Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1348992rdh; Fri, 24 Nov 2023 10:16:45 -0800 (PST) X-Google-Smtp-Source: AGHT+IFtG+KQ/MAxxq6ThbDGzxFu+wdTHMO/FKWu54HNGdJuhmgm0HY+OdVJtDsF8CC0i8hoEEvI X-Received: by 2002:a05:6a00:2410:b0:6b4:c21c:8b56 with SMTP id z16-20020a056a00241000b006b4c21c8b56mr4205342pfh.23.1700849805639; Fri, 24 Nov 2023 10:16:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700849805; cv=none; d=google.com; s=arc-20160816; b=ELh/MmaMJvBkopQVTp25Pa1m62ePr+FU4jdmxpG5hy98Bp8C+yCUcmv3ORkUhX71KR hAECcpFsjuaMBYbkyzPVNNPJGfYe24nZvvIVvmHKBDijaelCs3/lf9MmNuuopRyMqG0N tI311dP2mYbvr3kRrvUPjA9DmiRJ366NJPlpQXF2Ro23ROM33ghcFKZRTEOxoydIDVEa S5sUO1A40vbJAGn+knQeqTa3lgXJ/RRkuO31pgYpZ7payUi/f+yIzzVJ0BCZs1K1WT5Z yJDWHMTdIyiCcxJnVAAjVEiiSW0h4vCKIDkxWoK9XWPzSPAyysXFeDdGUr7USV08X/U7 IgPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=Zm7npic6hpdnvYBc9CxZ2JM6kBkxKJfDj7QUHeYYNcE=; fh=P7YGdCfSAFctgGTA2pruRLJJiVcMLptw3MR12hDeUJc=; b=HwaU6ZmuTHAbHymksvk7bT944vIfjo1WZ5sZ9qGAo86uu0DwwvvS+PY704cc99Ovi2 lE4i6J8rW5u+OTI4HCBPc7FNTPCUSuBWdyHOT+6srwLXMy0B7rvProXX0s9FdzstuSZN i00GhJS6v+ZabZG7+CwXMF3nMOYtx8GZk1oGphP5iv55lgLzlMenF/FFyddf/B1rQV6e HDa0lrh7NwIyrtZJSv2+gr1fBsJMgkSlALEF/6J1QF0fX4RdfnqS1OKoBsKeJLyzISXy GiVvQj0SqKRGkCoBP7Kl4pbL+q7J93Us/AktOW867BSVeNeGwLeit1PrKCX7/qTa+1Xm F5vg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QQBbodFD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id g9-20020a056a0023c900b006cb70cd9e2esi4067265pfc.253.2023.11.24.10.16.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 10:16:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QQBbodFD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 2F6728082A60; Fri, 24 Nov 2023 10:15:23 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230484AbjKXSOt (ORCPT + 99 others); Fri, 24 Nov 2023 13:14:49 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53386 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231432AbjKXSOq (ORCPT ); Fri, 24 Nov 2023 13:14:46 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2D47219B9 for ; Fri, 24 Nov 2023 10:14:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1700849690; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Zm7npic6hpdnvYBc9CxZ2JM6kBkxKJfDj7QUHeYYNcE=; b=QQBbodFDJZmL+jEa6RWdJHlcrMj96sKcP3aNfpqup+uuIkRgic7vMUcsgj/0CV4YE09KkI IgXUlSoV6J45Vi/8SIzGKHAJ9aEEDIn/fRXJQSRjXc9Hv7mu41KpaNq8JhVhztlHqK4lsA 0qxMgReHe1YaorNaiVPd/eby4aSHpCw= Received: from mail-oi1-f199.google.com (mail-oi1-f199.google.com [209.85.167.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-467-8d_dYb6kML6Pzj3E3A1GIQ-1; Fri, 24 Nov 2023 13:14:49 -0500 X-MC-Unique: 8d_dYb6kML6Pzj3E3A1GIQ-1 Received: by mail-oi1-f199.google.com with SMTP id 5614622812f47-3b847ecbb7cso1972025b6e.0 for ; Fri, 24 Nov 2023 10:14:49 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700849688; x=1701454488; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Zm7npic6hpdnvYBc9CxZ2JM6kBkxKJfDj7QUHeYYNcE=; b=M2BYUtmhCEE9UobQ3Z8pGUM0Jq1kIjFk99nuDXX7GQVba7AXnNiX6zFZsfIdH40DQ/ SS/dWe/Ef72M7a5WCjS+kEX9M0E291xQ37h0hXpEkPngfPxLF3GN8UY5APTuTvx1zDx5 LoO3Q5zxOmkbuZsuELI0TxNSFnfAeBgglqXJLmUtrsmSrc3xYbWq9u7b+jnXHXTyxnlX DFBk2YA8FWG4R8yf72ExzboAbRn0y8Oc+vM3dRhfulHvbZPcDhwGCKUGzydiiPXYly1q /d6Wa+oalem+EEISg7lzIxokhxon4KBBXiZblaRSBoK4bRgLD1ZwKp8W2U9cLLhQtAPZ MtXA== X-Gm-Message-State: AOJu0Yzn0ehsLRoOp168wi+cCw0PhKFp7J/wa6abR71PsCcL7YRot060 oO7v6w2hNb0CdhOAUoxsI4LohFdSHC6R+qsBicoJnOnP42uDk8iR3XIqNznQyww15hVPgGFyiAm NXzZvZKdq0hUksjBb/zqUSEox X-Received: by 2002:a05:6808:1798:b0:3b8:44dc:7ce0 with SMTP id bg24-20020a056808179800b003b844dc7ce0mr4687192oib.2.1700849688351; Fri, 24 Nov 2023 10:14:48 -0800 (PST) X-Received: by 2002:a05:6808:1798:b0:3b8:44dc:7ce0 with SMTP id bg24-20020a056808179800b003b844dc7ce0mr4687174oib.2.1700849688025; Fri, 24 Nov 2023 10:14:48 -0800 (PST) Received: from ?IPV6:2a01:e0a:59e:9d80:527b:9dff:feef:3874? ([2a01:e0a:59e:9d80:527b:9dff:feef:3874]) by smtp.gmail.com with ESMTPSA id cz9-20020a056214088900b0067a225ab63esm141629qvb.84.2023.11.24.10.14.44 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 24 Nov 2023 10:14:46 -0800 (PST) Message-ID: <63c97950-2c12-4ee1-b8d1-0794e7603b25@redhat.com> Date: Fri, 24 Nov 2023 19:14:43 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v1 1/3] KVM: selftests: aarch64: Make the [create|destroy]_vpmu_vm() can be reused Content-Language: en-US To: Shaoqin Huang , Oliver Upton , Marc Zyngier , kvmarm@lists.linux.dev Cc: Paolo Bonzini , Shuah Khan , James Morse , Suzuki K Poulose , Zenghui Yu , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-arm-kernel@lists.infradead.org References: <20231123063750.2176250-1-shahuang@redhat.com> <20231123063750.2176250-2-shahuang@redhat.com> From: Eric Auger In-Reply-To: <20231123063750.2176250-2-shahuang@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=0.6 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SORBS_WEB,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Fri, 24 Nov 2023 10:15:23 -0800 (PST) Hi Shaoqin, On 11/23/23 07:37, Shaoqin Huang wrote: > Move the [create|destroy]_vpmu_vm() into the lib/, which makes those some wording suggestions below: Move the implementation of .. into lib/aarch64/pmu.c and export their declaration in a header so that they can be reused by other tests. Also the title may be renamed: Make [create|destroy]_vpmu_vm() public > function can be used by other tests. Install the handler is specific to the sync exception handler install is test specific so we move it out of the helper function. > the vpmu_counter_access test, so create a wrapper function for it, and > only move the common part. > > No functional change. intended ;-) > > Signed-off-by: Shaoqin Huang > --- > tools/testing/selftests/kvm/Makefile | 1 + > .../kvm/aarch64/vpmu_counter_access.c | 100 +++++------------- > .../selftests/kvm/include/aarch64/vpmu.h | 16 +++ > .../testing/selftests/kvm/lib/aarch64/vpmu.c | 64 +++++++++++ > 4 files changed, 105 insertions(+), 76 deletions(-) > create mode 100644 tools/testing/selftests/kvm/include/aarch64/vpmu.h > create mode 100644 tools/testing/selftests/kvm/lib/aarch64/vpmu.c > > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile > index a5963ab9215b..b60852c222ac 100644 > --- a/tools/testing/selftests/kvm/Makefile > +++ b/tools/testing/selftests/kvm/Makefile > @@ -57,6 +57,7 @@ LIBKVM_aarch64 += lib/aarch64/processor.c > LIBKVM_aarch64 += lib/aarch64/spinlock.c > LIBKVM_aarch64 += lib/aarch64/ucall.c > LIBKVM_aarch64 += lib/aarch64/vgic.c > +LIBKVM_aarch64 += lib/aarch64/vpmu.c > > LIBKVM_s390x += lib/s390x/diag318_test_handler.c > LIBKVM_s390x += lib/s390x/processor.c > diff --git a/tools/testing/selftests/kvm/aarch64/vpmu_counter_access.c b/tools/testing/selftests/kvm/aarch64/vpmu_counter_access.c > index 5ea78986e665..17305408a334 100644 > --- a/tools/testing/selftests/kvm/aarch64/vpmu_counter_access.c > +++ b/tools/testing/selftests/kvm/aarch64/vpmu_counter_access.c > @@ -16,6 +16,7 @@ > #include > #include > #include > +#include > #include > #include > > @@ -25,13 +26,7 @@ > /* The cycle counter bit position that's common among the PMU registers */ > #define ARMV8_PMU_CYCLE_IDX 31 > > -struct vpmu_vm { > - struct kvm_vm *vm; > - struct kvm_vcpu *vcpu; > - int gic_fd; > -}; > - > -static struct vpmu_vm vpmu_vm; > +static struct vpmu_vm *vpmu_vm; > > struct pmreg_sets { > uint64_t set_reg_id; > @@ -421,64 +416,6 @@ static void guest_code(uint64_t expected_pmcr_n) > GUEST_DONE(); > } > > -#define GICD_BASE_GPA 0x8000000ULL > -#define GICR_BASE_GPA 0x80A0000ULL > - > -/* Create a VM that has one vCPU with PMUv3 configured. */ > -static void create_vpmu_vm(void *guest_code) > -{ > - struct kvm_vcpu_init init; > - uint8_t pmuver, ec; > - uint64_t dfr0, irq = 23; > - struct kvm_device_attr irq_attr = { > - .group = KVM_ARM_VCPU_PMU_V3_CTRL, > - .attr = KVM_ARM_VCPU_PMU_V3_IRQ, > - .addr = (uint64_t)&irq, > - }; > - struct kvm_device_attr init_attr = { > - .group = KVM_ARM_VCPU_PMU_V3_CTRL, > - .attr = KVM_ARM_VCPU_PMU_V3_INIT, > - }; > - > - /* The test creates the vpmu_vm multiple times. Ensure a clean state */ > - memset(&vpmu_vm, 0, sizeof(vpmu_vm)); > - > - vpmu_vm.vm = vm_create(1); > - vm_init_descriptor_tables(vpmu_vm.vm); > - for (ec = 0; ec < ESR_EC_NUM; ec++) { > - vm_install_sync_handler(vpmu_vm.vm, VECTOR_SYNC_CURRENT, ec, > - guest_sync_handler); > - } > - > - /* Create vCPU with PMUv3 */ > - vm_ioctl(vpmu_vm.vm, KVM_ARM_PREFERRED_TARGET, &init); > - init.features[0] |= (1 << KVM_ARM_VCPU_PMU_V3); > - vpmu_vm.vcpu = aarch64_vcpu_add(vpmu_vm.vm, 0, &init, guest_code); > - vcpu_init_descriptor_tables(vpmu_vm.vcpu); > - vpmu_vm.gic_fd = vgic_v3_setup(vpmu_vm.vm, 1, 64, > - GICD_BASE_GPA, GICR_BASE_GPA); > - __TEST_REQUIRE(vpmu_vm.gic_fd >= 0, > - "Failed to create vgic-v3, skipping"); > - > - /* Make sure that PMUv3 support is indicated in the ID register */ > - vcpu_get_reg(vpmu_vm.vcpu, > - KVM_ARM64_SYS_REG(SYS_ID_AA64DFR0_EL1), &dfr0); > - pmuver = FIELD_GET(ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer), dfr0); > - TEST_ASSERT(pmuver != ID_AA64DFR0_EL1_PMUVer_IMP_DEF && > - pmuver >= ID_AA64DFR0_EL1_PMUVer_IMP, > - "Unexpected PMUVER (0x%x) on the vCPU with PMUv3", pmuver); > - > - /* Initialize vPMU */ > - vcpu_ioctl(vpmu_vm.vcpu, KVM_SET_DEVICE_ATTR, &irq_attr); > - vcpu_ioctl(vpmu_vm.vcpu, KVM_SET_DEVICE_ATTR, &init_attr); > -} > - > -static void destroy_vpmu_vm(void) > -{ > - close(vpmu_vm.gic_fd); > - kvm_vm_free(vpmu_vm.vm); > -} > - > static void run_vcpu(struct kvm_vcpu *vcpu, uint64_t pmcr_n) > { > struct ucall uc; > @@ -497,13 +434,24 @@ static void run_vcpu(struct kvm_vcpu *vcpu, uint64_t pmcr_n) > } > } > > +static void create_vpmu_vm_with_handler(void *guest_code) > +{ > + uint8_t ec; > + vpmu_vm = create_vpmu_vm(guest_code); > + > + for (ec = 0; ec < ESR_EC_NUM; ec++) { > + vm_install_sync_handler(vpmu_vm->vm, VECTOR_SYNC_CURRENT, ec, > + guest_sync_handler); > + } > +} > + > static void test_create_vpmu_vm_with_pmcr_n(uint64_t pmcr_n, bool expect_fail) > { > struct kvm_vcpu *vcpu; > uint64_t pmcr, pmcr_orig; > > - create_vpmu_vm(guest_code); > - vcpu = vpmu_vm.vcpu; > + create_vpmu_vm_with_handler(guest_code); > + vcpu = vpmu_vm->vcpu; > > vcpu_get_reg(vcpu, KVM_ARM64_SYS_REG(SYS_PMCR_EL0), &pmcr_orig); > pmcr = pmcr_orig; > @@ -539,7 +487,7 @@ static void run_access_test(uint64_t pmcr_n) > pr_debug("Test with pmcr_n %lu\n", pmcr_n); > > test_create_vpmu_vm_with_pmcr_n(pmcr_n, false); > - vcpu = vpmu_vm.vcpu; > + vcpu = vpmu_vm->vcpu; > > /* Save the initial sp to restore them later to run the guest again */ > vcpu_get_reg(vcpu, ARM64_CORE_REG(sp_el1), &sp); > @@ -550,7 +498,7 @@ static void run_access_test(uint64_t pmcr_n) > * Reset and re-initialize the vCPU, and run the guest code again to > * check if PMCR_EL0.N is preserved. > */ > - vm_ioctl(vpmu_vm.vm, KVM_ARM_PREFERRED_TARGET, &init); > + vm_ioctl(vpmu_vm->vm, KVM_ARM_PREFERRED_TARGET, &init); > init.features[0] |= (1 << KVM_ARM_VCPU_PMU_V3); > aarch64_vcpu_setup(vcpu, &init); > vcpu_init_descriptor_tables(vcpu); > @@ -559,7 +507,7 @@ static void run_access_test(uint64_t pmcr_n) > > run_vcpu(vcpu, pmcr_n); > > - destroy_vpmu_vm(); > + destroy_vpmu_vm(vpmu_vm); > } > > static struct pmreg_sets validity_check_reg_sets[] = { > @@ -580,7 +528,7 @@ static void run_pmregs_validity_test(uint64_t pmcr_n) > uint64_t valid_counters_mask, max_counters_mask; > > test_create_vpmu_vm_with_pmcr_n(pmcr_n, false); > - vcpu = vpmu_vm.vcpu; > + vcpu = vpmu_vm->vcpu; > > valid_counters_mask = get_counters_mask(pmcr_n); > max_counters_mask = get_counters_mask(ARMV8_PMU_MAX_COUNTERS); > @@ -621,7 +569,7 @@ static void run_pmregs_validity_test(uint64_t pmcr_n) > KVM_ARM64_SYS_REG(clr_reg_id), reg_val); > } > > - destroy_vpmu_vm(); > + destroy_vpmu_vm(vpmu_vm); > } > > /* > @@ -634,7 +582,7 @@ static void run_error_test(uint64_t pmcr_n) > pr_debug("Error test with pmcr_n %lu (larger than the host)\n", pmcr_n); > > test_create_vpmu_vm_with_pmcr_n(pmcr_n, true); > - destroy_vpmu_vm(); > + destroy_vpmu_vm(vpmu_vm); > } > > /* > @@ -645,9 +593,9 @@ static uint64_t get_pmcr_n_limit(void) > { > uint64_t pmcr; > > - create_vpmu_vm(guest_code); > - vcpu_get_reg(vpmu_vm.vcpu, KVM_ARM64_SYS_REG(SYS_PMCR_EL0), &pmcr); > - destroy_vpmu_vm(); > + create_vpmu_vm_with_handler(guest_code); > + vcpu_get_reg(vpmu_vm->vcpu, KVM_ARM64_SYS_REG(SYS_PMCR_EL0), &pmcr); > + destroy_vpmu_vm(vpmu_vm); > return get_pmcr_n(pmcr); > } > > diff --git a/tools/testing/selftests/kvm/include/aarch64/vpmu.h b/tools/testing/selftests/kvm/include/aarch64/vpmu.h > new file mode 100644 > index 000000000000..0a56183644ee > --- /dev/null > +++ b/tools/testing/selftests/kvm/include/aarch64/vpmu.h > @@ -0,0 +1,16 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > + > +#include > + > +#define GICD_BASE_GPA 0x8000000ULL > +#define GICR_BASE_GPA 0x80A0000ULL > + > +struct vpmu_vm { > + struct kvm_vm *vm; > + struct kvm_vcpu *vcpu; > + int gic_fd; > +}; > + > +struct vpmu_vm *create_vpmu_vm(void *guest_code); > + > +void destroy_vpmu_vm(struct vpmu_vm *vpmu_vm); > diff --git a/tools/testing/selftests/kvm/lib/aarch64/vpmu.c b/tools/testing/selftests/kvm/lib/aarch64/vpmu.c > new file mode 100644 > index 000000000000..b3de8fdc555e > --- /dev/null > +++ b/tools/testing/selftests/kvm/lib/aarch64/vpmu.c > @@ -0,0 +1,64 @@ > +// SPDX-License-Identifier: GPL-2.0 > + > +#include > +#include > +#include > +#include > +#include > +#include > + > +/* Create a VM that has one vCPU with PMUv3 configured. */ > +struct vpmu_vm *create_vpmu_vm(void *guest_code) > +{ > + struct kvm_vcpu_init init; > + uint8_t pmuver; > + uint64_t dfr0, irq = 23; > + struct kvm_device_attr irq_attr = { > + .group = KVM_ARM_VCPU_PMU_V3_CTRL, > + .attr = KVM_ARM_VCPU_PMU_V3_IRQ, > + .addr = (uint64_t)&irq, > + }; > + struct kvm_device_attr init_attr = { > + .group = KVM_ARM_VCPU_PMU_V3_CTRL, > + .attr = KVM_ARM_VCPU_PMU_V3_INIT, > + }; > + struct vpmu_vm *vpmu_vm; > + > + vpmu_vm = calloc(1, sizeof(*vpmu_vm)); > + TEST_ASSERT(vpmu_vm != NULL, "Insufficient Memory"); > + memset(vpmu_vm, 0, sizeof(vpmu_vm)); > + > + vpmu_vm->vm = vm_create(1); > + vm_init_descriptor_tables(vpmu_vm->vm); > + > + /* Create vCPU with PMUv3 */ > + vm_ioctl(vpmu_vm->vm, KVM_ARM_PREFERRED_TARGET, &init); > + init.features[0] |= (1 << KVM_ARM_VCPU_PMU_V3); > + vpmu_vm->vcpu = aarch64_vcpu_add(vpmu_vm->vm, 0, &init, guest_code); > + vcpu_init_descriptor_tables(vpmu_vm->vcpu); > + vpmu_vm->gic_fd = vgic_v3_setup(vpmu_vm->vm, 1, 64, > + GICD_BASE_GPA, GICR_BASE_GPA); > + __TEST_REQUIRE(vpmu_vm->gic_fd >= 0, > + "Failed to create vgic-v3, skipping"); > + > + /* Make sure that PMUv3 support is indicated in the ID register */ > + vcpu_get_reg(vpmu_vm->vcpu, > + KVM_ARM64_SYS_REG(SYS_ID_AA64DFR0_EL1), &dfr0); > + pmuver = FIELD_GET(ARM64_FEATURE_MASK(ID_AA64DFR0_EL1_PMUVer), dfr0); > + TEST_ASSERT(pmuver != ID_AA64DFR0_EL1_PMUVer_IMP_DEF && > + pmuver >= ID_AA64DFR0_EL1_PMUVer_IMP, > + "Unexpected PMUVER (0x%x) on the vCPU with PMUv3", pmuver); > + > + /* Initialize vPMU */ > + vcpu_ioctl(vpmu_vm->vcpu, KVM_SET_DEVICE_ATTR, &irq_attr); > + vcpu_ioctl(vpmu_vm->vcpu, KVM_SET_DEVICE_ATTR, &init_attr); > + > + return vpmu_vm; > +} > + > +void destroy_vpmu_vm(struct vpmu_vm *vpmu_vm) > +{ > + close(vpmu_vm->gic_fd); > + kvm_vm_free(vpmu_vm->vm); > + free(vpmu_vm); > +} Besides looks good to me Reviewed-by: Eric Auger Eric