blob: 421173494a14060533db2be2ef23389c0a47ff09 [file] [log] [blame]
// Copyright 2017 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// TODO(b/237714823): Currently, only kvm is enabled for this test once LUCI can run windows.
#![cfg(unix)]
#![cfg(any(target_arch = "x86", target_arch = "x86_64"))]
#![cfg(any(feature = "whpx", feature = "gvm", feature = "haxm", unix))]
use base::MemoryMappingBuilder;
use base::SharedMemory;
use hypervisor::*;
use vm_memory::GuestAddress;
use vm_memory::GuestMemory;
#[test]
#[cfg(unix)]
fn test_kvm_dirty_log() {
use hypervisor::kvm::*;
test_dirty_log(|guest_mem| {
let kvm = Kvm::new().expect("failed to create kvm");
let vm = KvmVm::new(&kvm, guest_mem, Default::default()).expect("failed to create vm");
(kvm, vm)
});
}
#[test]
#[cfg(feature = "haxm")]
fn test_haxm_dirty_log_not_supported() {
// HAXM does not support dirty log, so we simply test that the capability
// returns false.
use hypervisor::haxm::*;
let haxm = Haxm::new().expect("failed to create haxm");
let guest_mem = GuestMemory::new(&[(GuestAddress(0x20000), 0x1000)]).unwrap();
let vm = HaxmVm::new(&haxm, guest_mem).expect("failed to create vm");
assert!(!vm.check_capability(VmCap::DirtyLog));
}
#[test]
#[cfg(feature = "gvm")]
fn test_gvm_dirty_log() {
use hypervisor::gvm::*;
test_dirty_log(|guest_mem| {
let gvm = Gvm::new().expect("failed to create gvm");
let vm = GvmVm::new(&gvm, guest_mem).expect("failed to create vm");
(gvm, vm)
});
}
#[test]
#[cfg(feature = "whpx")]
fn test_whpx_dirty_log() {
use hypervisor::whpx::*;
if !Whpx::is_enabled() {
return;
}
test_dirty_log(|guest_mem| {
let whpx = Whpx::new().expect("failed to create whpx");
let vm =
WhpxVm::new(&whpx, 1, guest_mem, CpuId::new(0), false).expect("failed to create vm");
(whpx, vm)
});
}
fn test_dirty_log<CreateVm, HypervisorT, VmT>(create_vm: CreateVm)
where
CreateVm: FnOnce(GuestMemory) -> (HypervisorT, VmT),
HypervisorT: Hypervisor,
VmT: VmX86_64,
{
/*
0000 881C mov [si],bl
0002 F4 hlt
*/
let code = [0x88, 0x1c, 0xf4];
let mem_size = 0x10000;
let load_addr = GuestAddress(0x1000);
// GuestMemory requires an initial set of memory, so we just
// setup some at 0x20000, it won't be used though.
let guest_mem = GuestMemory::new(&[(GuestAddress(0x20000), 0x1000)]).unwrap();
let mem = SharedMemory::new("test", mem_size).expect("failed to create shared memory");
let mmap = MemoryMappingBuilder::new(mem_size as usize)
.from_shared_memory(&mem)
.build()
.expect("failed to create memory mapping");
mmap.write_slice(&code[..], load_addr.offset() as usize)
.expect("Writing code to memory failed.");
let (_hyp, mut vm) = create_vm(guest_mem);
let mut vcpu = vm.create_vcpu(0).expect("new vcpu failed");
let mut vcpu_sregs = vcpu.get_sregs().expect("get sregs failed");
vcpu_sregs.cs.base = 0;
vcpu_sregs.cs.selector = 0;
vcpu.set_sregs(&vcpu_sregs).expect("set sregs failed");
let vcpu_regs = Regs {
rip: load_addr.offset() as u64,
rflags: 2,
// Write 0x12 to the beginning of the 9th page.
rsi: 0x8000,
rbx: 0x12,
..Default::default()
};
vcpu.set_regs(&vcpu_regs).expect("set regs failed");
let slot = vm
.add_memory_region(
GuestAddress(0),
Box::new(
MemoryMappingBuilder::new(mem_size as usize)
.from_shared_memory(&mem)
.build()
.expect("failed to create memory mapping"),
),
false,
true,
)
.expect("failed to register memory");
let run_handle = vcpu.take_run_handle(None).unwrap();
loop {
match vcpu.run(&run_handle).expect("run failed") {
// Continue on external interrupt or signal
VcpuExit::Intr => continue,
VcpuExit::Hlt => break,
r => panic!("unexpected exit reason: {:?}", r),
}
}
let mut dirty_log = [0x0, 0x0];
vm.get_dirty_log(slot, &mut dirty_log[..])
.expect("failed to get dirty log");
// Tests the 9th page was written to.
assert_eq!(dirty_log[1], 0x1);
assert_eq!(
mmap.read_obj::<u64>(vcpu_regs.rsi as usize).unwrap(),
vcpu_regs.rbx
);
}