Hi Marc, On Tue, 2021-06-15 at 18:05 +0100, Marc Zyngier wrote: > > Can you reproduce the issue with vanilla guest kernels? It'd be > interesting to understand what makes it work on the guest side. Can > you please bisect it? > yes, I was able to narrow it down to the commit 0cbb058be904 ("arm64: perf: Disable PMU while processing counter overflows"), which fixes the problem on the guest side. I _think_, I understand the problem now. Please correct me if I am wrong. commit 30d97754b2d1 ("KVM: arm/arm64: Re-create event when setting counter value") adds a new code path for perf event when counter value is set, therefore kvm would generate more events than before. Without this change, we have a lot less events, thus reducing the chances of guest messing things up. On the other side, commit 8c3252c06516 ("KVM: arm64: pmu: Reset sample period on overflow handling") resets the sample period to the max value, thus reducing the number of overflow events to guest to an optimal value (note, number of interrupts actually handled by guest would remain same in either case). Less number of overflow interrupts to the guest, reduces the chance of guest making up for any left over overflow event that it did not see earlier. Thanks, Aman Priyadarshi Amazon Development Center Germany GmbH Krausenstr. 38 10117 Berlin Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B Sitz: Berlin Ust-ID: DE 289 237 879 _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm