Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp233887rwb; Wed, 7 Dec 2022 17:14:24 -0800 (PST) X-Google-Smtp-Source: AA0mqf7c7ij3QP4V02Ij/Le6fG7i7asITsok+o8l11aGQ+vCWSyqiQmWZhnVwupXrLw/Up46iGsf X-Received: by 2002:a05:6a00:1d88:b0:577:8bad:9758 with SMTP id z8-20020a056a001d8800b005778bad9758mr4178039pfw.16.1670462064195; Wed, 07 Dec 2022 17:14:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670462064; cv=none; d=google.com; s=arc-20160816; b=feoa2nNw847qUNK1YhjibtGu+TG90iTmQaXyKKaKSYPGKKQAAltt2sVj+oYdtbmsmz QmNVRp+ZwZFixSd/vs4JQ/OSEHFOvO4w5U/aKQRZ6GFHLcWHd+8y74P6GBZjLC6SBH2R t8KvFgJddhCjs28nQsSDr0YLU+kDGyWsmNksB3vstZaUhtgOYSuLyAM5cGIKhEvd8I7W dcmXX76uKujM3zPofrV23e8y8HqDrHifSofqtoTby39G9V625y4l605VuO4eVK0kaAth q1sr2KMBWswfyubAaFOe6dSmuxdz3yempIySuUC7lDRiC5Bq2FfakfyxIs8E0lssXDpA fV8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=R1Ot9//nMiXKCXxmYFxpZAtjZ4ruTDUzpHcMNR6JE8Q=; b=R8C0OsAmlv3tXm4+Pk3sYBWBvyvDlrFXwx5Y/JHfq/i0xwape14gvl1xdRA96TrIcJ TjHC0gwhylQ8MR0MIp7g4o172yn0Hv6eZzQrbBZDY1oztUhVrvR+Bn8G5CadsGit9Hmg a3llC6yvbXMD3Uie6JEGVxe7MhswS3glR0pJptU1WZfU6BGi6UtzqgkpeOhl5hvhjKps WVvxzpwUFOZuG8unqafC27ApfnNUzsxdduWz6VvcnSOq/4spV5GXcKhaicZBvHOtEnqx 3Is+FrvF+MRm3EPloUDxNEijRKKcV40XkhKPXEfZCuy7aZ8eyFkmhl0UAwWFeA6pKHgx PMKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=Zo+rwodm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c21-20020aa78e15000000b0055fa098c388si21497993pfr.259.2022.12.07.17.14.14; Wed, 07 Dec 2022 17:14:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=Zo+rwodm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229830AbiLHAhd (ORCPT + 75 others); Wed, 7 Dec 2022 19:37:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229828AbiLHAha (ORCPT ); Wed, 7 Dec 2022 19:37:30 -0500 Received: from out-15.mta0.migadu.com (out-15.mta0.migadu.com [91.218.175.15]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE6368DBED for ; Wed, 7 Dec 2022 16:37:29 -0800 (PST) Date: Thu, 8 Dec 2022 00:37:23 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1670459848; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=R1Ot9//nMiXKCXxmYFxpZAtjZ4ruTDUzpHcMNR6JE8Q=; b=Zo+rwodmUSpHYC0YOk/0NSai9qoHKbHeLsICVlcjQQslcyJgdi8NIVirevj/b5ycOtQtoL r1XtqN67K/9InXjPit9tu81ZxVQ+LMFtY3KPPNRrEScL+qmbpv+RRDRA+MScT8fR1Gp305 E074yDhdLgLX+Huj4R41n1ZMU6arnIo= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Sean Christopherson Cc: Marc Zyngier , James Morse , Alexandru Elisei , Suzuki K Poulose , Paolo Bonzini , Shuah Khan , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, kvmarm@lists.linux.dev, Ricardo Koller , linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory Message-ID: References: <20221207214809.489070-1-oliver.upton@linux.dev> <20221207214809.489070-3-oliver.upton@linux.dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 08, 2022 at 12:24:20AM +0000, Sean Christopherson wrote: > On Thu, Dec 08, 2022, Oliver Upton wrote: > > On Wed, Dec 07, 2022 at 11:57:27PM +0000, Sean Christopherson wrote: > > > > diff --git a/tools/testing/selftests/kvm/aarch64/page_fault_test.c b/tools/testing/selftests/kvm/aarch64/page_fault_test.c > > > > index 92d3a91153b6..95d22cfb7b41 100644 > > > > --- a/tools/testing/selftests/kvm/aarch64/page_fault_test.c > > > > +++ b/tools/testing/selftests/kvm/aarch64/page_fault_test.c > > > > @@ -609,8 +609,13 @@ static void setup_memslots(struct kvm_vm *vm, struct test_params *p) > > > > data_size / guest_page_size, > > > > p->test_desc->data_memslot_flags); > > > > vm->memslots[MEM_REGION_TEST_DATA] = TEST_DATA_MEMSLOT; > > > > +} > > > > + > > > > +static void setup_ucall(struct kvm_vm *vm) > > > > +{ > > > > + struct userspace_mem_region *region = vm_get_mem_region(vm, MEM_REGION_TEST_DATA); > > > > > > > > - ucall_init(vm, data_gpa + data_size); > > > > + ucall_init(vm, region->region.guest_phys_addr + region->region.memory_size); > > > > > > Isn't there a hole after CODE_AND_DATA_MEMSLOT? I.e. after memslot 0? > > > > Sure, but that's only guaranteed in the PA space. > > > > > The reason > > > I ask is because if so, then we can do the temporarily heinous, but hopefully forward > > > looking thing of adding a helper to wrap kvm_vm_elf_load() + ucall_init(). > > > > > > E.g. I think we can do this immediately, and then at some point in the 6.2 cycle > > > add a dedicated region+memslot for the ucall MMIO page. > > > > Even still, that's just a kludge to make ucalls work. We have other > > MMIO devices (GIC distributor, for example) that work by chance since > > nothing conflicts with the constant GPAs we've selected in the tests. > > > > I'd rather we go down the route of having an address allocator for the > > for both the VA and PA spaces to provide carveouts at runtime. > > Aren't those two separate issues? The PA, a.k.a. memslots space, can be solved > by allocating a dedicated memslot, i.e. doesn't need a carve. At worst, collisions > will yield very explicit asserts, which IMO is better than whatever might go wrong > with a carve out. Perhaps the use of the term 'carveout' wasn't right here. What I'm suggesting is we cannot rely on KVM memslots alone to act as an allocator for the PA space. KVM can provide devices to the guest that aren't represented as memslots. If we're trying to fix PA allocations anyway, why not make it generic enough to suit the needs of things beyond ucalls? -- Thanks, Oliver