From patchwork Tue Jan 10 17:03:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Peter Gonda X-Patchwork-Id: 13095373 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 684CDC54EBC for ; Tue, 10 Jan 2023 17:04:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238745AbjAJREP (ORCPT ); Tue, 10 Jan 2023 12:04:15 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238741AbjAJREF (ORCPT ); Tue, 10 Jan 2023 12:04:05 -0500 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 336AC47332 for ; Tue, 10 Jan 2023 09:04:02 -0800 (PST) Received: by mail-pf1-x44a.google.com with SMTP id 80-20020a621453000000b0058952aa1c39so2690429pfu.9 for ; Tue, 10 Jan 2023 09:04:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:mime-version:message-id:date:from:to:cc:subject :date:message-id:reply-to; bh=9ich1iVezuNu8uluYHiS8u02oY/MPLgCxDKersNmYNE=; b=p9p+1zFPB28l14+mwS3NvWMaACg+aecpV1UwwesL2QfHocdCvPs6k3tvZJRieh0uum nrACwtnAg1DjhjmZPbmjTgzJVT9K7FM6RxEkFIT1KrgDLquuyDZ4pko74qs0WDkofSjK Zkai6s32MyhpQekhgPYZs5jkWRlDmJaEGcpmKgvgGRO10m7ZAh46wBNtYSoH53mQY8tS 831x5gC3WWsRzXXbeOzIntJUMuWSbMTYatrhSy2NNtruzRmY/h4VGgdo/T5bdnShLAuD RWBgrZLxpbwPnMsaeslltVEloeBVYNDZ+euhMzxV5tzPw1A5DxCkwaGLYCMQpm/9coVU lPyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:mime-version:message-id:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=9ich1iVezuNu8uluYHiS8u02oY/MPLgCxDKersNmYNE=; b=j+/LGtph7jIL6Ajb7yHFkepbvrdZxWKVBimcGCsdMTUjSlIcEAI4eS36hStTZwaVDz jXk0w5V4MG5yBB+gXTxJr4QAIKrDAgl/ypBJTVzvT1+L7tGKypx5b8ORd4DHMlhs9XKG 0fBsVb6AGsojLy2nVP84FZEIvjvd8O4M4ebB1G1iEAQF0vsiDHjrXNwXJ5pe+u1vXiqN TNBIIN4ozcD/F3TaFe+9ohkyENumOuCJ5Gf8P7FlyqOY5UbCSlIVG6pg56RmE5xKREL0 Yq+s1fxSNYPRpB+aTM2lDjApdjf+p/6lZG9t2tfvn+7jslmcEP1Isgm827VQ4SiAG2C3 5adQ== X-Gm-Message-State: AFqh2kpcjNvrC/XQ198z1IbAb/L6afA22FzR8oumIQIEN432WOBVKZMi wXWN9InDojjJHx6BsDgAcl9FFQ+gc1enrR3o7M4StivwessBysVqjVeyvzGgkfJVKNdT54kK5iJ ONmKLc7bdGu9UcNEZBX9/FG3hS6W7yQcX4hRfBqpe6nZ2e9BoMVRrZbfOig== X-Google-Smtp-Source: AMrXdXvxWxEzhLKqzOCYZP/aYcoUD3gssPT0roagdfGDUN6PufKDYiJCLYWwA1oTmd/D2owo3RZuVSarkWM= X-Received: from pgonda1.kir.corp.google.com ([2620:0:1008:11:8358:4c2a:eae1:4752]) (user=pgonda job=sendgmr) by 2002:aa7:90d9:0:b0:578:7983:9391 with SMTP id k25-20020aa790d9000000b0057879839391mr5265795pfk.41.1673370241528; Tue, 10 Jan 2023 09:04:01 -0800 (PST) Date: Tue, 10 Jan 2023 09:03:51 -0800 Message-Id: <20230110170358.633793-1-pgonda@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.314.g84b9a713c41-goog Subject: [PATCH V6 0/7] KVM: selftests: Add simple SEV test From: Peter Gonda To: kvm@vger.kernel.org Cc: Peter Gonda , linux-kernel@vger.kernel.org, marcorr@google.com, seanjc@google.com, michael.roth@amd.com, thomas.lendacky@amd.com, joro@8bytes.org, pbonzini@redhat.com, andrew.jones@linux.dev, vannapurve@google.com, Ackerly Tng Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patch series continues the work Michael Roth has done in supporting SEV guests in selftests. It continues on top of the work Sean Christopherson has sent to support ucalls from SEV guests. Along with a very simple version of the SEV selftests Michael originally proposed. V6 * Updated SEV VM create function based on Seanjc's feedback and new changes to VM creation functions. * Removed pte_me_mask based on feedback. * Fixed s_bit usage based on TDX * Fixed bugs and took Ackerly's code for enc_region setup code. V5 * Rebase onto seanjc@'s latest ucall pool series. * More review changes based on seanjc: ** use protected instead of encrypted outside of SEV specific files ** Swap memcrypt struct for kvm_vm_arch arch specific struct ** Make protected page table data agnostic of address bit stealing specifics of SEV ** Further clean up for SEV library to just vm_sev_create_one_vcpu() * Due to large changes moved more authorships from mroth@ to pgonda@. Gave originally-by tags to mroth@ as suggested by Seanjc for this. V4 * Rebase ontop of seanjc@'s latest Ucall Pool series: https://lore.kernel.org/linux-arm-kernel/20220825232522.3997340-8-seanjc@google.com/ * Fix up review comments from seanjc * Switch authorship on 2 patches because of significant changes, added * Michael as suggested-by or originally-by. V3 * Addressed more of andrew.jones@ in ucall patches. * Fix build in non-x86 archs. V2 * Dropped RFC tag * Correctly separated Sean's ucall patches into 2 as originally intended. * Addressed andrew.jones@ in ucall patches. * Fixed ucall pool usage to work for other archs V1 * https://lore.kernel.org/all/20220715192956.1873315-1-pgonda@google.com/ Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: marcorr@google.com Cc: seanjc@google.com Cc: michael.roth@amd.com Cc: thomas.lendacky@amd.com Cc: joro@8bytes.org Cc: pbonzini@redhat.com Cc: andrew.jones@linux.dev Cc: vannapurve@google.com Cc: Ackerly Tng Michael Roth (2): KVM: selftests: sparsebit: add const where appropriate KVM: selftests: add support for protected vm_vaddr_* allocations Peter Gonda (5): KVM: selftests: add hooks for managing protected guest memory KVM: selftests: handle protected bits in page tables KVM: selftests: add library for creating/interacting with SEV guests KVM: selftests: Update ucall pool to allocate from shared memory KVM: selftests: Add simple sev vm testing tools/arch/arm64/include/asm/kvm_host.h | 7 + tools/arch/riscv/include/asm/kvm_host.h | 7 + tools/arch/s390/include/asm/kvm_host.h | 7 + tools/arch/x86/include/asm/kvm_host.h | 14 + tools/testing/selftests/kvm/.gitignore | 84 ++++++ tools/testing/selftests/kvm/Makefile | 4 +- .../selftests/kvm/include/kvm_util_base.h | 49 +++- .../testing/selftests/kvm/include/sparsebit.h | 36 +-- .../selftests/kvm/include/x86_64/processor.h | 1 + .../selftests/kvm/include/x86_64/sev.h | 27 ++ tools/testing/selftests/kvm/lib/kvm_util.c | 66 ++++- tools/testing/selftests/kvm/lib/sparsebit.c | 48 ++-- .../testing/selftests/kvm/lib/ucall_common.c | 2 +- .../selftests/kvm/lib/x86_64/processor.c | 62 ++++- tools/testing/selftests/kvm/lib/x86_64/sev.c | 254 ++++++++++++++++++ .../selftests/kvm/x86_64/sev_all_boot_test.c | 84 ++++++ 16 files changed, 685 insertions(+), 67 deletions(-) create mode 100644 tools/arch/arm64/include/asm/kvm_host.h create mode 100644 tools/arch/riscv/include/asm/kvm_host.h create mode 100644 tools/arch/s390/include/asm/kvm_host.h create mode 100644 tools/arch/x86/include/asm/kvm_host.h create mode 100644 tools/testing/selftests/kvm/include/x86_64/sev.h create mode 100644 tools/testing/selftests/kvm/lib/x86_64/sev.c create mode 100644 tools/testing/selftests/kvm/x86_64/sev_all_boot_test.c