Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp185610rwb; Wed, 5 Oct 2022 17:04:58 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5emXxKVyA4gtxnGZ/n/BEUhKZAx1pTa1wk0xKRMM+Xi83KLL2cuK6PTBJVzgifUIu3YPuu X-Received: by 2002:a63:e547:0:b0:44e:d36e:5648 with SMTP id z7-20020a63e547000000b0044ed36e5648mr1977883pgj.164.1665014698083; Wed, 05 Oct 2022 17:04:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665014698; cv=none; d=google.com; s=arc-20160816; b=tXjaFk2RCfNgGEyjzb7LmzVxY88yyR9VuEa78/yzXz+FinBlPuWtKgzFkktO4qyG9C NNIOCYT+HlLyA1mnzY3xpktMHUytNr2+GrY0U0/ye4h7WtK5XLtgYDC1qaZX+57/jzmV 4Z1sEpANux4VOh1BdSxGGwn452P/wEILi/aCHef+QN8giR3Uow05EWuJXqcfTxMR6gtj xRZNP6Bds51RtGgUzHYNFsTqCgLKx+lWrcKGZ7oVbw0gO/ZsD0nOJQivXs4urFu5yZ4k M0wgIo9PDAeVwT1/CstJdcGcFukPc4lpbgnYOssJ6da2xWJSHSTdMM+xzqznM5Vwmc75 NR3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :reply-to:dkim-signature; bh=IhY9vucrkor49I71IpqJ03K3yiVNV0ac/5M4Ac7yZ08=; b=V5hBJtEf9AFoN477KZFRQyodrSUIBdrZtcjjfdzvDvt55wSG8x799Z8sLn2uqbBYE2 L49TQUbrWmwoK3cRvL52vuyvHp6ZvzRQT3XO9LUBFMDhQd68pJxpmO03KchBQiacnngF bFDJuqnilk7txqU2YBnxcV9Hu4J6BzSpTreKim23ZeTid9rsdZUkEWLE+94UKtw/TXpY 2o9I4Velpni4TESAFT005PhFMYyVMQe7PCOvTWNJ2htJK2bmqaWU0M7AK28mJCI033sy ffsvZ989atQj/EWegZ6bmD5jbzUfOla6jpMFtsUVZWQmaIGvJGpYz2CWk79R9b1SrlTp tt6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=HTX52T21; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v202-20020a6361d3000000b00453a5fc1693si6944935pgb.537.2022.10.05.17.04.35; Wed, 05 Oct 2022 17:04:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=HTX52T21; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229724AbiJFADV (ORCPT + 99 others); Wed, 5 Oct 2022 20:03:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44238 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbiJFADU (ORCPT ); Wed, 5 Oct 2022 20:03:20 -0400 Received: from mail-pg1-x54a.google.com (mail-pg1-x54a.google.com [IPv6:2607:f8b0:4864:20::54a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5D05C82624 for ; Wed, 5 Oct 2022 17:03:18 -0700 (PDT) Received: by mail-pg1-x54a.google.com with SMTP id s15-20020a63524f000000b0043891d55a30so135595pgl.16 for ; Wed, 05 Oct 2022 17:03:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:reply-to:from:to:cc :subject:date:message-id:reply-to; bh=IhY9vucrkor49I71IpqJ03K3yiVNV0ac/5M4Ac7yZ08=; b=HTX52T215o5gjd0vibNKgCp3S1F2RS99LZ1I/5GOvxUfcvq0STNjgJoXkosy1dA5be PTXvq+ODSgWtjyipG69HfkZ3JB4acMSUIespy2Ke65T8RIan3wxshBA3jtPohcAFtT0y 9Nefz08fyxpMPv48XtISSrzv81VLe3c24xK+HbBt40NHLP4DNQqw4ZQP107nU2GErm6j BB7oqgdrD2tqGX/m7b4XhUWMJQexg79JAbsY3PBy7s+WC0XEtbiP4BmZgaJzR11HHBu0 8zi1SrMhZy6R7g3n1vAH7GQ6rkdXn9r5nnaJWsmPFc2LtaP1aeryRdO3/cg2AllnQ74e rK6w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:reply-to :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=IhY9vucrkor49I71IpqJ03K3yiVNV0ac/5M4Ac7yZ08=; b=p6GbJnRxCXKb9VDR2hLBRkiwLWH5ET1rSt2nWOR/KFM57iqrC46qBgfgUz5S26kD3h MswncWvd+1R11AvP3Tr419BSacc5B8H9HoI7uA6nSwtFcorWzzgTD3Kr9EXVTJmqBQWJ Cch8Q/TWmPxrQSwSkO1FeqRMWO56bB9Lde65kJ20ZTGh3+GC8d+KTzrBV9lXTLXigkiT JXXJgBYQNGlp32lHoFwY6EnH2TumthhDEpzJu3LwAV3HKn24KF2Z4otvbilVN86s55Nm 9HwCCbyVAThkbaxe7kPLecY6knjIbigmBVAlE2tGqtD/jR5H3hTXgcvYWwoKCAUVHSpd yU0A== X-Gm-Message-State: ACrzQf2AaBQGH74MEoqdsU7H87wwaRVhT6V6L0HW65jwuTYJedy49oPr CqvkDTlGV1IsWCvBI+mBe+JkPLioTrY= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:902:8a88:b0:17f:8642:7c9a with SMTP id p8-20020a1709028a8800b0017f86427c9amr1889292plo.13.1665014597897; Wed, 05 Oct 2022 17:03:17 -0700 (PDT) Reply-To: Sean Christopherson Date: Thu, 6 Oct 2022 00:03:06 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.38.0.rc1.362.ged0d419d3c-goog Message-ID: <20221006000314.73240-1-seanjc@google.com> Subject: [PATCH v5 0/8] KVM: x86: Intel LBR related perf cleanups From: Sean Christopherson To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Sean Christopherson , Paolo Bonzini Cc: Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , linux-perf-users@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Like Xu Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org PeterZ, I dropped your ACK from v4 because the perf patches were completely broken. Fix a bug where KVM incorrectly advertises PMU_CAP_LBR_FMT to userspace if perf has disabled LBRs, e.g. because probing one or more LBR MSRs during setup hit a #GP. The non-KVM patch cleans up a KVM-specific perf API to fix a benign bug where KVM ignores the error return from the API. The remaining patches clean up KVM's PERF_CAPABILITIES mess, which makes everything far more complex than it needs to be by v5: - Drop perf patches that removed stubs. The stubs are sadly necessary when CPU_SUP_INTEL=n && KVM_INTEL={m,y}, which is possible due to KVM_INTEL effectively depending on INTEL || CENTAUR || ZHAOXIN. [hint provided by kernel test robot]. - Add a patch to ignore guest CPUID on host userspace MSR writes. - Add supported PERF_CAPABILITIES to kvm_caps to simplify code for all parties. v4 - https://lore.kernel.org/all/20220901173258.925729-1-seanjc@google.com: - Make vmx_get_perf_capabilities() non-inline to avoid references to x86_perf_get_lbr() when CPU_SUP_INTEL=n. [kernel test robot] v3: - https://lore.kernel.org/all/20220831000051.4015031-1-seanjc@google.com - Drop patches for bug #1 (already merged). - Drop misguided "clean up the capability check" patch. [Like] v2: - https://lore.kernel.org/all/20220803192658.860033-1-seanjc@google.com - Add patches to fix bug #2. [Like] - Add a patch to clean up the capability check. - Tweak the changelog for the PMU refresh bug fix to call out that KVM should disallow changing feature MSRs after KVM_RUN. [Like] v1: https://lore.kernel.org/all/20220727233424.2968356-1-seanjc@google.com Sean Christopherson (8): perf/x86/core: Zero @lbr instead of returning -1 in x86_perf_get_lbr() stub KVM: VMX: Advertise PMU LBRs if and only if perf supports LBRs KVM: VMX: Fold vmx_supported_debugctl() into vcpu_supported_debugctl() KVM: VMX: Ignore guest CPUID for host userspace writes to DEBUGCTL KVM: x86: Track supported PERF_CAPABILITIES in kvm_caps KVM: x86: Init vcpu->arch.perf_capabilities in common x86 code KVM: x86: Handle PERF_CAPABILITIES in common x86's kvm_get_msr_feature() KVM: x86: Directly query supported PERF_CAPABILITIES for WRMSR checks arch/x86/events/intel/lbr.c | 6 +--- arch/x86/include/asm/perf_event.h | 6 ++-- arch/x86/kvm/svm/svm.c | 3 +- arch/x86/kvm/vmx/capabilities.h | 37 ---------------------- arch/x86/kvm/vmx/pmu_intel.c | 1 - arch/x86/kvm/vmx/vmx.c | 51 +++++++++++++++++++++++-------- arch/x86/kvm/x86.c | 14 ++++----- arch/x86/kvm/x86.h | 1 + 8 files changed, 52 insertions(+), 67 deletions(-) base-commit: e18d6152ff0f41b7f01f9817372022df04e0d354 -- 2.38.0.rc1.362.ged0d419d3c-goog