On Wed, Jul 12, 2023, Like Xu wrote: > On 2023/6/7 09:02, Sean Christopherson wrote: > > Move the call to kvm_x86_pmu.hw_event_available(), which has nothing to > > with the userspace PMU filter, out of check_pmu_event_filter() and into > > its sole caller pmc_event_is_allowed(). pmc_event_is_allowed() didn't > > exist when commit 7aadaa988c5e ("KVM: x86/pmu: Drop amd_event_mapping[] > > in the KVM context"), so presumably the motivation for invoking > > .hw_event_available() from check_pmu_event_filter() was to avoid having > > to add multiple call sites. > > The event unavailability check based on intel cpuid is, in my opinion, > part of our pmu_event_filter mechanism. Unavailable events can be > defined either by KVM userspace or by architectural cpuid (if any). > > The bigger issue here is what happens when the two rules conflict, and > the answer can be found more easily by putting the two parts in one > function (the architectural cpuid rule takes precedence). I want to clearly differentiate between what KVM allows and what userspace allows, and specifically I want to use "filter" only to describe userspace intervention as much as possible. Outside of kvm_get_filtered_xcr0(), which I would classify as userspace-defined behavior (albeit rather indirectly), and a few architecturally defined "filter" terms from Intel and AMD, we don't use "filter" in KVM to describe KVM behavior. IMO, there's a lot of value in being able to associate "filter" with userspace desires, e.g. just mentioning "filtering" immediately frames a conversation as dealing with userspace's wants, not internal KVM behavior.