Hi Dongli, The logic is fine for me :-) And thank you to take my previous suggestion. When I revisit here after these few weeks, I have some thoughts:
> + if (pmu_cap) { > + if ((pmu_cap & KVM_PMU_CAP_DISABLE) && > + !X86_CPU(cpu)->enable_pmu) { > + ret = kvm_vm_enable_cap(kvm_state, KVM_CAP_PMU_CAPABILITY, 0, > + KVM_PMU_CAP_DISABLE); > + if (ret < 0) { > + error_setg_errno(errp, -ret, > + "Failed to set KVM_PMU_CAP_DISABLE"); > + return ret; > + } > + } This case enhances vPMU disablement. > + } else { > + /* > + * KVM_CAP_PMU_CAPABILITY is introduced in Linux v5.18. For old > + * linux, we have to check enable_pmu parameter for vPMU support. > + */ > + g_autofree char *kvm_enable_pmu; > + > + /* > + * The kvm.enable_pmu's permission is 0444. It does not change > until > + * a reload of the KVM module. > + */ > + if (g_file_get_contents("/sys/module/kvm/parameters/enable_pmu", > + &kvm_enable_pmu, NULL, NULL)) { > + if (*kvm_enable_pmu == 'N' && X86_CPU(cpu)->enable_pmu) { > + error_setg(errp, "Failed to enable PMU since " > + "KVM's enable_pmu parameter is disabled"); > + return -EPERM; > + } And this case checks if vPMU could enable. > } > } > } So I feel it's not good enough to check based on pmu_cap, we can re-split it into these two cases: enable_pmu and !enable_pmu. Then we can make the code path more clear! Just like: diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c index f68d5a057882..d728fb5eaec6 100644 --- a/target/i386/kvm/kvm.c +++ b/target/i386/kvm/kvm.c @@ -2041,44 +2041,42 @@ int kvm_arch_pre_create_vcpu(CPUState *cpu, Error **errp) if (first) { first = false; - /* - * Since Linux v5.18, KVM provides a VM-level capability to easily - * disable PMUs; however, QEMU has been providing PMU property per - * CPU since v1.6. In order to accommodate both, have to configure - * the VM-level capability here. - * - * KVM_PMU_CAP_DISABLE doesn't change the PMU - * behavior on Intel platform because current "pmu" property works - * as expected. - */ - if (pmu_cap) { - if ((pmu_cap & KVM_PMU_CAP_DISABLE) && - !X86_CPU(cpu)->enable_pmu) { - ret = kvm_vm_enable_cap(kvm_state, KVM_CAP_PMU_CAPABILITY, 0, - KVM_PMU_CAP_DISABLE); - if (ret < 0) { - error_setg_errno(errp, -ret, - "Failed to set KVM_PMU_CAP_DISABLE"); - return ret; - } - } - } else { - /* - * KVM_CAP_PMU_CAPABILITY is introduced in Linux v5.18. For old - * linux, we have to check enable_pmu parameter for vPMU support. - */ + if (X86_CPU(cpu)->enable_pmu) { g_autofree char *kvm_enable_pmu; /* - * The kvm.enable_pmu's permission is 0444. It does not change until - * a reload of the KVM module. + * The enable_pmu parameter is introduced since Linux v5.17, + * give a chance to provide more information about vPMU + * enablement. + * + * The kvm.enable_pmu's permission is 0444. It does not change + * until a reload of the KVM module. */ if (g_file_get_contents("/sys/module/kvm/parameters/enable_pmu", &kvm_enable_pmu, NULL, NULL)) { - if (*kvm_enable_pmu == 'N' && X86_CPU(cpu)->enable_pmu) { - error_setg(errp, "Failed to enable PMU since " + if (*kvm_enable_pmu == 'N') { + warn_report("Failed to enable PMU since " "KVM's enable_pmu parameter is disabled"); - return -EPERM; + } + } + } else { + /* + * Since Linux v5.18, KVM provides a VM-level capability to easily + * disable PMUs; however, QEMU has been providing PMU property per + * CPU since v1.6. In order to accommodate both, have to configure + * the VM-level capability here. + * + * KVM_PMU_CAP_DISABLE doesn't change the PMU + * behavior on Intel platform because current "pmu" property works + * as expected. + */ + if ((pmu_cap & KVM_PMU_CAP_DISABLE)) { + ret = kvm_vm_enable_cap(kvm_state, KVM_CAP_PMU_CAPABILITY, 0, + KVM_PMU_CAP_DISABLE); + if (ret < 0) { + error_setg_errno(errp, -ret, + "Failed to set KVM_PMU_CAP_DISABLE"); + return ret; } } }