Skip to content

Commit 5b3c76e

Browse files
mdouchametan-ucw
authored andcommitted
Add KVM test for CPU lockup through malicous SVM guest
Signed-off-by: Martin Doucha <[email protected]> Acked-by: Petr Vorel <[email protected]> Acked-by: Cyril Hrubis <[email protected]>
1 parent 326447b commit 5b3c76e

File tree

4 files changed

+174
-0
lines changed

4 files changed

+174
-0
lines changed

runtest/kvm

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
kvm_pagefault01 kvm_pagefault01
22
kvm_svm01 kvm_svm01
33
kvm_svm02 kvm_svm02
4+
kvm_svm03 kvm_svm03

testcases/kernel/kvm/.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
/kvm_pagefault01
22
/kvm_svm01
33
/kvm_svm02
4+
/kvm_svm03

testcases/kernel/kvm/Makefile

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,9 @@ endif
4848
lib_guest.o $(ARCH_OBJ): CPPFLAGS := $(GUEST_CPPFLAGS)
4949
lib_guest.o $(ARCH_OBJ): CFLAGS := $(GUEST_CFLAGS)
5050

51+
kvm_svm03: CFLAGS += -pthread
52+
kvm_svm03: LDLIBS += -pthread
53+
5154
include $(top_srcdir)/include/mk/generic_leaf_target.mk
5255

5356
%-payload.o: %.c lib_guest.o $(ARCH_OBJ)

testcases/kernel/kvm/kvm_svm03.c

Lines changed: 169 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,169 @@
1+
// SPDX-License-Identifier: GPL-2.0-or-later
2+
/*
3+
* Copyright (C) 2023 SUSE LLC
4+
* Author: Nicolai Stange <[email protected]>
5+
* LTP port: Martin Doucha <[email protected]>
6+
*/
7+
8+
/*\
9+
* Check that KVM correctly intercepts the CLGI instruction in a nested
10+
* virtual machine even when the parent guest disables intercept.
11+
* If KVM does not override the disabled intercept, it'll allow the nested VM
12+
* to hold the physical CPU indefinitely and potentially perform a denial
13+
* of service attack against the host kernel. CPU lockup fixed in:
14+
*
15+
* commit 91b7130cb6606d8c6b3b77e54426b3f3a83f48b1
16+
* Author: Paolo Bonzini <[email protected]>
17+
* Date: Fri May 22 12:28:52 2020 -0400
18+
*
19+
* KVM: SVM: preserve VGIF across VMCB switch
20+
*/
21+
22+
#include "kvm_test.h"
23+
24+
#ifdef COMPILE_PAYLOAD
25+
#if defined(__i386__) || defined(__x86_64__)
26+
27+
#include "kvm_x86_svm.h"
28+
29+
/* Disable global interrupts */
30+
static int guest_clgi(void)
31+
{
32+
int ret, *result = (int *)KVM_RESULT_BASEADDR;
33+
34+
/*
35+
* Make sure that result page is present in memory. CLGI may disable
36+
* page fault handling on the current CPU. The actual value
37+
* at that address is irrelevant.
38+
*/
39+
ret = *result;
40+
41+
/* Disable global interrupts */
42+
asm ("clgi");
43+
44+
/* Signal host to kill the VM and wait */
45+
tst_wait_host(NULL);
46+
return ret;
47+
}
48+
49+
void main(void)
50+
{
51+
struct kvm_svm_vcpu *vcpu;
52+
53+
kvm_init_svm();
54+
vcpu = kvm_create_svm_vcpu(guest_clgi, 1);
55+
kvm_vmcb_set_intercept(vcpu->vmcb, SVM_INTERCEPT_CLGI, 0);
56+
kvm_svm_vmrun(vcpu);
57+
58+
if (vcpu->vmcb->exitcode != SVM_EXIT_HLT)
59+
tst_brk(TBROK, "Nested VM exited unexpectedly");
60+
}
61+
62+
#else /* defined(__i386__) || defined(__x86_64__) */
63+
TST_TEST_TCONF("Test supported only on x86");
64+
#endif /* defined(__i386__) || defined(__x86_64__) */
65+
66+
#else /* COMPILE_PAYLOAD */
67+
68+
#include <pthread.h>
69+
#include "tst_safe_pthread.h"
70+
#include "tst_safe_clocks.h"
71+
72+
static struct tst_kvm_instance test_vm = { .vm_fd = -1 };
73+
static pthread_mutex_t mutex;
74+
static int mutex_init;
75+
76+
static void sighandler(int sig LTP_ATTRIBUTE_UNUSED)
77+
{
78+
79+
}
80+
81+
static void *vm_thread(void *arg)
82+
{
83+
SAFE_PTHREAD_MUTEX_LOCK(&mutex);
84+
tst_kvm_run_instance(&test_vm, EINTR);
85+
SAFE_PTHREAD_MUTEX_UNLOCK(&mutex);
86+
return arg;
87+
}
88+
89+
static void setup(void)
90+
{
91+
struct sigaction sa = { .sa_handler = sighandler };
92+
pthread_mutexattr_t attr;
93+
94+
SAFE_PTHREAD_MUTEXATTR_INIT(&attr);
95+
SAFE_PTHREAD_MUTEXATTR_SETTYPE(&attr, PTHREAD_MUTEX_NORMAL);
96+
SAFE_PTHREAD_MUTEX_INIT(&mutex, &attr);
97+
mutex_init = 1;
98+
SAFE_PTHREAD_MUTEXATTR_DESTROY(&attr);
99+
SAFE_SIGACTION(SIGUSR1, &sa, NULL);
100+
}
101+
102+
static void run(void)
103+
{
104+
struct timespec timeout;
105+
pthread_t tid;
106+
int ret;
107+
108+
tst_kvm_create_instance(&test_vm, DEFAULT_RAM_SIZE);
109+
110+
SAFE_PTHREAD_CREATE(&tid, NULL, vm_thread, NULL);
111+
ret = tst_kvm_wait_guest(&test_vm, 2000);
112+
113+
if (ret == KVM_TEXIT) {
114+
SAFE_PTHREAD_JOIN(tid, NULL);
115+
tst_brk(TCONF, "Guest exited early");
116+
}
117+
118+
if (ret)
119+
tst_brk(TBROK, "Wait for guest initialization timed out");
120+
121+
SAFE_PTHREAD_KILL(tid, SIGUSR1);
122+
SAFE_CLOCK_GETTIME(CLOCK_REALTIME, &timeout);
123+
timeout.tv_sec += 2;
124+
125+
if (SAFE_PTHREAD_MUTEX_TIMEDLOCK(&mutex, &timeout)) {
126+
tst_kvm_clear_guest_signal(&test_vm);
127+
tst_res(TFAIL, "VM thread does not respond to signals");
128+
} else {
129+
SAFE_PTHREAD_MUTEX_UNLOCK(&mutex);
130+
tst_res(TPASS, "VM thread was interrupted by signal");
131+
}
132+
133+
SAFE_PTHREAD_JOIN(tid, NULL);
134+
tst_kvm_destroy_instance(&test_vm);
135+
tst_free_all();
136+
}
137+
138+
static void cleanup(void)
139+
{
140+
/*
141+
* If the mutex is locked, the VM is likely still running, cannot
142+
* clean up anything
143+
*/
144+
if (!mutex_init || SAFE_PTHREAD_MUTEX_TRYLOCK(&mutex))
145+
return;
146+
147+
if (!SAFE_PTHREAD_MUTEX_UNLOCK(&mutex))
148+
SAFE_PTHREAD_MUTEX_DESTROY(&mutex);
149+
150+
tst_kvm_destroy_instance(&test_vm);
151+
}
152+
153+
static struct tst_test test = {
154+
.test_all = run,
155+
.setup = setup,
156+
.cleanup = cleanup,
157+
.min_cpus = 2,
158+
.supported_archs = (const char *const []) {
159+
"x86_64",
160+
"x86",
161+
NULL
162+
},
163+
.tags = (struct tst_tag[]){
164+
{"linux-git", "91b7130cb660"},
165+
{}
166+
}
167+
};
168+
169+
#endif /* COMPILE_PAYLOAD */

0 commit comments

Comments
 (0)