From: Maximilian Dittgen <mdittgen@amazon.de>
To: <maz@kernel.org>, <oliver.upton@linux.dev>
Cc: <pbonzini@redhat.com>, <shuah@kernel.org>,
<linux-arm-kernel@lists.infradead.org>, <kvmarm@lists.linux.dev>,
<linux-kselftest@vger.kernel.org>, <kvm@vger.kernel.org>,
<mdittgen@amazon.de>, <lilitj@amazon.de>, <sauravsc@amazon.de>,
<nh-open-source@amazon.com>
Subject: [RFC PATCH 12/13] KVM: arm64: selftests: Add support for stress testing direct-injected vLPIs
Date: Thu, 20 Nov 2025 15:03:01 +0100 [thread overview]
Message-ID: <20251120140305.63515-13-mdittgen@amazon.de> (raw)
In-Reply-To: <20251120140305.63515-1-mdittgen@amazon.de>
vgic_lpi_stress stress tests LPIs by injecting MSIs to a guest's GIC.
Since these MSIs are purely defined in userspace, they are handled as
LPIs by the hypervisor as software interrupts.
We provide two ways to stress test direct-injected vLPIs.
- When per-vCPU vLPI injection is disabled, use -D flag to upgrade
all LPIs fired by the stress test to vLPIs. This flag mocks a
host_irq for each MSI and calls KVM_DEBUG_GIC_MSI_SETUP to create
and map vITS data structures needed for direct injection.
- When per-vCPU vLPI injection is enabled, use -s flag to pass
per-vCPU command strings to control the state of vPE initialization
on each vCPU throughout the test. Allows stress testing vLPI
injection on partially-enabled VMs.
Signed-off-by: Maximilian Dittgen <mdittgen@amazon.de>
---
.../selftests/kvm/arm64/vgic_lpi_stress.c | 181 +++++++++++++++++-
1 file changed, 177 insertions(+), 4 deletions(-)
diff --git a/tools/testing/selftests/kvm/arm64/vgic_lpi_stress.c b/tools/testing/selftests/kvm/arm64/vgic_lpi_stress.c
index e857a605f577..b3fe5fdf4285 100644
--- a/tools/testing/selftests/kvm/arm64/vgic_lpi_stress.c
+++ b/tools/testing/selftests/kvm/arm64/vgic_lpi_stress.c
@@ -18,9 +18,17 @@
#include "ucall.h"
#include "vgic.h"
+#define KVM_DEBUG_GIC_MSI_SETUP _IOW(KVMIO, 0xf3, struct kvm_debug_gic_msi_setup)
+
#define TEST_MEMSLOT_INDEX 1
#define GIC_LPI_OFFSET 8192
+#define SPI_IRQ_RANGE_OFFSET 32
+
+static bool vlpi_enabled;
+static bool string_mode;
+static char **vcpu_strings;
+static bool *vcpu_enabled;
static size_t nr_iterations = 1000;
static vm_paddr_t gpa_base;
@@ -222,6 +230,79 @@ static void setup_gic(void)
its_fd = vgic_its_setup(vm);
}
+static int enable_msi_vlpi_injection(u32 device_id, u32 event_id,
+ u32 vcpu_id, u32 vintid, u32 host_irq)
+{
+ struct kvm_debug_gic_msi_setup params = {
+ .device_id = device_id,
+ .event_id = event_id,
+ .vcpu_id = vcpu_id,
+ .vintid = vintid,
+ .host_irq = host_irq,
+ .itt_addr = test_data.itt_tables + (device_id * SZ_64K)
+ };
+
+ return __vm_ioctl(vm, KVM_DEBUG_GIC_MSI_SETUP, ¶ms);
+}
+
+static void upgrade_vcpu_lpis(struct kvm_vcpu *vcpu)
+{
+ u32 intid = GIC_LPI_OFFSET;
+ u32 target_vcpu = 0; /* Start round-robin from vCPU 0 */
+ u32 device_id, event_id;
+
+ for (device_id = 0; device_id < test_data.nr_devices; device_id++) {
+ for (event_id = 0; event_id < test_data.nr_event_ids;
+ event_id++) {
+ /*
+ * Only setup vLPI mapping if this is the target vCPU
+ * for this interrupt
+ */
+ if (target_vcpu == vcpu->id) {
+ /*
+ * we mock host_irqs in the SPI interrupt range
+ * of 100-1020 since selftest guests have no
+ * hardware devices
+ */
+ int ret = enable_msi_vlpi_injection(device_id,
+ event_id, vcpu->id, intid,
+ intid - GIC_LPI_OFFSET + SPI_IRQ_RANGE_OFFSET);
+
+ if (ret == -ENXIO || ret == -1) {
+ pr_info("Direct vLPI injection is disabled for vCPU %d, defaulting to software LPI handling\n",
+ vcpu->id);
+ return;
+ }
+ TEST_ASSERT(ret == 0,
+ "KVM_DEBUG_GIC_MSI_SETUP failed: %d\n",
+ ret);
+ }
+
+ intid++;
+ target_vcpu = (target_vcpu + 1) % test_data.nr_cpus;
+ }
+ }
+}
+
+
+
+static void enable_vcpu_vlpi_injection(int vcpu_id)
+{
+ int ret = ioctl(vm->fd, KVM_ENABLE_VCPU_VLPI, &vcpu_id);
+
+ TEST_ASSERT(ret == 0, "KVM_ENABLE_VCPU_VLPI failed: %d", ret);
+ pr_info("Enabled vLPI injection on vCPU %d\n", vcpu_id);
+ upgrade_vcpu_lpis(vcpus[vcpu_id]);
+}
+
+static void disable_vcpu_vlpi_injection(int vcpu_id)
+{
+ int ret = ioctl(vm->fd, KVM_DISABLE_VCPU_VLPI, &vcpu_id);
+
+ TEST_ASSERT(ret == 0, "KVM_DISABLE_VCPU_VLPI failed: %d", ret);
+ pr_info("Disabled vLPI injection on vCPU %d\n", vcpu_id);
+}
+
static void signal_lpi(u32 device_id, u32 event_id)
{
vm_paddr_t db_addr = GITS_BASE_GPA + GITS_TRANSLATER;
@@ -243,18 +324,36 @@ static void signal_lpi(u32 device_id, u32 event_id)
}
static pthread_barrier_t test_setup_barrier;
+static pthread_barrier_t vlpi_upgrade_barrier;
static void *lpi_worker_thread(void *data)
{
u32 device_id = (size_t)data;
u32 event_id;
size_t i;
+ int vcpu_id;
pthread_barrier_wait(&test_setup_barrier);
-
- for (i = 0; i < nr_iterations; i++)
+ pthread_barrier_wait(&vlpi_upgrade_barrier);
+
+ for (i = 0; i < nr_iterations; i++) {
+ /* conduct per-vCPU vLPI enablement/disablement */
+ if (string_mode) {
+ for (vcpu_id = 0; vcpu_id < test_data.nr_cpus; vcpu_id++) {
+ char action = vcpu_strings[vcpu_id][i];
+
+ if (action == 'e' && !vcpu_enabled[vcpu_id]) {
+ enable_vcpu_vlpi_injection(vcpu_id);
+ vcpu_enabled[vcpu_id] = true;
+ } else if (action == 'd' && vcpu_enabled[vcpu_id]) {
+ disable_vcpu_vlpi_injection(vcpu_id);
+ vcpu_enabled[vcpu_id] = false;
+ }
+ }
+ }
for (event_id = 0; event_id < test_data.nr_event_ids; event_id++)
signal_lpi(device_id, event_id);
+ }
return NULL;
}
@@ -270,6 +369,10 @@ static void *vcpu_worker_thread(void *data)
switch (get_ucall(vcpu, &uc)) {
case UCALL_SYNC:
pthread_barrier_wait(&test_setup_barrier);
+ /* if flag is set, set direct injection mappings for MSIs */
+ if (vlpi_enabled)
+ upgrade_vcpu_lpis(vcpu);
+ pthread_barrier_wait(&vlpi_upgrade_barrier);
continue;
case UCALL_DONE:
return NULL;
@@ -309,6 +412,7 @@ static void run_test(void)
TEST_ASSERT(lpi_threads && vcpu_threads, "Failed to allocate pthread arrays");
pthread_barrier_init(&test_setup_barrier, NULL, nr_vcpus + nr_devices + 1);
+ pthread_barrier_init(&vlpi_upgrade_barrier, NULL, nr_vcpus + nr_devices + 1);
for (i = 0; i < nr_vcpus; i++)
pthread_create(&vcpu_threads[i], NULL, vcpu_worker_thread, vcpus[i]);
@@ -317,6 +421,7 @@ static void run_test(void)
pthread_create(&lpi_threads[i], NULL, lpi_worker_thread, (void *)i);
pthread_barrier_wait(&test_setup_barrier);
+ pthread_barrier_wait(&vlpi_upgrade_barrier); /* Wait for all vLPI upgrades */
clock_gettime(CLOCK_MONOTONIC, &start);
@@ -361,13 +466,71 @@ static void destroy_vm(void)
free(vcpus);
}
+static int parse_vcpu_strings(const char *str)
+{
+ char *token, *saveptr, *str_copy;
+ int count = 0, len = -1, i;
+
+ str_copy = strdup(str);
+ TEST_ASSERT(str_copy, "Failed to allocate string copy");
+
+ token = strtok_r(str_copy, ",", &saveptr);
+ while (token) {
+ count++;
+ token = strtok_r(NULL, ",", &saveptr);
+ }
+ free(str_copy);
+
+ vcpu_strings = malloc(count * sizeof(char *));
+ vcpu_enabled = calloc(count, sizeof(bool));
+ TEST_ASSERT(vcpu_strings && vcpu_enabled, "Failed to allocate arrays");
+
+ str_copy = strdup(str);
+ token = strtok_r(str_copy, ",", &saveptr);
+ for (i = 0; i < count; i++) {
+ int token_len = strlen(token);
+
+ if (len == -1)
+ len = token_len;
+ else if (len != token_len)
+ TEST_FAIL("All strings must have same length");
+
+ TEST_ASSERT(len > 0, "Strings cannot be empty");
+
+ for (int j = 0; j < token_len; j++)
+ if (token[j] != 'd' && token[j] != 'e')
+ TEST_FAIL("Strings can only contain 'd' and 'e'");
+
+ vcpu_strings[i] = strdup(token);
+ TEST_ASSERT(vcpu_strings[i], "Failed to allocate string");
+ token = strtok_r(NULL, ",", &saveptr);
+ }
+ free(str_copy);
+
+ test_data.nr_cpus = count;
+ test_data.nr_devices = 1;
+ test_data.nr_event_ids = count;
+ nr_iterations = len;
+
+ return 0;
+}
+
static void pr_usage(const char *name)
{
- pr_info("%s [-v NR_VCPUS] [-d NR_DEVICES] [-e NR_EVENTS] [-i ITERS] -h\n", name);
+ pr_info("%s -D [-v NR_VCPUS] [-d NR_DEVICES] [-e NR_EVENTS] [-i ITERS] | -s STRINGS -h\n",
+ name);
+ pr_info(" -D:\tenable direct vLPI injection (default: %s)\n",
+ vlpi_enabled ? "true" : "false");
pr_info(" -v:\tnumber of vCPUs (default: %u)\n", test_data.nr_cpus);
pr_info(" -d:\tnumber of devices (default: %u)\n", test_data.nr_devices);
pr_info(" -e:\tnumber of event IDs per device (default: %u)\n", test_data.nr_event_ids);
pr_info(" -i:\tnumber of iterations (default: %lu)\n", nr_iterations);
+ pr_info(" -s:\tvCPU control strings (comma-separated, e.g., \"dede,eede\"),\n");
+ pr_info(" \twhere each string corresponds to the per-iteration vLPI status\n");
+ pr_info(" \tof a single vCPU. \"ddeed\" means a vCPU will be vLPI-disabled for two\n");
+ pr_info(" \titerations, enabled for two iterations, then disabled for one iteration.\n");
+ pr_info(" \tNumber of strings corresponds to the number of vCPUs, and all strings must\n");
+ pr_info(" \tbe of the same size. Cannot be used in conjunction with other flags.\n");
}
int main(int argc, char **argv)
@@ -377,8 +540,11 @@ int main(int argc, char **argv)
TEST_REQUIRE(kvm_supports_vgic_v3());
- while ((c = getopt(argc, argv, "hv:d:e:i:")) != -1) {
+ while ((c = getopt(argc, argv, "hDv:d:e:i:s:")) != -1) {
switch (c) {
+ case 'D':
+ vlpi_enabled = true;
+ break;
case 'v':
test_data.nr_cpus = atoi(optarg);
break;
@@ -391,6 +557,10 @@ int main(int argc, char **argv)
case 'i':
nr_iterations = strtoul(optarg, NULL, 0);
break;
+ case 's':
+ string_mode = true;
+ parse_vcpu_strings(optarg);
+ break;
case 'h':
default:
pr_usage(argv[0]);
@@ -398,6 +568,9 @@ int main(int argc, char **argv)
}
}
+ if (string_mode && argc > 3)
+ TEST_FAIL("-s cannot be used with other flags");
+
nr_threads = test_data.nr_cpus + test_data.nr_devices;
if (nr_threads > get_nprocs())
pr_info("WARNING: running %u threads on %d CPUs; performance is degraded.\n",
--
2.50.1 (Apple Git-155)
Amazon Web Services Development Center Germany GmbH
Tamara-Danz-Str. 13
10243 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Christof Hellmis
Eingetragen am Amtsgericht Charlottenburg unter HRB 257764 B
Sitz: Berlin
Ust-ID: DE 365 538 597
next prev parent reply other threads:[~2025-11-20 14:06 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-20 14:02 [RFC PATCH 00/13] Introduce per-vCPU vLPI injection control API Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 01/13] KVM: Introduce config option for per-vCPU vLPI enablement Maximilian Dittgen
2025-11-20 16:18 ` Marc Zyngier
2025-11-20 14:02 ` [RFC PATCH 02/13] KVM: arm64: Disable auto vCPU vPE assignment with per-vCPU vLPI config Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 03/13] KVM: arm64: Refactor out locked section of kvm_vgic_v4_set_forwarding() Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 04/13] KVM: arm64: Implement vLPI QUERY ioctl for per-vCPU vLPI injection API Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 05/13] KVM: arm64: Implement vLPI ENABLE " Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 06/13] KVM: arm64: Resolve race between vCPU scheduling and vLPI enablement Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 07/13] KVM: arm64: Implement vLPI DISABLE ioctl for per-vCPU vLPI Injection API Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 08/13] KVM: arm64: Make per-vCPU vLPI control ioctls atomic Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 09/13] KVM: arm64: Couple vSGI enablement with per-vCPU vPE allocation Maximilian Dittgen
2025-11-20 14:02 ` [RFC PATCH 10/13] KVM: selftests: fix MAPC RDbase target formatting in vgic_lpi_stress Maximilian Dittgen
2025-11-20 14:03 ` [RFC PATCH 11/13] KVM: Ioctl to set up userspace-injected MSIs as software-bypassing vLPIs Maximilian Dittgen
2025-11-20 14:03 ` Maximilian Dittgen [this message]
2025-11-20 14:03 ` [RFC PATCH 13/13] KVM: arm64: selftests: Add test for per-vCPU vLPI control API Maximilian Dittgen
2025-11-20 14:40 ` [RFC PATCH 00/13] Introduce per-vCPU vLPI injection " Marc Zyngier
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251120140305.63515-13-mdittgen@amazon.de \
--to=mdittgen@amazon.de \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.linux.dev \
--cc=lilitj@amazon.de \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=maz@kernel.org \
--cc=nh-open-source@amazon.com \
--cc=oliver.upton@linux.dev \
--cc=pbonzini@redhat.com \
--cc=sauravsc@amazon.de \
--cc=shuah@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).