From nobody Sun Sep 14 14:53:50 2025 Received: from mail-pg1-f201.google.com (mail-pg1-f201.google.com [209.85.215.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9DFA7299948 for ; Thu, 4 Sep 2025 06:55:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756968925; cv=none; b=VohpKrTyjVAbyDI5LjE6EF/bVbdZ8ic0b8OKigIxtt7ksq6v8J90Aln8KgxR1sZJtPmFTi+CYR5Hbe9WpEA58+XFN+yJ7o4SCxpAfa1GSV7kqdMxS3+WJeKRF6XTwcYkIGYadV4KgB2A4s2IXClv5XU27eJ0K1u6zGEFiyRrN/I= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756968925; c=relaxed/simple; bh=GeCmIZcp73sN4bfgUEfC130l9bcLrxWIZQUoDTJWL1U=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=k8VlAxFSWl8uai4LrMXR63ENVens0mGFbHPs/Wtwc6LPGoXsoZV8nyG39Y+SzC6hpfFMXTeuMK96NuwhzCAB+Tsntfd/Nf3YsokVvgkLmlolfW13LDqe6gCmE8kdukhIOfzGGUfEBZx8wMbOUSlbQueh+ls/RcLJdpuT31/En2k= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--sagis.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=KBkF1H2F; arc=none smtp.client-ip=209.85.215.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--sagis.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="KBkF1H2F" Received: by mail-pg1-f201.google.com with SMTP id 41be03b00d2f7-b47174c65b0so875662a12.2 for ; Wed, 03 Sep 2025 23:55:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1756968923; x=1757573723; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=NlHmyC/s2DMAn4LeE4kWGtmiYzzcSa5Wh+lZGt38VW0=; b=KBkF1H2FUITBXxNjfkhEI+4ye7TYibkiqkRYtXLgLAINJioYe7VrDcB2e0cvEvWXqD Ps89GW/WqG/x7C5m3AEyekupgO2CK7sBPhq/KJ6mmn18rzJlqp5/IvdptRpvwvC3JmCJ nFx+fJmzs8n/SFkcItBUEfaq5B/Y+1qh47DfNsS+YPUD0oHl6xshVoMJx+8oEXQxiVnU xJLdqHRYk9NPakR3WumBPcuI1Rd/l0DSVfM1zmW5Yrk9K+Q5KuY7gJRM0603c+YE3Mml YOzOdiL0TjcXvaaA9kwM8QlgzNMV4hEpovWqQciN5vFFollH3rcqTtdyYsjHFNO2RX3H J9rA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756968923; x=1757573723; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=NlHmyC/s2DMAn4LeE4kWGtmiYzzcSa5Wh+lZGt38VW0=; b=FdteNs7tlDFJjp5JQyxdpoS9PK+gwnXxuTfA/x8zfmQhXsD0jbQy4L/58nOcMtB7E0 spU2gd8m/5C5y1YUxRQevwuXBH2dXv0Uo8EdwZ7nypogZdHuPiWn43JTVpfNet9TY6FU EUyn+sO+c4xYTk+0yEqjxuvh/p9t5/hnKlcPrD/RT3+IDdk977h4zxeEgg2Ed8BofJ0M fgktudzKpmlA8UW5n/7EtfLlAXm8cvDgOXstirpLNQ+5Ggt3XKEpkAjj+PwWN7UkWVvb zKW49nTWu7byPBYvc6O3VyHNuX2DW3GrHL0CTfZiORD7ky/GyjxJKXE1Fa4KPnpPSIi/ cXgQ== X-Gm-Message-State: AOJu0Yyfc136snKokND/keMQzNu3DGVQa79WuvyeYGd2UdWJO/D63Dua Kbq2omXMYLcy81yTea0jfyzknLQyfwIVCXvjcZ9/VxQh+RwGAbR8f5BH7HKXqKK28dvpjPUwNVb 0QA== X-Google-Smtp-Source: AGHT+IFMenAkmxXYl1G7PJiglG5TLw/xUAw89iop9i9/oF33+c4PpyUOod1RcjChgVfS6I66JQJF7Gpydg== X-Received: from pfbbv7.prod.google.com ([2002:a05:6a00:4147:b0:772:46da:4dd1]) (user=sagis job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a21:33a9:b0:24c:1f78:1803 with SMTP id adf61e73a8af0-24c1f783314mr1248402637.38.1756968923008; Wed, 03 Sep 2025 23:55:23 -0700 (PDT) Date: Wed, 3 Sep 2025 23:54:43 -0700 In-Reply-To: <20250904065453.639610-1-sagis@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20250904065453.639610-1-sagis@google.com> X-Mailer: git-send-email 2.51.0.338.gd7d06c2dae-goog Message-ID: <20250904065453.639610-14-sagis@google.com> Subject: [PATCH v10 13/21] KVM: selftests: Add helpers to init TDX memory and finalize VM From: Sagi Shahar To: linux-kselftest@vger.kernel.org, Paolo Bonzini , Shuah Khan , Sean Christopherson , Ackerley Tng , Ryan Afranji , Andrew Jones , Isaku Yamahata , Erdem Aktas , Rick Edgecombe , Sagi Shahar , Roger Wang , Binbin Wu , Oliver Upton , "Pratik R. Sampat" , Reinette Chatre , Ira Weiny , Chao Gao , Chenyi Qiang Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Ackerley Tng TDX protected memory needs to be measured and encrypted before it can be used by the guest. Traverse the VM's memory regions and initialize all the protected ranges by calling KVM_TDX_INIT_MEM_REGION. Once all the memory is initialized, the VM can be finalized by calling KVM_TDX_FINALIZE_VM. Signed-off-by: Ackerley Tng Co-developed-by: Erdem Aktas Signed-off-by: Erdem Aktas Co-developed-by: Sagi Shahar Signed-off-by: Sagi Shahar --- .../selftests/kvm/include/x86/tdx/tdx_util.h | 2 + .../selftests/kvm/lib/x86/tdx/tdx_util.c | 61 +++++++++++++++++++ 2 files changed, 63 insertions(+) diff --git a/tools/testing/selftests/kvm/include/x86/tdx/tdx_util.h b/tools= /testing/selftests/kvm/include/x86/tdx/tdx_util.h index a2509959c7ce..2467b6c35557 100644 --- a/tools/testing/selftests/kvm/include/x86/tdx/tdx_util.h +++ b/tools/testing/selftests/kvm/include/x86/tdx/tdx_util.h @@ -71,4 +71,6 @@ void vm_tdx_load_common_boot_parameters(struct kvm_vm *vm= ); void vm_tdx_load_vcpu_boot_parameters(struct kvm_vm *vm, struct kvm_vcpu *= vcpu); void vm_tdx_set_vcpu_entry_point(struct kvm_vcpu *vcpu, void *guest_code); =20 +void vm_tdx_finalize(struct kvm_vm *vm); + #endif // SELFTESTS_TDX_TDX_UTIL_H diff --git a/tools/testing/selftests/kvm/lib/x86/tdx/tdx_util.c b/tools/tes= ting/selftests/kvm/lib/x86/tdx/tdx_util.c index 1b5c01faf1cd..d5df2de81a75 100644 --- a/tools/testing/selftests/kvm/lib/x86/tdx/tdx_util.c +++ b/tools/testing/selftests/kvm/lib/x86/tdx/tdx_util.c @@ -273,3 +273,64 @@ void vm_tdx_init_vm(struct kvm_vm *vm, uint64_t attrib= utes) =20 free(init_vm); } + +static void tdx_init_mem_region(struct kvm_vm *vm, void *source_pages, + uint64_t gpa, uint64_t size) +{ + uint32_t metadata =3D KVM_TDX_MEASURE_MEMORY_REGION; + struct kvm_tdx_init_mem_region mem_region =3D { + .source_addr =3D (uint64_t)source_pages, + .gpa =3D gpa, + .nr_pages =3D size / PAGE_SIZE, + }; + struct kvm_vcpu *vcpu; + + vcpu =3D list_first_entry_or_null(&vm->vcpus, struct kvm_vcpu, list); + + TEST_ASSERT((mem_region.nr_pages > 0) && + ((mem_region.nr_pages * PAGE_SIZE) =3D=3D size), + "Cannot add partial pages to the guest memory.\n"); + TEST_ASSERT(((uint64_t)source_pages & (PAGE_SIZE - 1)) =3D=3D 0, + "Source memory buffer is not page aligned\n"); + vm_tdx_vcpu_ioctl(vcpu, KVM_TDX_INIT_MEM_REGION, metadata, &mem_region); +} + +static void load_td_private_memory(struct kvm_vm *vm) +{ + struct userspace_mem_region *region; + int ctr; + + hash_for_each(vm->regions.slot_hash, ctr, region, slot_node) { + const struct sparsebit *protected_pages =3D region->protected_phy_pages; + const vm_paddr_t gpa_base =3D region->region.guest_phys_addr; + const uint64_t hva_base =3D region->region.userspace_addr; + const sparsebit_idx_t lowest_page_in_region =3D gpa_base >> vm->page_shi= ft; + + sparsebit_idx_t i; + sparsebit_idx_t j; + + if (!sparsebit_any_set(protected_pages)) + continue; + + TEST_ASSERT(region->region.guest_memfd !=3D -1, + "TD private memory must be backed by guest_memfd"); + + sparsebit_for_each_set_range(protected_pages, i, j) { + const uint64_t size_to_load =3D (j - i + 1) * vm->page_size; + const uint64_t offset =3D + (i - lowest_page_in_region) * vm->page_size; + const uint64_t hva =3D hva_base + offset; + const uint64_t gpa =3D gpa_base + offset; + + vm_set_memory_attributes(vm, gpa, size_to_load, + KVM_MEMORY_ATTRIBUTE_PRIVATE); + tdx_init_mem_region(vm, (void *)hva, gpa, size_to_load); + } + } +} + +void vm_tdx_finalize(struct kvm_vm *vm) +{ + load_td_private_memory(vm); + vm_tdx_vm_ioctl(vm, KVM_TDX_FINALIZE_VM, 0, NULL); +} --=20 2.51.0.338.gd7d06c2dae-goog