Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1510119rwl; Fri, 24 Mar 2023 11:26:16 -0700 (PDT) X-Google-Smtp-Source: AKy350Yqtra2Aqdd8rXYeuojl4fhUuDKOluqY5O2fT3USwCo/ny16V1BSDxPORBswsch367e7Z00 X-Received: by 2002:a17:907:6e17:b0:92f:c6b5:de08 with SMTP id sd23-20020a1709076e1700b0092fc6b5de08mr4036173ejc.76.1679682376025; Fri, 24 Mar 2023 11:26:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679682376; cv=none; d=google.com; s=arc-20160816; b=RvWDXy7TC2xGLroDcFDmevIuTCaUy3sd3ttrMvpL8FfvsZN8EKFZa3mQvrUgR+fcks UmH2axXUcQHdvA2NMOMHJXc4GUEa1yWIOB7Z7uhHJulf2uv2vi2SbvoEw+SK44pz+OL+ eAhcN98uyv4NjL3+Km6UzoXuolnTDB1kx22/ZnXSC66/23LhqNr+oTaNXYjqpHlHgE3R f5+lkfP3UOB+dibLIVKeKv5uSxybdn/RgUEAVkAWjyrcYn7YQ83D/fN5P9PaC4CVwTFS htqs1xp+ENnvHFMTK1068SBU0PpiiyTUfO84hspM1JXbLjf9C+9xqN/4ZGH/yahA1Nco ogIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=5sa+gU+3qUwEmWNy48CwgWqEoKIn1PttS/Tvw1JyYDM=; b=erMdey43kBHsy+JRFf8/iw40Jm75NR9W9x39Wk8aMzY9E9VXXw94bLsjHsH3KLwVVY BPr84m1f0Aj+zWYIdBwbuSMBBlO3bPY7Wp9lXC1UViHAv0uPou6c3tfa3EdNIc50tvFh VmKbjJffZTdNoYosvIQxuwSoS8jNLElAeM8BN/Wk63hlhQgI5IlB4VeBleo5J0LvHrSl dCAUcg2E4KHP+AB/YUW5+ZQZhmNmwtH42ic8KCi6BTMr1qDwhhYCiGe9QbJ0u7TagHVm J55BlwzNDSK0uS8r+ywgBz+6pQ1caJhEJnasYWMni1MqOEcWyQAvgxGV46eLyy9xDafl oCkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=qfSebCD6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id vq8-20020a170907a4c800b00933489ce7a6si16453740ejc.444.2023.03.24.11.25.51; Fri, 24 Mar 2023 11:26:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=qfSebCD6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231289AbjCXSX4 (ORCPT + 99 others); Fri, 24 Mar 2023 14:23:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57204 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229734AbjCXSXz (ORCPT ); Fri, 24 Mar 2023 14:23:55 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 837305FCF for ; Fri, 24 Mar 2023 11:23:53 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id g5-20020a25a485000000b009419f64f6afso2584164ybi.2 for ; Fri, 24 Mar 2023 11:23:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; t=1679682232; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=5sa+gU+3qUwEmWNy48CwgWqEoKIn1PttS/Tvw1JyYDM=; b=qfSebCD6x9D8Cz9IxVHXMQjrApsaw9TZAyXdBj1VnVApuK25cn3bqLLYVzXkDTvUMC 09u4viW04/cBmfX6ONsmnu1P/EhFNt5zJKGBP7j4FquobyvLfrZANc6vwCwyXAPiloJe twZr5vl7Sf5RkQWVz4i2DFq+GjoLgRx1azHlq6qK9Ow6yVY3hRtPCVShW667in3u+Xws JqpbS3vgRf0utIqu38WqCnA5Aeweev50ZQ+4tEMU7u29Md1X0QFkRbCzC+rGYw0n8iQJ eMzfXAt7PkOoTF/9fDn2ZY7ILo2jsXCBkE6KkS2AH4PXwmDcgrbr+9QKmZiZoCWh33He eMgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679682232; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=5sa+gU+3qUwEmWNy48CwgWqEoKIn1PttS/Tvw1JyYDM=; b=psHHA+T8s6RTLXKkWrgZ/cF0pexXIzGql6hnCgqWfeC1CobZe5XaA+RKAAOPKX8UOe LJoU1yNDZjcSDyHn03stmKHmS3KpBb6hujlYy354sIo2gz5RZXT5rKJ0ATDZtYaevnyy wAnaYn2Lxe7tySC2UftmD6K3pC+6q3uZuKos9XpLqnKVn6nuCTMoSZ8ml0DF8rmUYDxa wI2wNgpXEO9sUMUrf+YmGt4ENna5EeQbqgL7O6iHMqsp5SC3CtpqdsldvHvsbd/AS59r x3Sg2fzUEehsmWShnSnOl+uEhEaw8M4mK/aV9iqHPp2KKk0sB2FZp2gEXk6Lt4PNPo/w LhLQ== X-Gm-Message-State: AAQBX9c79hR4NlQm+uSiLnGavJbNqxLjOd2c7z7gs4qrf2+WWcxFKVC/ Z6q1GYA49KjApv9BjZlywy2ph+UbGsQ= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6902:1003:b0:b1d:5061:98e3 with SMTP id w3-20020a056902100300b00b1d506198e3mr2048173ybt.6.1679682232832; Fri, 24 Mar 2023 11:23:52 -0700 (PDT) Date: Fri, 24 Mar 2023 11:23:51 -0700 In-Reply-To: <20230110175057.715453-8-pgonda@google.com> Mime-Version: 1.0 References: <20230110175057.715453-1-pgonda@google.com> <20230110175057.715453-8-pgonda@google.com> Message-ID: Subject: Re: [PATCH V6 7/7] KVM: selftests: Add simple sev vm testing From: Sean Christopherson To: Peter Gonda Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Paolo Bonzini , Vishal Annapurve , Ackerley Tng , Andrew Jones , Michael Roth Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-7.7 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 10, 2023, Peter Gonda wrote: > A very simple of booting SEV guests that checks related CPUID bits. This > is a stripped down version of "[PATCH v2 08/13] KVM: selftests: add SEV > boot tests" from Michael but much simpler. > > Cc: Paolo Bonzini > Cc: Sean Christopherson > Cc: Vishal Annapurve > Cc: Ackerley Tng > cc: Andrew Jones > Suggested-by: Michael Roth > Signed-off-by: Peter Gonda > --- > tools/testing/selftests/kvm/.gitignore | 84 +++++++++++++++++++ > tools/testing/selftests/kvm/Makefile | 1 + > .../selftests/kvm/x86_64/sev_all_boot_test.c | 84 +++++++++++++++++++ > 3 files changed, 169 insertions(+) > create mode 100644 tools/testing/selftests/kvm/x86_64/sev_all_boot_test.c > > diff --git a/tools/testing/selftests/kvm/.gitignore b/tools/testing/selftests/kvm/.gitignore > index 6d9381d60172..6d826957c6ae 100644 > --- a/tools/testing/selftests/kvm/.gitignore > +++ b/tools/testing/selftests/kvm/.gitignore > @@ -1,7 +1,91 @@ > # SPDX-License-Identifier: GPL-2.0-only > +<<<<<<< HEAD > * > !/**/ > !*.c > !*.h > !*.S > !*.sh > +======= For the love of all that is holy, please take the time to actually look at what you're posting. > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile > index b7cfb15712d1..66d7ab3da990 100644 > --- a/tools/testing/selftests/kvm/Makefile > +++ b/tools/testing/selftests/kvm/Makefile > @@ -111,6 +111,7 @@ TEST_GEN_PROGS_x86_64 += x86_64/tsc_msrs_test > TEST_GEN_PROGS_x86_64 += x86_64/vmx_pmu_caps_test > TEST_GEN_PROGS_x86_64 += x86_64/xen_shinfo_test > TEST_GEN_PROGS_x86_64 += x86_64/xen_vmcall_test > +TEST_GEN_PROGS_x86_64 += x86_64/sev_all_boot_test > TEST_GEN_PROGS_x86_64 += x86_64/sev_migrate_tests > TEST_GEN_PROGS_x86_64 += x86_64/amx_test > TEST_GEN_PROGS_x86_64 += x86_64/max_vcpuid_cap_test > diff --git a/tools/testing/selftests/kvm/x86_64/sev_all_boot_test.c b/tools/testing/selftests/kvm/x86_64/sev_all_boot_test.c > new file mode 100644 > index 000000000000..e9e4d7305bc1 > --- /dev/null > +++ b/tools/testing/selftests/kvm/x86_64/sev_all_boot_test.c "all_boot" is kinda odd. Maybe just sev_basic_test? > @@ -0,0 +1,84 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Basic SEV boot tests. > + * > + */ Meh, I'd leave off the comment, the testname should be pretty self-explanatory. > +#include > +#include > +#include > +#include > +#include > + > +#include "test_util.h" > +#include "kvm_util.h" > +#include "processor.h" > +#include "svm_util.h" > +#include "linux/psp-sev.h" > +#include "sev.h" > + > +#define NR_SYNCS 1 > + > +#define MSR_AMD64_SEV_BIT 1 msr-index.h exists in tools, use the defines from there. > + > +static void guest_run_loop(struct kvm_vcpu *vcpu) Another pointless helper with one caller. _If_ more subtests come along _and_ need this separate loop, then by all means. But right now, it's just noise. > +{ > + struct ucall uc; > + int i; > + > + for (i = 0; i <= NR_SYNCS; ++i) { There's zero reason to cap the number of loops, and it can lead to false passes, e.g. if the guest gets stuck on GUEST_SYNC() then this will pass. Just do for (;;) { > + vcpu_run(vcpu); > + switch (get_ucall(vcpu, &uc)) { > + case UCALL_SYNC: > + continue; > + case UCALL_DONE: > + return; > + case UCALL_ABORT: > + REPORT_GUEST_ASSERT(uc); > + default: > + TEST_FAIL("Unexpected exit: %s", > + exit_reason_str(vcpu->run->exit_reason)); > + } > + } > +} > + > +static void is_sev_enabled(void) > +{ > + uint64_t sev_status; > + > + GUEST_ASSERT(this_cpu_has(X86_FEATURE_SEV)); > + > + sev_status = rdmsr(MSR_AMD64_SEV); > + GUEST_ASSERT(sev_status & 0x1); > +} > + > +static void guest_sev_code(void) > +{ > + GUEST_SYNC(1); > + > + is_sev_enabled(); Again, completely unnecessary helper. And is_blah_enabled() _strongly_ suggests a pure function that returns true/false. All in all, this can be slimmed down to: // SPDX-License-Identifier: GPL-2.0-only #include #include #include #include #include #include "test_util.h" #include "kvm_util.h" #include "processor.h" #include "svm_util.h" #include "linux/psp-sev.h" #include "sev.h" static void guest_sev_code(void) { GUEST_ASSERT(this_cpu_has(X86_FEATURE_SEV)); GUEST_ASSERT(rdmsr(MSR_AMD64_SEV) & MSR_AMD64_SEV_ENABLED); GUEST_DONE(); } static void test_sev(void *guest_code, uint64_t policy) { struct kvm_vcpu *vcpu; struct kvm_vm *vm; struct ucall uc; int i; vm = vm_sev_create_with_one_vcpu(policy, guest_code, &vcpu); for (;;) { vcpu_run(vcpu); switch (get_ucall(vcpu, &uc)) { case UCALL_SYNC: continue; case UCALL_DONE: return; case UCALL_ABORT: REPORT_GUEST_ASSERT(uc); default: TEST_FAIL("Unexpected exit: %s", exit_reason_str(vcpu->run->exit_reason)); } } kvm_vm_free(vm); } int main(int argc, char *argv[]) { TEST_REQUIRE(is_kvm_sev_supported()); test_sev(guest_sev_code, SEV_POLICY_NO_DBG); test_sev(guest_sev_code, 0); return 0; }