[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220611005755.753273-1-seanjc@google.com>
Date: Sat, 11 Jun 2022 00:57:48 +0000
From: Sean Christopherson <seanjc@...gle.com>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: Sean Christopherson <seanjc@...gle.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>,
Wanpeng Li <wanpengli@...cent.com>,
Jim Mattson <jmattson@...gle.com>,
Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org, Like Xu <likexu@...cent.com>
Subject: [PATCH 0/7] KVM: x86: Attempt to wrangle PEBS/PMU into submission
Attempt to fix the myriad PEBS/PMU issues in kvm/next. Ideally this would
have been code review feedback, but I missed that boat.
Lightly tested, and I haven't thought through the host_initiated stuff too
deeply, but KUT and selftests are happy.
Sean Christopherson (7):
KVM: x86: Give host userspace full control of MSR_IA32_MISC_ENABLES
KVM: VMX: Give host userspace full control of
MSR_IA32_PERF_CAPABILITIES
Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initiated
if !enable_pmu"
Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"
KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-visible value
KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS
MSRs
KVM: x86: Ignore benign host writes to "unsupported" F15H_PERF_CTL
MSRs
arch/x86/kvm/pmu.c | 12 ++------
arch/x86/kvm/pmu.h | 4 +--
arch/x86/kvm/svm/pmu.c | 13 ++-------
arch/x86/kvm/vmx/pmu_intel.c | 43 +++++++++++-----------------
arch/x86/kvm/x86.c | 55 ++++++++++++++++++++++++------------
5 files changed, 59 insertions(+), 68 deletions(-)
base-commit: 0cfd9c71371d4c7f96212d20833c36953eccdb91
--
2.36.1.476.g0c4daa206d-goog
Powered by blists - more mailing lists