From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-21.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 27691C432BE for ; Mon, 23 Aug 2021 19:37:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 09156613D0 for ; Mon, 23 Aug 2021 19:37:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231967AbhHWTiI (ORCPT ); Mon, 23 Aug 2021 15:38:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45150 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230377AbhHWTiG (ORCPT ); Mon, 23 Aug 2021 15:38:06 -0400 Received: from mail-qt1-x84a.google.com (mail-qt1-x84a.google.com [IPv6:2607:f8b0:4864:20::84a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DD19CC06175F for ; Mon, 23 Aug 2021 12:37:23 -0700 (PDT) Received: by mail-qt1-x84a.google.com with SMTP id o22-20020ac872d60000b029029817302575so9147910qtp.10 for ; Mon, 23 Aug 2021 12:37:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=reply-to:date:message-id:mime-version:subject:from:to:cc; bh=A9qASCHnE3CoN+lt64vMYGtlubN7uOyns9qDV0YSdyw=; b=OCM/cYL9yWCgeUA4usPKXZ3QyCU0qetwqgQCcnn9eeKQyWyTvHbBKdRV7wroQyth4d i25U6rwEpbVIUw99sh1XLUFgd3UzP9KIJ6ingfqQrHCcCRHdzgHBeKiov84D3sVh3iBH OvufjGnaT/56jpgALQVEEDkOHjXtALakBzJpHTCMmEWgRnCfV5FkegsPGofJnt6l4O9x 6i+NzT2X2Y0ASjWcNUQoSyAjJ2phHeefnmJOs1SjMzKXN+ZoI5EAKIcmWl13xu08ontP W4ZisBwStkYAbOHNfLkPAaeqay+yPHKcHc/e1i69Ez7bc9ilG6gBQ0Md8e37UmFbiaTX n+ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:reply-to:date:message-id:mime-version:subject :from:to:cc; bh=A9qASCHnE3CoN+lt64vMYGtlubN7uOyns9qDV0YSdyw=; b=kEf9X8N5m8mourwo8owMjqDzWMPdgW0o/fubwPAmhnzRE4DEu0YGLqfKdNgQy6yxvv BGhiWcrFbFfi0DAEfZ9y+2IllHkgSnhPixamCb+FKMHfVkOMnTJ4Pg05yyX09HKZwTcz xH/gI5WHFNglr1+5p62Udig0vgwCt0qysRT3WXzOVvOrqoSjUarECE7mcERVzLVgcwbL doIQz5Zbsoq36NUCaKRy8oXM/2nH7WWMrK0FYyNy+0hFRTRZ4NMBMTBgdm1fscYMGOky A2j1SWPP+V7GseC9Ojjtd8If9cIX5hIMZt0LtLLdZ3kmSmBRUGLPBjxohRcqA3nGJcVz 9PbQ== X-Gm-Message-State: AOAM532i1UuGggJIBfnTO1Oh6U3bBX9kpFAZBf6ki6u2YnsqChMtOtgp 74oD94NZR3jHS+EHvug/LL8m3Q9W+SY= X-Google-Smtp-Source: ABdhPJza03bRfv3yplWeM4c1rPxZUsU0bC0mYykhv3ilOJ+8ED1Zt/Prcr/1eTVd3dng7bdlZCT3yGXVTk0= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:90:200:109c:7eb8:d5ed:2e59]) (user=seanjc job=sendgmr) by 2002:a05:6214:9d1:: with SMTP id dp17mr22187604qvb.44.1629747442951; Mon, 23 Aug 2021 12:37:22 -0700 (PDT) Reply-To: Sean Christopherson Date: Mon, 23 Aug 2021 12:37:06 -0700 Message-Id: <20210823193709.55886-1-seanjc@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.33.0.rc2.250.ged5fa647cd-goog Subject: [PATCH 0/3] perf/x86/intel: KVM: PT intr handler fix and cleanup From: Sean Christopherson To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Paolo Bonzini Cc: Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , linux-perf-users@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Artem Kashkanov Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Patches 1 and 2 fix a bug where PT PMIs in guest are forwarded to KVM's PT intr handler even if PT is configured for system mode, i.e. when the host is the sole owner of PT. Patch 3 is a related cleanup/optimization. The PT specific stuff is effectively compile-tested only. Sean Christopherson (3): KVM: x86: Register perf callbacks after calling vendor's hardware_setup() KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest perf/x86/intel: Fold current_vcpu check into KVM's PT intr handler arch/x86/events/intel/core.c | 7 +++---- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/pmu.h | 1 + arch/x86/kvm/vmx/vmx.c | 1 + arch/x86/kvm/x86.c | 17 ++++++++++++----- include/linux/perf_event.h | 2 +- 6 files changed, 19 insertions(+), 10 deletions(-) -- 2.33.0.rc2.250.ged5fa647cd-goog