Skip to content

Commit ec58066

Browse files
jsmattsonjrsean-jc
authored andcommitted
KVM: selftests: Change VM_MODE_PXXV48_4K to VM_MODE_PXXVYY_4K
Use 57-bit addresses with 5-level paging on hardware that supports LA57. Continue to use 48-bit addresses with 4-level paging on hardware that doesn't support LA57. Suggested-by: Sean Christopherson <seanjc@google.com> Signed-off-by: Jim Mattson <jmattson@google.com> Link: https://patch.msgid.link/20251028225827.2269128-4-jmattson@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
1 parent 2103a8b commit ec58066

File tree

6 files changed

+40
-34
lines changed

6 files changed

+40
-34
lines changed

tools/testing/selftests/kvm/include/kvm_util.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ enum vm_guest_mode {
177177
VM_MODE_P40V48_4K,
178178
VM_MODE_P40V48_16K,
179179
VM_MODE_P40V48_64K,
180-
VM_MODE_PXXV48_4K, /* For 48bits VA but ANY bits PA */
180+
VM_MODE_PXXVYY_4K, /* For 48-bit or 57-bit VA, depending on host support */
181181
VM_MODE_P47V64_4K,
182182
VM_MODE_P44V64_4K,
183183
VM_MODE_P36V48_4K,
@@ -219,7 +219,7 @@ extern enum vm_guest_mode vm_mode_default;
219219

220220
#elif defined(__x86_64__)
221221

222-
#define VM_MODE_DEFAULT VM_MODE_PXXV48_4K
222+
#define VM_MODE_DEFAULT VM_MODE_PXXVYY_4K
223223
#define MIN_PAGE_SHIFT 12U
224224
#define ptes_per_page(page_size) ((page_size) / 8)
225225

tools/testing/selftests/kvm/include/x86/processor.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1441,7 +1441,7 @@ enum pg_level {
14411441
PG_LEVEL_2M,
14421442
PG_LEVEL_1G,
14431443
PG_LEVEL_512G,
1444-
PG_LEVEL_NUM
1444+
PG_LEVEL_256T
14451445
};
14461446

14471447
#define PG_LEVEL_SHIFT(_level) ((_level - 1) * 9 + 12)

tools/testing/selftests/kvm/lib/arm64/processor.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -324,7 +324,7 @@ void aarch64_vcpu_setup(struct kvm_vcpu *vcpu, struct kvm_vcpu_init *init)
324324

325325
/* Configure base granule size */
326326
switch (vm->mode) {
327-
case VM_MODE_PXXV48_4K:
327+
case VM_MODE_PXXVYY_4K:
328328
TEST_FAIL("AArch64 does not support 4K sized pages "
329329
"with ANY-bit physical address ranges");
330330
case VM_MODE_P52V48_64K:

tools/testing/selftests/kvm/lib/kvm_util.c

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ const char *vm_guest_mode_string(uint32_t i)
201201
[VM_MODE_P40V48_4K] = "PA-bits:40, VA-bits:48, 4K pages",
202202
[VM_MODE_P40V48_16K] = "PA-bits:40, VA-bits:48, 16K pages",
203203
[VM_MODE_P40V48_64K] = "PA-bits:40, VA-bits:48, 64K pages",
204-
[VM_MODE_PXXV48_4K] = "PA-bits:ANY, VA-bits:48, 4K pages",
204+
[VM_MODE_PXXVYY_4K] = "PA-bits:ANY, VA-bits:48 or 57, 4K pages",
205205
[VM_MODE_P47V64_4K] = "PA-bits:47, VA-bits:64, 4K pages",
206206
[VM_MODE_P44V64_4K] = "PA-bits:44, VA-bits:64, 4K pages",
207207
[VM_MODE_P36V48_4K] = "PA-bits:36, VA-bits:48, 4K pages",
@@ -228,7 +228,7 @@ const struct vm_guest_mode_params vm_guest_mode_params[] = {
228228
[VM_MODE_P40V48_4K] = { 40, 48, 0x1000, 12 },
229229
[VM_MODE_P40V48_16K] = { 40, 48, 0x4000, 14 },
230230
[VM_MODE_P40V48_64K] = { 40, 48, 0x10000, 16 },
231-
[VM_MODE_PXXV48_4K] = { 0, 0, 0x1000, 12 },
231+
[VM_MODE_PXXVYY_4K] = { 0, 0, 0x1000, 12 },
232232
[VM_MODE_P47V64_4K] = { 47, 64, 0x1000, 12 },
233233
[VM_MODE_P44V64_4K] = { 44, 64, 0x1000, 12 },
234234
[VM_MODE_P36V48_4K] = { 36, 48, 0x1000, 12 },
@@ -310,24 +310,26 @@ struct kvm_vm *____vm_create(struct vm_shape shape)
310310
case VM_MODE_P36V47_16K:
311311
vm->pgtable_levels = 3;
312312
break;
313-
case VM_MODE_PXXV48_4K:
313+
case VM_MODE_PXXVYY_4K:
314314
#ifdef __x86_64__
315315
kvm_get_cpu_address_width(&vm->pa_bits, &vm->va_bits);
316316
kvm_init_vm_address_properties(vm);
317-
/*
318-
* Ignore KVM support for 5-level paging (vm->va_bits == 57),
319-
* it doesn't take effect unless a CR4.LA57 is set, which it
320-
* isn't for this mode (48-bit virtual address space).
321-
*/
322-
TEST_ASSERT(vm->va_bits == 48 || vm->va_bits == 57,
323-
"Linear address width (%d bits) not supported",
324-
vm->va_bits);
317+
325318
pr_debug("Guest physical address width detected: %d\n",
326319
vm->pa_bits);
327-
vm->pgtable_levels = 4;
328-
vm->va_bits = 48;
320+
pr_debug("Guest virtual address width detected: %d\n",
321+
vm->va_bits);
322+
323+
if (vm->va_bits == 57) {
324+
vm->pgtable_levels = 5;
325+
} else {
326+
TEST_ASSERT(vm->va_bits == 48,
327+
"Unexpected guest virtual address width: %d",
328+
vm->va_bits);
329+
vm->pgtable_levels = 4;
330+
}
329331
#else
330-
TEST_FAIL("VM_MODE_PXXV48_4K not supported on non-x86 platforms");
332+
TEST_FAIL("VM_MODE_PXXVYY_4K not supported on non-x86 platforms");
331333
#endif
332334
break;
333335
case VM_MODE_P47V64_4K:

tools/testing/selftests/kvm/lib/x86/processor.c

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -158,10 +158,10 @@ bool kvm_is_tdp_enabled(void)
158158

159159
void virt_arch_pgd_alloc(struct kvm_vm *vm)
160160
{
161-
TEST_ASSERT(vm->mode == VM_MODE_PXXV48_4K, "Attempt to use "
162-
"unknown or unsupported guest mode, mode: 0x%x", vm->mode);
161+
TEST_ASSERT(vm->mode == VM_MODE_PXXVYY_4K,
162+
"Unknown or unsupported guest mode: 0x%x", vm->mode);
163163

164-
/* If needed, create page map l4 table. */
164+
/* If needed, create the top-level page table. */
165165
if (!vm->pgd_created) {
166166
vm->pgd = vm_alloc_page_table(vm);
167167
vm->pgd_created = true;
@@ -221,8 +221,8 @@ void __virt_pg_map(struct kvm_vm *vm, uint64_t vaddr, uint64_t paddr, int level)
221221
uint64_t *pte = &vm->pgd;
222222
int current_level;
223223

224-
TEST_ASSERT(vm->mode == VM_MODE_PXXV48_4K,
225-
"Unknown or unsupported guest mode, mode: 0x%x", vm->mode);
224+
TEST_ASSERT(vm->mode == VM_MODE_PXXVYY_4K,
225+
"Unknown or unsupported guest mode: 0x%x", vm->mode);
226226

227227
TEST_ASSERT((vaddr % pg_size) == 0,
228228
"Virtual address not aligned,\n"
@@ -307,27 +307,28 @@ static bool vm_is_target_pte(uint64_t *pte, int *level, int current_level)
307307
uint64_t *__vm_get_page_table_entry(struct kvm_vm *vm, uint64_t vaddr,
308308
int *level)
309309
{
310+
int va_width = 12 + (vm->pgtable_levels) * 9;
310311
uint64_t *pte = &vm->pgd;
311312
int current_level;
312313

313314
TEST_ASSERT(!vm->arch.is_pt_protected,
314315
"Walking page tables of protected guests is impossible");
315316

316-
TEST_ASSERT(*level >= PG_LEVEL_NONE && *level < PG_LEVEL_NUM,
317+
TEST_ASSERT(*level >= PG_LEVEL_NONE && *level <= vm->pgtable_levels,
317318
"Invalid PG_LEVEL_* '%d'", *level);
318319

319-
TEST_ASSERT(vm->mode == VM_MODE_PXXV48_4K, "Attempt to use "
320-
"unknown or unsupported guest mode, mode: 0x%x", vm->mode);
320+
TEST_ASSERT(vm->mode == VM_MODE_PXXVYY_4K,
321+
"Unknown or unsupported guest mode: 0x%x", vm->mode);
321322
TEST_ASSERT(sparsebit_is_set(vm->vpages_valid,
322323
(vaddr >> vm->page_shift)),
323324
"Invalid virtual address, vaddr: 0x%lx",
324325
vaddr);
325326
/*
326-
* Based on the mode check above there are 48 bits in the vaddr, so
327-
* shift 16 to sign extend the last bit (bit-47),
327+
* Check that the vaddr is a sign-extended va_width value.
328328
*/
329-
TEST_ASSERT(vaddr == (((int64_t)vaddr << 16) >> 16),
330-
"Canonical check failed. The virtual address is invalid.");
329+
TEST_ASSERT(vaddr ==
330+
(((int64_t)vaddr << (64 - va_width) >> (64 - va_width))),
331+
"Canonical check failed. The virtual address is invalid.");
331332

332333
for (current_level = vm->pgtable_levels;
333334
current_level > PG_LEVEL_4K;
@@ -520,7 +521,8 @@ static void vcpu_init_sregs(struct kvm_vm *vm, struct kvm_vcpu *vcpu)
520521
{
521522
struct kvm_sregs sregs;
522523

523-
TEST_ASSERT_EQ(vm->mode, VM_MODE_PXXV48_4K);
524+
TEST_ASSERT(vm->mode == VM_MODE_PXXVYY_4K,
525+
"Unknown or unsupported guest mode: 0x%x", vm->mode);
524526

525527
/* Set mode specific system register values. */
526528
vcpu_sregs_get(vcpu, &sregs);
@@ -534,6 +536,8 @@ static void vcpu_init_sregs(struct kvm_vm *vm, struct kvm_vcpu *vcpu)
534536
sregs.cr4 |= X86_CR4_PAE | X86_CR4_OSFXSR;
535537
if (kvm_cpu_has(X86_FEATURE_XSAVE))
536538
sregs.cr4 |= X86_CR4_OSXSAVE;
539+
if (vm->pgtable_levels == 5)
540+
sregs.cr4 |= X86_CR4_LA57;
537541
sregs.efer |= (EFER_LME | EFER_LMA | EFER_NX);
538542

539543
kvm_seg_set_unusable(&sregs.ldt);

tools/testing/selftests/kvm/lib/x86/vmx.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -401,11 +401,11 @@ void __nested_pg_map(struct vmx_pages *vmx, struct kvm_vm *vm,
401401
struct eptPageTableEntry *pt = vmx->eptp_hva, *pte;
402402
uint16_t index;
403403

404-
TEST_ASSERT(vm->mode == VM_MODE_PXXV48_4K, "Attempt to use "
405-
"unknown or unsupported guest mode, mode: 0x%x", vm->mode);
404+
TEST_ASSERT(vm->mode == VM_MODE_PXXVYY_4K,
405+
"Unknown or unsupported guest mode: 0x%x", vm->mode);
406406

407407
TEST_ASSERT((nested_paddr >> 48) == 0,
408-
"Nested physical address 0x%lx requires 5-level paging",
408+
"Nested physical address 0x%lx is > 48-bits and requires 5-level EPT",
409409
nested_paddr);
410410
TEST_ASSERT((nested_paddr % page_size) == 0,
411411
"Nested physical address not on page boundary,\n"

0 commit comments

Comments
 (0)