All of lore.kernel.org
 help / color / mirror / Atom feed
* Status for 5.19 merge window
@ 2022-05-21  8:51 Paolo Bonzini
  2022-05-25 11:15 ` Paolo Bonzini
  0 siblings, 1 reply; 2+ messages in thread
From: Paolo Bonzini @ 2022-05-21  8:51 UTC (permalink / raw)
  To: kvm

Already merged for 5.19:
* Allow userspace to opt out of hypercall patching
* New ioctls to get/set TSC frequency for a whole VM
* Only do MSR filtering for MSRs accessed by rdmsr/wrmsr
* Nested virtualization improvements for AMD:
** Support for "nested nested" optimizations (nested vVMLOAD/VMSAVE,
nested vGIF)
** Allow AVIC to co-exist with a nested guest running
** Fixes for LBR virtualizations when a nested guest is running, and
nested LBR virtualization support
** PAUSE filtering for nested hypervisors
* In kernel Xen event channel delivery
* Fixes for AMD injection
* SEV improvements
** Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
** V_TSC_AUX support
* CPU state/MMU role refactoring
* Fast page fault cleanups
* IPI virtualization
* Guest performance monitoring improvements:
** Support for PEBS
** Support for architectural LBR

Will be in 5.19 merge window:
* dirty quota
* nested dirty-log selftest

After merge window:
* APICv inhibition on APIC id change

Delayed to 5.20:
* eager page splitting
* CMCI support
* Hyper-V TLB
* pfn functions cleanup
* x2AVIC
* nested AVIC


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Status for 5.19 merge window
  2022-05-21  8:51 Status for 5.19 merge window Paolo Bonzini
@ 2022-05-25 11:15 ` Paolo Bonzini
  0 siblings, 0 replies; 2+ messages in thread
From: Paolo Bonzini @ 2022-05-25 11:15 UTC (permalink / raw)
  To: kvm

On 5/21/22 10:51, Paolo Bonzini wrote:
> * Guest performance monitoring improvements:
> ** Support for PEBS
> ** Support for architectural LBR

These were broken so I had to revert everything and rebase. :/

I also dropped IPI virtualization.

You can check out the delta with:

$ git range-diff tags/v5.18 kvm/kvm-next-pre-20220525-rebase tags/kvm-5.18-1

The following patches were also incidental casualties of the issue:

255:  7daffe14fd0d <   -:  ------------ KVM: powerpc: remove extraneous asterisk from rm_host_ipi_action comment

will be merged through ppc tree

257:  9fd169b02731 <   -:  ------------ KVM: Drop unused @gpa param from gfn=>pfn cache's __release_gpc() helper
258:  2517f9b0f189 <   -:  ------------ KVM: Put the extra pfn reference when reusing a pfn in the gpc cache
259:  3c980f9c0ef8 <   -:  ------------ KVM: Do not incorporate page offset into gfn=>pfn cache user address
260:  8ba88973477a <   -:  ------------ KVM: Fully serialize gfn=>pfn cache refresh via mutex
261:  3b7f9dace96f <   -:  ------------ KVM: Fix multiple races in gfn=>pfn cache refresh
262:  6aaeaad98fb2 <   -:  ------------ KVM: Do not pin pages tracked by gfn=>pfn caches
298:  82f0f434fca0 <   -:  ------------ KVM: VMX: Print VM-instruction error when it may be helpful
299:  f30c7aaeda6f <   -:  ------------ KVM: VMX: Print VM-instruction error as unsigned
300:  7e345a215d35 <   -:  ------------ KVM: set_msr_mce: Permit guests to ignore single-bit ECC errors

will be merged later in 5.19

188:  121383d0107e <   -:  ------------ x86/cpu: Add new VMX feature, Tertiary VM-Execution control
189:  9fbf31ba29b0 <   -:  ------------ KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64-bit variation
190:  fd351c52963a <   -:  ------------ KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS config
191:  9402278c24c0 <   -:  ------------ KVM: VMX: Report tertiary_exec_control field in dump_vmcs()
192:  3fadd6b78db0 <   -:  ------------ KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode
193:  8236723e797c <   -:  ------------ KVM: VMX: Clean up vmx_refresh_apicv_exec_ctrl()
194:  b113d61e1d1b <   -:  ------------ KVM: Move kvm_arch_vcpu_precreate() under kvm->lock
195:  a7747898a7c6 <   -:  ------------ KVM: x86: Allow userspace to set maximum VCPU id for VM
196:  b77b7e13f827 <   -:  ------------ kvm: selftests: Add KVM_CAP_MAX_VCPU_ID cap test
197:  694599c8267d <   -:  ------------ KVM: VMX: enable IPI virtualization

200:  2c8beb526ce9 <   -:  ------------ perf/x86/intel: Add EPT-Friendly PEBS for Ice Lake Server
201:  35a6bdffbf21 <   -:  ------------ perf/x86/intel: Handle guest PEBS overflow PMI for KVM guest
202:  907508f75964 <   -:  ------------ perf/x86/core: Pass "struct kvm_pmu *" to determine the guest values
203:  0dc19fcc2471 <   -:  ------------ KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
204:  4282743c110a <   -:  ------------ KVM: x86/pmu: Introduce the ctrl_mask value for fixed counter
205:  db2265f3a9ed <   -:  ------------ x86/perf/core: Add pebs_capable to store valid PEBS_COUNTER_MASK value
206:  34e028092173 <   -:  ------------ KVM: x86/pmu: Add IA32_PEBS_ENABLE MSR emulation for extended PEBS
207:  44d47de274d5 <   -:  ------------ KVM: x86/pmu: Reprogram PEBS event to emulate guest PEBS counter
208:  a095df2c5f48 <   -:  ------------ KVM: x86/pmu: Adjust precise_ip to emulate Ice Lake guest PDIR counter
209:  f32db9822ccb <   -:  ------------ KVM: x86/pmu: Add IA32_DS_AREA MSR emulation to support guest DS
210:  c873e000e103 <   -:  ------------ KVM: x86/pmu: Add PEBS_DATA_CFG MSR emulation to support adaptive PEBS
211:  aa03a92de13a <   -:  ------------ KVM: x86: Set PEBS_UNAVAIL in IA32_MISC_ENABLE when PEBS is enabled
212:  a10cabf6815c <   -:  ------------ KVM: x86/pmu: Move pmc_speculative_in_use() to arch/x86/kvm/pmu.h
213:  e1f82aee2e45 <   -:  ------------ KVM: x86/pmu: Disable guest PEBS temporarily in two rare situations
214:  8eeac7e999e8 <   -:  ------------ KVM: x86/pmu: Add kvm_pmu_cap to optimize perf_get_x86_pmu_capability
215:  1672f447172a <   -:  ------------ KVM: x86/cpuid: Refactor host/guest CPU model consistency check
216:  a3808d884612 <   -:  ------------ KVM: x86/pmu: Expose CPUIDs feature bits PDCM, DS, DTES64

217:  d73829dd797b <   -:  ------------ selftests: kvm: replace ternary operator with min()

246:  47604014f4b2 <   -:  ------------ KVM: x86/pmu: Move the vmx_icl_pebs_cpu[] definition out of the header file

248:  43e88ad5462d <   -:  ------------ KVM: x86/pmu: Update global enable_pmu when PMU is undetected
249:  f9e5edb2e20c <   -:  ------------ KVM: x86/pmu: remove useless prototype

250:  3c13551aca1e <   -:  ------------ KVM: x86/mmu: Drop RWX=0 SPTEs during ept_sync_page()
251:  c84f90442518 <   -:  ------------ KVM: x86/mmu: Comment FNAME(sync_page) to document TLB flushing logic

254:  1ae8c8cc506f <   -:  ------------ KVM: x86/pmu: Don't overwrite the pmu->global_ctrl when refreshing
256:  24045beb918e <   -:  ------------ KVM: x86/pmu: Ignore pmu->global_ctrl check if vPMU doesn't support global_ctrl

263:  8b5bb6866d73 <   -:  ------------ KVM: nSVM: Sync next_rip field from vmcb12 to vmcb02
264:  18e7b090afa3 <   -:  ------------ KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
265:  c7b62aed6b63 <   -:  ------------ KVM: SVM: Unwind "speculative" RIP advancement if INTn injection "fails"
266:  e395d5155d5f <   -:  ------------ KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported
267:  5f04b27c5e6a <   -:  ------------ KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction
268:  1808e98b3243 <   -:  ------------ KVM: SVM: Re-inject INTn instead of retrying the insn on "failure"
269:  78f035193a5d <   -:  ------------ KVM: x86: Trace re-injected exceptions
270:  6f03e4af9d88 <   -:  ------------ KVM: x86: Print error code in exception injection tracepoint iff valid
271:  87c326c9d672 <   -:  ------------ KVM: x86: Differentiate Soft vs. Hard IRQs vs. reinjected in tracepoint
272:  f1360dfcca6e <   -:  ------------ KVM: nSVM: Transparently handle L1 -> L2 NMI re-injection
273:  fcbad3abe1b0 <   -:  ------------ KVM: selftests: nSVM: Add svm_nested_soft_inject_test

274:  ecf97ee1ec70 <   -:  ------------ perf/x86/intel: Fix the comment about guest LBR support on KVM
275:  0090251780f2 <   -:  ------------ perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
276:  ca0c1c2b764f <   -:  ------------ KVM: x86: Report XSS as an MSR to be saved if there are supported features
277:  8bcfee39b078 <   -:  ------------ KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
278:  168f789aaf0d <   -:  ------------ KVM: x86: Add Arch LBR MSRs to msrs_to_save_all list
279:  e648e5300017 <   -:  ------------ KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
280:  7876f994c671 <   -:  ------------ KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
281:  1cb63133254c <   -:  ------------ KVM: x86/pmu: Refactor code to support guest Arch LBR
282:  cd71edf727a2 <   -:  ------------ KVM: x86: Refine the matching and clearing logic for supported_xss
283:  3289eaad9d28 <   -:  ------------ KVM: x86/vmx: Check Arch LBR config when return perf capabilities
284:  2c9c5610c397 <   -:  ------------ KVM: x86: Add XSAVE Support for Architectural LBR
285:  a62bb9cd4734 <   -:  ------------ KVM: nVMX: Add necessary Arch LBR settings for nested VM
286:  706408701309 <   -:  ------------ KVM: x86/vmx: Clear Arch LBREn bit before inject #DB to guest
287:  f9dccecb1e86 <   -:  ------------ KVM: x86/vmx: Flip Arch LBREn bit on guest state change
288:  a94e5937c786 <   -:  ------------ KVM: x86: Add Arch LBR data MSR access interface
289:  a80ffe249095 <   -:  ------------ KVM: x86/cpuid: Advertise Arch LBR feature in CPUID

290:  944503434b67 <   -:  ------------ KVM: x86/pmu: Update comments for AMD gp counters
291:  10b3f260a9ba <   -:  ------------ KVM: x86/pmu: Extract check_pmu_event_filter() handling both GP and fixed counters
292:  b1070b1cc80e <   -:  ------------ KVM: x86/pmu: Pass only "struct kvm_pmc *pmc" to reprogram_counter()
293:  2fe380c3736e <   -:  ------------ KVM: x86/pmu: Drop "u64 eventsel" for reprogram_gp_counter()
294:  8f348136b61e <   -:  ------------ KVM: x86/pmu: Drop "u8 ctrl, int idx" for reprogram_fixed_counter()
295:  a6717fc663bd <   -:  ------------ KVM: x86/pmu: Use only the uniform interface reprogram_counter()
296:  7d271cd6af1d <   -:  ------------ KVM: x86/pmu: Use PERF_TYPE_RAW to merge reprogram_{gp,fixed}counter()
306:  d0baf34e4f58 <   -:  ------------ perf: x86/core: Add interface to query perfmon_event_map[] directly
307:  fcfe10b4dfa6 <   -:  ------------ KVM: x86/pmu: Replace pmc_perf_hw_id() with perf_get_hw_event_config()
308:  0356ff9b1093 <   -:  ------------ KVM: x86/pmu: Drop amd_event_mapping[] in the KVM context

will be delayed to 5.20.

Paolo

> Will be in 5.19 merge window:
> * dirty quota
> * nested dirty-log selftest
> 
> After merge window:
> * APICv inhibition on APIC id change
> 
> Delayed to 5.20:
> * eager page splitting
> * CMCI support
> * Hyper-V TLB
> * pfn functions cleanup
> * x2AVIC
> * nested AVIC
> 


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-05-25 11:16 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-21  8:51 Status for 5.19 merge window Paolo Bonzini
2022-05-25 11:15 ` Paolo Bonzini

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.