lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4984cba7-427a-4065-9fcc-97b9f67163ed@amd.com>
Date: Mon, 21 Oct 2024 15:23:25 -0500
From: "Pratik R. Sampat" <pratikrajesh.sampat@....com>
To: Sean Christopherson <seanjc@...gle.com>
CC: <kvm@...r.kernel.org>, <pbonzini@...hat.com>, <pgonda@...gle.com>,
	<thomas.lendacky@....com>, <michael.roth@....com>, <shuah@...nel.org>,
	<linux-kselftest@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v3 2/9] KVM: selftests: Add a basic SNP smoke test

Hi Sean,

Thank you for your comments.
...

>>  .../selftests/kvm/include/x86_64/processor.h  |   1 +
>>  .../selftests/kvm/include/x86_64/sev.h        |  54 +++++++-
>>  tools/testing/selftests/kvm/lib/kvm_util.c    |   8 +-
>>  .../selftests/kvm/lib/x86_64/processor.c      |   6 +-
>>  tools/testing/selftests/kvm/lib/x86_64/sev.c  | 116 +++++++++++++++++-
>>  .../selftests/kvm/x86_64/sev_smoke_test.c     |  67 ++++++++--
>>  6 files changed, 230 insertions(+), 22 deletions(-)
> 
> There is *way* too much going on in this one patch.  There's at least 6+ patches
> worth of stuff here:
> 
>  1. Add x86 architectural defines
>  2. SNP ioctl() plumbing
>  3..N. Other misc plumbing, e.g. is_smt_active()
>  N+1. __vm_create() change to force GUEST_MEMFD for SNP
>  N+2. Whatever the ASSERT_SEV_POLICY() thing is doing, if it's actually necessary
>  N+3..M. Refactorings to existing code to prep for SNP
>  M+1. SNP support
> 
> In general, if you feel the urge to start a changelog paragraph with "Also,"
> that's a sign you need to break up the patch.

Sure. I will split this into multiple patches which should
form the basis of the #1 patch series.

> 
>> @@ -74,8 +95,18 @@ kvm_static_assert(SEV_RET_SUCCESS == 0);
>>  	__TEST_ASSERT_VM_VCPU_IOCTL(!ret, #cmd,	ret, vm);		\
>>  })
>>  
>> +/* Ensure policy is within bounds for SEV, SEV-ES */
>> +#define ASSERT_SEV_POLICY(type, policy)				\
>> +({									\
>> +	if (type == KVM_X86_SEV_VM || type == KVM_X86_SEV_ES_VM) {	\
>> +		TEST_ASSERT(policy < ((uint32_t)~0U),			\
>> +			    "Policy beyond bounds for SEV");		\
> 
> This is asinine.  First, there's one user, i.e. I see no reason to have a funky
> macro to assert on the type.  Second, _if_ this is a common macro, "type" can and
> should be incorporated into the assert.  Third, I have no idea why selftests is
> validating its own inputs to KVM.

It wasn't strictly necessary to validate this. Since the function
vm_sev_launch() now took a u64 in policy (for SNP), I thought it maybe
useful to validate u32 for the rest, as library function can be called
by other selftests as well. However, I do see your point that it doesn't
make too much sense for selftests to try and validate it's own inputs.

I'm open to both - reducing the macro to a just a check within the
function or removing the macro altogether.

> 
>> diff --git a/tools/testing/selftests/kvm/lib/x86_64/processor.c b/tools/testing/selftests/kvm/lib/x86_64/processor.c
>> index 974bcd2df6d7..981f3c9fd1cf 100644
>> --- a/tools/testing/selftests/kvm/lib/x86_64/processor.c
>> +++ b/tools/testing/selftests/kvm/lib/x86_64/processor.c
>> @@ -625,7 +625,8 @@ void kvm_arch_vm_post_create(struct kvm_vm *vm)
>>  	sync_global_to_guest(vm, host_cpu_is_amd);
>>  	sync_global_to_guest(vm, is_forced_emulation_enabled);
>>  
>> -	if (vm->type == KVM_X86_SEV_VM || vm->type == KVM_X86_SEV_ES_VM) {
>> +	if (vm->type == KVM_X86_SEV_VM || vm->type == KVM_X86_SEV_ES_VM ||
>> +	    vm->type == KVM_X86_SNP_VM) {
> 
> Probably time to add a helper, e.g. is_sev_vm() or something.  If we follow KVM's
> lead, then we'd have is_sev_vm(), is_sev_es_vm(), and is_sev_snp_vm(), where an
> SNP VM returns true for all of them.  Not sure I love that idea, just throwing it
> out there as one possibility.

Agreed. It will be cleaner to have helpers since similar checks are
being made in multiple places.

> 
>>  		struct kvm_sev_init init = { 0 };
>>  
>>  		vm_sev_ioctl(vm, KVM_SEV_INIT2, &init);
>> @@ -1134,7 +1135,8 @@ void kvm_get_cpu_address_width(unsigned int *pa_bits, unsigned int *va_bits)
>>  
>>  void kvm_init_vm_address_properties(struct kvm_vm *vm)
>>  {
>> -	if (vm->type == KVM_X86_SEV_VM || vm->type == KVM_X86_SEV_ES_VM) {
>> +	if (vm->type == KVM_X86_SEV_VM || vm->type == KVM_X86_SEV_ES_VM ||
>> +	    vm->type == KVM_X86_SNP_VM) {
>>  		vm->arch.sev_fd = open_sev_dev_path_or_exit();
>>  		vm->arch.c_bit = BIT_ULL(this_cpu_property(X86_PROPERTY_SEV_C_BIT));
>>  		vm->gpa_tag_mask = vm->arch.c_bit;
>> diff --git a/tools/testing/selftests/kvm/lib/x86_64/sev.c b/tools/testing/selftests/kvm/lib/x86_64/sev.c
>> index 125a72246e09..ff3824564854 100644
>> --- a/tools/testing/selftests/kvm/lib/x86_64/sev.c
>> +++ b/tools/testing/selftests/kvm/lib/x86_64/sev.c
>> @@ -14,7 +14,8 @@
>>   * and find the first range, but that's correct because the condition
>>   * expression would cause us to quit the loop.
>>   */
>> -static int encrypt_region(struct kvm_vm *vm, struct userspace_mem_region *region)
>> +static int encrypt_region(struct kvm_vm *vm, struct userspace_mem_region *region,
>> +			  uint8_t page_type)
>>  {
>>  	const struct sparsebit *protected_phy_pages = region->protected_phy_pages;
>>  	const vm_paddr_t gpa_base = region->region.guest_phys_addr;
>> @@ -25,12 +26,23 @@ static int encrypt_region(struct kvm_vm *vm, struct userspace_mem_region *region
>>  	if (!sparsebit_any_set(protected_phy_pages))
>>  		return 0;
>>  
>> -	sev_register_encrypted_memory(vm, region);
>> +	if (vm->type == KVM_X86_SEV_VM || vm->type == KVM_X86_SEV_ES_VM)
> 
> And then this would be
> 
> 	if (!is_sev_snp_vm())

Ack.

> 
>> +		sev_register_encrypted_memory(vm, region);
>>  
>>  	sparsebit_for_each_set_range(protected_phy_pages, i, j) {
>>  		const uint64_t size = (j - i + 1) * vm->page_size;
>>  		const uint64_t offset = (i - lowest_page_in_region) * vm->page_size;
>>  
>> +		if (vm->type == KVM_X86_SNP_VM) {
>> +			vm_mem_set_private(vm, gpa_base + offset, size);
> 
> Setting memory private seems like something that should be done by common code,
> not by SNP specific code.

That's fair. I will make a helper for this and call this common code
separate from encrypt_region()

> 
>> @@ -158,6 +213,45 @@ void sev_vm_launch_finish(struct kvm_vm *vm)
>>  	TEST_ASSERT_EQ(status.state, SEV_GUEST_STATE_RUNNING);
>>  }
>>  
>> +void snp_vm_launch_start(struct kvm_vm *vm, uint64_t policy)
>> +{
>> +	int ret = __snp_vm_launch_start(vm, policy, 0);
>> +
>> +	TEST_ASSERT_VM_VCPU_IOCTL(!ret, KVM_SEV_SNP_LAUNCH_START, ret, vm);
> 
> Please use vm_ioctl().  TEST_ASSERT_VM_VCPU_IOCTL() should pretty much never be
> used directly, the only exceptions are cases where '0' is not the only success
> value, e.g. for ioctls that return a file descriptor.

Sure. This was done for trying to be inclusive for the negative cases by
decoupling ioctl calls from their asserts. Since, code for negative
tests is are going to architected separately altogether, I will make
sure to clean this up with vm_ioctl() everywhere.

>> +static void guest_snp_code(void)
>> +{
>> +	GUEST_ASSERT(rdmsr(MSR_AMD64_SEV) & MSR_AMD64_SEV_ENABLED);
>> +	GUEST_ASSERT(rdmsr(MSR_AMD64_SEV) & MSR_AMD64_SEV_ES_ENABLED);
>> +	GUEST_ASSERT(rdmsr(MSR_AMD64_SEV) & MSR_AMD64_SEV_SNP_ENABLED);
> 
> Read the MSR once.
> 
>> +
>> +	wrmsr(MSR_AMD64_SEV_ES_GHCB, GHCB_MSR_TERM_REQ);
>> +	__asm__ __volatile__("rep; vmmcall");
> 
> Please add a vmgexit() helper (which I should have done as part of commit
> 40e09b3ccfac ("KVM: selftests: Add a basic SEV-ES smoke test")).
> 

Sure, will do so for this and apply to the other guest_code as well.

>> +}
>> +
>>  static void guest_sev_es_code(void)
>>  {
>>  	/* TODO: Check CPUID after GHCB-based hypercall support is added. */
>> @@ -61,7 +82,7 @@ static void compare_xsave(u8 *from_host, u8 *from_guest)
>>  		abort();
>>  }
>>  
>> -static void test_sync_vmsa(uint32_t policy)
>> +static void test_sync_vmsa(uint32_t type, uint64_t policy)
>>  {
>>  	struct kvm_vcpu *vcpu;
>>  	struct kvm_vm *vm;
>> @@ -77,7 +98,10 @@ static void test_sync_vmsa(uint32_t policy)
>>  		.xcrs[0].value = XFEATURE_MASK_X87_AVX,
>>  	};
>>  
>> -	vm = vm_sev_create_with_one_vcpu(KVM_X86_SEV_ES_VM, guest_code_xsave, &vcpu);
>> +	TEST_ASSERT(type != KVM_X86_SEV_VM,
>> +		    "sync_vmsa only supported for SEV-ES and SNP VM types");
>> +
>> +	vm = vm_sev_create_with_one_vcpu(type, guest_code_xsave, &vcpu);
>>  	gva = vm_vaddr_alloc_shared(vm, PAGE_SIZE, KVM_UTIL_MIN_VADDR,
>>  				    MEM_REGION_TEST_DATA);
>>  	hva = addr_gva2hva(vm, gva);
>> @@ -99,7 +123,7 @@ static void test_sync_vmsa(uint32_t policy)
>>  	    : "ymm4", "st", "st(1)", "st(2)", "st(3)", "st(4)", "st(5)", "st(6)", "st(7)");
>>  	vcpu_xsave_set(vcpu, &xsave);
>>  
>> -	vm_sev_launch(vm, SEV_POLICY_ES | policy, NULL);
>> +	vm_sev_launch(vm, policy, NULL);
>>  
>>  	/* This page is shared, so make it decrypted.  */
>>  	memset(hva, 0, 4096);
>> @@ -118,14 +142,12 @@ static void test_sync_vmsa(uint32_t policy)
>>  	kvm_vm_free(vm);
>>  }
>>  
>> -static void test_sev(void *guest_code, uint64_t policy)
>> +static void test_sev(void *guest_code, uint32_t type, uint64_t policy)
>>  {
>>  	struct kvm_vcpu *vcpu;
>>  	struct kvm_vm *vm;
>>  	struct ucall uc;
>>  
>> -	uint32_t type = policy & SEV_POLICY_ES ? KVM_X86_SEV_ES_VM : KVM_X86_SEV_VM;
>> -
>>  	vm = vm_sev_create_with_one_vcpu(type, guest_code, &vcpu);
>>  
>>  	/* TODO: Validate the measurement is as expected. */
>> @@ -134,7 +156,7 @@ static void test_sev(void *guest_code, uint64_t policy)
>>  	for (;;) {
>>  		vcpu_run(vcpu);
>>  
>> -		if (policy & SEV_POLICY_ES) {
>> +		if (vm->type == KVM_X86_SEV_ES_VM || vm->type == KVM_X86_SNP_VM) {
>>  			TEST_ASSERT(vcpu->run->exit_reason == KVM_EXIT_SYSTEM_EVENT,
>>  				    "Wanted SYSTEM_EVENT, got %s",
>>  				    exit_reason_str(vcpu->run->exit_reason));
>> @@ -194,19 +216,38 @@ int main(int argc, char *argv[])
>>  {
>>  	TEST_REQUIRE(kvm_cpu_has(X86_FEATURE_SEV));
>>  
>> -	test_sev(guest_sev_code, SEV_POLICY_NO_DBG);
>> -	test_sev(guest_sev_code, 0);
>> +	test_sev(guest_sev_code, KVM_X86_SEV_VM, SEV_POLICY_NO_DBG);
>> +	test_sev(guest_sev_code, KVM_X86_SEV_VM, 0);
> 
> To cut down on the amount of copy+paste, and line lengths, I vote to add separate
> wrappers, e.g.
> 
> 	test_sev(<policy>)
> 	test_sev_es(<policy>)
> 	test_sev_snp(<policy>);

Sure.

>>  
>>  	if (kvm_cpu_has(X86_FEATURE_SEV_ES)) {
>> -		test_sev(guest_sev_es_code, SEV_POLICY_ES | SEV_POLICY_NO_DBG);
>> -		test_sev(guest_sev_es_code, SEV_POLICY_ES);
>> +		test_sev(guest_sev_es_code, KVM_X86_SEV_ES_VM, SEV_POLICY_ES | SEV_POLICY_NO_DBG);
> 
> Please wrap at ~80 chars.

Ack. Will do.

> 
> 
>> +		test_sev(guest_sev_es_code, KVM_X86_SEV_ES_VM, SEV_POLICY_ES);
>>  
>>  		test_sev_es_shutdown();
>>  
>>  		if (kvm_has_cap(KVM_CAP_XCRS) &&
>>  		    (xgetbv(0) & XFEATURE_MASK_X87_AVX) == XFEATURE_MASK_X87_AVX) {
>> -			test_sync_vmsa(0);
>> -			test_sync_vmsa(SEV_POLICY_NO_DBG);
>> +			test_sync_vmsa(KVM_X86_SEV_ES_VM, SEV_POLICY_ES);
>> +			test_sync_vmsa(KVM_X86_SEV_ES_VM, SEV_POLICY_ES | SEV_POLICY_NO_DBG);
>> +		}
>> +	}
>> +
>> +	if (kvm_cpu_has(X86_FEATURE_SNP) && is_kvm_snp_supported()) {
> 
> Why do we need both?  KVM shouldn't advertise SNP if it's not supported.

My rationale behind needing this was that the feature can be advertised
but it may not have the right API major or minor release which could be
updated post boot and could determine it's support during runtime.

> 
>> +		unsigned long snp_policy = SNP_POLICY;
> 
> u64, no?

Yes, sorry for the oversight. Will change it to u64.

> 
>> +
>> +		if (unlikely(!is_smt_active()))
>> +			snp_policy &= ~SNP_POLICY_SMT;
> 
> Why does SNP_POLICY assume SMT?  And what is RSVD_MBO?  E.g. why not this?
> 
> 		u64 policy = is_smt_active() ? SNP_POLICY_SMT : SNP_POLICY;
> 

I think most systems support SMT so I enabled the bit in by default and
only unset it when there isn't any support.

RSVD_MBO is a reserved bit that must be set to one for SNP guest policy
to be enabled. The FW spec specifies this - Sec 4.3 Pg 27 - Guest Policy
https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56860.pdf

>> +
>> +		test_sev(guest_snp_code, KVM_X86_SNP_VM, snp_policy);
>> +		/* Test minimum firmware level */
>> +		test_sev(guest_snp_code, KVM_X86_SNP_VM,
>> +			 snp_policy |
>> +			 SNP_FW_VER_MAJOR(SNP_FW_REQ_VER_MAJOR) |
>> +			 SNP_FW_VER_MINOR(SNP_FW_REQ_VER_MINOR));
>> +
>> +		if (kvm_has_cap(KVM_CAP_XCRS) &&
>> +		    (xgetbv(0) & XFEATURE_MASK_X87_AVX) == XFEATURE_MASK_X87_AVX) {
> 
> Curly braces are unnecessary.

Ack.

Thanks again for the detailed review!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ