Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp917772ybl; Thu, 23 Jan 2020 10:06:34 -0800 (PST) X-Google-Smtp-Source: APXvYqyH5s5jRvdimpjoM2xQqN7yfp4b9SRo+0YbY8eTyt5tyU5xmfVVfktrfMH3JctLJgDerlUA X-Received: by 2002:aca:ad11:: with SMTP id w17mr11834894oie.85.1579802794363; Thu, 23 Jan 2020 10:06:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579802794; cv=none; d=google.com; s=arc-20160816; b=VEeAOJKXLZJjmIQ1CM+C/7JePbGjiL8467qPlJnyY4MTT0JrU5cnmxHDC+WkGAhAll mTUXok2IliU7xikl1qgcOnmnrp9w5y1//tk3KGHObky9uvt9rlvV+ClHMXI5dkGptyol EidyRO7eZkW7QKTgGqYjTNvhVMsqpCtGFBgc4x5XpanNYrWTDZKv99FLWDwnr7+b5nkX 8itXEpyeAOdLLf6Hl7/FO9XKHXklwvxRYmd6xK9OwrAC9265IGSGnMoXmMB5MoGKdG3r OVDS/PLfbR6o2cWBB4lQYNWtUxxXEtvoNZV9Q7sTI/egpD3eymPF16jwWfpiCLnw8gxw XRaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=IgY/A9lI8I0CLEHHbAfWjUttLZ/uMo5ZHLdhVrD7cM0=; b=nPeKAqe9otq5MX76fOEaInK7y3JLlC0k0K6tzD/a6NaPuB62YKAZX0m3LEHq8FNrFA +A0T7fZQJ/DKNb6e85FiL2kz9ZvoWszmt/QTTcOSMD3k2Mdkax+EQxAh3LjnIKEjZbFT cU4xgszkpcHFH1RYYuTLE+dCGlL/3sUeVF6Q7y3nGrFR2QRO/VHgYVp24VMWIGz/ppBU e1pWczRfsrcayun06RPUFcD6HInzxFDs7IyxoQdD6wXivSCtEFgTxlzAJSNys3IcyRJE hvqW9hgqhxXnF1XSW2ULofIBiynVBDISmwRj3YH47J8gobvnh6XjHdIQ+UGmg2yzTcEw /n9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=t1FZb1fR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m67si1078752oib.117.2020.01.23.10.06.22; Thu, 23 Jan 2020 10:06:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=t1FZb1fR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729351AbgAWSFF (ORCPT + 99 others); Thu, 23 Jan 2020 13:05:05 -0500 Received: from mail-vs1-f74.google.com ([209.85.217.74]:43706 "EHLO mail-vs1-f74.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729345AbgAWSFE (ORCPT ); Thu, 23 Jan 2020 13:05:04 -0500 Received: by mail-vs1-f74.google.com with SMTP id j8so466077vsm.10 for ; Thu, 23 Jan 2020 10:05:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=IgY/A9lI8I0CLEHHbAfWjUttLZ/uMo5ZHLdhVrD7cM0=; b=t1FZb1fRlGn6sS3KiIywlF3SWXZSC72vi3l8yghm1rqJkGVi2ppxi2bhsdIjvKvpRo mtWcSzCLmK9615UMLkHpgpsmNt5T84sa65TDnvwPSa9ngmlIgsKEROMy5IpuHkvfb8N7 bCjmso/kge2qOgVpMLvorx9kPfR6WTEwTFQ8ai/lbr8rUqpqvjYUnTSXQVQ71Drj5GJK RECoQDzgsJUdJwfKMT9nw/Gcan8lFs4CF7xzacTYrzpmO7QXUtJ0wOvCMIvFcmKTG6ds S0JhBqH4xNZ9AdbRXFzXIauav8aPfCE3jZORlJTJUBw0/YItGp4DWvk1Kp8cXJfqmuFI 13ag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=IgY/A9lI8I0CLEHHbAfWjUttLZ/uMo5ZHLdhVrD7cM0=; b=R6DoAdmqz3Elfp0rKfYMHoSGUd6hA3j6nofREzl1OCI9VRzt0d7OQHepfvuS9g6IDr 1QDs25o3AR8nuEe8XxQJg8zOPifm6ZH7VnBQrNYpud5ZGF4JNOnxvVSs74jjPhYJB9d1 5zE9tTdZZ/tAF/C7JWVFTfDeFSEtEPBhUKJtV/FicJUyHOM3t669dWXTtvAt9O50Mxcb XGjPbQIEZtMYGROzXqrrCvB4n4gND0QPffcBZVWTmO+R1vYmLvToo7Ucs24g1JFF4SnY VzzdaczeTlK5JcMnYoq3qmU03OBKfaUrs2lFa7ECrg2t/dDf7gpWO4yNEUNr1nuwfeip W35A== X-Gm-Message-State: APjAAAVkinz+gaB+iNPrgMCZ/Ok1OO683Iw46H1xNHkwpf190sjJ/+5F H4pPWfO8X/lDxW0mAWYbWPMrpsUVb0LlyExEjgn2pMCssL3v6KEIS0Dv4C8hcRmjrVDzZtphmg0 VJd/JS963okWq/icgwLegPI/+5XdIkFw6EI1n1QEzIBn3Dd3hO5+hfSWA/euzegkPLLWo5to4 X-Received: by 2002:a67:e44b:: with SMTP id n11mr7496089vsm.115.1579802702764; Thu, 23 Jan 2020 10:05:02 -0800 (PST) Date: Thu, 23 Jan 2020 10:04:36 -0800 In-Reply-To: <20200123180436.99487-1-bgardon@google.com> Message-Id: <20200123180436.99487-11-bgardon@google.com> Mime-Version: 1.0 References: <20200123180436.99487-1-bgardon@google.com> X-Mailer: git-send-email 2.25.0.341.g760bfbb309-goog Subject: [PATCH v4 10/10] KVM: selftests: Move memslot 0 above KVM internal memslots From: Ben Gardon To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: Paolo Bonzini , Cannon Matthews , Peter Xu , Andrew Jones , Peter Shier , Oliver Upton , Ben Gardon Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org KVM creates internal memslots between 3 and 4 GiB paddrs on the first vCPU creation. If memslot 0 is large enough it collides with these memslots an causes vCPU creation to fail. Instead of creating memslot 0 at paddr 0, start it 4G into the guest physical address space. Signed-off-by: Ben Gardon --- tools/testing/selftests/kvm/lib/kvm_util.c | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/kvm/lib/kvm_util.c b/tools/testing/selftests/kvm/lib/kvm_util.c index 5b971c04f1643..427c88d32e988 100644 --- a/tools/testing/selftests/kvm/lib/kvm_util.c +++ b/tools/testing/selftests/kvm/lib/kvm_util.c @@ -130,9 +130,11 @@ _Static_assert(sizeof(vm_guest_mode_string)/sizeof(char *) == NUM_VM_MODES, * * Creates a VM with the mode specified by mode (e.g. VM_MODE_P52V48_4K). * When phy_pages is non-zero, a memory region of phy_pages physical pages - * is created and mapped starting at guest physical address 0. The file - * descriptor to control the created VM is created with the permissions - * given by perm (e.g. O_RDWR). + * is created, starting at 4G into the guest physical address space to avoid + * KVM internal memslots which map the region between 3G and 4G. If tests need + * to use the physical region between 0 and 3G, they can allocate another + * memslot for that region. The file descriptor to control the created VM is + * created with the permissions given by perm (e.g. O_RDWR). */ struct kvm_vm *_vm_create(enum vm_guest_mode mode, uint64_t phy_pages, int perm) { @@ -231,7 +233,8 @@ struct kvm_vm *_vm_create(enum vm_guest_mode mode, uint64_t phy_pages, int perm) vm->vpages_mapped = sparsebit_alloc(); if (phy_pages != 0) vm_userspace_mem_region_add(vm, VM_MEM_SRC_ANONYMOUS, - 0, 0, phy_pages, 0); + KVM_INTERNAL_MEMSLOTS_END_PADDR, + 0, phy_pages, 0); return vm; } -- 2.25.0.341.g760bfbb309-goog