mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-05-09 09:01:36 -04:00
KVM: selftests: Add testing for KVM_SET_PMU_EVENT_FILTER
Test that masked events are not using invalid bits, and if they are, ensure the pmu event filter is not accepted by KVM_SET_PMU_EVENT_FILTER. The only valid bits that can be used for masked events are set when using KVM_PMU_ENCODE_MASKED_ENTRY() with one exception: If any of the high bits (35:32) of the event select are set when using Intel, the pmu event filter will fail. Also, because validation was not being done prior to the introduction of masked events, only expect validation to fail when masked events are used. E.g. in the first test a filter event with all its bits set is accepted by KVM_SET_PMU_EVENT_FILTER when flags = 0. Signed-off-by: Aaron Lewis <aaronlewis@google.com> Link: https://lore.kernel.org/r/20221220161236.555143-7-aaronlewis@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
This commit is contained in:
committed by
Sean Christopherson
parent
f1e06fa10e
commit
7b7027937d
@@ -404,6 +404,39 @@ static bool use_amd_pmu(void)
|
||||
is_zen3(family, model));
|
||||
}
|
||||
|
||||
static int run_filter_test(struct kvm_vcpu *vcpu, const uint64_t *events,
|
||||
int nevents, uint32_t flags)
|
||||
{
|
||||
struct kvm_pmu_event_filter *f;
|
||||
int r;
|
||||
|
||||
f = create_pmu_event_filter(events, nevents, KVM_PMU_EVENT_ALLOW, flags);
|
||||
r = __vm_ioctl(vcpu->vm, KVM_SET_PMU_EVENT_FILTER, f);
|
||||
free(f);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
static void test_filter_ioctl(struct kvm_vcpu *vcpu)
|
||||
{
|
||||
uint64_t e = ~0ul;
|
||||
int r;
|
||||
|
||||
/*
|
||||
* Unfortunately having invalid bits set in event data is expected to
|
||||
* pass when flags == 0 (bits other than eventsel+umask).
|
||||
*/
|
||||
r = run_filter_test(vcpu, &e, 1, 0);
|
||||
TEST_ASSERT(r == 0, "Valid PMU Event Filter is failing");
|
||||
|
||||
r = run_filter_test(vcpu, &e, 1, KVM_PMU_EVENT_FLAG_MASKED_EVENTS);
|
||||
TEST_ASSERT(r != 0, "Invalid PMU Event Filter is expected to fail");
|
||||
|
||||
e = KVM_PMU_EVENT_ENCODE_MASKED_ENTRY(0xff, 0xff, 0xff, 0xf);
|
||||
r = run_filter_test(vcpu, &e, 1, KVM_PMU_EVENT_FLAG_MASKED_EVENTS);
|
||||
TEST_ASSERT(r == 0, "Valid PMU Event Filter is failing");
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
void (*guest_code)(void);
|
||||
@@ -411,6 +444,7 @@ int main(int argc, char *argv[])
|
||||
struct kvm_vm *vm;
|
||||
|
||||
TEST_REQUIRE(kvm_has_cap(KVM_CAP_PMU_EVENT_FILTER));
|
||||
TEST_REQUIRE(kvm_has_cap(KVM_CAP_PMU_EVENT_MASKED_EVENTS));
|
||||
|
||||
TEST_REQUIRE(use_intel_pmu() || use_amd_pmu());
|
||||
guest_code = use_intel_pmu() ? intel_guest_code : amd_guest_code;
|
||||
@@ -431,6 +465,8 @@ int main(int argc, char *argv[])
|
||||
test_not_member_deny_list(vcpu);
|
||||
test_not_member_allow_list(vcpu);
|
||||
|
||||
test_filter_ioctl(vcpu);
|
||||
|
||||
kvm_vm_free(vm);
|
||||
|
||||
test_pmu_config_disable(guest_code);
|
||||
|
||||
Reference in New Issue
Block a user