Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4385367rdh; Tue, 28 Nov 2023 22:59:35 -0800 (PST) X-Google-Smtp-Source: AGHT+IGhfvBAHts2Cn/9OpU7xUlM2gWR1AsZRo+xRssZid2haYQ+tWzDXEstztAj5rXV9fA4buaZ X-Received: by 2002:a17:902:7897:b0:1cf:ee16:84fd with SMTP id q23-20020a170902789700b001cfee1684fdmr5175905pll.53.1701241175619; Tue, 28 Nov 2023 22:59:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701241175; cv=none; d=google.com; s=arc-20160816; b=xmyFULLe+J0QZLTfE8DstfVQgETevoWA2N3ANnRFf+898e9zamvDsjvzhQ/NVcmkQC r4JG4RzWODBFmWs0LijoY+1en3vkTDnY9YkzYmAmnfhdytoEt30aq41mkICRIj3Gwkcc /v75FAp+7mC0bEGOOhPt4pJ7DH1J4Ky6j0AwfS/TuOrswzi5Rhe62i+27Cn9EGMjKCr0 mcXiFSQbBmda0ibE48ykXPGFc7J+RFZXLAbeXPXOn6/il+MFn1DWRGjolaRPDXbmYb5k bObjrycuODG68PfoYlBFOAODOw0f5bg0YmfMnWl2wWFCcEjfhBm+vVZVueLcu+Vx3E+l NUFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=44I9TgDarjiswLg+RPvRTfzPxaXxsOAGEM0CeQyA9WY=; fh=E/gTUyCnjfNPhL7I3JTqzIjZNMkO5qRf9G2ElKXPJvg=; b=Ne2zxweSfUbbF9G4pTVoxkmBAE7s2mUkIaYvbBfLT5cGem1VNnHSbdCrDYx6du2mmm pKvmjB5oSGardE2erccrqF8yjX1OL18vbkvkJ1uALv6/ZHLimycjVO0781lUA/Z2CDHa e3ZYQy2w/OJ8zZft9IlDQdZi8ILyxEZqFrVNERG5IAhbiPgBT9XGjgkwlgtlH34NbCtJ BEcZPeWIlR4kfxnaS2vrOIE5/90AS97RXEkAwKhw65monF2en0Qyse2ldBoNgGZwmjId EUBwpN1Ba+LkFRmvXuRVsf05oSploxT3fMkaOaag8UUXMwUAAhNCgWN/yhNX1CrucWz3 czRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=FQr7fPKo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id n8-20020a170902e54800b001cfa2728007si12464710plf.231.2023.11.28.22.59.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 22:59:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=FQr7fPKo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 7DAFA83265B3; Tue, 28 Nov 2023 22:59:27 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234335AbjK2G7B (ORCPT + 99 others); Wed, 29 Nov 2023 01:59:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234934AbjK2G6o (ORCPT ); Wed, 29 Nov 2023 01:58:44 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95E8C2102 for ; Tue, 28 Nov 2023 22:58:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701241123; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=44I9TgDarjiswLg+RPvRTfzPxaXxsOAGEM0CeQyA9WY=; b=FQr7fPKoOOeHkr1hHDaK73Rw3Md+sJmHyGxw5phKZRPLJkwqNEBbnQG+t17u16ESUOtTML O1sZ7RNWo2v5fKQa26lvE/WsYoYCecRy9mydimwejGzlxqOU/IJa7o5iJezXS5Plx7DDaQ TsDX2Wg24YFReI2iB2DgSqsWmzPIagY= Received: from mail-pj1-f69.google.com (mail-pj1-f69.google.com [209.85.216.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-49-fCL9QaHsOWOyA85ZPac7bA-1; Wed, 29 Nov 2023 01:58:42 -0500 X-MC-Unique: fCL9QaHsOWOyA85ZPac7bA-1 Received: by mail-pj1-f69.google.com with SMTP id 98e67ed59e1d1-285a3e7c72bso646091a91.0 for ; Tue, 28 Nov 2023 22:58:42 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701241121; x=1701845921; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=44I9TgDarjiswLg+RPvRTfzPxaXxsOAGEM0CeQyA9WY=; b=HBaDaAFxuCWa/6Cs0jaeaNSbb/oXOV09rXR4qIdNN4yDXtiRvpxzVnmJWKXk35Zu4E ElfqZysarUso7J+OPHQvFjZo1myGL//pFKJcwaA+xraYFlzCkIt1wvC7daGHxM4EfYEF GaqtDghNyfS9RxJiDuXvac+0dBvfCsZ5tmyPkVa69PCD6ftCWbZtEAFx4nMYJzvfIsIo 1yB9dCmR1nh7zkVZXlJ7yT8lgrTO4Umxn4b3BhOInIcF/vGSigBZSYq5mst3Gt5Nl86i ikKG0qb1CsFXLz0gJqUrrgAVhmmLhrL9jszcA/i9sg3t5h0cXYjom03lPNJj0M6g5XOG QQbA== X-Gm-Message-State: AOJu0YwteF59MbbjdTGtCa7kp7RTTia3gNdDDYPMZr7W5NG7iTu1Ikvg zYCguE04xLJzGNYL3U64X6CQFP8VLsgDN2tpvf6nw6RSbJMboC9489XLLgYPCbkB+aiXOmJYE+r pXf8IgTedoDXj4ofKMjyWvt1k X-Received: by 2002:a17:90a:7408:b0:285:6f2b:4e82 with SMTP id a8-20020a17090a740800b002856f2b4e82mr17587399pjg.1.1701241121074; Tue, 28 Nov 2023 22:58:41 -0800 (PST) X-Received: by 2002:a17:90a:7408:b0:285:6f2b:4e82 with SMTP id a8-20020a17090a740800b002856f2b4e82mr17587391pjg.1.1701241120695; Tue, 28 Nov 2023 22:58:40 -0800 (PST) Received: from [10.72.112.34] ([43.228.180.230]) by smtp.gmail.com with ESMTPSA id v24-20020a17090abb9800b00285a2069a22sm602872pjr.5.2023.11.28.22.58.36 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 28 Nov 2023 22:58:40 -0800 (PST) Message-ID: Date: Wed, 29 Nov 2023 14:58:34 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1 Subject: Re: [PATCH v1 3/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test Content-Language: en-US To: Eric Auger , Oliver Upton , Marc Zyngier , kvmarm@lists.linux.dev Cc: Paolo Bonzini , Shuah Khan , James Morse , Suzuki K Poulose , Zenghui Yu , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-arm-kernel@lists.infradead.org References: <20231123063750.2176250-1-shahuang@redhat.com> <20231123063750.2176250-4-shahuang@redhat.com> <3c18a04a-2834-43ef-b857-e6ad8f0c5f41@redhat.com> From: Shaoqin Huang In-Reply-To: <3c18a04a-2834-43ef-b857-e6ad8f0c5f41@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RCVD_IN_SORBS_WEB,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Tue, 28 Nov 2023 22:59:27 -0800 (PST) Hi Eric, On 11/27/23 16:10, Eric Auger wrote: > Hi Shaoqin, > > On 11/23/23 07:37, Shaoqin Huang wrote: >> Introduce pmu_event_filter_test for arm64 platforms. The test configures >> PMUv3 for a vCPU, and sets different pmu event filter for the vCPU, and > filters >> check if the guest can use those events which user allow and can't use >> those events which use deny. >> >> This test refactor the create_vpmu_vm() and make it a wrapper for >> __create_vpmu_vm(), which can let we do some extra init before > which can let we do -> which allows some extra init code. Copy that. >> KVM_ARM_VCPU_PMU_V3_INIT. >> >> This test choose the branches_retired and the instructions_retired >> event, and let guest use the two events in pmu. And check if the result > Are you sure those events are supported? >> is expected. >> >> Signed-off-by: Shaoqin Huang >> --- >> tools/testing/selftests/kvm/Makefile | 1 + >> .../kvm/aarch64/pmu_event_filter_test.c | 227 ++++++++++++++++++ >> .../selftests/kvm/include/aarch64/vpmu.h | 4 + >> .../testing/selftests/kvm/lib/aarch64/vpmu.c | 14 +- >> 4 files changed, 244 insertions(+), 2 deletions(-) >> create mode 100644 tools/testing/selftests/kvm/aarch64/pmu_event_filter_test.c >> >> diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile >> index b60852c222ac..5f126e1a1dbf 100644 >> --- a/tools/testing/selftests/kvm/Makefile >> +++ b/tools/testing/selftests/kvm/Makefile >> @@ -155,6 +155,7 @@ TEST_GEN_PROGS_aarch64 += aarch64/arch_timer >> TEST_GEN_PROGS_aarch64 += aarch64/debug-exceptions >> TEST_GEN_PROGS_aarch64 += aarch64/hypercalls >> TEST_GEN_PROGS_aarch64 += aarch64/page_fault_test >> +TEST_GEN_PROGS_aarch64 += aarch64/pmu_event_filter_test >> TEST_GEN_PROGS_aarch64 += aarch64/psci_test >> TEST_GEN_PROGS_aarch64 += aarch64/set_id_regs >> TEST_GEN_PROGS_aarch64 += aarch64/smccc_filter >> diff --git a/tools/testing/selftests/kvm/aarch64/pmu_event_filter_test.c b/tools/testing/selftests/kvm/aarch64/pmu_event_filter_test.c >> new file mode 100644 >> index 000000000000..a876f5c2033b >> --- /dev/null >> +++ b/tools/testing/selftests/kvm/aarch64/pmu_event_filter_test.c >> @@ -0,0 +1,227 @@ >> +// SPDX-License-Identifier: GPL-2.0 >> +/* >> + * pmu_event_filter_test - Test user limit pmu event for guest. >> + * >> + * Copyright (c) 2023 Red Hat, Inc. >> + * >> + * This test checks if the guest only see the limited pmu event that userspace > sees >> + * sets, if the gust can use those events which user allow, and if the guest > s/gust/guest Thanks, will correct it. >> + * can't use those events which user deny. >> + * It also checks set invalid filter return the expected error. > it also checks that setting invalid filter ranges ... >> + * This test runs only when KVM_CAP_ARM_PMU_V3 is supported on the host. >> + */ >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> + >> +struct { >> + uint64_t branches_retired; >> + uint64_t instructions_retired; >> +} pmc_results; >> + >> +static struct vpmu_vm *vpmu_vm; >> + >> +#define FILTER_NR 10 >> + >> +struct test_desc { >> + const char *name; >> + void (*check_result)(void); >> + struct kvm_pmu_event_filter filter[FILTER_NR]; >> +}; >> + >> +#define __DEFINE_FILTER(base, num, act) \ >> + ((struct kvm_pmu_event_filter) { \ >> + .base_event = base, \ >> + .nevents = num, \ >> + .action = act, \ >> + }) >> + >> +#define DEFINE_FILTER(base, act) __DEFINE_FILTER(base, 1, act) >> + >> +#define EMPTY_FILTER { 0 } >> + >> +#define SW_INCR 0x0 >> +#define INST_RETIRED 0x8 >> +#define BR_RETIERD 0x21 > looks like a typo It's a typo error. Fixed it. >> + >> +#define NUM_BRANCHES 10 >> + >> +static void run_and_measure_loop(void) >> +{ >> + asm volatile( >> + " mov x10, %[loop]\n" >> + "1: sub x10, x10, #1\n" >> + " cmp x10, #0x0\n" >> + " b.gt 1b\n" >> + : >> + : [loop] "r" (NUM_BRANCHES) >> + : "x10", "cc"); >> +} >> + >> +static void guest_code(void) >> +{ >> + uint64_t pmcr = read_sysreg(pmcr_el0); >> + >> + pmu_disable_reset(); >> + >> + write_pmevtypern(0, BR_RETIERD); >> + write_pmevtypern(1, INST_RETIRED); >> + enable_counter(0); >> + enable_counter(1); >> + write_sysreg(pmcr | ARMV8_PMU_PMCR_E, pmcr_el0); >> + >> + run_and_measure_loop(); >> + >> + write_sysreg(pmcr, pmcr_el0); >> + >> + pmc_results.branches_retired = read_sysreg(pmevcntr0_el0); >> + pmc_results.instructions_retired = read_sysreg(pmevcntr1_el0); >> + >> + GUEST_DONE(); > another direct way to see if the guest can use those filters is to read > the PMCEIDx that indicates whether an event is supported. > Yes. That's the easist way. Why I do this is because I follow the x86 design. >> +} >> + >> +static void pmu_event_filter_init(struct vpmu_vm *vm, void *arg) >> +{ >> + struct kvm_device_attr attr = { >> + .group = KVM_ARM_VCPU_PMU_V3_CTRL, >> + .attr = KVM_ARM_VCPU_PMU_V3_FILTER, >> + }; >> + struct kvm_pmu_event_filter *filter = (struct kvm_pmu_event_filter *)arg; >> + >> + while (filter && filter->nevents != 0) { >> + attr.addr = (uint64_t)filter; >> + vcpu_ioctl(vm->vcpu, KVM_SET_DEVICE_ATTR, &attr); >> + filter++; >> + } >> +} >> + >> +static void create_vpmu_vm_with_filter(void *guest_code, >> + struct kvm_pmu_event_filter *filter) >> +{ >> + vpmu_vm = __create_vpmu_vm(guest_code, pmu_event_filter_init, filter); >> +} >> + >> +static void run_vcpu(struct kvm_vcpu *vcpu) >> +{ >> + struct ucall uc; >> + >> + while (1) { >> + vcpu_run(vcpu); >> + switch (get_ucall(vcpu, &uc)) { >> + case UCALL_DONE: >> + return; >> + default: >> + TEST_FAIL("Unknown ucall %lu", uc.cmd); >> + } >> + } >> +} >> + >> +static void check_pmc_counting(void) >> +{ >> + uint64_t br = pmc_results.branches_retired; >> + uint64_t ir = pmc_results.instructions_retired; >> + >> + TEST_ASSERT(br && br == NUM_BRANCHES, "Branch instructions retired = " >> + "%lu (expected %u)", br, NUM_BRANCHES); >> + TEST_ASSERT(ir, "Instructions retired = %lu (expected > 0)", ir); >> +} >> + >> +static void check_pmc_not_counting(void) >> +{ >> + uint64_t br = pmc_results.branches_retired; >> + uint64_t ir = pmc_results.instructions_retired; >> + >> + TEST_ASSERT(!br, "Branch instructions retired = %lu (expected 0)", br); >> + TEST_ASSERT(!ir, "Instructions retired = %lu (expected 0)", ir); >> +} >> + >> +static void run_vcpu_and_sync_pmc_results(void) >> +{ >> + memset(&pmc_results, 0, sizeof(pmc_results)); >> + sync_global_to_guest(vpmu_vm->vm, pmc_results); >> + >> + run_vcpu(vpmu_vm->vcpu); >> + >> + sync_global_from_guest(vpmu_vm->vm, pmc_results); >> +} >> + >> +static void run_test(struct test_desc *t) >> +{ >> + pr_debug("Test: %s\n", t->name); >> + >> + create_vpmu_vm_with_filter(guest_code, t->filter); >> + >> + run_vcpu_and_sync_pmc_results(); >> + >> + t->check_result(); >> + >> + destroy_vpmu_vm(vpmu_vm); >> +} >> + >> +static struct test_desc tests[] = { >> + {"without_filter", check_pmc_counting, { EMPTY_FILTER }}, >> + {"member_allow_filter", check_pmc_counting, >> + {DEFINE_FILTER(SW_INCR, 0), DEFINE_FILTER(INST_RETIRED, 0), >> + DEFINE_FILTER(BR_RETIERD, 0), EMPTY_FILTER}}, >> + {"member_deny_filter", check_pmc_not_counting, >> + {DEFINE_FILTER(SW_INCR, 1), DEFINE_FILTER(INST_RETIRED, 1), >> + DEFINE_FILTER(BR_RETIERD, 1), EMPTY_FILTER}}, >> + {"not_member_deny_filter", check_pmc_counting, >> + {DEFINE_FILTER(SW_INCR, 1), EMPTY_FILTER}}, >> + {"not_member_allow_filter", check_pmc_not_counting, >> + {DEFINE_FILTER(SW_INCR, 0), EMPTY_FILTER}}, >> + { 0 } >> +}; >> + >> +static void for_each_test(void) >> +{ >> + struct test_desc *t; >> + >> + for (t = &tests[0]; t->name; t++) >> + run_test(t); >> +} >> + >> +static void set_invalid_filter(struct vpmu_vm *vm, void *arg) >> +{ >> + struct kvm_pmu_event_filter invalid; >> + struct kvm_device_attr attr = { >> + .group = KVM_ARM_VCPU_PMU_V3_CTRL, >> + .attr = KVM_ARM_VCPU_PMU_V3_FILTER, >> + .addr = (uint64_t)&invalid, >> + }; >> + int ret = 0; >> + >> + /* The max event number is (1 << 16), set a range large than it. */ >> + invalid = __DEFINE_FILTER(BIT(15), BIT(15)+1, 0); >> + ret = __vcpu_ioctl(vm->vcpu, KVM_SET_DEVICE_ATTR, &attr); >> + TEST_ASSERT(ret && errno == EINVAL, "Set Invalid filter range " >> + "ret = %d, errno = %d (expected ret = -1, errno = EINVAL)", >> + ret, errno); >> + >> + ret = 0; >> + >> + /* Set the Invalid action. */ >> + invalid = __DEFINE_FILTER(0, 1, 3); >> + ret = __vcpu_ioctl(vm->vcpu, KVM_SET_DEVICE_ATTR, &attr); >> + TEST_ASSERT(ret && errno == EINVAL, "Set Invalid filter action " >> + "ret = %d, errno = %d (expected ret = -1, errno = EINVAL)", >> + ret, errno); >> +} >> + >> +static void test_invalid_filter(void) >> +{ >> + vpmu_vm = __create_vpmu_vm(guest_code, set_invalid_filter, NULL); >> + destroy_vpmu_vm(vpmu_vm); >> +} >> + >> +int main(void) >> +{ >> + TEST_REQUIRE(kvm_has_cap(KVM_CAP_ARM_PMU_V3)); >> + >> + for_each_test(); >> + >> + test_invalid_filter(); > I would introduce test_invalid_filter in a separate patch Ok. I can split it into two. Thanks, Shaoqin >> +} >> diff --git a/tools/testing/selftests/kvm/include/aarch64/vpmu.h b/tools/testing/selftests/kvm/include/aarch64/vpmu.h >> index e0cc1ca1c4b7..db97bfb07996 100644 >> --- a/tools/testing/selftests/kvm/include/aarch64/vpmu.h >> +++ b/tools/testing/selftests/kvm/include/aarch64/vpmu.h >> @@ -18,6 +18,10 @@ struct vpmu_vm { >> int gic_fd; >> }; >> >> +struct vpmu_vm *__create_vpmu_vm(void *guest_code, >> + void (*init_pmu)(struct vpmu_vm *vm, void *arg), >> + void *arg); >> + >> struct vpmu_vm *create_vpmu_vm(void *guest_code); >> >> void destroy_vpmu_vm(struct vpmu_vm *vpmu_vm); >> diff --git a/tools/testing/selftests/kvm/lib/aarch64/vpmu.c b/tools/testing/selftests/kvm/lib/aarch64/vpmu.c >> index b3de8fdc555e..76ea03d607f1 100644 >> --- a/tools/testing/selftests/kvm/lib/aarch64/vpmu.c >> +++ b/tools/testing/selftests/kvm/lib/aarch64/vpmu.c >> @@ -7,8 +7,9 @@ >> #include >> #include >> >> -/* Create a VM that has one vCPU with PMUv3 configured. */ >> -struct vpmu_vm *create_vpmu_vm(void *guest_code) >> +struct vpmu_vm *__create_vpmu_vm(void *guest_code, >> + void (*init_pmu)(struct vpmu_vm *vm, void *arg), >> + void *arg) >> { >> struct kvm_vcpu_init init; >> uint8_t pmuver; >> @@ -50,12 +51,21 @@ struct vpmu_vm *create_vpmu_vm(void *guest_code) >> "Unexpected PMUVER (0x%x) on the vCPU with PMUv3", pmuver); >> >> /* Initialize vPMU */ >> + if (init_pmu) >> + init_pmu(vpmu_vm, arg); >> + >> vcpu_ioctl(vpmu_vm->vcpu, KVM_SET_DEVICE_ATTR, &irq_attr); >> vcpu_ioctl(vpmu_vm->vcpu, KVM_SET_DEVICE_ATTR, &init_attr); >> >> return vpmu_vm; >> } >> >> +/* Create a VM that has one vCPU with PMUv3 configured. */ >> +struct vpmu_vm *create_vpmu_vm(void *guest_code) >> +{ >> + return __create_vpmu_vm(guest_code, NULL, NULL); >> +} >> + >> void destroy_vpmu_vm(struct vpmu_vm *vpmu_vm) >> { >> close(vpmu_vm->gic_fd); > Thanks > > Eric > -- Shaoqin