From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id EBD4CF9D0F6 for ; Tue, 14 Apr 2026 22:05:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=zho0aGqyN3u40/xd9x3Tbv78Jkt9Jjq8+soII4hyYeM=; b=P5rZsTvhBmLSXtZm0fKFXgXse2 2NEnaf0xH7zEUQWl3Bkr7KqvZ+brjaKM8msDy+W5Bmh1htnpmDG7impdvv7K/L9nuZhhrF/vI34/r Z8E60rXgJFiii+83lgKNYQCVn3ekEoH2bns4KoTzaX32S8LYtfnDJ1dHSXAeXXCSO9j7aPRRF6TeD zoBV7LxF4w8eJZmR+CrF4DegarJQByuV4LQd1Lpfu8x7E+1KHUXMVXM+r97ms3rWwyrgDGSM0nVnS SC1/5WDCyRHV8ZDfVksBGDoYC5tASb04x/c1DMLvQsl6oaAbbRx6hmNKjfZwtsTe027ZlodVejcJw +hV6FXLQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1wClt0-00000000HCc-3YtJ; Tue, 14 Apr 2026 22:05:34 +0000 Received: from esa8.hc1455-7.c3s2.iphmx.com ([139.138.61.253]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1wClsx-00000000HC9-26h1 for linux-arm-kernel@lists.infradead.org; Tue, 14 Apr 2026 22:05:33 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=fujitsu.com; i=@fujitsu.com; q=dns/txt; s=fj2; t=1776204331; x=1807740331; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=HxWGAfBXvCwu/JrM4wgJOC5/Am3iL5DWNbwqy3PHKCE=; b=aTRSJNppOJWQlySePDYSJQdtf3zRtUdF0vBijAXl2yBACyvHM8EAkupc zWFUJ8IpQViPj/pntEhSC8Ch9YKi0mTkA7selgNveUSeSsYbv541Jysgo YRG72DP0ZgK9/z5hgWmJiYItpMy0c0fzs6f2HckpYe0giHYWUesI6ehkN vXwo1qooYJSm42usM6SbNj349v8UdrF53oJ5wnjHUSB0tz9JI1J7VEBpD 8GpMb2gf+5ibxl9LyBAQ4MJ0jCsRjCR8nS3wJqs/p0l6IWyWZZQNJU2UG I560y3a68tkb1Ge8YRK3tCLFWpufmiS9lDeSHE1KdGXCsE+fdeekaZCkF w==; X-CSE-ConnectionGUID: seuyjoSxTKqlQd59AcQ6+Q== X-CSE-MsgGUID: QALLdl42QHOg2Ug+Rf6OJg== X-IronPort-AV: E=McAfee;i="6800,10657,11759"; a="224875362" X-IronPort-AV: E=Sophos;i="6.23,179,1770562800"; d="scan'208";a="224875362" Received: from gmgwnl01.global.fujitsu.com (HELO mgmgwnl01.global.fujitsu.com) ([52.143.17.124]) by esa8.hc1455-7.c3s2.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Apr 2026 07:05:27 +0900 Received: from az2nlsmgm4.fujitsu.com (unknown [10.150.26.204]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mgmgwnl01.global.fujitsu.com (Postfix) with ESMTPS id 346905C2A for ; Tue, 14 Apr 2026 22:05:27 +0000 (UTC) Received: from az2uksmom4.o.css.fujitsu.com (az2uksmom4.o.css.fujitsu.com [10.151.22.204]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by az2nlsmgm4.fujitsu.com (Postfix) with ESMTPS id D14D11003BE9 for ; Tue, 14 Apr 2026 22:05:26 +0000 (UTC) Received: from sm-arm-grace07 (sm-x86-stp01.soft.fujitsu.com [10.124.178.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by az2uksmom4.o.css.fujitsu.com (Postfix) with ESMTPS id 407924045EE; Tue, 14 Apr 2026 22:05:21 +0000 (UTC) Date: Wed, 15 Apr 2026 07:05:17 +0900 From: Itaru Kitayama To: Wei-Lin Chang Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Zenghui Yu , Catalin Marinas , Will Deacon , Paolo Bonzini , Shuah Khan Subject: Re: [PATCH v2 3/4] KVM: arm64: sefltests: Add basic NV selftest Message-ID: References: <20260412142216.3806482-1-weilin.chang@arm.com> <20260412142216.3806482-4-weilin.chang@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260414_150532_117047_E65468DC X-CRM114-Status: GOOD ( 40.25 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Tue, Apr 14, 2026 at 11:16:47AM +0100, Wei-Lin Chang wrote: > On Tue, Apr 14, 2026 at 06:31:22AM +0900, Itaru Kitayama wrote: > > On Mon, Apr 13, 2026 at 10:18:42AM +0100, Wei-Lin Chang wrote: > > > Hi Itaru, > > > > > > On Mon, Apr 13, 2026 at 08:19:25AM +0900, Itaru Kitayama wrote: > > > > On Sun, Apr 12, 2026 at 03:22:15PM +0100, Wei-Lin Chang wrote: > > > > > This selftest simply starts an L1, which starts its own guest (L2). L2 > > > > > runs without stage-1 and 2 translations, it calls an HVC to jump back > > > > > to L1. > > > > > > > > How do you disable both the nested guest (L2)'s MMU and stage 2 > > > > translations? > > > > > > Guest stage-2 is disabled by not setting HCR_EL2.VM in prepare_hyp(), > > > and stage-1 is disabled by not writing to SCTLR_EL12 in init_vcpu(), > > > effectively using the default value set by L0. However since SCTLR_EL1 > > > has many architecturally UNKNOWN bits (including SCTLR_EL1.M), it should > > > be better to write a value before running L2 I suppose... > > > > Thanks. What do you think of using copy_el2_to_el1() macro in at.c, so we > > can prepare in guest_code() to manipulate the SCTLR_EL12 System register > > with the sensible programmed values? > > Yes, using copy_el2_to_el1() can give us an L2 stage-1 that is identical > to the L1's stage-1. But what I was considering was if guest stage-2 is > enabled (which we plan to implement), then those stage-1 page tables > will have to be mapped for L2, and its base address translated to L2IPA. > It's doable but seems like extra complexity when stage-1 is not so > interesting for KVM (except for AT?), it lets the guest do whatever it > likes and let the hardware do the translation. > > Let me know if you have reasons to want stage-1 for L2, there could be > something I should consider but did not. By keeping nested guest's MMU enabled, we can exercise the shadow stage 2 on the host. But I am fine with you starting nested guest's IPA and I hope Marc and Oliver approve this seris and merge upstream. Thanks, Itaru. > > Thanks, > Wei-Lin Chang > > > > > Itaru. > > > > > > > > Thanks, > > > Wei-Lin Chang > > > > > > > > > > > Itaru. > > > > > > > > > > > > > > Signed-off-by: Wei-Lin Chang > > > > > --- > > > > > tools/testing/selftests/kvm/Makefile.kvm | 1 + > > > > > .../selftests/kvm/arm64/hello_nested.c | 103 ++++++++++++++++++ > > > > > 2 files changed, 104 insertions(+) > > > > > create mode 100644 tools/testing/selftests/kvm/arm64/hello_nested.c > > > > > > > > > > diff --git a/tools/testing/selftests/kvm/Makefile.kvm b/tools/testing/selftests/kvm/Makefile.kvm > > > > > index 3dc3e39f7025..e8c108e0c487 100644 > > > > > --- a/tools/testing/selftests/kvm/Makefile.kvm > > > > > +++ b/tools/testing/selftests/kvm/Makefile.kvm > > > > > @@ -168,6 +168,7 @@ TEST_GEN_PROGS_arm64 += arm64/arch_timer_edge_cases > > > > > TEST_GEN_PROGS_arm64 += arm64/at > > > > > TEST_GEN_PROGS_arm64 += arm64/debug-exceptions > > > > > TEST_GEN_PROGS_arm64 += arm64/hello_el2 > > > > > +TEST_GEN_PROGS_arm64 += arm64/hello_nested > > > > > TEST_GEN_PROGS_arm64 += arm64/host_sve > > > > > TEST_GEN_PROGS_arm64 += arm64/hypercalls > > > > > TEST_GEN_PROGS_arm64 += arm64/external_aborts > > > > > diff --git a/tools/testing/selftests/kvm/arm64/hello_nested.c b/tools/testing/selftests/kvm/arm64/hello_nested.c > > > > > new file mode 100644 > > > > > index 000000000000..97387e4697b3 > > > > > --- /dev/null > > > > > +++ b/tools/testing/selftests/kvm/arm64/hello_nested.c > > > > > @@ -0,0 +1,103 @@ > > > > > +// SPDX-License-Identifier: GPL-2.0-only > > > > > +/* > > > > > + * hello_nested - Go from vEL2 to EL1 then back > > > > > + */ > > > > > + > > > > > +#include "nested.h" > > > > > +#include "processor.h" > > > > > +#include "test_util.h" > > > > > +#include "ucall.h" > > > > > + > > > > > +#define XLATE2GPA (0xABCD) > > > > > +#define L2STACKSZ (0x100) > > > > > + > > > > > +/* > > > > > + * TPIDR_EL2 is used to store vcpu id, so save and restore it. > > > > > + */ > > > > > +static vm_paddr_t ucall_translate_to_gpa(void *gva) > > > > > +{ > > > > > + vm_paddr_t gpa; > > > > > + u64 vcpu_id = read_sysreg(tpidr_el2); > > > > > + > > > > > + GUEST_SYNC2(XLATE2GPA, gva); > > > > > + > > > > > + /* get the result from userspace */ > > > > > + gpa = read_sysreg(tpidr_el2); > > > > > + > > > > > + write_sysreg(vcpu_id, tpidr_el2); > > > > > + > > > > > + return gpa; > > > > > +} > > > > > + > > > > > +static void l2_guest_code(void) > > > > > +{ > > > > > + do_hvc(); > > > > > +} > > > > > + > > > > > +static void guest_code(void) > > > > > +{ > > > > > + struct vcpu vcpu; > > > > > + struct hyp_data hyp_data; > > > > > + int ret; > > > > > + vm_paddr_t l2_pc, l2_stack_top; > > > > > + /* force 16-byte alignment for the stack pointer */ > > > > > + u8 l2_stack[L2STACKSZ] __attribute__((aligned(16))); > > > > > + > > > > > + GUEST_ASSERT_EQ(get_current_el(), 2); > > > > > + GUEST_PRINTF("vEL2 entry\n"); > > > > > + > > > > > + l2_pc = ucall_translate_to_gpa(l2_guest_code); > > > > > + l2_stack_top = ucall_translate_to_gpa(&l2_stack[L2STACKSZ]); > > > > > + > > > > > + init_vcpu(&vcpu, l2_pc, l2_stack_top); > > > > > + prepare_hyp(); > > > > > + > > > > > + ret = run_l2(&vcpu, &hyp_data); > > > > > + GUEST_ASSERT_EQ(ret, ARM_EXCEPTION_TRAP); > > > > > + GUEST_DONE(); > > > > > +} > > > > > + > > > > > +int main(void) > > > > > +{ > > > > > + struct kvm_vcpu_init init; > > > > > + struct kvm_vcpu *vcpu; > > > > > + struct kvm_vm *vm; > > > > > + struct ucall uc; > > > > > + vm_paddr_t gpa; > > > > > + > > > > > + TEST_REQUIRE(kvm_check_cap(KVM_CAP_ARM_EL2)); > > > > > + vm = vm_create(1); > > > > > + > > > > > + kvm_get_default_vcpu_target(vm, &init); > > > > > + init.features[0] |= BIT(KVM_ARM_VCPU_HAS_EL2); > > > > > + vcpu = aarch64_vcpu_add(vm, 0, &init, guest_code); > > > > > + kvm_arch_vm_finalize_vcpus(vm); > > > > > + > > > > > + while (true) { > > > > > + vcpu_run(vcpu); > > > > > + > > > > > + switch (get_ucall(vcpu, &uc)) { > > > > > + case UCALL_SYNC: > > > > > + if (uc.args[0] == XLATE2GPA) { > > > > > + gpa = addr_gva2gpa(vm, (vm_vaddr_t)uc.args[1]); > > > > > + vcpu_set_reg(vcpu, KVM_ARM64_SYS_REG(SYS_TPIDR_EL2), gpa); > > > > > + } > > > > > + break; > > > > > + case UCALL_PRINTF: > > > > > + pr_info("%s", uc.buffer); > > > > > + break; > > > > > + case UCALL_DONE: > > > > > + pr_info("DONE!\n"); > > > > > + goto end; > > > > > + case UCALL_ABORT: > > > > > + REPORT_GUEST_ASSERT(uc); > > > > > + fallthrough; > > > > > + default: > > > > > + TEST_FAIL("Unhandled ucall: %ld\n", uc.cmd); > > > > > + } > > > > > + } > > > > > + > > > > > +end: > > > > > + kvm_vm_free(vm); > > > > > + return 0; > > > > > +} > > > > > -- > > > > > 2.43.0 > > > > >