mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 00:48:50 +00:00
b9c2bd50ec
This test serves as a performance tester and a bug reproducer for kvm page table code (GPA->HPA mappings), so it gives guidance for people trying to make some improvement for kvm. The function guest_code() can cover the conditions where a single vcpu or multiple vcpus access guest pages within the same memory region, in three VM stages(before dirty logging, during dirty logging, after dirty logging). Besides, the backing src memory type(ANONYMOUS/THP/HUGETLB) of the tested memory region can be specified by users, which means normal page mappings or block mappings can be chosen by users to be created in the test. If ANONYMOUS memory is specified, kvm will create normal page mappings for the tested memory region before dirty logging, and update attributes of the page mappings from RO to RW during dirty logging. If THP/HUGETLB memory is specified, kvm will create block mappings for the tested memory region before dirty logging, and split the blcok mappings into normal page mappings during dirty logging, and coalesce the page mappings back into block mappings after dirty logging is stopped. So in summary, as a performance tester, this test can present the performance of kvm creating/updating normal page mappings, or the performance of kvm creating/splitting/recovering block mappings, through execution time. When we need to coalesce the page mappings back to block mappings after dirty logging is stopped, we have to firstly invalidate *all* the TLB entries for the page mappings right before installation of the block entry, because a TLB conflict abort error could occur if we can't invalidate the TLB entries fully. We have hit this TLB conflict twice on aarch64 software implementation and fixed it. As this test can imulate process from dirty logging enabled to dirty logging stopped of a VM with block mappings, so it can also reproduce this TLB conflict abort due to inadequate TLB invalidation when coalescing tables. Signed-off-by: Yanan Wang <wangyanan55@huawei.com> Reviewed-by: Ben Gardon <bgardon@google.com> Reviewed-by: Andrew Jones <drjones@redhat.com> Message-Id: <20210330080856.14940-11-wangyanan55@huawei.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
41 lines
979 B
Text
41 lines
979 B
Text
# SPDX-License-Identifier: GPL-2.0-only
|
|
/aarch64/get-reg-list
|
|
/aarch64/get-reg-list-sve
|
|
/s390x/memop
|
|
/s390x/resets
|
|
/s390x/sync_regs_test
|
|
/x86_64/cr4_cpuid_sync_test
|
|
/x86_64/debug_regs
|
|
/x86_64/evmcs_test
|
|
/x86_64/get_cpuid_test
|
|
/x86_64/kvm_pv_test
|
|
/x86_64/hyperv_cpuid
|
|
/x86_64/mmio_warning_test
|
|
/x86_64/platform_info_test
|
|
/x86_64/set_sregs_test
|
|
/x86_64/smm_test
|
|
/x86_64/state_test
|
|
/x86_64/svm_vmcall_test
|
|
/x86_64/sync_regs_test
|
|
/x86_64/tsc_msrs_test
|
|
/x86_64/userspace_msr_exit_test
|
|
/x86_64/vmx_apic_access_test
|
|
/x86_64/vmx_close_while_nested_test
|
|
/x86_64/vmx_dirty_log_test
|
|
/x86_64/vmx_preemption_timer_test
|
|
/x86_64/vmx_set_nested_state_test
|
|
/x86_64/vmx_tsc_adjust_test
|
|
/x86_64/xapic_ipi_test
|
|
/x86_64/xen_shinfo_test
|
|
/x86_64/xen_vmcall_test
|
|
/x86_64/xss_msr_test
|
|
/x86_64/vmx_pmu_msrs_test
|
|
/demand_paging_test
|
|
/dirty_log_test
|
|
/dirty_log_perf_test
|
|
/hardware_disable_test
|
|
/kvm_create_max_vcpus
|
|
/kvm_page_table_test
|
|
/memslot_modification_stress_test
|
|
/set_memory_region_test
|
|
/steal_time
|