From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7D1D9C4332F for ; Tue, 12 Dec 2023 20:47:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B13EF6B037E; Tue, 12 Dec 2023 15:47:27 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id AC4A96B0380; Tue, 12 Dec 2023 15:47:27 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8F1F76B0381; Tue, 12 Dec 2023 15:47:27 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 79BAB6B037E for ; Tue, 12 Dec 2023 15:47:27 -0500 (EST) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 57B791A0A75 for ; Tue, 12 Dec 2023 20:47:27 +0000 (UTC) X-FDA: 81559351734.08.B6BE0AA Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) by imf13.hostedemail.com (Postfix) with ESMTP id 6F8D920015 for ; Tue, 12 Dec 2023 20:47:25 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=lrBlySHk; spf=pass (imf13.hostedemail.com: domain of 33MZ4ZQUKCH8vdjlvjrrjoh.frpolqx0-ppnydfn.ruj@flex--sagis.bounces.google.com designates 209.85.216.73 as permitted sender) smtp.mailfrom=33MZ4ZQUKCH8vdjlvjrrjoh.frpolqx0-ppnydfn.ruj@flex--sagis.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1702414045; a=rsa-sha256; cv=none; b=L6zbLgvNRwnBdTiKd8nphygdKPC18/mVZPLe6YgpeEb0XwJLGA76TSZYufh3VF11XEXAY+ Qs2LhMkybS9OmHtyaUX+K+5hJveoDjptrOcecMZRNH8CpgezeJNYUdNAhMeIdTOOfW/hPf 8drASyUy4Ubx2d3/a2FVLWq4Kxt7cHc= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=lrBlySHk; spf=pass (imf13.hostedemail.com: domain of 33MZ4ZQUKCH8vdjlvjrrjoh.frpolqx0-ppnydfn.ruj@flex--sagis.bounces.google.com designates 209.85.216.73 as permitted sender) smtp.mailfrom=33MZ4ZQUKCH8vdjlvjrrjoh.frpolqx0-ppnydfn.ruj@flex--sagis.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1702414045; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=pOWQKACugG9g7cz1/AmBUQwWqXmyF/X6aVaYz3Y0fys=; b=IUgAGjz4QNrfsCSexKsMQfmxrGN5/3f+aLqRN4nsVoqyQt/9LYxfKLLfyqsLNkdxyzQ/10 LYG+JPglMeZ9Hzwuwh4P9gDotvQu81IDHuJFHv5hVTPSKmXJ2ye1uuR3+hh8MayF6GY3tW Xpr7u8Nu9yOtilWzL55mtGU9204LQAU= Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-28a30542c37so2194815a91.1 for ; Tue, 12 Dec 2023 12:47:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1702414044; x=1703018844; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=pOWQKACugG9g7cz1/AmBUQwWqXmyF/X6aVaYz3Y0fys=; b=lrBlySHkcUe1AOZH3bDex/qcV4pSKJ3yQxn4SShBtluTc9yGwKJugRmvQklw/R94kB m0JfTrVxmupO2Oo5xZAYhVtatdWVjBTPNmR0cMsCSDMcQ2S7AyCKMJxO5mwREEzotbQq Ywdu+80Od7KL7Hj1WB4aipXYBuv0d8ubmTF0dcHcGPfa1dQpCSxjAjPufPzSGmLQkXT+ kJLB659PSMg2zO7VYWLPZOYupvcCJ/TmxAfWFgY/o4yj2XpDuOWOfsyaLR6xmNJPgE+E G6HF4L7N3Y2cwbXfa6/AgLRvCer2DeHvrj6KYvTMhbw1AFba1f2yVEyQoGnyok9Wrorc Eqvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702414044; x=1703018844; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=pOWQKACugG9g7cz1/AmBUQwWqXmyF/X6aVaYz3Y0fys=; b=Ci+juSWhe7F+hwCJQ4Do+h31EL1UE6p3LiEtiQrGofbInN40EkBEdJRxw245UzQhrU 4LKXZIJ9+249qcu46BqoCdBdPl+/fUNI1Gp7bTNubsR1LLksGVaFh5ZjhPNI+E0qrbZ7 hV/X6wVqVGQWfx1gCpKQzL/FdpPrOPMg0dDbklyuG35H38Usu1MMfUJIh26vQ9EBo7fU 6kXlxuEhIGXEBqeQkdSb7GX2dWSZ2o0tlnEySAXeeytLFI0ocpGCYSwXPU6N5f78PvPz mGJ0zCrE3+SySb9LUgUldDTArpXOrCwFGJ7xLJBp/e+2+EhkD8q0n1W4A310yiOSDPd/ w72A== X-Gm-Message-State: AOJu0Yw/whbv547ZMDKV9GxYSHPk4bQ6PCrFOEJnTDsaSVeE0Q4mJJk7 ahm3kC5lbGURg89F1RCR0Ond574rTQ== X-Google-Smtp-Source: AGHT+IGLlrmxTENwZC6SGbM6jr4r7WDmCiJAWrdAa/8w6lr8saM6Dsnuvy2FguUg9MN6N/MAkqVuDY/IjA== X-Received: from sagi.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:241b]) (user=sagis job=sendgmr) by 2002:a17:903:32cb:b0:1d0:c3e7:d4c with SMTP id i11-20020a17090332cb00b001d0c3e70d4cmr53041plr.2.1702414044401; Tue, 12 Dec 2023 12:47:24 -0800 (PST) Date: Tue, 12 Dec 2023 12:46:29 -0800 In-Reply-To: <20231212204647.2170650-1-sagis@google.com> Mime-Version: 1.0 References: <20231212204647.2170650-1-sagis@google.com> X-Mailer: git-send-email 2.43.0.472.g3155946c3a-goog Message-ID: <20231212204647.2170650-15-sagis@google.com> Subject: [RFC PATCH v5 14/29] KVM: selftests: TDX: Add TDX IO reads test From: Sagi Shahar To: linux-kselftest@vger.kernel.org, Ackerley Tng , Ryan Afranji , Erdem Aktas , Sagi Shahar , Isaku Yamahata Cc: Sean Christopherson , Paolo Bonzini , Shuah Khan , Peter Gonda , Haibo Xu , Chao Peng , Vishal Annapurve , Roger Wang , Vipin Sharma , jmattson@google.com, dmatlack@google.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 6F8D920015 X-Stat-Signature: fnngpiywpuoiwxkbw9k9cq88h5arxu39 X-Rspam-User: X-HE-Tag: 1702414045-285141 X-HE-Meta: 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 u2qjOFnO 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: The test verifies IO reads of various sizes from the host to the guest. Signed-off-by: Sagi Shahar Signed-off-by: Ackerley Tng Signed-off-by: Ryan Afranji --- .../selftests/kvm/x86_64/tdx_vm_tests.c | 87 +++++++++++++++++++ 1 file changed, 87 insertions(+) diff --git a/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c b/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c index a2b3e1aef151..699cba36e9ce 100644 --- a/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c +++ b/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c @@ -429,6 +429,92 @@ void verify_guest_writes(void) printf("\t ... PASSED\n"); } +#define TDX_IO_READS_TEST_PORT 0x52 + +/* + * Verifies IO functionality by reading values of different sizes + * from the host. + */ +void guest_io_reads(void) +{ + uint64_t data; + uint64_t ret; + + ret = tdg_vp_vmcall_instruction_io(TDX_IO_READS_TEST_PORT, 1, + TDG_VP_VMCALL_INSTRUCTION_IO_READ, + &data); + if (ret) + tdx_test_fatal(ret); + if (data != 0xAB) + tdx_test_fatal(1); + + ret = tdg_vp_vmcall_instruction_io(TDX_IO_READS_TEST_PORT, 2, + TDG_VP_VMCALL_INSTRUCTION_IO_READ, + &data); + if (ret) + tdx_test_fatal(ret); + if (data != 0xABCD) + tdx_test_fatal(2); + + ret = tdg_vp_vmcall_instruction_io(TDX_IO_READS_TEST_PORT, 4, + TDG_VP_VMCALL_INSTRUCTION_IO_READ, + &data); + if (ret) + tdx_test_fatal(ret); + if (data != 0xFFABCDEF) + tdx_test_fatal(4); + + // Read an invalid number of bytes. + ret = tdg_vp_vmcall_instruction_io(TDX_IO_READS_TEST_PORT, 5, + TDG_VP_VMCALL_INSTRUCTION_IO_READ, + &data); + if (ret) + tdx_test_fatal(ret); + + tdx_test_success(); +} + +void verify_guest_reads(void) +{ + struct kvm_vm *vm; + struct kvm_vcpu *vcpu; + + vm = td_create(); + td_initialize(vm, VM_MEM_SRC_ANONYMOUS, 0); + vcpu = td_vcpu_add(vm, 0, guest_io_reads); + td_finalize(vm); + + printf("Verifying guest reads:\n"); + + td_vcpu_run(vcpu); + TDX_TEST_CHECK_GUEST_FAILURE(vcpu); + TDX_TEST_ASSERT_IO(vcpu, TDX_IO_READS_TEST_PORT, 1, + TDG_VP_VMCALL_INSTRUCTION_IO_READ); + *(uint8_t *)((void *)vcpu->run + vcpu->run->io.data_offset) = 0xAB; + + td_vcpu_run(vcpu); + TDX_TEST_CHECK_GUEST_FAILURE(vcpu); + TDX_TEST_ASSERT_IO(vcpu, TDX_IO_READS_TEST_PORT, 2, + TDG_VP_VMCALL_INSTRUCTION_IO_READ); + *(uint16_t *)((void *)vcpu->run + vcpu->run->io.data_offset) = 0xABCD; + + td_vcpu_run(vcpu); + TDX_TEST_CHECK_GUEST_FAILURE(vcpu); + TDX_TEST_ASSERT_IO(vcpu, TDX_IO_READS_TEST_PORT, 4, + TDG_VP_VMCALL_INSTRUCTION_IO_READ); + *(uint32_t *)((void *)vcpu->run + vcpu->run->io.data_offset) = 0xFFABCDEF; + + td_vcpu_run(vcpu); + TEST_ASSERT_EQ(vcpu->run->exit_reason, KVM_EXIT_SYSTEM_EVENT); + TEST_ASSERT_EQ(vcpu->run->system_event.data[1], TDG_VP_VMCALL_INVALID_OPERAND); + + td_vcpu_run(vcpu); + TDX_TEST_ASSERT_SUCCESS(vcpu); + + kvm_vm_free(vm); + printf("\t ... PASSED\n"); +} + int main(int argc, char **argv) { setbuf(stdout, NULL); @@ -444,6 +530,7 @@ int main(int argc, char **argv) run_in_new_process(&verify_td_cpuid); run_in_new_process(&verify_get_td_vmcall_info); run_in_new_process(&verify_guest_writes); + run_in_new_process(&verify_guest_reads); return 0; } -- 2.43.0.472.g3155946c3a-goog