KVM: selftests: fix triple fault if ept=0 in dirty_log_test
authorHou Wenlong <houwenlong93@linux.alibaba.com>
Tue, 22 Jun 2021 13:55:32 +0000 (21:55 +0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Thu, 24 Jun 2021 08:31:16 +0000 (04:31 -0400)
Commit 22f232d134e1 ("KVM: selftests: x86: Set supported CPUIDs on
default VM") moved vcpu_set_cpuid into vm_create_with_vcpus, but
dirty_log_test doesn't use it to create vm. So vcpu's CPUIDs is
not set, the guest's pa_bits in kvm would be smaller than the
value queried by userspace.

However, the dirty track memory slot is in the highest GPA, the
reserved bits in gpte would be set with wrong pa_bits.
For shadow paging, page fault would fail in permission_fault and
be injected into guest. Since guest doesn't have idt, it finally
leads to vm_exit for triple fault.

Move vcpu_set_cpuid into vm_vcpu_add_default to set supported
CPUIDs on default vcpu, since almost all tests need it.

Fixes: 22f232d134e1 ("KVM: selftests: x86: Set supported CPUIDs on default VM")
Signed-off-by: Hou Wenlong <houwenlong93@linux.alibaba.com>
Message-Id: <411ea2173f89abce56fc1fca5af913ed9c5a89c9.1624351343.git.houwenlong93@linux.alibaba.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
tools/testing/selftests/kvm/lib/kvm_util.c
tools/testing/selftests/kvm/lib/x86_64/processor.c
tools/testing/selftests/kvm/steal_time.c
tools/testing/selftests/kvm/x86_64/set_boot_cpu_id.c

index a2b732cf96ea484ec263e6aee1df272f7d971853..8ea854d7822d96300a0f7d9fbe5bf78748da8dfc 100644 (file)
@@ -375,10 +375,6 @@ struct kvm_vm *vm_create_with_vcpus(enum vm_guest_mode mode, uint32_t nr_vcpus,
                uint32_t vcpuid = vcpuids ? vcpuids[i] : i;
 
                vm_vcpu_add_default(vm, vcpuid, guest_code);
-
-#ifdef __x86_64__
-               vcpu_set_cpuid(vm, vcpuid, kvm_get_supported_cpuid());
-#endif
        }
 
        return vm;
index efe235044421379f0852d6280db21ad139de0fad..595322b24e4cb6f75f3f830fc935d1dacfb03a66 100644 (file)
@@ -600,6 +600,9 @@ void vm_vcpu_add_default(struct kvm_vm *vm, uint32_t vcpuid, void *guest_code)
        /* Setup the MP state */
        mp_state.mp_state = 0;
        vcpu_set_mp_state(vm, vcpuid, &mp_state);
+
+       /* Setup supported CPUIDs */
+       vcpu_set_cpuid(vm, vcpuid, kvm_get_supported_cpuid());
 }
 
 /*
index fcc840088c919a29c06f074e7515336982aa53c3..a6fe75cb9a6eb3091f5c606d0823951135a9e655 100644 (file)
@@ -73,8 +73,6 @@ static void steal_time_init(struct kvm_vm *vm)
        for (i = 0; i < NR_VCPUS; ++i) {
                int ret;
 
-               vcpu_set_cpuid(vm, i, kvm_get_supported_cpuid());
-
                /* ST_GPA_BASE is identity mapped */
                st_gva[i] = (void *)(ST_GPA_BASE + i * STEAL_TIME_SIZE);
                sync_global_to_guest(vm, st_gva[i]);
index 5f8dd74d415f83680d36c737bafa4e98c5f85979..fd309fb9e2c4e2829af00bf8d8f1d417bd05b9aa 100644 (file)
@@ -102,8 +102,6 @@ static void add_x86_vcpu(struct kvm_vm *vm, uint32_t vcpuid, bool bsp_code)
                vm_vcpu_add_default(vm, vcpuid, guest_bsp_vcpu);
        else
                vm_vcpu_add_default(vm, vcpuid, guest_not_bsp_vcpu);
-
-       vcpu_set_cpuid(vm, vcpuid, kvm_get_supported_cpuid());
 }
 
 static void run_vm_bsp(uint32_t bsp_vcpu)