Skip to content
Navigation Menu
Toggle navigation
Sign in
In this repository
All GitHub Enterprise
↵
Jump to
↵
No suggested jump to results
In this repository
All GitHub Enterprise
↵
Jump to
↵
In this organization
All GitHub Enterprise
↵
Jump to
↵
In this repository
All GitHub Enterprise
↵
Jump to
↵
Sign in
Reseting focus
You signed in with another tab or window.
Reload
to refresh your session.
You signed out in another tab or window.
Reload
to refresh your session.
You switched accounts on another tab or window.
Reload
to refresh your session.
Dismiss alert
{{ message }}
mariux64
/
linux
Public
Notifications
You must be signed in to change notification settings
Fork
0
Star
0
Code
Issues
2
Pull requests
0
Actions
Projects
0
Wiki
Security
Insights
Additional navigation options
Code
Issues
Pull requests
Actions
Projects
Wiki
Security
Insights
Files
3be1863
Documentation
LICENSES
arch
block
certs
crypto
drivers
fs
include
init
ipc
kernel
lib
mm
net
samples
scripts
security
sound
tools
accounting
arch
bootconfig
bpf
build
cgroup
debugging
edid
firewire
firmware
gpio
hv
iio
include
io_uring
kvm
laptop
leds
lib
memory-model
objtool
pci
pcmcia
perf
power
scripts
spi
testing
fault-injection
ktest
kunit
nvdimm
radix-tree
scatterlist
selftests
android
arm64
bpf
breakpoints
capabilities
cgroup
clone3
core
cpu-hotplug
cpufreq
dmabuf-heaps
drivers
efivarfs
exec
filesystems
firmware
fpu
ftrace
futex
gpio
ia64
intel_pstate
ipc
ir
kcmp
kexec
kmod
kselftest
kvm
aarch64
include
aarch64
s390x
x86_64
evmcs.h
kvm_util.h
perf_test_util.h
sparsebit.h
test_util.h
lib
s390x
x86_64
.gitignore
Makefile
config
demand_paging_test.c
dirty_log_test.c
kvm_create_max_vcpus.c
set_memory_region_test.c
steal_time.c
lib
livepatch
lkdtm
locking
media_tests
membarrier
memfd
memory-hotplug
mincore
mount
mqueue
net
netfilter
nsfs
ntb
openat2
pid_namespace
pidfd
powerpc
prctl
proc
pstore
ptp
ptrace
rcutorture
resctrl
rseq
rtc
safesetid
seccomp
sigaltstack
size
sparc64
splice
static_keys
sync
sysctl
tc-testing
timens
timers
tmpfs
tpm2
uevent
user
vDSO
vm
watchdog
wireguard
x86
zram
.gitignore
Makefile
gen_kselftest_tar.sh
kselftest.h
kselftest_deps.sh
kselftest_harness.h
kselftest_install.sh
kselftest_module.h
lib.mk
run_kselftest.sh
vsock
thermal
time
usb
virtio
vm
wmi
Makefile
usr
virt
.clang-format
.cocciconfig
.get_maintainer.ignore
.gitattributes
.gitignore
.mailmap
COPYING
CREDITS
Kbuild
Kconfig
MAINTAINERS
Makefile
README
Breadcrumbs
linux
/
tools
/
testing
/
selftests
/
kvm
/
include
/
perf_test_util.h
Copy path
Blame
Blame
Latest commit
History
History
196 lines (151 loc) · 5.27 KB
Breadcrumbs
linux
/
tools
/
testing
/
selftests
/
kvm
/
include
/
perf_test_util.h
Top
File metadata and controls
Code
Blame
196 lines (151 loc) · 5.27 KB
Raw
// SPDX-License-Identifier: GPL-2.0 /* * tools/testing/selftests/kvm/include/perf_test_util.h * * Copyright (C) 2020, Google LLC. */ #ifndef SELFTEST_KVM_PERF_TEST_UTIL_H #define SELFTEST_KVM_PERF_TEST_UTIL_H #include "kvm_util.h" #include "processor.h" #define MAX_VCPUS 512 #define PAGE_SHIFT_4K 12 #define PTES_PER_4K_PT 512 #define TEST_MEM_SLOT_INDEX 1 /* Default guest test virtual memory offset */ #define DEFAULT_GUEST_TEST_MEM 0xc0000000 #define DEFAULT_PER_VCPU_MEM_SIZE (1 << 30) /* 1G */ /* * Guest physical memory offset of the testing memory slot. * This will be set to the topmost valid physical address minus * the test memory size. */ static uint64_t guest_test_phys_mem; /* * Guest virtual memory offset of the testing memory slot. * Must not conflict with identity mapped test code. */ static uint64_t guest_test_virt_mem = DEFAULT_GUEST_TEST_MEM; static uint64_t guest_percpu_mem_size = DEFAULT_PER_VCPU_MEM_SIZE; /* Number of VCPUs for the test */ static int nr_vcpus = 1; struct vcpu_args { uint64_t gva; uint64_t pages; /* Only used by the host userspace part of the vCPU thread */ int vcpu_id; }; struct perf_test_args { struct kvm_vm *vm; uint64_t host_page_size; uint64_t guest_page_size; int wr_fract; struct vcpu_args vcpu_args[MAX_VCPUS]; }; static struct perf_test_args perf_test_args; /* * Continuously write to the first 8 bytes of each page in the * specified region. */ static void guest_code(uint32_t vcpu_id) { struct vcpu_args *vcpu_args = &perf_test_args.vcpu_args[vcpu_id]; uint64_t gva; uint64_t pages; int i; /* Make sure vCPU args data structure is not corrupt. */ GUEST_ASSERT(vcpu_args->vcpu_id == vcpu_id); gva = vcpu_args->gva; pages = vcpu_args->pages; for (i = 0; i < pages; i++) { uint64_t addr = gva + (i * perf_test_args.guest_page_size); if (i % perf_test_args.wr_fract == 0) *(uint64_t *)addr = 0x0123456789ABCDEF; else READ_ONCE(*(uint64_t *)addr); } GUEST_SYNC(1); } static struct kvm_vm *create_vm(enum vm_guest_mode mode, int vcpus, uint64_t vcpu_memory_bytes) { struct kvm_vm *vm; uint64_t pages = DEFAULT_GUEST_PHY_PAGES; uint64_t guest_num_pages; /* Account for a few pages per-vCPU for stacks */ pages += DEFAULT_STACK_PGS * vcpus; /* * Reserve twice the ammount of memory needed to map the test region and * the page table / stacks region, at 4k, for page tables. Do the * calculation with 4K page size: the smallest of all archs. (e.g., 64K * page size guest will need even less memory for page tables). */ pages += (2 * pages) / PTES_PER_4K_PT; pages += ((2 * vcpus * vcpu_memory_bytes) >> PAGE_SHIFT_4K) / PTES_PER_4K_PT; pages = vm_adjust_num_guest_pages(mode, pages); pr_info("Testing guest mode: %s\n", vm_guest_mode_string(mode)); vm = vm_create(mode, pages, O_RDWR); kvm_vm_elf_load(vm, program_invocation_name, 0, 0); #ifdef __x86_64__ vm_create_irqchip(vm); #endif perf_test_args.vm = vm; perf_test_args.guest_page_size = vm_get_page_size(vm); perf_test_args.host_page_size = getpagesize(); TEST_ASSERT(vcpu_memory_bytes % perf_test_args.guest_page_size == 0, "Guest memory size is not guest page size aligned."); guest_num_pages = (vcpus * vcpu_memory_bytes) / perf_test_args.guest_page_size; guest_num_pages = vm_adjust_num_guest_pages(mode, guest_num_pages); /* * If there should be more memory in the guest test region than there * can be pages in the guest, it will definitely cause problems. */ TEST_ASSERT(guest_num_pages < vm_get_max_gfn(vm), "Requested more guest memory than address space allows.\n" " guest pages: %lx max gfn: %x vcpus: %d wss: %lx]\n", guest_num_pages, vm_get_max_gfn(vm), vcpus, vcpu_memory_bytes); TEST_ASSERT(vcpu_memory_bytes % perf_test_args.host_page_size == 0, "Guest memory size is not host page size aligned."); guest_test_phys_mem = (vm_get_max_gfn(vm) - guest_num_pages) * perf_test_args.guest_page_size; guest_test_phys_mem &= ~(perf_test_args.host_page_size - 1); #ifdef __s390x__ /* Align to 1M (segment size) */ guest_test_phys_mem &= ~((1 << 20) - 1); #endif pr_info("guest physical test memory offset: 0x%lx\n", guest_test_phys_mem); /* Add an extra memory slot for testing */ vm_userspace_mem_region_add(vm, VM_MEM_SRC_ANONYMOUS, guest_test_phys_mem, TEST_MEM_SLOT_INDEX, guest_num_pages, 0); /* Do mapping for the demand paging memory slot */ virt_map(vm, guest_test_virt_mem, guest_test_phys_mem, guest_num_pages, 0); ucall_init(vm, NULL); return vm; } static void add_vcpus(struct kvm_vm *vm, int vcpus, uint64_t vcpu_memory_bytes) { vm_paddr_t vcpu_gpa; struct vcpu_args *vcpu_args; int vcpu_id; for (vcpu_id = 0; vcpu_id < vcpus; vcpu_id++) { vcpu_args = &perf_test_args.vcpu_args[vcpu_id]; vm_vcpu_add_default(vm, vcpu_id, guest_code); #ifdef __x86_64__ vcpu_set_cpuid(vm, vcpu_id, kvm_get_supported_cpuid()); #endif vcpu_args->vcpu_id = vcpu_id; vcpu_args->gva = guest_test_virt_mem + (vcpu_id * vcpu_memory_bytes); vcpu_args->pages = vcpu_memory_bytes / perf_test_args.guest_page_size; vcpu_gpa = guest_test_phys_mem + (vcpu_id * vcpu_memory_bytes); pr_debug("Added VCPU %d with test mem gpa [%lx, %lx)\n", vcpu_id, vcpu_gpa, vcpu_gpa + vcpu_memory_bytes); } } #endif /* SELFTEST_KVM_PERF_TEST_UTIL_H */
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
You can’t perform that action at this time.