Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp5517144rwb; Tue, 17 Jan 2023 15:06:01 -0800 (PST) X-Google-Smtp-Source: AMrXdXvhBdyz9Js5AllM7873kGbgFHAQW4hltOOA/XrmvRxskGUOa2M5wzKD+idt3U2nFXWidy/O X-Received: by 2002:a17:902:db08:b0:194:93cb:9304 with SMTP id m8-20020a170902db0800b0019493cb9304mr6854077plx.29.1673996761673; Tue, 17 Jan 2023 15:06:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673996761; cv=none; d=google.com; s=arc-20160816; b=TWCfWJ6GXBd5yqDNb3+hBEZXhKEFpnNTLNQ8WCcQCs/lPijuzRjxLVKmZ42OmyndRe wmkcZ8+ak7wEOPy2a8uzB51c7e8WC4SYkxOcZfSAkUXsLEDPQeSZLJOtiUa6H8da/Zyu CtUiREQMjvuCHlb9gfY2atRuBx02MAvzZj3841UZQyKpC5lTRO6SmUGEBvgy6jEnYbp4 1t3i6mf+lBIFsgHc1CBHXE0yBFIqnnAZAVGSJGecjfkNOj+UwqeOiVAtR/S94xM4JfAS KGIJLuAVpD4NQlBS32eYt83Nnw5QcHCKbPPm5+kzCyiTg6DYxthCLm5E9h7t9e64KaqT 6BLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=VJRxdhIH1ei+8E9XvKSd+3xhLQMFnFsZgxlpSYok93A=; b=SFVkivTDXFwD5+qjUjwyxQbRjSisQ72oXipkv62A2BIhABFeQaosUCT3tKnwiGj8pR y5TIEnIdNrddy6GSVueFzev/uXIXHOY6/BtaewYFcBaZ9qm0134MF5C0nAZhZdJm4rwA yxO23+ou0BTqWVl2avD3ymmBqzrkzYuWcCLBp6IuSU8Mydj1edb+kOmgvp3EbHx62ypy 8afFtMPpxVW3bLKet61OwTLoQ7lugOqHPzZRrcaY9C+9aC/AF5WzVvfKJvttyNRkSUtO Edoo1fu+kxQ4vAbe+ogjc2xDpfjOkWJMB6c7HiZF5Zj8aX8kdSO28C6xilVGm2lSXbIv 9u9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=AxTejcJh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id iz17-20020a170902ef9100b001946a3f4da4si14233178plb.619.2023.01.17.15.05.55; Tue, 17 Jan 2023 15:06:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=AxTejcJh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229852AbjAQW33 (ORCPT + 46 others); Tue, 17 Jan 2023 17:29:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34266 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229739AbjAQW3K (ORCPT ); Tue, 17 Jan 2023 17:29:10 -0500 Received: from mail-pj1-x1033.google.com (mail-pj1-x1033.google.com [IPv6:2607:f8b0:4864:20::1033]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0BEA7C3801 for ; Tue, 17 Jan 2023 14:07:00 -0800 (PST) Received: by mail-pj1-x1033.google.com with SMTP id a14-20020a17090a70ce00b00229a2f73c56so299887pjm.3 for ; Tue, 17 Jan 2023 14:07:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=VJRxdhIH1ei+8E9XvKSd+3xhLQMFnFsZgxlpSYok93A=; b=AxTejcJhAV5uqM6nwNX4/8W/dC62kMHt47pu6LkWJkYBQ+CazfpjLysRcdPEeD7J7R Ab82K6BZiG9T8tN4ylw6fC6k7Zf7mYuHC6tgFlQxOA90kcFRuTfTJy/3sqkyKnj7xlZV msfEbi10sjs1UrnObHLZ2oICh8nWyZ5vxf3q0N4kngC9RJU7Ez6BeiDuoXWdoYmgTB8z 0oGvaHE5JwIw+W8WZssQh5JCuvTlsabDt7q1QFp/2Y8oIYK8QCh3cS9C+AOPDj9GSa6n N3gOrunFRToMDvoJl73VjJKmEx3zcRkIDP+n8mJ+18bJxyHLkOxU2OXA9SaK4zscuktw /JuA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=VJRxdhIH1ei+8E9XvKSd+3xhLQMFnFsZgxlpSYok93A=; b=uGzb5SoHS1NC9fxIbiq5i3Xbr7F60I6tiN8w/KlX8hVaFWPPJ5oxYN37xHGhfsul+e XOmEufigTkA3l+HYrw4RYCDULC4MTuOBOsQgUnXSqPBbGs8tllMN2K/kMvbjma4cWD6A a9lwk/EHFrdpfzTGcIHN44RjtG7V0lT76seXm/Pb326H4rDYDI7wSHO3NPbTxgDQ6P+b E0yDIBgdTJJq5LyjkREk+5nSmG9eRS3aCgXdwt1FvEyI/cXj2UDOW7pqnApTZx/avD7V PLrRrSdrcd7HSMoHcM+Gh81qLCpkUXsmsP3WdZCDLwPPrm704fo7ZtGmy8qSufJ3I+LP 5lTg== X-Gm-Message-State: AFqh2kqp2+oQxMmjT7feb4DFAYXhgBotRQjXccuTqhD3mysUfIPSjHuI 6Uoq78sgu7Nvca4NKxhoQ3PQPw== X-Received: by 2002:a17:902:b10e:b0:191:4367:7fde with SMTP id q14-20020a170902b10e00b0019143677fdemr2358411plr.0.1673993218276; Tue, 17 Jan 2023 14:06:58 -0800 (PST) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id u6-20020a170902e80600b0019251e959b1sm21609801plg.262.2023.01.17.14.06.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Jan 2023 14:06:57 -0800 (PST) Date: Tue, 17 Jan 2023 22:06:54 +0000 From: Sean Christopherson To: Vishal Annapurve Cc: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, pbonzini@redhat.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, joro@8bytes.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, shuah@kernel.org, yang.zhong@intel.com, ricarkol@google.com, aaronlewis@google.com, wei.w.wang@intel.com, kirill.shutemov@linux.intel.com, corbet@lwn.net, hughd@google.com, jlayton@kernel.org, bfields@fieldses.org, akpm@linux-foundation.org, chao.p.peng@linux.intel.com, yu.c.zhang@linux.intel.com, jun.nakajima@intel.com, dave.hansen@intel.com, michael.roth@amd.com, qperret@google.com, steven.price@arm.com, ak@linux.intel.com, david@redhat.com, luto@kernel.org, vbabka@suse.cz, marcorr@google.com, erdemaktas@google.com, pgonda@google.com, nikunj@amd.com, diviness@google.com, maz@kernel.org, dmatlack@google.com, axelrasmussen@google.com, maciej.szmigiero@oracle.com, mizhang@google.com, bgardon@google.com, ackerleytng@google.com Subject: Re: [V2 PATCH 4/6] KVM: selftests: x86: Add helpers to execute VMs with private memory Message-ID: References: <20221205232341.4131240-1-vannapurve@google.com> <20221205232341.4131240-5-vannapurve@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221205232341.4131240-5-vannapurve@google.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 05, 2022, Vishal Annapurve wrote: > Introduce a set of APIs to execute VM with private memslots. > > Host userspace APIs for: > 1) Executing a vcpu run loop that handles MAPGPA hypercall > 2) Backing/unbacking guest private memory > > Guest APIs for: > 1) Changing memory mapping type > > Signed-off-by: Vishal Annapurve > --- > tools/testing/selftests/kvm/Makefile | 1 + > .../kvm/include/x86_64/private_mem.h | 24 +++ > .../selftests/kvm/lib/x86_64/private_mem.c | 139 ++++++++++++++++++ > 3 files changed, 164 insertions(+) > create mode 100644 tools/testing/selftests/kvm/include/x86_64/private_mem.h > create mode 100644 tools/testing/selftests/kvm/lib/x86_64/private_mem.c Given that we _know_ private memory isn't always going to x86 specific, I don't want to bury any helpers in x86_64 that aren't strictly x86 only. E.g. helpers for doing Intel+AMD hypercalls is ok, but "generic" private memory helpers belong elsewhere. I experimented with extracting memslots/mmu helpers out of kvm_util.c as prep work, e.g. to avoid bloating kvm_util.c, but I couldn't come up with an obviously "good" naming scheme and/or split. At this time, the common bits are fairly small, so I think the best approach for now is to simply put vm_mem_map_shared_or_private() in kvm_util.c. > +static inline uint64_t __kvm_hypercall_map_gpa_range(uint64_t gpa, uint64_t size, > + uint64_t flags) > +{ > + return kvm_hypercall(KVM_HC_MAP_GPA_RANGE, gpa, size >> PAGE_SHIFT, flags, 0); > +} This can go in tools/testing/selftests/kvm/include/x86_64/processor.h. > +static inline void kvm_hypercall_map_gpa_range(uint64_t gpa, uint64_t size, > + uint64_t flags) > +{ > + uint64_t ret; > + > + GUEST_ASSERT_2(IS_PAGE_ALIGNED(gpa) && IS_PAGE_ALIGNED(size), gpa, size); > + > + ret = __kvm_hypercall_map_gpa_range(gpa, size, flags); > + GUEST_ASSERT_1(!ret, ret); > +} > + > +void kvm_hypercall_map_shared(uint64_t gpa, uint64_t size) > +{ > + kvm_hypercall_map_gpa_range(gpa, size, KVM_MAP_GPA_RANGE_DECRYPTED); > +} > + > +void kvm_hypercall_map_private(uint64_t gpa, uint64_t size) > +{ > + kvm_hypercall_map_gpa_range(gpa, size, KVM_MAP_GPA_RANGE_ENCRYPTED); > +} > + > +static void vm_update_private_mem(struct kvm_vm *vm, uint64_t gpa, uint64_t size, > + bool unback_mem) s/unback_mem/map_shared. "unback memory" is going to be super confusing to someone who isn't familiar with UPM. map_private would be the obvious alternative, but I like not having to invert the param in the helper. > +{ > + int restricted_fd; > + uint64_t restricted_fd_offset, guest_phys_base, fd_offset; > + struct kvm_memory_attributes attr; > + struct kvm_userspace_memory_region_ext *region_ext; > + struct kvm_userspace_memory_region *region; > + int fallocate_mode = 0; > + int ret; > + > + region_ext = kvm_userspace_memory_region_ext_find(vm, gpa, gpa + size); I forget if I've already mentioned this somewhere, but I'd prefer to use the "private" userspace_mem_region_find() and delete the existing kvm_userspace_memory_region_find(). > + TEST_ASSERT(region_ext != NULL, "Region not found"); > + region = ®ion_ext->region; > + TEST_ASSERT(region->flags & KVM_MEM_PRIVATE, > + "Can not update private memfd for non-private memslot\n"); > + restricted_fd = region_ext->restricted_fd; > + restricted_fd_offset = region_ext->restricted_offset; > + guest_phys_base = region->guest_phys_addr; > + fd_offset = restricted_fd_offset + (gpa - guest_phys_base); > + > + if (unback_mem) > + fallocate_mode = (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE); > + > + printf("restricted_fd %d fallocate_mode 0x%x for offset 0x%lx size 0x%lx\n", > + restricted_fd, fallocate_mode, fd_offset, size); Don't put prints in common helpers, except _maybe_ for error paths. It's fine for development and/or debug, but for the final product it ends up being noise 99% of the time. If you really, really want printing checked in, then pr_debug() is an option, but I would generally discourage even that for selftests. E.g. strace can give you all the information printed here without needing to rebuild the binary, and without maintenance burden. > + ret = fallocate(restricted_fd, fallocate_mode, fd_offset, size); > + TEST_ASSERT(ret == 0, "fallocate failed\n"); Use whitespace to differntiate operations/blocks. > + attr.attributes = unback_mem ? 0 : KVM_MEMORY_ATTRIBUTE_PRIVATE; > + attr.address = gpa; > + attr.size = size; > + attr.flags = 0; Add a helper to do KVM_SET_MEMORY_ATTRIBUTES, e.g. to fill the appropriate struct. > + if (unback_mem) > + printf("undoing encryption for gpa 0x%lx size 0x%lx\n", gpa, size); > + else > + printf("doing encryption for gpa 0x%lx size 0x%lx\n", gpa, size); > + > + vm_ioctl(vm, KVM_SET_MEMORY_ATTRIBUTES, &attr); > +} void vm_mem_map_shared_or_private(struct kvm_vm *vm, uint64_t gpa, uint64_t size, bool map_shared) { struct userspace_mem_region *region; uint64_t end = gpa + size - 1; off_t fd_offset; int mode, ret; region = userspace_mem_region_find(vm, gpa, gpa); TEST_ASSERT(region && region->region.flags & KVM_MEM_PRIVATE, "Private memory region not found for GPA 0x%lx", gpa); TEST_ASSERT(region == userspace_mem_region_find(vm, end, end), "Private/Shared conversions must act on a single memslot"); fd_offset = region->region.restricted_offset + (gpa - region->region.guest_phys_addr); /* To map shared, punch a hole. To map private, allocate (no flags). */ mode = map_shared ? (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE) : 0; ret = fallocate(region->region.restricted_fd, mode, fd_offset, size); TEST_ASSERT(!ret, "fallocate() failed to map %lx[%lu] %s, fd = %d, mode = %x, offset = %lx\n", gpa, size, map_shared ? "shared" : "private", region->region.restricted_fd, mode, fd_offset); vm_set_memory_attributes(vm, gpa, size, map_shared ? 0 : KVM_MEMORY_ATTRIBUTE_PRIVATE); }