
|
|
struct perf_sample *sample, struct event_key *key)
|
|
{
|
|
/* MMIO read begin event in kernel. */
|
|
if (kvm_exit_event(evsel))
|
|
return true;
|
|
|
|
/* MMIO write begin event in kernel. */
|
|
if (!strcmp(evsel->name, "kvm:kvm_mmio") &&
|
|
perf_evsel__intval(evsel, sample, "type") == KVM_TRACE_MMIO_WRITE) {
|
|
mmio_event_get_key(evsel, sample, key);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool mmio_event_end(struct perf_evsel *evsel, struct perf_sample *sample,
|
|
struct event_key *key)
|
|
{
|
|
/* MMIO write end event in kernel. */
|
|
if (kvm_entry_event(evsel))
|
|
return true;
|
|
|
|
/* MMIO read end event in kernel.*/
|
|
if (!strcmp(evsel->name, "kvm:kvm_mmio") &&
|
|
perf_evsel__intval(evsel, sample, "type") == KVM_TRACE_MMIO_READ) {
|
|
mmio_event_get_key(evsel, sample, key);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static void mmio_event_decode_key(struct perf_kvm_stat *kvm __maybe_unused,
|
|
struct event_key *key,
|
|
char *decode)
|
|
{
|
|
scnprintf(decode, decode_str_len, "%#lx:%s",
|
|
(unsigned long)key->key,
|
|
key->info == KVM_TRACE_MMIO_WRITE ? "W" : "R");
|
|
}
|
|
|
|
static struct kvm_events_ops mmio_events = {
|
|
.is_begin_event = mmio_event_begin,
|
|
.is_end_event = mmio_event_end,
|
|
.decode_key = mmio_event_decode_key,
|
|
.name = "MMIO Access"
|
|
};
|
|
|
|
/* The time of emulation pio access is from kvm_pio to kvm_entry. */
|
|
static void ioport_event_get_key(struct perf_evsel *evsel,
|
|
struct perf_sample *sample,
|
|
struct event_key *key)
|
|
{
|
|
key->key = perf_evsel__intval(evsel, sample, "port");
|
|
key->info = perf_evsel__intval(evsel, sample, "rw");
|
|
}
|
|
|
|
static bool ioport_event_begin(struct perf_evsel *evsel,
|
|
struct perf_sample *sample,
|
|
struct event_key *key)
|
|
{
|
|
if (!strcmp(evsel->name, "kvm:kvm_pio")) {
|
|
ioport_event_get_key(evsel, sample, key);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool ioport_event_end(struct perf_evsel *evsel,
|
|
struct perf_sample *sample __maybe_unused,
|
|
struct event_key *key __maybe_unused)
|
|
{
|
|
return kvm_entry_event(evsel);
|
|
}
|
|
|
|
static void ioport_event_decode_key(struct perf_kvm_stat *kvm __maybe_unused,
|
|
struct event_key *key,
|
|
char *decode)
|
|
{
|
|
scnprintf(decode, decode_str_len, "%#llx:%s",
|
|
(unsigned long long)key->key,
|
|
key->info ? "POUT" : "PIN");
|
|
}
|
|
|
|
static struct kvm_events_ops ioport_events = {
|
|
.is_begin_event = ioport_event_begin,
|
|
.is_end_event = ioport_event_end,
|
|
.decode_key = ioport_event_decode_key,
|
|
.name = "IO Port Access"
|
|
};
|
|
|
|
const char *kvm_events_tp[] = {
|
|
"kvm:kvm_entry",
|
|
"kvm:kvm_exit",
|
|
"kvm:kvm_mmio",
|
|
"kvm:kvm_pio",
|
|
NULL,
|
|
};
|
|
|
|
struct kvm_reg_events_ops kvm_reg_events_ops[] = {
|
|
{ .name = "vmexit", .ops = &exit_events },
|
|
{ .name = "mmio", .ops = &mmio_events },
|
|
{ .name = "ioport", .ops = &ioport_events },
|
|
{ NULL, NULL },
|
|
};
|
|
|
|
const char * const kvm_skip_events[] = {
|
|
"HLT",
|
|
NULL,
|
|
};
|
|
|
|
int cpu_isa_init(struct perf_kvm_stat *kvm, const char *cpuid)
|
|
{
|
|
if (strstr(cpuid, "Intel")) {
|
|
kvm->exit_reasons = vmx_exit_reasons;
|
|
kvm->exit_reasons_isa = "VMX";
|
|
} else if (strstr(cpuid, "AMD")) {
|
|
kvm->exit_reasons = svm_exit_reasons;
|
|
kvm->exit_reasons_isa = "SVM";
|
|
} else
|
|
return -ENOTSUP;
|
|
|
|
return 0;
|
|
}
|