Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp745278pxy; Wed, 5 May 2021 12:49:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzkg6sOuXZg2GLFRky4F/K+8LTxHaO3bp1UZcwp0vKKfcQXA1PR2kR2kyV9fXNUdU8DDLUN X-Received: by 2002:a17:906:32d1:: with SMTP id k17mr461806ejk.94.1620244145329; Wed, 05 May 2021 12:49:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620244145; cv=none; d=google.com; s=arc-20160816; b=lNUrLqVuRAXaddgPzSDWQwZRSXhqJrDWpW5g02f8j2YH3bxLGEPt0HamXAQ3hAk4AX J+m7ABSoO6xLBo/7rszhkzn4PqH9Oz6rCJUcFq39ME3wz6xhoHWLxM3nfex8gnN13hph L6O7akrp5iRGlL2DVE1ZFMdgT7FVe3IZqRPCqWAgRAn4am7Y4kwdqtaF1XAQzmg3OGsw 4/pGK3DUqQf1XfTt4e49lIqbaVOeffJX04yKYQCKtgfv+J5RJMtztyYGlMpuSU6ZfO8h nl0W8butcsLuE9bvxobQL5i+ELIQ+d+hfw8BX0em1GYUcwo1ay7Rj6fBZArrb787k6ep zEQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=hp+/oCYKjiIsjh/M46HXkPKj6GuBPVMNSJYocNhIgXo=; b=Z5NyGERIw+z7Ocf2E7skM5T7aEM/RoyJGKMQk32UW+mHjUKsGhWoyvU4noVhB1pVgO D0v9kwyrCguPDxaPNO0VmuoWpFrJtSMt2p7mRX1WURs9ZJDZ5qaX6YkRVcns7/S5AU2S ql7eX/KzB9IfLXvvAHCLeT0R/MnibZkr/JYQ6DPdx1s12+QjMyT+BevNN0F+SKUFpDkn LLrkEMfSagDlq6t8olrMjX0H6pQ58S5pJCHbP7C+NfMGi9jt7J3YORxa08gNWABuKrCo DL8tD2ZCumZqvrZhXepxXR/1h+g47YK9+ndBMqirMB32BciB9PfCs8OhEMBSPgSOV9ro FfTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=THikacmA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nc38si352405ejc.570.2021.05.05.12.48.41; Wed, 05 May 2021 12:49:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=THikacmA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233521AbhEEPTn (ORCPT + 99 others); Wed, 5 May 2021 11:19:43 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:35207 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233535AbhEEPTd (ORCPT ); Wed, 5 May 2021 11:19:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620227915; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hp+/oCYKjiIsjh/M46HXkPKj6GuBPVMNSJYocNhIgXo=; b=THikacmAEHWr6eLUb+8z+ICT7XFWlldcOTBaUcIQgimKMsItydBvz31zsl35AP8kfccsGn Ydp/tKOPuCwKFwq3eTJ/zhRPDf/k8wP2HVrLQe0dr4zlBem78hm6xNFocZEr0AMJRR+gEr aJMixrVpHuH43CHhDkQ8R+vXuvXOcm0= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-470-xqfV6Y_bNsa4hu0Zf-2TNA-1; Wed, 05 May 2021 11:18:34 -0400 X-MC-Unique: xqfV6Y_bNsa4hu0Zf-2TNA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 4BAA4107ACC7; Wed, 5 May 2021 15:18:32 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.40.194.168]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8766D5C1A3; Wed, 5 May 2021 15:18:30 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org, Paolo Bonzini Cc: Sean Christopherson , Wanpeng Li , Jim Mattson , Maxim Levitsky , linux-kernel@vger.kernel.org Subject: [PATCH 3/3] KVM: selftests: evmcs_test: Test that KVM_STATE_NESTED_EVMCS is never lost Date: Wed, 5 May 2021 17:18:23 +0200 Message-Id: <20210505151823.1341678-4-vkuznets@redhat.com> In-Reply-To: <20210505151823.1341678-1-vkuznets@redhat.com> References: <20210505151823.1341678-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Do KVM_GET_NESTED_STATE/KVM_SET_NESTED_STATE for a freshly restored VM (before the first KVM_RUN) to check that KVM_STATE_NESTED_EVMCS is not lost. Signed-off-by: Vitaly Kuznetsov --- - Note: this test is not yet to be commited as it is known to fail. A patch like https://lore.kernel.org/kvm/877dkdy1x5.fsf@vitty.brq.redhat.com/T/#u is needed to make it pass. The patch itself requires more work. --- .../testing/selftests/kvm/x86_64/evmcs_test.c | 62 ++++++++++++------- 1 file changed, 38 insertions(+), 24 deletions(-) diff --git a/tools/testing/selftests/kvm/x86_64/evmcs_test.c b/tools/testing/selftests/kvm/x86_64/evmcs_test.c index 63096cea26c6..8d1a63da5c63 100644 --- a/tools/testing/selftests/kvm/x86_64/evmcs_test.c +++ b/tools/testing/selftests/kvm/x86_64/evmcs_test.c @@ -121,14 +121,39 @@ void inject_nmi(struct kvm_vm *vm) vcpu_events_set(vm, VCPU_ID, &events); } +static void save_restore_vm(struct kvm_vm *vm, struct kvm_run *run) +{ + struct kvm_regs regs1, regs2; + struct kvm_x86_state *state; + + state = vcpu_save_state(vm, VCPU_ID); + memset(®s1, 0, sizeof(regs1)); + vcpu_regs_get(vm, VCPU_ID, ®s1); + + kvm_vm_release(vm); + + /* Restore state in a new VM. */ + kvm_vm_restart(vm, O_RDWR); + vm_vcpu_add(vm, VCPU_ID); + vcpu_set_hv_cpuid(vm, VCPU_ID); + vcpu_enable_evmcs(vm, VCPU_ID); + vcpu_load_state(vm, VCPU_ID, state); + run = vcpu_state(vm, VCPU_ID); + free(state); + + memset(®s2, 0, sizeof(regs2)); + vcpu_regs_get(vm, VCPU_ID, ®s2); + TEST_ASSERT(!memcmp(®s1, ®s2, sizeof(regs2)), + "Unexpected register values after vcpu_load_state; rdi: %lx rsi: %lx", + (ulong) regs2.rdi, (ulong) regs2.rsi); +} + int main(int argc, char *argv[]) { vm_vaddr_t vmx_pages_gva = 0; - struct kvm_regs regs1, regs2; struct kvm_vm *vm; struct kvm_run *run; - struct kvm_x86_state *state; struct ucall uc; int stage; @@ -147,8 +172,6 @@ int main(int argc, char *argv[]) run = vcpu_state(vm, VCPU_ID); - vcpu_regs_get(vm, VCPU_ID, ®s1); - vcpu_alloc_vmx(vm, &vmx_pages_gva); vcpu_args_set(vm, VCPU_ID, 1, vmx_pages_gva); @@ -184,32 +207,23 @@ int main(int argc, char *argv[]) uc.args[1] == stage, "Stage %d: Unexpected register values vmexit, got %lx", stage, (ulong)uc.args[1]); - state = vcpu_save_state(vm, VCPU_ID); - memset(®s1, 0, sizeof(regs1)); - vcpu_regs_get(vm, VCPU_ID, ®s1); - - kvm_vm_release(vm); - - /* Restore state in a new VM. */ - kvm_vm_restart(vm, O_RDWR); - vm_vcpu_add(vm, VCPU_ID); - vcpu_set_hv_cpuid(vm, VCPU_ID); - vcpu_enable_evmcs(vm, VCPU_ID); - vcpu_load_state(vm, VCPU_ID, state); - run = vcpu_state(vm, VCPU_ID); - free(state); - - memset(®s2, 0, sizeof(regs2)); - vcpu_regs_get(vm, VCPU_ID, ®s2); - TEST_ASSERT(!memcmp(®s1, ®s2, sizeof(regs2)), - "Unexpected register values after vcpu_load_state; rdi: %lx rsi: %lx", - (ulong) regs2.rdi, (ulong) regs2.rsi); + save_restore_vm(vm, run); /* Force immediate L2->L1 exit before resuming */ if (stage == 8) { pr_info("Injecting NMI into L1 before L2 had a chance to run after restore\n"); inject_nmi(vm); } + + /* + * Do KVM_GET_NESTED_STATE/KVM_SET_NESTED_STATE for a freshly + * restored VM (before the first KVM_RUN) to check that + * KVM_STATE_NESTED_EVMCS is not lost. + */ + if (stage == 9) { + pr_info("Trying extra KVM_GET_NESTED_STATE/KVM_SET_NESTED_STATE cycle\n"); + save_restore_vm(vm, run); + } } done: -- 2.30.2