From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 63CE5F459F3 for ; Fri, 10 Apr 2026 15:20:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id CC1046B00B0; Fri, 10 Apr 2026 11:20:13 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id C98CA6B00B2; Fri, 10 Apr 2026 11:20:13 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B613C6B00B3; Fri, 10 Apr 2026 11:20:13 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id A1FBE6B00B0 for ; Fri, 10 Apr 2026 11:20:13 -0400 (EDT) Received: from smtpin20.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 6B81113A967 for ; Fri, 10 Apr 2026 15:20:13 +0000 (UTC) X-FDA: 84643007106.20.1E720AF Received: from iad-out-015.esa.us-east-1.outbound.mail-perimeter.amazon.com (iad-out-015.esa.us-east-1.outbound.mail-perimeter.amazon.com [44.210.169.44]) by imf26.hostedemail.com (Postfix) with ESMTP id 0E84414000B for ; Fri, 10 Apr 2026 15:20:10 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=amazon.co.uk header.s=amazoncorp2 header.b=WptD33No; spf=pass (imf26.hostedemail.com: domain of "prvs=5539d40d4=kalyazin@amazon.co.uk" designates 44.210.169.44 as permitted sender) smtp.mailfrom="prvs=5539d40d4=kalyazin@amazon.co.uk"; dmarc=pass (policy=quarantine) header.from=amazon.co.uk ARC-Authentication-Results: i=1; imf26.hostedemail.com; dkim=pass header.d=amazon.co.uk header.s=amazoncorp2 header.b=WptD33No; spf=pass (imf26.hostedemail.com: domain of "prvs=5539d40d4=kalyazin@amazon.co.uk" designates 44.210.169.44 as permitted sender) smtp.mailfrom="prvs=5539d40d4=kalyazin@amazon.co.uk"; dmarc=pass (policy=quarantine) header.from=amazon.co.uk ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1775834411; a=rsa-sha256; cv=none; b=BQLBVuwLmDfgeAMOi1znTOHKQUoYq6BgCNz70qgyX9r+0ZSMfdFMq9rtqj0uoKuGK6WjAk zgXfGfSRFMVe0akRpDpAxIdhbQNuu9Zj+6JGZebvDLjmCWYod/egM1PmZdB+OSg65f9hsc G5B+bfmg15XoJJlF6AegFzkjde5IeLE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1775834411; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=2gjjT7kwcFZEz4QItctRshuovcHk55Lzw+klWg+p47Y=; b=3P1Ua00Beq/euvB+kXOQYjT46411Z8txLVuT6DyK7xi2hkfHtXn/pfpXbjRjHCFxeRXn7a xwVBs3E6a7d2sjEKXMjuXP/p/GC6DMAk0WYmmnxxnx6/xYRfJq7uOuG/n0COks/e+u8PHo f7gA4Knpw0TrMClyrAtD7N9nmixZANI= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.co.uk; i=@amazon.co.uk; q=dns/txt; s=amazoncorp2; t=1775834411; x=1807370411; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=2gjjT7kwcFZEz4QItctRshuovcHk55Lzw+klWg+p47Y=; b=WptD33NooHXuur2mNm72G4cv8CTsuJu0R3Ys5T+W4SPeEHd50/UeECPx bbWxI6VYRrPENtkdI9Rg/3JP2bouJHMVcOFTJU9RhALoRC7gAaJggOzUS bQE5oC6m7bapwGnz76Mzq44phd+i/8LglWMM8EWfyGKBhVwjwThV5QVxD VJgEBGjrJ1JeIRWESNpWpQonSVTVuH6kAo9qA7vIz50Yn+zPffHCFypm8 lcd9Xul7veEF8MJQ13sj/5mgb0AFnVTJ9Mw2w5oK1KTyRKtC6SIL2omMR 2Iah6wUNS9VmSHIsS7OLyKcMUZKfMF6+/ghLv2ZO/HF1gkKBS3au1FGTn Q==; X-CSE-ConnectionGUID: rO/LHhguRy+RqbejfSxoXg== X-CSE-MsgGUID: ljev6W8UQDCWkBfwXksZ/Q== X-IronPort-AV: E=Sophos;i="6.23,171,1770595200"; d="scan'208";a="15419578" Received: from ip-10-4-22-235.ec2.internal (HELO smtpout.naws.us-east-1.prod.farcaster.email.amazon.dev) ([10.4.22.235]) by internal-iad-out-015.esa.us-east-1.outbound.mail-perimeter.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2026 15:20:10 +0000 Received: from EX19MTAUEB002.ant.amazon.com [72.21.198.67:22401] by smtpin.naws.us-east-1.prod.farcaster.email.amazon.dev [10.0.62.178:2525] with esmtp (Farcaster) id e1ddbff2-3c3c-43b3-9127-f5e901907174; Fri, 10 Apr 2026 15:20:09 +0000 (UTC) X-Farcaster-Flow-ID: e1ddbff2-3c3c-43b3-9127-f5e901907174 Received: from EX19D027UEC004.ant.amazon.com (10.252.137.178) by EX19MTAUEB002.ant.amazon.com (10.252.135.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.37; Fri, 10 Apr 2026 15:20:08 +0000 Received: from EX19D027UEC003.ant.amazon.com (10.252.137.250) by EX19D027UEC004.ant.amazon.com (10.252.137.178) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.37; Fri, 10 Apr 2026 15:20:08 +0000 Received: from EX19D027UEC003.ant.amazon.com ([fe80::887f:519b:ba73:21d]) by EX19D027UEC003.ant.amazon.com ([fe80::887f:519b:ba73:21d%3]) with mapi id 15.02.2562.037; Fri, 10 Apr 2026 15:20:08 +0000 From: "Kalyazin, Nikita" To: "kvm@vger.kernel.org" , "linux-doc@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "kvmarm@lists.linux.dev" , "linux-fsdevel@vger.kernel.org" , "linux-mm@kvack.org" , "bpf@vger.kernel.org" , "linux-kselftest@vger.kernel.org" , "kernel@xen0n.name" , "linux-riscv@lists.infradead.org" , "linux-s390@vger.kernel.org" , "loongarch@lists.linux.dev" , "linux-pm@vger.kernel.org" CC: "pbonzini@redhat.com" , "corbet@lwn.net" , "maz@kernel.org" , "oupton@kernel.org" , "joey.gouly@arm.com" , "suzuki.poulose@arm.com" , "yuzenghui@huawei.com" , "catalin.marinas@arm.com" , "will@kernel.org" , "seanjc@google.com" , "tglx@kernel.org" , "mingo@redhat.com" , "bp@alien8.de" , "dave.hansen@linux.intel.com" , "x86@kernel.org" , "hpa@zytor.com" , "luto@kernel.org" , "peterz@infradead.org" , "willy@infradead.org" , "akpm@linux-foundation.org" , "david@kernel.org" , "lorenzo.stoakes@oracle.com" , "vbabka@kernel.org" , "rppt@kernel.org" , "surenb@google.com" , "mhocko@suse.com" , "ast@kernel.org" , "daniel@iogearbox.net" , "andrii@kernel.org" , "martin.lau@linux.dev" , "eddyz87@gmail.com" , "song@kernel.org" , "yonghong.song@linux.dev" , "john.fastabend@gmail.com" , "kpsingh@kernel.org" , "sdf@fomichev.me" , "haoluo@google.com" , "jolsa@kernel.org" , "jgg@ziepe.ca" , "jhubbard@nvidia.com" , "peterx@redhat.com" , "jannh@google.com" , "pfalcato@suse.de" , "skhan@linuxfoundation.org" , "riel@surriel.com" , "ryan.roberts@arm.com" , "jgross@suse.com" , "yu-cheng.yu@intel.com" , "kas@kernel.org" , "coxu@redhat.com" , "ackerleytng@google.com" , "yosry@kernel.org" , "ajones@ventanamicro.com" , "maobibo@loongson.cn" , "tabba@google.com" , "prsampat@amd.com" , "wu.fei9@sanechips.com.cn" , "mlevitsk@redhat.com" , "jmattson@google.com" , "jthoughton@google.com" , "agordeev@linux.ibm.com" , "alex@ghiti.fr" , "aou@eecs.berkeley.edu" , "borntraeger@linux.ibm.com" , "chenhuacai@kernel.org" , "baolu.lu@linux.intel.com" , "dev.jain@arm.com" , "gor@linux.ibm.com" , "hca@linux.ibm.com" , "palmer@dabbelt.com" , "pjw@kernel.org" , "shijie@os.amperecomputing.com" , "svens@linux.ibm.com" , "thuth@redhat.com" , "yang@os.amperecomputing.com" , "Liam.Howlett@oracle.com" , "urezki@gmail.com" , "zhengqi.arch@bytedance.com" , "gerald.schaefer@linux.ibm.com" , "jiayuan.chen@shopee.com" , "lenb@kernel.org" , "pavel@kernel.org" , "rafael@kernel.org" , "yangyicong@hisilicon.com" , "vannapurve@google.com" , "jackmanb@google.com" , "patrick.roy@linux.dev" , "Thomson, Jack" , "Itazuri, Takahiro" , "Manwaring, Derek" , "Kalyazin, Nikita" Subject: [PATCH v12 13/16] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types Thread-Topic: [PATCH v12 13/16] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types Thread-Index: AQHcyP2DymSWkWeSrkijlSKAICsNHA== Date: Fri, 10 Apr 2026 15:20:08 +0000 Message-ID: <20260410151746.61150-14-kalyazin@amazon.com> References: <20260410151746.61150-1-kalyazin@amazon.com> In-Reply-To: <20260410151746.61150-1-kalyazin@amazon.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.19.103.116] Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Rspamd-Server: rspam01 X-Rspamd-Queue-Id: 0E84414000B X-Stat-Signature: md56i46qekzwy7rgkhyigwsiqe6yaahc X-Rspam-User: X-HE-Tag: 1775834410-801481 X-HE-Meta: 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 f4RqMYQv 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 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Patrick Roy =0A= =0A= Allow selftests to configure their memslots such that userspace_addr is=0A= set to a MAP_SHARED mapping of the guest_memfd that's associated with=0A= the memslot. This setup is the configuration for non-CoCo VMs, where all=0A= guest memory is backed by a guest_memfd whose folios are all marked=0A= shared, but KVM is still able to access guest memory to provide=0A= functionality such as MMIO emulation on x86.=0A= =0A= Add backing types for normal guest_memfd, as well as direct map removed=0A= guest_memfd.=0A= =0A= Signed-off-by: Patrick Roy =0A= Signed-off-by: Nikita Kalyazin =0A= ---=0A= .../testing/selftests/kvm/include/kvm_util.h | 18 ++++++=0A= .../testing/selftests/kvm/include/test_util.h | 7 +++=0A= tools/testing/selftests/kvm/lib/kvm_util.c | 61 ++++++++++---------=0A= tools/testing/selftests/kvm/lib/test_util.c | 8 +++=0A= 4 files changed, 65 insertions(+), 29 deletions(-)=0A= =0A= diff --git a/tools/testing/selftests/kvm/include/kvm_util.h b/tools/testing= /selftests/kvm/include/kvm_util.h=0A= index 8b39cb919f4f..056a003a63c0 100644=0A= --- a/tools/testing/selftests/kvm/include/kvm_util.h=0A= +++ b/tools/testing/selftests/kvm/include/kvm_util.h=0A= @@ -664,6 +664,24 @@ static inline bool is_smt_on(void)=0A= =0A= void vm_create_irqchip(struct kvm_vm *vm);=0A= =0A= +static inline uint32_t backing_src_guest_memfd_flags(enum vm_mem_backing_s= rc_type t)=0A= +{=0A= + uint32_t flags =3D 0;=0A= +=0A= + switch (t) {=0A= + case VM_MEM_SRC_GUEST_MEMFD_NO_DIRECT_MAP:=0A= + flags |=3D GUEST_MEMFD_FLAG_NO_DIRECT_MAP;=0A= + fallthrough;=0A= + case VM_MEM_SRC_GUEST_MEMFD:=0A= + flags |=3D GUEST_MEMFD_FLAG_MMAP | GUEST_MEMFD_FLAG_INIT_SHARED;=0A= + break;=0A= + default:=0A= + break;=0A= + }=0A= +=0A= + return flags;=0A= +}=0A= +=0A= static inline int __vm_create_guest_memfd(struct kvm_vm *vm, uint64_t size= ,=0A= uint64_t flags)=0A= {=0A= diff --git a/tools/testing/selftests/kvm/include/test_util.h b/tools/testin= g/selftests/kvm/include/test_util.h=0A= index 8140e59b59e5..ea6de20ce8ef 100644=0A= --- a/tools/testing/selftests/kvm/include/test_util.h=0A= +++ b/tools/testing/selftests/kvm/include/test_util.h=0A= @@ -152,6 +152,8 @@ enum vm_mem_backing_src_type {=0A= VM_MEM_SRC_ANONYMOUS_HUGETLB_16GB,=0A= VM_MEM_SRC_SHMEM,=0A= VM_MEM_SRC_SHARED_HUGETLB,=0A= + VM_MEM_SRC_GUEST_MEMFD,=0A= + VM_MEM_SRC_GUEST_MEMFD_NO_DIRECT_MAP,=0A= NUM_SRC_TYPES,=0A= };=0A= =0A= @@ -184,6 +186,11 @@ static inline bool backing_src_is_shared(enum vm_mem_b= acking_src_type t)=0A= return vm_mem_backing_src_alias(t)->flag & MAP_SHARED;=0A= }=0A= =0A= +static inline bool backing_src_is_guest_memfd(enum vm_mem_backing_src_type= t)=0A= +{=0A= + return t =3D=3D VM_MEM_SRC_GUEST_MEMFD || t =3D=3D VM_MEM_SRC_GUEST_MEMFD= _NO_DIRECT_MAP;=0A= +}=0A= +=0A= static inline bool backing_src_can_be_huge(enum vm_mem_backing_src_type t)= =0A= {=0A= return t !=3D VM_MEM_SRC_ANONYMOUS && t !=3D VM_MEM_SRC_SHMEM;=0A= diff --git a/tools/testing/selftests/kvm/lib/kvm_util.c b/tools/testing/sel= ftests/kvm/lib/kvm_util.c=0A= index 5b0865683047..fa4a2fc236fe 100644=0A= --- a/tools/testing/selftests/kvm/lib/kvm_util.c=0A= +++ b/tools/testing/selftests/kvm/lib/kvm_util.c=0A= @@ -1046,6 +1046,33 @@ void vm_mem_add(struct kvm_vm *vm, enum vm_mem_backi= ng_src_type src_type,=0A= alignment =3D 1;=0A= #endif=0A= =0A= + if (guest_memfd < 0) {=0A= + if ((flags & KVM_MEM_GUEST_MEMFD) || backing_src_is_guest_memfd(src_type= )) {=0A= + uint32_t guest_memfd_flags =3D backing_src_guest_memfd_flags(src_type);= =0A= +=0A= + TEST_ASSERT(!guest_memfd_offset,=0A= + "Offset must be zero when creating new guest_memfd");=0A= + guest_memfd =3D vm_create_guest_memfd(vm, mem_size, guest_memfd_flags);= =0A= + }=0A= + } else {=0A= + /*=0A= + * Install a unique fd for each memslot so that the fd=0A= + * can be closed when the region is deleted without=0A= + * needing to track if the fd is owned by the framework=0A= + * or by the caller.=0A= + */=0A= + guest_memfd =3D kvm_dup(guest_memfd);=0A= + }=0A= +=0A= + if (guest_memfd >=3D 0) {=0A= + flags |=3D KVM_MEM_GUEST_MEMFD;=0A= +=0A= + region->region.guest_memfd =3D guest_memfd;=0A= + region->region.guest_memfd_offset =3D guest_memfd_offset;=0A= + } else {=0A= + region->region.guest_memfd =3D -1;=0A= + }=0A= +=0A= /*=0A= * When using THP mmap is not guaranteed to returned a hugepage aligned= =0A= * address so we have to pad the mmap. Padding is not needed for HugeTLB= =0A= @@ -1061,10 +1088,13 @@ void vm_mem_add(struct kvm_vm *vm, enum vm_mem_back= ing_src_type src_type,=0A= if (alignment > 1)=0A= region->mmap_size +=3D alignment;=0A= =0A= - region->fd =3D -1;=0A= - if (backing_src_is_shared(src_type))=0A= + if (backing_src_is_guest_memfd(src_type))=0A= + region->fd =3D guest_memfd;=0A= + else if (backing_src_is_shared(src_type))=0A= region->fd =3D kvm_memfd_alloc(region->mmap_size,=0A= src_type =3D=3D VM_MEM_SRC_SHARED_HUGETLB);=0A= + else=0A= + region->fd =3D -1;=0A= =0A= region->mmap_start =3D kvm_mmap(region->mmap_size, PROT_READ | PROT_WRITE= ,=0A= vm_mem_backing_src_alias(src_type)->flag,=0A= @@ -1089,33 +1119,6 @@ void vm_mem_add(struct kvm_vm *vm, enum vm_mem_backi= ng_src_type src_type,=0A= }=0A= =0A= region->backing_src_type =3D src_type;=0A= -=0A= - if (guest_memfd < 0) {=0A= - if (flags & KVM_MEM_GUEST_MEMFD) {=0A= - uint32_t guest_memfd_flags =3D 0;=0A= - TEST_ASSERT(!guest_memfd_offset,=0A= - "Offset must be zero when creating new guest_memfd");=0A= - guest_memfd =3D vm_create_guest_memfd(vm, mem_size, guest_memfd_flags);= =0A= - }=0A= - } else {=0A= - /*=0A= - * Install a unique fd for each memslot so that the fd=0A= - * can be closed when the region is deleted without=0A= - * needing to track if the fd is owned by the framework=0A= - * or by the caller.=0A= - */=0A= - guest_memfd =3D kvm_dup(guest_memfd);=0A= - }=0A= -=0A= - if (guest_memfd >=3D 0) {=0A= - flags |=3D KVM_MEM_GUEST_MEMFD;=0A= -=0A= - region->region.guest_memfd =3D guest_memfd;=0A= - region->region.guest_memfd_offset =3D guest_memfd_offset;=0A= - } else {=0A= - region->region.guest_memfd =3D -1;=0A= - }=0A= -=0A= region->unused_phy_pages =3D sparsebit_alloc();=0A= if (vm_arch_has_protected_memory(vm))=0A= region->protected_phy_pages =3D sparsebit_alloc();=0A= diff --git a/tools/testing/selftests/kvm/lib/test_util.c b/tools/testing/se= lftests/kvm/lib/test_util.c=0A= index 8a1848586a85..ce9fe0271515 100644=0A= --- a/tools/testing/selftests/kvm/lib/test_util.c=0A= +++ b/tools/testing/selftests/kvm/lib/test_util.c=0A= @@ -306,6 +306,14 @@ const struct vm_mem_backing_src_alias *vm_mem_backing_= src_alias(uint32_t i)=0A= */=0A= .flag =3D MAP_SHARED,=0A= },=0A= + [VM_MEM_SRC_GUEST_MEMFD] =3D {=0A= + .name =3D "guest_memfd",=0A= + .flag =3D MAP_SHARED,=0A= + },=0A= + [VM_MEM_SRC_GUEST_MEMFD_NO_DIRECT_MAP] =3D {=0A= + .name =3D "guest_memfd_no_direct_map",=0A= + .flag =3D MAP_SHARED,=0A= + }=0A= };=0A= _Static_assert(ARRAY_SIZE(aliases) =3D=3D NUM_SRC_TYPES,=0A= "Missing new backing src types?");=0A= -- =0A= 2.50.1=0A= =0A=