Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp2291313rda; Tue, 24 Oct 2023 20:17:55 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFDWjLXKM1LyfOW1ydH/++lb8szZNBUm2wmgm32xPtrYy6TDKEPuKZiJz6X7sb1YiEISm/9 X-Received: by 2002:a05:622a:588:b0:41c:d36c:8efd with SMTP id c8-20020a05622a058800b0041cd36c8efdmr15514699qtb.64.1698203875725; Tue, 24 Oct 2023 20:17:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698203875; cv=none; d=google.com; s=arc-20160816; b=lfsRCtRDYGkflv91bS0N7/YBsePA4qblCCX/y6CMURfpTCTjjlZNNmXEXK5+MDdM/X HmL4plbre+LoAczTkHCnLEj3vaRsBQ9gDE2WeswzmHHhxuKlXYRBkJijniaujhr4NQoK 5HMnvSo62UEp0WkUZ31Mm/QyV4aJaVgMY+XZpQEDRqxYIcpXHhJtNGAmmDbCW3RgmRZY iyfHvX7ngfwz7l6k5xbKX7W0Ozgt1weJC+s1l/Cn9WCerJ8hns25TzFWLahiTCZRkusk 2DSqT52JTu3AJcLxkgL9nSZqUWjB+iBY86Alid0HPkAI95Qmd2d2SljqZ0DULDVTjmep O6BA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:subject:user-agent:mime-version:date:message-id :dkim-signature; bh=lSBC2EEzIFGKkcvVEZdun9j4nAtpxrzV4OlXixgyLsk=; fh=PPQxMQuRNnWMUMEPKMOg8ZAIlXsaFoffx3nt4coH9YY=; b=D1N2y/+70rg34rkbdsThE757lWaGRRGjZhwz1cJmuDe8bX6Jt7lWwPQB1IcLxSDvfG pchShMBRifvObp59ZTBFuG6GdJvXen4F9W6yCmHwMFkgSmK+Fb5zlw+C4MIpjbiEly55 T5h2E55QEQUg2jse39gMKlaBetZzXIpU8KLlU0BUBcN2fmj54wh2eKlbyeZDxCnEJ+Z1 u+ThotfYAr/SX47dkeZf12Gez6FXxDV8RXjB2FtiZxEi4qpYXVs1cDzRNAMRx3EGJL3y klcExDDhFPF4Cvwntlur+FiRe0338Wz9DkgHhRjbiE1/LePX0O05ym8nGw+leH2a8v3t Fp/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Q010Fynx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id 144-20020a250b96000000b00d9ad33acd66si9559868ybl.122.2023.10.24.20.17.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Oct 2023 20:17:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Q010Fynx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id C6F1C8040DE0; Tue, 24 Oct 2023 20:17:52 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232486AbjJYDRe (ORCPT + 99 others); Tue, 24 Oct 2023 23:17:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232489AbjJYDRc (ORCPT ); Tue, 24 Oct 2023 23:17:32 -0400 Received: from mail-pf1-x443.google.com (mail-pf1-x443.google.com [IPv6:2607:f8b0:4864:20::443]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C9078182; Tue, 24 Oct 2023 20:17:28 -0700 (PDT) Received: by mail-pf1-x443.google.com with SMTP id d2e1a72fcca58-6b9af7d41d2so4477307b3a.0; Tue, 24 Oct 2023 20:17:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698203848; x=1698808648; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:references:to:subject :user-agent:mime-version:date:message-id:from:to:cc:subject:date :message-id:reply-to; bh=lSBC2EEzIFGKkcvVEZdun9j4nAtpxrzV4OlXixgyLsk=; b=Q010FynxLVxIlNPE/0gmFnT7sNDDWPb5IElqDHbSInlUK1hfNqMTy5dMdJaum9yVF1 05ZEDnuKyb+f/i8bLpc/3D1GdE2fSCGGTs72XSvIKnGYO1UI5TF1u/zEzvwnov1h6pxt f8Og91Wj2F/GbajAjHRXOcIJet+RwpLPt80ydyAC781nfq58fhtAcZ0LhBG/Lf6N3HdJ pqL/eVhQac3Kyb+uQanTEF1zIA/LJrmK8dzskrYEJlACiDxutO8QCTe0SS89stpWpiR3 +IL8+LARYNBGqovVt66tuo1EOjyNgdJJLl6YFGlp0bwd4jDJvcpGDTdNroVc7hg6eu3D 3oIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698203848; x=1698808648; h=content-transfer-encoding:in-reply-to:from:references:to:subject :user-agent:mime-version:date:message-id:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=lSBC2EEzIFGKkcvVEZdun9j4nAtpxrzV4OlXixgyLsk=; b=gROrsmy7K7kuZS8BDJTjKcO/ltcOm4uiol6Ja6tjj/QmAjQOqz/YDysYza38bDZmky C4Lol65qaIyuBSI4RWMqySA6dRnLmVTAaMILL6nMu4ih94pYq2Q4tkWGLSPtY4ygtWJD YLGmKhbulLbloGPcuqWfQxKCHAfe72w9V1kO3CH0kXPX3PMbcBemMiX0a2usA58CP72J 655lCs/K5P2fMqBx2DJRAvfV6nl999vugb4Ec7l8C6mluCtG+08vWPx+R76N3srYxMvR lCwNUzdT6zSkzdeC2IXMY87H6sWCRgFaJGRyBjMLBAbhtVdF075Vs92gu5829XDIipsd hAQw== X-Gm-Message-State: AOJu0Yx8hnGt7NSmRdpyXBRqAltCoaIPBcF4fL3Uf81INrMRM/FiN/xR KuHAWnCr9IgrRHwMFt4ceAA= X-Received: by 2002:a62:f24c:0:b0:690:d620:7801 with SMTP id y12-20020a62f24c000000b00690d6207801mr9777229pfl.11.1698203847897; Tue, 24 Oct 2023 20:17:27 -0700 (PDT) Received: from [192.168.255.10] ([103.7.29.32]) by smtp.gmail.com with ESMTPSA id z4-20020aa79904000000b006b6f3bc8123sm8284926pff.50.2023.10.24.20.17.25 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 24 Oct 2023 20:17:27 -0700 (PDT) Message-ID: Date: Wed, 25 Oct 2023 11:17:20 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Subject: Re: [PATCH v5 08/13] KVM: selftests: Test Intel PMU architectural events on gp counters To: Sean Christopherson , Paolo Bonzini , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Like Xu , Jinrong Liang References: <20231024002633.2540714-1-seanjc@google.com> <20231024002633.2540714-9-seanjc@google.com> From: JinrongLiang In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 24 Oct 2023 20:17:53 -0700 (PDT) 在 2023/10/25 03:49, Sean Christopherson 写道: > On Mon, Oct 23, 2023, Sean Christopherson wrote: >> +static void guest_measure_pmu_v1(struct kvm_x86_pmu_feature event, >> + uint32_t counter_msr, uint32_t nr_gp_counters) >> +{ >> + uint8_t idx = event.f.bit; >> + unsigned int i; >> + >> + for (i = 0; i < nr_gp_counters; i++) { >> + wrmsr(counter_msr + i, 0); >> + wrmsr(MSR_P6_EVNTSEL0 + i, ARCH_PERFMON_EVENTSEL_OS | >> + ARCH_PERFMON_EVENTSEL_ENABLE | intel_pmu_arch_events[idx]); >> + __asm__ __volatile__("loop ." : "+c"((int){NUM_BRANCHES})); >> + >> + if (pmu_is_intel_event_stable(idx)) >> + GUEST_ASSERT_EQ(this_pmu_has(event), !!_rdpmc(i)); >> + >> + wrmsr(MSR_P6_EVNTSEL0 + i, ARCH_PERFMON_EVENTSEL_OS | >> + !ARCH_PERFMON_EVENTSEL_ENABLE | >> + intel_pmu_arch_events[idx]); >> + wrmsr(counter_msr + i, 0); >> + __asm__ __volatile__("loop ." : "+c"((int){NUM_BRANCHES})); >> + >> + if (pmu_is_intel_event_stable(idx)) >> + GUEST_ASSERT(!_rdpmc(i)); >> + } >> + >> + GUEST_DONE(); >> +} >> + >> +static void guest_measure_loop(uint8_t idx) >> +{ >> + const struct { >> + struct kvm_x86_pmu_feature gp_event; >> + } intel_event_to_feature[] = { >> + [INTEL_ARCH_CPU_CYCLES] = { X86_PMU_FEATURE_CPU_CYCLES }, >> + [INTEL_ARCH_INSTRUCTIONS_RETIRED] = { X86_PMU_FEATURE_INSNS_RETIRED }, >> + [INTEL_ARCH_REFERENCE_CYCLES] = { X86_PMU_FEATURE_REFERENCE_CYCLES }, >> + [INTEL_ARCH_LLC_REFERENCES] = { X86_PMU_FEATURE_LLC_REFERENCES }, >> + [INTEL_ARCH_LLC_MISSES] = { X86_PMU_FEATURE_LLC_MISSES }, >> + [INTEL_ARCH_BRANCHES_RETIRED] = { X86_PMU_FEATURE_BRANCH_INSNS_RETIRED }, >> + [INTEL_ARCH_BRANCHES_MISPREDICTED] = { X86_PMU_FEATURE_BRANCHES_MISPREDICTED }, >> + }; >> + >> + uint32_t nr_gp_counters = this_cpu_property(X86_PROPERTY_PMU_NR_GP_COUNTERS); >> + uint32_t pmu_version = this_cpu_property(X86_PROPERTY_PMU_VERSION); >> + struct kvm_x86_pmu_feature gp_event; >> + uint32_t counter_msr; >> + unsigned int i; >> + >> + if (rdmsr(MSR_IA32_PERF_CAPABILITIES) & PMU_CAP_FW_WRITES) >> + counter_msr = MSR_IA32_PMC0; >> + else >> + counter_msr = MSR_IA32_PERFCTR0; >> + >> + gp_event = intel_event_to_feature[idx].gp_event; >> + TEST_ASSERT_EQ(idx, gp_event.f.bit); >> + >> + if (pmu_version < 2) { >> + guest_measure_pmu_v1(gp_event, counter_msr, nr_gp_counters); > > Looking at this again, testing guest PMU version 1 is practically impossible > because this testcase doesn't force the guest PMU version. I.e. unless I'm > missing something, this requires old hardware or running in a VM with its PMU > forced to '1'. > > And if all subtests use similar inputs, the common configuration can be shoved > into pmu_vm_create_with_one_vcpu(). > > It's easy enough to fold test_intel_arch_events() into test_intel_counters(), > which will also provide coverage for running with full-width writes enabled. The > only downside is that the total runtime will be longer. > >> +static void test_arch_events_cpuid(uint8_t i, uint8_t j, uint8_t idx) >> +{ >> + uint8_t arch_events_unavailable_mask = BIT_ULL(j); >> + uint8_t arch_events_bitmap_size = BIT_ULL(i); >> + struct kvm_vcpu *vcpu; >> + struct kvm_vm *vm; >> + >> + vm = pmu_vm_create_with_one_vcpu(&vcpu, guest_measure_loop); >> + >> + vcpu_set_cpuid_property(vcpu, X86_PROPERTY_PMU_EBX_BIT_VECTOR_LENGTH, >> + arch_events_bitmap_size); >> + vcpu_set_cpuid_property(vcpu, X86_PROPERTY_PMU_EVENTS_MASK, >> + arch_events_unavailable_mask); >> + >> + vcpu_args_set(vcpu, 1, idx); >> + >> + run_vcpu(vcpu); >> + >> + kvm_vm_free(vm); >> +} >> + >> +static void test_intel_arch_events(void) >> +{ >> + uint8_t idx, i, j; >> + >> + for (idx = 0; idx < NR_INTEL_ARCH_EVENTS; idx++) { > > There's no need to iterate over each event in the host, we can simply add a wrapper > for guest_measure_loop() in the guest. That'll be slightly faster since it won't > require creating and destroying a VM for every event. > >> + /* >> + * A brute force iteration of all combinations of values is >> + * likely to exhaust the limit of the single-threaded thread >> + * fd nums, so it's test by iterating through all valid >> + * single-bit values. >> + */ >> + for (i = 0; i < NR_INTEL_ARCH_EVENTS; i++) { > > This is flawed/odd. 'i' becomes arch_events_bitmap_size, i.e. it's a length, > but the length is computed byt BIT(i). That's nonsensical and will eventually > result in undefined behavior. Oof, that'll actually happen sooner than later > because arch_events_bitmap_size is only a single byte, i.e. when the number of > events hits 9, this will try to shove 256 into an 8-bit variable. > > The more correct approach would be to pass in 0..NR_INTEL_ARCH_EVENTS inclusive > as the size. But I think we should actually test 0..length+1, where "length" is > the max of the native length and NR_INTEL_ARCH_EVENTS, i.e. we should verify KVM > KVM handles a size larger than the native length. > >> + for (j = 0; j < NR_INTEL_ARCH_EVENTS; j++) >> + test_arch_events_cpuid(i, j, idx); > > And here, I think it makes sense to brute force all possible values for at least > one configuration. There aren't actually _that_ many values, e.g. currently it's > 64 (I think). E.g. test the native PMU version with the "full" length, and then > test single bits with varying lengths. > > I'll send a v6 later this week. Got it, thanks. Please feel free to let me know if there's anything you'd like me to do.