Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp642297rdb; Tue, 31 Oct 2023 19:34:24 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF+5jTGmMZ18YZO2PSmv/iitQPelqmlyjJaAnSMh79qk/MfR3ARV+/8SRrSNyxhbPOjfZOp X-Received: by 2002:a1f:f28f:0:b0:49a:b9ed:8c1f with SMTP id q137-20020a1ff28f000000b0049ab9ed8c1fmr10047356vkh.0.1698806064560; Tue, 31 Oct 2023 19:34:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698806064; cv=none; d=google.com; s=arc-20160816; b=bAKONqCFFZCqjjZ7ka6757VISSSkEX8Owbl0nwp/n4eC9RrzzEBBMtAsX8ZJLO8Pnh vE+cCoQCkq9eVs/F5FaDNoMRXFiZvZV2AddDkMfYCeudBORr2U/j2jran4NH58ikHi8G 7cD1Sv3Ja/JkpPV7vjkKFKKfzStyrT/Adw9d6FbF3D2suKSNjmTrGgQk7mdYcRI3nO0E QsQ+CSE4ktsk2WPdpQdUv6sltbQzfQKDF3txDODp6OO9ULxrnhL352PinED+j16CwLxp /TkKuBbsThncsxNPRxlseQ1tIDqMZ0qMnG1zGBrWtlpgzMY/kORoTSnXF34gEtWZVZ/1 Cv1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=PD9uZTxYDIMwDRZs/skj05uAU1c7b32WJI49og3jhr4=; fh=CkETTnIQAqG0CXR4e8A/WxjDzPdbyHIBcu90HmLosMI=; b=NhQyLQypKD+1Oy0dgvvoy4IQBzw9SaO987dL2d+G9xhJ2qVUkqpaMPHAID0FrCyRo/ PeXbC/LTbGNOsgtRhF0OP4J2i8gPlUktK0iDyIuO2w7i3+FwGdrnGocPPxyI5tMF/9OL TnjclCfURSQj0RH41nKXUt8Gppz72CrbovuGIc5Uc1+F53t2LIWa9dIjb9VtRi9Uy3Oy fW5/m7+z5jsGGA8DjOaO4/wwHIzUWbX/Uz+Wi9V+m+96/cE0RCcYBEred3pGwbCzU4YO norNVe8AtjwRWfyrmhwOsRpOxKufQWA2hBIGfeCZNnShdEIVghSfvyw8xszstKgjmR5P t0iw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=SywK1OcB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id y14-20020a655a0e000000b005b9b68add8bsi2022159pgs.785.2023.10.31.19.34.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 19:34:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=SywK1OcB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id BD3B480CA09A; Tue, 31 Oct 2023 19:34:19 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345154AbjKACd7 (ORCPT + 99 others); Tue, 31 Oct 2023 22:33:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45246 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345099AbjKACd4 (ORCPT ); Tue, 31 Oct 2023 22:33:56 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41166BD; Tue, 31 Oct 2023 19:33:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698806031; x=1730342031; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=VM1SwW2sLu8vpMwvfts1qGcCzaC89DFJLSyEUxN/3V0=; b=SywK1OcBVlIQEOm5zXQ/162dpRwHOdgGfDeFZFPG3HA6g4mLmtp9HSdF PjvT4PpE2ElXlMdP1Qc2LZBp65yuWedZ4DBv3/pEuiB1V4/a5Ku8qiZJz Uj78sjgQmSF8O6gcteqiyn+JqAN6BmEPCitSbipK2ko4EJcN0/UJGFpdS toiveEoOm9RyGH2f/MMVSvWhy1WanRJA4QBs2f/E7+dQZgovCUexga/so 14PNTysd1/JifGak2fNzak1UJNRNLzVcVwPjEh5oL7dnJ6wuVBQljpnLY 8IBRm8Ei5XFmckDQmGJ+io04XkwSxek+umLJmXLd9UBjPcJYoKQSmkZg0 w==; X-IronPort-AV: E=McAfee;i="6600,9927,10880"; a="373468510" X-IronPort-AV: E=Sophos;i="6.03,266,1694761200"; d="scan'208";a="373468510" Received: from fmviesa002.fm.intel.com ([10.60.135.142]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 19:33:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.03,266,1694761200"; d="scan'208";a="2041477" Received: from dapengmi-mobl1.ccr.corp.intel.com (HELO [10.93.12.33]) ([10.93.12.33]) by fmviesa002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 19:33:48 -0700 Message-ID: <28796dd3-ac4e-4a38-b9e1-f79533b2a798@linux.intel.com> Date: Wed, 1 Nov 2023 10:33:45 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3 Content-Language: en-US To: Jim Mattson Cc: Sean Christopherson , Paolo Bonzini , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Zhenyu Wang , Zhang Xiong , Mingwei Zhang , Like Xu , Dapeng Mi References: <20231031092921.2885109-1-dapeng1.mi@linux.intel.com> <20231031092921.2885109-5-dapeng1.mi@linux.intel.com> From: "Mi, Dapeng" In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 31 Oct 2023 19:34:19 -0700 (PDT) On 11/1/2023 2:47 AM, Jim Mattson wrote: > On Tue, Oct 31, 2023 at 2:22 AM Dapeng Mi wrote: >> Intel CPUs, like Sapphire Rapids, introduces a new fixed counter >> (fixed counter 3) to counter/sample topdown.slots event, but current >> code still doesn't cover this new fixed counter. >> >> So this patch adds code to validate this new fixed counter can count >> slots event correctly. > I'm not convinced that this actually validates anything. > > Suppose, for example, that KVM used fixed counter 1 when the guest > asked for fixed counter 3. Wouldn't this test still pass? Per my understanding, as long as the KVM returns a valid count in the reasonable count range, we can think KVM works correctly. We don't need to entangle on how KVM really uses the HW, it could be impossible and unnecessary. Yeah, currently the predefined valid count range may be some kind of loose since I want to cover as much as hardwares and avoid to cause regression. Especially after introducing the random jump and clflush instructions, the cycles and slots become much more hard to predict. Maybe we can have a comparable restricted count range in the initial change, and we can loosen the restriction then if we encounter a failure on some specific hardware. do you think it's better? Thanks. > >> Signed-off-by: Dapeng Mi >> --- >> x86/pmu.c | 1 + >> 1 file changed, 1 insertion(+) >> >> diff --git a/x86/pmu.c b/x86/pmu.c >> index 6bd8f6d53f55..404dc7b62ac2 100644 >> --- a/x86/pmu.c >> +++ b/x86/pmu.c >> @@ -47,6 +47,7 @@ struct pmu_event { >> {"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N}, >> {"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 500*N}, >> {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 300*N}, >> + {"fixed 4", MSR_CORE_PERF_FIXED_CTR0 + 3, 1*N, 5000*N}, >> }; >> >> char *buf; >> -- >> 2.34.1 >>