On Mon, May 23, 2022, Chenyi Qiang wrote:
On 5/19/2022 3:20 AM, Sean Christopherson wrote:
On Thu, Apr 21, 2022, Chenyi Qiang wrote:
+#ifndef __x86_64__
+# error This test is 64-bit only
No need, all of KVM selftests are 64-bit only.
+#endif
+
+#define VCPU_ID 0
+#define ARBITRARY_IO_PORT 0x2000
+
+/* The virtual machine object. */
+static struct kvm_vm *vm;
+
+static void l2_guest_code(void)
+{
+ /*
+ * Generate an exit to L0 userspace, i.e. main(), via I/O to an
+ * arbitrary port.
+ */
I think we can test a "real" triple fault without too much effort by abusing
vcpu->run->request_interrupt_window. E.g. map the run struct into L2, clear
PIN_BASED_EXT_INTR_MASK in vmcs12, and then in l2_guest_code() do:
asm volatile("cli");
run->request_interrupt_window = true;
Maybe, A GUEST_SYNC to main() to change the request_interrupt_window also
works.
Hmm, yes, that should work too. Feel free to punt on writing this sub-test. As
mentioned below, KVM should treat a pending triple fault as a pending "exception",
i.e. userspace shouldn't see KVM_EXIT_IRQ_WINDOW_OPEN with a pending triple fault,
and so the test should actually assert that the triple fault occurs in L2. But I
can roll that test into the KVM fix if you'd like.
asm volatile("sti; ud2");
How does the "real" triple fault occur here? Through UD2?
Yeah. IIRC, by default L2 doesn't have a valid IDT, so any fault will escalate to
a triple fault.
asm volatile("inb %%dx, %%al"
: : [port] "d" (ARBITRARY_IO_PORT) : "rax");
The STI shadow will block the IRQ-window VM-Exit until after the ud2, i.e. until
after the triple fault is pending.
And then main() can
1. verify it got KVM_EXIT_IRQ_WINDOW_OPEN with a pending triple fault
2. clear the triple fault and re-enter L1+l2
3. continue with the existing code, e.g. verify it got KVM_EXIT_IO, stuff a
pending triple fault, etc...
That said, typing that out makes me think we should technically handle/prevent this
in KVM since triple fault / shutdown is kinda sorta just a special exception.