selftests: KVM: sev_migrate_tests: Add mirror command tests
Add tests to confirm mirror vms can only run correct subset of commands. Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: Sean Christopherson <seanjc@google.com> Cc: Marc Orr <marcorr@google.com> Signed-off-by: Peter Gonda <pgonda@google.com> Message-Id: <20211208191642.3792819-4-pgonda@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
427d046a41
commit
a6fec53947
@ -21,7 +21,7 @@
|
|||||||
#define NR_LOCK_TESTING_THREADS 3
|
#define NR_LOCK_TESTING_THREADS 3
|
||||||
#define NR_LOCK_TESTING_ITERATIONS 10000
|
#define NR_LOCK_TESTING_ITERATIONS 10000
|
||||||
|
|
||||||
static void sev_ioctl(int vm_fd, int cmd_id, void *data)
|
static int __sev_ioctl(int vm_fd, int cmd_id, void *data, __u32 *fw_error)
|
||||||
{
|
{
|
||||||
struct kvm_sev_cmd cmd = {
|
struct kvm_sev_cmd cmd = {
|
||||||
.id = cmd_id,
|
.id = cmd_id,
|
||||||
@ -30,11 +30,20 @@ static void sev_ioctl(int vm_fd, int cmd_id, void *data)
|
|||||||
};
|
};
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
|
||||||
ret = ioctl(vm_fd, KVM_MEMORY_ENCRYPT_OP, &cmd);
|
ret = ioctl(vm_fd, KVM_MEMORY_ENCRYPT_OP, &cmd);
|
||||||
TEST_ASSERT(ret == 0 && cmd.error == SEV_RET_SUCCESS,
|
*fw_error = cmd.error;
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void sev_ioctl(int vm_fd, int cmd_id, void *data)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
__u32 fw_error;
|
||||||
|
|
||||||
|
ret = __sev_ioctl(vm_fd, cmd_id, data, &fw_error);
|
||||||
|
TEST_ASSERT(ret == 0 && fw_error == SEV_RET_SUCCESS,
|
||||||
"%d failed: return code: %d, errno: %d, fw error: %d",
|
"%d failed: return code: %d, errno: %d, fw error: %d",
|
||||||
cmd_id, ret, errno, cmd.error);
|
cmd_id, ret, errno, fw_error);
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct kvm_vm *sev_vm_create(bool es)
|
static struct kvm_vm *sev_vm_create(bool es)
|
||||||
@ -226,6 +235,42 @@ static void sev_mirror_create(int dst_fd, int src_fd)
|
|||||||
TEST_ASSERT(!ret, "Copying context failed, ret: %d, errno: %d\n", ret, errno);
|
TEST_ASSERT(!ret, "Copying context failed, ret: %d, errno: %d\n", ret, errno);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void verify_mirror_allowed_cmds(int vm_fd)
|
||||||
|
{
|
||||||
|
struct kvm_sev_guest_status status;
|
||||||
|
|
||||||
|
for (int cmd_id = KVM_SEV_INIT; cmd_id < KVM_SEV_NR_MAX; ++cmd_id) {
|
||||||
|
int ret;
|
||||||
|
__u32 fw_error;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* These commands are allowed for mirror VMs, all others are
|
||||||
|
* not.
|
||||||
|
*/
|
||||||
|
switch (cmd_id) {
|
||||||
|
case KVM_SEV_LAUNCH_UPDATE_VMSA:
|
||||||
|
case KVM_SEV_GUEST_STATUS:
|
||||||
|
case KVM_SEV_DBG_DECRYPT:
|
||||||
|
case KVM_SEV_DBG_ENCRYPT:
|
||||||
|
continue;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* These commands should be disallowed before the data
|
||||||
|
* parameter is examined so NULL is OK here.
|
||||||
|
*/
|
||||||
|
ret = __sev_ioctl(vm_fd, cmd_id, NULL, &fw_error);
|
||||||
|
TEST_ASSERT(
|
||||||
|
ret == -1 && errno == EINVAL,
|
||||||
|
"Should not be able call command: %d. ret: %d, errno: %d\n",
|
||||||
|
cmd_id, ret, errno);
|
||||||
|
}
|
||||||
|
|
||||||
|
sev_ioctl(vm_fd, KVM_SEV_GUEST_STATUS, &status);
|
||||||
|
}
|
||||||
|
|
||||||
static void test_sev_mirror(bool es)
|
static void test_sev_mirror(bool es)
|
||||||
{
|
{
|
||||||
struct kvm_vm *src_vm, *dst_vm;
|
struct kvm_vm *src_vm, *dst_vm;
|
||||||
@ -243,6 +288,8 @@ static void test_sev_mirror(bool es)
|
|||||||
if (es)
|
if (es)
|
||||||
sev_ioctl(dst_vm->fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL);
|
sev_ioctl(dst_vm->fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL);
|
||||||
|
|
||||||
|
verify_mirror_allowed_cmds(dst_vm->fd);
|
||||||
|
|
||||||
kvm_vm_free(src_vm);
|
kvm_vm_free(src_vm);
|
||||||
kvm_vm_free(dst_vm);
|
kvm_vm_free(dst_vm);
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user