xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
To: Suravee Suthikulanit <suravee.suthikulpanit@amd.com>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	George Dunlap <George.Dunlap@eu.citrix.com>,
	"haitao.shan@intel.com" <haitao.shan@intel.com>,
	"Shin, Jacob" <Jacob.Shin@amd.com>,
	"dietmar.hahn@ts.fujitsu.com" <dietmar.hahn@ts.fujitsu.com>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
	"jun.nakajima@intel.com" <jun.nakajima@intel.com>
Subject: Re: [PATCH 3/8] x86/AMD: Read VPMU MSRs from context when it is not loaded into HW
Date: Wed, 19 Jun 2013 19:53:51 -0400	[thread overview]
Message-ID: <51C2448F.6060701@oracle.com> (raw)
In-Reply-To: <51C23F96.5080509@oracle.com>


[-- Attachment #1.1: Type: text/plain, Size: 2318 bytes --]

On 06/19/2013 07:32 PM, Boris Ostrovsky wrote:
> On 06/19/2013 06:56 PM, Suravee Suthikulanit wrote:
>>> >
>>> > http://lists.xen.org/archives/html/xen-devel/2013-04/msg01028.html:
>>> >
>>> > diff --git a/tools/libxc/xc_cpuid_x86.c b/tools/libxc/xc_cpuid_x86.c
>>> > index 17efc0f..c269468 100644
>>> > --- a/tools/libxc/xc_cpuid_x86.c
>>> > +++ b/tools/libxc/xc_cpuid_x86.c
>>> > @@ -112,6 +112,7 @@ static void amd_xc_cpuid_policy(
>>> >                       bitmaskof(X86_FEATURE_XOP) |
>>> >                       bitmaskof(X86_FEATURE_FMA4) |
>>> >                       bitmaskof(X86_FEATURE_TBM) |
>>> > +                    bitmaskof(X86_FEATURE_PERFCTR_CORE) |
>>> >                       bitmaskof(X86_FEATURE_LWP));
>>> > regs[3] &= (0x0183f3ff | /* features shared with 0x00000001:EDX */
>>> >                       (is_pae ? bitmaskof(X86_FEATURE_NX) : 0) |
>>> >
>>> > Or maybe not since vpmu is not on by default .. ?
>>>
>>> I would say not yet. As the vpmu=1 (at least on Intel) has some issues.
>>> Until that is fixed and vpmu=1 is by default lets leave it as so.
>>>
>>> >
>>>
>> Konrad, Boris:
>> I would like to ask you to reconsider accepting this patch for 4.3.
>
> I think it missed 4.3 anyway.


OK, I think I misunderstood your question --- I thought you were asking 
to back out this patch because you found that something is broken with 
it. Instead you do want to have it in 4.3. Sorry.

This is probably request for George then (but I suspect it's too late now).

-boris


>
>> This bit and vpmu=1 are independent of each other.  Without vpmu=1 option, PERF in HVM guest
>> will not work regardless of this bit. So, it should be safe to always setting this bit.
>> However, if user set vpmu=1 and not _manually_ setting this bit, the PERF logic will
>> break and users will be getting incorrect result.
>
>
> Why would you need to set this bit by hand in addition to having the 
> patch? With this patch I see ecx=0x00a18bf3. I.e. bit 23 is set, as 
> expected.
>
> -boris
>
>
>> The bit is currently used in the Linux PERF logic for all family15h to
>> tell that there are 6 counters instead of 4 counters (when bit the is not set).
>> Also, it will be using a different set of event constrain. The current Linux PERF
>> core PMU logic assume that this bit will always be available.


[-- Attachment #1.2: Type: text/html, Size: 4785 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

  reply	other threads:[~2013-06-19 23:53 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-04-09 17:26 [PATCH 0/8] Various VPMU patches Boris Ostrovsky
2013-04-09 17:26 ` [PATCH 1/8] x86/AMD: Allow more fine-grained control of VMCB MSR Permission Map Boris Ostrovsky
2013-04-09 17:26 ` [PATCH 2/8] x86/AMD: Do not intercept access to performance counters MSRs Boris Ostrovsky
2013-04-10 13:25   ` Jan Beulich
2013-04-09 17:26 ` [PATCH 3/8] x86/AMD: Read VPMU MSRs from context when it is not loaded into HW Boris Ostrovsky
2013-04-11 18:26   ` Suravee Suthikulpanit
2013-04-11 18:34     ` Boris Ostrovsky
2013-04-11 19:30       ` Suravee Suthikulpanit
2013-04-16 15:41       ` Konrad Rzeszutek Wilk
2013-04-16 17:12         ` Jacob Shin
2013-04-16 18:36           ` Konrad Rzeszutek Wilk
2013-06-19 22:56             ` Suravee Suthikulanit
2013-06-19 23:32               ` Boris Ostrovsky
2013-06-19 23:53                 ` Boris Ostrovsky [this message]
2013-04-09 17:26 ` [PATCH 4/8] x86/AMD: Stop counters on VPMU save Boris Ostrovsky
2013-04-09 17:26 ` [PATCH 5/8] x86/VPMU: Add Haswell support Boris Ostrovsky
2013-04-09 17:26 ` [PATCH 6/8] x86/VPMU: Factor out VPMU common code Boris Ostrovsky
2013-04-10 16:03   ` Nakajima, Jun
2013-04-09 17:26 ` [PATCH 7/8] x86/VPMU: Save/restore VPMU only when necessary Boris Ostrovsky
2013-04-10  8:57   ` Dietmar Hahn
2013-04-10 12:53     ` Boris Ostrovsky
2013-04-09 17:26 ` [PATCH 8/8] x86/AMD: Clean up context_update() in AMD VPMU code Boris Ostrovsky
2013-04-11 19:48   ` Suravee Suthikulpanit
2013-04-11 20:42     ` Boris Ostrovsky
2013-04-10  8:57 ` [PATCH 0/8] Various VPMU patches Dietmar Hahn
2013-04-10 18:49 ` Suravee Suthikulanit
2013-04-10 19:10   ` Boris Ostrovsky

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=51C2448F.6060701@oracle.com \
    --to=boris.ostrovsky@oracle.com \
    --cc=George.Dunlap@eu.citrix.com \
    --cc=Jacob.Shin@amd.com \
    --cc=dietmar.hahn@ts.fujitsu.com \
    --cc=haitao.shan@intel.com \
    --cc=jun.nakajima@intel.com \
    --cc=konrad.wilk@oracle.com \
    --cc=suravee.suthikulpanit@amd.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).