1 // SPDX-License-Identifier: GPL-2.0-only
3 #include <linux/psp-sev.h>
10 #include "test_util.h"
12 #include "processor.h"
14 #include "kselftest.h"
15 #include "../lib/kvm_util_internal.h"
17 #define SEV_POLICY_ES 0b100
19 #define NR_MIGRATE_TEST_VCPUS 4
20 #define NR_MIGRATE_TEST_VMS 3
21 #define NR_LOCK_TESTING_THREADS 3
22 #define NR_LOCK_TESTING_ITERATIONS 10000
24 static void sev_ioctl(int vm_fd, int cmd_id, void *data)
26 struct kvm_sev_cmd cmd = {
28 .data = (uint64_t)data,
29 .sev_fd = open_sev_dev_path_or_exit(),
33 ret = ioctl(vm_fd, KVM_MEMORY_ENCRYPT_OP, &cmd);
34 TEST_ASSERT((ret == 0 || cmd.error == SEV_RET_SUCCESS),
35 "%d failed: return code: %d, errno: %d, fw error: %d",
36 cmd_id, ret, errno, cmd.error);
39 static struct kvm_vm *sev_vm_create(bool es)
42 struct kvm_sev_launch_start start = { 0 };
45 vm = vm_create(VM_MODE_DEFAULT, 0, O_RDWR);
46 sev_ioctl(vm->fd, es ? KVM_SEV_ES_INIT : KVM_SEV_INIT, NULL);
47 for (i = 0; i < NR_MIGRATE_TEST_VCPUS; ++i)
50 start.policy |= SEV_POLICY_ES;
51 sev_ioctl(vm->fd, KVM_SEV_LAUNCH_START, &start);
53 sev_ioctl(vm->fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL);
57 static struct kvm_vm *aux_vm_create(bool with_vcpus)
62 vm = vm_create(VM_MODE_DEFAULT, 0, O_RDWR);
66 for (i = 0; i < NR_MIGRATE_TEST_VCPUS; ++i)
72 static int __sev_migrate_from(int dst_fd, int src_fd)
74 struct kvm_enable_cap cap = {
75 .cap = KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM,
79 return ioctl(dst_fd, KVM_ENABLE_CAP, &cap);
83 static void sev_migrate_from(int dst_fd, int src_fd)
87 ret = __sev_migrate_from(dst_fd, src_fd);
88 TEST_ASSERT(!ret, "Migration failed, ret: %d, errno: %d\n", ret, errno);
91 static void test_sev_migrate_from(bool es)
93 struct kvm_vm *src_vm;
94 struct kvm_vm *dst_vms[NR_MIGRATE_TEST_VMS];
97 src_vm = sev_vm_create(es);
98 for (i = 0; i < NR_MIGRATE_TEST_VMS; ++i)
99 dst_vms[i] = aux_vm_create(true);
101 /* Initial migration from the src to the first dst. */
102 sev_migrate_from(dst_vms[0]->fd, src_vm->fd);
104 for (i = 1; i < NR_MIGRATE_TEST_VMS; i++)
105 sev_migrate_from(dst_vms[i]->fd, dst_vms[i - 1]->fd);
107 /* Migrate the guest back to the original VM. */
108 ret = __sev_migrate_from(src_vm->fd, dst_vms[NR_MIGRATE_TEST_VMS - 1]->fd);
109 TEST_ASSERT(ret == -1 && errno == EIO,
110 "VM that was migrated from should be dead. ret %d, errno: %d\n", ret,
114 for (i = 0; i < NR_MIGRATE_TEST_VMS; ++i)
115 kvm_vm_free(dst_vms[i]);
118 struct locking_thread_input {
120 int source_fds[NR_LOCK_TESTING_THREADS];
123 static void *locking_test_thread(void *arg)
126 struct locking_thread_input *input = (struct locking_thread_input *)arg;
128 for (i = 0; i < NR_LOCK_TESTING_ITERATIONS; ++i) {
129 j = i % NR_LOCK_TESTING_THREADS;
130 __sev_migrate_from(input->vm->fd, input->source_fds[j]);
136 static void test_sev_migrate_locking(void)
138 struct locking_thread_input input[NR_LOCK_TESTING_THREADS];
139 pthread_t pt[NR_LOCK_TESTING_THREADS];
142 for (i = 0; i < NR_LOCK_TESTING_THREADS; ++i) {
143 input[i].vm = sev_vm_create(/* es= */ false);
144 input[0].source_fds[i] = input[i].vm->fd;
146 for (i = 1; i < NR_LOCK_TESTING_THREADS; ++i)
147 memcpy(input[i].source_fds, input[0].source_fds,
148 sizeof(input[i].source_fds));
150 for (i = 0; i < NR_LOCK_TESTING_THREADS; ++i)
151 pthread_create(&pt[i], NULL, locking_test_thread, &input[i]);
153 for (i = 0; i < NR_LOCK_TESTING_THREADS; ++i)
154 pthread_join(pt[i], NULL);
155 for (i = 0; i < NR_LOCK_TESTING_THREADS; ++i)
156 kvm_vm_free(input[i].vm);
159 static void test_sev_migrate_parameters(void)
161 struct kvm_vm *sev_vm, *sev_es_vm, *vm_no_vcpu, *vm_no_sev,
165 sev_vm = sev_vm_create(/* es= */ false);
166 sev_es_vm = sev_vm_create(/* es= */ true);
167 vm_no_vcpu = vm_create(VM_MODE_DEFAULT, 0, O_RDWR);
168 vm_no_sev = aux_vm_create(true);
169 sev_es_vm_no_vmsa = vm_create(VM_MODE_DEFAULT, 0, O_RDWR);
170 sev_ioctl(sev_es_vm_no_vmsa->fd, KVM_SEV_ES_INIT, NULL);
171 vm_vcpu_add(sev_es_vm_no_vmsa, 1);
173 ret = __sev_migrate_from(sev_vm->fd, sev_es_vm->fd);
175 ret == -1 && errno == EINVAL,
176 "Should not be able migrate to SEV enabled VM. ret: %d, errno: %d\n",
179 ret = __sev_migrate_from(sev_es_vm->fd, sev_vm->fd);
181 ret == -1 && errno == EINVAL,
182 "Should not be able migrate to SEV-ES enabled VM. ret: %d, errno: %d\n",
185 ret = __sev_migrate_from(vm_no_vcpu->fd, sev_es_vm->fd);
187 ret == -1 && errno == EINVAL,
188 "SEV-ES migrations require same number of vCPUS. ret: %d, errno: %d\n",
191 ret = __sev_migrate_from(vm_no_vcpu->fd, sev_es_vm_no_vmsa->fd);
193 ret == -1 && errno == EINVAL,
194 "SEV-ES migrations require UPDATE_VMSA. ret %d, errno: %d\n",
197 ret = __sev_migrate_from(vm_no_vcpu->fd, vm_no_sev->fd);
198 TEST_ASSERT(ret == -1 && errno == EINVAL,
199 "Migrations require SEV enabled. ret %d, errno: %d\n", ret,
203 kvm_vm_free(sev_es_vm);
204 kvm_vm_free(sev_es_vm_no_vmsa);
205 kvm_vm_free(vm_no_vcpu);
206 kvm_vm_free(vm_no_sev);
209 static int __sev_mirror_create(int dst_fd, int src_fd)
211 struct kvm_enable_cap cap = {
212 .cap = KVM_CAP_VM_COPY_ENC_CONTEXT_FROM,
216 return ioctl(dst_fd, KVM_ENABLE_CAP, &cap);
220 static void sev_mirror_create(int dst_fd, int src_fd)
224 ret = __sev_mirror_create(dst_fd, src_fd);
225 TEST_ASSERT(!ret, "Copying context failed, ret: %d, errno: %d\n", ret, errno);
228 static void test_sev_mirror(bool es)
230 struct kvm_vm *src_vm, *dst_vm;
231 struct kvm_sev_launch_start start = {
232 .policy = es ? SEV_POLICY_ES : 0
236 src_vm = sev_vm_create(es);
237 dst_vm = aux_vm_create(false);
239 sev_mirror_create(dst_vm->fd, src_vm->fd);
241 /* Check that we can complete creation of the mirror VM. */
242 for (i = 0; i < NR_MIGRATE_TEST_VCPUS; ++i)
243 vm_vcpu_add(dst_vm, i);
244 sev_ioctl(dst_vm->fd, KVM_SEV_LAUNCH_START, &start);
246 sev_ioctl(dst_vm->fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL);
252 static void test_sev_mirror_parameters(void)
254 struct kvm_vm *sev_vm, *sev_es_vm, *vm_no_vcpu, *vm_with_vcpu;
257 sev_vm = sev_vm_create(/* es= */ false);
258 sev_es_vm = sev_vm_create(/* es= */ true);
259 vm_with_vcpu = aux_vm_create(true);
260 vm_no_vcpu = aux_vm_create(false);
262 ret = __sev_mirror_create(sev_vm->fd, sev_vm->fd);
264 ret == -1 && errno == EINVAL,
265 "Should not be able copy context to self. ret: %d, errno: %d\n",
268 ret = __sev_mirror_create(sev_vm->fd, sev_es_vm->fd);
270 ret == -1 && errno == EINVAL,
271 "Should not be able copy context to SEV enabled VM. ret: %d, errno: %d\n",
274 ret = __sev_mirror_create(sev_es_vm->fd, sev_vm->fd);
276 ret == -1 && errno == EINVAL,
277 "Should not be able copy context to SEV-ES enabled VM. ret: %d, errno: %d\n",
280 ret = __sev_mirror_create(vm_no_vcpu->fd, vm_with_vcpu->fd);
281 TEST_ASSERT(ret == -1 && errno == EINVAL,
282 "Copy context requires SEV enabled. ret %d, errno: %d\n", ret,
285 ret = __sev_mirror_create(vm_with_vcpu->fd, sev_vm->fd);
287 ret == -1 && errno == EINVAL,
288 "SEV copy context requires no vCPUS on the destination. ret: %d, errno: %d\n",
292 kvm_vm_free(sev_es_vm);
293 kvm_vm_free(vm_with_vcpu);
294 kvm_vm_free(vm_no_vcpu);
297 static void test_sev_move_copy(void)
299 struct kvm_vm *dst_vm, *sev_vm, *mirror_vm, *dst_mirror_vm;
302 sev_vm = sev_vm_create(/* es= */ false);
303 dst_vm = aux_vm_create(true);
304 mirror_vm = aux_vm_create(false);
305 dst_mirror_vm = aux_vm_create(false);
307 sev_mirror_create(mirror_vm->fd, sev_vm->fd);
308 ret = __sev_migrate_from(dst_vm->fd, sev_vm->fd);
309 TEST_ASSERT(ret == -1 && errno == EBUSY,
310 "Cannot migrate VM that has mirrors. ret %d, errno: %d\n", ret,
313 /* The mirror itself can be migrated. */
314 sev_migrate_from(dst_mirror_vm->fd, mirror_vm->fd);
315 ret = __sev_migrate_from(dst_vm->fd, sev_vm->fd);
316 TEST_ASSERT(ret == -1 && errno == EBUSY,
317 "Cannot migrate VM that has mirrors. ret %d, errno: %d\n", ret,
321 * mirror_vm is not a mirror anymore, dst_mirror_vm is. Thus,
322 * the owner can be copied as soon as dst_mirror_vm is gone.
324 kvm_vm_free(dst_mirror_vm);
325 sev_migrate_from(dst_vm->fd, sev_vm->fd);
327 kvm_vm_free(mirror_vm);
332 int main(int argc, char *argv[])
334 if (kvm_check_cap(KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM)) {
335 test_sev_migrate_from(/* es= */ false);
336 test_sev_migrate_from(/* es= */ true);
337 test_sev_migrate_locking();
338 test_sev_migrate_parameters();
339 if (kvm_check_cap(KVM_CAP_VM_COPY_ENC_CONTEXT_FROM))
340 test_sev_move_copy();
342 if (kvm_check_cap(KVM_CAP_VM_COPY_ENC_CONTEXT_FROM)) {
343 test_sev_mirror(/* es= */ false);
344 test_sev_mirror(/* es= */ true);
345 test_sev_mirror_parameters();