From: Binbin Wu <binbin.wu@linux.intel.com>
To: Chao Gao <chao.gao@intel.com>
Cc: kvm@vger.kernel.org, seanjc@google.com, pbonzini@redhat.com,
robert.hu@linux.intel.com
Subject: Re: [PATCH v5 4/4] x86: Add test case for INVVPID with LAM
Date: Tue, 6 Jun 2023 13:47:07 +0800 [thread overview]
Message-ID: <fa4a405f-0ee6-c6de-7947-e56c4ee22734@linux.intel.com> (raw)
In-Reply-To: <ZH3hqvoaQkQ8qK/n@chao-email>
On 6/5/2023 9:22 PM, Chao Gao wrote:
> On Tue, May 30, 2023 at 10:43:56AM +0800, Binbin Wu wrote:
>> LAM applies to the linear address of INVVPID operand, however,
>> it doesn't apply to the linear address in the INVVPID descriptor.
>>
>> The added cases use tagged operand or tagged target invalidation
>> address to make sure the behaviors are expected when LAM is on.
>>
>> Also, INVVPID case using tagged operand can be used as the common
>> test cases for VMX instruction VMExits.
>>
>> Signed-off-by: Binbin Wu <binbin.wu@linux.intel.com>
>> ---
>> x86/vmx_tests.c | 46 +++++++++++++++++++++++++++++++++++++++++++++-
>> 1 file changed, 45 insertions(+), 1 deletion(-)
>>
>> diff --git a/x86/vmx_tests.c b/x86/vmx_tests.c
>> index 217befe..3f3f203 100644
>> --- a/x86/vmx_tests.c
>> +++ b/x86/vmx_tests.c
>> @@ -3225,6 +3225,48 @@ static void invvpid_test_not_in_vmx_operation(void)
>> TEST_ASSERT(!vmx_on());
>> }
>>
>> +/* LAM applies to the target address inside the descriptor of invvpid */
> This isn't correct. LAM doesn't apply to that address. Right?
Oops, will fix it, thanks.
>
>> +static void invvpid_test_lam(void)
>> +{
>> + void *vaddr;
>> + struct invvpid_operand *operand;
>> + u64 lam_mask = LAM48_MASK;
>> + bool fault;
>> +
>> + if (!this_cpu_has(X86_FEATURE_LAM)) {
>> + report_skip("LAM is not supported, skip INVVPID with LAM");
>> + return;
>> + }
>> + write_cr4_safe(read_cr4() | X86_CR4_LAM_SUP);
> why write_cr4_safe()?
>
> This should succeed if LAM is supported. So it is better to use
> write_cr4() because write_cr4() has an assertion which can catch
> unexpected exceptions.
OK.
>
>> +
>> + if (this_cpu_has(X86_FEATURE_LA57) && read_cr4() & X86_CR4_LA57)
>> + lam_mask = LAM57_MASK;
>> +
>> + vaddr = alloc_vpage();
>> + install_page(current_page_table(), virt_to_phys(alloc_page()), vaddr);
>> + /*
>> + * Since the stack memory address in KUT doesn't follow kernel address
>> + * space partition rule, reuse the memory address for descriptor and
>> + * the target address in the descriptor of invvpid.
>> + */
>> + operand = (struct invvpid_operand *)vaddr;
>> + operand->vpid = 0xffff;
>> + operand->gla = (u64)vaddr;
>> + operand = (struct invvpid_operand *)set_la_non_canonical((u64)operand,
>> + lam_mask);
>> + fault = test_for_exception(GP_VECTOR, ds_invvpid, operand);
>> + report(!fault, "INVVPID (LAM on): tagged operand");
>> +
>> + /*
>> + * LAM doesn't apply to the address inside the descriptor, expected
>> + * failure and VMXERR_INVALID_OPERAND_TO_INVEPT_INVVPID set in
>> + * VMX_INST_ERROR.
>> + */
> Maybe
>
> /*
> * Verify that LAM doesn't apply to the address inside the descriptor
> * even when LAM is enabled. i.e., the address in the descriptor should
> * be canonical.
> */
>> + try_invvpid(INVVPID_ADDR, 0xffff, NONCANONICAL);
> shouldn't we use a kernel address here? e.g., vaddr. otherwise, we
> cannot tell if there is an error in KVM's emulation because in this
> test, LAM is enabled only for kernel address while INVVPID_ADDR is a
> userspace address.
INVVPID_ADDR is the invalidation type, not the address.
The address used here is NONCANONICAL, which is 0xaaaaaaaaaaaaaaaaull and
is considered as kernel address.
>
>> +
>> + write_cr4_safe(read_cr4() & ~X86_CR4_LAM_SUP);
> ditto.
>
> With all above fixed:
>
> Reviewed-by: Chao Gao <chao.gao@intel.com>
>
>
>> +}
>> +
>> /*
>> * This does not test real-address mode, virtual-8086 mode, protected mode,
>> * or CPL > 0.
>> @@ -3274,8 +3316,10 @@ static void invvpid_test(void)
>> /*
>> * The gla operand is only validated for single-address INVVPID.
>> */
>> - if (types & (1u << INVVPID_ADDR))
>> + if (types & (1u << INVVPID_ADDR)) {
>> try_invvpid(INVVPID_ADDR, 0xffff, NONCANONICAL);
>> + invvpid_test_lam();
>> + }
>>
>> invvpid_test_gp();
>> invvpid_test_ss();
>> --
>> 2.25.1
>>
next prev parent reply other threads:[~2023-06-06 5:47 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-30 2:43 [PATCH v5 0/4] x86: Add test cases for LAM Binbin Wu
2023-05-30 2:43 ` [PATCH v5 1/4] x86: Allow setting of CR3 LAM bits if LAM supported Binbin Wu
2023-05-30 2:43 ` [PATCH v5 2/4] x86: Add test case for LAM_SUP Binbin Wu
2023-05-30 2:43 ` [PATCH v5 3/4] x86: Add test cases for LAM_{U48,U57} Binbin Wu
2023-05-30 2:43 ` [PATCH v5 4/4] x86: Add test case for INVVPID with LAM Binbin Wu
2023-06-05 13:22 ` Chao Gao
2023-06-06 5:47 ` Binbin Wu [this message]
2023-06-06 7:02 ` Chao Gao
2023-06-06 7:08 ` Binbin Wu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=fa4a405f-0ee6-c6de-7947-e56c4ee22734@linux.intel.com \
--to=binbin.wu@linux.intel.com \
--cc=chao.gao@intel.com \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=robert.hu@linux.intel.com \
--cc=seanjc@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox