Path: blob/master/tools/testing/selftests/kvm/x86/set_sregs_test.c
38237 views
// SPDX-License-Identifier: GPL-2.0-only1/*2* KVM_SET_SREGS tests3*4* Copyright (C) 2018, Google LLC.5*6* This is a regression test for the bug fixed by the following commit:7* d3802286fa0f ("kvm: x86: Disallow illegal IA32_APIC_BASE MSR values")8*9* That bug allowed a user-mode program that called the KVM_SET_SREGS10* ioctl to put a VCPU's local APIC into an invalid state.11*/12#include <fcntl.h>13#include <stdio.h>14#include <stdlib.h>15#include <string.h>16#include <sys/ioctl.h>1718#include "test_util.h"1920#include "kvm_util.h"21#include "processor.h"2223#define TEST_INVALID_CR_BIT(vcpu, cr, orig, bit) \24do { \25struct kvm_sregs new; \26int rc; \27\28/* Skip the sub-test, the feature/bit is supported. */ \29if (orig.cr & bit) \30break; \31\32memcpy(&new, &orig, sizeof(sregs)); \33new.cr |= bit; \34\35rc = _vcpu_sregs_set(vcpu, &new); \36TEST_ASSERT(rc, "KVM allowed invalid " #cr " bit (0x%lx)", bit); \37\38/* Sanity check that KVM didn't change anything. */ \39vcpu_sregs_get(vcpu, &new); \40TEST_ASSERT(!memcmp(&new, &orig, sizeof(new)), "KVM modified sregs"); \41} while (0)4243#define KVM_ALWAYS_ALLOWED_CR4 (X86_CR4_VME | X86_CR4_PVI | X86_CR4_TSD | \44X86_CR4_DE | X86_CR4_PSE | X86_CR4_PAE | \45X86_CR4_MCE | X86_CR4_PGE | X86_CR4_PCE | \46X86_CR4_OSFXSR | X86_CR4_OSXMMEXCPT)4748static uint64_t calc_supported_cr4_feature_bits(void)49{50uint64_t cr4 = KVM_ALWAYS_ALLOWED_CR4;5152if (kvm_cpu_has(X86_FEATURE_UMIP))53cr4 |= X86_CR4_UMIP;54if (kvm_cpu_has(X86_FEATURE_LA57))55cr4 |= X86_CR4_LA57;56if (kvm_cpu_has(X86_FEATURE_VMX))57cr4 |= X86_CR4_VMXE;58if (kvm_cpu_has(X86_FEATURE_SMX))59cr4 |= X86_CR4_SMXE;60if (kvm_cpu_has(X86_FEATURE_FSGSBASE))61cr4 |= X86_CR4_FSGSBASE;62if (kvm_cpu_has(X86_FEATURE_PCID))63cr4 |= X86_CR4_PCIDE;64if (kvm_cpu_has(X86_FEATURE_XSAVE))65cr4 |= X86_CR4_OSXSAVE;66if (kvm_cpu_has(X86_FEATURE_SMEP))67cr4 |= X86_CR4_SMEP;68if (kvm_cpu_has(X86_FEATURE_SMAP))69cr4 |= X86_CR4_SMAP;70if (kvm_cpu_has(X86_FEATURE_PKU))71cr4 |= X86_CR4_PKE;7273return cr4;74}7576static void test_cr_bits(struct kvm_vcpu *vcpu, uint64_t cr4)77{78struct kvm_sregs sregs;79int rc, i;8081vcpu_sregs_get(vcpu, &sregs);82sregs.cr0 &= ~(X86_CR0_CD | X86_CR0_NW);83sregs.cr4 |= cr4;84rc = _vcpu_sregs_set(vcpu, &sregs);85TEST_ASSERT(!rc, "Failed to set supported CR4 bits (0x%lx)", cr4);8687TEST_ASSERT(!!(sregs.cr4 & X86_CR4_OSXSAVE) ==88(vcpu->cpuid && vcpu_cpuid_has(vcpu, X86_FEATURE_OSXSAVE)),89"KVM didn't %s OSXSAVE in CPUID as expected",90(sregs.cr4 & X86_CR4_OSXSAVE) ? "set" : "clear");9192TEST_ASSERT(!!(sregs.cr4 & X86_CR4_PKE) ==93(vcpu->cpuid && vcpu_cpuid_has(vcpu, X86_FEATURE_OSPKE)),94"KVM didn't %s OSPKE in CPUID as expected",95(sregs.cr4 & X86_CR4_PKE) ? "set" : "clear");9697vcpu_sregs_get(vcpu, &sregs);98TEST_ASSERT(sregs.cr4 == cr4, "sregs.CR4 (0x%llx) != CR4 (0x%lx)",99sregs.cr4, cr4);100101TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_UMIP);102TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_LA57);103TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_VMXE);104TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_SMXE);105TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_FSGSBASE);106TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_PCIDE);107TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_OSXSAVE);108TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_SMEP);109TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_SMAP);110TEST_INVALID_CR_BIT(vcpu, cr4, sregs, X86_CR4_PKE);111112for (i = 32; i < 64; i++)113TEST_INVALID_CR_BIT(vcpu, cr0, sregs, BIT(i));114115/* NW without CD is illegal, as is PG without PE. */116TEST_INVALID_CR_BIT(vcpu, cr0, sregs, X86_CR0_NW);117TEST_INVALID_CR_BIT(vcpu, cr0, sregs, X86_CR0_PG);118}119120int main(int argc, char *argv[])121{122struct kvm_sregs sregs;123struct kvm_vcpu *vcpu;124struct kvm_vm *vm;125int rc;126127/*128* Create a dummy VM, specifically to avoid doing KVM_SET_CPUID2, and129* use it to verify KVM enforces guest CPUID even if *userspace* never130* sets CPUID.131*/132vm = vm_create_barebones();133vcpu = __vm_vcpu_add(vm, 0);134test_cr_bits(vcpu, KVM_ALWAYS_ALLOWED_CR4);135kvm_vm_free(vm);136137/* Create a "real" VM with a fully populated guest CPUID and verify138* APIC_BASE and all supported CR4 can be set.139*/140vm = vm_create_with_one_vcpu(&vcpu, NULL);141142vcpu_sregs_get(vcpu, &sregs);143sregs.apic_base = 1 << 10;144rc = _vcpu_sregs_set(vcpu, &sregs);145TEST_ASSERT(rc, "Set IA32_APIC_BASE to %llx (invalid)",146sregs.apic_base);147sregs.apic_base = 1 << 11;148rc = _vcpu_sregs_set(vcpu, &sregs);149TEST_ASSERT(!rc, "Couldn't set IA32_APIC_BASE to %llx (valid)",150sregs.apic_base);151152test_cr_bits(vcpu, calc_supported_cr4_feature_bits());153154kvm_vm_free(vm);155156return 0;157}158159160