Received: by 2002:a05:6a10:83d0:0:0:0:0 with SMTP id o16csp63888pxh; Thu, 7 Apr 2022 14:04:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwVC1V2iPj9visCSPtOoUiwq7idlPAyU3Ajnfw097LvD0P8nYXRzL0ijoAH7TUc3DO3OLAp X-Received: by 2002:a05:6820:515:b0:328:fdb2:5344 with SMTP id m21-20020a056820051500b00328fdb25344mr5185163ooj.54.1649365495946; Thu, 07 Apr 2022 14:04:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649365495; cv=none; d=google.com; s=arc-20160816; b=i4lxZ3x2ScBgPbrTbizs7tHnJU51gERomtGlHXd/umqwojVG17l/pBI2pgRT0c/Ipu Q5JtdEPXENH9G2P6SUrJeCp9oR3YDsOhzJoDuppn+wg5HVWWT1isrxzyP4S/1xPo7VM2 fpyR6jZYJq0mba/MkUjsqk3/vZob/sySIuh3MZvtgrvKD7o/zaUtlPDDJBNtF7F5OL5C VRj1hAOS1Wa0fFh/z/jwoR4Pdr8nuftBW2R2Cfz3eXZwNTEJCVAWfRttZsJnn1afmjFe +oTF8EDenXfiKXOnl613r1SGdR8W4ygBCNReLphxo8uzM3oD9fvMmPcA4+pi2qAM2iIl M6Yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=L3Dd+P2g38/w2YOBvMoRWTN4BwvuSs+hqZexviAv7/Q=; b=0fLGDMXa/ybRf67mSJVJBgXdowBZ9/OaiteZuKn6w9YEqOhSZirmgwOl0Untct3VQ2 2W/N/RG+hQSzihTYHIkhz19mng/9sxRwT1i5JIQqSIaQ8OTS4t9xkqDxqclyFAfJJGBt jVT/VBa+c2L+U8ujD7gG8moyIRqg5KvgGKj3c6f+l6+YedPaTr1iZtp9oIZNu6fdcRpC 4s3otRoOKlBOo6p/UEaXV6ItyEF00fgbV1MyLDSL88oQ0YkXNRVMXmDZa9VSNSFjRl4H ORSXWI+psOOdctWQrxapzrhhjTJx/HtSec7HGb6/e/BquMHETtMtLwFEOEpgYqO4MyM9 b83A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=MVGOAPXc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id z15-20020a4a9c8f000000b0032492328e86si12291628ooj.52.2022.04.07.14.04.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 14:04:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=MVGOAPXc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CE99F473BF9; Thu, 7 Apr 2022 13:10:03 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345955AbiDGRDA (ORCPT + 99 others); Thu, 7 Apr 2022 13:03:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33996 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345939AbiDGRC5 (ORCPT ); Thu, 7 Apr 2022 13:02:57 -0400 Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4EFA11C8A8D for ; Thu, 7 Apr 2022 10:00:56 -0700 (PDT) Received: by mail-yb1-xb35.google.com with SMTP id x21so10639611ybd.6 for ; Thu, 07 Apr 2022 10:00:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=L3Dd+P2g38/w2YOBvMoRWTN4BwvuSs+hqZexviAv7/Q=; b=MVGOAPXcz1EpFRY0XjrNe3feNoA85tcka9Rgll5WS0+gK7wgvGS5SeBNLBdhHiasxS TBISqO2gQ0OG/GN8MUrhN9MlvuKtBqiP/zcpE/qpDVuVlkkzpoPk+1Bl2HL/tTH1/l7h vGBbvDnx2XR5d/tkGX7DAOeBhO3nLVOl/Vkuy+NXz7fxAUyIurf4diiWaDZmjF9Hv6hE vAnQbMc8/M/gZF+CF4ACw/AgqBZHswtgZ2QSBpyHANqeU2gCfOPzq7yemVn+3blYKRak wApaFbqX+lMiAnAV4BUsyXcXedrv4d2hvU10lB5W6mv0FAobkVAtoCulomx39mj0IlEH 3PyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=L3Dd+P2g38/w2YOBvMoRWTN4BwvuSs+hqZexviAv7/Q=; b=qRWdz+TAAmWq4s7NwmAzLiJ4/VN92KLyXJ3hDohODGgMnyOR54JLTNhqRc33nwf6re o9F5ajqF+HW6ISP4wpf7LI4oKfBGbUFEUWRP4Cg3rRITRaoJmj96qRzUOfq2Rc57NDzX eOBevPWZIXYFNPru9m/7PMsZYMkbLTxae0+RZ09VeC9Jx/psz4gzkSuqgXxLofCFgw9j vq/f5GHQM4p71cmK0IjUv1mSw2SPSdoOcOI6rNUmEdAS7DyTz0fuJt5qTAX+iBFd/xS8 P73qHjQxBfkbhz5XJcnvmRnPWyO1BDDtE+owlbx5cVAV52+Cm01spjIpjpHGkYU8yajL DC5g== X-Gm-Message-State: AOAM533M73p6AhSsxTJX9bs3QsKeOVgHAHy+28UAJiy31CAOXYi93FA4 Ymjs2Vf85WaTJo63sPBKwJ8PaUOKiRs2/kAz/xyBd/mZS9s= X-Received: by 2002:a25:e689:0:b0:63e:4f58:d27 with SMTP id d131-20020a25e689000000b0063e4f580d27mr3816581ybh.341.1649350368103; Thu, 07 Apr 2022 09:52:48 -0700 (PDT) MIME-Version: 1.0 References: <20220330174621.1567317-1-bgardon@google.com> <20220330174621.1567317-7-bgardon@google.com> In-Reply-To: From: Ben Gardon Date: Thu, 7 Apr 2022 09:52:37 -0700 Message-ID: Subject: Re: [PATCH v3 06/11] KVM: selftests: Add NX huge pages test To: David Matlack Cc: LKML , kvm , Paolo Bonzini , Peter Xu , Sean Christopherson , Jim Mattson , David Dunn , Jing Zhang , Junaid Shahid Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 5, 2022 at 3:38 PM David Matlack wrote: > > On Wed, Mar 30, 2022 at 10:46:16AM -0700, Ben Gardon wrote: > > There's currently no test coverage of NX hugepages in KVM selftests, so > > add a basic test to ensure that the feature works as intended. > > > > Reviewed-by: David Dunn > > > > Signed-off-by: Ben Gardon > > --- > > tools/testing/selftests/kvm/Makefile | 7 +- > > .../kvm/lib/x86_64/nx_huge_pages_guest.S | 45 ++++++ > > .../selftests/kvm/x86_64/nx_huge_pages_test.c | 133 ++++++++++++++++++ > > .../kvm/x86_64/nx_huge_pages_test.sh | 25 ++++ > > 4 files changed, 209 insertions(+), 1 deletion(-) > > create mode 100644 tools/testing/selftests/kvm/lib/x86_64/nx_huge_pages_guest.S > > create mode 100644 tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c > > create mode 100755 tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh > > > > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile > > index c9cdbd248727..c671224cf755 100644 > > --- a/tools/testing/selftests/kvm/Makefile > > +++ b/tools/testing/selftests/kvm/Makefile > > @@ -38,7 +38,7 @@ ifeq ($(ARCH),riscv) > > endif > > > > LIBKVM = lib/assert.c lib/elf.c lib/io.c lib/kvm_util.c lib/rbtree.c lib/sparsebit.c lib/test_util.c lib/guest_modes.c lib/perf_test_util.c > > -LIBKVM_x86_64 = lib/x86_64/apic.c lib/x86_64/processor.c lib/x86_64/vmx.c lib/x86_64/svm.c lib/x86_64/ucall.c lib/x86_64/handlers.S > > +LIBKVM_x86_64 = lib/x86_64/apic.c lib/x86_64/processor.c lib/x86_64/vmx.c lib/x86_64/svm.c lib/x86_64/ucall.c lib/x86_64/handlers.S lib/x86_64/nx_huge_pages_guest.S > > LIBKVM_aarch64 = lib/aarch64/processor.c lib/aarch64/ucall.c lib/aarch64/handlers.S lib/aarch64/spinlock.c lib/aarch64/gic.c lib/aarch64/gic_v3.c lib/aarch64/vgic.c > > LIBKVM_s390x = lib/s390x/processor.c lib/s390x/ucall.c lib/s390x/diag318_test_handler.c > > LIBKVM_riscv = lib/riscv/processor.c lib/riscv/ucall.c > > @@ -57,6 +57,8 @@ TEST_GEN_PROGS_x86_64 += x86_64/kvm_clock_test > > TEST_GEN_PROGS_x86_64 += x86_64/kvm_pv_test > > TEST_GEN_PROGS_x86_64 += x86_64/mmio_warning_test > > TEST_GEN_PROGS_x86_64 += x86_64/mmu_role_test > > +TEST_GEN_PROGS_EXTENDED_x86_64 += x86_64/nx_huge_pages_test > > +TEST_PROGS_x86_64 += x86_64/nx_huge_pages_test.sh > > Suggest brearking TEST_PROGS and TEST_GEN_PROGS_EXTENDED out into their > own separate blocks with newlines in between. They capture different > types of files so I think it makes sense to separate them in the > Makefile. I expect both lists will grow over time so the awkwardness of > having them off on their lonesome is temporary :). > > It'd also be nice to have some comments above each explaining when they > should be used. A short blurb is fine since the selftest documentation > is the authority. Will do. > > > TEST_GEN_PROGS_x86_64 += x86_64/platform_info_test > > TEST_GEN_PROGS_x86_64 += x86_64/pmu_event_filter_test > > TEST_GEN_PROGS_x86_64 += x86_64/set_boot_cpu_id > > @@ -141,7 +143,9 @@ TEST_GEN_PROGS_riscv += kvm_page_table_test > > TEST_GEN_PROGS_riscv += set_memory_region_test > > TEST_GEN_PROGS_riscv += kvm_binary_stats_test > > > > +TEST_PROGS += $(TEST_PROGS_$(UNAME_M)) > > TEST_GEN_PROGS += $(TEST_GEN_PROGS_$(UNAME_M)) > > +TEST_GEN_PROGS_EXTENDED += $(TEST_GEN_PROGS_EXTENDED_$(UNAME_M)) > > LIBKVM += $(LIBKVM_$(UNAME_M)) > > > > INSTALL_HDR_PATH = $(top_srcdir)/usr > > @@ -192,6 +196,7 @@ $(OUTPUT)/libkvm.a: $(LIBKVM_OBJS) > > x := $(shell mkdir -p $(sort $(dir $(TEST_GEN_PROGS)))) > > all: $(STATIC_LIBS) > > $(TEST_GEN_PROGS): $(STATIC_LIBS) > > +$(TEST_GEN_PROGS_EXTENDED): $(STATIC_LIBS) > > > > cscope: include_paths = $(LINUX_TOOL_INCLUDE) $(LINUX_HDR_PATH) include lib .. > > cscope: > > diff --git a/tools/testing/selftests/kvm/lib/x86_64/nx_huge_pages_guest.S b/tools/testing/selftests/kvm/lib/x86_64/nx_huge_pages_guest.S > > new file mode 100644 > > index 000000000000..09c66b9562a3 > > --- /dev/null > > +++ b/tools/testing/selftests/kvm/lib/x86_64/nx_huge_pages_guest.S > > @@ -0,0 +1,45 @@ > > +/* SPDX-License-Identifier: GPL-2.0-only */ > > +/* > > + * tools/testing/selftests/kvm/nx_huge_page_guest.S > > + * > > + * Copyright (C) 2022, Google LLC. > > + */ > > + > > +.include "kvm_util.h" > > + > > +#define HPAGE_SIZE (2*1024*1024) > > +#define PORT_SUCCESS 0x70 > > + > > +.global guest_code0 > > +.global guest_code1 > > + > > +.align HPAGE_SIZE > > +exit_vm: > > + mov $0x1,%edi > > + mov $0x2,%esi > > + mov a_string,%edx > > + mov $0x1,%ecx > > + xor %eax,%eax > > + jmp ucall > > + > > + > > +guest_code0: > > + mov data1, %eax > > + mov data2, %eax > > + jmp exit_vm > > + > > +.align HPAGE_SIZE > > +guest_code1: > > + mov data1, %eax > > + mov data2, %eax > > + jmp exit_vm > > +data1: > > +.quad 0 > > What do you think about my idea in [1] of using ret instructions and > function pointers to trigger execution on an arbitrary page? That would > avoid the need for this assembly file and we could probably share the > code between our tests. > > Feel free to take the idea and incorporate it directly if you agree, and > I'll rebase on top, since you're series is further along than mine. > > [1] https://lore.kernel.org/kvm/20220401233737.3021889-2-dmatlack@google.com/ > Sigh, it means I have to rewrite a lot of the test, but it is the better way to write this test. > > + > > +.align HPAGE_SIZE > > +data2: > > +.quad 0 > > +a_string: > > +.string "why does the ucall function take a string argument?" > > + > > + > > diff --git a/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c > > new file mode 100644 > > index 000000000000..2bcbe4efdc6a > > --- /dev/null > > +++ b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c > > @@ -0,0 +1,133 @@ > > +// SPDX-License-Identifier: GPL-2.0-only > > +/* > > + * tools/testing/selftests/kvm/nx_huge_page_test.c > > + * > > + * Usage: to be run via nx_huge_page_test.sh, which does the necessary > > + * environment setup and teardown > > + * > > + * Copyright (C) 2022, Google LLC. > > + */ > > + > > +#define _GNU_SOURCE > > + > > +#include > > +#include > > +#include > > + > > +#include > > +#include "kvm_util.h" > > + > > +#define HPAGE_SLOT 10 > > +#define HPAGE_PADDR_START (10*1024*1024) > > +#define HPAGE_SLOT_NPAGES (100*1024*1024/4096) > > + > > +/* Defined in nx_huge_page_guest.S */ > > +void guest_code0(void); > > +void guest_code1(void); > > + > > +static void run_guest_code(struct kvm_vm *vm, void (*guest_code)(void)) > > +{ > > + struct kvm_regs regs; > > + > > + vcpu_regs_get(vm, 0, ®s); > > + regs.rip = (uint64_t)guest_code; > > + vcpu_regs_set(vm, 0, ®s); > > + vcpu_run(vm, 0); > > +} > > + > > +static void check_2m_page_count(struct kvm_vm *vm, int expected_pages_2m) > > +{ > > + int actual_pages_2m; > > + > > + actual_pages_2m = vm_get_single_stat(vm, "pages_2m"); > > + > > + TEST_ASSERT(actual_pages_2m == expected_pages_2m, > > + "Unexpected 2m page count. Expected %d, got %d", > > + expected_pages_2m, actual_pages_2m); > > +} > > + > > +static void check_split_count(struct kvm_vm *vm, int expected_splits) > > +{ > > + int actual_splits; > > + > > + actual_splits = vm_get_single_stat(vm, "nx_lpage_splits"); > > + > > + TEST_ASSERT(actual_splits == expected_splits, > > + "Unexpected nx lpage split count. Expected %d, got %d", > > + expected_splits, actual_splits); > > +} > > + > > +int main(int argc, char **argv) > > +{ > > + struct kvm_vm *vm; > > + struct timespec ts; > > + > > + vm = vm_create(VM_MODE_DEFAULT, DEFAULT_GUEST_PHY_PAGES, O_RDWR); > > + > > + vm_userspace_mem_region_add(vm, VM_MEM_SRC_ANONYMOUS_HUGETLB, > > + HPAGE_PADDR_START, HPAGE_SLOT, > > + HPAGE_SLOT_NPAGES, 0); > > + > > + kvm_vm_elf_load_memslot(vm, program_invocation_name, HPAGE_SLOT); > > + > > + vm_vcpu_add_default(vm, 0, guest_code0); > > + > > + check_2m_page_count(vm, 0); > > + check_split_count(vm, 0); > > + > > + /* > > + * Running guest_code0 will access data1 and data2. > > + * This should result in part of the huge page containing guest_code0, > > + * and part of the hugepage containing the ucall function being mapped > > + * at 4K. The huge pages containing data1 and data2 will be mapped > > + * at 2M. > > + */ > > + run_guest_code(vm, guest_code0); > > + check_2m_page_count(vm, 2); > > + check_split_count(vm, 2); > > + > > + /* > > + * guest_code1 is in the same huge page as data1, so it will cause > > + * that huge page to be remapped at 4k. > > + */ > > + run_guest_code(vm, guest_code1); > > + check_2m_page_count(vm, 1); > > + check_split_count(vm, 3); > > + > > + /* Run guest_code0 again to check that is has no effect. */ > > + run_guest_code(vm, guest_code0); > > + check_2m_page_count(vm, 1); > > + check_split_count(vm, 3); > > + > > + /* > > + * Give recovery thread time to run. The wrapper script sets > > + * recovery_period_ms to 100, so wait 1.5x that. > > + */ > > So we give it an extra 50ms? That should probably be enough but I'm > paranoid so I'd probably bump it up to 500 ms. Will do. > > > + ts.tv_sec = 0; > > + ts.tv_nsec = 150000000; > > + nanosleep(&ts, NULL); > > + > > + /* > > + * Now that the reclaimer has run, all the split pages should be gone. > > + */ > > + check_2m_page_count(vm, 1); > > + check_split_count(vm, 0); > > + > > + /* > > + * The split 2M pages should have been reclaimed, so run guest_code0 > > + * again to check that pages are mapped at 2M again. > > + */ > > + run_guest_code(vm, guest_code0); > > + check_2m_page_count(vm, 2); > > + check_split_count(vm, 2); > > + > > + /* Pages are once again split from running guest_code1. */ > > + run_guest_code(vm, guest_code1); > > + check_2m_page_count(vm, 1); > > + check_split_count(vm, 3); > > + > > + kvm_vm_free(vm); > > + > > + return 0; > > +} > > + > > diff --git a/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh > > new file mode 100755 > > index 000000000000..19fc95723fcb > > --- /dev/null > > +++ b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh > > @@ -0,0 +1,25 @@ > > +#!/bin/bash > > +# SPDX-License-Identifier: GPL-2.0-only */ > > + > > +# tools/testing/selftests/kvm/nx_huge_page_test.sh > > +# Copyright (C) 2022, Google LLC. > > + > > +NX_HUGE_PAGES=$(cat /sys/module/kvm/parameters/nx_huge_pages) > > +NX_HUGE_PAGES_RECOVERY_RATIO=$(cat /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio) > > +NX_HUGE_PAGES_RECOVERY_PERIOD=$(cat /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms) > > +HUGE_PAGES=$(cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages) > > + > > +echo 1 > /sys/module/kvm/parameters/nx_huge_pages > > +echo 1 > /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio > > +echo 100 > /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms > > +echo 200 > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages > > + > > +./nx_huge_pages_test > > +RET=$? > > + > > +echo $NX_HUGE_PAGES > /sys/module/kvm/parameters/nx_huge_pages > > +echo $NX_HUGE_PAGES_RECOVERY_RATIO > /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio > > +echo $NX_HUGE_PAGES_RECOVERY_PERIOD > /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms > > +echo $HUGE_PAGES > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages > > + > > +exit $RET > > -- > > 2.35.1.1021.g381101b075-goog > >