Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp1435813pxb; Thu, 14 Apr 2022 06:15:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyAsL+jdCVuLMSa2xX7qyCkqYZv12ZlUvUYG9BrikV9MhN0GJLOmEmuvjTzYLzdDGxKpTK7 X-Received: by 2002:a50:9986:0:b0:413:bbdd:d5a1 with SMTP id m6-20020a509986000000b00413bbddd5a1mr2996253edb.26.1649942125420; Thu, 14 Apr 2022 06:15:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649942125; cv=none; d=google.com; s=arc-20160816; b=woyViHebBHKfIuz+qGUcNLB56qJWv/08vjU1vFEwWy5CKnHuEHqjSsR/z3iGrOrMip F0ZS6ht1V0xar3g9CfXxJTGsMa9jcpRCtFbzohUSrLDeloOjceF5ADPoVHEE230Vjwa8 MELYWWYyQDtjsAZYTsO8/0eFi+v1e8A0fV141GQB1FOMTNLwu4dOdcd3ZRKDP0UD1tQB sw4xvhPfJrHZtVlQu7O5WzKdxbo1ehjUU8ssZYuDFfagHTJ0f9s118jFY6Fmm99BXdIR NiWmLQ9VX63Fx/gVSFf1eWlWu1N15gBmEvefL33mT+/Vq+n6AfDACuXCySuUVMhMTXOQ zWIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Nv3HlmL61/DZlYIUZDOTsCLYosmOGpppxKgJGQnygDE=; b=GeVBCtY1gUhCMpzFHGpluluwZvfBkz6TugjSyd08edwdEoJLkcWF/iTVBdWvk8KvpR Nu3qGKCvzF47VWJdsDN1lFzd9D0vksAs3ITLq9qbV+mops4vvEDXyj6qGBLovDBj7/Bl MkcDQMbmQNuykV6UNldFqCFiaPiPFF6yoY1UHFbSCgEDB1n816Vk6FbK/GRQFNHS8EnQ DL5iXeFUZafO+Vm33kTIABwIasQ37jVLia6YIZrjYM65BlI44CbZrpL7RPYIfWlYwr48 UPa6B/QTXZEFPD6Qlwt8cyylWB9aXRzJsRBNBVpPyWEBenb165ebFVjQ5Xg8Cz4cYrxR P35A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=aem11bdD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h17-20020a170906585100b006e8d1d9dc28si1880180ejs.32.2022.04.14.06.15.00; Thu, 14 Apr 2022 06:15:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=aem11bdD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237080AbiDMWiG (ORCPT + 99 others); Wed, 13 Apr 2022 18:38:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39514 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234591AbiDMWiE (ORCPT ); Wed, 13 Apr 2022 18:38:04 -0400 Received: from mail-pg1-x52b.google.com (mail-pg1-x52b.google.com [IPv6:2607:f8b0:4864:20::52b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF5A34D61A for ; Wed, 13 Apr 2022 15:35:41 -0700 (PDT) Received: by mail-pg1-x52b.google.com with SMTP id i184so2615909pgc.2 for ; Wed, 13 Apr 2022 15:35:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=Nv3HlmL61/DZlYIUZDOTsCLYosmOGpppxKgJGQnygDE=; b=aem11bdDHHr6FO5DZ6ZNCnM8lUQhLP6hZDhgknJiS7VCX8jWpBxXIbCKXu9q/CGzXb 3qIJ3FjY1fQfWLCVqyW3ExIS2UaKYj25lhKPcmM1s/oR+UGe9r6f8bbd4JTn85bsx8wl dT8Wx7Z4TdIchMsM7yB3cGb/+BLT0Ryi8TrAWNWFxe0F9r2KJC5YzOhAzbIMRRtIsqua NAtXw0jvYjAvGXaiqtomygIoxGkRwqzBZJGB88dlVjyEJiQg9JM3zCO3RLjujNpYIze6 do9vJvwG1li5JQDzwIVhlKqf4G+ibU9mUXUG6C8nOis4Lv2TKlFF8KdzFVqi4E5/Z20w W+1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Nv3HlmL61/DZlYIUZDOTsCLYosmOGpppxKgJGQnygDE=; b=3bjopiXGy7G68FDiRlglCQp+irLiib8waoVatD6INKi7d1GVGk68dqdytr7tvdho43 FXSLxKIIEiXKMv7YdT9Ge7E/LMEUC2x58Oe143cUWftFEi2JaW3tw4Q+gkoB+AgYrf7n 3FsMNkAKTH17R1c4t4ExgZEAkWpu5iEKHA+ycphGsBY5WXdCQXmbxotWApYwq+/Pdb7t 1Dzmq6Lx1D/zTRyaPX/6hSr4HzoeTIGiQYbM/eIlkZ5aNCTxlKfPaSdm3fjzPDw1SrW/ OTP2BnP1D6wGAulghTo5Z4EDSitJhmfubPiSO9axJ15Mbphud6BG2vsNR6gTt2K8qpMM vdEw== X-Gm-Message-State: AOAM5319kmrt/3D1SqM3oHPtOwmswW10hEJkAbudtISdFg7e0sltZLIj qSh9FvfQhihpCVhjRYmog0GvJQ== X-Received: by 2002:a05:6a00:2181:b0:4f6:f1b1:1ba7 with SMTP id h1-20020a056a00218100b004f6f1b11ba7mr924612pfi.73.1649889341051; Wed, 13 Apr 2022 15:35:41 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id c15-20020a63350f000000b003992202f95fsm121369pga.38.2022.04.13.15.35.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Apr 2022 15:35:40 -0700 (PDT) Date: Wed, 13 Apr 2022 22:35:36 +0000 From: Sean Christopherson To: Ben Gardon Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Peter Xu , David Matlack , Jim Mattson , David Dunn , Jing Zhang , Junaid Shahid Subject: Re: [PATCH v5 06/10] KVM: selftests: Add NX huge pages test Message-ID: References: <20220413175944.71705-1-bgardon@google.com> <20220413175944.71705-7-bgardon@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220413175944.71705-7-bgardon@google.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 13, 2022, Ben Gardon wrote: > There's currently no test coverage of NX hugepages in KVM selftests, so > add a basic test to ensure that the feature works as intended. ... > diff --git a/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c > new file mode 100644 > index 000000000000..7f80e48781fd > --- /dev/null > +++ b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c > @@ -0,0 +1,166 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * tools/testing/selftests/kvm/nx_huge_page_test.c > + * > + * Usage: to be run via nx_huge_page_test.sh, which does the necessary > + * environment setup and teardown It would be really nice if this test could either (a) do something useful without having to manually set /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages, or (b) refuse to run unless it's (likely) been invoked by the script. E.g. maybe add a magic token that must be passed in? That way just running the bare test will provide a helpful skip message, but someone that wants to fiddle with it can still run it manually. > +int main(int argc, char **argv) > +{ > + struct kvm_vm *vm; > + struct timespec ts; > + void *hva; This needs to check if the workaround is actually enabled via module param. Not as big a deal if there's a magic number, but it's also not too hard to query a module param. Or at least, it shouldn't be, I'm fairly certain that's one of the things I want to address in the selftests overhaul. Aha! Actually, IIUC, the patch that validates the per-VM override adds full support for the module param being turned off. So, how about pull in the tweaks to the expected number to this patch, and then the per-VM override test just makes disable_nx a logical OR of the module param beyond off or the test using the per-VM override. > diff --git a/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh > new file mode 100755 > index 000000000000..19fc95723fcb > --- /dev/null > +++ b/tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh > @@ -0,0 +1,25 @@ > +#!/bin/bash > +# SPDX-License-Identifier: GPL-2.0-only */ > + > +# tools/testing/selftests/kvm/nx_huge_page_test.sh > +# Copyright (C) 2022, Google LLC. This should either check for root or use sudo. > +NX_HUGE_PAGES=$(cat /sys/module/kvm/parameters/nx_huge_pages) > +NX_HUGE_PAGES_RECOVERY_RATIO=$(cat /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio) > +NX_HUGE_PAGES_RECOVERY_PERIOD=$(cat /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms) > +HUGE_PAGES=$(cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages) > + > +echo 1 > /sys/module/kvm/parameters/nx_huge_pages > +echo 1 > /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio > +echo 100 > /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms > +echo 200 > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages > + > +./nx_huge_pages_test I would much prefer this find its path and use that to reference the test, e.g. this fails if invoking the script from anything but the x86_64 subdirectory. I'd provide a snippet of how to do that, but my scripting skills are garbage :-) > +RET=$? > + > +echo $NX_HUGE_PAGES > /sys/module/kvm/parameters/nx_huge_pages > +echo $NX_HUGE_PAGES_RECOVERY_RATIO > /sys/module/kvm/parameters/nx_huge_pages_recovery_ratio > +echo $NX_HUGE_PAGES_RECOVERY_PERIOD > /sys/module/kvm/parameters/nx_huge_pages_recovery_period_ms > +echo $HUGE_PAGES > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages > + > +exit $RET > -- > 2.35.1.1178.g4f1659d476-goog >