Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp2710117pxf; Sun, 14 Mar 2021 09:04:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzyHsgE+tcBVD4TLMyGV2xpgo0zBUx7750mrxc81pVdZUIO8Rga5L+S9dMJ85av5XJ1b/Ph X-Received: by 2002:aa7:d917:: with SMTP id a23mr25499961edr.122.1615737848771; Sun, 14 Mar 2021 09:04:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615737848; cv=none; d=google.com; s=arc-20160816; b=aooIHJxW9s/FTUxA0dkVofSkiYIMDj3pIF9naIFAVovq/7faBXmdMkMRAn/6AI4/Cr ci/a7ibe315IuTSOjOyzZg9Y6WFBz3gy9PyBN4OD9O4YPkgcsR9rl0bYbAaUChGRl0RD 2F3KJ3GCdnx6rlwADpxvLceKYIZdnjbsHnnj1s9q7QWoqWPDssXADdlq1Z+6N9kbE636 fgnAkLTWezaYunZiu4UAopXhJflkhQW9eB7DL0IMG+C7NFbCmmyw9TZ5pl21e5bW/Lny kbjPROmEMlVDUinmqi4IY2sV1Rf2BF6JXbsDnj8o0v7+MJGP6BoSdGZ5L+M1nBc/n+fQ gDSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=giR8LOQbgv84TrWfeLujXyJr5FDeifltpYziChxofXw=; b=P6NSxjxc9VUU9RgzXXDQxSFZzQigVeCADfBVc5a/V/2Sokzy0/MCxRW+nZ+r/zuw4j s9k+YhBepzyzQhD4VZ+ilijdxMJEMjPgKdNWKh044buCkdo78re51Qatq819Uc8mszw8 yaNmNBZY0bbccrHe39y8OioV58rN6c/WKi9Q2/fgLt2MYp366QEEyPPX0q+28Hbg3CvG X0aR4JrSxHpbGMMqNjoBi77hKAvyDonFhGeIcWV6pZnVhdsBecLr5ZUw7aOnKzoV0SMS jpmOTVHslCQ5r/m4FljfsilUO1AHd5sokLV/XBhaBPE9lijAW0t94TPYMe+R3zho6cd8 AQ5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n1si460311edd.229.2021.03.14.09.03.45; Sun, 14 Mar 2021 09:04:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234728AbhCNQCB (ORCPT + 99 others); Sun, 14 Mar 2021 12:02:01 -0400 Received: from mga14.intel.com ([192.55.52.115]:7174 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234204AbhCNQA7 (ORCPT ); Sun, 14 Mar 2021 12:00:59 -0400 IronPort-SDR: 9tOJP9ZjFj851vNfqCLTlKRQQbKySFl5/ZZoF4xS5KrDayVdZG5izXHpURYf9pqGKajSXlzFh6 at/f76iHmg6w== X-IronPort-AV: E=McAfee;i="6000,8403,9923"; a="188360768" X-IronPort-AV: E=Sophos;i="5.81,248,1610438400"; d="scan'208";a="188360768" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Mar 2021 09:00:59 -0700 IronPort-SDR: FNMvPAvA+DKd0ZQmS4Cd+TtQTo84gtyvQf+j2PfXugx6KgwKs+fI8J2kpf8eWToFruM+FnzpZw YvGHTwjTfF4g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.81,248,1610438400"; d="scan'208";a="439530752" Received: from clx-ap-likexu.sh.intel.com ([10.239.48.108]) by FMSMGA003.fm.intel.com with ESMTP; 14 Mar 2021 09:00:56 -0700 From: Like Xu To: Paolo Bonzini , Sean Christopherson Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, x86@kernel.org, wei.w.wang@intel.com, linux-kernel@vger.kernel.org, Like Xu Subject: [PATCH v2] x86: Update guest LBR tests for Architectural LBR Date: Sun, 14 Mar 2021 23:52:25 +0800 Message-Id: <20210314155225.206661-13-like.xu@linux.intel.com> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20210314155225.206661-1-like.xu@linux.intel.com> References: <20210314155225.206661-1-like.xu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This unit-test is intended to test the basic KVM's support for Architectural LBRs which is a Architectural performance monitor unit (PMU) feature on Intel processors including negative testing on the MSR LBR_DEPTH values. If the LBR bit is set to 1 in the MSR_ARCH_LBR_CTL, the processor will record a running trace of the most recent branches guest taken in the LBR entries for guest to read. Signed-off-by: Like Xu --- x86/pmu_lbr.c | 88 +++++++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 79 insertions(+), 9 deletions(-) diff --git a/x86/pmu_lbr.c b/x86/pmu_lbr.c index 3bd9e9f..8cde208 100644 --- a/x86/pmu_lbr.c +++ b/x86/pmu_lbr.c @@ -6,6 +6,7 @@ #define MAX_NUM_LBR_ENTRY 32 #define DEBUGCTLMSR_LBR (1UL << 0) #define PMU_CAP_LBR_FMT 0x3f +#define KVM_ARCH_LBR_CTL_MASK 0x7f000f #define MSR_LBR_NHM_FROM 0x00000680 #define MSR_LBR_NHM_TO 0x000006c0 @@ -13,6 +14,10 @@ #define MSR_LBR_CORE_TO 0x00000060 #define MSR_LBR_TOS 0x000001c9 #define MSR_LBR_SELECT 0x000001c8 +#define MSR_ARCH_LBR_CTL 0x000014ce +#define MSR_ARCH_LBR_DEPTH 0x000014cf +#define MSR_ARCH_LBR_FROM_0 0x00001500 +#define MSR_ARCH_LBR_TO_0 0x00001600 volatile int count; @@ -61,11 +66,26 @@ static bool test_init_lbr_from_exception(u64 index) return test_for_exception(GP_VECTOR, init_lbr, &index); } +static void change_archlbr_depth(void *depth) +{ + wrmsr(MSR_ARCH_LBR_DEPTH, *(u64 *)depth); +} + +static bool test_change_archlbr_depth_from_exception(u64 depth) +{ + return test_for_exception(GP_VECTOR, change_archlbr_depth, &depth); +} + int main(int ac, char **av) { struct cpuid id = cpuid(10); + struct cpuid id_7 = cpuid(7); + struct cpuid id_1c; u64 perf_cap; int max, i; + bool arch_lbr = false; + u32 ctl_msr = MSR_IA32_DEBUGCTLMSR; + u64 ctl_value = DEBUGCTLMSR_LBR; setup_vm(); perf_cap = rdmsr(MSR_IA32_PERF_CAPABILITIES); @@ -80,8 +100,19 @@ int main(int ac, char **av) return report_summary(); } + if (id_7.d & (1UL << 19)) { + arch_lbr = true; + ctl_msr = MSR_ARCH_LBR_CTL; + /* DEPTH defaults to the maximum number of LBRs entries. */ + max = rdmsr(MSR_ARCH_LBR_DEPTH) - 1; + ctl_value = KVM_ARCH_LBR_CTL_MASK; + } + printf("PMU version: %d\n", eax.split.version_id); - printf("LBR version: %ld\n", perf_cap & PMU_CAP_LBR_FMT); + if (!arch_lbr) + printf("LBR version: %ld\n", perf_cap & PMU_CAP_LBR_FMT); + else + printf("Architectural LBR depth: %d\n", max + 1); /* Look for LBR from and to MSRs */ lbr_from = MSR_LBR_CORE_FROM; @@ -90,32 +121,71 @@ int main(int ac, char **av) lbr_from = MSR_LBR_NHM_FROM; lbr_to = MSR_LBR_NHM_TO; } + if (test_init_lbr_from_exception(0)) { + lbr_from = MSR_ARCH_LBR_FROM_0; + lbr_to = MSR_ARCH_LBR_TO_0; + } if (test_init_lbr_from_exception(0)) { printf("LBR on this platform is not supported!\n"); return report_summary(); } - wrmsr(MSR_LBR_SELECT, 0); - wrmsr(MSR_LBR_TOS, 0); - for (max = 0; max < MAX_NUM_LBR_ENTRY; max++) { - if (test_init_lbr_from_exception(max)) - break; + if (arch_lbr) { + /* + * On processors that support Architectural LBRs, + * IA32_PERF_CAPABILITIES.LBR_FMT will have the value 03FH. + */ + report(0x3f == (perf_cap & PMU_CAP_LBR_FMT), "The guest LBR_FMT value is good."); } + /* Reset the guest LBR entries. */ + if (arch_lbr) { + /* On a software write to IA32_LBR_DEPTH, all LBR entries are reset to 0.*/ + wrmsr(MSR_ARCH_LBR_DEPTH, max + 1); + } else { + wrmsr(MSR_LBR_SELECT, 0); + wrmsr(MSR_LBR_TOS, 0); + for (max = 0; max < MAX_NUM_LBR_ENTRY; max++) { + if (test_init_lbr_from_exception(max)) + break; + } + } report(max > 0, "The number of guest LBR entries is good."); + /* Check the guest LBR entries are initialized. */ + for (i = 0; i < max; ++i) { + if (rdmsr(lbr_to + i) || rdmsr(lbr_from + i)) + break; + } + report(i == max, "The guest LBR initialized FROM_IP/TO_IP values are good."); + /* Do some branch instructions. */ - wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); + wrmsr(ctl_msr, ctl_value); lbr_test(); - wrmsr(MSR_IA32_DEBUGCTLMSR, 0); + wrmsr(ctl_msr, 0); - report(rdmsr(MSR_LBR_TOS) != 0, "The guest LBR MSR_LBR_TOS value is good."); + /* Check if the guest LBR has recorded some branches. */ + if (!arch_lbr) { + report(rdmsr(MSR_LBR_TOS) != 0, "The guest LBR MSR_LBR_TOS value is good."); + } for (i = 0; i < max; ++i) { if (!rdmsr(lbr_to + i) || !rdmsr(lbr_from + i)) break; } report(i == max, "The guest LBR FROM_IP/TO_IP values are good."); + if (!arch_lbr) + return report_summary(); + + /* Negative testing on the LBR_DEPTH MSR values */ + id_1c = cpuid(0x1c); + for (i = 0; i < 8; i++) { + if (id_1c.a & (1UL << i)) + continue; + report(test_change_archlbr_depth_from_exception(8*(i+1)) == 1, + "Negative test: guest LBR depth %d is unsupported.", 8*(i+1)); + } + return report_summary(); } -- 2.29.2