Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp5562221iob; Mon, 9 May 2022 20:48:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxDQN+nqbYbfnWnu30+OP+VNcq6fugbzwU4OxHklAirmd0kDOq7J2q/MzRy27VrfUqj1UkL X-Received: by 2002:a17:907:9690:b0:6f5:160a:25b8 with SMTP id hd16-20020a170907969000b006f5160a25b8mr17915955ejc.504.1652154482843; Mon, 09 May 2022 20:48:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652154482; cv=none; d=google.com; s=arc-20160816; b=dtkmokeBuN/hC9Vl2LPCm0Jk+9p+y9JVolmO5I99nNzDMVnHTY5lR81QkdVSHOQV0C w0tkfsS73gf7q0VS0b43lZd6yVIBfY9KVmvcEwjeVvrWq1T67AmkZ1XVaKQSUKFx8vxd 8Rhju7N48RmXrCb4Yoxhg96gPKOFwxLWyjCdgZ0BTXU1K2IaCbxhfKKFsUTbKZFU5Z+e 9ufFxQ7XbCFj4QJW2Ufp2VnxQKx5T9XJfBBWlOYXK+uGBZD/f9CHmt2U9oIM9S1PVEfh D9iVsiYgiqkSZ/LFcMuMo9HNLIzBeJmZ9AnaUU1GBySpwncU1WBMEh+lPSWhUBPbnke2 boeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=CM1ZHXJBH+7WPe2guc79jxSpfRuS2k3X5i8S5q0s/Ic=; b=EK2Nc1LV6C9Yjtrom0bL3uwq/ovYRrGWwzFcbZhpwXycuJaRg++MSpFuEAhjZvFujX HXlfU+lD0NesftsdI/orNbWOx3GeI+b0GZ3WSjuNIfsd+9IHCyPVFVCDLr0iohbme+fV spJwJIPgwSURL++13QZyKzJ9jTWFzv+Cff2275FVDh2Djcib+b1OvsLcPiWhn2OoQOhl WiMcptBNiSiufW/K0Zo2rj9MFxRj99T477y/ruXFTrCdeWcr7xtvR6Nu8JCQLlfKit9R OZ2fZILGbgEsmCZNjgnlLEuEdohXitIUOKAGu4Lh7PyPBNV2yI/mW8SRjOjF8XjxO7mI kUyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="N9/pCRot"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k17-20020a50c091000000b00428587eae5asi10823623edf.136.2022.05.09.20.47.39; Mon, 09 May 2022 20:48:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="N9/pCRot"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233330AbiEJABy (ORCPT + 99 others); Mon, 9 May 2022 20:01:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232632AbiEJABw (ORCPT ); Mon, 9 May 2022 20:01:52 -0400 Received: from mail-pj1-x102c.google.com (mail-pj1-x102c.google.com [IPv6:2607:f8b0:4864:20::102c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B878E2BD0EE for ; Mon, 9 May 2022 16:57:56 -0700 (PDT) Received: by mail-pj1-x102c.google.com with SMTP id cx11-20020a17090afd8b00b001d9fe5965b3so655445pjb.3 for ; Mon, 09 May 2022 16:57:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=CM1ZHXJBH+7WPe2guc79jxSpfRuS2k3X5i8S5q0s/Ic=; b=N9/pCRotE4fVphwsb4c28RWabUDzJPxC0pJGDYOqwmkWk7vLJLadD20owReFqiyZJ3 xy7jJLHxwjm55om+ejj2Jy5wcEDmWBpmmmx2fMG8x0gJKTzfAO78UwyWOsFyiaZIQcQu zxzdLtuag+Ze9QcKZZuq8SXX75fb12tc7KhOhgeh6PYZSpwv1jySnX1ypoHHjMwEfSCw otS81bq0ItHye82Ug0N5hayfgMQZYiO+AfEpsHf9fSSX5o4ff526Id5I1rPAeO7PRWft f6RqtzEAcWB+GISMPR425yMp1rZdNGnuPJfL2R7kHWlcaQpvBz6IeZNrQcd6rEgMf8Cj qchA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=CM1ZHXJBH+7WPe2guc79jxSpfRuS2k3X5i8S5q0s/Ic=; b=CyKxyJuiGldhPLvu7bigK/0+z4AWiQfFBF4aR/diBQapoWNRZKemy/32Z309iTKefr gR8RAGU15lIDaTSEsXh8S9owJkCHChn+s7GXOoK3FG4JEWM5jblHMWtfB4x6FCFmzEFJ dbL5LCmEJMjMJ88DPnaZf0jpgGTNmf6BIrtNwg13iqUQOAWa6zINUhhUAUZdnkb+uDPX c99UA0riht23UGbcc3qkJF59+GksUV1t4i/FsU+kz+piMEsZgJg39/tQoYBzcT6cyyRL 5YP21ubCPUzRoetXzdwoB8lSK7qvCnP/X0ycIsQD9H/1b74PFyAY4ZJijgrmfRrz/Ogh zh5w== X-Gm-Message-State: AOAM5310gHZJw0T0w8EWukKG8rbpGQ+mneY5f4zOoufXfy7y9Ip35YOf jck13wdyp2PvEdXOEkVcNorOQw== X-Received: by 2002:a17:902:f789:b0:156:5f56:ddff with SMTP id q9-20020a170902f78900b001565f56ddffmr18504210pln.116.1652140676125; Mon, 09 May 2022 16:57:56 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id pt7-20020a17090b3d0700b001cd630f301fsm277263pjb.36.2022.05.09.16.57.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 16:57:55 -0700 (PDT) Date: Mon, 9 May 2022 23:57:52 +0000 From: Sean Christopherson To: Wei Zhang Cc: Suleiman Souhlal , Sangwhan Moon , Ingo Molnar , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/2] KVM: x86: Fix incorrect VM-exit profiling Message-ID: References: <20220412195846.3692374-1-zhanwei@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220412195846.3692374-1-zhanwei@google.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 12, 2022, Wei Zhang wrote: > The profile=kvm boot option has been useful because it provides a > convenient approach to profile VM exits. What exactly are you profiling? Where the guest executing at any given exit? Mostly out of curiosity, but also in the hope that we might be able to replace profiling with a dedicated KVM stat(s).