From: Sean Christopherson <seanjc@google.com>
To: Jim Mattson <jmattson@google.com>
Cc: Yosry Ahmed <yosry@kernel.org>,
Paolo Bonzini <pbonzini@redhat.com>,
kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v4 4/6] KVM: x86/pmu: Re-evaluate Host-Only/Guest-Only on nested SVM transitions
Date: Thu, 9 Apr 2026 11:38:33 -0700 [thread overview]
Message-ID: <adfyKU5WUiW4OnUg@google.com> (raw)
In-Reply-To: <CALMp9eTvH1Pg0Eb-KCcX7LLJPFgS1xTSR0DzeA8xo4Re7=p=7w@mail.gmail.com>
On Thu, Apr 09, 2026, Jim Mattson wrote:
> On Thu, Apr 9, 2026 at 10:48 AM Sean Christopherson <seanjc@google.com> wrote:
> > On Thu, Apr 09, 2026, Jim Mattson wrote:
> > > > > In general, this deferral is misguided. The G/H bits should be
> > > > > re-evaluated before we call kvm_pmu_instruction_retired() for an
> > > > > emulated instruction.
> > > > >
> > > > > > ...
> > > > > > diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h
> > > > > > index f1c29ac306917..966e4138308f6 100644
> > > > > > --- a/arch/x86/kvm/x86.h
> > > > > > +++ b/arch/x86/kvm/x86.h
> > > > > > @@ -9,6 +9,7 @@
> > > > > > #include "kvm_cache_regs.h"
> > > > > > #include "kvm_emulate.h"
> > > > > > #include "cpuid.h"
> > > > > > +#include "pmu.h"
> > > > > >
> > > > > > #define KVM_MAX_MCE_BANKS 32
> > > > > >
> > > > > > @@ -152,6 +153,8 @@ static inline void enter_guest_mode(struct kvm_vcpu *vcpu)
> > > > > > {
> > > > > > vcpu->arch.hflags |= HF_GUEST_MASK;
> > > > > > vcpu->stat.guest_mode = 1;
> > > > > > +
> > > > > > + kvm_pmu_handle_nested_transition(vcpu);
> > > > > > }
> > > > >
> > > > > This happens too late for VMRUN, since we have already called
> > > > > kvm_pmu_instruction_retired() via kvm_skip_emulated_instruction(), and
> > > > > VMRUN counts as a *guest* instruction.
> > > >
> > > > It's just VMRUN that's problematic though, correct? I.e. the scheme as a whole
> > > > is fine, we just need to special case VMRUN due to SVM's erratum^Warchitecture.
> > > > Alternatively, maybe we could get AMD to document the silly VMRUN behavior as an
> > > > erratum, then we could claim KVM is architecturally superior. :-D
> > >
> > > Here, it's just VMRUN. Above, it's WRMSR(EFER).
> >
> > But clearing EFER.SVME while in the guest generates architecturally undefined
> > behavior. I don't see any reason to complicate PMU virtualization for that
> > scenario, especially now that KVM synthesizes triple fault for L1.
>
> L1 can clear the virtual EFER.SVME. That is well-defined.
Gah, I forgot that the H/G bits are ignored when EFER.SVME=0. That's really
annoying.
next prev parent reply other threads:[~2026-04-09 18:38 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-26 3:11 [PATCH v4 0/6] KVM: x86/pmu: Add support for AMD Host-Only/Guest-Only bits Yosry Ahmed
2026-03-26 3:11 ` [PATCH v4 1/6] KVM: x86: Move enable_pmu/enable_mediated_pmu to pmu.h and pmu.c Yosry Ahmed
2026-03-26 3:11 ` [PATCH v4 2/6] KVM: x86: Move guest_mode helpers to x86.h Yosry Ahmed
2026-03-26 22:48 ` kernel test robot
2026-03-26 23:18 ` Yosry Ahmed
2026-03-27 3:15 ` kernel test robot
2026-03-26 3:11 ` [PATCH v4 3/6] KVM: x86/pmu: Disable counters based on Host-Only/Guest-Only bits in SVM Yosry Ahmed
2026-04-07 1:30 ` Sean Christopherson
2026-04-24 6:55 ` Yosry Ahmed
2026-04-27 18:50 ` Sean Christopherson
2026-04-27 19:11 ` Yosry Ahmed
2026-04-27 19:54 ` Sean Christopherson
2026-04-27 20:02 ` Yosry Ahmed
2026-04-27 20:06 ` Sean Christopherson
2026-04-27 23:20 ` Yosry Ahmed
2026-04-27 23:53 ` Sean Christopherson
2026-04-28 0:34 ` Yosry Ahmed
2026-04-28 0:35 ` Yosry Ahmed
2026-04-28 0:37 ` Yosry Ahmed
2026-03-26 3:11 ` [PATCH v4 4/6] KVM: x86/pmu: Re-evaluate Host-Only/Guest-Only on nested SVM transitions Yosry Ahmed
2026-04-07 1:35 ` Sean Christopherson
2026-04-09 4:59 ` Jim Mattson
2026-04-09 17:22 ` Sean Christopherson
2026-04-09 17:29 ` Jim Mattson
2026-04-09 17:48 ` Sean Christopherson
2026-04-09 18:35 ` Jim Mattson
2026-04-09 18:38 ` Sean Christopherson [this message]
2026-04-09 21:21 ` Sean Christopherson
2026-04-10 3:50 ` Jim Mattson
2026-04-15 21:26 ` Sean Christopherson
2026-04-15 23:07 ` Jim Mattson
2026-04-16 0:29 ` Sean Christopherson
2026-04-17 22:51 ` Jim Mattson
2026-04-21 20:01 ` Yosry Ahmed
2026-04-22 22:42 ` Sean Christopherson
2026-04-24 6:57 ` Yosry Ahmed
2026-03-26 3:11 ` [PATCH v4 5/6] KVM: x86/pmu: Allow Host-Only/Guest-Only bits with nSVM and mediated PMU Yosry Ahmed
2026-03-26 3:11 ` [PATCH v4 6/6] KVM: selftests: Add svm_pmu_host_guest_test for Host-Only/Guest-Only bits Yosry Ahmed
2026-04-07 1:39 ` Sean Christopherson
2026-04-07 3:23 ` Jim Mattson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=adfyKU5WUiW4OnUg@google.com \
--to=seanjc@google.com \
--cc=jmattson@google.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=yosry@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.