@@ -325,6 +325,49 @@ static void test_not_member_allow_list(struct kvm_vm *vm)
TEST_ASSERT(!count, "Disallowed PMU Event is counting");
}
+/*
+ * Verify KVM_CAP_PMU_DISABLE prevents the use of the PMU.
+ *
+ * Note that KVM_CAP_PMU_CAPABILITY must be invoked prior to creating VCPUs.
+ */
+static void test_pmu_config_disable(void (*guest_code)(void))
+{
+ int r;
+ struct kvm_vm *vm;
+ struct kvm_cpuid2 *cpuid2;
+ struct kvm_cpuid_entry2 *entry;
+ struct kvm_enable_cap cap = { 0 };
+ bool sane;
+
+ r = kvm_check_cap(KVM_CAP_PMU_CAPABILITY);
+ if ((r & KVM_CAP_PMU_DISABLE) == 0)
+ return;
+
+ vm = vm_create_without_vcpus(VM_MODE_DEFAULT, DEFAULT_GUEST_PHY_PAGES);
+
+ cap.cap = KVM_CAP_PMU_CAPABILITY;
+ cap.args[0] = KVM_CAP_PMU_DISABLE;
+ r = vm_enable_cap(vm, &cap);
+ TEST_ASSERT(r == 0, "Failed KVM_CAP_PMU_DISABLE.");
+
+ vm_vcpu_add_default(vm, VCPU_ID, guest_code);
+ vm_init_descriptor_tables(vm);
+ vcpu_init_descriptor_tables(vm, VCPU_ID);
+
+ cpuid2 = vcpu_get_cpuid(vm, VCPU_ID);
+ entry = get_cpuid(cpuid2, 0xA, 0);
+ if (entry) {
+ TEST_ASSERT(entry->eax == 0 && entry->ebx == 0 &&
+ entry->ecx == 0 && entry->edx == 0,
+ "CPUID should not advertise PMU when disabled.");
+ }
+
+ sane = sanity_check_pmu(vm);
+ TEST_ASSERT(!sane, "Guest should not be able to use disabled PMU.");
+
+ kvm_vm_free(vm);
+}
+
/*
* Check for a non-zero PMU version, at least one general-purpose
* counter per logical processor, an EBX bit vector of length greater
@@ -430,5 +473,7 @@ int main(int argc, char *argv[])
kvm_vm_free(vm);
+ test_pmu_config_disable(guest_code);
+
return 0;
}
On a VM with PMU disabled via KVM_CAP_PMU_CONFIG, the PMU will not be usable by the guest. On Intel, this causes a #GP. And on AMD, the counters no longer increment. KVM_CAP_PMU_CONFIG must be invoked on a VM prior to creating VCPUs. Signed-off-by: David Dunn <daviddunn@google.com> --- .../kvm/x86_64/pmu_event_filter_test.c | 45 +++++++++++++++++++ 1 file changed, 45 insertions(+)