|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/2][XTF] xtf/vpmu: MSR read/write tests for VPMU
On Thu, Apr 20, 2017 at 04:40:08PM -0400, Mohit Gambhir wrote:
> This patch tests VPMU functionality in the hypervisor on Intel machines.
> The tests write to all valid bits in the MSRs that get exposed to the guests
> when VPMU is enabled. The tests also write invalid values to the bits
> that should be masked and expect the wrmsr call to fault.
>
> The tests are currently unsupported for AMD machines and PV guests.
>
> Signed-off-by: Mohit Gambhir <mohit.gambhir@xxxxxxxxxx>
[...]
> +void test_main(void)
> +{
> + /* Architectural Performance Monitoring Version */
> + uint8_t ver;
> +
> + /* Number of general purpose counter registers */
> + uint8_t ngregs;
> +
> + /* Number of fixed function counter registers */
> + uint8_t nfregs;
> +
> + /* Bit width of general-purpose, performance monitoring counter */
> + uint8_t ngbits;
> +
> + if ( IS_DEFINED(CONFIG_PV) )
> + {
> + printk("VPMU testing for PV guests currently unsupported\n");
> + goto out;
> + }
> +
> + if ( vendor_is_amd )
> + {
> + printk("VPMU testing for AMD currently unsupported\n");
> + goto out;
> + }
These two cases should probably return SKIP instead of SUCCESS.
Wei.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |