Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp4636430pxb; Tue, 5 Oct 2021 07:18:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw39C8n+LApHOd9ig71dVD8g8Q2xxKFZdm1ydhFF1qCCQpDz2VQiurU266DXbctUOK+WmtF X-Received: by 2002:a50:e183:: with SMTP id k3mr27574573edl.22.1633443482102; Tue, 05 Oct 2021 07:18:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633443482; cv=none; d=google.com; s=arc-20160816; b=BIoSX/7jX/b9o3w6CSgXFocfyZN8NWUe8RG4cOCZyFXFimU8dczvMaelhaCe6urwoH YzIK+9gBOLh4SzVPx7F5zg9+02+upW4KvJoIDXeY3wfGL2/rN7THBPnPa47OASLB50AR ma1eq0im2jtNVZvpG97O/GDKlHOJ65Cp/WV/3YDRGCPvBYyEaGEjEP65s4PJKjcLSLc6 Hb2ssLqvg39s0fwQwcy6C43GjnpmdlVX1Wsp13/Di/MutcB8ALTlr2gyf0MkiQq+ph6h WVJ96D0CIwS/d6qCg02RGy41lXz8tPbDzCDQFQQBTNvp2jfBUuobHDp4JwBuKT/HaDT3 MVXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=L0F0DtkdIIrbs8f7DAXmFKruhVt9GF1SIWpOBzoL0lA=; b=gj6+LSVZxhNjOuOkx0REpSWOxVDoT8IARPvTQJmCwmXqP80vazM9Cy2Xjn6lmqZb6S KxYwBaQobdFkr8oGMZaQHEliPlqMwDSDGddGPpLdM1SWmSuFvy+H1+gx6P41pjZXDF4U Sf3Tdqh7+QSHhlqghIDL4hX2os8qAVdQgGEt8TC6sAEYFO0iJYkwsK9NZCTPD/Yjbhdy LMuOlh7CkxYgRmrdk4YyeYQzD8NfxZyA9ix3qj4BbLHbe9Z/YiKbwHVUDYuwy12Ce92J bfyQBeUMZv3YPIQkRCt8qhC7pW2Fw05ldMbKzQrdEZc6jEErlCXwL00LZQh2lhov2GjH AsXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=enoXjhm8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l15si31559414ejo.264.2021.10.05.07.17.34; Tue, 05 Oct 2021 07:18:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=enoXjhm8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235951AbhJEORP (ORCPT + 99 others); Tue, 5 Oct 2021 10:17:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40894 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235454AbhJEOQ6 (ORCPT ); Tue, 5 Oct 2021 10:16:58 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EB3F0C0612A2 for ; Tue, 5 Oct 2021 07:14:12 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id a5-20020a258045000000b005b9cbabe735so10092095ybn.23 for ; Tue, 05 Oct 2021 07:14:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=L0F0DtkdIIrbs8f7DAXmFKruhVt9GF1SIWpOBzoL0lA=; b=enoXjhm8FV8eYVvHHIqW1l2YQ4FkRKbHUMo2M2/ikjHiI84dsyYHfDoI5+nOBJYzKZ WrGW50vemb6hntMAQfOirRtxZwA8w6Y7zPBINqK47RDHWLmJXbnEMSdURS3rgH2juLEf MI7YkVIGi4Z4EuSTb6IkUcwqEtkpawnx3bchGaUkZ3WiglFW3FDD6360mIBTvNuJrSSb 7Wq6n/towapHS7032Ucumk/8Qf2bBGulN+JvilxNT9zT5I2bcwhxDtFsJ6FKBB8UZoMT 6s7M3xVe0RbO8OCoATx5+MoY7XGCsSSWHyN9DXoysencDUsrUgGQB0yORoydZVu89C8w w21A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=L0F0DtkdIIrbs8f7DAXmFKruhVt9GF1SIWpOBzoL0lA=; b=J5oNaziPKCVZGcfeCLwsKT7oKarKK573Jfl/47m5wgPRaIJfr7QTbeE0kAR70GQ/dN ZcTQZurnVNfbnXm7yz0O13il4eyy5yVH285mf1SobnhH9fq3zGhuMnD5xeevGUfq+LYT vuMfcxAF4RdQspWFz0RclNiyYO3RzftZdL7DYzLCHRU4dIgCbbPevbUECVRLcJrCoxvE miOouZqtlh6bbevoO1RGzoLZCUOmwdLuc3B4+FXd+rBACy+wg188xglex5nWi4kMif/j acIUu3hQ7ngSY+ecK9dneP2JkKhTXeAI6m3yogJoOg1b8IGnKHca7G2sJUEXs/IJrIdn a+xw== X-Gm-Message-State: AOAM530srRbFooc5ZIXEMEFVTKM9ld4noWSzXzqh20ff3jrBKLi/pcKy 9V8s5m0x1g54LYkOksqQ/2DzznHkSGg= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:225f:7216:6111:7f1c]) (user=pgonda job=sendgmr) by 2002:a25:4788:: with SMTP id u130mr21060260yba.489.1633443252162; Tue, 05 Oct 2021 07:14:12 -0700 (PDT) Date: Tue, 5 Oct 2021 07:13:56 -0700 In-Reply-To: <20211005141357.2393627-1-pgonda@google.com> Message-Id: <20211005141357.2393627-4-pgonda@google.com> Mime-Version: 1.0 References: <20211005141357.2393627-1-pgonda@google.com> X-Mailer: git-send-email 2.33.0.800.g4c38ced690-goog Subject: [PATCH 3/4 V9] selftest: KVM: Add open sev dev helper From: Peter Gonda To: kvm@vger.kernel.org Cc: Peter Gonda , Sean Christopherson , Marc Orr , Paolo Bonzini , David Rientjes , "Dr . David Alan Gilbert" , Brijesh Singh , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Refactors out open path support from open_kvm_dev_path_or_exit() and adds new helper for SEV device path. Signed-off-by: Peter Gonda Suggested-by: Sean Christopherson Reviewed-by: Marc Orr Cc: Marc Orr Cc: Paolo Bonzini Cc: Sean Christopherson Cc: David Rientjes Cc: Dr. David Alan Gilbert Cc: Brijesh Singh Cc: Vitaly Kuznetsov Cc: Wanpeng Li Cc: Jim Mattson Cc: Joerg Roedel Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- .../testing/selftests/kvm/include/kvm_util.h | 1 + .../selftests/kvm/include/x86_64/svm_util.h | 2 ++ tools/testing/selftests/kvm/lib/kvm_util.c | 24 +++++++++++-------- tools/testing/selftests/kvm/lib/x86_64/svm.c | 13 ++++++++++ 4 files changed, 30 insertions(+), 10 deletions(-) diff --git a/tools/testing/selftests/kvm/include/kvm_util.h b/tools/testing/selftests/kvm/include/kvm_util.h index 010b59b13917..368e88305046 100644 --- a/tools/testing/selftests/kvm/include/kvm_util.h +++ b/tools/testing/selftests/kvm/include/kvm_util.h @@ -80,6 +80,7 @@ struct vm_guest_mode_params { }; extern const struct vm_guest_mode_params vm_guest_mode_params[]; +int open_path_or_exit(const char *path, int flags); int open_kvm_dev_path_or_exit(void); int kvm_check_cap(long cap); int vm_enable_cap(struct kvm_vm *vm, struct kvm_enable_cap *cap); diff --git a/tools/testing/selftests/kvm/include/x86_64/svm_util.h b/tools/testing/selftests/kvm/include/x86_64/svm_util.h index b7531c83b8ae..587fbe408b99 100644 --- a/tools/testing/selftests/kvm/include/x86_64/svm_util.h +++ b/tools/testing/selftests/kvm/include/x86_64/svm_util.h @@ -46,4 +46,6 @@ static inline bool cpu_has_svm(void) return ecx & CPUID_SVM; } +int open_sev_dev_path_or_exit(void); + #endif /* SELFTEST_KVM_SVM_UTILS_H */ diff --git a/tools/testing/selftests/kvm/lib/kvm_util.c b/tools/testing/selftests/kvm/lib/kvm_util.c index 10a8ed691c66..06a6c04010fb 100644 --- a/tools/testing/selftests/kvm/lib/kvm_util.c +++ b/tools/testing/selftests/kvm/lib/kvm_util.c @@ -31,6 +31,19 @@ static void *align(void *x, size_t size) return (void *) (((size_t) x + mask) & ~mask); } +int open_path_or_exit(const char *path, int flags) +{ + int fd; + + fd = open(path, flags); + if (fd < 0) { + print_skip("%s not available (errno: %d)", path, errno); + exit(KSFT_SKIP); + } + + return fd; +} + /* * Open KVM_DEV_PATH if available, otherwise exit the entire program. * @@ -42,16 +55,7 @@ static void *align(void *x, size_t size) */ static int _open_kvm_dev_path_or_exit(int flags) { - int fd; - - fd = open(KVM_DEV_PATH, flags); - if (fd < 0) { - print_skip("%s not available, is KVM loaded? (errno: %d)", - KVM_DEV_PATH, errno); - exit(KSFT_SKIP); - } - - return fd; + return open_path_or_exit(KVM_DEV_PATH, flags); } int open_kvm_dev_path_or_exit(void) diff --git a/tools/testing/selftests/kvm/lib/x86_64/svm.c b/tools/testing/selftests/kvm/lib/x86_64/svm.c index 2ac98d70d02b..14a8618efa9c 100644 --- a/tools/testing/selftests/kvm/lib/x86_64/svm.c +++ b/tools/testing/selftests/kvm/lib/x86_64/svm.c @@ -13,6 +13,8 @@ #include "processor.h" #include "svm_util.h" +#define SEV_DEV_PATH "/dev/sev" + struct gpr64_regs guest_regs; u64 rflags; @@ -160,3 +162,14 @@ void nested_svm_check_supported(void) exit(KSFT_SKIP); } } + +/* + * Open SEV_DEV_PATH if available, otherwise exit the entire program. + * + * Return: + * The opened file descriptor of /dev/sev. + */ +int open_sev_dev_path_or_exit(void) +{ + return open_path_or_exit(SEV_DEV_PATH, 0); +} -- 2.33.0.309.g3052b89438-goog