mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-11-24 20:48:55 +00:00
f9486dabda
All of the callers of the previous VcpuX86_64 MSR get/set APIs either want a single MSR or all known/supported MSRs. The previous get_msrs() API was inconvenient for the single-MSR case, and it required a slightly unusal calling convention where the caller needed to fill a Register struct with an unused initial value that would be replaced by the actual value. This change replaces the get_msrs()/set_msrs() APIs with single-register get_msr()/set_msr() functions, which have a much more natural API. The new get_msr() function accepts an MSR index and returns its value, and the new set_msr() function accepts an MSR index and value. The only user of set_msrs() was the vcpu initialization code, which will now call set_msr() for each individual MSR; since there are very few MSR values to set normally (15), this makes very little difference in startup time. get_msrs() was not needed in the public API at all, and get_all_msrs() still retrieves multiple MSRs in one shot where this makes sense. BUG=None TEST=tools/dev_container tools/presubmit Change-Id: I8cbe692cd528b8f9e7cfea18a28d4d8c83dac794 Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/5436901 Reviewed-by: Frederick Mayle <fmayle@google.com> Commit-Queue: Daniel Verkamp <dverkamp@chromium.org>
215 lines
6 KiB
Rust
215 lines
6 KiB
Rust
// Copyright 2020 The ChromiumOS Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
// TODO(b/237714823): Currently, only kvm is enabled for this test once LUCI can run windows.
|
|
#![cfg(any(target_os = "android", target_os = "linux"))]
|
|
#![cfg(target_arch = "x86_64")]
|
|
|
|
use std::arch::x86_64::_rdtsc;
|
|
|
|
use hypervisor::*;
|
|
use vm_memory::GuestAddress;
|
|
use vm_memory::GuestMemory;
|
|
|
|
macro_rules! assert_wrapping_close {
|
|
($value:expr, $expected: expr, $threshold: expr, $type: expr) => {
|
|
let e = $expected;
|
|
let v = $value;
|
|
let wrapping_diff = std::cmp::min(v.wrapping_sub(e), e.wrapping_sub(v));
|
|
assert!(
|
|
wrapping_diff < $threshold,
|
|
"{} value {} too far from {}",
|
|
$type,
|
|
$value,
|
|
$expected
|
|
);
|
|
};
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(any(target_os = "android", target_os = "linux"))]
|
|
fn test_kvm_tsc_offsets() {
|
|
use hypervisor::kvm::*;
|
|
test_tsc_offsets(|guest_mem| {
|
|
let kvm = Kvm::new().expect("failed to create kvm");
|
|
let vm = KvmVm::new(&kvm, guest_mem, Default::default()).expect("failed to create vm");
|
|
(kvm, vm)
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(all(windows, feature = "haxm"))]
|
|
fn test_haxm_tsc_offsets() {
|
|
use hypervisor::haxm::*;
|
|
test_tsc_offsets(|guest_mem| {
|
|
let haxm = Haxm::new().expect("failed to create haxm");
|
|
let vm = HaxmVm::new(&haxm, guest_mem).expect("failed to create vm");
|
|
(haxm, vm)
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(feature = "gvm")]
|
|
fn test_gvm_tsc_offsets() {
|
|
use hypervisor::gvm::*;
|
|
test_tsc_offsets(|guest_mem| {
|
|
let gvm = Gvm::new().expect("failed to create gvm");
|
|
let vm = GvmVm::new(&gvm, guest_mem).expect("failed to create vm");
|
|
(gvm, vm)
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(all(windows, feature = "whpx"))]
|
|
fn test_whpx_tsc_offsets() {
|
|
use hypervisor::whpx::*;
|
|
if !Whpx::is_enabled() {
|
|
return;
|
|
}
|
|
test_tsc_offsets(|guest_mem| {
|
|
let whpx = Whpx::new().expect("failed to create whpx");
|
|
let vm =
|
|
WhpxVm::new(&whpx, 1, guest_mem, CpuId::new(0), false).expect("failed to create vm");
|
|
(whpx, vm)
|
|
});
|
|
}
|
|
|
|
fn test_tsc_offsets<CreateVm, HypervisorT, VmT>(create_vm: CreateVm)
|
|
where
|
|
CreateVm: FnOnce(GuestMemory) -> (HypervisorT, VmT),
|
|
HypervisorT: Hypervisor,
|
|
VmT: VmX86_64,
|
|
{
|
|
// We're in real mode, so we need to do two memory operations to get a 64 bit value into
|
|
// memory.
|
|
/*
|
|
0x0000000000000000: 0F 31 rdtsc
|
|
0x0000000000000002: 67 66 89 51 04 mov dword ptr [ecx + 4], edx
|
|
0x0000000000000007: 67 66 89 01 mov dword ptr [ecx], eax
|
|
0x000000000000000b: F4 hlt
|
|
*/
|
|
|
|
let code: [u8; 12] = [
|
|
0x0f, 0x31, 0x67, 0x66, 0x89, 0x51, 0x04, 0x67, 0x66, 0x89, 0x01, 0xf4,
|
|
];
|
|
let mem_size = 0x4000;
|
|
let load_addr = GuestAddress(0x1000);
|
|
|
|
let guest_mem =
|
|
GuestMemory::new(&[(GuestAddress(0), mem_size)]).expect("failed to create guest mem");
|
|
guest_mem
|
|
.write_at_addr(&code[..], load_addr)
|
|
.expect("failed to write to guest memory");
|
|
|
|
let mem_clone = guest_mem.clone();
|
|
|
|
let (_, vm) = create_vm(guest_mem);
|
|
let mut vcpu = vm.create_vcpu(0).expect("new vcpu failed");
|
|
let mut vcpu_sregs = vcpu.get_sregs().expect("get sregs failed");
|
|
vcpu_sregs.cs.base = 0;
|
|
vcpu_sregs.cs.selector = 0;
|
|
|
|
vcpu.set_sregs(&vcpu_sregs).expect("set sregs failed");
|
|
|
|
// basic case, we set MSR to 0
|
|
// SAFETY: trivially safe
|
|
let tsc_now = unsafe { _rdtsc() };
|
|
test_tsc_offset_run(
|
|
&mut vcpu,
|
|
&mem_clone,
|
|
load_addr,
|
|
Some(0),
|
|
None,
|
|
u64::MAX - tsc_now + 1,
|
|
0,
|
|
);
|
|
// set offset to 0
|
|
// SAFETY: trivially safe
|
|
let tsc_now = unsafe { _rdtsc() };
|
|
test_tsc_offset_run(&mut vcpu, &mem_clone, load_addr, None, Some(0), 0, tsc_now);
|
|
// some moderately sized offset
|
|
// SAFETY: trivially safe
|
|
let tsc_now = unsafe { _rdtsc() };
|
|
let ten_seconds = 2_500_000_000 * 10;
|
|
test_tsc_offset_run(
|
|
&mut vcpu,
|
|
&mem_clone,
|
|
load_addr,
|
|
None,
|
|
Some(ten_seconds),
|
|
ten_seconds,
|
|
tsc_now + ten_seconds,
|
|
);
|
|
// set offset to u64::MAX - tsc_now + 1
|
|
// SAFETY: trivially safe
|
|
let tsc_now = unsafe { _rdtsc() };
|
|
test_tsc_offset_run(
|
|
&mut vcpu,
|
|
&mem_clone,
|
|
load_addr,
|
|
None,
|
|
Some(u64::MAX - tsc_now + 1),
|
|
u64::MAX - tsc_now + 1,
|
|
0,
|
|
);
|
|
}
|
|
|
|
fn test_tsc_offset_run(
|
|
vcpu: &mut Box<dyn hypervisor::VcpuX86_64>,
|
|
mem_clone: &GuestMemory,
|
|
load_addr: GuestAddress,
|
|
set_msr: Option<u64>,
|
|
set_offset: Option<u64>,
|
|
expected_get_offset: u64,
|
|
expected_rdtsc: u64,
|
|
) {
|
|
// typical TSC frequency is like 2.5GHz so if we say the threshold is within 100ms then our
|
|
// threshold is 250_000_000
|
|
let threshold = 250_000_000;
|
|
|
|
let vcpu_regs = Regs {
|
|
rip: load_addr.offset(),
|
|
rflags: 2,
|
|
rcx: 0x3000,
|
|
..Default::default()
|
|
};
|
|
vcpu.set_regs(&vcpu_regs).expect("set regs failed");
|
|
|
|
if let Some(value) = set_msr {
|
|
vcpu.set_msr(0x00000010, value)
|
|
.expect("set_msr should not fail");
|
|
}
|
|
|
|
if let Some(offset) = set_offset {
|
|
vcpu.set_tsc_offset(offset)
|
|
.expect("set offset should not fail");
|
|
}
|
|
|
|
loop {
|
|
match vcpu.run().expect("run failed") {
|
|
VcpuExit::Hlt => {
|
|
break;
|
|
}
|
|
// Continue on external interrupt or signal
|
|
VcpuExit::Intr => continue,
|
|
r => panic!("unexpected exit reason: {:?}", r),
|
|
}
|
|
}
|
|
|
|
assert_wrapping_close!(
|
|
mem_clone
|
|
.read_obj_from_addr::<u64>(GuestAddress(0x3000))
|
|
.expect("guest mem read should be ok"),
|
|
expected_rdtsc,
|
|
threshold,
|
|
"rdtsc written to memory"
|
|
);
|
|
|
|
assert_wrapping_close!(
|
|
vcpu.get_tsc_offset().expect("get offset should not fail"),
|
|
expected_get_offset,
|
|
threshold,
|
|
"tsc offset"
|
|
);
|
|
}
|