-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
kvm: selftests: add svm nested shutdown test
Add test that tests that on SVM if L1 doesn't intercept SHUTDOWN, then L2 crashes L1 and doesn't crash L2 Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> Message-Id: <20221103141351.50662-7-mlevitsk@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
- Loading branch information
Maxim Levitsky
authored and
Paolo Bonzini
committed
Nov 17, 2022
1 parent
fc6392d
commit 0bd2d3f
Showing
3 changed files
with
69 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
67 changes: 67 additions & 0 deletions
67
tools/testing/selftests/kvm/x86_64/svm_nested_shutdown_test.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
// SPDX-License-Identifier: GPL-2.0-only | ||
/* | ||
* svm_nested_shutdown_test | ||
* | ||
* Copyright (C) 2022, Red Hat, Inc. | ||
* | ||
* Nested SVM testing: test that unintercepted shutdown in L2 doesn't crash the host | ||
*/ | ||
|
||
#include "test_util.h" | ||
#include "kvm_util.h" | ||
#include "processor.h" | ||
#include "svm_util.h" | ||
|
||
static void l2_guest_code(struct svm_test_data *svm) | ||
{ | ||
__asm__ __volatile__("ud2"); | ||
} | ||
|
||
static void l1_guest_code(struct svm_test_data *svm, struct idt_entry *idt) | ||
{ | ||
#define L2_GUEST_STACK_SIZE 64 | ||
unsigned long l2_guest_stack[L2_GUEST_STACK_SIZE]; | ||
struct vmcb *vmcb = svm->vmcb; | ||
|
||
generic_svm_setup(svm, l2_guest_code, | ||
&l2_guest_stack[L2_GUEST_STACK_SIZE]); | ||
|
||
vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); | ||
|
||
idt[6].p = 0; // #UD is intercepted but its injection will cause #NP | ||
idt[11].p = 0; // #NP is not intercepted and will cause another | ||
// #NP that will be converted to #DF | ||
idt[8].p = 0; // #DF will cause #NP which will cause SHUTDOWN | ||
|
||
run_guest(vmcb, svm->vmcb_gpa); | ||
|
||
/* should not reach here */ | ||
GUEST_ASSERT(0); | ||
} | ||
|
||
int main(int argc, char *argv[]) | ||
{ | ||
struct kvm_vcpu *vcpu; | ||
struct kvm_run *run; | ||
vm_vaddr_t svm_gva; | ||
struct kvm_vm *vm; | ||
|
||
TEST_REQUIRE(kvm_cpu_has(X86_FEATURE_SVM)); | ||
|
||
vm = vm_create_with_one_vcpu(&vcpu, l1_guest_code); | ||
vm_init_descriptor_tables(vm); | ||
vcpu_init_descriptor_tables(vcpu); | ||
|
||
vcpu_alloc_svm(vm, &svm_gva); | ||
|
||
vcpu_args_set(vcpu, 2, svm_gva, vm->idt); | ||
run = vcpu->run; | ||
|
||
vcpu_run(vcpu); | ||
TEST_ASSERT(run->exit_reason == KVM_EXIT_SHUTDOWN, | ||
"Got exit_reason other than KVM_EXIT_SHUTDOWN: %u (%s)\n", | ||
run->exit_reason, | ||
exit_reason_str(run->exit_reason)); | ||
|
||
kvm_vm_free(vm); | ||
} |