[kvm-unit-tests PATCH v3] add hyperv_connections test

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Add a test for Hyper-V message and event connections.

It requires QEMU with the extended test device supporting message end
event connection test modes (recently posted on qemu-devel).  On older
QEMU versions the test reports a single SKIP.

Signed-off-by: Roman Kagan <rkagan@xxxxxxxxxxxxx>
---
v2 -> v3:
 - more style fixes
 - check return value from alloc_page

v1 -> v2:
 - dropped already applied patches
 - add detection of old QEMU per Paolo's suggestion and skip the test if QEMU
   doesn't support connectionid
 - adjusted test group in unittests.cfg
 - fixed indentation to use tabs as it's a new file
 - note: *not* switched to on_cpus() because different arguments are passed to
   each cpu

 x86/Makefile.common      |   3 +
 x86/hyperv_connections.c | 336 +++++++++++++++++++++++++++++++++++++++++++++++
 x86/unittests.cfg        |   6 +
 3 files changed, 345 insertions(+)
 create mode 100644 x86/hyperv_connections.c

diff --git a/x86/Makefile.common b/x86/Makefile.common
index 7bb6b50..ca97a8e 100644
--- a/x86/Makefile.common
+++ b/x86/Makefile.common
@@ -49,6 +49,7 @@ tests-common = $(TEST_DIR)/vmexit.flat $(TEST_DIR)/tsc.flat \
                $(TEST_DIR)/tsc_adjust.flat $(TEST_DIR)/asyncpf.flat \
                $(TEST_DIR)/init.flat $(TEST_DIR)/smap.flat \
                $(TEST_DIR)/hyperv_synic.flat $(TEST_DIR)/hyperv_stimer.flat \
+               $(TEST_DIR)/hyperv_connections.flat \
 
 ifdef API
 tests-api = api/api-sample api/dirty-log api/dirty-log-perf
@@ -71,6 +72,8 @@ $(TEST_DIR)/hyperv_synic.elf: $(TEST_DIR)/hyperv.o
 
 $(TEST_DIR)/hyperv_stimer.elf: $(TEST_DIR)/hyperv.o
 
+$(TEST_DIR)/hyperv_connections.elf: $(TEST_DIR)/hyperv.o
+
 arch_clean:
 	$(RM) $(TEST_DIR)/*.o $(TEST_DIR)/*.flat $(TEST_DIR)/*.elf \
 	$(TEST_DIR)/.*.d lib/x86/.*.d \
diff --git a/x86/hyperv_connections.c b/x86/hyperv_connections.c
new file mode 100644
index 0000000..b061048
--- /dev/null
+++ b/x86/hyperv_connections.c
@@ -0,0 +1,336 @@
+#include "libcflat.h"
+#include "vm.h"
+#include "smp.h"
+#include "isr.h"
+#include "atomic.h"
+#include "hyperv.h"
+#include "bitops.h"
+
+#define MAX_CPUS 64
+
+#define MSG_VEC 0xb0
+#define EVT_VEC 0xb1
+#define MSG_SINT 0x8
+#define EVT_SINT 0x9
+#define MSG_CONN_BASE 0x10
+#define EVT_CONN_BASE 0x20
+#define MSG_TYPE 0x12345678
+
+#define WAIT_CYCLES 10000000
+
+static atomic_t ncpus_done;
+
+struct hv_vcpu {
+	struct hv_message_page *msg_page;
+	struct hv_event_flags_page *evt_page;
+	struct hv_input_post_message *post_msg;
+	u8 msg_conn;
+	u8 evt_conn;
+	u64 hvcall_status;
+	atomic_t sint_received;
+};
+
+static struct hv_vcpu hv_vcpus[MAX_CPUS];
+
+static void sint_isr(isr_regs_t *regs)
+{
+	atomic_inc(&hv_vcpus[smp_id()].sint_received);
+}
+
+static void *hypercall_page;
+
+static void setup_hypercall(void)
+{
+	u64 guestid = (0x8f00ull << 48);
+
+	hypercall_page = alloc_page();
+	if (!hypercall_page)
+		report_abort("failed to allocate hypercall page");
+	memset(hypercall_page, 0, PAGE_SIZE);
+
+	wrmsr(HV_X64_MSR_GUEST_OS_ID, guestid);
+
+	wrmsr(HV_X64_MSR_HYPERCALL,
+	      (u64)virt_to_phys(hypercall_page) | HV_X64_MSR_HYPERCALL_ENABLE);
+}
+
+static void teardown_hypercall(void)
+{
+	wrmsr(HV_X64_MSR_HYPERCALL, 0);
+	wrmsr(HV_X64_MSR_GUEST_OS_ID, 0);
+	free_page(hypercall_page);
+}
+
+static u64 do_hypercall(u16 code, u64 arg, bool fast)
+{
+	u64 ret;
+	u64 ctl = code;
+	if (fast)
+		ctl |= HV_HYPERCALL_FAST;
+
+	asm volatile ("call *%[hcall_page]"
+#ifdef __x86_64__
+		      "\n mov $0,%%r8"
+		      : "=a"(ret)
+		      : "c"(ctl), "d"(arg),
+#else
+		      : "=A"(ret)
+		      : "A"(ctl),
+			"b" ((u32)(arg >> 32)), "c" ((u32)arg),
+			"D"(0), "S"(0),
+#endif
+		      [hcall_page] "m" (hypercall_page)
+#ifdef __x86_64__
+		      : "r8"
+#endif
+		     );
+
+	return ret;
+}
+
+static void setup_cpu(void *ctx)
+{
+	int vcpu;
+	struct hv_vcpu *hv;
+
+	write_cr3((ulong)ctx);
+	irq_enable();
+
+	vcpu = smp_id();
+	hv = &hv_vcpus[vcpu];
+
+	hv->msg_page = alloc_page();
+	hv->evt_page = alloc_page();
+	hv->post_msg = alloc_page();
+	if (!hv->msg_page || !hv->evt_page || !hv->post_msg)
+		report_abort("failed to allocate synic pages for vcpu");
+	memset(hv->msg_page, 0, sizeof(*hv->msg_page));
+	memset(hv->evt_page, 0, sizeof(*hv->evt_page));
+	memset(hv->post_msg, 0, sizeof(*hv->post_msg));
+	hv->msg_conn = MSG_CONN_BASE + vcpu;
+	hv->evt_conn = EVT_CONN_BASE + vcpu;
+
+	wrmsr(HV_X64_MSR_SIMP,
+	      (u64)virt_to_phys(hv->msg_page) | HV_SYNIC_SIMP_ENABLE);
+	wrmsr(HV_X64_MSR_SIEFP,
+	      (u64)virt_to_phys(hv->evt_page) | HV_SYNIC_SIEFP_ENABLE);
+	wrmsr(HV_X64_MSR_SCONTROL, HV_SYNIC_CONTROL_ENABLE);
+
+	msg_conn_create(MSG_SINT, MSG_VEC, hv->msg_conn);
+	evt_conn_create(EVT_SINT, EVT_VEC, hv->evt_conn);
+
+	hv->post_msg->connectionid = hv->msg_conn;
+	hv->post_msg->message_type = MSG_TYPE;
+	hv->post_msg->payload_size = 8;
+	hv->post_msg->payload[0] = (u64)vcpu << 16;
+}
+
+static void teardown_cpu(void *ctx)
+{
+	int vcpu = smp_id();
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+
+	evt_conn_destroy(EVT_SINT, hv->evt_conn);
+	msg_conn_destroy(MSG_SINT, hv->msg_conn);
+
+	wrmsr(HV_X64_MSR_SCONTROL, 0);
+	wrmsr(HV_X64_MSR_SIEFP, 0);
+	wrmsr(HV_X64_MSR_SIMP, 0);
+
+	free_page(hv->post_msg);
+	free_page(hv->evt_page);
+	free_page(hv->msg_page);
+}
+
+static void do_msg(void *ctx)
+{
+	int vcpu = (ulong)ctx;
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	struct hv_input_post_message *msg = hv->post_msg;
+
+	msg->payload[0]++;
+	atomic_set(&hv->sint_received, 0);
+	hv->hvcall_status = do_hypercall(HVCALL_POST_MESSAGE,
+					 virt_to_phys(msg), 0);
+	atomic_inc(&ncpus_done);
+}
+
+static void clear_msg(void *ctx)
+{
+	/* should only be done on the current vcpu */
+	int vcpu = smp_id();
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	struct hv_message *msg = &hv->msg_page->sint_message[MSG_SINT];
+
+	atomic_set(&hv->sint_received, 0);
+	msg->header.message_type = 0;
+	barrier();
+	wrmsr(HV_X64_MSR_EOM, 0);
+	atomic_inc(&ncpus_done);
+}
+
+static bool msg_ok(int vcpu)
+{
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	struct hv_input_post_message *post_msg = hv->post_msg;
+	struct hv_message *msg = &hv->msg_page->sint_message[MSG_SINT];
+
+	return msg->header.message_type == post_msg->message_type &&
+		msg->header.payload_size == post_msg->payload_size &&
+		msg->header.message_flags.msg_pending == 0 &&
+		msg->u.payload[0] == post_msg->payload[0] &&
+		hv->hvcall_status == 0 &&
+		atomic_read(&hv->sint_received) == 1;
+}
+
+static bool msg_busy(int vcpu)
+{
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	struct hv_input_post_message *post_msg = hv->post_msg;
+	struct hv_message *msg = &hv->msg_page->sint_message[MSG_SINT];
+
+	return msg->header.message_type == post_msg->message_type &&
+		msg->header.payload_size == post_msg->payload_size &&
+		msg->header.message_flags.msg_pending == 1 &&
+		msg->u.payload[0] == post_msg->payload[0] - 1 &&
+		hv->hvcall_status == 0 &&
+		atomic_read(&hv->sint_received) == 0;
+}
+
+static void do_evt(void *ctx)
+{
+	int vcpu = (ulong)ctx;
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+
+	atomic_set(&hv->sint_received, 0);
+	hv->hvcall_status = do_hypercall(HVCALL_SIGNAL_EVENT,
+					 hv->evt_conn, 1);
+	atomic_inc(&ncpus_done);
+}
+
+static void clear_evt(void *ctx)
+{
+	/* should only be done on the current vcpu */
+	int vcpu = smp_id();
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	ulong *flags = hv->evt_page->slot[EVT_SINT].flags;
+
+	atomic_set(&hv->sint_received, 0);
+	flags[BIT_WORD(hv->evt_conn)] &= ~BIT_MASK(hv->evt_conn);
+	barrier();
+	atomic_inc(&ncpus_done);
+}
+
+static bool evt_ok(int vcpu)
+{
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	ulong *flags = hv->evt_page->slot[EVT_SINT].flags;
+
+	return flags[BIT_WORD(hv->evt_conn)] == BIT_MASK(hv->evt_conn) &&
+		hv->hvcall_status == 0 &&
+		atomic_read(&hv->sint_received) == 1;
+}
+
+static bool evt_busy(int vcpu)
+{
+	struct hv_vcpu *hv = &hv_vcpus[vcpu];
+	ulong *flags = hv->evt_page->slot[EVT_SINT].flags;
+
+	return flags[BIT_WORD(hv->evt_conn)] == BIT_MASK(hv->evt_conn) &&
+		hv->hvcall_status == 0 &&
+		atomic_read(&hv->sint_received) == 0;
+}
+
+static int run_test(int ncpus, int dst_add, ulong wait_cycles,
+		    void (*func)(void *), bool (*is_ok)(int))
+{
+	int i, ret = 0;
+
+	atomic_set(&ncpus_done, 0);
+	for (i = 0; i < ncpus; i++) {
+		ulong dst = (i + dst_add) % ncpus;
+		on_cpu_async(i, func, (void *)dst);
+	}
+	while (atomic_read(&ncpus_done) != ncpus)
+		pause();
+
+	while (wait_cycles--)
+		pause();
+
+	if (is_ok)
+		for (i = 0; i < ncpus; i++)
+			ret += is_ok(i);
+	return ret;
+}
+
+#define HV_STATUS_INVALID_HYPERCALL_CODE        2
+
+int main(int ac, char **av)
+{
+	int ncpus, ncpus_ok, i;
+
+	if (!synic_supported()) {
+		report_skip("Hyper-V SynIC is not supported");
+		goto summary;
+	}
+
+	setup_vm();
+	smp_init();
+	ncpus = cpu_count();
+	if (ncpus > MAX_CPUS)
+		report_abort("# cpus: %d > %d", ncpus, MAX_CPUS);
+
+	handle_irq(MSG_VEC, sint_isr);
+	handle_irq(EVT_VEC, sint_isr);
+
+	setup_hypercall();
+
+	if (do_hypercall(HVCALL_SIGNAL_EVENT, 0x1234, 1) ==
+	    HV_STATUS_INVALID_HYPERCALL_CODE) {
+		report_skip("Hyper-V SynIC connections are not supported");
+		goto summary;
+	}
+
+	for (i = 0; i < ncpus; i++)
+		on_cpu(i, setup_cpu, (void *)read_cr3());
+
+	ncpus_ok = run_test(ncpus, 0, WAIT_CYCLES, do_msg, msg_ok);
+	report("send message to self: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	run_test(ncpus, 0, 0, clear_msg, NULL);
+
+	ncpus_ok = run_test(ncpus, 1, WAIT_CYCLES, do_msg, msg_ok);
+	report("send message to another cpu: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	ncpus_ok = run_test(ncpus, 1, WAIT_CYCLES, do_msg, msg_busy);
+	report("send message to busy slot: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	ncpus_ok = run_test(ncpus, 0, WAIT_CYCLES, clear_msg, msg_ok);
+	report("receive pending message: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	ncpus_ok = run_test(ncpus, 0, WAIT_CYCLES, do_evt, evt_ok);
+	report("signal event on self: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	run_test(ncpus, 0, 0, clear_evt, NULL);
+
+	ncpus_ok = run_test(ncpus, 1, WAIT_CYCLES, do_evt, evt_ok);
+	report("signal event on another cpu: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	ncpus_ok = run_test(ncpus, 1, WAIT_CYCLES, do_evt, evt_busy);
+	report("signal event already set: %d/%d",
+	       ncpus_ok == ncpus, ncpus_ok, ncpus);
+
+	for (i = 0; i < ncpus; i++)
+		on_cpu(i, teardown_cpu, NULL);
+
+	teardown_hypercall();
+
+summary:
+	return report_summary();
+}
diff --git a/x86/unittests.cfg b/x86/unittests.cfg
index 42f1ad4..3f3ad2a 100644
--- a/x86/unittests.cfg
+++ b/x86/unittests.cfg
@@ -504,6 +504,12 @@ smp = 2
 extra_params = -cpu kvm64,hv_synic -device hyperv-testdev
 groups = hyperv
 
+[hyperv_connections]
+file = hyperv_connections.flat
+smp = 2
+extra_params = -cpu kvm64,hv_synic -device hyperv-testdev
+groups = hyperv
+
 [hyperv_stimer]
 file = hyperv_stimer.flat
 smp = 2
-- 
2.9.4




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux