Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3833106ybl; Mon, 26 Aug 2019 01:00:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqyw3BaYbQ+TuJoR1iB9lPvrahz/ldjs7WHSpUdcol1SRsnLQHD2ydEUOAENjP+Gq7Gemshy X-Received: by 2002:a62:8246:: with SMTP id w67mr5744981pfd.226.1566806430448; Mon, 26 Aug 2019 01:00:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566806430; cv=none; d=google.com; s=arc-20160816; b=pIjTTlzGvEZZoDIlqa+J0tVOfp4wftMI5F7/b1M/3MnahHd7vch5vJeg1qtAt8mHZE VbKxaj8gSSl8Bk/B3AioJAyGmANvgwgujdmntnzpzj6beziS4B+qKFu2uLAJniMcJX+o HXyVjzbqADmwK96NQp24NaNc6i/7bClXE4dkQlkTA/LMfCGOlgMvEy0qmJv1LtCZtpHK Dkkio6s70ZzvemjQ1LPluhXDD6QMEYSQqsEVDw+MIimqVEuqmczlXvJiW4vnyk8jkpVE CxQj9vD8LXTrOIzWODErfNIYwiW1gfnJms2rXd4mTau42dvlZDGTS3iLbbQO8FpaTHR4 S6IQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=nx/uKVsNPrj4sLskCBDR38LskLWX/kbZNssKjw3uHhE=; b=oPjfJWR+KY3X7HMdxhx4U3FF7gNGQR7Utn7uYhQ9ihCLv9uIMeVn0oWDiN1AI+4eYG q8qx1jq/jH4aPvX8cVghxf5LGnfm2G/21ZmzsWJLxgK5i9Cgc3mh+muiej9JFv/R49qz PBruTERqEFG+/P9tgAKTFtCrajCBmjBKUbrfS6foj54EzC4+DJCfAtxYUUiEJjUn8awP 9LHv/V5/Eki8kw2A97MpKE5daoVoMe4TQRn+bZuY8F3b/+KFNZ9PDGnVvOco5Up95c+j U23MF/VsgJwDpfn0BJpXFdMXH3QkLxF8VkRxox7SBl1RVTsuwOkEtRtrlALZsi3+e1eL nehA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x10si9795286pfj.274.2019.08.26.01.00.15; Mon, 26 Aug 2019 01:00:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730310AbfHZH5m (ORCPT + 99 others); Mon, 26 Aug 2019 03:57:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44348 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730103AbfHZH5m (ORCPT ); Mon, 26 Aug 2019 03:57:42 -0400 Received: from mail-pg1-f200.google.com (mail-pg1-f200.google.com [209.85.215.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 738705AFE3 for ; Mon, 26 Aug 2019 07:57:41 +0000 (UTC) Received: by mail-pg1-f200.google.com with SMTP id l11so9259926pgc.14 for ; Mon, 26 Aug 2019 00:57:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=nx/uKVsNPrj4sLskCBDR38LskLWX/kbZNssKjw3uHhE=; b=s7408eronA/oenaP8IlAsFga/wUuUEPj/Mvh3lFhly+QM2LEMfUX0cuC3DMsWjyim4 NnSmOvoLTQZSGsddNgXKBlyepXAlCH0EjYLV9iNchW4dWLcA151E5TWQYqFxrRbT6y7v yazjHSalM3Hmt7OKWfSJBPElYyfoGV66rrsCJOwkw+dYdq81t0l0H46RRsauCwEqv99x 9BUTOfeJS1AMGTx58iGQ1k6gpNMEbmLpOPv3olSEFrp/+HMIa3ipbyHKjuYLPbUDK5lT 3giItAo13Wyb70XklMlkS1DsoSjkEjLxf/LmJBrHjtc5lCLK+ztLWUzSeOob6PItOhly eMlg== X-Gm-Message-State: APjAAAWiehB23zPsMZNjn5nHXdsD4VjKemOqLrrxUqHsDCnfvATMqtz+ cLkW+VnTt9nPq1h7oBM1jlhGjPp3piuv1RNZ7uqs9N9PwMlzvSfkUjmOFZFlQIzw7SA7M8dhjKt js3mlJrfE9XFK64JHrT0GvmPD X-Received: by 2002:a63:2807:: with SMTP id o7mr15459231pgo.131.1566806260339; Mon, 26 Aug 2019 00:57:40 -0700 (PDT) X-Received: by 2002:a63:2807:: with SMTP id o7mr15459215pgo.131.1566806259994; Mon, 26 Aug 2019 00:57:39 -0700 (PDT) Received: from xz-x1.redhat.com ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id r137sm12038058pfc.145.2019.08.26.00.57.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Aug 2019 00:57:39 -0700 (PDT) From: Peter Xu To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: peterx@redhat.com, Paolo Bonzini , Andrew Jones , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Thomas Huth Subject: [PATCH] KVM: selftests: Detect max PA width from cpuid Date: Mon, 26 Aug 2019 15:57:28 +0800 Message-Id: <20190826075728.21646-1-peterx@redhat.com> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The dirty_log_test is failing on some old machines like Xeon E3-1220 with tripple faults when writting to the tracked memory region: Test iterations: 32, interval: 10 (ms) Testing guest mode: PA-bits:52, VA-bits:48, 4K pages guest physical test memory offset: 0x7fbffef000 ==== Test Assertion Failure ==== dirty_log_test.c:138: false pid=6137 tid=6139 - Success 1 0x0000000000401ca1: vcpu_worker at dirty_log_test.c:138 2 0x00007f3dd9e392dd: ?? ??:0 3 0x00007f3dd9b6a132: ?? ??:0 Invalid guest sync status: exit_reason=SHUTDOWN It's because previously we moved the testing memory region from a static place (1G) to the top of the system's physical address space, meanwhile we stick to 39 bits PA for all the x86_64 machines. That's not true for machines like Xeon E3-1220 where it only supports 36. Let's unbreak this test by dynamically detect PA width from CPUID 0x80000008. Meanwhile, even allow kvm_get_supported_cpuid_index() to fail. I don't know whether that could be useful because I think 0x80000008 should be there for all x86_64 hosts, but I also think it's not really helpful to assert in the kvm_get_supported_cpuid_index(). Fixes: b442324b581556e CC: Paolo Bonzini CC: Andrew Jones CC: Radim Krčmář CC: Thomas Huth Signed-off-by: Peter Xu --- tools/testing/selftests/kvm/dirty_log_test.c | 22 +++++++++++++------ .../selftests/kvm/lib/x86_64/processor.c | 3 --- 2 files changed, 15 insertions(+), 10 deletions(-) diff --git a/tools/testing/selftests/kvm/dirty_log_test.c b/tools/testing/selftests/kvm/dirty_log_test.c index ceb52b952637..111592f3a1d7 100644 --- a/tools/testing/selftests/kvm/dirty_log_test.c +++ b/tools/testing/selftests/kvm/dirty_log_test.c @@ -274,18 +274,26 @@ static void run_test(enum vm_guest_mode mode, unsigned long iterations, DEBUG("Testing guest mode: %s\n", vm_guest_mode_string(mode)); #ifdef __x86_64__ - /* - * FIXME - * The x86_64 kvm selftests framework currently only supports a - * single PML4 which restricts the number of physical address - * bits we can change to 39. - */ - guest_pa_bits = 39; + { + struct kvm_cpuid_entry2 *entry; + + entry = kvm_get_supported_cpuid_entry(0x80000008); + /* + * Supported PA width can be smaller than 52 even if + * we're with VM_MODE_P52V48_4K mode. Fetch it from + * the host to update the default value (SDM 4.1.4). + */ + if (entry) + guest_pa_bits = entry->eax & 0xff; + else + guest_pa_bits = 32; + } #endif #ifdef __aarch64__ if (guest_pa_bits != 40) type = KVM_VM_TYPE_ARM_IPA_SIZE(guest_pa_bits); #endif + printf("Supported guest physical address width: %d\n", guest_pa_bits); max_gfn = (1ul << (guest_pa_bits - guest_page_shift)) - 1; guest_page_size = (1ul << guest_page_shift); /* diff --git a/tools/testing/selftests/kvm/lib/x86_64/processor.c b/tools/testing/selftests/kvm/lib/x86_64/processor.c index 6cb34a0fa200..9de2fd310ac8 100644 --- a/tools/testing/selftests/kvm/lib/x86_64/processor.c +++ b/tools/testing/selftests/kvm/lib/x86_64/processor.c @@ -760,9 +760,6 @@ kvm_get_supported_cpuid_index(uint32_t function, uint32_t index) break; } } - - TEST_ASSERT(entry, "Guest CPUID entry not found: (EAX=%x, ECX=%x).", - function, index); return entry; } -- 2.21.0