On 4/23/2024 5:23 AM, Sean Christopherson wrote:
On Thu, Apr 18, 2024, Yan Zhao wrote:
On Tue, Apr 16, 2024 at 11:50:19AM -0700, Sean Christopherson wrote:
On Mon, Apr 15, 2024, Yan Zhao wrote:
On Mon, Apr 15, 2024 at 08:05:49AM +, Ackerley Tng wrote:
The Intel GHCI Spec says in R12, b
argc, char **argv)
if (!cpu_has_lam()) {
ksft_print_msg("Unsupported LAM feature!\n");
- return -1;
+ return KSFT_SKIP;
}
while ((c = getopt(argc, argv, "ht:")) != -1) {
Looks good to me.
Reviewed-by: Binbin Wu
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Ackerley Tng
This tests the use of guest memory with explicit MapGPA calls.
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
Signed-off-by: Sagi Shahar
---
tools/testing/selftests/kvm/Makefile | 1 +
.../selftests/kvm/x
+
2 files changed, 40 insertions(+)
Reviewed-by: Binbin Wu
diff --git a/tools/testing/selftests/kvm/include/x86_64/tdx/tdx.h
b/tools/testing/selftests/kvm/include/x86_64/tdx/tdx.h
index b71bcea40b5c..12863a8beaae 100644
--- a/tools/testing/selftests/kvm/include/x86_64/tdx/tdx.h
+++ b
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Ackerley Tng
vm_vaddr_alloc always allocates memory in memslot 0. This allows users
of this function to choose which memslot to allocate virtual memory
in.
Nit: The patch exposes vm_vaddr_alloc() instead of _vm_vaddr_alloc().
Signed-off
On 3/4/2024 10:19 AM, Yan Zhao wrote:
On Tue, Dec 12, 2023 at 12:46:25PM -0800, Sagi Shahar wrote:
From: Erdem Aktas
Verifies TDVMCALL READ and WRITE operations.
Signed-off-by: Erdem Aktas
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../kvm/
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test verifies MMIO writes of various sizes from the guest to the host.
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
Patch 17 and 18 test the part that guest has received the #VE caused by
MMIO access, so
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test verifies that the guest runs TDVMCALL and the
guest vCPU enters to the halted state.
Signed-off-by: Erdem Aktas
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../selftests/kvm/include/x86_64/tdx/
On 3/1/2024 8:00 PM, Binbin Wu wrote:
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test verifies reads and writes for MSR registers with different
access
level.
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../selftests/kvm/include/x86_64
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test verifies reads and writes for MSR registers with different access
level.
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../selftests/kvm/include/x86_64/tdx/tdx.h| 5 +
.../selftests/kvm/lib
changed, 87 insertions(+)
Reviewed-by: Binbin Wu
diff --git a/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c
b/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c
index a2b3e1aef151..699cba36e9ce 100644
--- a/tools/testing/selftests/kvm/x86_64/tdx_vm_tests.c
+++ b/tools/testing/selftests/kvm
/tdx_vm_tests.c | 91 +++
2 files changed, 94 insertions(+)
Reviewed-by: Binbin Wu
diff --git a/tools/testing/selftests/kvm/include/x86_64/tdx/tdcall.h
b/tools/testing/selftests/kvm/include/x86_64/tdx/tdcall.h
index 78001bfec9c8..b5e94b7c48fa 100644
--- a/tools/testing
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test checks report_fatal_error functionality.
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../selftests/kvm/include/x86_64/tdx/tdx.h| 6 ++-
.../kvm/include/x86_64/tdx/tdx_util.h | 1 +
: Binbin Wu
Also, does it need to add another case for the non-zero value of r12 to
test the VMCALL_INVALID_OPERAND path?
diff --git a/tools/testing/selftests/kvm/include/x86_64/tdx/tdx.h
b/tools/testing/selftests/kvm/include/x86_64/tdx/tdx.h
index 1340c1070002..63788012bf94 100644
--- a/tools
.../selftests/kvm/x86_64/tdx_vm_tests.c | 82 +++
2 files changed, 116 insertions(+)
One nit comment below.
Reviewed-by: Binbin Wu
diff --git a/tools/testing/selftests/kvm/include/x86_64/tdx/test_util.h
b/tools/testing/selftests/kvm/include/x86_64/tdx/test_util.h
index
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
The test checks report_fatal_error functionality.
Signed-off-by: Sagi Shahar
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
---
.../selftests/kvm/include/x86_64/tdx/tdx.h| 6 ++-
.../kvm/include/x86_64/tdx/tdx_util.h | 1 +
++-
1 file changed, 66 insertions(+), 3 deletions(-)
Nit: Can also dump 'supported_gpaw' in tdx_read_capabilities().
Reviewed-by: Binbin Wu
diff --git a/tools/testing/selftests/kvm/lib/x86_64/tdx/tdx_util.c
b/tools/testing/selftests/kvm/lib/x86_64/tdx/tdx_ut
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Erdem Aktas
TDX requires additional IOCTLs to initialize VM and vCPUs to add
private memory and to finalize the VM memory. Also additional utility
functions are provided to manipulate a TD, similar to those that
manipulate a VM in the current s
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Ackerley Tng
Split the vCPU descriptor table initialization process into a few
steps and expose them:
+ Setting up the IDT
+ Syncing exception handlers into the guest
In kvm_setup_idt(), we conditionally allocate guest memory for vm->idt
to a
gs | 0x2;
- regs.rsp = stack_vaddr;
+ regs.rsp = vcpu->initial_stack_addr;
Nit: No need to do this change.
Reviewed-by: Binbin Wu
regs.rip = (unsigned long) guest_code;
vcpu_regs_set(vcpu, ®s);
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Ackerley Tng
This allows initializing sregs without setting vCPU registers in
KVM.
No functional change intended.
Reviewed-by: Binbin Wu
Signed-off-by: Ackerley Tng
Signed-off-by: Ryan Afranji
Signed-off-by: Sagi Shahar
On 12/13/2023 4:46 AM, Sagi Shahar wrote:
From: Ackerley Tng
One-to-one GVA to GPA mappings can be used in the guest to set up boot
sequences during which paging is enabled, hence requiring a transition
from using physical to virtual addresses in consecutive instructions.
Signed-off-by: Ack
On 11/17/2023 9:07 PM, Yi Liu wrote:
+
+/**
+ * iommu_copy_struct_from_user_array - Copy iommu driver specific user space
+ * data from an iommu_user_data_array
+ * @kdst: Pointer to an iommu driver specific user data that is defined in
+ *include/ua
On 11/17/2023 9:07 PM, Yi Liu wrote:
From: Lu Baolu
The updates of the PTEs in the nested page table will be propagated to the
hardware caches on both IOMMU (IOTLB) and devices (DevTLB/ATC).
Add a new domain op cache_invalidate_user for the userspace to flush the
hardware caches for a neste
dd inherit test cases for
linear-address masking")
Signed-off-by: Binbin Wu
---
v1->v2:
- Change the buffer length passed to readlink() to 'PATH_MAX - 1' to ensure the
resulting string is always null terminated. [Kirill]
tools/testing/selftests/x86/lam.c | 6 +++---
1 file chan
On 10/10/2023 1:46 PM, kirill.shute...@linux.intel.com wrote:
On Tue, Oct 10, 2023 at 11:51:32AM +0800, Binbin Wu wrote:
On 9/27/2023 7:02 PM, kirill.shute...@linux.intel.com wrote:
On Sun, Sep 24, 2023 at 07:33:46AM +0800, Binbin Wu wrote:
Zero out the buffer for readlink() since
On 9/27/2023 7:02 PM, kirill.shute...@linux.intel.com wrote:
On Sun, Sep 24, 2023 at 07:33:46AM +0800, Binbin Wu wrote:
Zero out the buffer for readlink() since readlink() does not append a
terminating null byte to the buffer.
Fixes: 833c12ce0f430 ("selftests/x86/lam: Add inherit test
Zero out the buffer for readlink() since readlink() does not append a
terminating null byte to the buffer.
Fixes: 833c12ce0f430 ("selftests/x86/lam: Add inherit test cases for
linear-address masking")
Signed-off-by: Binbin Wu
---
tools/testing/selftests/x86/lam.c | 2 +-
1 file
28 matches
Mail list logo