Commit f4693c2716b35d08 ("arm64: mm: extend linear region for 52-bit VA configurations") introduced a new layout for the 52-bit VA space, in order to maximize the space available to the linear region. After this change, the kernel VA space is no longer split 1:1 down the middle, and as it turns out, this violates an assumption in the KVM init code when it chooses the layout for the nVHE EL2 mapping. Given that EFI does not support 52-bit VA addressing (as it only supports 4k pages), and that in general, loaders cannot assume that the kernel being loaded supports 52-bit VA/PA addressing in the first place, we can safely assume that the kernel, and therefore the .idmap section, will be 48-bit addressable on 52-bit VA capable systems. So in this case, organize the nVHE EL2 address space as a 2^48 byte window starting at address 0x0, containing the ID map and the hypervisor's private mappings, followed by a contiguous 2^52 - 2^48 byte linear region. (Note that EL1's linear region is 2^52 - 2^47 bytes in size, so it is slightly larger, but this only matters on systems where the DRAM footprint in the physical memory map exceeds 3968 TB) Fixes: f4693c2716b35d08 ("arm64: mm: extend linear region for 52-bit VA configurations") Signed-off-by: Ard Biesheuvel <ardb@xxxxxxxxxx> --- Documentation/arm64/booting.rst | 6 +++--- arch/arm64/kvm/va_layout.c | 18 ++++++++++++++---- 2 files changed, 17 insertions(+), 7 deletions(-) diff --git a/Documentation/arm64/booting.rst b/Documentation/arm64/booting.rst index 7552dbc1cc54..418ec9b63d2c 100644 --- a/Documentation/arm64/booting.rst +++ b/Documentation/arm64/booting.rst @@ -121,8 +121,8 @@ Header notes: to the base of DRAM, since memory below it is not accessible via the linear mapping 1 - 2MB aligned base may be anywhere in physical - memory + 2MB aligned base may be anywhere in the 48-bit + addressable physical memory region Bits 4-63 Reserved. ============= =============================================================== @@ -132,7 +132,7 @@ Header notes: depending on selected features, and is effectively unbound. The Image must be placed text_offset bytes from a 2MB aligned base -address anywhere in usable system RAM and called there. The region +address in 48-bit addressable system RAM and called there. The region between the 2 MB aligned base address and the start of the image has no special significance to the kernel, and may be used for other purposes. At least image_size bytes from the start of the image must be free for diff --git a/arch/arm64/kvm/va_layout.c b/arch/arm64/kvm/va_layout.c index 978301392d67..e9ab449de197 100644 --- a/arch/arm64/kvm/va_layout.c +++ b/arch/arm64/kvm/va_layout.c @@ -62,9 +62,19 @@ __init void kvm_compute_layout(void) phys_addr_t idmap_addr = __pa_symbol(__hyp_idmap_text_start); u64 hyp_va_msb; - /* Where is my RAM region? */ - hyp_va_msb = idmap_addr & BIT(vabits_actual - 1); - hyp_va_msb ^= BIT(vabits_actual - 1); + /* + * On LVA capable hardware, the kernel is guaranteed to reside + * in the 48-bit addressable part of physical memory, and so + * the idmap will be located there as well. Put the EL2 linear + * region right after it, where it can grow upward to fill the + * entire 52-bit VA region. + */ + if (vabits_actual > VA_BITS_MIN) { + hyp_va_msb = BIT(VA_BITS_MIN); + } else { + hyp_va_msb = idmap_addr & BIT(vabits_actual - 1); + hyp_va_msb ^= BIT(vabits_actual - 1); + } tag_lsb = fls64((u64)phys_to_virt(memblock_start_of_DRAM()) ^ (u64)(high_memory - 1)); @@ -72,7 +82,7 @@ __init void kvm_compute_layout(void) va_mask = GENMASK_ULL(tag_lsb - 1, 0); tag_val = hyp_va_msb; - if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && tag_lsb != (vabits_actual - 1)) { + if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && tag_lsb < (vabits_actual - 1)) { /* We have some free bits to insert a random tag. */ tag_val |= get_random_long() & GENMASK_ULL(vabits_actual - 2, tag_lsb); } -- 2.31.0.291.g576ba9dcdaf-goog _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm