@@ -61,7 +61,7 @@ static void e820_setup(struct kvm *kvm)
size = guest_flat_to_host(kvm, E820_MAP_SIZE);
mem_map = guest_flat_to_host(kvm, E820_MAP_START);
- *size = E820_MEM_AREAS;
+
mem_map[i++] = (struct e820_entry) {
.addr = REAL_MODE_IVT_BEGIN,
@@ -78,13 +78,28 @@ static void e820_setup(struct kvm *kvm)
.size = MB_BIOS_END - MB_BIOS_BEGIN,
.type = E820_MEM_RESERVED,
};
- mem_map[i++] = (struct e820_entry) {
- .addr = BZ_KERNEL_START,
- .size = kvm->ram_size - BZ_KERNEL_START,
- .type = E820_MEM_USABLE,
- };
+ if (kvm->ram_size < 0xe0000000) {
+ mem_map[i++] = (struct e820_entry) {
+ .addr = BZ_KERNEL_START,
+ .size = kvm->ram_size - BZ_KERNEL_START,
+ .type = E820_MEM_USABLE,
+ };
+ } else {
+ mem_map[i++] = (struct e820_entry) {
+ .addr = BZ_KERNEL_START,
+ .size = 0xe0000000 - BZ_KERNEL_START,
+ .type = E820_MEM_USABLE,
+ };
+ mem_map[i++] = (struct e820_entry) {
+ .addr = 0x100000000ULL,
+ .size = kvm->ram_size - 0xe0000000 - BZ_KERNEL_START,
+ .type = E820_MEM_USABLE,
+ };
+ }
BUILD_BUG_ON(i > E820_MEM_AREAS);
+
+ *size = i;
}
/**
@@ -8,7 +8,7 @@
#define E820_MEM_USABLE 1
#define E820_MEM_RESERVED 2
-#define E820_MEM_AREAS 4
+#define E820_MEM_AREAS 5
struct e820_entry {
u64 addr; /* start of memory segment */
@@ -60,7 +60,14 @@ static inline u32 segment_to_flat(u16 selector, u16 offset)
static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
{
- return self->ram_start + offset;
+ /*
+ * We have a gap between 0xe0000000 and 0x100000000.
+ * Consider it when translating an address above 0x100000000.
+ */
+ if (offset < 0xe0000000)
+ return self->ram_start + offset;
+ else
+ return self->ram_start + 0xe0000000 + (offset - 0x100000000);
}
static inline void *guest_real_to_host(struct kvm *self, u16 selector, u16 offset)
@@ -153,23 +153,33 @@ static bool kvm__cpu_supports_vm(void)
return regs.ecx & (1 << feature);
}
-void kvm__init_ram(struct kvm *self)
+static void kvm_register_mem_slot(struct kvm *kvm, u32 slot, u64 guest_phys, u64 size, u64 userspace_addr)
{
struct kvm_userspace_memory_region mem;
int ret;
mem = (struct kvm_userspace_memory_region) {
- .slot = 0,
- .guest_phys_addr = 0x0UL,
- .memory_size = self->ram_size,
- .userspace_addr = (unsigned long) self->ram_start,
+ .slot = slot,
+ .guest_phys_addr = guest_phys,
+ .memory_size = size,
+ .userspace_addr = userspace_addr,
};
- ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
+ ret = ioctl(kvm->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
if (ret < 0)
die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
}
+void kvm__init_ram(struct kvm *self)
+{
+ if (self->ram_size < 0xe0000000) {
+ kvm_register_mem_slot(self, 0, 0, self->ram_size, (u64)self->ram_start);
+ } else {
+ kvm_register_mem_slot(self, 0, 0, 0xe0000000, (u64)self->ram_start);
+ kvm_register_mem_slot(self, 1, 0x100000000ULL, self->ram_size - 0xe0000000, (u64)self->ram_start + 0xe0000000);
+ }
+}
+
int kvm__max_cpus(struct kvm *self)
{
int ret;
Add a memory gap between 0xe0000000 and 0x100000000 when using more than 0xe0000000 bytes for guest RAM. This space is used by several things, PCI configuration space for example. This patch updates the e820 table, slot allocations used for KVM_SET_USER_MEMORY_REGION, and the address translation. Signed-off-by: Sasha Levin <levinsasha928@gmail.com> --- tools/kvm/bios.c | 27 +++++++++++++++++++++------ tools/kvm/include/kvm/e820.h | 2 +- tools/kvm/include/kvm/kvm.h | 9 ++++++++- tools/kvm/kvm.c | 22 ++++++++++++++++------ 4 files changed, 46 insertions(+), 14 deletions(-)