Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp655984rdb; Tue, 31 Oct 2023 20:16:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHl6pmXZVb+U2W5N8SvFLOXxDdvt2VzzMxyelmNDxjx6n1I+o5mN2Rj/P8JVFhDG7Ln3zBP X-Received: by 2002:a17:90a:49c5:b0:27d:b22b:fb89 with SMTP id l5-20020a17090a49c500b0027db22bfb89mr10348022pjm.35.1698808612705; Tue, 31 Oct 2023 20:16:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698808612; cv=none; d=google.com; s=arc-20160816; b=Pae7ZVr10LMhPAINc/sKBB1Ofk5UjlgJiMJtl1YJ/7fwbgK62mHr81drtPoiC8qRar i5FVp6N8bnx6GHwjjwYDwfA2EeHZE/tE/mf3ypeZ1pmMf81Bysz9c8A36E8VVlVeE0CY eIuQD6s5DXpjlkyRINxl2emuWTL6DUYRL32VYsg1oY9qmlU2TYlOdP9f1pCQrIzz+LHW ls6112nOTYeovND9OL/Egslw8g+Na2A35ZgGim6V2GIp96PNRsJeIrqXgCV5VUpjPGhQ cA884UHGgw5DKQYyUalAR7FcnPHMciH+myhB2Qi0wXe5GRPx8GXYjGko9yefma0RGsDs kA+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=d2qkTsScJPRWG2mRcE0kEqdcYLOx5wB3D4u4QffjxJM=; fh=CkETTnIQAqG0CXR4e8A/WxjDzPdbyHIBcu90HmLosMI=; b=pNEKxVskr/vlsLG7s85rf/Hx7IqxQP5A+RDAmKvTqZfXr6FoUdCbzjpS9KiS8go988 aaTvlWLl8yz6gucAjO8xDC0xvgyuKj3OVbcgbeh9IjqBh7bopEXlvCCK2ry6dVSIV1sC ZYBmTfFzUZ1A1t/MTnBt/+QBW8Hq/LZBJGUHJzIH/GRiavFLhqjNzAahMf37LsuagECp WBUV4N5d+X7CkQzqpb7rBdofAEq1z/ytokCyKzo6Nzs9vj/KyQWkckHHmKy7tdmmThDE CVRtJi96TQ7QEgY4KLrjMXn7Is4FM2QogmNcPUdJE/1zuDNpKfrD+e1imWZkillAw5it ga3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Dn9SXK4Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id q8-20020a17090a7a8800b002791035445esi2014640pjf.76.2023.10.31.20.16.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 20:16:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Dn9SXK4Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 0741E8084048; Tue, 31 Oct 2023 20:16:31 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229850AbjKADQN (ORCPT + 99 others); Tue, 31 Oct 2023 23:16:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48224 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230337AbjKADQK (ORCPT ); Tue, 31 Oct 2023 23:16:10 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D8B6A4; Tue, 31 Oct 2023 20:16:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698808563; x=1730344563; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=saaKNKCsevz6fHFrJEAzjrPd1r0TCI63AXuP13gD10A=; b=Dn9SXK4YaefO9J8EbzY+d7yeMClQfwJiOLVPVJavefG5U6dptGDtw0FL K+SCq/lV1U29iYAcqc1hCjmBNkMJIOBRZO413blscLuj3WsIxWlrtwk+B 2PnzTVvRVv7U8T7HjUzIhwXixd1fEYRLO4vPfUflXxmZep9XeOF1WQwlj piUxeK6fg3F2DF8/VYDPzRn+FN8bC+/QGU8Cm/LVJoUCHmelTOa6K7r68 76AGE/ZW0nKi4GHCKmNIQKXac82n8OVDRbN8FKQ+ihmuGopNgXV596Wqf CQpgCA0KZmOPWee10OpyPRBge553V2UiQxuSR8/DLEIUoDsOL/9oqeo/Q w==; X-IronPort-AV: E=McAfee;i="6600,9927,10880"; a="373474001" X-IronPort-AV: E=Sophos;i="6.03,267,1694761200"; d="scan'208";a="373474001" Received: from orviesa002.jf.intel.com ([10.64.159.142]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 20:16:03 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.03,267,1694761200"; d="scan'208";a="1964523" Received: from dapengmi-mobl1.ccr.corp.intel.com (HELO [10.93.12.33]) ([10.93.12.33]) by orviesa002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 20:16:00 -0700 Message-ID: Date: Wed, 1 Nov 2023 11:15:57 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3 Content-Language: en-US To: Jim Mattson Cc: Sean Christopherson , Paolo Bonzini , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Zhenyu Wang , Zhang Xiong , Mingwei Zhang , Like Xu , Dapeng Mi References: <20231031092921.2885109-1-dapeng1.mi@linux.intel.com> <20231031092921.2885109-5-dapeng1.mi@linux.intel.com> <28796dd3-ac4e-4a38-b9e1-f79533b2a798@linux.intel.com> From: "Mi, Dapeng" In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 31 Oct 2023 20:16:31 -0700 (PDT) On 11/1/2023 10:47 AM, Jim Mattson wrote: > On Tue, Oct 31, 2023 at 7:33 PM Mi, Dapeng wrote: >> >> On 11/1/2023 2:47 AM, Jim Mattson wrote: >>> On Tue, Oct 31, 2023 at 2:22 AM Dapeng Mi wrote: >>>> Intel CPUs, like Sapphire Rapids, introduces a new fixed counter >>>> (fixed counter 3) to counter/sample topdown.slots event, but current >>>> code still doesn't cover this new fixed counter. >>>> >>>> So this patch adds code to validate this new fixed counter can count >>>> slots event correctly. >>> I'm not convinced that this actually validates anything. >>> >>> Suppose, for example, that KVM used fixed counter 1 when the guest >>> asked for fixed counter 3. Wouldn't this test still pass? >> >> Per my understanding, as long as the KVM returns a valid count in the >> reasonable count range, we can think KVM works correctly. We don't need >> to entangle on how KVM really uses the HW, it could be impossible and >> unnecessary. > Now, I see how the Pentium FDIV bug escaped notice. Hey, the numbers > are in a reasonable range. What's everyone upset about? > >> Yeah, currently the predefined valid count range may be some kind of >> loose since I want to cover as much as hardwares and avoid to cause >> regression. Especially after introducing the random jump and clflush >> instructions, the cycles and slots become much more hard to predict. >> Maybe we can have a comparable restricted count range in the initial >> change, and we can loosen the restriction then if we encounter a failure >> on some specific hardware. do you think it's better? Thanks. > I think the test is essentially useless, and should probably just be > deleted, so that it doesn't give a false sense of confidence. IMO, I can't say the tests are totally useless. Yes,  passing the tests doesn't mean the KVM vPMU must work correctly, but we can say there is something probably wrong if it fails to pass these tests. Considering the hardware differences, it's impossible to set an exact value for these events in advance and it seems there is no better method to verify the PMC count as well. I still prefer to keep these tests until we have a better method to verify the accuracy of the PMC count.