Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp19814690rwd; Wed, 28 Jun 2023 14:57:23 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7gZEnchP8mvHl5Lx23lowXfm0wWJ6i9ypicYWdudr6jrBkDYFYSgUfZH13ZlLEhLxur+zb X-Received: by 2002:a17:907:6d8b:b0:991:f68e:e165 with SMTP id sb11-20020a1709076d8b00b00991f68ee165mr6452369ejc.43.1687989443332; Wed, 28 Jun 2023 14:57:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687989443; cv=none; d=google.com; s=arc-20160816; b=mlkhfZsZQ1/3GoE0shxK0lVpu1NX17AMELhU/rXWzB8pbIqQ6n9M6AnTqewtZGAFbL sr9Krj0AcdOjnhB2Ys43lK/9epDCb5oSCKw6uL1vMEUY9ee7deOukhLfiEski8PN02ac iys2+ATR2RFy/mzv2a690kL+OLPO/6SLpxF6e4oa0fyD8RCbKDp6g4Tu07rr7bj+2Wgz MSbHeEb3MKicvQiMvE8lGNKV70t3DEKyY1di2qa62r1YbHseSys5mgmZKH/BBU39+9Zm 33B30uQfHGQm3nkd9hLLvHa6SmARxSZsyl/fkDGXSrsijQR3Xhvjc7J6696iyO7Guz0B dYfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=pyzXbOu2iHo4bNrZ84ZYxz33c7D4C6GktNZyfo3X6aM=; fh=JAL6+jhkP1rOxFEhLLUvsylRXiDc5PolLUMbC4gF6kc=; b=s7nhGv/kibYscEKfZQUkP8XYiagPI+JDzgut0IpPHUl1vU/EkUR6Zk71nTO39XQMao SR3aaaLlf6d1XSCq0V7fGQuWaqMTgn6yoteCPYbB7qMDeHn+53jmzE65JbAwRAukWC8Y dZ0uOneO0Fo5SxboiYUX9D8M7DZJushA0/GgrK5W16CkHmyR/Yssgw1LWbhvN2VtWC3c DH8UqiPPCudYRRaqj/NPmAxMKYE8D2J3OgAqC7t+wfbyJBuL1CWecspRaaNIhNSK338M zScF4enKbABmvCRDSr46yxeccXNzueIlY1Bo9NPA6k5rLMaFLhwtB03lA/kk0iWbYRQo jDmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=HpN1PYNd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k13-20020a17090646cd00b00987351f11e5si6292950ejs.911.2023.06.28.14.56.57; Wed, 28 Jun 2023 14:57:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=HpN1PYNd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231691AbjF1V1c (ORCPT + 99 others); Wed, 28 Jun 2023 17:27:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58642 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232404AbjF1V1L (ORCPT ); Wed, 28 Jun 2023 17:27:11 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 483A82942 for ; Wed, 28 Jun 2023 14:26:58 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id d2e1a72fcca58-6687243be0cso148679b3a.3 for ; Wed, 28 Jun 2023 14:26:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1687987618; x=1690579618; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=pyzXbOu2iHo4bNrZ84ZYxz33c7D4C6GktNZyfo3X6aM=; b=HpN1PYNdPY/TJZ5TToHhNzbXA2YDAIY/osWwoYAOlOTConcfCvAH569VZKY7zEiLAe /ySERi+RKYmBC3SBn/xHlZA4kNAaTZwBf5a5+ZN5mCUppgIjFOgv1YQzsOZVS1fxz9N7 +rh6vpQNm7bwESJSeu3K7Nh5Ticg9+BZIyeQ8S7yjZTLkLaagA0/k9HbPyMqrn0oNnqe X2BkejxA/B5ymwZ/77OuRjIlB8BHu7RdfzjSItEdNWqe+CYSc7zKJIb9Fqb5zXH2VnFF uDd5C14abUgSjpswkjJElLTTypZDAi8T/cnFJ1SHk24M6T/VU5Br6a3MsGbX4LYYzKP1 fLhA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687987618; x=1690579618; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=pyzXbOu2iHo4bNrZ84ZYxz33c7D4C6GktNZyfo3X6aM=; b=bhGrM5PNAtYpiWK1HCB/hCWGUk6UhUg1SoT5rZwqgmqYvq8thl5ikjWkufLcPrhJaM cX3mthOFoeHfGkVHGj8e39ljN3uDQU01l03Egi4cz1BClbTqRbj5L33Sc1HfKnyKmv1J mluonToALaykND95VGXswzF141BEBBvgHhdqxVznNfcWE7m2vjEAckiGEdIGiuhxb2sD SnJvQmKXMtfQmp/0Hls3QoMowvOIosH8RymPhhexMPWvcO78SSz/dZAkIGEvjgxBNSkQ JXmaoQxx4FajDIU/g4tcYbZ7LgLiq/pa/j0EshM3SzTxKsVcnoJj7KlHIOitIZQu3iFn 10bg== X-Gm-Message-State: AC+VfDwAG92A29yaBhZ5EbESnBCzO797HrR8CzGf1s8ZqzODTA0JAfET j3ojmsS22TF0TeOT6SsdKkvBmqharLs= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6a00:399b:b0:681:fccf:dd4d with SMTP id fi27-20020a056a00399b00b00681fccfdd4dmr454659pfb.3.1687987618246; Wed, 28 Jun 2023 14:26:58 -0700 (PDT) Date: Wed, 28 Jun 2023 14:26:56 -0700 In-Reply-To: <20230607123700.40229-3-cloudliang@tencent.com> Mime-Version: 1.0 References: <20230607123700.40229-1-cloudliang@tencent.com> <20230607123700.40229-3-cloudliang@tencent.com> Message-ID: Subject: Re: [PATCH v3 2/4] KVM: selftests: Test unavailable event filters are rejected From: Sean Christopherson To: Jinrong Liang Cc: Paolo Bonzini , Jim Mattson , Shuah Khan , Aaron Lewis , David Matlack , Vishal Annapurve , Wanpeng Li , Like Xu , Jinrong Liang , linux-kselftest@vger.kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 07, 2023, Jinrong Liang wrote: > From: Jinrong Liang > > This commit adds test cases for unsupported input values in the Avoid "this commit" and "this patch", simply state what the patch does as a command, e.g. "Add test cases for ...". > PMU event filter. The tests cover unsupported "action" values, > unsupported "flags" values, and unsupported "nevents" values. > All these cases should return an error, as they are currently > not supported by the filter. Additionally, the patch tests setting > non-exist fixed counters in the fixed bitmap doesn't fail. > > Signed-off-by: Jinrong Liang > --- > .../kvm/x86_64/pmu_event_filter_test.c | 48 +++++++++++++++++-- > 1 file changed, 45 insertions(+), 3 deletions(-) > > diff --git a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c > index 26f674c32cde..7555e0f4290c 100644 > --- a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c > +++ b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c > @@ -11,9 +11,7 @@ > */ > > #define _GNU_SOURCE /* for program_invocation_short_name */ > -#include "test_util.h" > -#include "kvm_util.h" > -#include "processor.h" > +#include "pmu.h" > > /* > * In lieu of copying perf_event.h into tools... > @@ -32,6 +30,10 @@ > #define MAX_FILTER_EVENTS 300 > #define MAX_TEST_EVENTS 10 > > +#define PMU_EVENT_FILTER_INVALID_ACTION (KVM_PMU_EVENT_DENY + 1) > +#define PMU_EVENT_FILTER_INVALID_FLAGS (KVM_PMU_EVENT_FLAG_MASKED_EVENTS + 1) > +#define PMU_EVENT_FILTER_INVALID_NEVENTS (MAX_FILTER_EVENTS + 1) > + > /* > * This is how the event selector and unit mask are stored in an AMD > * core performance event-select register. Intel's format is similar, > @@ -762,6 +764,7 @@ static void test_filter_ioctl(struct kvm_vcpu *vcpu) > { > uint64_t e = ~0ul; > int r; > + struct __kvm_pmu_event_filter f; Reverse xmas tree. > > /* > * Unfortunately having invalid bits set in event data is expected to > @@ -780,6 +783,45 @@ static void test_filter_ioctl(struct kvm_vcpu *vcpu) > KVM_PMU_EVENT_FLAG_MASKED_EVENTS, > KVM_PMU_EVENT_ALLOW); > TEST_ASSERT(r == 0, "Valid PMU Event Filter is failing"); > + > + /* > + * Testing unsupported "action" input values should return an error. Omit the "Testing", KVM's behavior isn't specific to "testing", any unsupported action should fail. /* Unsupported actions should be rejected by KVM. */ Though honestly, I would forego the comments entirely, the macro name plus the assert make it quite clear what's being tested. > + * Currently, only values 0 or 1 are supported. Drop this part of the comment, it will become stale if PMU_EVENT_FILTER_INVALID_ACTION is modified, and readers can look at the definition of PMU_EVENT_FILTER_INVALID_ACTION if they really care about the actual value. > + */ > + f = base_event_filter; > + f.action = PMU_EVENT_FILTER_INVALID_ACTION; > + r = do_vcpu_set_pmu_event_filter(vcpu, &f); > + TEST_ASSERT(r != 0, "Set invalid action is expected to fail."); Ignore the bad precedent set by this test, the preferred way to check for 0 and !0 is TEST_ASSERT(r, ...) and TEST_ASSERT(!r, ...); And no punctuation in the assert, i.e. drop the period. > + > + /* > + * Testing unsupported "flags" input values should return an error. > + * Currently, only values 0 or 1 are supported. > + */ Same here. > + f = base_event_filter; > + f.flags = PMU_EVENT_FILTER_INVALID_FLAGS; > + r = do_vcpu_set_pmu_event_filter(vcpu, &f); > + TEST_ASSERT(r != 0, "Set invalid flags is expected to fail."); > + > + /* > + * Testing unsupported "nevents" input values should return an error. > + * Currently, only values less than or equal to > + * MAX_FILTER_EVENTS are supported. And here. > + */ > + f = base_event_filter; > + f.nevents = PMU_EVENT_FILTER_INVALID_NEVENTS; > + r = do_vcpu_set_pmu_event_filter(vcpu, &f); > + TEST_ASSERT(r != 0, > + "Setting PMU event filters that exceeds the maximum supported value should fail"); To avoid splitting lines, TEST_ASSERT(r, "Exceeding the max number of filter events should fail"); > + > + /* > + * In this case, setting non-exist fixed counters in the fixed bitmap > + * doesn't fail. > + */ And here. > + f = base_event_filter; > + f.fixed_counter_bitmap = ~GENMASK_ULL(X86_INTEL_MAX_FIXED_CTR_NUM, 0); > + r = do_vcpu_set_pmu_event_filter(vcpu, &f); > + TEST_ASSERT(r == 0, > + "Setting invalid or non-exist fixed cunters in the fixed bitmap fail."); Something like so to avoid multiple lines. TEST_ASSERT(!r, "Masking non-existent fixed counters should be allowed");