- vdpa-dev: Fix initialisation order to restore VDUSE compatibility - tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() - migration: fix-possible-int-overflow - target/m68k: Map FPU exceptions to FPSR register - qemu-options: Fix CXL Fixed Memory Window interleave-granularity typo - hvf: arm: Fix encodings for ID_AA64PFR1_EL1 and debug System registers - hw/intc/arm_gic: Fix handling of NS view of GICC_APR<n> - qio: Inherit follow_coroutine_ctx across TLS - target/riscv: Fix the element agnostic function problem - accel/tcg: Fix typo causing tb->page_addr[1] to not be recorded - tcg/loongarch64: Fix tcg_out_movi vs some pcrel pointers - migration: Fix file migration with fdset - ui/vnc: don't return an empty SASL mechlist to the client - target/arm: Fix FJCVTZS vs flush-to-zero - hw/ppc/e500: Prefer QOM cast - sphinx/qapidoc: Fix to generate doc for explicit, unboxed arguments - hw/ppc/e500: Remove unused "irqs" parameter - hw/ppc/e500: Add missing device tree properties to i2c controller node - hw/i386/amd_iommu: Don't leak memory in amdvi_update_iotlb() - hw/arm/mps2-tz.c: fix RX/TX interrupts order - target/i386: csv: Add support to migrate the incoming context for CSV3 guest - target/i386: csv: Add support to migrate the outgoing context for CSV3 guest - target/i386: csv: Add support to migrate the incoming page for CSV3 guest - target/i386: csv: Add support to migrate the outgoing page for CSV3 guest - linux-headers: update kernel headers to include CSV3 migration cmds - vfio: Only map shared region for CSV3 virtual machine - vga: Force full update for CSV3 guest - target/i386: csv: Load initial image to private memory for CSV3 guest - target/i386: csv: Do not register/unregister guest secure memory for CSV3 guest - target/i386: cpu: Populate CPUID 0x8000_001F when CSV3 is active - target/i386: csv: Add command to load vmcb to CSV3 guest memory - target/i386: csv: Add command to load data to CSV3 guest memory - target/i386: csv: Add command to initialize CSV3 context - target/i386: csv: Add CSV3 context - next-kbd: convert to use qemu_input_handler_register() - qemu/bswap: Undefine CPU_CONVERT() once done - exec/memop: Remove unused memop_big_endian() helper - hw/nvme: fix handling of over-committed queues - 9pfs: fix crash on 'Treaddir' request - hw/misc/psp: Pin the hugepage memory specified by mem2 during use for psp - hw/misc: support tkm use mem2 memory - hw/i386: add mem2 option for qemu - kvm: add support for guest physical bits - target/i386: add guest-phys-bits cpu property Signed-off-by: Jiabo Feng <fengjiabo1@huawei.com> (cherry picked from commit f45f35e88509a4ffa9f62332ee9601e9fe1f8d09)
112 lines
3.7 KiB
Diff
112 lines
3.7 KiB
Diff
From a2383a2a0537750794223f21156241b1b1e78d2e Mon Sep 17 00:00:00 2001
|
|
From: Gerd Hoffmann <kraxel@redhat.com>
|
|
Date: Mon, 18 Mar 2024 16:53:35 +0100
|
|
Subject: [PATCH] kvm: add support for guest physical bits
|
|
|
|
commit 0d08c423688edcca857f88dab20f1fc56de2b281 upstream.
|
|
|
|
Query kvm for supported guest physical address bits, in cpuid
|
|
function 80000008, eax[23:16]. Usually this is identical to host
|
|
physical address bits. With NPT or EPT being used this might be
|
|
restricted to 48 (max 4-level paging address space size) even if
|
|
the host cpu supports more physical address bits.
|
|
|
|
When set pass this to the guest, using cpuid too. Guest firmware
|
|
can use this to figure how big the usable guest physical address
|
|
space is, so PCI bar mapping are actually reachable.
|
|
|
|
Intel-SIG: commit 0d08c423688e kvm: add support for guest physical bits
|
|
|
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
|
|
Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
|
|
Message-ID: <20240318155336.156197-2-kraxel@redhat.com>
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
Signed-off-by: Jason Zeng <jason.zeng@intel.com>
|
|
---
|
|
target/i386/kvm/kvm-cpu.c | 50 ++++++++++++++++++++++++++++++++-------
|
|
1 file changed, 42 insertions(+), 8 deletions(-)
|
|
|
|
diff --git a/target/i386/kvm/kvm-cpu.c b/target/i386/kvm/kvm-cpu.c
|
|
index 9c791b7b05..f76972e47e 100644
|
|
--- a/target/i386/kvm/kvm-cpu.c
|
|
+++ b/target/i386/kvm/kvm-cpu.c
|
|
@@ -18,10 +18,32 @@
|
|
#include "kvm_i386.h"
|
|
#include "hw/core/accel-cpu.h"
|
|
|
|
+static void kvm_set_guest_phys_bits(CPUState *cs)
|
|
+{
|
|
+ X86CPU *cpu = X86_CPU(cs);
|
|
+ uint32_t eax, guest_phys_bits;
|
|
+
|
|
+ eax = kvm_arch_get_supported_cpuid(cs->kvm_state, 0x80000008, 0, R_EAX);
|
|
+ guest_phys_bits = (eax >> 16) & 0xff;
|
|
+ if (!guest_phys_bits) {
|
|
+ return;
|
|
+ }
|
|
+ cpu->guest_phys_bits = guest_phys_bits;
|
|
+ if (cpu->guest_phys_bits > cpu->phys_bits) {
|
|
+ cpu->guest_phys_bits = cpu->phys_bits;
|
|
+ }
|
|
+
|
|
+ if (cpu->host_phys_bits && cpu->host_phys_bits_limit &&
|
|
+ cpu->guest_phys_bits > cpu->host_phys_bits_limit) {
|
|
+ cpu->guest_phys_bits = cpu->host_phys_bits_limit;
|
|
+ }
|
|
+}
|
|
+
|
|
static bool kvm_cpu_realizefn(CPUState *cs, Error **errp)
|
|
{
|
|
X86CPU *cpu = X86_CPU(cs);
|
|
CPUX86State *env = &cpu->env;
|
|
+ bool ret;
|
|
|
|
/*
|
|
* The realize order is important, since x86_cpu_realize() checks if
|
|
@@ -32,13 +54,15 @@ static bool kvm_cpu_realizefn(CPUState *cs, Error **errp)
|
|
*
|
|
* realize order:
|
|
*
|
|
- * x86_cpu_realize():
|
|
- * -> x86_cpu_expand_features()
|
|
- * -> cpu_exec_realizefn():
|
|
- * -> accel_cpu_common_realize()
|
|
- * kvm_cpu_realizefn() -> host_cpu_realizefn()
|
|
- * -> cpu_common_realizefn()
|
|
- * -> check/update ucode_rev, phys_bits, mwait
|
|
+ * x86_cpu_realizefn():
|
|
+ * x86_cpu_expand_features()
|
|
+ * cpu_exec_realizefn():
|
|
+ * accel_cpu_common_realize()
|
|
+ * kvm_cpu_realizefn()
|
|
+ * host_cpu_realizefn()
|
|
+ * kvm_set_guest_phys_bits()
|
|
+ * check/update ucode_rev, phys_bits, guest_phys_bits, mwait
|
|
+ * cpu_common_realizefn() (via xcc->parent_realize)
|
|
*/
|
|
if (cpu->max_features) {
|
|
if (enable_cpu_pm && kvm_has_waitpkg()) {
|
|
@@ -50,7 +74,17 @@ static bool kvm_cpu_realizefn(CPUState *cs, Error **errp)
|
|
MSR_IA32_UCODE_REV);
|
|
}
|
|
}
|
|
- return host_cpu_realizefn(cs, errp);
|
|
+ ret = host_cpu_realizefn(cs, errp);
|
|
+ if (!ret) {
|
|
+ return ret;
|
|
+ }
|
|
+
|
|
+ if ((env->features[FEAT_8000_0001_EDX] & CPUID_EXT2_LM) &&
|
|
+ cpu->guest_phys_bits == -1) {
|
|
+ kvm_set_guest_phys_bits(cs);
|
|
+ }
|
|
+
|
|
+ return true;
|
|
}
|
|
|
|
static bool lmce_supported(void)
|
|
--
|
|
2.41.0.windows.1
|
|
|