From: Nikunj A Dadhania <nikunj@amd.com>
To: <kvm@vger.kernel.org>, <seanjc@google.com>, <pbonzini@redhat.com>
Cc: <thomas.lendacky@amd.com>, <bp@alien8.de>,
<joao.m.martins@oracle.com>, <nikunj@amd.com>,
<kai.huang@intel.com>
Subject: [PATCH v6 0/7] KVM: SVM: Add Page Modification Logging (PML) support
Date: Tue, 7 Apr 2026 06:32:38 +0000 [thread overview]
Message-ID: <20260407063245.2755579-1-nikunj@amd.com> (raw)
This series implements Page Modification Logging (PML) for guests on AMD
processors, bringing hardware-assisted dirty logging support. PML is designed
to track guest modified memory pages. PML enables the hypervisor to identify
which pages in a guest's memory have been modified since the last checkpoint or
during live migration.
The PML feature uses two new VMCB fields (PML_ADDR and PML_INDEX) and
generates a VMEXIT when the 4KB log buffer becomes full.
The feature is enabled by default when hardware support is detected and
can be disabled via the 'pml' module parameter.
Changelog:
v6:
* Collect RoBs
* Rebase on latest kvm/master
* Dropped SEV PML selftest (Kai Huang)
* Added guard(svm_vmcb01) helpers to temporarily switch to vmcb01
* Use guard(svm_vmcb01) to ensure vmcb01 is targeted during PML updates when L2
is active, similar to VMX. Dropped patch moving nested CPU dirty logging to
common code; upstream now updates vmcs01 on-demand via temporary VMCS switch
instead of deferring updates.
v5: https://lore.kernel.org/kvm/20260105063622.894410-1-nikunj@amd.com/
* Rebased on latest kvm/next
* Use EXPORT_SYMBOL_FOR_KVM_INTERNAL (Kai Huang)
* Use cpu_dirty_log_size instead of enable_pml for PML checks, with this patch
moving enable_pml to common code is not needed (Kai Huang)
* Added SEV PML self test
Nikunj A Dadhania (7):
KVM: x86: Carve out PML flush routine
KVM: x86: Move PML page to common vcpu arch structure
KVM: VMX: Use cpu_dirty_log_size instead of enable_pml for PML checks
x86/cpufeatures: Add Page modification logging
KVM: SVM: Use BIT_ULL for 64-bit nested_ctl bit definitions
KVM: nSVM: Add helpers to temporarily switch to vmcb01
KVM: SVM: Add Page modification logging support
arch/x86/include/asm/cpufeatures.h | 1 +
arch/x86/include/asm/kvm_host.h | 2 +
arch/x86/include/asm/svm.h | 12 ++-
arch/x86/include/uapi/asm/svm.h | 2 +
arch/x86/kernel/cpu/scattered.c | 1 +
arch/x86/kvm/svm/nested.c | 13 ++-
arch/x86/kvm/svm/sev.c | 2 +-
arch/x86/kvm/svm/svm.c | 125 ++++++++++++++++++++++++++++-
arch/x86/kvm/svm/svm.h | 3 +
arch/x86/kvm/vmx/vmx.c | 50 ++++--------
arch/x86/kvm/vmx/vmx.h | 7 --
arch/x86/kvm/x86.c | 31 +++++++
arch/x86/kvm/x86.h | 8 ++
13 files changed, 206 insertions(+), 51 deletions(-)
base-commit: df83746075778958954aa0460cca55f4b3fc9c02
--
2.48.1
next reply other threads:[~2026-04-07 6:33 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-07 6:32 Nikunj A Dadhania [this message]
2026-04-07 6:32 ` [PATCH v6 1/7] KVM: x86: Carve out PML flush routine Nikunj A Dadhania
2026-05-08 22:52 ` Sean Christopherson
2026-05-12 5:36 ` Nikunj A. Dadhania
2026-04-07 6:32 ` [PATCH v6 2/7] KVM: x86: Move PML page to common vcpu arch structure Nikunj A Dadhania
2026-05-08 22:57 ` Sean Christopherson
2026-05-12 5:45 ` Nikunj A. Dadhania
2026-04-07 6:32 ` [PATCH v6 3/7] KVM: VMX: Use cpu_dirty_log_size instead of enable_pml for PML checks Nikunj A Dadhania
2026-04-07 6:32 ` [PATCH v6 4/7] x86/cpufeatures: Add Page modification logging Nikunj A Dadhania
2026-04-07 6:32 ` [PATCH v6 5/7] KVM: SVM: Use BIT_ULL for 64-bit nested_ctl bit definitions Nikunj A Dadhania
2026-04-07 6:32 ` [PATCH v6 6/7] KVM: nSVM: Add helpers to temporarily switch to vmcb01 Nikunj A Dadhania
2026-04-07 6:32 ` [PATCH v6 7/7] KVM: SVM: Add Page modification logging support Nikunj A Dadhania
2026-04-20 6:38 ` Nikunj A. Dadhania
2026-04-21 15:08 ` Sean Christopherson
2026-04-21 23:50 ` Huang, Kai
2026-04-22 0:30 ` Sean Christopherson
2026-04-22 1:42 ` Huang, Kai
2026-04-22 5:59 ` Nikunj A. Dadhania
2026-04-22 8:14 ` Huang, Kai
2026-04-22 13:20 ` Sean Christopherson
2026-04-22 22:14 ` Huang, Kai
2026-04-24 16:25 ` Tom Lendacky
2026-04-25 14:45 ` Tom Lendacky
2026-04-27 20:16 ` Sean Christopherson
2026-05-14 4:14 ` Nikunj A. Dadhania
2026-04-21 23:04 ` Yosry Ahmed
2026-04-21 23:15 ` Sean Christopherson
2026-04-22 6:26 ` Nikunj A. Dadhania
2026-04-22 19:48 ` Yosry Ahmed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260407063245.2755579-1-nikunj@amd.com \
--to=nikunj@amd.com \
--cc=bp@alien8.de \
--cc=joao.m.martins@oracle.com \
--cc=kai.huang@intel.com \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=thomas.lendacky@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.