lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7fe79fb3-d54d-43ea-9dc2-879909434fdd@linux.intel.com>
Date: Thu, 14 Aug 2025 14:11:27 +0800
From: Binbin Wu <binbin.wu@...ux.intel.com>
To: Chenyi Qiang <chenyi.qiang@...el.com>, Sagi Shahar <sagis@...gle.com>
Cc: linux-kselftest@...r.kernel.org, Paolo Bonzini <pbonzini@...hat.com>,
 Shuah Khan <shuah@...nel.org>, Sean Christopherson <seanjc@...gle.com>,
 Ackerley Tng <ackerleytng@...gle.com>, Ryan Afranji <afranji@...gle.com>,
 Andrew Jones <ajones@...tanamicro.com>,
 Isaku Yamahata <isaku.yamahata@...el.com>,
 Erdem Aktas <erdemaktas@...gle.com>,
 Rick Edgecombe <rick.p.edgecombe@...el.com>,
 Roger Wang <runanwang@...gle.com>, Oliver Upton <oliver.upton@...ux.dev>,
 "Pratik R. Sampat" <pratikrajesh.sampat@....com>,
 Reinette Chatre <reinette.chatre@...el.com>, Ira Weiny
 <ira.weiny@...el.com>, linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: Re: [PATCH v8 12/30] KVM: selftests: TDX: Add basic TDX CPUID test



On 8/14/2025 11:20 AM, Chenyi Qiang wrote:
>
> On 8/8/2025 4:16 AM, Sagi Shahar wrote:
>> The test reads CPUID values from inside a TD VM and compare them

compare -> compares


>> to expected values.
>>
>> The test targets CPUID values which are virtualized as "As Configured",
>> "As Configured (if Native)", "Calculated", "Fixed" and "Native"
>> according to the TDX spec.
>>
>> Co-developed-by: Isaku Yamahata <isaku.yamahata@...el.com>
>> Signed-off-by: Isaku Yamahata <isaku.yamahata@...el.com>
>> Signed-off-by: Sagi Shahar <sagis@...gle.com>
>> ---
>>   .../selftests/kvm/include/x86/tdx/test_util.h | 15 +++
>>   .../selftests/kvm/lib/x86/tdx/test_util.c     | 20 ++++
>>   tools/testing/selftests/kvm/x86/tdx_vm_test.c | 98 ++++++++++++++++++-
>>   3 files changed, 132 insertions(+), 1 deletion(-)
>>
>> diff --git a/tools/testing/selftests/kvm/include/x86/tdx/test_util.h b/tools/testing/selftests/kvm/include/x86/tdx/test_util.h
>> index cf11955d56d6..2af6e810ef78 100644
>> --- a/tools/testing/selftests/kvm/include/x86/tdx/test_util.h
>> +++ b/tools/testing/selftests/kvm/include/x86/tdx/test_util.h
>> @@ -9,6 +9,9 @@
>>   #define TDX_TEST_SUCCESS_PORT 0x30
>>   #define TDX_TEST_SUCCESS_SIZE 4
>>   
>> +#define TDX_TEST_REPORT_PORT 0x31
>> +#define TDX_TEST_REPORT_SIZE 4
>> +
>>   /* Port I/O direction */
>>   #define PORT_READ	0
>>   #define PORT_WRITE	1
>> @@ -77,4 +80,16 @@ void tdx_test_fatal_with_data(uint64_t error_code, uint64_t data_gpa);
>>    */
>>   void tdx_assert_error(uint64_t error);
>>   
>> +/*
>> + * Report a 32 bit value from the guest to user space using TDG.VP.VMCALL
>> + * <Instruction.IO> call. Data is reported on port TDX_TEST_REPORT_PORT.
>> + */
>> +uint64_t tdx_test_report_to_user_space(uint32_t data);
>> +
>> +/*
>> + * Read a 32 bit value from the guest in user space, sent using
>> + * tdx_test_report_to_user_space().
>> + */
>> +uint32_t tdx_test_read_report_from_guest(struct kvm_vcpu *vcpu);
>> +
>>   #endif // SELFTEST_TDX_TEST_UTIL_H
>> diff --git a/tools/testing/selftests/kvm/lib/x86/tdx/test_util.c b/tools/testing/selftests/kvm/lib/x86/tdx/test_util.c
>> index 4ccc5298ba25..f9bde114a8bc 100644
>> --- a/tools/testing/selftests/kvm/lib/x86/tdx/test_util.c
>> +++ b/tools/testing/selftests/kvm/lib/x86/tdx/test_util.c
>> @@ -104,3 +104,23 @@ void tdx_assert_error(uint64_t error)
>>   	if (error)
>>   		tdx_test_fatal(error);
>>   }
>> +
>> +uint64_t tdx_test_report_to_user_space(uint32_t data)
>> +{
>> +	/* Upcast data to match tdg_vp_vmcall_instruction_io() signature */
>> +	uint64_t data_64 = data;
>> +
>> +	return tdg_vp_vmcall_instruction_io(TDX_TEST_REPORT_PORT,
>> +					    TDX_TEST_REPORT_SIZE, PORT_WRITE,
>> +					    &data_64);
>> +}
>> +
>> +uint32_t tdx_test_read_report_from_guest(struct kvm_vcpu *vcpu)
>> +{
>> +	uint32_t res;
>> +
>> +	tdx_test_assert_io(vcpu, TDX_TEST_REPORT_PORT, 4, PORT_WRITE);
>> +	res = *(uint32_t *)((void *)vcpu->run + vcpu->run->io.data_offset);
>> +
>> +	return res;
>> +}
>> diff --git a/tools/testing/selftests/kvm/x86/tdx_vm_test.c b/tools/testing/selftests/kvm/x86/tdx_vm_test.c
>> index 97330e28f236..bbdcca358d71 100644
>> --- a/tools/testing/selftests/kvm/x86/tdx_vm_test.c
>> +++ b/tools/testing/selftests/kvm/x86/tdx_vm_test.c
>> @@ -3,6 +3,7 @@
>>   #include <signal.h>
>>   
>>   #include "kvm_util.h"
>> +#include "processor.h"
>>   #include "tdx/tdcall.h"
>>   #include "tdx/tdx.h"
>>   #include "tdx/tdx_util.h"
>> @@ -146,6 +147,99 @@ void verify_td_ioexit(void)
>>   	printf("\t ... PASSED\n");
>>   }
>>   
>> +/*
>> + * Verifies CPUID functionality by reading CPUID values in guest. The guest
>> + * will then send the values to userspace using an IO write to be checked
>> + * against the expected values.
>> + */
>> +void guest_code_cpuid(void)
>> +{
>> +	uint32_t ebx, ecx;
>> +	uint64_t err;
>> +
>> +	/* Read CPUID leaf 0x1 */
>> +	asm volatile ("cpuid"
>> +		      : "=b" (ebx), "=c" (ecx)
>> +		      : "a" (0x1)
>> +		      : "edx");
>> +
>> +	err = tdx_test_report_to_user_space(ebx);
>> +	tdx_assert_error(err);
>> +
>> +	err = tdx_test_report_to_user_space(ecx);
>> +	tdx_assert_error(err);
>> +
>> +	tdx_test_success();
>> +}
>> +
>> +void verify_td_cpuid(void)
>> +{
>> +	uint32_t guest_max_addressable_ids, host_max_addressable_ids;
>> +	const struct kvm_cpuid_entry2 *cpuid_entry;
>> +	uint32_t guest_clflush_line_size;
>> +	uint32_t guest_initial_apic_id;
>> +	uint32_t guest_sse3_enabled;
>> +	uint32_t guest_fma_enabled;
>> +	struct kvm_vcpu *vcpu;
>> +	struct kvm_vm *vm;
>> +	uint32_t ebx, ecx;
>> +
>> +	vm = td_create();
>> +	td_initialize(vm, VM_MEM_SRC_ANONYMOUS, 0);
>> +	vcpu = td_vcpu_add(vm, 0, guest_code_cpuid);
>> +	td_finalize(vm);
>> +
>> +	printf("Verifying TD CPUID:\n");
>> +
>> +	/* Wait for guest to report ebx value */
Should the comments for ebx and ecx be aligned?
>> +	tdx_run(vcpu);
>> +	ebx = tdx_test_read_report_from_guest(vcpu);
>> +
>> +	/* Wait for guest to report either ecx value or error */
>> +	tdx_run(vcpu);
>> +	ecx = tdx_test_read_report_from_guest(vcpu);
>> +
>> +	/* Wait for guest to complete execution */
>> +	tdx_run(vcpu);
>> +	tdx_test_assert_success(vcpu);
>> +
>> +	/* Verify the CPUID values received from the guest. */
>> +	printf("\t ... Verifying CPUID values from guest\n");
>> +
>> +	/* Get KVM CPUIDs for reference */
>> +	cpuid_entry = vcpu_get_cpuid_entry(vcpu, 1);
>> +	TEST_ASSERT(cpuid_entry, "CPUID entry missing\n");
>> +
>> +	host_max_addressable_ids = (cpuid_entry->ebx >> 16) & 0xFF;
>> +
>> +	guest_sse3_enabled = ecx & 0x1;  // Native
> It seems the CPUID virtualization types in this series are based on some old
> TDX module spec. The SSE3 has become fixed1 in current public 1.5 base spec.
Yes, the comment should be fixed.

Also, BIT(X86_FEATURE_XMM3.bit) could be used for the mask of sse3.
Similar for FMA below.

>
>> +	guest_clflush_line_size = (ebx >> 8) & 0xFF;  // Fixed
>> +	guest_max_addressable_ids = (ebx >> 16) & 0xFF;  // As Configured
>> +	guest_fma_enabled = (ecx >> 12) & 0x1;  // As Configured (if Native)
>> +	guest_initial_apic_id = (ebx >> 24) & 0xFF;  // Calculated
>> +
>> +	TEST_ASSERT_EQ(guest_sse3_enabled, 1);
>> +	TEST_ASSERT_EQ(guest_clflush_line_size, 8);
>> +	TEST_ASSERT_EQ(guest_max_addressable_ids, host_max_addressable_ids);
>> +
>> +	/* TODO: This only tests the native value. To properly test
>> +	 * "As Configured (if Native)" this value needs override in the
>> +	 * TD params.
>> +	 */
>> +	TEST_ASSERT_EQ(guest_fma_enabled, (cpuid_entry->ecx >> 12) & 0x1);
> FMA is configured by XFAM[2]. If we choose this feature, need to set init_vm->xfam
> which has not been used to configure features in this series yet.

Yes, the virtualization type of FMA is "XFAM & Native", since XFAM is not used
to configure FMA in this series, the value will always be 0.

Because this patch series uses the values retried via KVM_TDX_GET_CPUID as the
input values for KVM_SET_CPUID2, the comparison is still valid, no matter XFAM[2]
is set or not.

The comment needs to be update.

>
>> +
>> +	/* TODO: guest_initial_apic_id is calculated based on the number of
>> +	 * vCPUs in the TD. From the spec: "Virtual CPU index, starting from 0
>> +	 * and allocated sequentially on each successful TDH.VP.INIT"
>> +	 * To test non-trivial values either use a TD with multiple vCPUs
>> +	 * or pick a different calculated value.
>> +	 */
>> +	TEST_ASSERT_EQ(guest_initial_apic_id, 0);
>> +
>> +	kvm_vm_free(vm);
>> +	printf("\t ... PASSED\n");
>> +}
>> +
>>   int main(int argc, char **argv)
>>   {
>>   	ksft_print_header();
>> @@ -153,13 +247,15 @@ int main(int argc, char **argv)
>>   	if (!is_tdx_enabled())
>>   		ksft_exit_skip("TDX is not supported by the KVM. Exiting.\n");
>>   
>> -	ksft_set_plan(3);
>> +	ksft_set_plan(4);
>>   	ksft_test_result(!run_in_new_process(&verify_td_lifecycle),
>>   			 "verify_td_lifecycle\n");
>>   	ksft_test_result(!run_in_new_process(&verify_report_fatal_error),
>>   			 "verify_report_fatal_error\n");
>>   	ksft_test_result(!run_in_new_process(&verify_td_ioexit),
>>   			 "verify_td_ioexit\n");
>> +	ksft_test_result(!run_in_new_process(&verify_td_cpuid),
>> +			 "verify_td_cpuid\n");
>>   
>>   	ksft_finished();
>>   	return 0;


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ