Received: by 2002:a05:7208:9594:b0:7e:5202:c8b4 with SMTP id gs20csp1667885rbb; Mon, 26 Feb 2024 18:23:17 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXQ0QTxIVH5W4GwS/LZef81pYEFNz7rAOsZpmIRK81HkrDXK4fVNRYJffeOWUzVUt6Wqkps9Qho0PiclDCqNUcZFLghJ9yp4m/tjQ9A6Q== X-Google-Smtp-Source: AGHT+IEcU/mM1jxQIbs4sZB4FQGnIUUjq2+kjeZ9iSvs5TACuxK5Yfv+juNPlRcgjAeF17enKQ0t X-Received: by 2002:a2e:92c9:0:b0:2d2:393d:91b7 with SMTP id k9-20020a2e92c9000000b002d2393d91b7mr4702997ljh.52.1709000596852; Mon, 26 Feb 2024 18:23:16 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709000596; cv=pass; d=google.com; s=arc-20160816; b=ZK68qETZoC/FsOVb5hZoVwZHbgH62f9BFoYMIY69x1PLParEAcrKlVU9uu3cg2IQ1d G2sII3/vrnu7RaOjCdXLELQFYJMLeKCPkUPDMae3hWMaFL/oeHoLIT86IwlhICbJClcc 9iKohx7Eq7oG0xuH915KC2dcNi29l7BfVGSS6eRIbffHW6T+2LO6jKsSuvzEyWDRt0yn +DakOIhXyukajvNJ31UP9VERfrfcksUGie5UgLN3I7b9H2cEEPwdSD8yu3N93jy/FkIa c0WSegOuyIequQoa2YcimKMHG26qN+wnvimv9zWk+ZcYLPeCNMknPRJHHXgO8m/8hPNt H6Lg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=Ghn/tsXt4bBeTaeh+x2q+YtPRUVSTzvBJxsTub2q9Gk=; fh=WohzgeniYgexWr0oI1auk2oxhA/GfvuMbAiosR5JS7E=; b=ChsPCeSS0MjEQ4LzPKQ0X8SSXN7rPKpzT/0grDa3OCnJVsIGewKn06M/OYtiAnYBlQ PSyuaBCdCQm3dmHWLdxjLq8hxLgs/HC/YCU5HGONqMHaRConZubPcnTzBJK1ena6ZgnG rPq1vRpq1kxM2kx7wMmWw/bND8VxjTAD8jfwlaGQPTz33OJa/EfWQq4/8WzFvzxOjRka ktp6egf28yzMVe0Kwd7dGcHHBJtEk1ZFh3HOJ7PxZEnbWdovN0mSx7e9ZZ/fZugSYaKJ wKglp4XABcy2vdLBdh1BA8+0jx3+8ZjzFcCoihRFIB/tY/0GW+R/sYKsmzLnxEj1p/4L 352w==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=OqMZU+1i; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-82598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-82598-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id x44-20020a50baaf000000b00565b01131d7si277868ede.213.2024.02.26.18.23.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Feb 2024 18:23:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-82598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=OqMZU+1i; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-82598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-82598-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id D41021F26709 for ; Tue, 27 Feb 2024 02:22:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4590B38FA1; Tue, 27 Feb 2024 02:21:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="OqMZU+1i" Received: from mail-yb1-f201.google.com (mail-yb1-f201.google.com [209.85.219.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0645338385 for ; Tue, 27 Feb 2024 02:21:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709000503; cv=none; b=qvK00rTsqie5qqlgnzTrnbPlXYi/QvibM/ON9ZFXz9YtOhicCHdoL1mkwhCKxvyrATTroUSlgCIOcC/MaczCdfOeiIjioI8cWyJHJhkQ6sA3Mnq/fyNARujerHEuhKIg+p26ITJDtaHxc6jvGvmuNeMGlwqJ/AFG9oWg/XSpPjA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709000503; c=relaxed/simple; bh=AJavhWKrBehCz7d+YW7b+29aWJ1wgMQjIIWm/3TmNUs=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=iEyu+G+QZKm3dCitpXK3MpHrveWsOUgYUhKzCyKIx7kiFiznJB2SQEL+IB7C6aoIAAPif36lV5ZZ6kgbPhwfjFZPJqgbvXChd6GGrYs4MQZ692W51kglyq8mzYOFDUYJS8r5aWzlTtZT4dpsNHIplsyk7q1Tn0aU1lmaLvomFAU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=OqMZU+1i; arc=none smtp.client-ip=209.85.219.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-yb1-f201.google.com with SMTP id 3f1490d57ef6-dcc05887ee9so5299364276.1 for ; Mon, 26 Feb 2024 18:21:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1709000500; x=1709605300; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=Ghn/tsXt4bBeTaeh+x2q+YtPRUVSTzvBJxsTub2q9Gk=; b=OqMZU+1iOHJMr7DJDWExKqie+yZ6TrUgQmJssAgYPh5qJDb+KAqMT5sFjVZQH7DKnF tLHNh4EJg5ykW/AqIf7IHbCdt8GzhgIGExYAciRjm5ViB9aT2PeWeIqi8eU/LqYQr4Ql cXpVpmF0kaiEmrqBIror8Bt2ChMUrbTA+adZwKKpg5dcf8b9b+yLrkuDj8NkulhI0WqE KiXNWFQ3+UaKF4dlpxr8uU5qWHb0bqXOwHL5xM9ekS91xUMCAre06OPahY2twyiV4uih 74rQFZF6NUC/cwX2P5SswnJ47gz+AW5HPxtuN/v6mFD9MkXlPx9jfaijSKsBCA6yAx9f r6Jw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709000500; x=1709605300; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Ghn/tsXt4bBeTaeh+x2q+YtPRUVSTzvBJxsTub2q9Gk=; b=onaobN1Uyd2hLopSaKjjExwp0DVNqWThO6WYzOKhg5LBHRdcnNlUaLNNEqcRNnoveU JxEDuChWOnPB4bmNq7ab3Dl7JjVkWnO4MF/UUZbWNNyaV46nrui0jBazl+ElhN+wPqM0 IaFgJNJ+uHAikCMic/HzxiSNgT6wMimK1XDp9n+NBQ0X69D8qxj/5ietFPlNiK5bsc4i 0sO9cM3J2gkzKC5k5NbRMXLZ3rbwRMtdEJTAPYzDcU+3k9di6UsW72//t2Bb6cMa8GQi bs45wUw60/QNDYrdgUatohEHGk1Mw9Ky+SCN2D+7WxM0TE2ZIH0jlN0ZI09Qh105MbAJ xM0w== X-Forwarded-Encrypted: i=1; AJvYcCUpSnipgGvwtmty0I7iPcWHQgGWKNWrk7wWv1iD9RuO9zA/b0beYBURevX/JEARpLOrOsXwNxxZitPuHHFDVhbXAz0fycYfxiPjIcQN X-Gm-Message-State: AOJu0YzP5ojrQxWZ/hr1qlFSmxhFMqg6XU4iJGNv/PInre4UeyhF8hPN ojlDJnHSsUTDyRvokcfPbluBR1IkkoNX5zfjwyKrehetrHoPECyE6RQhPIzNjdVtWkCNPfRkqtv /yw== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6902:a89:b0:dcd:2f3e:4d18 with SMTP id cd9-20020a0569020a8900b00dcd2f3e4d18mr49885ybb.12.1709000499927; Mon, 26 Feb 2024 18:21:39 -0800 (PST) Date: Mon, 26 Feb 2024 18:21:10 -0800 In-Reply-To: <20240223004258.3104051-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240223004258.3104051-1-seanjc@google.com> X-Mailer: git-send-email 2.44.0.278.ge034bb2e1d-goog Message-ID: <170900037528.3692126.18029642068469384283.b4-ty@google.com> Subject: Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini , Marc Zyngier , Oliver Upton , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Christian Borntraeger , Janosch Frank , Claudio Imbrenda Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Vishal Annapurve , Ackerley Tng , Andrew Jones , Tom Lendacky , Michael Roth , Carlos Bilbao , Peter Gonda , Itaru Kitayama Content-Type: text/plain; charset="utf-8" On Thu, 22 Feb 2024 16:42:47 -0800, Sean Christopherson wrote: > Add basic SEV and SEV-ES smoke tests. Unlike the intra-host migration tests, > this one actually runs a small chunk of code in the guest. > > Unless anyone strongly objects to the quick and dirty approach I've taken for > SEV-ES, I'll get all of this queued for 6.9 soon-ish. > > As for _why_ I added the quick-and-dirty SEV-ES testcase, I have a series to > cleanup __svm_sev_es_vcpu_run(), and found out that apparently I have a version > of OVMF that doesn't quite have to the right for SEV-ES, and so I > could even get a "real" VM to reach KVM_RUN. I assumed (correctly, yay!) that > hacking together a selftest would be faster than figuring out what firmware > magic I am missing. > > [...] Applied to kvm-x86 selftests, thanks! [01/11] KVM: selftests: Extend VM creation's @shape to allow control of VM subtype https://github.com/kvm-x86/linux/commit/309d1ad7b6ff [02/11] KVM: selftests: Make sparsebit structs const where appropriate https://github.com/kvm-x86/linux/commit/6077c3ce4021 [03/11] KVM: selftests: Add a macro to iterate over a sparsebit range https://github.com/kvm-x86/linux/commit/8811565ff68e [04/11] KVM: selftests: Add support for allocating/managing protected guest memory https://github.com/kvm-x86/linux/commit/29e749e8faff [05/11] KVM: selftests: Add support for protected vm_vaddr_* allocations https://github.com/kvm-x86/linux/commit/1e3af7cf984a [06/11] KVM: selftests: Explicitly ucall pool from shared memory https://github.com/kvm-x86/linux/commit/5ef7196273b6 [07/11] KVM: selftests: Allow tagging protected memory in guest page tables https://github.com/kvm-x86/linux/commit/a8446cd81de8 [08/11] KVM: selftests: Add library for creating and interacting with SEV guests https://github.com/kvm-x86/linux/commit/f3ff1e9b2f9c [09/11] KVM: selftests: Use the SEV library APIs in the intra-host migration test https://github.com/kvm-x86/linux/commit/0837ddb51f9b [10/11] KVM: selftests: Add a basic SEV smoke test https://github.com/kvm-x86/linux/commit/5101f1e27683 [11/11] KVM: selftests: Add a basic SEV-ES smoke test https://github.com/kvm-x86/linux/commit/f3750b0c7f6e -- https://github.com/kvm-x86/linux/tree/next