diff mbox series

[2/2] KVM: selftests: Test the PMU event "Instructions retired"

Message ID 20221209194957.2774423-3-aaronlewis@google.com (mailing list archive)
State New, archived
Headers show
Series Fix "Instructions Retired" from incorrectly counting | expand

Commit Message

Aaron Lewis Dec. 9, 2022, 7:49 p.m. UTC
Add testing for the event "Instructions retired" (0xc0) in the PMU
event filter on both Intel and AMD to ensure that the event doesn't
count when it is disallowed.  Unlike most of the other events, the
event "Instructions retired", will be incremented by KVM when an
instruction is emulated.  Test that this case is being properly handled
and that KVM doesn't increment the counter when that event is
disallowed.

Signed-off-by: Aaron Lewis <aaronlewis@google.com>
---
 .../kvm/x86_64/pmu_event_filter_test.c        | 157 ++++++++++++------
 1 file changed, 110 insertions(+), 47 deletions(-)

Comments

Sean Christopherson Jan. 4, 2023, 5:35 p.m. UTC | #1
On Fri, Dec 09, 2022, Aaron Lewis wrote:
> Add testing for the event "Instructions retired" (0xc0) in the PMU
> event filter on both Intel and AMD to ensure that the event doesn't
> count when it is disallowed.  Unlike most of the other events, the
> event "Instructions retired", will be incremented by KVM when an
> instruction is emulated.  Test that this case is being properly handled
> and that KVM doesn't increment the counter when that event is
> disallowed.
> 
> Signed-off-by: Aaron Lewis <aaronlewis@google.com>
> ---
>  .../kvm/x86_64/pmu_event_filter_test.c        | 157 ++++++++++++------
>  1 file changed, 110 insertions(+), 47 deletions(-)
> 
> diff --git a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
> index 2de98fce7edd..81311af9522a 100644
> --- a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
> +++ b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
> @@ -54,6 +54,21 @@
>  
>  #define AMD_ZEN_BR_RETIRED EVENT(0xc2, 0)
>  
> +
> +/*
> + * "Retired instructions", from Processor Programming Reference
> + * (PPR) for AMD Family 17h Model 01h, Revision B1 Processors,
> + * Preliminary Processor Programming Reference (PPR) for AMD Family
> + * 17h Model 31h, Revision B0 Processors, and Preliminary Processor
> + * Programming Reference (PPR) for AMD Family 19h Model 01h, Revision
> + * B1 Processors Volume 1 of 2.
> + *    			--- and ---
> + * "Instructions retired", from the Intel SDM, volume 3,
> + * "Pre-defined Architectural Performance Events."
> + */
> +
> +#define INST_RETIRED EVENT(0xc0, 0)
> +
>  /*
>   * This event list comprises Intel's eight architectural events plus
>   * AMD's "retired branch instructions" for Zen[123] (and possibly
> @@ -61,7 +76,7 @@
>   */
>  static const uint64_t event_list[] = {
>  	EVENT(0x3c, 0),
> -	EVENT(0xc0, 0),
> +	INST_RETIRED,

There are multiple refactorings thrown into this single patch.  Please break them
out to their own prep patches, bundling everything together makes it way too hard
to identify the actual functional change.

>  	EVENT(0x3c, 1),
>  	EVENT(0x2e, 0x4f),
>  	EVENT(0x2e, 0x41),

...

> @@ -240,14 +285,39 @@ static struct kvm_pmu_event_filter *remove_event(struct kvm_pmu_event_filter *f,
>  	return f;
>  }
>  
> +#define expect_success(r) __expect_success(r, __func__)

I'm all for macros, but in this case I think it's better to just have the callers
pass in __func__ themselves.  There's going to be copy+paste anyways, the few
extra characters is a non-issue.

Alternatively, make the inner helpers macros, though that'll be annoying to read
and maintain.

And somewhat of a nit, instead of "success" vs. "failure", what about "counting"
vs. "not_counting"?  And s/expect/assert?  Without looking at the low level code,
it wasn't clear to me what "failure" meant.  E.g.

	assert_pmc_counting(r, __func__);

	assert_pmc_not_counting(r, __func__);

> +
> +static void __expect_success(struct perf_results r, const char *func) {

Curly brace on its own line for functions.

> +	if (r.br_count != NUM_BRANCHES)
> +		pr_info("%s: Branch instructions retired = %u (expected %u)\n",
> +			func, r.br_count, NUM_BRANCHES);
> +
> +	TEST_ASSERT(r.br_count,
> +		    "Allowed event, branch instructions retired, is not counting.");
> +	TEST_ASSERT(r.ir_count,
> +		    "Allowed event, instructions retired, is not counting.");	
> +} 
> +
> +#define expect_failure(r) __expect_failure(r, __func__)
> +
> +static void __expect_failure(struct perf_results r, const char *func) {
> +	if (r.br_count)
> +		pr_info("%s: Branch instructions retired = %u (expected 0)\n",
> +			func, r.br_count);

This pr_info() seems silly.  If br_count is non-zero, the assert below will fire, no?

> +
> +	TEST_ASSERT(!r.br_count,
> +		    "Disallowed PMU event, branch instructions retired, is counting");

Either make these inner helpers macros so that the assert is guaranteed unique,
or include the function name in the assert mesage.  If __expect_{failure,success}()
is NOT inlined, but the caller is, then it will be mildly annoying to determine
exactly what test failed.

> +	TEST_ASSERT(!r.ir_count,
> +		    "Disallowed PMU event, instructions retired, is counting");
> +}
> +
diff mbox series

Patch

diff --git a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
index 2de98fce7edd..81311af9522a 100644
--- a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
+++ b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c
@@ -54,6 +54,21 @@ 
 
 #define AMD_ZEN_BR_RETIRED EVENT(0xc2, 0)
 
+
+/*
+ * "Retired instructions", from Processor Programming Reference
+ * (PPR) for AMD Family 17h Model 01h, Revision B1 Processors,
+ * Preliminary Processor Programming Reference (PPR) for AMD Family
+ * 17h Model 31h, Revision B0 Processors, and Preliminary Processor
+ * Programming Reference (PPR) for AMD Family 19h Model 01h, Revision
+ * B1 Processors Volume 1 of 2.
+ *    			--- and ---
+ * "Instructions retired", from the Intel SDM, volume 3,
+ * "Pre-defined Architectural Performance Events."
+ */
+
+#define INST_RETIRED EVENT(0xc0, 0)
+
 /*
  * This event list comprises Intel's eight architectural events plus
  * AMD's "retired branch instructions" for Zen[123] (and possibly
@@ -61,7 +76,7 @@ 
  */
 static const uint64_t event_list[] = {
 	EVENT(0x3c, 0),
-	EVENT(0xc0, 0),
+	INST_RETIRED,
 	EVENT(0x3c, 1),
 	EVENT(0x2e, 0x4f),
 	EVENT(0x2e, 0x41),
@@ -71,6 +86,16 @@  static const uint64_t event_list[] = {
 	AMD_ZEN_BR_RETIRED,
 };
 
+struct perf_results {
+	union {
+		uint64_t raw;
+		struct {
+			uint64_t br_count:32;
+			uint64_t ir_count:32;
+		};
+	};
+};
+
 /*
  * If we encounter a #GP during the guest PMU sanity check, then the guest
  * PMU is not functional. Inform the hypervisor via GUEST_SYNC(0).
@@ -100,6 +125,24 @@  static void check_msr(uint32_t msr, uint64_t bits_to_flip)
 		GUEST_SYNC(0);
 }
 
+static uint64_t test_guest(uint32_t msr_base)
+{
+	struct perf_results r;
+	uint64_t br0, br1;
+	uint64_t ir0, ir1;
+
+	br0 = rdmsr(msr_base + 0);
+	ir0 = rdmsr(msr_base + 1);
+	__asm__ __volatile__("loop ." : "+c"((int){NUM_BRANCHES}));
+	br1 = rdmsr(msr_base + 0);
+	ir1 = rdmsr(msr_base + 1);
+
+	r.br_count = br1 - br0;
+	r.ir_count = ir1 - ir0;
+
+	return r.raw;
+}
+
 static void intel_guest_code(void)
 {
 	check_msr(MSR_CORE_PERF_GLOBAL_CTRL, 1);
@@ -108,16 +151,17 @@  static void intel_guest_code(void)
 	GUEST_SYNC(1);
 
 	for (;;) {
-		uint64_t br0, br1;
+		uint64_t counts;
 
 		wrmsr(MSR_CORE_PERF_GLOBAL_CTRL, 0);
 		wrmsr(MSR_P6_EVNTSEL0, ARCH_PERFMON_EVENTSEL_ENABLE |
 		      ARCH_PERFMON_EVENTSEL_OS | INTEL_BR_RETIRED);
-		wrmsr(MSR_CORE_PERF_GLOBAL_CTRL, 1);
-		br0 = rdmsr(MSR_IA32_PMC0);
-		__asm__ __volatile__("loop ." : "+c"((int){NUM_BRANCHES}));
-		br1 = rdmsr(MSR_IA32_PMC0);
-		GUEST_SYNC(br1 - br0);
+		wrmsr(MSR_P6_EVNTSEL1, ARCH_PERFMON_EVENTSEL_ENABLE |
+		      ARCH_PERFMON_EVENTSEL_OS | INST_RETIRED);
+		wrmsr(MSR_CORE_PERF_GLOBAL_CTRL, 0x3);
+
+		counts = test_guest(MSR_IA32_PMC0);
+		GUEST_SYNC(counts);
 	}
 }
 
@@ -133,15 +177,16 @@  static void amd_guest_code(void)
 	GUEST_SYNC(1);
 
 	for (;;) {
-		uint64_t br0, br1;
+		uint64_t counts;
 
 		wrmsr(MSR_K7_EVNTSEL0, 0);
 		wrmsr(MSR_K7_EVNTSEL0, ARCH_PERFMON_EVENTSEL_ENABLE |
 		      ARCH_PERFMON_EVENTSEL_OS | AMD_ZEN_BR_RETIRED);
-		br0 = rdmsr(MSR_K7_PERFCTR0);
-		__asm__ __volatile__("loop ." : "+c"((int){NUM_BRANCHES}));
-		br1 = rdmsr(MSR_K7_PERFCTR0);
-		GUEST_SYNC(br1 - br0);
+		wrmsr(MSR_K7_EVNTSEL1, ARCH_PERFMON_EVENTSEL_ENABLE |
+		      ARCH_PERFMON_EVENTSEL_OS | INST_RETIRED);
+
+		counts = test_guest(MSR_K7_PERFCTR0);
+		GUEST_SYNC(counts);
 	}
 }
 
@@ -240,14 +285,39 @@  static struct kvm_pmu_event_filter *remove_event(struct kvm_pmu_event_filter *f,
 	return f;
 }
 
+#define expect_success(r) __expect_success(r, __func__)
+
+static void __expect_success(struct perf_results r, const char *func) {
+	if (r.br_count != NUM_BRANCHES)
+		pr_info("%s: Branch instructions retired = %u (expected %u)\n",
+			func, r.br_count, NUM_BRANCHES);
+
+	TEST_ASSERT(r.br_count,
+		    "Allowed event, branch instructions retired, is not counting.");
+	TEST_ASSERT(r.ir_count,
+		    "Allowed event, instructions retired, is not counting.");	
+} 
+
+#define expect_failure(r) __expect_failure(r, __func__)
+
+static void __expect_failure(struct perf_results r, const char *func) {
+	if (r.br_count)
+		pr_info("%s: Branch instructions retired = %u (expected 0)\n",
+			func, r.br_count);
+
+	TEST_ASSERT(!r.br_count,
+		    "Disallowed PMU event, branch instructions retired, is counting");
+	TEST_ASSERT(!r.ir_count,
+		    "Disallowed PMU event, instructions retired, is counting");
+}
+
 static void test_without_filter(struct kvm_vcpu *vcpu)
 {
-	uint64_t count = run_vcpu_to_sync(vcpu);
+	struct perf_results r;
 
-	if (count != NUM_BRANCHES)
-		pr_info("%s: Branch instructions retired = %lu (expected %u)\n",
-			__func__, count, NUM_BRANCHES);
-	TEST_ASSERT(count, "Allowed PMU event is not counting");
+	r.raw = run_vcpu_to_sync(vcpu);
+
+	expect_success(r);
 }
 
 static uint64_t test_with_filter(struct kvm_vcpu *vcpu,
@@ -261,70 +331,63 @@  static void test_amd_deny_list(struct kvm_vcpu *vcpu)
 {
 	uint64_t event = EVENT(0x1C2, 0);
 	struct kvm_pmu_event_filter *f;
-	uint64_t count;
+	struct perf_results r;
 
 	f = create_pmu_event_filter(&event, 1, KVM_PMU_EVENT_DENY);
-	count = test_with_filter(vcpu, f);
-
+	r.raw = test_with_filter(vcpu, f);
 	free(f);
-	if (count != NUM_BRANCHES)
-		pr_info("%s: Branch instructions retired = %lu (expected %u)\n",
-			__func__, count, NUM_BRANCHES);
-	TEST_ASSERT(count, "Allowed PMU event is not counting");
+
+	expect_success(r);
 }
 
 static void test_member_deny_list(struct kvm_vcpu *vcpu)
 {
 	struct kvm_pmu_event_filter *f = event_filter(KVM_PMU_EVENT_DENY);
-	uint64_t count = test_with_filter(vcpu, f);
+	struct perf_results r;
+
+	r.raw = test_with_filter(vcpu, f);
 
 	free(f);
-	if (count)
-		pr_info("%s: Branch instructions retired = %lu (expected 0)\n",
-			__func__, count);
-	TEST_ASSERT(!count, "Disallowed PMU Event is counting");
+
+	expect_failure(r);
 }
 
 static void test_member_allow_list(struct kvm_vcpu *vcpu)
 {
 	struct kvm_pmu_event_filter *f = event_filter(KVM_PMU_EVENT_ALLOW);
-	uint64_t count = test_with_filter(vcpu, f);
+	struct perf_results r;
 
+	r.raw = test_with_filter(vcpu, f);
 	free(f);
-	if (count != NUM_BRANCHES)
-		pr_info("%s: Branch instructions retired = %lu (expected %u)\n",
-			__func__, count, NUM_BRANCHES);
-	TEST_ASSERT(count, "Allowed PMU event is not counting");
+
+	expect_success(r);
 }
 
 static void test_not_member_deny_list(struct kvm_vcpu *vcpu)
 {
 	struct kvm_pmu_event_filter *f = event_filter(KVM_PMU_EVENT_DENY);
-	uint64_t count;
+	struct perf_results r;
 
+	remove_event(f, INST_RETIRED);
 	remove_event(f, INTEL_BR_RETIRED);
 	remove_event(f, AMD_ZEN_BR_RETIRED);
-	count = test_with_filter(vcpu, f);
+	r.raw = test_with_filter(vcpu, f);
 	free(f);
-	if (count != NUM_BRANCHES)
-		pr_info("%s: Branch instructions retired = %lu (expected %u)\n",
-			__func__, count, NUM_BRANCHES);
-	TEST_ASSERT(count, "Allowed PMU event is not counting");
+
+	expect_success(r);
 }
 
 static void test_not_member_allow_list(struct kvm_vcpu *vcpu)
 {
 	struct kvm_pmu_event_filter *f = event_filter(KVM_PMU_EVENT_ALLOW);
-	uint64_t count;
+	struct perf_results r;
 
+	remove_event(f, INST_RETIRED);
 	remove_event(f, INTEL_BR_RETIRED);
 	remove_event(f, AMD_ZEN_BR_RETIRED);
-	count = test_with_filter(vcpu, f);
-	free(f);
-	if (count)
-		pr_info("%s: Branch instructions retired = %lu (expected 0)\n",
-			__func__, count);
-	TEST_ASSERT(!count, "Disallowed PMU Event is counting");
+	r.raw = test_with_filter(vcpu, f);
+
+	expect_failure(r);
 }
 
 /*