Fix a handful of minor PMU MSR issues, mostly related to KVM's reporting and handling of MSRs when the PMU is disabled. E.g. running the state_test selftest with enable_pmu=0 fails because KVM tells userspace to save/restore the fixed counter MSRs, but then rejects attempts to access said MSRs from userspace. Aaron and Like, My plan is to apply this rather quickly, e.g. later this week, as the AMD PMU v2 series can be simplified by taking a dependency on the kvm_pmu_cap.num_counters_gp fix (patch 1). But I'll make sure to place the patches at the end of the pmu queue so that it'll be easy to unwind if there's a fatal bug without affecting the hashes of other PMU stuff destined for 6.3. In other words, please review/test sometime in the next few weeks, even if I queue it. Thanks! Based on: git@xxxxxxxxxx:kvm-x86/linux.git pmu Like Xu (1): KVM: x86/pmu: Don't tell userspace to save MSRs for non-existent fixed PMCs Sean Christopherson (5): KVM: x86/pmu: Cap kvm_pmu_cap.num_counters_gp at KVM's internal max KVM: x86/pmu: Gate all "unimplemented MSR" prints on report_ignored_msrs KVM: x86/pmu: Use separate array for defining "PMU MSRs to save" KVM: x86/pmu: Don't tell userspace to save PMU MSRs if PMU is disabled KVM: x86/pmu: Provide "error" semantics for unsupported-but-known PMU MSRs arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/hyperv.c | 10 +- arch/x86/kvm/pmu.h | 5 +- arch/x86/kvm/svm/pmu.c | 1 + arch/x86/kvm/svm/svm.c | 5 +- arch/x86/kvm/vmx/pmu_intel.c | 1 + arch/x86/kvm/vmx/vmx.c | 4 +- arch/x86/kvm/x86.c | 229 +++++++++++++++++--------------- arch/x86/kvm/x86.h | 12 ++ 9 files changed, 149 insertions(+), 119 deletions(-) base-commit: 647ffac11ebbbd21e04dd11a7125decb99eeee65 -- 2.39.1.456.gfc5497dd1b-goog