Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4396313rdh; Tue, 28 Nov 2023 23:27:57 -0800 (PST) X-Google-Smtp-Source: AGHT+IHoaTGS6PzBeDZ5a8dfLn1AeTYRu4J1pkUoEJBDRfFE0qTGSRGNifx4+/c1c7940A6Tn4KK X-Received: by 2002:a05:6871:b24:b0:1fa:48a8:899e with SMTP id fq36-20020a0568710b2400b001fa48a8899emr12810438oab.48.1701242876841; Tue, 28 Nov 2023 23:27:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701242876; cv=none; d=google.com; s=arc-20160816; b=A2CujQrJyUd+mY6RpafCB3Y4NRI62T9OlF6DI1lCuErCIxzKQIrVT/WRT3SYQK6lkA 61FyHU+P73H8JEkJ6MTWUQ02wP8DJxm+B9fHoe3PXZJ4J8H0MkUwCLeQ6HOpbJFo7Djq cneuuTjj86NEIEqtcT1JQEo+1YvZv/tPnds9mICFPQNCGgnEWDIE8bZGPvx7bC/9D3fX UOyc+btyPIN9ZkAJCw9H/gUIskF9vyipIOLS3u5k6vKWXWlSExWpyN/sS4DYJbHZYJoB H6FBNPAsdT4aLHEgYdrGusjQxA4B6DPw32SMezlUkXq2i7PT5zEdjwbuG7Cg5AcRZ65o eQrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=9JHYtqN+twx/AtEyT3VDqnE70xU96u5kUlPvxpv06qw=; fh=upYGnNmVp+wSeXftrd1u/PkLNX/69+5ve698NTL2zbY=; b=WoG8Qp6SlIGI/T3WEVhrQFBKg2JJUkFzig3NdriF2nkwbE9GGWGh/cJ8jfDguL5PL3 OsyWyPOZg8IchgZDNNU87RCYIG3x0hZMl60tPzYQBHDO3dXXB23/6l1wULW0H/dsxY7k T22PhcgalX5+yEsPD5HXDfqnl4sgVQ95WQ2Ct9uTV4K8rq/y2y10vMWSki5cLp8PLlny yPlg/xMk+VcApMtqlfKTxJdHUhCmqfz1zUiSBrJLkpq2MOf6qZJe8IJP2jJ0e1J+hLok CQ/nFAVMPb1G63+gdwocY3I5vdoJ4cNaoYZIw76iWuGDhbT+2peeJRm3aj8VAxMvs+Nt VvWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Jk4fVvX2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id t13-20020a62d14d000000b006cd8a31b002si6616311pfl.375.2023.11.28.23.27.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 23:27:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Jk4fVvX2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 3098B804C562; Tue, 28 Nov 2023 23:27:46 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229716AbjK2H1X (ORCPT + 99 others); Wed, 29 Nov 2023 02:27:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45834 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229464AbjK2H1W (ORCPT ); Wed, 29 Nov 2023 02:27:22 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C32A6DA for ; Tue, 28 Nov 2023 23:27:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701242847; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9JHYtqN+twx/AtEyT3VDqnE70xU96u5kUlPvxpv06qw=; b=Jk4fVvX2xAu/md09BvODSHr8P6FkSujDDHtBfzZVEovocE/RyQXhHsz8M/LxPGejyHUrj2 2rpNwnNSsxcQg1+nyXfCUkW+kWBEz2WUkrVWDJFRvSQp5WDJYERr58kDOhCDMzWqPyCCOq ztcOw7GsXNdWBHxzd7cLLLAFK5NBoYY= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-179-wuFVBLUqOLii4dpAtBKsVg-1; Wed, 29 Nov 2023 02:27:24 -0500 X-MC-Unique: wuFVBLUqOLii4dpAtBKsVg-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 30D43101A53B; Wed, 29 Nov 2023 07:27:24 +0000 (UTC) Received: from virt-mtcollins-01.lab.eng.rdu2.redhat.com (virt-mtcollins-01.lab.eng.rdu2.redhat.com [10.8.1.196]) by smtp.corp.redhat.com (Postfix) with ESMTP id EAE961C060AE; Wed, 29 Nov 2023 07:27:23 +0000 (UTC) From: Shaoqin Huang To: Marc Zyngier , Oliver Upton , kvmarm@lists.linux.dev Cc: Eric Auger , Shaoqin Huang , James Morse , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Paolo Bonzini , Shuah Khan , Suzuki K Poulose , Zenghui Yu Subject: [PATCH v2 0/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test Date: Wed, 29 Nov 2023 02:27:02 -0500 Message-Id: <20231129072712.2667337-1-shahuang@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.7 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Tue, 28 Nov 2023 23:27:46 -0800 (PST) The test is inspired by the pmu_event_filter_test which implemented by x86. On the arm64 platform, there is the same ability to set the pmu_event_filter through the KVM_ARM_VCPU_PMU_V3_FILTER attribute. So add the test for arm64. The series first move some pmu common code from vpmu_counter_access to lib/aarch64/vpmu.c and include/aarch64/vpmu.h, which can be used by pmu_event_filter_test. Then fix a bug related to the [enable|disable]_counter, and at last, implement the test itself. Changelog: ---------- v1->v2: - Improve the commit message. [Eric] - Fix the bug in [enable|disable]_counter. [Raghavendra & Marc] - Add the check if kvm has attr KVM_ARM_VCPU_PMU_V3_FILTER. - Add if host pmu support the test event throught pmceid0. - Split the test_invalid_filter() to another patch. [Eric] v1: https://lore.kernel.org/all/20231123063750.2176250-1-shahuang@redhat.com/ Shaoqin Huang (5): KVM: selftests: aarch64: Make the [create|destroy]_vpmu_vm() public KVM: selftests: aarch64: Move pmu helper functions into vpmu.h KVM: selftests: aarch64: Fix the buggy [enable|disable]_counter KVM: selftests: aarch64: Introduce pmu_event_filter_test KVM: selftests: aarch64: Add invalid filter test in pmu_event_filter_test tools/testing/selftests/kvm/Makefile | 2 + .../kvm/aarch64/pmu_event_filter_test.c | 267 ++++++++++++++++++ .../kvm/aarch64/vpmu_counter_access.c | 218 ++------------ .../selftests/kvm/include/aarch64/vpmu.h | 135 +++++++++ .../testing/selftests/kvm/lib/aarch64/vpmu.c | 74 +++++ 5 files changed, 502 insertions(+), 194 deletions(-) create mode 100644 tools/testing/selftests/kvm/aarch64/pmu_event_filter_test.c create mode 100644 tools/testing/selftests/kvm/include/aarch64/vpmu.h create mode 100644 tools/testing/selftests/kvm/lib/aarch64/vpmu.c -- 2.40.1