From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 26E1DCCD195 for ; Wed, 15 Oct 2025 18:37:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 81CC38E0084; Wed, 15 Oct 2025 14:37:09 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7F4488E001D; Wed, 15 Oct 2025 14:37:09 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 709E78E0084; Wed, 15 Oct 2025 14:37:09 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 5BE618E001D for ; Wed, 15 Oct 2025 14:37:09 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 1C36DC0263 for ; Wed, 15 Oct 2025 18:37:09 +0000 (UTC) X-FDA: 84001205778.21.8315CFF Received: from mail-pf1-f201.google.com (mail-pf1-f201.google.com [209.85.210.201]) by imf30.hostedemail.com (Postfix) with ESMTP id 5288C80002 for ; Wed, 15 Oct 2025 18:37:07 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=YuQxyjgp; spf=pass (imf30.hostedemail.com: domain of 30unvaAYKCLMprbaTgZhhZeX.Vhfebgnq-ffdoTVd.hkZ@flex--wyihan.bounces.google.com designates 209.85.210.201 as permitted sender) smtp.mailfrom=30unvaAYKCLMprbaTgZhhZeX.Vhfebgnq-ffdoTVd.hkZ@flex--wyihan.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1760553427; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=Oa9vOYtsfbS7qVmS0cDzbId9IkmWNaQS/5afI/UoEQk8vSWJEuHV8281uUA+8Yz0UWuDxi 24KF5i5V1ooGIV4krvJfx4MGmtRkIsm8iUm2UmTpZWpV1MjAG/hwMdsSbbdC1GhYD1aHZs qxqMT4Nt54YQL6QQyB1/HIdNobD7GbU= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1760553427; a=rsa-sha256; cv=none; b=fJe+q/8e3epLXGkIxu9i3XxJNzb0cIGfl3rrrhw2JwqAXg9irtnlmO3V65Y1wq/MMHH60R DMLHa1Obb2pyjCakDvs0C3gYxWHu6Wd/dHeickxZwsqhcFjmFUCLPGx7nX9lMOnzqvCH9N r4uRJ8MV8SlLewj5kRKroL8V8Ig+6jk= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=YuQxyjgp; spf=pass (imf30.hostedemail.com: domain of 30unvaAYKCLMprbaTgZhhZeX.Vhfebgnq-ffdoTVd.hkZ@flex--wyihan.bounces.google.com designates 209.85.210.201 as permitted sender) smtp.mailfrom=30unvaAYKCLMprbaTgZhhZeX.Vhfebgnq-ffdoTVd.hkZ@flex--wyihan.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com Received: by mail-pf1-f201.google.com with SMTP id d2e1a72fcca58-798920399a6so1361084b3a.0 for ; Wed, 15 Oct 2025 11:37:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1760553426; x=1761158226; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=YuQxyjgprAXbF4f0mOYcVJ56zXfZca4mmztBKnDLbStCdkzDHGD9iMJkhbJdbVIcfO oxOvLUPFOfCsHL0p9AZoY20FsA8+AJL8J47/UgoTwoFAF+F3ZUGoDwLfo8wwzLt/Ld0Y a9j2AQ3cavVzaDF/62bf/lqHaNNSsizPMkkxmuNDBwIMuOJ1B5c8+kiQn2B8n5FCG8vO cylPOJdgswLtl1AdPg6KdJXcN0boT0b/gfW/Fz7PQSvK+lQaeq5a0Ppbx+kg/fV0Xdmv /xq8Hz3CpH+0MmWL2pw6/o8t3thwmv8yoTzOYulrQnrLJfnegbJNQhiQIOodSRh8yWri pCIw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760553426; x=1761158226; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=Sg9bbgAcOTVr6uEmNi3fOZtMJk8h3qPCD8+Ab3O/TbuJdtUvFtXnYW2oTS+yvZRDMj O7f6BpYH0mN223QXUOGd76glJDKB73PZApl5gBM5xnt0AxotLFdx01SOszZIbgCyCeEC X6LasDhg2hG6XRgEXXCSUcLaCB0F0fUv/FlkP97im4w6nqtBMWeFefXytcsmyM6Jm1wA vPgRl/KRQrA/dUiTb8mM4Hs+VMBfAUuOp59eIArklzm81axa+zIaXk6rCrJ7Beif6PTq jHqyH7e59Rbf/9lqv0+OCCg1zN2OXLn2hQZ+t1apIgshXFRRlEjfaXuUfiyrqMqxLEgx PQ5Q== X-Forwarded-Encrypted: i=1; AJvYcCU9TJbI8+rsxeHVEfRtPEUYgtfriISzc4qWZMR45tAMoHU2m2HDcCWuPMA/MLx06P3LvaFPtECBLQ==@kvack.org X-Gm-Message-State: AOJu0Yyojbh0ReqCTe9ucipItC8hET6Wq6gKyVxijGhRv1H22TWavPit nfZRbZOXO4+d6ctNf23UHq3lTJfPrORnRXqJIJA5IYLtJjlcg1kgCOKcRbtEYrER13BclobfJRs mYF97Ow== X-Google-Smtp-Source: AGHT+IH/6fHMrWMV8yp+8Ppnbbm83SfdopptQSAUB91QvYTFNTxXFVFSpf5U8i3i7fNPRxzlbwQGpMJ/fbA= X-Received: from pfbei17.prod.google.com ([2002:a05:6a00:80d1:b0:772:3537:d602]) (user=wyihan job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a20:1593:b0:2f3:3e1b:de66 with SMTP id adf61e73a8af0-33495d4ea9cmr1351247637.7.1760553426186; Wed, 15 Oct 2025 11:37:06 -0700 (PDT) Date: Wed, 15 Oct 2025 18:35:54 +0000 In-Reply-To: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.51.0.788.g6d19910ace-goog Message-ID: <0ec7349858142439ed0a250e6c04edf84cb0f488.1760551864.git.wyihan@google.com> Subject: [RFC PATCH 3/3] KVM: selftests: Test guest_memfd behavior with respect to stage 2 page tables From: Lisa Wang To: linmiaohe@huawei.com, nao.horiguchi@gmail.com, akpm@linux-foundation.org, pbonzini@redhat.com, shuah@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.or, linux-kselftest@vger.kernel.org Cc: david@redhat.com, rientjes@google.com, seanjc@google.com, ackerleytng@google.com, vannapurve@google.com, michael.roth@amd.com, jiaqiyan@google.com, tabba@google.com, dave.hansen@linux.intel.com, Lisa Wang Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam05 X-Stat-Signature: k84syr14o3s8h146fsdpaa8aebbx79oe X-Rspam-User: X-Rspamd-Queue-Id: 5288C80002 X-HE-Tag: 1760553427-77306 X-HE-Meta: U2FsdGVkX1+HHjnuUWWR+id8oBCZwr0Cc+rzSRmmSzbzeS0qxLc5z8EXrHSXqNj+8HOFEdU/LFnu9kK6iTKAGWUUZsySW0+xNMbrvl4KPL8yckIy5c+EN4EslUM7OhAdhpez/yVanneW4xsGMRMH493Tbmx/8F+b/Fa1izYprTwJHAXMLXId8uQpyttKMPJPDGePVJBshH1be1GWHD3CJjdYchkUvWcZLan/hZjaCzk7AaoepF4XiBO+A7Ptt3z31V7TsfW1jTEKyjup1BGpOHHoYhjLwOf27ON73rjMaPRBjDC69Xm800HljOhjWrTUbXrOIHI9zQMJoqRb5qiOkFSnSAnwTfTs8YpqWtmeqbFrCJz8X9v+ycpYFfN0ZmYlpO5s52wotSaEq7Ucxs/izbkji7yLfJAGkdt+WH1PnI//PyLnbPFcrTT8wDz6wf/SXDlbJHWWfijHxsDjpZRjRR6rL4e+cHwPVsMmNH0rlpZl/8SHiPgV9DDW1lUoZGCn4JRin+3v9oWGdJ4sLnp/YTl0jopwPXO0dPqAaIGEcIQCCprmuygGveYELXf+LyhfOvwzFYj6OrfH12IQkSgy4bRkj7E/XX3320MRpSTYCzgCR5ieJmmooMTBLUXnOsgmo5BRI0NDnRw7BxmAUs1S5/Ouj/mlg7h8XxHW2trj4SreSxSZrk4hKpSEMNM39ctEYunWyONm9YS69G1JSX6gRPPwr2DM0ezSo08E/JIWNNkhIYXeSJVvmrEtVxizafSIGv4dAhGP/tMCtzWYKUf7/tdbmsunNbpZojgS7pxwhI4njPzIjKaFTjp0pYO7+cpRMtV7+kIvkjYiz7oQajzbSZwybKNaz+qWc5B1dDUf3b3FgjM4bte1xWpF31k726UPLk6cNPfMDlqsHbEjLBL2sqV3EgFAx+0MbUX2HlSRbmT+dxGsPymd/Y8lkVJyq+bMbnEnp45bhhyC7hNzJ3/ cTpOReQR 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Test that + memory failure handling results in unmapping of bad memory from stage 2 page tables, hence requiring faulting on next guest access + when the guest tries to fault a poisoned page from guest_memfd, the userspace VMM informed with EHWPOISON Co-developed-by: Ackerley Tng Signed-off-by: Ackerley Tng Signed-off-by: Lisa Wang --- .../testing/selftests/kvm/guest_memfd_test.c | 65 +++++++++++++++++++ 1 file changed, 65 insertions(+) diff --git a/tools/testing/selftests/kvm/guest_memfd_test.c b/tools/testing/selftests/kvm/guest_memfd_test.c index 7bcf8d2d5d4d..dc3398e22edd 100644 --- a/tools/testing/selftests/kvm/guest_memfd_test.c +++ b/tools/testing/selftests/kvm/guest_memfd_test.c @@ -539,6 +539,70 @@ static void test_guest_memfd_guest(void) kvm_vm_free(vm); } +static void __guest_code_read(uint8_t *mem) +{ + READ_ONCE(*mem); + GUEST_DONE(); +} + +static void guest_read(struct kvm_vcpu *vcpu, uint64_t gpa, int expected_errno) +{ + vcpu_arch_set_entry_point(vcpu, __guest_code_read); + vcpu_args_set(vcpu, 1, gpa); + + if (expected_errno) { + TEST_ASSERT_EQ(_vcpu_run(vcpu), -1); + TEST_ASSERT_EQ(errno, expected_errno); + } else { + vcpu_run(vcpu); + TEST_ASSERT_EQ(get_ucall(vcpu, NULL), UCALL_DONE); + } +} + +static void test_memory_failure_guest(void) +{ + const uint64_t gpa = SZ_4G; + const int slot = 1; + + unsigned long memory_failure_pfn; + struct kvm_vcpu *vcpu; + struct kvm_vm *vm; + uint8_t *mem; + size_t size; + int fd; + + if (!kvm_has_cap(KVM_CAP_GUEST_MEMFD_FLAGS)) + return; + + vm = __vm_create_shape_with_one_vcpu(VM_SHAPE_DEFAULT, &vcpu, 1, __guest_code_read); + + size = vm->page_size; + fd = vm_create_guest_memfd(vm, size, GUEST_MEMFD_FLAG_MMAP | GUEST_MEMFD_FLAG_INIT_SHARED); + vm_set_user_memory_region2(vm, slot, KVM_MEM_GUEST_MEMFD, gpa, size, NULL, fd, 0); + + mem = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); + TEST_ASSERT(mem != MAP_FAILED, "mmap() for guest_memfd should succeed."); + virt_pg_map(vm, gpa, gpa); + + /* Fault in page to read pfn, then unmap page for testing. */ + READ_ONCE(*mem); + memory_failure_pfn = addr_to_pfn(mem); + munmap(mem, size); + + /* Fault page into stage2 page tables. */ + guest_read(vcpu, gpa, 0); + + mark_memory_failure(memory_failure_pfn, 0); + + guest_read(vcpu, gpa, EHWPOISON); + munmap(mem, size); + + close(fd); + kvm_vm_free(vm); + + unmark_memory_failure(memory_failure_pfn, 0); +} + int main(int argc, char *argv[]) { unsigned long vm_types, vm_type; @@ -559,4 +623,5 @@ int main(int argc, char *argv[]) test_guest_memfd(vm_type); test_guest_memfd_guest(); + test_memory_failure_guest(); } -- 2.51.0.788.g6d19910ace-goog From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D9080CCD185 for ; Wed, 15 Oct 2025 19:00:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 433318E008C; Wed, 15 Oct 2025 15:00:57 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 40B4C8E000C; Wed, 15 Oct 2025 15:00:57 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 348138E008C; Wed, 15 Oct 2025 15:00:57 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 22C4E8E000C for ; Wed, 15 Oct 2025 15:00:57 -0400 (EDT) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id ED3D7140286 for ; Wed, 15 Oct 2025 19:00:56 +0000 (UTC) X-FDA: 84001265712.01.0A3BC47 Received: from mail-pj1-f74.google.com (mail-pj1-f74.google.com [209.85.216.74]) by imf03.hostedemail.com (Postfix) with ESMTP id 07F4020017 for ; Wed, 15 Oct 2025 19:00:54 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=nXqcYa9O; spf=pass (imf03.hostedemail.com: domain of 3Ze_vaAYKCFIGI21u708805y.w86527EH-664Fuw4.8B0@flex--wyihan.bounces.google.com designates 209.85.216.74 as permitted sender) smtp.mailfrom=3Ze_vaAYKCFIGI21u708805y.w86527EH-664Fuw4.8B0@flex--wyihan.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1760554855; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=OnkLkwgP0KF5gk4FK7bH6LgNXwTZCmqgRVDMrGo67XhJVwctrcb9SGGImfFGu4YuiCFcY5 LQRDXDCshhYb0qfI+D1vqvCgNfkkEZWJfCCpQJH6HCuNa1ZdBRTQThYfqYjamh1S+CcRDK qQvzVAP5+Jj1AMWJT2cYrnC4Wbl6rQA= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=nXqcYa9O; spf=pass (imf03.hostedemail.com: domain of 3Ze_vaAYKCFIGI21u708805y.w86527EH-664Fuw4.8B0@flex--wyihan.bounces.google.com designates 209.85.216.74 as permitted sender) smtp.mailfrom=3Ze_vaAYKCFIGI21u708805y.w86527EH-664Fuw4.8B0@flex--wyihan.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1760554855; a=rsa-sha256; cv=none; b=AJS9futEOP991im35zOWBVZ24J21yQz75eFCmoDjxZzVi+WA/hDVm/DI5K07v+Z5Fd+m1t OP1ynOCtp89UKHiP7jWQrPejezyzQcQlo894+12Ti0sbL7HRcO5gPaeGpH67XIXh3Sa383 Tga6HqHJFQLpM8ckXeNABynFTbsIIOc= Received: by mail-pj1-f74.google.com with SMTP id 98e67ed59e1d1-3307af9b55eso9985723a91.2 for ; Wed, 15 Oct 2025 12:00:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1760554854; x=1761159654; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=nXqcYa9OicB+BzXilR587luEC7025wRxUILhFwEBs5/O1y/OtoM27Bb7kr1Zqpdg3e sA4+OFzWjor84fjQXIZAKjYOkKVgqDPMABsfRQ9Gi1G7Phn72RvH6Q75ZV9TKFxauMJK xo84C9KxpFSNQAICB+8lj7vaSqGs140beAygYpU8b7Wpd+GVI6LWoZJKuk61N9ciDuWU nzGIFTF39M8zyeG8L4whEQWemzHk21N0LHYpBffc/VX17CiQKkc8rq9kwbai4Stgfe7p s0ke9qRGjslM3ZPMlLZtcUKagV0RC0KumvN3gv0tqh2HowA9qvlOZoBA196pZEdYS/43 2Eog== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760554854; x=1761159654; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=r/50hzPJcz2Tgtv5Q95r1Wz9trycmcqvXu8eukDbYxw=; b=IdxGMd2zXaed8ZnMAL3BXPjGAbVWAhGhBqv6fv/Pmpw6uh6hFrbLisVQWUN8CtWonh yJMJmefV6+28U9owjEp/0Qc5FTH77ruDg5tyXvU3hj8ntODSrphIfIHv2YUmTYcyjZ7m SAqIu64wdBFs3KEJDSmlauA4L61tlUqn4xVs8a/g19TBImZ0kE+ScCyHYG2xWCi1kKXE +rdjG3bcCa3gE6CB1Cqjs7aGW12/94A2YS9pt60KDbNjr6YbmFQ/sWkOwo2n96Vfo8qa Z4gHPWh+rBUkxgpqA2WQQAyp3KdgEa4hvNmk+tG4zmUZRCg48o5ygxZhpPNA3gC+EFDa IPpQ== X-Forwarded-Encrypted: i=1; AJvYcCU9plWWJSrR0VqSD5iEpz3YQf72W7W4stBcobWZfWhTnVjkuYIf/mAWlDGFeKoMU3pnAAe+mDuPcw==@kvack.org X-Gm-Message-State: AOJu0YxmmMvYgdMMA34M0LzxEcPvzyGeB8W9y9dZSmGjwxqgeTs5WEdJ aDtL7EAfx2CxIm71msXMCvOpVUCZmG6ecozRhlF1IhJGrSNI1oyoxrXZjnOrjlhif5G8W10uAEB Hvlwk+w== X-Google-Smtp-Source: AGHT+IF0aq3dEuFrF7ECI0NlSr0qYUf7fzC5xMEvWlZqMU7mOZwkC2btj1VQ3xgFa8CghlVjLKHevu9vhKE= X-Received: from pjbfs17.prod.google.com ([2002:a17:90a:f291:b0:32e:bcc3:ea8e]) (user=wyihan job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90b:4b81:b0:33b:6ef4:c904 with SMTP id 98e67ed59e1d1-33b6ef4cbbcmr19120239a91.20.1760554853833; Wed, 15 Oct 2025 12:00:53 -0700 (PDT) Date: Wed, 15 Oct 2025 18:58:57 +0000 In-Reply-To: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.51.0.788.g6d19910ace-goog Message-ID: <0ec7349858142439ed0a250e6c04edf84cb0f488.1760551864.git.wyihan@google.com> Subject: [RFC PATCH RESEND 3/3] KVM: selftests: Test guest_memfd behavior with respect to stage 2 page tables From: Lisa Wang To: linmiaohe@huawei.com, nao.horiguchi@gmail.com, akpm@linux-foundation.org, pbonzini@redhat.com, shuah@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: david@redhat.com, rientjes@google.com, seanjc@google.com, ackerleytng@google.com, vannapurve@google.com, michael.roth@amd.com, jiaqiyan@google.com, tabba@google.com, dave.hansen@linux.intel.com, Lisa Wang Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 07F4020017 X-Stat-Signature: ieofnqsc6u37ztxag16j6pkyq37r1joo X-Rspam-User: X-HE-Tag: 1760554854-37990 X-HE-Meta: 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 3AdOy4LH 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Message-ID: <20251015185857.9x-S5ePfZQy-kFx3tqTXVzSbBVB_8ZYZUWILsgeTYmM@z> Test that + memory failure handling results in unmapping of bad memory from stage 2 page tables, hence requiring faulting on next guest access + when the guest tries to fault a poisoned page from guest_memfd, the userspace VMM informed with EHWPOISON Co-developed-by: Ackerley Tng Signed-off-by: Ackerley Tng Signed-off-by: Lisa Wang --- .../testing/selftests/kvm/guest_memfd_test.c | 65 +++++++++++++++++++ 1 file changed, 65 insertions(+) diff --git a/tools/testing/selftests/kvm/guest_memfd_test.c b/tools/testing/selftests/kvm/guest_memfd_test.c index 7bcf8d2d5d4d..dc3398e22edd 100644 --- a/tools/testing/selftests/kvm/guest_memfd_test.c +++ b/tools/testing/selftests/kvm/guest_memfd_test.c @@ -539,6 +539,70 @@ static void test_guest_memfd_guest(void) kvm_vm_free(vm); } +static void __guest_code_read(uint8_t *mem) +{ + READ_ONCE(*mem); + GUEST_DONE(); +} + +static void guest_read(struct kvm_vcpu *vcpu, uint64_t gpa, int expected_errno) +{ + vcpu_arch_set_entry_point(vcpu, __guest_code_read); + vcpu_args_set(vcpu, 1, gpa); + + if (expected_errno) { + TEST_ASSERT_EQ(_vcpu_run(vcpu), -1); + TEST_ASSERT_EQ(errno, expected_errno); + } else { + vcpu_run(vcpu); + TEST_ASSERT_EQ(get_ucall(vcpu, NULL), UCALL_DONE); + } +} + +static void test_memory_failure_guest(void) +{ + const uint64_t gpa = SZ_4G; + const int slot = 1; + + unsigned long memory_failure_pfn; + struct kvm_vcpu *vcpu; + struct kvm_vm *vm; + uint8_t *mem; + size_t size; + int fd; + + if (!kvm_has_cap(KVM_CAP_GUEST_MEMFD_FLAGS)) + return; + + vm = __vm_create_shape_with_one_vcpu(VM_SHAPE_DEFAULT, &vcpu, 1, __guest_code_read); + + size = vm->page_size; + fd = vm_create_guest_memfd(vm, size, GUEST_MEMFD_FLAG_MMAP | GUEST_MEMFD_FLAG_INIT_SHARED); + vm_set_user_memory_region2(vm, slot, KVM_MEM_GUEST_MEMFD, gpa, size, NULL, fd, 0); + + mem = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); + TEST_ASSERT(mem != MAP_FAILED, "mmap() for guest_memfd should succeed."); + virt_pg_map(vm, gpa, gpa); + + /* Fault in page to read pfn, then unmap page for testing. */ + READ_ONCE(*mem); + memory_failure_pfn = addr_to_pfn(mem); + munmap(mem, size); + + /* Fault page into stage2 page tables. */ + guest_read(vcpu, gpa, 0); + + mark_memory_failure(memory_failure_pfn, 0); + + guest_read(vcpu, gpa, EHWPOISON); + munmap(mem, size); + + close(fd); + kvm_vm_free(vm); + + unmark_memory_failure(memory_failure_pfn, 0); +} + int main(int argc, char *argv[]) { unsigned long vm_types, vm_type; @@ -559,4 +623,5 @@ int main(int argc, char *argv[]) test_guest_memfd(vm_type); test_guest_memfd_guest(); + test_memory_failure_guest(); } -- 2.51.0.788.g6d19910ace-goog