1ad879127SKrish Sadhukhan #include "svm.h" 2ad879127SKrish Sadhukhan #include "libcflat.h" 3ad879127SKrish Sadhukhan #include "processor.h" 4ad879127SKrish Sadhukhan #include "desc.h" 5ad879127SKrish Sadhukhan #include "msr.h" 6ad879127SKrish Sadhukhan #include "vm.h" 7ad879127SKrish Sadhukhan #include "smp.h" 8ad879127SKrish Sadhukhan #include "types.h" 9ad879127SKrish Sadhukhan #include "alloc_page.h" 10ad879127SKrish Sadhukhan #include "isr.h" 11ad879127SKrish Sadhukhan #include "apic.h" 129da1f4d8SCathy Avery #include "delay.h" 138177dc62SManali Shukla #include "x86/usermode.h" 14ad879127SKrish Sadhukhan 15ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f 16ad879127SKrish Sadhukhan 17ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000 18ad879127SKrish Sadhukhan 19ad879127SKrish Sadhukhan u64 tsc_start; 20ad879127SKrish Sadhukhan u64 tsc_end; 21ad879127SKrish Sadhukhan 22ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum; 23ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum; 24ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum; 25ad879127SKrish Sadhukhan u64 latvmrun_max; 26ad879127SKrish Sadhukhan u64 latvmrun_min; 27ad879127SKrish Sadhukhan u64 latvmexit_max; 28ad879127SKrish Sadhukhan u64 latvmexit_min; 29ad879127SKrish Sadhukhan u64 latvmload_max; 30ad879127SKrish Sadhukhan u64 latvmload_min; 31ad879127SKrish Sadhukhan u64 latvmsave_max; 32ad879127SKrish Sadhukhan u64 latvmsave_min; 33ad879127SKrish Sadhukhan u64 latstgi_max; 34ad879127SKrish Sadhukhan u64 latstgi_min; 35ad879127SKrish Sadhukhan u64 latclgi_max; 36ad879127SKrish Sadhukhan u64 latclgi_min; 37ad879127SKrish Sadhukhan u64 runs; 38ad879127SKrish Sadhukhan 39ad879127SKrish Sadhukhan static void null_test(struct svm_test *test) 40ad879127SKrish Sadhukhan { 41ad879127SKrish Sadhukhan } 42ad879127SKrish Sadhukhan 43ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test) 44ad879127SKrish Sadhukhan { 45096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMMCALL; 46ad879127SKrish Sadhukhan } 47ad879127SKrish Sadhukhan 48ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test) 49ad879127SKrish Sadhukhan { 50096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN); 51ad879127SKrish Sadhukhan } 52ad879127SKrish Sadhukhan 53ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test) 54ad879127SKrish Sadhukhan { 55096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 56ad879127SKrish Sadhukhan } 57ad879127SKrish Sadhukhan 58ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test) 59ad879127SKrish Sadhukhan { 60096cf7feSPaolo Bonzini asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb))); 61ad879127SKrish Sadhukhan } 62ad879127SKrish Sadhukhan 63ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test) 64ad879127SKrish Sadhukhan { 65096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMRUN; 66ad879127SKrish Sadhukhan } 67ad879127SKrish Sadhukhan 68401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test) 69401299a5SPaolo Bonzini { 70401299a5SPaolo Bonzini default_prepare(test); 71401299a5SPaolo Bonzini vmcb->control.intercept |= 1 << INTERCEPT_RSM; 72401299a5SPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR); 73401299a5SPaolo Bonzini } 74401299a5SPaolo Bonzini 75401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test) 76401299a5SPaolo Bonzini { 77401299a5SPaolo Bonzini asm volatile ("rsm" : : : "memory"); 78401299a5SPaolo Bonzini } 79401299a5SPaolo Bonzini 80401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test) 81401299a5SPaolo Bonzini { 82401299a5SPaolo Bonzini return get_test_stage(test) == 2; 83401299a5SPaolo Bonzini } 84401299a5SPaolo Bonzini 85401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test) 86401299a5SPaolo Bonzini { 87401299a5SPaolo Bonzini switch (get_test_stage(test)) { 88401299a5SPaolo Bonzini case 0: 89401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_RSM) { 90198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to rsm. Exit reason 0x%x", 91401299a5SPaolo Bonzini vmcb->control.exit_code); 92401299a5SPaolo Bonzini return true; 93401299a5SPaolo Bonzini } 94401299a5SPaolo Bonzini vmcb->control.intercept &= ~(1 << INTERCEPT_RSM); 95401299a5SPaolo Bonzini inc_test_stage(test); 96401299a5SPaolo Bonzini break; 97401299a5SPaolo Bonzini 98401299a5SPaolo Bonzini case 1: 99401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) { 100198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to #UD. Exit reason 0x%x", 101401299a5SPaolo Bonzini vmcb->control.exit_code); 102401299a5SPaolo Bonzini return true; 103401299a5SPaolo Bonzini } 104401299a5SPaolo Bonzini vmcb->save.rip += 2; 105401299a5SPaolo Bonzini inc_test_stage(test); 106401299a5SPaolo Bonzini break; 107401299a5SPaolo Bonzini 108401299a5SPaolo Bonzini default: 109401299a5SPaolo Bonzini return true; 110401299a5SPaolo Bonzini } 111401299a5SPaolo Bonzini return get_test_stage(test) == 2; 112401299a5SPaolo Bonzini } 113401299a5SPaolo Bonzini 114ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test) 115ad879127SKrish Sadhukhan { 116ad879127SKrish Sadhukhan default_prepare(test); 117096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 118ad879127SKrish Sadhukhan } 119ad879127SKrish Sadhukhan 120ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test) 121ad879127SKrish Sadhukhan { 122ad879127SKrish Sadhukhan asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory"); 123ad879127SKrish Sadhukhan } 124ad879127SKrish Sadhukhan 125ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test) 126ad879127SKrish Sadhukhan { 127096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_READ_CR3; 128ad879127SKrish Sadhukhan } 129ad879127SKrish Sadhukhan 130ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test) 131ad879127SKrish Sadhukhan { 132ad879127SKrish Sadhukhan return null_check(test) && test->scratch == read_cr3(); 133ad879127SKrish Sadhukhan } 134ad879127SKrish Sadhukhan 135ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test) 136ad879127SKrish Sadhukhan { 137ad879127SKrish Sadhukhan struct svm_test *test = _test; 138ad879127SKrish Sadhukhan extern volatile u32 mmio_insn; 139ad879127SKrish Sadhukhan 140ad879127SKrish Sadhukhan while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2)) 141ad879127SKrish Sadhukhan pause(); 142ad879127SKrish Sadhukhan pause(); 143ad879127SKrish Sadhukhan pause(); 144ad879127SKrish Sadhukhan pause(); 145ad879127SKrish Sadhukhan mmio_insn = 0x90d8200f; // mov %cr3, %rax; nop 146ad879127SKrish Sadhukhan } 147ad879127SKrish Sadhukhan 148ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test) 149ad879127SKrish Sadhukhan { 150ad879127SKrish Sadhukhan default_prepare(test); 151096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 152ad879127SKrish Sadhukhan on_cpu_async(1, corrupt_cr3_intercept_bypass, test); 153ad879127SKrish Sadhukhan } 154ad879127SKrish Sadhukhan 155ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test) 156ad879127SKrish Sadhukhan { 157ad879127SKrish Sadhukhan ulong a = 0xa0000; 158ad879127SKrish Sadhukhan 159ad879127SKrish Sadhukhan test->scratch = 1; 160ad879127SKrish Sadhukhan while (test->scratch != 2) 161ad879127SKrish Sadhukhan barrier(); 162ad879127SKrish Sadhukhan 163ad879127SKrish Sadhukhan asm volatile ("mmio_insn: mov %0, (%0); nop" 164ad879127SKrish Sadhukhan : "+a"(a) : : "memory"); 165ad879127SKrish Sadhukhan test->scratch = a; 166ad879127SKrish Sadhukhan } 167ad879127SKrish Sadhukhan 168ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test) 169ad879127SKrish Sadhukhan { 170ad879127SKrish Sadhukhan default_prepare(test); 171096cf7feSPaolo Bonzini vmcb->control.intercept_dr_read = 0xff; 172096cf7feSPaolo Bonzini vmcb->control.intercept_dr_write = 0xff; 173ad879127SKrish Sadhukhan } 174ad879127SKrish Sadhukhan 175ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test) 176ad879127SKrish Sadhukhan { 177ad879127SKrish Sadhukhan unsigned int i, failcnt = 0; 178ad879127SKrish Sadhukhan 179ad879127SKrish Sadhukhan /* Loop testing debug register reads */ 180ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 181ad879127SKrish Sadhukhan 182ad879127SKrish Sadhukhan switch (i) { 183ad879127SKrish Sadhukhan case 0: 184ad879127SKrish Sadhukhan asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory"); 185ad879127SKrish Sadhukhan break; 186ad879127SKrish Sadhukhan case 1: 187ad879127SKrish Sadhukhan asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory"); 188ad879127SKrish Sadhukhan break; 189ad879127SKrish Sadhukhan case 2: 190ad879127SKrish Sadhukhan asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory"); 191ad879127SKrish Sadhukhan break; 192ad879127SKrish Sadhukhan case 3: 193ad879127SKrish Sadhukhan asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory"); 194ad879127SKrish Sadhukhan break; 195ad879127SKrish Sadhukhan case 4: 196ad879127SKrish Sadhukhan asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory"); 197ad879127SKrish Sadhukhan break; 198ad879127SKrish Sadhukhan case 5: 199ad879127SKrish Sadhukhan asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory"); 200ad879127SKrish Sadhukhan break; 201ad879127SKrish Sadhukhan case 6: 202ad879127SKrish Sadhukhan asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory"); 203ad879127SKrish Sadhukhan break; 204ad879127SKrish Sadhukhan case 7: 205ad879127SKrish Sadhukhan asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory"); 206ad879127SKrish Sadhukhan break; 207ad879127SKrish Sadhukhan } 208ad879127SKrish Sadhukhan 209ad879127SKrish Sadhukhan if (test->scratch != i) { 210198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u read intercept", i); 211ad879127SKrish Sadhukhan failcnt++; 212ad879127SKrish Sadhukhan } 213ad879127SKrish Sadhukhan } 214ad879127SKrish Sadhukhan 215ad879127SKrish Sadhukhan /* Loop testing debug register writes */ 216ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 217ad879127SKrish Sadhukhan 218ad879127SKrish Sadhukhan switch (i) { 219ad879127SKrish Sadhukhan case 0: 220ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory"); 221ad879127SKrish Sadhukhan break; 222ad879127SKrish Sadhukhan case 1: 223ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory"); 224ad879127SKrish Sadhukhan break; 225ad879127SKrish Sadhukhan case 2: 226ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory"); 227ad879127SKrish Sadhukhan break; 228ad879127SKrish Sadhukhan case 3: 229ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory"); 230ad879127SKrish Sadhukhan break; 231ad879127SKrish Sadhukhan case 4: 232ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory"); 233ad879127SKrish Sadhukhan break; 234ad879127SKrish Sadhukhan case 5: 235ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory"); 236ad879127SKrish Sadhukhan break; 237ad879127SKrish Sadhukhan case 6: 238ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory"); 239ad879127SKrish Sadhukhan break; 240ad879127SKrish Sadhukhan case 7: 241ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory"); 242ad879127SKrish Sadhukhan break; 243ad879127SKrish Sadhukhan } 244ad879127SKrish Sadhukhan 245ad879127SKrish Sadhukhan if (test->scratch != i) { 246198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u write intercept", i); 247ad879127SKrish Sadhukhan failcnt++; 248ad879127SKrish Sadhukhan } 249ad879127SKrish Sadhukhan } 250ad879127SKrish Sadhukhan 251ad879127SKrish Sadhukhan test->scratch = failcnt; 252ad879127SKrish Sadhukhan } 253ad879127SKrish Sadhukhan 254ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test) 255ad879127SKrish Sadhukhan { 256096cf7feSPaolo Bonzini ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0); 257ad879127SKrish Sadhukhan 258ad879127SKrish Sadhukhan /* Only expect DR intercepts */ 259ad879127SKrish Sadhukhan if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0)) 260ad879127SKrish Sadhukhan return true; 261ad879127SKrish Sadhukhan 262ad879127SKrish Sadhukhan /* 263ad879127SKrish Sadhukhan * Compute debug register number. 264ad879127SKrish Sadhukhan * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture 265ad879127SKrish Sadhukhan * Programmer's Manual Volume 2 - System Programming: 266ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 267ad879127SKrish Sadhukhan * there are 16 VMEXIT codes each for DR read and write. 268ad879127SKrish Sadhukhan */ 269ad879127SKrish Sadhukhan test->scratch = (n % 16); 270ad879127SKrish Sadhukhan 271ad879127SKrish Sadhukhan /* Jump over MOV instruction */ 272096cf7feSPaolo Bonzini vmcb->save.rip += 3; 273ad879127SKrish Sadhukhan 274ad879127SKrish Sadhukhan return false; 275ad879127SKrish Sadhukhan } 276ad879127SKrish Sadhukhan 277ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test) 278ad879127SKrish Sadhukhan { 279ad879127SKrish Sadhukhan return !test->scratch; 280ad879127SKrish Sadhukhan } 281ad879127SKrish Sadhukhan 282ad879127SKrish Sadhukhan static bool next_rip_supported(void) 283ad879127SKrish Sadhukhan { 284ad879127SKrish Sadhukhan return this_cpu_has(X86_FEATURE_NRIPS); 285ad879127SKrish Sadhukhan } 286ad879127SKrish Sadhukhan 287ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test) 288ad879127SKrish Sadhukhan { 289096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC); 290ad879127SKrish Sadhukhan } 291ad879127SKrish Sadhukhan 292ad879127SKrish Sadhukhan 293ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test) 294ad879127SKrish Sadhukhan { 295ad879127SKrish Sadhukhan asm volatile ("rdtsc\n\t" 296ad879127SKrish Sadhukhan ".globl exp_next_rip\n\t" 297ad879127SKrish Sadhukhan "exp_next_rip:\n\t" ::: "eax", "edx"); 298ad879127SKrish Sadhukhan } 299ad879127SKrish Sadhukhan 300ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test) 301ad879127SKrish Sadhukhan { 302ad879127SKrish Sadhukhan extern char exp_next_rip; 303ad879127SKrish Sadhukhan unsigned long address = (unsigned long)&exp_next_rip; 304ad879127SKrish Sadhukhan 305096cf7feSPaolo Bonzini return address == vmcb->control.next_rip; 306ad879127SKrish Sadhukhan } 307ad879127SKrish Sadhukhan 308ad879127SKrish Sadhukhan extern u8 *msr_bitmap; 309ad879127SKrish Sadhukhan 310ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test) 311ad879127SKrish Sadhukhan { 312ad879127SKrish Sadhukhan default_prepare(test); 313096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT); 314096cf7feSPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR); 315ad879127SKrish Sadhukhan memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE); 316ad879127SKrish Sadhukhan } 317ad879127SKrish Sadhukhan 318ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test) 319ad879127SKrish Sadhukhan { 320ad879127SKrish Sadhukhan unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */ 321ad879127SKrish Sadhukhan unsigned long msr_index; 322ad879127SKrish Sadhukhan 323ad879127SKrish Sadhukhan for (msr_index = 0; msr_index <= 0xc0011fff; msr_index++) { 324ad879127SKrish Sadhukhan if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) { 325ad879127SKrish Sadhukhan /* 326ad879127SKrish Sadhukhan * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture 327ad879127SKrish Sadhukhan * Programmer's Manual volume 2 - System Programming: 328ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 329ad879127SKrish Sadhukhan * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR. 330ad879127SKrish Sadhukhan */ 331ad879127SKrish Sadhukhan continue; 332ad879127SKrish Sadhukhan } 333ad879127SKrish Sadhukhan 334ad879127SKrish Sadhukhan /* Skips gaps between supported MSR ranges */ 335ad879127SKrish Sadhukhan if (msr_index == 0x2000) 336ad879127SKrish Sadhukhan msr_index = 0xc0000000; 337ad879127SKrish Sadhukhan else if (msr_index == 0xc0002000) 338ad879127SKrish Sadhukhan msr_index = 0xc0010000; 339ad879127SKrish Sadhukhan 340ad879127SKrish Sadhukhan test->scratch = -1; 341ad879127SKrish Sadhukhan 342ad879127SKrish Sadhukhan rdmsr(msr_index); 343ad879127SKrish Sadhukhan 344ad879127SKrish Sadhukhan /* Check that a read intercept occurred for MSR at msr_index */ 345ad879127SKrish Sadhukhan if (test->scratch != msr_index) 346198dfd0eSJanis Schoetterl-Glausch report_fail("MSR 0x%lx read intercept", msr_index); 347ad879127SKrish Sadhukhan 348ad879127SKrish Sadhukhan /* 349ad879127SKrish Sadhukhan * Poor man approach to generate a value that 350ad879127SKrish Sadhukhan * seems arbitrary each time around the loop. 351ad879127SKrish Sadhukhan */ 352ad879127SKrish Sadhukhan msr_value += (msr_value << 1); 353ad879127SKrish Sadhukhan 354ad879127SKrish Sadhukhan wrmsr(msr_index, msr_value); 355ad879127SKrish Sadhukhan 356ad879127SKrish Sadhukhan /* Check that a write intercept occurred for MSR with msr_value */ 357ad879127SKrish Sadhukhan if (test->scratch != msr_value) 358198dfd0eSJanis Schoetterl-Glausch report_fail("MSR 0x%lx write intercept", msr_index); 359ad879127SKrish Sadhukhan } 360ad879127SKrish Sadhukhan 361ad879127SKrish Sadhukhan test->scratch = -2; 362ad879127SKrish Sadhukhan } 363ad879127SKrish Sadhukhan 364ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test) 365ad879127SKrish Sadhukhan { 366096cf7feSPaolo Bonzini u32 exit_code = vmcb->control.exit_code; 367ad879127SKrish Sadhukhan u64 exit_info_1; 368ad879127SKrish Sadhukhan u8 *opcode; 369ad879127SKrish Sadhukhan 370ad879127SKrish Sadhukhan if (exit_code == SVM_EXIT_MSR) { 371096cf7feSPaolo Bonzini exit_info_1 = vmcb->control.exit_info_1; 372ad879127SKrish Sadhukhan } else { 373ad879127SKrish Sadhukhan /* 374ad879127SKrish Sadhukhan * If #GP exception occurs instead, check that it was 375ad879127SKrish Sadhukhan * for RDMSR/WRMSR and set exit_info_1 accordingly. 376ad879127SKrish Sadhukhan */ 377ad879127SKrish Sadhukhan 378ad879127SKrish Sadhukhan if (exit_code != (SVM_EXIT_EXCP_BASE + GP_VECTOR)) 379ad879127SKrish Sadhukhan return true; 380ad879127SKrish Sadhukhan 381096cf7feSPaolo Bonzini opcode = (u8 *)vmcb->save.rip; 382ad879127SKrish Sadhukhan if (opcode[0] != 0x0f) 383ad879127SKrish Sadhukhan return true; 384ad879127SKrish Sadhukhan 385ad879127SKrish Sadhukhan switch (opcode[1]) { 386ad879127SKrish Sadhukhan case 0x30: /* WRMSR */ 387ad879127SKrish Sadhukhan exit_info_1 = 1; 388ad879127SKrish Sadhukhan break; 389ad879127SKrish Sadhukhan case 0x32: /* RDMSR */ 390ad879127SKrish Sadhukhan exit_info_1 = 0; 391ad879127SKrish Sadhukhan break; 392ad879127SKrish Sadhukhan default: 393ad879127SKrish Sadhukhan return true; 394ad879127SKrish Sadhukhan } 395ad879127SKrish Sadhukhan 396ad879127SKrish Sadhukhan /* 3973f27d772SManali Shukla * Warn that #GP exception occured instead. 398ad879127SKrish Sadhukhan * RCX holds the MSR index. 399ad879127SKrish Sadhukhan */ 400ad879127SKrish Sadhukhan printf("%s 0x%lx #GP exception\n", 401ad879127SKrish Sadhukhan exit_info_1 ? "WRMSR" : "RDMSR", get_regs().rcx); 402ad879127SKrish Sadhukhan } 403ad879127SKrish Sadhukhan 404ad879127SKrish Sadhukhan /* Jump over RDMSR/WRMSR instruction */ 405096cf7feSPaolo Bonzini vmcb->save.rip += 2; 406ad879127SKrish Sadhukhan 407ad879127SKrish Sadhukhan /* 408ad879127SKrish Sadhukhan * Test whether the intercept was for RDMSR/WRMSR. 409ad879127SKrish Sadhukhan * For RDMSR, test->scratch is set to the MSR index; 410ad879127SKrish Sadhukhan * RCX holds the MSR index. 411ad879127SKrish Sadhukhan * For WRMSR, test->scratch is set to the MSR value; 412ad879127SKrish Sadhukhan * RDX holds the upper 32 bits of the MSR value, 413ad879127SKrish Sadhukhan * while RAX hold its lower 32 bits. 414ad879127SKrish Sadhukhan */ 415ad879127SKrish Sadhukhan if (exit_info_1) 416ad879127SKrish Sadhukhan test->scratch = 417096cf7feSPaolo Bonzini ((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff)); 418ad879127SKrish Sadhukhan else 419ad879127SKrish Sadhukhan test->scratch = get_regs().rcx; 420ad879127SKrish Sadhukhan 421ad879127SKrish Sadhukhan return false; 422ad879127SKrish Sadhukhan } 423ad879127SKrish Sadhukhan 424ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test) 425ad879127SKrish Sadhukhan { 426ad879127SKrish Sadhukhan memset(msr_bitmap, 0, MSR_BITMAP_SIZE); 427ad879127SKrish Sadhukhan return (test->scratch == -2); 428ad879127SKrish Sadhukhan } 429ad879127SKrish Sadhukhan 430ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test) 431ad879127SKrish Sadhukhan { 432096cf7feSPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR) 433ad879127SKrish Sadhukhan | (1ULL << UD_VECTOR) 434ad879127SKrish Sadhukhan | (1ULL << DF_VECTOR) 435ad879127SKrish Sadhukhan | (1ULL << PF_VECTOR); 436ad879127SKrish Sadhukhan test->scratch = 0; 437ad879127SKrish Sadhukhan } 438ad879127SKrish Sadhukhan 439ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test) 440ad879127SKrish Sadhukhan { 441ad879127SKrish Sadhukhan asm volatile(" cli\n" 442ad879127SKrish Sadhukhan " ljmp *1f\n" /* jump to 32-bit code segment */ 443ad879127SKrish Sadhukhan "1:\n" 444ad879127SKrish Sadhukhan " .long 2f\n" 445ad879127SKrish Sadhukhan " .long " xstr(KERNEL_CS32) "\n" 446ad879127SKrish Sadhukhan ".code32\n" 447ad879127SKrish Sadhukhan "2:\n" 448ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 449ad879127SKrish Sadhukhan " btcl $31, %%eax\n" /* clear PG */ 450ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 451ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 452ad879127SKrish Sadhukhan " rdmsr\n" 453ad879127SKrish Sadhukhan " btcl $8, %%eax\n" /* clear LME */ 454ad879127SKrish Sadhukhan " wrmsr\n" 455ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 456ad879127SKrish Sadhukhan " btcl $5, %%eax\n" /* clear PAE */ 457ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 458ad879127SKrish Sadhukhan " movw %[ds16], %%ax\n" 459ad879127SKrish Sadhukhan " movw %%ax, %%ds\n" 460ad879127SKrish Sadhukhan " ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */ 461ad879127SKrish Sadhukhan ".code16\n" 462ad879127SKrish Sadhukhan "3:\n" 463ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 464ad879127SKrish Sadhukhan " btcl $0, %%eax\n" /* clear PE */ 465ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 466ad879127SKrish Sadhukhan " ljmpl $0, $4f\n" /* jump to real-mode */ 467ad879127SKrish Sadhukhan "4:\n" 468ad879127SKrish Sadhukhan " vmmcall\n" 469ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 470ad879127SKrish Sadhukhan " btsl $0, %%eax\n" /* set PE */ 471ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 472ad879127SKrish Sadhukhan " ljmpl %[cs32], $5f\n" /* back to protected mode */ 473ad879127SKrish Sadhukhan ".code32\n" 474ad879127SKrish Sadhukhan "5:\n" 475ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 476ad879127SKrish Sadhukhan " btsl $5, %%eax\n" /* set PAE */ 477ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 478ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 479ad879127SKrish Sadhukhan " rdmsr\n" 480ad879127SKrish Sadhukhan " btsl $8, %%eax\n" /* set LME */ 481ad879127SKrish Sadhukhan " wrmsr\n" 482ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 483ad879127SKrish Sadhukhan " btsl $31, %%eax\n" /* set PG */ 484ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 485ad879127SKrish Sadhukhan " ljmpl %[cs64], $6f\n" /* back to long mode */ 486ad879127SKrish Sadhukhan ".code64\n\t" 487ad879127SKrish Sadhukhan "6:\n" 488ad879127SKrish Sadhukhan " vmmcall\n" 489ad879127SKrish Sadhukhan :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16), 490ad879127SKrish Sadhukhan [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64) 491ad879127SKrish Sadhukhan : "rax", "rbx", "rcx", "rdx", "memory"); 492ad879127SKrish Sadhukhan } 493ad879127SKrish Sadhukhan 494ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test) 495ad879127SKrish Sadhukhan { 496ad879127SKrish Sadhukhan u64 cr0, cr4, efer; 497ad879127SKrish Sadhukhan 498096cf7feSPaolo Bonzini cr0 = vmcb->save.cr0; 499096cf7feSPaolo Bonzini cr4 = vmcb->save.cr4; 500096cf7feSPaolo Bonzini efer = vmcb->save.efer; 501ad879127SKrish Sadhukhan 502ad879127SKrish Sadhukhan /* Only expect VMMCALL intercepts */ 503096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) 504ad879127SKrish Sadhukhan return true; 505ad879127SKrish Sadhukhan 506ad879127SKrish Sadhukhan /* Jump over VMMCALL instruction */ 507096cf7feSPaolo Bonzini vmcb->save.rip += 3; 508ad879127SKrish Sadhukhan 509ad879127SKrish Sadhukhan /* Do sanity checks */ 510ad879127SKrish Sadhukhan switch (test->scratch) { 511ad879127SKrish Sadhukhan case 0: 512ad879127SKrish Sadhukhan /* Test should be in real mode now - check for this */ 513ad879127SKrish Sadhukhan if ((cr0 & 0x80000001) || /* CR0.PG, CR0.PE */ 514ad879127SKrish Sadhukhan (cr4 & 0x00000020) || /* CR4.PAE */ 515ad879127SKrish Sadhukhan (efer & 0x00000500)) /* EFER.LMA, EFER.LME */ 516ad879127SKrish Sadhukhan return true; 517ad879127SKrish Sadhukhan break; 518ad879127SKrish Sadhukhan case 2: 519ad879127SKrish Sadhukhan /* Test should be back in long-mode now - check for this */ 520ad879127SKrish Sadhukhan if (((cr0 & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */ 521ad879127SKrish Sadhukhan ((cr4 & 0x00000020) != 0x00000020) || /* CR4.PAE */ 522ad879127SKrish Sadhukhan ((efer & 0x00000500) != 0x00000500)) /* EFER.LMA, EFER.LME */ 523ad879127SKrish Sadhukhan return true; 524ad879127SKrish Sadhukhan break; 525ad879127SKrish Sadhukhan } 526ad879127SKrish Sadhukhan 527ad879127SKrish Sadhukhan /* one step forward */ 528ad879127SKrish Sadhukhan test->scratch += 1; 529ad879127SKrish Sadhukhan 530ad879127SKrish Sadhukhan return test->scratch == 2; 531ad879127SKrish Sadhukhan } 532ad879127SKrish Sadhukhan 533ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test) 534ad879127SKrish Sadhukhan { 535ad879127SKrish Sadhukhan return test->scratch == 2; 536ad879127SKrish Sadhukhan } 537ad879127SKrish Sadhukhan 538ad879127SKrish Sadhukhan extern u8 *io_bitmap; 539ad879127SKrish Sadhukhan 540ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test) 541ad879127SKrish Sadhukhan { 542096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT); 543ad879127SKrish Sadhukhan test->scratch = 0; 544ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8192); 545ad879127SKrish Sadhukhan io_bitmap[8192] = 0xFF; 546ad879127SKrish Sadhukhan } 547ad879127SKrish Sadhukhan 548ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test) 549ad879127SKrish Sadhukhan { 550ad879127SKrish Sadhukhan // stage 0, test IO pass 551ad879127SKrish Sadhukhan inb(0x5000); 552ad879127SKrish Sadhukhan outb(0x0, 0x5000); 553ad879127SKrish Sadhukhan if (get_test_stage(test) != 0) 554ad879127SKrish Sadhukhan goto fail; 555ad879127SKrish Sadhukhan 556ad879127SKrish Sadhukhan // test IO width, in/out 557ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 558ad879127SKrish Sadhukhan inc_test_stage(test); 559ad879127SKrish Sadhukhan inb(0x0); 560ad879127SKrish Sadhukhan if (get_test_stage(test) != 2) 561ad879127SKrish Sadhukhan goto fail; 562ad879127SKrish Sadhukhan 563ad879127SKrish Sadhukhan outw(0x0, 0x0); 564ad879127SKrish Sadhukhan if (get_test_stage(test) != 3) 565ad879127SKrish Sadhukhan goto fail; 566ad879127SKrish Sadhukhan 567ad879127SKrish Sadhukhan inl(0x0); 568ad879127SKrish Sadhukhan if (get_test_stage(test) != 4) 569ad879127SKrish Sadhukhan goto fail; 570ad879127SKrish Sadhukhan 571ad879127SKrish Sadhukhan // test low/high IO port 572ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 573ad879127SKrish Sadhukhan inb(0x5000); 574ad879127SKrish Sadhukhan if (get_test_stage(test) != 5) 575ad879127SKrish Sadhukhan goto fail; 576ad879127SKrish Sadhukhan 577ad879127SKrish Sadhukhan io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8)); 578ad879127SKrish Sadhukhan inw(0x9000); 579ad879127SKrish Sadhukhan if (get_test_stage(test) != 6) 580ad879127SKrish Sadhukhan goto fail; 581ad879127SKrish Sadhukhan 582ad879127SKrish Sadhukhan // test partial pass 583ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 584ad879127SKrish Sadhukhan inl(0x4FFF); 585ad879127SKrish Sadhukhan if (get_test_stage(test) != 7) 586ad879127SKrish Sadhukhan goto fail; 587ad879127SKrish Sadhukhan 588ad879127SKrish Sadhukhan // test across pages 589ad879127SKrish Sadhukhan inc_test_stage(test); 590ad879127SKrish Sadhukhan inl(0x7FFF); 591ad879127SKrish Sadhukhan if (get_test_stage(test) != 8) 592ad879127SKrish Sadhukhan goto fail; 593ad879127SKrish Sadhukhan 594ad879127SKrish Sadhukhan inc_test_stage(test); 595ad879127SKrish Sadhukhan io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8); 596ad879127SKrish Sadhukhan inl(0x7FFF); 597ad879127SKrish Sadhukhan if (get_test_stage(test) != 10) 598ad879127SKrish Sadhukhan goto fail; 599ad879127SKrish Sadhukhan 600ad879127SKrish Sadhukhan io_bitmap[0] = 0; 601ad879127SKrish Sadhukhan inl(0xFFFF); 602ad879127SKrish Sadhukhan if (get_test_stage(test) != 11) 603ad879127SKrish Sadhukhan goto fail; 604ad879127SKrish Sadhukhan 605ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 606ad879127SKrish Sadhukhan io_bitmap[8192] = 0; 607ad879127SKrish Sadhukhan inl(0xFFFF); 608ad879127SKrish Sadhukhan inc_test_stage(test); 609ad879127SKrish Sadhukhan if (get_test_stage(test) != 12) 610ad879127SKrish Sadhukhan goto fail; 611ad879127SKrish Sadhukhan 612ad879127SKrish Sadhukhan return; 613ad879127SKrish Sadhukhan 614ad879127SKrish Sadhukhan fail: 615198dfd0eSJanis Schoetterl-Glausch report_fail("stage %d", get_test_stage(test)); 616ad879127SKrish Sadhukhan test->scratch = -1; 617ad879127SKrish Sadhukhan } 618ad879127SKrish Sadhukhan 619ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test) 620ad879127SKrish Sadhukhan { 621ad879127SKrish Sadhukhan unsigned port, size; 622ad879127SKrish Sadhukhan 623ad879127SKrish Sadhukhan /* Only expect IOIO intercepts */ 624096cf7feSPaolo Bonzini if (vmcb->control.exit_code == SVM_EXIT_VMMCALL) 625ad879127SKrish Sadhukhan return true; 626ad879127SKrish Sadhukhan 627096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_IOIO) 628ad879127SKrish Sadhukhan return true; 629ad879127SKrish Sadhukhan 630ad879127SKrish Sadhukhan /* one step forward */ 631ad879127SKrish Sadhukhan test->scratch += 1; 632ad879127SKrish Sadhukhan 633096cf7feSPaolo Bonzini port = vmcb->control.exit_info_1 >> 16; 634096cf7feSPaolo Bonzini size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7; 635ad879127SKrish Sadhukhan 636ad879127SKrish Sadhukhan while (size--) { 637ad879127SKrish Sadhukhan io_bitmap[port / 8] &= ~(1 << (port & 7)); 638ad879127SKrish Sadhukhan port++; 639ad879127SKrish Sadhukhan } 640ad879127SKrish Sadhukhan 641ad879127SKrish Sadhukhan return false; 642ad879127SKrish Sadhukhan } 643ad879127SKrish Sadhukhan 644ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test) 645ad879127SKrish Sadhukhan { 646ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8193); 647ad879127SKrish Sadhukhan return test->scratch != -1; 648ad879127SKrish Sadhukhan } 649ad879127SKrish Sadhukhan 650ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test) 651ad879127SKrish Sadhukhan { 652096cf7feSPaolo Bonzini vmcb->control.asid = 0; 653ad879127SKrish Sadhukhan } 654ad879127SKrish Sadhukhan 655ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test) 656ad879127SKrish Sadhukhan { 657ad879127SKrish Sadhukhan asm volatile ("vmmcall\n\t"); 658ad879127SKrish Sadhukhan } 659ad879127SKrish Sadhukhan 660ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test) 661ad879127SKrish Sadhukhan { 662096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 663ad879127SKrish Sadhukhan } 664ad879127SKrish Sadhukhan 665ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test) 666ad879127SKrish Sadhukhan { 667096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0); 668ad879127SKrish Sadhukhan } 669ad879127SKrish Sadhukhan 670ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test) 671ad879127SKrish Sadhukhan { 672ad879127SKrish Sadhukhan return true; 673ad879127SKrish Sadhukhan } 674ad879127SKrish Sadhukhan 675ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test) 676ad879127SKrish Sadhukhan { 677ad879127SKrish Sadhukhan unsigned long cr0; 678ad879127SKrish Sadhukhan 679ad879127SKrish Sadhukhan /* read cr0, clear CD, and write back */ 680ad879127SKrish Sadhukhan cr0 = read_cr0(); 681ad879127SKrish Sadhukhan cr0 |= (1UL << 30); 682ad879127SKrish Sadhukhan write_cr0(cr0); 683ad879127SKrish Sadhukhan 684ad879127SKrish Sadhukhan /* 685ad879127SKrish Sadhukhan * If we are here the test failed, not sure what to do now because we 686ad879127SKrish Sadhukhan * are not in guest-mode anymore so we can't trigger an intercept. 687ad879127SKrish Sadhukhan * Trigger a tripple-fault for now. 688ad879127SKrish Sadhukhan */ 689198dfd0eSJanis Schoetterl-Glausch report_fail("sel_cr0 test. Can not recover from this - exiting"); 690ad879127SKrish Sadhukhan exit(report_summary()); 691ad879127SKrish Sadhukhan } 692ad879127SKrish Sadhukhan 693ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test) 694ad879127SKrish Sadhukhan { 695096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE; 696ad879127SKrish Sadhukhan } 697ad879127SKrish Sadhukhan 698ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE (1ll << 32) 699f3154609SBill Wendling #define TSC_OFFSET_VALUE (~0ull << 48) 700ad879127SKrish Sadhukhan static bool ok; 701ad879127SKrish Sadhukhan 70210a65fc4SNadav Amit static bool tsc_adjust_supported(void) 70310a65fc4SNadav Amit { 70410a65fc4SNadav Amit return this_cpu_has(X86_FEATURE_TSC_ADJUST); 70510a65fc4SNadav Amit } 70610a65fc4SNadav Amit 707ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test) 708ad879127SKrish Sadhukhan { 709ad879127SKrish Sadhukhan default_prepare(test); 710096cf7feSPaolo Bonzini vmcb->control.tsc_offset = TSC_OFFSET_VALUE; 711ad879127SKrish Sadhukhan 712ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE); 713ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 714ad879127SKrish Sadhukhan ok = adjust == -TSC_ADJUST_VALUE; 715ad879127SKrish Sadhukhan } 716ad879127SKrish Sadhukhan 717ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test) 718ad879127SKrish Sadhukhan { 719ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 720ad879127SKrish Sadhukhan ok &= adjust == -TSC_ADJUST_VALUE; 721ad879127SKrish Sadhukhan 722ad879127SKrish Sadhukhan uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE; 723ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE); 724ad879127SKrish Sadhukhan 725ad879127SKrish Sadhukhan adjust = rdmsr(MSR_IA32_TSC_ADJUST); 726ad879127SKrish Sadhukhan ok &= adjust <= -2 * TSC_ADJUST_VALUE; 727ad879127SKrish Sadhukhan 728ad879127SKrish Sadhukhan uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE; 729ad879127SKrish Sadhukhan ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 730ad879127SKrish Sadhukhan 731ad879127SKrish Sadhukhan uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE; 732ad879127SKrish Sadhukhan ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 733ad879127SKrish Sadhukhan } 734ad879127SKrish Sadhukhan 735ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test) 736ad879127SKrish Sadhukhan { 737ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 738ad879127SKrish Sadhukhan 739ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, 0); 740ad879127SKrish Sadhukhan return ok && adjust <= -2 * TSC_ADJUST_VALUE; 741ad879127SKrish Sadhukhan } 742ad879127SKrish Sadhukhan 743a8503d50SMaxim Levitsky 744a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value; 745a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */ 746a8503d50SMaxim Levitsky #define TSC_SHIFT 24 747a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10 748a8503d50SMaxim Levitsky 749a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test) 750a8503d50SMaxim Levitsky { 751a8503d50SMaxim Levitsky u64 start_tsc = rdtsc(); 752a8503d50SMaxim Levitsky 753a8503d50SMaxim Levitsky while (rdtsc() - start_tsc < guest_tsc_delay_value) 754a8503d50SMaxim Levitsky cpu_relax(); 755a8503d50SMaxim Levitsky } 756a8503d50SMaxim Levitsky 757a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration, 758a8503d50SMaxim Levitsky double tsc_scale, u64 tsc_offset) 759a8503d50SMaxim Levitsky { 760a8503d50SMaxim Levitsky u64 start_tsc, actual_duration; 761a8503d50SMaxim Levitsky 762a8503d50SMaxim Levitsky guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale; 763a8503d50SMaxim Levitsky 764a8503d50SMaxim Levitsky test_set_guest(svm_tsc_scale_guest); 765a8503d50SMaxim Levitsky vmcb->control.tsc_offset = tsc_offset; 766a8503d50SMaxim Levitsky wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32))); 767a8503d50SMaxim Levitsky 768a8503d50SMaxim Levitsky start_tsc = rdtsc(); 769a8503d50SMaxim Levitsky 770a8503d50SMaxim Levitsky if (svm_vmrun() != SVM_EXIT_VMMCALL) 771a8503d50SMaxim Levitsky report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code); 772a8503d50SMaxim Levitsky 773a8503d50SMaxim Levitsky actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT; 774a8503d50SMaxim Levitsky 775a8503d50SMaxim Levitsky report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)", 776a8503d50SMaxim Levitsky duration, actual_duration); 777a8503d50SMaxim Levitsky } 778a8503d50SMaxim Levitsky 779a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void) 780a8503d50SMaxim Levitsky { 781a8503d50SMaxim Levitsky int i; 782a8503d50SMaxim Levitsky 783a8503d50SMaxim Levitsky if (!tsc_scale_supported()) { 784a8503d50SMaxim Levitsky report_skip("TSC scale not supported in the guest"); 785a8503d50SMaxim Levitsky return; 786a8503d50SMaxim Levitsky } 787a8503d50SMaxim Levitsky 788a8503d50SMaxim Levitsky report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT, 789a8503d50SMaxim Levitsky "initial TSC scale ratio"); 790a8503d50SMaxim Levitsky 791a8503d50SMaxim Levitsky for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) { 792a8503d50SMaxim Levitsky 793a8503d50SMaxim Levitsky double tsc_scale = (double)(rdrand() % 100 + 1) / 10; 794a8503d50SMaxim Levitsky int duration = rdrand() % 50 + 1; 795a8503d50SMaxim Levitsky u64 tsc_offset = rdrand(); 796a8503d50SMaxim Levitsky 797a8503d50SMaxim Levitsky report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld", 798a8503d50SMaxim Levitsky duration, (int)(tsc_scale * 100), tsc_offset); 799a8503d50SMaxim Levitsky 800a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset); 801a8503d50SMaxim Levitsky } 802a8503d50SMaxim Levitsky 803a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 255, rdrand()); 804a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 0.0001, rdrand()); 805a8503d50SMaxim Levitsky } 806a8503d50SMaxim Levitsky 807ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test) 808ad879127SKrish Sadhukhan { 809ad879127SKrish Sadhukhan default_prepare(test); 810ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 811ad879127SKrish Sadhukhan latvmrun_min = latvmexit_min = -1ULL; 812ad879127SKrish Sadhukhan latvmrun_max = latvmexit_max = 0; 813ad879127SKrish Sadhukhan vmrun_sum = vmexit_sum = 0; 814ad879127SKrish Sadhukhan tsc_start = rdtsc(); 815ad879127SKrish Sadhukhan } 816ad879127SKrish Sadhukhan 817ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test) 818ad879127SKrish Sadhukhan { 819ad879127SKrish Sadhukhan u64 cycles; 820ad879127SKrish Sadhukhan 821ad879127SKrish Sadhukhan start: 822ad879127SKrish Sadhukhan tsc_end = rdtsc(); 823ad879127SKrish Sadhukhan 824ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 825ad879127SKrish Sadhukhan 826ad879127SKrish Sadhukhan if (cycles > latvmrun_max) 827ad879127SKrish Sadhukhan latvmrun_max = cycles; 828ad879127SKrish Sadhukhan 829ad879127SKrish Sadhukhan if (cycles < latvmrun_min) 830ad879127SKrish Sadhukhan latvmrun_min = cycles; 831ad879127SKrish Sadhukhan 832ad879127SKrish Sadhukhan vmrun_sum += cycles; 833ad879127SKrish Sadhukhan 834ad879127SKrish Sadhukhan tsc_start = rdtsc(); 835ad879127SKrish Sadhukhan 836ad879127SKrish Sadhukhan asm volatile ("vmmcall" : : : "memory"); 837ad879127SKrish Sadhukhan goto start; 838ad879127SKrish Sadhukhan } 839ad879127SKrish Sadhukhan 840ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test) 841ad879127SKrish Sadhukhan { 842ad879127SKrish Sadhukhan u64 cycles; 843ad879127SKrish Sadhukhan 844ad879127SKrish Sadhukhan tsc_end = rdtsc(); 845ad879127SKrish Sadhukhan 846ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 847ad879127SKrish Sadhukhan 848ad879127SKrish Sadhukhan if (cycles > latvmexit_max) 849ad879127SKrish Sadhukhan latvmexit_max = cycles; 850ad879127SKrish Sadhukhan 851ad879127SKrish Sadhukhan if (cycles < latvmexit_min) 852ad879127SKrish Sadhukhan latvmexit_min = cycles; 853ad879127SKrish Sadhukhan 854ad879127SKrish Sadhukhan vmexit_sum += cycles; 855ad879127SKrish Sadhukhan 856096cf7feSPaolo Bonzini vmcb->save.rip += 3; 857ad879127SKrish Sadhukhan 858ad879127SKrish Sadhukhan runs -= 1; 859ad879127SKrish Sadhukhan 860ad879127SKrish Sadhukhan tsc_end = rdtsc(); 861ad879127SKrish Sadhukhan 862ad879127SKrish Sadhukhan return runs == 0; 863ad879127SKrish Sadhukhan } 864ad879127SKrish Sadhukhan 865f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test) 866f7fa53dcSPaolo Bonzini { 867f7fa53dcSPaolo Bonzini vmcb->control.clean = VMCB_CLEAN_ALL; 868f7fa53dcSPaolo Bonzini return latency_finished(test); 869f7fa53dcSPaolo Bonzini } 870f7fa53dcSPaolo Bonzini 871ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test) 872ad879127SKrish Sadhukhan { 873ad879127SKrish Sadhukhan printf(" Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max, 874ad879127SKrish Sadhukhan latvmrun_min, vmrun_sum / LATENCY_RUNS); 875ad879127SKrish Sadhukhan printf(" Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max, 876ad879127SKrish Sadhukhan latvmexit_min, vmexit_sum / LATENCY_RUNS); 877ad879127SKrish Sadhukhan return true; 878ad879127SKrish Sadhukhan } 879ad879127SKrish Sadhukhan 880ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test) 881ad879127SKrish Sadhukhan { 882ad879127SKrish Sadhukhan default_prepare(test); 883ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 884ad879127SKrish Sadhukhan latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL; 885ad879127SKrish Sadhukhan latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0; 886ad879127SKrish Sadhukhan vmload_sum = vmsave_sum = stgi_sum = clgi_sum; 887ad879127SKrish Sadhukhan } 888ad879127SKrish Sadhukhan 889ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test) 890ad879127SKrish Sadhukhan { 891096cf7feSPaolo Bonzini u64 vmcb_phys = virt_to_phys(vmcb); 892ad879127SKrish Sadhukhan u64 cycles; 893ad879127SKrish Sadhukhan 894ad879127SKrish Sadhukhan for ( ; runs != 0; runs--) { 895ad879127SKrish Sadhukhan tsc_start = rdtsc(); 896ad879127SKrish Sadhukhan asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory"); 897ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 898ad879127SKrish Sadhukhan if (cycles > latvmload_max) 899ad879127SKrish Sadhukhan latvmload_max = cycles; 900ad879127SKrish Sadhukhan if (cycles < latvmload_min) 901ad879127SKrish Sadhukhan latvmload_min = cycles; 902ad879127SKrish Sadhukhan vmload_sum += cycles; 903ad879127SKrish Sadhukhan 904ad879127SKrish Sadhukhan tsc_start = rdtsc(); 905ad879127SKrish Sadhukhan asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory"); 906ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 907ad879127SKrish Sadhukhan if (cycles > latvmsave_max) 908ad879127SKrish Sadhukhan latvmsave_max = cycles; 909ad879127SKrish Sadhukhan if (cycles < latvmsave_min) 910ad879127SKrish Sadhukhan latvmsave_min = cycles; 911ad879127SKrish Sadhukhan vmsave_sum += cycles; 912ad879127SKrish Sadhukhan 913ad879127SKrish Sadhukhan tsc_start = rdtsc(); 914ad879127SKrish Sadhukhan asm volatile("stgi\n\t"); 915ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 916ad879127SKrish Sadhukhan if (cycles > latstgi_max) 917ad879127SKrish Sadhukhan latstgi_max = cycles; 918ad879127SKrish Sadhukhan if (cycles < latstgi_min) 919ad879127SKrish Sadhukhan latstgi_min = cycles; 920ad879127SKrish Sadhukhan stgi_sum += cycles; 921ad879127SKrish Sadhukhan 922ad879127SKrish Sadhukhan tsc_start = rdtsc(); 923ad879127SKrish Sadhukhan asm volatile("clgi\n\t"); 924ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 925ad879127SKrish Sadhukhan if (cycles > latclgi_max) 926ad879127SKrish Sadhukhan latclgi_max = cycles; 927ad879127SKrish Sadhukhan if (cycles < latclgi_min) 928ad879127SKrish Sadhukhan latclgi_min = cycles; 929ad879127SKrish Sadhukhan clgi_sum += cycles; 930ad879127SKrish Sadhukhan } 931ad879127SKrish Sadhukhan 932ad879127SKrish Sadhukhan tsc_end = rdtsc(); 933ad879127SKrish Sadhukhan 934ad879127SKrish Sadhukhan return true; 935ad879127SKrish Sadhukhan } 936ad879127SKrish Sadhukhan 937ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test) 938ad879127SKrish Sadhukhan { 939ad879127SKrish Sadhukhan printf(" Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max, 940ad879127SKrish Sadhukhan latvmload_min, vmload_sum / LATENCY_RUNS); 941ad879127SKrish Sadhukhan printf(" Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max, 942ad879127SKrish Sadhukhan latvmsave_min, vmsave_sum / LATENCY_RUNS); 943ad879127SKrish Sadhukhan printf(" Latency STGI: max: %ld min: %ld avg: %ld\n", latstgi_max, 944ad879127SKrish Sadhukhan latstgi_min, stgi_sum / LATENCY_RUNS); 945ad879127SKrish Sadhukhan printf(" Latency CLGI: max: %ld min: %ld avg: %ld\n", latclgi_max, 946ad879127SKrish Sadhukhan latclgi_min, clgi_sum / LATENCY_RUNS); 947ad879127SKrish Sadhukhan return true; 948ad879127SKrish Sadhukhan } 949ad879127SKrish Sadhukhan 950*493d27d4SSean Christopherson /* 951*493d27d4SSean Christopherson * Report failures from SVM guest code, and on failure, set the stage to -1 and 952*493d27d4SSean Christopherson * do VMMCALL to terminate the test (host side must treat -1 as "finished"). 953*493d27d4SSean Christopherson * TODO: fix the tests that don't play nice with a straight report, e.g. the 954*493d27d4SSean Christopherson * V_TPR test fails if report() is invoked. 955*493d27d4SSean Christopherson */ 956*493d27d4SSean Christopherson #define report_svm_guest(cond, test, fmt, args...) \ 957*493d27d4SSean Christopherson do { \ 958*493d27d4SSean Christopherson if (!(cond)) { \ 959*493d27d4SSean Christopherson report_fail(fmt, ##args); \ 960*493d27d4SSean Christopherson set_test_stage(test, -1); \ 961*493d27d4SSean Christopherson vmmcall(); \ 962*493d27d4SSean Christopherson } \ 963*493d27d4SSean Christopherson } while (0) 964*493d27d4SSean Christopherson 965ad879127SKrish Sadhukhan bool pending_event_ipi_fired; 966ad879127SKrish Sadhukhan bool pending_event_guest_run; 967ad879127SKrish Sadhukhan 968ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs) 969ad879127SKrish Sadhukhan { 970ad879127SKrish Sadhukhan pending_event_ipi_fired = true; 971ad879127SKrish Sadhukhan eoi(); 972ad879127SKrish Sadhukhan } 973ad879127SKrish Sadhukhan 974ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test) 975ad879127SKrish Sadhukhan { 976ad879127SKrish Sadhukhan int ipi_vector = 0xf1; 977ad879127SKrish Sadhukhan 978ad879127SKrish Sadhukhan default_prepare(test); 979ad879127SKrish Sadhukhan 980ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 981ad879127SKrish Sadhukhan 982ad879127SKrish Sadhukhan handle_irq(ipi_vector, pending_event_ipi_isr); 983ad879127SKrish Sadhukhan 984ad879127SKrish Sadhukhan pending_event_guest_run = false; 985ad879127SKrish Sadhukhan 986096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 987096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 988ad879127SKrish Sadhukhan 989ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 990ad879127SKrish Sadhukhan APIC_DM_FIXED | ipi_vector, 0); 991ad879127SKrish Sadhukhan 992ad879127SKrish Sadhukhan set_test_stage(test, 0); 993ad879127SKrish Sadhukhan } 994ad879127SKrish Sadhukhan 995ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test) 996ad879127SKrish Sadhukhan { 997ad879127SKrish Sadhukhan pending_event_guest_run = true; 998ad879127SKrish Sadhukhan } 999ad879127SKrish Sadhukhan 1000ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test) 1001ad879127SKrish Sadhukhan { 1002ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 1003ad879127SKrish Sadhukhan case 0: 1004096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 1005198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x", 1006096cf7feSPaolo Bonzini vmcb->control.exit_code); 1007ad879127SKrish Sadhukhan return true; 1008ad879127SKrish Sadhukhan } 1009ad879127SKrish Sadhukhan 1010096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 1011096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 1012ad879127SKrish Sadhukhan 1013ad879127SKrish Sadhukhan if (pending_event_guest_run) { 1014198dfd0eSJanis Schoetterl-Glausch report_fail("Guest ran before host received IPI\n"); 1015ad879127SKrish Sadhukhan return true; 1016ad879127SKrish Sadhukhan } 1017ad879127SKrish Sadhukhan 1018ad879127SKrish Sadhukhan irq_enable(); 1019ad879127SKrish Sadhukhan asm volatile ("nop"); 1020ad879127SKrish Sadhukhan irq_disable(); 1021ad879127SKrish Sadhukhan 1022ad879127SKrish Sadhukhan if (!pending_event_ipi_fired) { 1023198dfd0eSJanis Schoetterl-Glausch report_fail("Pending interrupt not dispatched after IRQ enabled\n"); 1024ad879127SKrish Sadhukhan return true; 1025ad879127SKrish Sadhukhan } 1026ad879127SKrish Sadhukhan break; 1027ad879127SKrish Sadhukhan 1028ad879127SKrish Sadhukhan case 1: 1029ad879127SKrish Sadhukhan if (!pending_event_guest_run) { 1030198dfd0eSJanis Schoetterl-Glausch report_fail("Guest did not resume when no interrupt\n"); 1031ad879127SKrish Sadhukhan return true; 1032ad879127SKrish Sadhukhan } 1033ad879127SKrish Sadhukhan break; 1034ad879127SKrish Sadhukhan } 1035ad879127SKrish Sadhukhan 1036ad879127SKrish Sadhukhan inc_test_stage(test); 1037ad879127SKrish Sadhukhan 1038ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1039ad879127SKrish Sadhukhan } 1040ad879127SKrish Sadhukhan 1041ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test) 1042ad879127SKrish Sadhukhan { 1043ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1044ad879127SKrish Sadhukhan } 1045ad879127SKrish Sadhukhan 104685dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test) 1047ad879127SKrish Sadhukhan { 1048ad879127SKrish Sadhukhan default_prepare(test); 1049ad879127SKrish Sadhukhan 1050ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1051ad879127SKrish Sadhukhan 1052ad879127SKrish Sadhukhan handle_irq(0xf1, pending_event_ipi_isr); 1053ad879127SKrish Sadhukhan 1054ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1055ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1056ad879127SKrish Sadhukhan 1057ad879127SKrish Sadhukhan set_test_stage(test, 0); 1058ad879127SKrish Sadhukhan } 1059ad879127SKrish Sadhukhan 106085dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test) 1061ad879127SKrish Sadhukhan { 1062ad879127SKrish Sadhukhan asm("cli"); 1063ad879127SKrish Sadhukhan } 1064ad879127SKrish Sadhukhan 106585dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test) 1066ad879127SKrish Sadhukhan { 1067*493d27d4SSean Christopherson report_svm_guest(!pending_event_ipi_fired, test, 1068*493d27d4SSean Christopherson "IRQ should NOT be delivered while IRQs disabled"); 1069ad879127SKrish Sadhukhan 107085dc2aceSPaolo Bonzini /* VINTR_MASKING is zero. This should cause the IPI to fire. */ 1071ad879127SKrish Sadhukhan irq_enable(); 1072ad879127SKrish Sadhukhan asm volatile ("nop"); 1073ad879127SKrish Sadhukhan irq_disable(); 1074ad879127SKrish Sadhukhan 1075*493d27d4SSean Christopherson report_svm_guest(pending_event_ipi_fired, test, 1076*493d27d4SSean Christopherson "IRQ should be delivered after enabling IRQs"); 1077ad879127SKrish Sadhukhan vmmcall(); 1078ad879127SKrish Sadhukhan 107985dc2aceSPaolo Bonzini /* 108085dc2aceSPaolo Bonzini * Now VINTR_MASKING=1, but no interrupt is pending so 108185dc2aceSPaolo Bonzini * the VINTR interception should be clear in VMCB02. Check 108285dc2aceSPaolo Bonzini * that L0 did not leave a stale VINTR in the VMCB. 108385dc2aceSPaolo Bonzini */ 1084ad879127SKrish Sadhukhan irq_enable(); 1085ad879127SKrish Sadhukhan asm volatile ("nop"); 1086ad879127SKrish Sadhukhan irq_disable(); 1087ad879127SKrish Sadhukhan } 1088ad879127SKrish Sadhukhan 108985dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test) 1090ad879127SKrish Sadhukhan { 1091*493d27d4SSean Christopherson report_svm_guest(vmcb->control.exit_code == SVM_EXIT_VMMCALL, test, 1092*493d27d4SSean Christopherson "Wanted VMMCALL VM-Exit, got exit reason 0x%x", 1093096cf7feSPaolo Bonzini vmcb->control.exit_code); 1094ad879127SKrish Sadhukhan 1095ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 1096ad879127SKrish Sadhukhan case 0: 1097096cf7feSPaolo Bonzini vmcb->save.rip += 3; 1098ad879127SKrish Sadhukhan 1099ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1100ad879127SKrish Sadhukhan 1101096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 1102ad879127SKrish Sadhukhan 110385dc2aceSPaolo Bonzini /* Now entering again with VINTR_MASKING=1. */ 1104ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1105ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1106ad879127SKrish Sadhukhan 1107ad879127SKrish Sadhukhan break; 1108ad879127SKrish Sadhukhan 1109ad879127SKrish Sadhukhan case 1: 1110ad879127SKrish Sadhukhan if (pending_event_ipi_fired == true) { 1111198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt triggered by guest"); 1112ad879127SKrish Sadhukhan return true; 1113ad879127SKrish Sadhukhan } 1114ad879127SKrish Sadhukhan 1115ad879127SKrish Sadhukhan irq_enable(); 1116ad879127SKrish Sadhukhan asm volatile ("nop"); 1117ad879127SKrish Sadhukhan irq_disable(); 1118ad879127SKrish Sadhukhan 1119ad879127SKrish Sadhukhan if (pending_event_ipi_fired != true) { 1120198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt not triggered by host"); 1121ad879127SKrish Sadhukhan return true; 1122ad879127SKrish Sadhukhan } 1123ad879127SKrish Sadhukhan 1124ad879127SKrish Sadhukhan break; 1125ad879127SKrish Sadhukhan 1126ad879127SKrish Sadhukhan default: 1127ad879127SKrish Sadhukhan return true; 1128ad879127SKrish Sadhukhan } 1129ad879127SKrish Sadhukhan 1130ad879127SKrish Sadhukhan inc_test_stage(test); 1131ad879127SKrish Sadhukhan 1132ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1133ad879127SKrish Sadhukhan } 1134ad879127SKrish Sadhukhan 113585dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test) 1136ad879127SKrish Sadhukhan { 1137ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1138ad879127SKrish Sadhukhan } 1139ad879127SKrish Sadhukhan 114085dc2aceSPaolo Bonzini #define TIMER_VECTOR 222 114185dc2aceSPaolo Bonzini 114285dc2aceSPaolo Bonzini static volatile bool timer_fired; 114385dc2aceSPaolo Bonzini 114485dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs) 114585dc2aceSPaolo Bonzini { 114685dc2aceSPaolo Bonzini timer_fired = true; 114785dc2aceSPaolo Bonzini apic_write(APIC_EOI, 0); 114885dc2aceSPaolo Bonzini } 114985dc2aceSPaolo Bonzini 115085dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test) 115185dc2aceSPaolo Bonzini { 115285dc2aceSPaolo Bonzini default_prepare(test); 115385dc2aceSPaolo Bonzini handle_irq(TIMER_VECTOR, timer_isr); 115485dc2aceSPaolo Bonzini timer_fired = false; 115585dc2aceSPaolo Bonzini set_test_stage(test, 0); 115685dc2aceSPaolo Bonzini } 115785dc2aceSPaolo Bonzini 115885dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test) 115985dc2aceSPaolo Bonzini { 116085dc2aceSPaolo Bonzini long long start, loops; 116185dc2aceSPaolo Bonzini 116285dc2aceSPaolo Bonzini apic_write(APIC_LVTT, TIMER_VECTOR); 116385dc2aceSPaolo Bonzini irq_enable(); 116485dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1); //Timer Initial Count Register 0x380 one-shot 116585dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 116685dc2aceSPaolo Bonzini asm volatile ("nop"); 116785dc2aceSPaolo Bonzini 1168*493d27d4SSean Christopherson report_svm_guest(timer_fired, test, 1169*493d27d4SSean Christopherson "direct interrupt while running guest"); 117085dc2aceSPaolo Bonzini 117185dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 117285dc2aceSPaolo Bonzini irq_disable(); 117385dc2aceSPaolo Bonzini vmmcall(); 117485dc2aceSPaolo Bonzini 117585dc2aceSPaolo Bonzini timer_fired = false; 117685dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1); 117785dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 117885dc2aceSPaolo Bonzini asm volatile ("nop"); 117985dc2aceSPaolo Bonzini 1180*493d27d4SSean Christopherson report_svm_guest(timer_fired, test, 1181*493d27d4SSean Christopherson "intercepted interrupt while running guest"); 118285dc2aceSPaolo Bonzini 118385dc2aceSPaolo Bonzini irq_enable(); 118485dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 118585dc2aceSPaolo Bonzini irq_disable(); 118685dc2aceSPaolo Bonzini 118785dc2aceSPaolo Bonzini timer_fired = false; 118885dc2aceSPaolo Bonzini start = rdtsc(); 118985dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1000000); 1190a3001422SOliver Upton safe_halt(); 119185dc2aceSPaolo Bonzini 1192*493d27d4SSean Christopherson report_svm_guest(timer_fired, test, "direct interrupt + hlt"); 1193*493d27d4SSean Christopherson report(rdtsc() - start > 10000, "IRQ arrived after expected delay"); 119485dc2aceSPaolo Bonzini 119585dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 119685dc2aceSPaolo Bonzini irq_disable(); 119785dc2aceSPaolo Bonzini vmmcall(); 119885dc2aceSPaolo Bonzini 119985dc2aceSPaolo Bonzini timer_fired = false; 120085dc2aceSPaolo Bonzini start = rdtsc(); 120185dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1000000); 120285dc2aceSPaolo Bonzini asm volatile ("hlt"); 120385dc2aceSPaolo Bonzini 1204*493d27d4SSean Christopherson report_svm_guest(timer_fired, test, "intercepted interrupt + hlt"); 1205*493d27d4SSean Christopherson report(rdtsc() - start > 10000, "IRQ arrived after expected delay"); 120685dc2aceSPaolo Bonzini 120785dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 120885dc2aceSPaolo Bonzini irq_disable(); 120985dc2aceSPaolo Bonzini } 121085dc2aceSPaolo Bonzini 121185dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test) 121285dc2aceSPaolo Bonzini { 121385dc2aceSPaolo Bonzini switch (get_test_stage(test)) { 121485dc2aceSPaolo Bonzini case 0: 121585dc2aceSPaolo Bonzini case 2: 1216096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1217198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1218096cf7feSPaolo Bonzini vmcb->control.exit_code); 121985dc2aceSPaolo Bonzini return true; 122085dc2aceSPaolo Bonzini } 1221096cf7feSPaolo Bonzini vmcb->save.rip += 3; 122285dc2aceSPaolo Bonzini 1223096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1224096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 122585dc2aceSPaolo Bonzini break; 122685dc2aceSPaolo Bonzini 122785dc2aceSPaolo Bonzini case 1: 122885dc2aceSPaolo Bonzini case 3: 1229096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 1230198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x", 1231096cf7feSPaolo Bonzini vmcb->control.exit_code); 123285dc2aceSPaolo Bonzini return true; 123385dc2aceSPaolo Bonzini } 123485dc2aceSPaolo Bonzini 123585dc2aceSPaolo Bonzini irq_enable(); 123685dc2aceSPaolo Bonzini asm volatile ("nop"); 123785dc2aceSPaolo Bonzini irq_disable(); 123885dc2aceSPaolo Bonzini 1239096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 1240096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 124185dc2aceSPaolo Bonzini break; 124285dc2aceSPaolo Bonzini 124385dc2aceSPaolo Bonzini case 4: 124485dc2aceSPaolo Bonzini break; 124585dc2aceSPaolo Bonzini 124685dc2aceSPaolo Bonzini default: 124785dc2aceSPaolo Bonzini return true; 124885dc2aceSPaolo Bonzini } 124985dc2aceSPaolo Bonzini 125085dc2aceSPaolo Bonzini inc_test_stage(test); 125185dc2aceSPaolo Bonzini 125285dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 125385dc2aceSPaolo Bonzini } 125485dc2aceSPaolo Bonzini 125585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test) 125685dc2aceSPaolo Bonzini { 125785dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 125885dc2aceSPaolo Bonzini } 125985dc2aceSPaolo Bonzini 1260d4db486bSCathy Avery static volatile bool nmi_fired; 1261d4db486bSCathy Avery 12624a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs) 1263d4db486bSCathy Avery { 1264d4db486bSCathy Avery nmi_fired = true; 1265d4db486bSCathy Avery } 1266d4db486bSCathy Avery 1267d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test) 1268d4db486bSCathy Avery { 1269d4db486bSCathy Avery default_prepare(test); 1270d4db486bSCathy Avery nmi_fired = false; 12714a1207f6SMaxim Levitsky handle_exception(NMI_VECTOR, nmi_handler); 1272d4db486bSCathy Avery set_test_stage(test, 0); 1273d4db486bSCathy Avery } 1274d4db486bSCathy Avery 1275d4db486bSCathy Avery static void nmi_test(struct svm_test *test) 1276d4db486bSCathy Avery { 1277d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1278d4db486bSCathy Avery 1279*493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "direct NMI while running guest"); 1280d4db486bSCathy Avery 1281d4db486bSCathy Avery vmmcall(); 1282d4db486bSCathy Avery 1283d4db486bSCathy Avery nmi_fired = false; 1284d4db486bSCathy Avery 1285d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1286d4db486bSCathy Avery 1287*493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "intercepted pending NMI delivered to guest"); 1288d4db486bSCathy Avery } 1289d4db486bSCathy Avery 1290d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test) 1291d4db486bSCathy Avery { 1292d4db486bSCathy Avery switch (get_test_stage(test)) { 1293d4db486bSCathy Avery case 0: 1294d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1295198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1296d4db486bSCathy Avery vmcb->control.exit_code); 1297d4db486bSCathy Avery return true; 1298d4db486bSCathy Avery } 1299d4db486bSCathy Avery vmcb->save.rip += 3; 1300d4db486bSCathy Avery 1301d4db486bSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 1302d4db486bSCathy Avery break; 1303d4db486bSCathy Avery 1304d4db486bSCathy Avery case 1: 1305d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1306198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 1307d4db486bSCathy Avery vmcb->control.exit_code); 1308d4db486bSCathy Avery return true; 1309d4db486bSCathy Avery } 1310d4db486bSCathy Avery 13115c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 1312d4db486bSCathy Avery break; 1313d4db486bSCathy Avery 1314d4db486bSCathy Avery case 2: 1315d4db486bSCathy Avery break; 1316d4db486bSCathy Avery 1317d4db486bSCathy Avery default: 1318d4db486bSCathy Avery return true; 1319d4db486bSCathy Avery } 1320d4db486bSCathy Avery 1321d4db486bSCathy Avery inc_test_stage(test); 1322d4db486bSCathy Avery 1323d4db486bSCathy Avery return get_test_stage(test) == 3; 1324d4db486bSCathy Avery } 1325d4db486bSCathy Avery 1326d4db486bSCathy Avery static bool nmi_check(struct svm_test *test) 1327d4db486bSCathy Avery { 1328d4db486bSCathy Avery return get_test_stage(test) == 3; 1329d4db486bSCathy Avery } 1330d4db486bSCathy Avery 13319da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL 13329da1f4d8SCathy Avery 13339da1f4d8SCathy Avery static void nmi_message_thread(void *_test) 13349da1f4d8SCathy Avery { 13359da1f4d8SCathy Avery struct svm_test *test = _test; 13369da1f4d8SCathy Avery 13379da1f4d8SCathy Avery while (get_test_stage(test) != 1) 13389da1f4d8SCathy Avery pause(); 13399da1f4d8SCathy Avery 13409da1f4d8SCathy Avery delay(NMI_DELAY); 13419da1f4d8SCathy Avery 13429da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 13439da1f4d8SCathy Avery 13449da1f4d8SCathy Avery while (get_test_stage(test) != 2) 13459da1f4d8SCathy Avery pause(); 13469da1f4d8SCathy Avery 13479da1f4d8SCathy Avery delay(NMI_DELAY); 13489da1f4d8SCathy Avery 13499da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 13509da1f4d8SCathy Avery } 13519da1f4d8SCathy Avery 13529da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test) 13539da1f4d8SCathy Avery { 13549da1f4d8SCathy Avery long long start; 13559da1f4d8SCathy Avery 13569da1f4d8SCathy Avery on_cpu_async(1, nmi_message_thread, test); 13579da1f4d8SCathy Avery 13589da1f4d8SCathy Avery start = rdtsc(); 13599da1f4d8SCathy Avery 13609da1f4d8SCathy Avery set_test_stage(test, 1); 13619da1f4d8SCathy Avery 13629da1f4d8SCathy Avery asm volatile ("hlt"); 13639da1f4d8SCathy Avery 1364*493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "direct NMI + hlt"); 1365*493d27d4SSean Christopherson report(rdtsc() - start > NMI_DELAY, "direct NMI after expected delay"); 13669da1f4d8SCathy Avery 13679da1f4d8SCathy Avery nmi_fired = false; 13689da1f4d8SCathy Avery 13699da1f4d8SCathy Avery vmmcall(); 13709da1f4d8SCathy Avery 13719da1f4d8SCathy Avery start = rdtsc(); 13729da1f4d8SCathy Avery 13739da1f4d8SCathy Avery set_test_stage(test, 2); 13749da1f4d8SCathy Avery 13759da1f4d8SCathy Avery asm volatile ("hlt"); 13769da1f4d8SCathy Avery 1377*493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "intercepted NMI + hlt"); 1378*493d27d4SSean Christopherson report(rdtsc() - start > NMI_DELAY, "intercepted NMI after expected delay"); 13799da1f4d8SCathy Avery 13809da1f4d8SCathy Avery set_test_stage(test, 3); 13819da1f4d8SCathy Avery } 13829da1f4d8SCathy Avery 13839da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test) 13849da1f4d8SCathy Avery { 13859da1f4d8SCathy Avery switch (get_test_stage(test)) { 13869da1f4d8SCathy Avery case 1: 13879da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1388198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 13899da1f4d8SCathy Avery vmcb->control.exit_code); 13909da1f4d8SCathy Avery return true; 13919da1f4d8SCathy Avery } 13929da1f4d8SCathy Avery vmcb->save.rip += 3; 13939da1f4d8SCathy Avery 13949da1f4d8SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 13959da1f4d8SCathy Avery break; 13969da1f4d8SCathy Avery 13979da1f4d8SCathy Avery case 2: 13989da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1399198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 14009da1f4d8SCathy Avery vmcb->control.exit_code); 14019da1f4d8SCathy Avery return true; 14029da1f4d8SCathy Avery } 14039da1f4d8SCathy Avery 14045c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 14059da1f4d8SCathy Avery break; 14069da1f4d8SCathy Avery 14079da1f4d8SCathy Avery case 3: 14089da1f4d8SCathy Avery break; 14099da1f4d8SCathy Avery 14109da1f4d8SCathy Avery default: 14119da1f4d8SCathy Avery return true; 14129da1f4d8SCathy Avery } 14139da1f4d8SCathy Avery 14149da1f4d8SCathy Avery return get_test_stage(test) == 3; 14159da1f4d8SCathy Avery } 14169da1f4d8SCathy Avery 14179da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test) 14189da1f4d8SCathy Avery { 14199da1f4d8SCathy Avery return get_test_stage(test) == 3; 14209da1f4d8SCathy Avery } 14219da1f4d8SCathy Avery 14224b4fb247SPaolo Bonzini static volatile int count_exc = 0; 14234b4fb247SPaolo Bonzini 14244b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r) 14254b4fb247SPaolo Bonzini { 14264b4fb247SPaolo Bonzini count_exc++; 14274b4fb247SPaolo Bonzini } 14284b4fb247SPaolo Bonzini 14294b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test) 14304b4fb247SPaolo Bonzini { 14318634a266SPaolo Bonzini default_prepare(test); 14324b4fb247SPaolo Bonzini handle_exception(DE_VECTOR, my_isr); 14334b4fb247SPaolo Bonzini handle_exception(NMI_VECTOR, my_isr); 14344b4fb247SPaolo Bonzini } 14354b4fb247SPaolo Bonzini 14364b4fb247SPaolo Bonzini 14374b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test) 14384b4fb247SPaolo Bonzini { 14394b4fb247SPaolo Bonzini asm volatile ("vmmcall\n\tvmmcall\n\t"); 14404b4fb247SPaolo Bonzini } 14414b4fb247SPaolo Bonzini 14424b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test) 14434b4fb247SPaolo Bonzini { 14444b4fb247SPaolo Bonzini switch (get_test_stage(test)) { 14454b4fb247SPaolo Bonzini case 0: 14464b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1447198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 14484b4fb247SPaolo Bonzini vmcb->control.exit_code); 14494b4fb247SPaolo Bonzini return true; 14504b4fb247SPaolo Bonzini } 14512c1ca866SNadav Amit vmcb->save.rip += 3; 14524b4fb247SPaolo Bonzini vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 14534b4fb247SPaolo Bonzini break; 14544b4fb247SPaolo Bonzini 14554b4fb247SPaolo Bonzini case 1: 14564b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_ERR) { 1457198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to error. Exit reason 0x%x", 14584b4fb247SPaolo Bonzini vmcb->control.exit_code); 14594b4fb247SPaolo Bonzini return true; 14604b4fb247SPaolo Bonzini } 14614b4fb247SPaolo Bonzini report(count_exc == 0, "exception with vector 2 not injected"); 14624b4fb247SPaolo Bonzini vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 14634b4fb247SPaolo Bonzini break; 14644b4fb247SPaolo Bonzini 14654b4fb247SPaolo Bonzini case 2: 14664b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1467198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 14684b4fb247SPaolo Bonzini vmcb->control.exit_code); 14694b4fb247SPaolo Bonzini return true; 14704b4fb247SPaolo Bonzini } 14712c1ca866SNadav Amit vmcb->save.rip += 3; 14724b4fb247SPaolo Bonzini report(count_exc == 1, "divide overflow exception injected"); 14734b4fb247SPaolo Bonzini report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared"); 14744b4fb247SPaolo Bonzini break; 14754b4fb247SPaolo Bonzini 14764b4fb247SPaolo Bonzini default: 14774b4fb247SPaolo Bonzini return true; 14784b4fb247SPaolo Bonzini } 14794b4fb247SPaolo Bonzini 14804b4fb247SPaolo Bonzini inc_test_stage(test); 14814b4fb247SPaolo Bonzini 14824b4fb247SPaolo Bonzini return get_test_stage(test) == 3; 14834b4fb247SPaolo Bonzini } 14844b4fb247SPaolo Bonzini 14854b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test) 14864b4fb247SPaolo Bonzini { 14874b4fb247SPaolo Bonzini return count_exc == 1 && get_test_stage(test) == 3; 14884b4fb247SPaolo Bonzini } 14894b4fb247SPaolo Bonzini 14909c838954SCathy Avery static volatile bool virq_fired; 14919c838954SCathy Avery 14929c838954SCathy Avery static void virq_isr(isr_regs_t *regs) 14939c838954SCathy Avery { 14949c838954SCathy Avery virq_fired = true; 14959c838954SCathy Avery } 14969c838954SCathy Avery 14979c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test) 14989c838954SCathy Avery { 14999c838954SCathy Avery handle_irq(0xf1, virq_isr); 15009c838954SCathy Avery default_prepare(test); 15019c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 15029c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority 15039c838954SCathy Avery vmcb->control.int_vector = 0xf1; 15049c838954SCathy Avery virq_fired = false; 15059c838954SCathy Avery set_test_stage(test, 0); 15069c838954SCathy Avery } 15079c838954SCathy Avery 15089c838954SCathy Avery static void virq_inject_test(struct svm_test *test) 15099c838954SCathy Avery { 1510*493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli"); 15119c838954SCathy Avery 15129c838954SCathy Avery irq_enable(); 15139c838954SCathy Avery asm volatile ("nop"); 15149c838954SCathy Avery irq_disable(); 15159c838954SCathy Avery 1516*493d27d4SSean Christopherson report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti"); 15179c838954SCathy Avery 15189c838954SCathy Avery vmmcall(); 15199c838954SCathy Avery 1520*493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli"); 15219c838954SCathy Avery 15229c838954SCathy Avery irq_enable(); 15239c838954SCathy Avery asm volatile ("nop"); 15249c838954SCathy Avery irq_disable(); 15259c838954SCathy Avery 1526*493d27d4SSean Christopherson report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti"); 15279c838954SCathy Avery 15289c838954SCathy Avery vmmcall(); 15299c838954SCathy Avery 15309c838954SCathy Avery irq_enable(); 15319c838954SCathy Avery asm volatile ("nop"); 15329c838954SCathy Avery irq_disable(); 15339c838954SCathy Avery 1534*493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, 1535*493d27d4SSean Christopherson "virtual IRQ blocked V_IRQ_PRIO less than V_TPR"); 15369c838954SCathy Avery 15379c838954SCathy Avery vmmcall(); 15389c838954SCathy Avery vmmcall(); 15399c838954SCathy Avery } 15409c838954SCathy Avery 15419c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test) 15429c838954SCathy Avery { 15439c838954SCathy Avery vmcb->save.rip += 3; 15449c838954SCathy Avery 15459c838954SCathy Avery switch (get_test_stage(test)) { 15469c838954SCathy Avery case 0: 15479c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1548198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15499c838954SCathy Avery vmcb->control.exit_code); 15509c838954SCathy Avery return true; 15519c838954SCathy Avery } 15529c838954SCathy Avery if (vmcb->control.int_ctl & V_IRQ_MASK) { 1553198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ not cleared on VMEXIT after firing"); 15549c838954SCathy Avery return true; 15559c838954SCathy Avery } 15569c838954SCathy Avery virq_fired = false; 15579c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 15589c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 15599c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); 15609c838954SCathy Avery break; 15619c838954SCathy Avery 15629c838954SCathy Avery case 1: 15639c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VINTR) { 1564198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vintr. Exit reason 0x%x", 15659c838954SCathy Avery vmcb->control.exit_code); 15669c838954SCathy Avery return true; 15679c838954SCathy Avery } 15689c838954SCathy Avery if (virq_fired) { 1569198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ fired before SVM_EXIT_VINTR"); 15709c838954SCathy Avery return true; 15719c838954SCathy Avery } 15729c838954SCathy Avery vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR); 15739c838954SCathy Avery break; 15749c838954SCathy Avery 15759c838954SCathy Avery case 2: 15769c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1577198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15789c838954SCathy Avery vmcb->control.exit_code); 15799c838954SCathy Avery return true; 15809c838954SCathy Avery } 15819c838954SCathy Avery virq_fired = false; 15829c838954SCathy Avery // Set irq to lower priority 15839c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 15849c838954SCathy Avery (0x08 << V_INTR_PRIO_SHIFT); 15859c838954SCathy Avery // Raise guest TPR 15869c838954SCathy Avery vmcb->control.int_ctl |= 0x0a & V_TPR_MASK; 15879c838954SCathy Avery break; 15889c838954SCathy Avery 15899c838954SCathy Avery case 3: 15909c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1591198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15929c838954SCathy Avery vmcb->control.exit_code); 15939c838954SCathy Avery return true; 15949c838954SCathy Avery } 15959c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 15969c838954SCathy Avery break; 15979c838954SCathy Avery 15989c838954SCathy Avery case 4: 15999c838954SCathy Avery // INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR 16009c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1601198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16029c838954SCathy Avery vmcb->control.exit_code); 16039c838954SCathy Avery return true; 16049c838954SCathy Avery } 16059c838954SCathy Avery break; 16069c838954SCathy Avery 16079c838954SCathy Avery default: 16089c838954SCathy Avery return true; 16099c838954SCathy Avery } 16109c838954SCathy Avery 16119c838954SCathy Avery inc_test_stage(test); 16129c838954SCathy Avery 16139c838954SCathy Avery return get_test_stage(test) == 5; 16149c838954SCathy Avery } 16159c838954SCathy Avery 16169c838954SCathy Avery static bool virq_inject_check(struct svm_test *test) 16179c838954SCathy Avery { 16189c838954SCathy Avery return get_test_stage(test) == 5; 16199c838954SCathy Avery } 16209c838954SCathy Avery 1621da338a31SMaxim Levitsky /* 1622da338a31SMaxim Levitsky * Detect nested guest RIP corruption as explained in kernel commit 1623da338a31SMaxim Levitsky * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73 1624da338a31SMaxim Levitsky * 1625da338a31SMaxim Levitsky * In the assembly loop below 'ins' is executed while IO instructions 1626da338a31SMaxim Levitsky * are not intercepted; the instruction is emulated by L0. 1627da338a31SMaxim Levitsky * 1628da338a31SMaxim Levitsky * At the same time we are getting interrupts from the local APIC timer, 1629da338a31SMaxim Levitsky * and we do intercept them in L1 1630da338a31SMaxim Levitsky * 1631da338a31SMaxim Levitsky * If the interrupt happens on the insb instruction, L0 will VMexit, emulate 1632da338a31SMaxim Levitsky * the insb instruction and then it will inject the interrupt to L1 through 1633da338a31SMaxim Levitsky * a nested VMexit. Due to a bug, it would leave pre-emulation values of RIP, 1634da338a31SMaxim Levitsky * RAX and RSP in the VMCB. 1635da338a31SMaxim Levitsky * 1636da338a31SMaxim Levitsky * In our intercept handler we detect the bug by checking that RIP is that of 1637da338a31SMaxim Levitsky * the insb instruction, but its memory operand has already been written. 1638da338a31SMaxim Levitsky * This means that insb was already executed. 1639da338a31SMaxim Levitsky */ 1640da338a31SMaxim Levitsky 1641da338a31SMaxim Levitsky static volatile int isr_cnt = 0; 1642da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA; 1643da338a31SMaxim Levitsky extern const char insb_instruction_label[]; 1644da338a31SMaxim Levitsky 1645da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs) 1646da338a31SMaxim Levitsky { 1647da338a31SMaxim Levitsky isr_cnt++; 1648da338a31SMaxim Levitsky apic_write(APIC_EOI, 0); 1649da338a31SMaxim Levitsky } 1650da338a31SMaxim Levitsky 1651da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test) 1652da338a31SMaxim Levitsky { 1653da338a31SMaxim Levitsky default_prepare(test); 1654da338a31SMaxim Levitsky set_test_stage(test, 0); 1655da338a31SMaxim Levitsky 1656da338a31SMaxim Levitsky vmcb->control.int_ctl = V_INTR_MASKING_MASK; 1657da338a31SMaxim Levitsky vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1658da338a31SMaxim Levitsky 1659da338a31SMaxim Levitsky handle_irq(TIMER_VECTOR, reg_corruption_isr); 1660da338a31SMaxim Levitsky 1661da338a31SMaxim Levitsky /* set local APIC to inject external interrupts */ 1662da338a31SMaxim Levitsky apic_write(APIC_TMICT, 0); 1663da338a31SMaxim Levitsky apic_write(APIC_TDCR, 0); 1664da338a31SMaxim Levitsky apic_write(APIC_LVTT, TIMER_VECTOR | APIC_LVT_TIMER_PERIODIC); 1665da338a31SMaxim Levitsky apic_write(APIC_TMICT, 1000); 1666da338a31SMaxim Levitsky } 1667da338a31SMaxim Levitsky 1668da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test) 1669da338a31SMaxim Levitsky { 1670da338a31SMaxim Levitsky /* this is endless loop, which is interrupted by the timer interrupt */ 1671da338a31SMaxim Levitsky asm volatile ( 1672da338a31SMaxim Levitsky "1:\n\t" 1673da338a31SMaxim Levitsky "movw $0x4d0, %%dx\n\t" // IO port 1674da338a31SMaxim Levitsky "lea %[io_port_var], %%rdi\n\t" 1675da338a31SMaxim Levitsky "movb $0xAA, %[io_port_var]\n\t" 1676da338a31SMaxim Levitsky "insb_instruction_label:\n\t" 1677da338a31SMaxim Levitsky "insb\n\t" 1678da338a31SMaxim Levitsky "jmp 1b\n\t" 1679da338a31SMaxim Levitsky 1680da338a31SMaxim Levitsky : [io_port_var] "=m" (io_port_var) 1681da338a31SMaxim Levitsky : /* no inputs*/ 1682da338a31SMaxim Levitsky : "rdx", "rdi" 1683da338a31SMaxim Levitsky ); 1684da338a31SMaxim Levitsky } 1685da338a31SMaxim Levitsky 1686da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test) 1687da338a31SMaxim Levitsky { 1688da338a31SMaxim Levitsky if (isr_cnt == 10000) { 16895c3582f0SJanis Schoetterl-Glausch report_pass("No RIP corruption detected after %d timer interrupts", 1690da338a31SMaxim Levitsky isr_cnt); 1691da338a31SMaxim Levitsky set_test_stage(test, 1); 1692491bbc64SMaxim Levitsky goto cleanup; 1693da338a31SMaxim Levitsky } 1694da338a31SMaxim Levitsky 1695da338a31SMaxim Levitsky if (vmcb->control.exit_code == SVM_EXIT_INTR) { 1696da338a31SMaxim Levitsky 1697da338a31SMaxim Levitsky void* guest_rip = (void*)vmcb->save.rip; 1698da338a31SMaxim Levitsky 1699da338a31SMaxim Levitsky irq_enable(); 1700da338a31SMaxim Levitsky asm volatile ("nop"); 1701da338a31SMaxim Levitsky irq_disable(); 1702da338a31SMaxim Levitsky 1703da338a31SMaxim Levitsky if (guest_rip == insb_instruction_label && io_port_var != 0xAA) { 1704198dfd0eSJanis Schoetterl-Glausch report_fail("RIP corruption detected after %d timer interrupts", 1705da338a31SMaxim Levitsky isr_cnt); 1706491bbc64SMaxim Levitsky goto cleanup; 1707da338a31SMaxim Levitsky } 1708da338a31SMaxim Levitsky 1709da338a31SMaxim Levitsky } 1710da338a31SMaxim Levitsky return false; 1711491bbc64SMaxim Levitsky cleanup: 1712491bbc64SMaxim Levitsky apic_write(APIC_LVTT, APIC_LVT_TIMER_MASK); 1713491bbc64SMaxim Levitsky apic_write(APIC_TMICT, 0); 1714491bbc64SMaxim Levitsky return true; 1715491bbc64SMaxim Levitsky 1716da338a31SMaxim Levitsky } 1717da338a31SMaxim Levitsky 1718da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test) 1719da338a31SMaxim Levitsky { 1720da338a31SMaxim Levitsky return get_test_stage(test) == 1; 1721da338a31SMaxim Levitsky } 1722da338a31SMaxim Levitsky 17234770e9c8SCathy Avery static void get_tss_entry(void *data) 17244770e9c8SCathy Avery { 1725a7f32d87SPaolo Bonzini *((gdt_entry_t **)data) = get_tss_descr(); 17264770e9c8SCathy Avery } 17274770e9c8SCathy Avery 17284770e9c8SCathy Avery static int orig_cpu_count; 17294770e9c8SCathy Avery 17304770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test) 17314770e9c8SCathy Avery { 1732a7f32d87SPaolo Bonzini gdt_entry_t *tss_entry; 17334770e9c8SCathy Avery int i; 17344770e9c8SCathy Avery 17354770e9c8SCathy Avery on_cpu(1, get_tss_entry, &tss_entry); 17364770e9c8SCathy Avery 1737d36b378fSVarad Gautam orig_cpu_count = atomic_read(&cpu_online_count); 17384770e9c8SCathy Avery 17394770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 17404770e9c8SCathy Avery id_map[1]); 17414770e9c8SCathy Avery 17424770e9c8SCathy Avery delay(100000000ULL); 17434770e9c8SCathy Avery 1744d36b378fSVarad Gautam atomic_dec(&cpu_online_count); 17454770e9c8SCathy Avery 1746a7f32d87SPaolo Bonzini tss_entry->type &= ~DESC_BUSY; 17474770e9c8SCathy Avery 17484770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]); 17494770e9c8SCathy Avery 1750d36b378fSVarad Gautam for (i = 0; i < 5 && atomic_read(&cpu_online_count) < orig_cpu_count; i++) 17514770e9c8SCathy Avery delay(100000000ULL); 17524770e9c8SCathy Avery } 17534770e9c8SCathy Avery 17544770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test) 17554770e9c8SCathy Avery { 17564770e9c8SCathy Avery return true; 17574770e9c8SCathy Avery } 17584770e9c8SCathy Avery 17594770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test) 17604770e9c8SCathy Avery { 1761d36b378fSVarad Gautam return atomic_read(&cpu_online_count) == orig_cpu_count; 17624770e9c8SCathy Avery } 17634770e9c8SCathy Avery 1764d5da6dfeSCathy Avery static volatile bool init_intercept; 1765d5da6dfeSCathy Avery 1766d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test) 1767d5da6dfeSCathy Avery { 1768d5da6dfeSCathy Avery init_intercept = false; 1769d5da6dfeSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_INIT); 1770d5da6dfeSCathy Avery } 1771d5da6dfeSCathy Avery 1772d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test) 1773d5da6dfeSCathy Avery { 1774d5da6dfeSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0); 1775d5da6dfeSCathy Avery } 1776d5da6dfeSCathy Avery 1777d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test) 1778d5da6dfeSCathy Avery { 1779d5da6dfeSCathy Avery vmcb->save.rip += 3; 1780d5da6dfeSCathy Avery 1781d5da6dfeSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_INIT) { 1782198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to init intercept. Exit reason 0x%x", 1783d5da6dfeSCathy Avery vmcb->control.exit_code); 1784d5da6dfeSCathy Avery 1785d5da6dfeSCathy Avery return true; 1786d5da6dfeSCathy Avery } 1787d5da6dfeSCathy Avery 1788d5da6dfeSCathy Avery init_intercept = true; 1789d5da6dfeSCathy Avery 17905c3582f0SJanis Schoetterl-Glausch report_pass("INIT to vcpu intercepted"); 1791d5da6dfeSCathy Avery 1792d5da6dfeSCathy Avery return true; 1793d5da6dfeSCathy Avery } 1794d5da6dfeSCathy Avery 1795d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test) 1796d5da6dfeSCathy Avery { 1797d5da6dfeSCathy Avery return init_intercept; 1798d5da6dfeSCathy Avery } 1799d5da6dfeSCathy Avery 18007839b0ecSKrish Sadhukhan /* 18017839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the 18027839b0ecSKrish Sadhukhan * host side (i.e., after the #VMEXIT from the guest). 18037839b0ecSKrish Sadhukhan * 18040689a980SKrish Sadhukhan * Setting host EFLAGS.RF suppresses any potential instruction breakpoint 18050689a980SKrish Sadhukhan * match on the VMRUN and completion of the VMRUN instruction clears the 18060689a980SKrish Sadhukhan * host EFLAGS.RF bit. 18070689a980SKrish Sadhukhan * 18087839b0ecSKrish Sadhukhan * [AMD APM] 18097839b0ecSKrish Sadhukhan */ 18107839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0; 18117839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0; 18127839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false; 18137839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false; 18147839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false; 18150689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false; 18160689a980SKrish Sadhukhan static u64 rip_detected; 18177839b0ecSKrish Sadhukhan 18187839b0ecSKrish Sadhukhan extern u64 *vmrun_rip; 18197839b0ecSKrish Sadhukhan 18207839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r) 18217839b0ecSKrish Sadhukhan { 18227839b0ecSKrish Sadhukhan if (host_rflags_ss_on_vmrun) { 18237839b0ecSKrish Sadhukhan if (host_rflags_vmrun_reached) { 18240689a980SKrish Sadhukhan if (!host_rflags_set_rf) { 18257839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 18260689a980SKrish Sadhukhan rip_detected = r->rip; 18277839b0ecSKrish Sadhukhan } else { 18280689a980SKrish Sadhukhan r->rflags |= X86_EFLAGS_RF; 18290689a980SKrish Sadhukhan ++host_rflags_db_handler_flag; 18300689a980SKrish Sadhukhan } 18310689a980SKrish Sadhukhan } else { 18320689a980SKrish Sadhukhan if (r->rip == (u64)&vmrun_rip) { 18337839b0ecSKrish Sadhukhan host_rflags_vmrun_reached = true; 18340689a980SKrish Sadhukhan 18350689a980SKrish Sadhukhan if (host_rflags_set_rf) { 18360689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 18370689a980SKrish Sadhukhan rip_detected = r->rip; 18380689a980SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 18390689a980SKrish Sadhukhan 18400689a980SKrish Sadhukhan /* Trigger #DB via debug registers */ 18410689a980SKrish Sadhukhan write_dr0((void *)&vmrun_rip); 18420689a980SKrish Sadhukhan write_dr7(0x403); 18430689a980SKrish Sadhukhan } 18440689a980SKrish Sadhukhan } 18457839b0ecSKrish Sadhukhan } 18467839b0ecSKrish Sadhukhan } else { 18477839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 18487839b0ecSKrish Sadhukhan } 18497839b0ecSKrish Sadhukhan } 18507839b0ecSKrish Sadhukhan 18517839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test) 18527839b0ecSKrish Sadhukhan { 18537839b0ecSKrish Sadhukhan default_prepare(test); 18547839b0ecSKrish Sadhukhan handle_exception(DB_VECTOR, host_rflags_db_handler); 18557839b0ecSKrish Sadhukhan set_test_stage(test, 0); 18567839b0ecSKrish Sadhukhan } 18577839b0ecSKrish Sadhukhan 18587839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test) 18597839b0ecSKrish Sadhukhan { 18607839b0ecSKrish Sadhukhan if (host_rflags_set_tf) 18617839b0ecSKrish Sadhukhan write_rflags(read_rflags() | X86_EFLAGS_TF); 18627839b0ecSKrish Sadhukhan } 18637839b0ecSKrish Sadhukhan 18647839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test) 18657839b0ecSKrish Sadhukhan { 18667839b0ecSKrish Sadhukhan while (1) { 18670689a980SKrish Sadhukhan if (get_test_stage(test) > 0) { 18680689a980SKrish Sadhukhan if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) || 18690689a980SKrish Sadhukhan (host_rflags_set_rf && host_rflags_db_handler_flag == 1)) 18707839b0ecSKrish Sadhukhan host_rflags_guest_main_flag = 1; 18710689a980SKrish Sadhukhan } 18720689a980SKrish Sadhukhan 18730689a980SKrish Sadhukhan if (get_test_stage(test) == 4) 18747839b0ecSKrish Sadhukhan break; 18757839b0ecSKrish Sadhukhan vmmcall(); 18767839b0ecSKrish Sadhukhan } 18777839b0ecSKrish Sadhukhan } 18787839b0ecSKrish Sadhukhan 18797839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test) 18807839b0ecSKrish Sadhukhan { 18817839b0ecSKrish Sadhukhan switch (get_test_stage(test)) { 18827839b0ecSKrish Sadhukhan case 0: 18837839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1884198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT. Exit reason 0x%x", 18857839b0ecSKrish Sadhukhan vmcb->control.exit_code); 18867839b0ecSKrish Sadhukhan return true; 18877839b0ecSKrish Sadhukhan } 18887839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 18897839b0ecSKrish Sadhukhan /* 18907839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF not immediately before VMRUN, causes 18917839b0ecSKrish Sadhukhan * #DB trap before first guest instruction is executed 18927839b0ecSKrish Sadhukhan */ 18937839b0ecSKrish Sadhukhan host_rflags_set_tf = true; 18947839b0ecSKrish Sadhukhan break; 18957839b0ecSKrish Sadhukhan case 1: 18967839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 18970689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1) { 1898198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or #DB handler" 18997839b0ecSKrish Sadhukhan " invoked before guest main. Exit reason 0x%x", 19007839b0ecSKrish Sadhukhan vmcb->control.exit_code); 19017839b0ecSKrish Sadhukhan return true; 19027839b0ecSKrish Sadhukhan } 19037839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 19047839b0ecSKrish Sadhukhan /* 19057839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF immediately before VMRUN, causes #DB 19067839b0ecSKrish Sadhukhan * trap after VMRUN completes on the host side (i.e., after 19077839b0ecSKrish Sadhukhan * VMEXIT from guest). 19087839b0ecSKrish Sadhukhan */ 19097839b0ecSKrish Sadhukhan host_rflags_ss_on_vmrun = true; 19107839b0ecSKrish Sadhukhan break; 19117839b0ecSKrish Sadhukhan case 2: 19127839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 19130c22fd44SPaolo Bonzini rip_detected != (u64)&vmrun_rip + 3) { 1914198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch." 19150689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 19160689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 19170c22fd44SPaolo Bonzini (u64)&vmrun_rip + 3, rip_detected); 19180689a980SKrish Sadhukhan return true; 19190689a980SKrish Sadhukhan } 19200689a980SKrish Sadhukhan host_rflags_set_rf = true; 19210689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 19220689a980SKrish Sadhukhan host_rflags_vmrun_reached = false; 19230689a980SKrish Sadhukhan vmcb->save.rip += 3; 19240689a980SKrish Sadhukhan break; 19250689a980SKrish Sadhukhan case 3: 19260689a980SKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 19270689a980SKrish Sadhukhan rip_detected != (u64)&vmrun_rip || 19280689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1 || 19290689a980SKrish Sadhukhan host_rflags_db_handler_flag > 1 || 19300689a980SKrish Sadhukhan read_rflags() & X86_EFLAGS_RF) { 1931198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch or " 19320689a980SKrish Sadhukhan "EFLAGS.RF not cleared." 19330689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 19340689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 19350689a980SKrish Sadhukhan (u64)&vmrun_rip, rip_detected); 19367839b0ecSKrish Sadhukhan return true; 19377839b0ecSKrish Sadhukhan } 19387839b0ecSKrish Sadhukhan host_rflags_set_tf = false; 19390689a980SKrish Sadhukhan host_rflags_set_rf = false; 19407839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 19417839b0ecSKrish Sadhukhan break; 19427839b0ecSKrish Sadhukhan default: 19437839b0ecSKrish Sadhukhan return true; 19447839b0ecSKrish Sadhukhan } 19457839b0ecSKrish Sadhukhan inc_test_stage(test); 19460689a980SKrish Sadhukhan return get_test_stage(test) == 5; 19477839b0ecSKrish Sadhukhan } 19487839b0ecSKrish Sadhukhan 19497839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test) 19507839b0ecSKrish Sadhukhan { 19510689a980SKrish Sadhukhan return get_test_stage(test) == 4; 19527839b0ecSKrish Sadhukhan } 19537839b0ecSKrish Sadhukhan 19548660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name } 19558660d1b5SKrish Sadhukhan 1956ba29942cSKrish Sadhukhan /* 1957ba29942cSKrish Sadhukhan * v2 tests 1958ba29942cSKrish Sadhukhan */ 1959ba29942cSKrish Sadhukhan 1960f32183f5SJim Mattson /* 1961f32183f5SJim Mattson * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE 1962f32183f5SJim Mattson * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different 1963f32183f5SJim Mattson * value than in L1. 1964f32183f5SJim Mattson */ 1965f32183f5SJim Mattson 1966f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test) 1967f32183f5SJim Mattson { 1968f32183f5SJim Mattson write_cr4(read_cr4() & ~X86_CR4_OSXSAVE); 1969f32183f5SJim Mattson } 1970f32183f5SJim Mattson 1971f32183f5SJim Mattson static void svm_cr4_osxsave_test(void) 1972f32183f5SJim Mattson { 1973f32183f5SJim Mattson if (!this_cpu_has(X86_FEATURE_XSAVE)) { 1974f32183f5SJim Mattson report_skip("XSAVE not detected"); 1975f32183f5SJim Mattson return; 1976f32183f5SJim Mattson } 1977f32183f5SJim Mattson 1978f32183f5SJim Mattson if (!(read_cr4() & X86_CR4_OSXSAVE)) { 1979f32183f5SJim Mattson unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE; 1980f32183f5SJim Mattson 1981f32183f5SJim Mattson write_cr4(cr4); 1982f32183f5SJim Mattson vmcb->save.cr4 = cr4; 1983f32183f5SJim Mattson } 1984f32183f5SJim Mattson 1985816c0359SSean Christopherson report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set before VMRUN"); 1986f32183f5SJim Mattson 1987f32183f5SJim Mattson test_set_guest(svm_cr4_osxsave_test_guest); 1988f32183f5SJim Mattson report(svm_vmrun() == SVM_EXIT_VMMCALL, 1989f32183f5SJim Mattson "svm_cr4_osxsave_test_guest finished with VMMCALL"); 1990f32183f5SJim Mattson 1991816c0359SSean Christopherson report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set after VMRUN"); 1992f32183f5SJim Mattson } 1993f32183f5SJim Mattson 1994ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test) 1995ba29942cSKrish Sadhukhan { 1996ba29942cSKrish Sadhukhan } 1997ba29942cSKrish Sadhukhan 1998eae10e8fSKrish Sadhukhan 1999eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val, \ 2000eae10e8fSKrish Sadhukhan resv_mask) \ 2001eae10e8fSKrish Sadhukhan { \ 2002eae10e8fSKrish Sadhukhan u64 tmp, mask; \ 2003eae10e8fSKrish Sadhukhan int i; \ 2004eae10e8fSKrish Sadhukhan \ 2005eae10e8fSKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2006eae10e8fSKrish Sadhukhan mask = 1ull << i; \ 2007eae10e8fSKrish Sadhukhan if (!(mask & resv_mask)) \ 2008eae10e8fSKrish Sadhukhan continue; \ 2009eae10e8fSKrish Sadhukhan tmp = val | mask; \ 2010eae10e8fSKrish Sadhukhan reg = tmp; \ 2011eae10e8fSKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx", \ 2012eae10e8fSKrish Sadhukhan str_name, end, start, tmp); \ 2013eae10e8fSKrish Sadhukhan } \ 2014eae10e8fSKrish Sadhukhan } 2015eae10e8fSKrish Sadhukhan 20166d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask, \ 2017cb6524f3SPaolo Bonzini exit_code, test_name) \ 2018a79c9495SKrish Sadhukhan { \ 2019a79c9495SKrish Sadhukhan u64 tmp, mask; \ 20208ae6d77fSSean Christopherson u32 r; \ 2021a79c9495SKrish Sadhukhan int i; \ 2022a79c9495SKrish Sadhukhan \ 2023a79c9495SKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2024a79c9495SKrish Sadhukhan mask = 1ull << i; \ 2025a79c9495SKrish Sadhukhan if (!(mask & resv_mask)) \ 2026a79c9495SKrish Sadhukhan continue; \ 2027a79c9495SKrish Sadhukhan tmp = val | mask; \ 2028a79c9495SKrish Sadhukhan switch (cr) { \ 2029a79c9495SKrish Sadhukhan case 0: \ 2030a79c9495SKrish Sadhukhan vmcb->save.cr0 = tmp; \ 2031a79c9495SKrish Sadhukhan break; \ 2032a79c9495SKrish Sadhukhan case 3: \ 2033a79c9495SKrish Sadhukhan vmcb->save.cr3 = tmp; \ 2034a79c9495SKrish Sadhukhan break; \ 2035a79c9495SKrish Sadhukhan case 4: \ 2036a79c9495SKrish Sadhukhan vmcb->save.cr4 = tmp; \ 2037a79c9495SKrish Sadhukhan } \ 20388ae6d77fSSean Christopherson r = svm_vmrun(); \ 20398ae6d77fSSean Christopherson report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x", \ 20408ae6d77fSSean Christopherson cr, test_name, end, start, tmp, exit_code, r); \ 2041a79c9495SKrish Sadhukhan } \ 2042a79c9495SKrish Sadhukhan } 2043e8d7a8f6SKrish Sadhukhan 2044a79c9495SKrish Sadhukhan static void test_efer(void) 2045a79c9495SKrish Sadhukhan { 2046e8d7a8f6SKrish Sadhukhan /* 2047e8d7a8f6SKrish Sadhukhan * Un-setting EFER.SVME is illegal 2048e8d7a8f6SKrish Sadhukhan */ 2049ba29942cSKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2050ba29942cSKrish Sadhukhan u64 efer = efer_saved; 2051ba29942cSKrish Sadhukhan 2052ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer); 2053ba29942cSKrish Sadhukhan efer &= ~EFER_SVME; 2054ba29942cSKrish Sadhukhan vmcb->save.efer = efer; 2055ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer); 2056ba29942cSKrish Sadhukhan vmcb->save.efer = efer_saved; 2057e8d7a8f6SKrish Sadhukhan 2058e8d7a8f6SKrish Sadhukhan /* 2059a79c9495SKrish Sadhukhan * EFER MBZ bits: 63:16, 9 2060a79c9495SKrish Sadhukhan */ 2061a79c9495SKrish Sadhukhan efer_saved = vmcb->save.efer; 2062a79c9495SKrish Sadhukhan 2063a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer, 2064a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2065a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer, 2066a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2067a79c9495SKrish Sadhukhan 20681d7bde08SKrish Sadhukhan /* 20691d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR4.PAE is zero. 20701d7bde08SKrish Sadhukhan */ 20711d7bde08SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 20721d7bde08SKrish Sadhukhan u64 cr0; 20731d7bde08SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 20741d7bde08SKrish Sadhukhan u64 cr4; 20751d7bde08SKrish Sadhukhan 20761d7bde08SKrish Sadhukhan efer = efer_saved | EFER_LME; 20771d7bde08SKrish Sadhukhan vmcb->save.efer = efer; 20781d7bde08SKrish Sadhukhan cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE; 20791d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 20801d7bde08SKrish Sadhukhan cr4 = cr4_saved & ~X86_CR4_PAE; 20811d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4; 20821d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 20831d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4); 20841d7bde08SKrish Sadhukhan 20851d7bde08SKrish Sadhukhan /* 20861d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR0.PE is zero. 2087fc050452SLara Lazier * CR4.PAE needs to be set as we otherwise cannot 2088fc050452SLara Lazier * determine if CR4.PAE=0 or CR0.PE=0 triggered the 2089fc050452SLara Lazier * SVM_EXIT_ERR. 20901d7bde08SKrish Sadhukhan */ 2091fc050452SLara Lazier cr4 = cr4_saved | X86_CR4_PAE; 2092fc050452SLara Lazier vmcb->save.cr4 = cr4; 20931d7bde08SKrish Sadhukhan cr0 &= ~X86_CR0_PE; 20941d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 20951d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 20961d7bde08SKrish Sadhukhan "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0); 20971d7bde08SKrish Sadhukhan 20981d7bde08SKrish Sadhukhan /* 20991d7bde08SKrish Sadhukhan * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero. 21001d7bde08SKrish Sadhukhan */ 21011d7bde08SKrish Sadhukhan u32 cs_attrib_saved = vmcb->save.cs.attrib; 21021d7bde08SKrish Sadhukhan u32 cs_attrib; 21031d7bde08SKrish Sadhukhan 21041d7bde08SKrish Sadhukhan cr0 |= X86_CR0_PE; 21051d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 21061d7bde08SKrish Sadhukhan cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK | 21071d7bde08SKrish Sadhukhan SVM_SELECTOR_DB_MASK; 21081d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib; 21091d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 21101d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)", 21111d7bde08SKrish Sadhukhan efer, cr0, cr4, cs_attrib); 21121d7bde08SKrish Sadhukhan 21131d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 21141d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2115a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 21161d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib_saved; 2117a79c9495SKrish Sadhukhan } 2118a79c9495SKrish Sadhukhan 2119a79c9495SKrish Sadhukhan static void test_cr0(void) 2120a79c9495SKrish Sadhukhan { 2121a79c9495SKrish Sadhukhan /* 2122e8d7a8f6SKrish Sadhukhan * Un-setting CR0.CD and setting CR0.NW is illegal combination 2123e8d7a8f6SKrish Sadhukhan */ 2124e8d7a8f6SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 2125e8d7a8f6SKrish Sadhukhan u64 cr0 = cr0_saved; 2126e8d7a8f6SKrish Sadhukhan 2127e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_CD; 2128e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2129e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2130a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx", 2131a79c9495SKrish Sadhukhan cr0); 2132e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2133e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2134a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx", 2135a79c9495SKrish Sadhukhan cr0); 2136e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2137e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_CD; 2138e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2139a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx", 2140a79c9495SKrish Sadhukhan cr0); 2141e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2142e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2143a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx", 2144a79c9495SKrish Sadhukhan cr0); 2145e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 21465c052c90SKrish Sadhukhan 21475c052c90SKrish Sadhukhan /* 21485c052c90SKrish Sadhukhan * CR0[63:32] are not zero 21495c052c90SKrish Sadhukhan */ 21505c052c90SKrish Sadhukhan cr0 = cr0_saved; 2151eae10e8fSKrish Sadhukhan 2152eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved, 2153eae10e8fSKrish Sadhukhan SVM_CR0_RESERVED_MASK); 21545c052c90SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 2155a79c9495SKrish Sadhukhan } 2156eae10e8fSKrish Sadhukhan 2157a79c9495SKrish Sadhukhan static void test_cr3(void) 2158a79c9495SKrish Sadhukhan { 2159a79c9495SKrish Sadhukhan /* 2160a79c9495SKrish Sadhukhan * CR3 MBZ bits based on different modes: 216129a01803SNadav Amit * [63:52] - long mode 2162a79c9495SKrish Sadhukhan */ 2163a79c9495SKrish Sadhukhan u64 cr3_saved = vmcb->save.cr3; 2164a79c9495SKrish Sadhukhan 2165a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved, 2166cb6524f3SPaolo Bonzini SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, ""); 21676d0ecbf6SKrish Sadhukhan 21686d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK; 21696d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 21706d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 21716d0ecbf6SKrish Sadhukhan 21726d0ecbf6SKrish Sadhukhan /* 21736d0ecbf6SKrish Sadhukhan * CR3 non-MBZ reserved bits based on different modes: 2174cb6524f3SPaolo Bonzini * [11:5] [2:0] - long mode (PCIDE=0) 21756d0ecbf6SKrish Sadhukhan * [2:0] - PAE legacy mode 21766d0ecbf6SKrish Sadhukhan */ 21776d0ecbf6SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 21786d0ecbf6SKrish Sadhukhan u64 *pdpe = npt_get_pml4e(); 21796d0ecbf6SKrish Sadhukhan 21806d0ecbf6SKrish Sadhukhan /* 21816d0ecbf6SKrish Sadhukhan * Long mode 21826d0ecbf6SKrish Sadhukhan */ 21836d0ecbf6SKrish Sadhukhan if (this_cpu_has(X86_FEATURE_PCID)) { 21846d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE; 21856d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2186cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) "); 21876d0ecbf6SKrish Sadhukhan 21886d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK; 21896d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 21906d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 2191cb6524f3SPaolo Bonzini } 21926d0ecbf6SKrish Sadhukhan 21936d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE; 21946d0ecbf6SKrish Sadhukhan 2195993749ffSSean Christopherson if (!npt_supported()) 2196993749ffSSean Christopherson goto skip_npt_only; 2197993749ffSSean Christopherson 21986d0ecbf6SKrish Sadhukhan /* Clear P (Present) bit in NPT in order to trigger #NPF */ 21996d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 22006d0ecbf6SKrish Sadhukhan 22016d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2202cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) "); 22036d0ecbf6SKrish Sadhukhan 22046d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2205cb6524f3SPaolo Bonzini vmcb->save.cr3 = cr3_saved; 22066d0ecbf6SKrish Sadhukhan 22076d0ecbf6SKrish Sadhukhan /* 22086d0ecbf6SKrish Sadhukhan * PAE legacy 22096d0ecbf6SKrish Sadhukhan */ 22106d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 22116d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PAE; 22126d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved, 2213cb6524f3SPaolo Bonzini SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) "); 22146d0ecbf6SKrish Sadhukhan 22156d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2216993749ffSSean Christopherson 2217993749ffSSean Christopherson skip_npt_only: 2218a79c9495SKrish Sadhukhan vmcb->save.cr3 = cr3_saved; 22196d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2220a79c9495SKrish Sadhukhan } 2221a79c9495SKrish Sadhukhan 2222d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */ 2223a79c9495SKrish Sadhukhan static void test_cr4(void) 2224a79c9495SKrish Sadhukhan { 2225a79c9495SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 2226a79c9495SKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2227a79c9495SKrish Sadhukhan u64 efer = efer_saved; 2228a79c9495SKrish Sadhukhan 2229a79c9495SKrish Sadhukhan efer &= ~EFER_LME; 2230a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2231a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2232cb6524f3SPaolo Bonzini SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, ""); 2233a79c9495SKrish Sadhukhan 2234a79c9495SKrish Sadhukhan efer |= EFER_LME; 2235a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2236a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2237cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2238a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved, 2239cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2240a79c9495SKrish Sadhukhan 2241a79c9495SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2242a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 2243a79c9495SKrish Sadhukhan } 2244a79c9495SKrish Sadhukhan 2245a79c9495SKrish Sadhukhan static void test_dr(void) 2246a79c9495SKrish Sadhukhan { 2247eae10e8fSKrish Sadhukhan /* 2248eae10e8fSKrish Sadhukhan * DR6[63:32] and DR7[63:32] are MBZ 2249eae10e8fSKrish Sadhukhan */ 2250eae10e8fSKrish Sadhukhan u64 dr_saved = vmcb->save.dr6; 2251eae10e8fSKrish Sadhukhan 2252eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved, 2253eae10e8fSKrish Sadhukhan SVM_DR6_RESERVED_MASK); 2254eae10e8fSKrish Sadhukhan vmcb->save.dr6 = dr_saved; 2255eae10e8fSKrish Sadhukhan 2256eae10e8fSKrish Sadhukhan dr_saved = vmcb->save.dr7; 2257eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved, 2258eae10e8fSKrish Sadhukhan SVM_DR7_RESERVED_MASK); 2259eae10e8fSKrish Sadhukhan 2260eae10e8fSKrish Sadhukhan vmcb->save.dr7 = dr_saved; 2261a79c9495SKrish Sadhukhan } 2262eae10e8fSKrish Sadhukhan 2263abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */ 2264abe82380SKrish Sadhukhan #define TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code, \ 2265abe82380SKrish Sadhukhan msg) { \ 2266abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept | 1ULL << type; \ 2267abe82380SKrish Sadhukhan if (type == INTERCEPT_MSR_PROT) \ 2268abe82380SKrish Sadhukhan vmcb->control.msrpm_base_pa = addr; \ 2269abe82380SKrish Sadhukhan else \ 2270abe82380SKrish Sadhukhan vmcb->control.iopm_base_pa = addr; \ 2271abe82380SKrish Sadhukhan report(svm_vmrun() == exit_code, \ 2272abe82380SKrish Sadhukhan "Test %s address: %lx", msg, addr); \ 2273abe82380SKrish Sadhukhan } 2274abe82380SKrish Sadhukhan 2275abe82380SKrish Sadhukhan /* 2276abe82380SKrish Sadhukhan * If the MSR or IOIO intercept table extends to a physical address that 2277abe82380SKrish Sadhukhan * is greater than or equal to the maximum supported physical address, the 2278abe82380SKrish Sadhukhan * guest state is illegal. 2279abe82380SKrish Sadhukhan * 2280abe82380SKrish Sadhukhan * The VMRUN instruction ignores the lower 12 bits of the address specified 2281abe82380SKrish Sadhukhan * in the VMCB. 2282abe82380SKrish Sadhukhan * 2283abe82380SKrish Sadhukhan * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB 2284abe82380SKrish Sadhukhan * pages + 1 byte. 2285abe82380SKrish Sadhukhan * 2286abe82380SKrish Sadhukhan * [APM vol 2] 2287abe82380SKrish Sadhukhan * 2288abe82380SKrish Sadhukhan * Note: Unallocated MSRPM addresses conforming to consistency checks, generate 2289abe82380SKrish Sadhukhan * #NPF. 2290abe82380SKrish Sadhukhan */ 2291abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void) 2292abe82380SKrish Sadhukhan { 2293abe82380SKrish Sadhukhan u64 saved_intercept = vmcb->control.intercept; 2294abe82380SKrish Sadhukhan u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr(); 2295abe82380SKrish Sadhukhan u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1)); 2296abe82380SKrish Sadhukhan 2297abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2298abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2299abe82380SKrish Sadhukhan "MSRPM"); 2300abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2301abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR, 2302abe82380SKrish Sadhukhan "MSRPM"); 2303abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2304abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2305abe82380SKrish Sadhukhan "MSRPM"); 2306abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2307abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2308abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2309abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2310abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2311abe82380SKrish Sadhukhan 2312abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2313abe82380SKrish Sadhukhan addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2314abe82380SKrish Sadhukhan "IOPM"); 2315abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2316abe82380SKrish Sadhukhan addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2317abe82380SKrish Sadhukhan "IOPM"); 2318abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2319abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL, 2320abe82380SKrish Sadhukhan "IOPM"); 2321abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2322abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2323abe82380SKrish Sadhukhan "IOPM"); 2324abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2325abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2326abe82380SKrish Sadhukhan "IOPM"); 2327abe82380SKrish Sadhukhan addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1)); 2328abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2329abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2330abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2331abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2332abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2333abe82380SKrish Sadhukhan 2334abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept; 2335abe82380SKrish Sadhukhan } 2336abe82380SKrish Sadhukhan 2337ba3c9773SLara Lazier /* 2338ba3c9773SLara Lazier * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical 2339ba3c9773SLara Lazier * segment bases in the VMCB. However, VMENTRY succeeds as documented. 2340ba3c9773SLara Lazier */ 2341ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg) \ 2342a99070ebSKrish Sadhukhan saved_addr = seg_base; \ 2343a99070ebSKrish Sadhukhan seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2344ba3c9773SLara Lazier return_value = svm_vmrun(); \ 2345ba3c9773SLara Lazier report(return_value == SVM_EXIT_VMMCALL, \ 2346ba3c9773SLara Lazier "Successful VMRUN with noncanonical %s.base", msg); \ 2347a99070ebSKrish Sadhukhan seg_base = saved_addr; 2348a99070ebSKrish Sadhukhan 2349ba3c9773SLara Lazier 2350ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg) \ 2351ba3c9773SLara Lazier saved_addr = seg_base; \ 2352ba3c9773SLara Lazier seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2353ba3c9773SLara Lazier asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory"); \ 2354ba3c9773SLara Lazier asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory"); \ 2355ba3c9773SLara Lazier report(is_canonical(seg_base), \ 2356ba3c9773SLara Lazier "Test %s.base for canonical form: %lx", msg, seg_base); \ 2357ba3c9773SLara Lazier seg_base = saved_addr; 2358ba3c9773SLara Lazier 2359ba3c9773SLara Lazier static void test_canonicalization(void) 2360a99070ebSKrish Sadhukhan { 2361a99070ebSKrish Sadhukhan u64 saved_addr; 2362ba3c9773SLara Lazier u64 return_value; 2363ba3c9773SLara Lazier u64 addr_limit; 2364ba3c9773SLara Lazier u64 vmcb_phys = virt_to_phys(vmcb); 2365ba3c9773SLara Lazier 2366ba3c9773SLara Lazier addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48; 2367a99070ebSKrish Sadhukhan u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1); 2368a99070ebSKrish Sadhukhan 2369ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS"); 2370ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS"); 2371ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR"); 2372ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR"); 2373ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS"); 2374ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES"); 2375ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS"); 2376ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS"); 2377ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS"); 2378ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR"); 2379ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR"); 2380a99070ebSKrish Sadhukhan } 2381a99070ebSKrish Sadhukhan 2382665f5677SKrish Sadhukhan /* 2383665f5677SKrish Sadhukhan * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not 2384665f5677SKrish Sadhukhan * cause a trace trap between the VMRUN and the first guest instruction, but 2385665f5677SKrish Sadhukhan * rather after completion of the first guest instruction. 2386665f5677SKrish Sadhukhan * 2387665f5677SKrish Sadhukhan * [APM vol 2] 2388665f5677SKrish Sadhukhan */ 2389665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip; 2390665f5677SKrish Sadhukhan 2391665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r) 2392665f5677SKrish Sadhukhan { 2393665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = r->rip; 2394665f5677SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 2395665f5677SKrish Sadhukhan } 2396665f5677SKrish Sadhukhan 2397a79c9495SKrish Sadhukhan static void svm_guest_state_test(void) 2398a79c9495SKrish Sadhukhan { 2399a79c9495SKrish Sadhukhan test_set_guest(basic_guest_main); 2400a79c9495SKrish Sadhukhan test_efer(); 2401a79c9495SKrish Sadhukhan test_cr0(); 2402a79c9495SKrish Sadhukhan test_cr3(); 2403a79c9495SKrish Sadhukhan test_cr4(); 2404a79c9495SKrish Sadhukhan test_dr(); 2405abe82380SKrish Sadhukhan test_msrpm_iopm_bitmap_addrs(); 2406ba3c9773SLara Lazier test_canonicalization(); 2407ba29942cSKrish Sadhukhan } 2408ba29942cSKrish Sadhukhan 2409665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test); 2410665f5677SKrish Sadhukhan extern u64 *insn2; 2411665f5677SKrish Sadhukhan extern u64 *guest_end; 2412665f5677SKrish Sadhukhan 2413665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t" 2414665f5677SKrish Sadhukhan "push %rbp\n\t" 2415665f5677SKrish Sadhukhan ".global insn2\n\t" 2416665f5677SKrish Sadhukhan "insn2:\n\t" 2417665f5677SKrish Sadhukhan "mov %rsp,%rbp\n\t" 2418665f5677SKrish Sadhukhan "vmmcall\n\t" 2419665f5677SKrish Sadhukhan "vmmcall\n\t" 2420665f5677SKrish Sadhukhan ".global guest_end\n\t" 2421665f5677SKrish Sadhukhan "guest_end:\n\t" 2422665f5677SKrish Sadhukhan "vmmcall\n\t" 2423665f5677SKrish Sadhukhan "pop %rbp\n\t" 2424665f5677SKrish Sadhukhan "ret"); 2425665f5677SKrish Sadhukhan 2426665f5677SKrish Sadhukhan static void svm_test_singlestep(void) 2427665f5677SKrish Sadhukhan { 2428665f5677SKrish Sadhukhan handle_exception(DB_VECTOR, guest_rflags_test_db_handler); 2429665f5677SKrish Sadhukhan 2430665f5677SKrish Sadhukhan /* 2431665f5677SKrish Sadhukhan * Trap expected after completion of first guest instruction 2432665f5677SKrish Sadhukhan */ 2433665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2434665f5677SKrish Sadhukhan report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL && 2435665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == (u64)&insn2, 2436665f5677SKrish Sadhukhan "Test EFLAGS.TF on VMRUN: trap expected after completion of first guest instruction"); 2437665f5677SKrish Sadhukhan /* 2438665f5677SKrish Sadhukhan * No trap expected 2439665f5677SKrish Sadhukhan */ 2440665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = 0; 2441665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2442665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2443665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2444665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected"); 2445665f5677SKrish Sadhukhan 2446665f5677SKrish Sadhukhan /* 2447665f5677SKrish Sadhukhan * Let guest finish execution 2448665f5677SKrish Sadhukhan */ 2449665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2450665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2451665f5677SKrish Sadhukhan vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion"); 2452665f5677SKrish Sadhukhan } 2453665f5677SKrish Sadhukhan 24547a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false; 24557a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0; 24567a57ef5dSMaxim Levitsky 24577a57ef5dSMaxim Levitsky 24587a57ef5dSMaxim Levitsky /* 24597a57ef5dSMaxim Levitsky * 24607a57ef5dSMaxim Levitsky * Test the following errata: 24617a57ef5dSMaxim Levitsky * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest, 24627a57ef5dSMaxim Levitsky * the CPU would first check the EAX against host reserved memory 24637a57ef5dSMaxim Levitsky * regions (so far only SMM_ADDR/SMM_MASK are known to cause it), 24647a57ef5dSMaxim Levitsky * and only then signal #VMexit 24657a57ef5dSMaxim Levitsky * 24667a57ef5dSMaxim Levitsky * Try to reproduce this by trying vmsave on each possible 4K aligned memory 24677a57ef5dSMaxim Levitsky * address in the low 4G where the SMM area has to reside. 24687a57ef5dSMaxim Levitsky */ 24697a57ef5dSMaxim Levitsky 24707a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r) 24717a57ef5dSMaxim Levitsky { 24727a57ef5dSMaxim Levitsky svm_errata_reproduced = true; 24737a57ef5dSMaxim Levitsky /* skip over the vmsave instruction*/ 24747a57ef5dSMaxim Levitsky r->rip += 3; 24757a57ef5dSMaxim Levitsky } 24767a57ef5dSMaxim Levitsky 24777a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void) 24787a57ef5dSMaxim Levitsky { 24797a57ef5dSMaxim Levitsky unsigned long *last_page = NULL; 24807a57ef5dSMaxim Levitsky 24817a57ef5dSMaxim Levitsky handle_exception(GP_VECTOR, gp_isr); 24827a57ef5dSMaxim Levitsky 24837a57ef5dSMaxim Levitsky while (!svm_errata_reproduced) { 24847a57ef5dSMaxim Levitsky 24857a57ef5dSMaxim Levitsky unsigned long *page = alloc_pages(1); 24867a57ef5dSMaxim Levitsky 24877a57ef5dSMaxim Levitsky if (!page) { 24885c3582f0SJanis Schoetterl-Glausch report_pass("All guest memory tested, no bug found"); 24897a57ef5dSMaxim Levitsky break; 24907a57ef5dSMaxim Levitsky } 24917a57ef5dSMaxim Levitsky 24927a57ef5dSMaxim Levitsky physical = virt_to_phys(page); 24937a57ef5dSMaxim Levitsky 24947a57ef5dSMaxim Levitsky asm volatile ( 24957a57ef5dSMaxim Levitsky "mov %[_physical], %%rax\n\t" 24967a57ef5dSMaxim Levitsky "vmsave %%rax\n\t" 24977a57ef5dSMaxim Levitsky 24987a57ef5dSMaxim Levitsky : [_physical] "=m" (physical) 24997a57ef5dSMaxim Levitsky : /* no inputs*/ 25007a57ef5dSMaxim Levitsky : "rax" /*clobbers*/ 25017a57ef5dSMaxim Levitsky ); 25027a57ef5dSMaxim Levitsky 25037a57ef5dSMaxim Levitsky if (svm_errata_reproduced) { 2504198dfd0eSJanis Schoetterl-Glausch report_fail("Got #GP exception - svm errata reproduced at 0x%lx", 25057a57ef5dSMaxim Levitsky physical); 25067a57ef5dSMaxim Levitsky break; 25077a57ef5dSMaxim Levitsky } 25087a57ef5dSMaxim Levitsky 25097a57ef5dSMaxim Levitsky *page = (unsigned long)last_page; 25107a57ef5dSMaxim Levitsky last_page = page; 25117a57ef5dSMaxim Levitsky } 25127a57ef5dSMaxim Levitsky 25137a57ef5dSMaxim Levitsky while (last_page) { 25147a57ef5dSMaxim Levitsky unsigned long *page = last_page; 25157a57ef5dSMaxim Levitsky last_page = (unsigned long *)*last_page; 25167a57ef5dSMaxim Levitsky free_pages_by_order(page, 1); 25177a57ef5dSMaxim Levitsky } 25187a57ef5dSMaxim Levitsky } 25197a57ef5dSMaxim Levitsky 25200b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test) 25210b6f6cedSKrish Sadhukhan { 25220b6f6cedSKrish Sadhukhan u64 vmcb_phys = virt_to_phys(vmcb); 25230b6f6cedSKrish Sadhukhan 25240b6f6cedSKrish Sadhukhan asm volatile ("vmload %0" : : "a"(vmcb_phys)); 25250b6f6cedSKrish Sadhukhan asm volatile ("vmsave %0" : : "a"(vmcb_phys)); 25260b6f6cedSKrish Sadhukhan } 25270b6f6cedSKrish Sadhukhan 25280b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void) 25290b6f6cedSKrish Sadhukhan { 25300b6f6cedSKrish Sadhukhan u32 intercept_saved = vmcb->control.intercept; 25310b6f6cedSKrish Sadhukhan 25320b6f6cedSKrish Sadhukhan test_set_guest(vmload_vmsave_guest_main); 25330b6f6cedSKrish Sadhukhan 25340b6f6cedSKrish Sadhukhan /* 25350b6f6cedSKrish Sadhukhan * Disabling intercept for VMLOAD and VMSAVE doesn't cause 25360b6f6cedSKrish Sadhukhan * respective #VMEXIT to host 25370b6f6cedSKrish Sadhukhan */ 25380b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 25390b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 25400b6f6cedSKrish Sadhukhan svm_vmrun(); 25410b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 25420b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 25430b6f6cedSKrish Sadhukhan 25440b6f6cedSKrish Sadhukhan /* 25450b6f6cedSKrish Sadhukhan * Enabling intercept for VMLOAD and VMSAVE causes respective 25460b6f6cedSKrish Sadhukhan * #VMEXIT to host 25470b6f6cedSKrish Sadhukhan */ 25480b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 25490b6f6cedSKrish Sadhukhan svm_vmrun(); 25500b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 25510b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 25520b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 25530b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 25540b6f6cedSKrish Sadhukhan svm_vmrun(); 25550b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 25560b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 25570b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 25580b6f6cedSKrish Sadhukhan svm_vmrun(); 25590b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 25600b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 25610b6f6cedSKrish Sadhukhan 25620b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 25630b6f6cedSKrish Sadhukhan svm_vmrun(); 25640b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 25650b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 25660b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 25670b6f6cedSKrish Sadhukhan svm_vmrun(); 25680b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 25690b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 25700b6f6cedSKrish Sadhukhan 25710b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 25720b6f6cedSKrish Sadhukhan svm_vmrun(); 25730b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 25740b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 25750b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 25760b6f6cedSKrish Sadhukhan svm_vmrun(); 25770b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 25780b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 25790b6f6cedSKrish Sadhukhan 25800b6f6cedSKrish Sadhukhan vmcb->control.intercept = intercept_saved; 25810b6f6cedSKrish Sadhukhan } 25820b6f6cedSKrish Sadhukhan 2583f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test) 2584f6972bd6SLara Lazier { 2585f6972bd6SLara Lazier default_prepare(test); 2586f6972bd6SLara Lazier } 2587f6972bd6SLara Lazier 2588f6972bd6SLara Lazier static void test_vgif(struct svm_test *test) 2589f6972bd6SLara Lazier { 2590f6972bd6SLara Lazier asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t"); 2591f6972bd6SLara Lazier } 2592f6972bd6SLara Lazier 2593f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test) 2594f6972bd6SLara Lazier { 2595f6972bd6SLara Lazier switch (get_test_stage(test)) 2596f6972bd6SLara Lazier { 2597f6972bd6SLara Lazier case 0: 2598f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2599198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2600f6972bd6SLara Lazier return true; 2601f6972bd6SLara Lazier } 2602f6972bd6SLara Lazier vmcb->control.int_ctl |= V_GIF_ENABLED_MASK; 2603f6972bd6SLara Lazier vmcb->save.rip += 3; 2604f6972bd6SLara Lazier inc_test_stage(test); 2605f6972bd6SLara Lazier break; 2606f6972bd6SLara Lazier case 1: 2607f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2608198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2609f6972bd6SLara Lazier return true; 2610f6972bd6SLara Lazier } 2611f6972bd6SLara Lazier if (!(vmcb->control.int_ctl & V_GIF_MASK)) { 2612198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to set VGIF when executing STGI."); 2613f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2614f6972bd6SLara Lazier return true; 2615f6972bd6SLara Lazier } 26165c3582f0SJanis Schoetterl-Glausch report_pass("STGI set VGIF bit."); 2617f6972bd6SLara Lazier vmcb->save.rip += 3; 2618f6972bd6SLara Lazier inc_test_stage(test); 2619f6972bd6SLara Lazier break; 2620f6972bd6SLara Lazier case 2: 2621f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2622198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2623f6972bd6SLara Lazier return true; 2624f6972bd6SLara Lazier } 2625f6972bd6SLara Lazier if (vmcb->control.int_ctl & V_GIF_MASK) { 2626198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to clear VGIF when executing CLGI."); 2627f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2628f6972bd6SLara Lazier return true; 2629f6972bd6SLara Lazier } 26305c3582f0SJanis Schoetterl-Glausch report_pass("CLGI cleared VGIF bit."); 2631f6972bd6SLara Lazier vmcb->save.rip += 3; 2632f6972bd6SLara Lazier inc_test_stage(test); 2633f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2634f6972bd6SLara Lazier break; 2635f6972bd6SLara Lazier default: 2636f6972bd6SLara Lazier return true; 2637f6972bd6SLara Lazier break; 2638f6972bd6SLara Lazier } 2639f6972bd6SLara Lazier 2640f6972bd6SLara Lazier return get_test_stage(test) == 3; 2641f6972bd6SLara Lazier } 2642f6972bd6SLara Lazier 2643f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test) 2644f6972bd6SLara Lazier { 2645f6972bd6SLara Lazier return get_test_stage(test) == 3; 2646f6972bd6SLara Lazier } 2647f6972bd6SLara Lazier 26488650dffeSMaxim Levitsky 26498650dffeSMaxim Levitsky static int pause_test_counter; 26508650dffeSMaxim Levitsky static int wait_counter; 26518650dffeSMaxim Levitsky 26528650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test) 26538650dffeSMaxim Levitsky { 26548650dffeSMaxim Levitsky int i; 26558650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 26568650dffeSMaxim Levitsky pause(); 26578650dffeSMaxim Levitsky 26588650dffeSMaxim Levitsky if (!wait_counter) 26598650dffeSMaxim Levitsky return; 26608650dffeSMaxim Levitsky 26618650dffeSMaxim Levitsky for (i = 0; i < wait_counter; i++) 26628650dffeSMaxim Levitsky ; 26638650dffeSMaxim Levitsky 26648650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 26658650dffeSMaxim Levitsky pause(); 26668650dffeSMaxim Levitsky 26678650dffeSMaxim Levitsky } 26688650dffeSMaxim Levitsky 26698650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold) 26708650dffeSMaxim Levitsky { 26718650dffeSMaxim Levitsky test_set_guest(pause_filter_test_guest_main); 26728650dffeSMaxim Levitsky 26738650dffeSMaxim Levitsky pause_test_counter = pause_iterations; 26748650dffeSMaxim Levitsky wait_counter = wait_iterations; 26758650dffeSMaxim Levitsky 26768650dffeSMaxim Levitsky vmcb->control.pause_filter_count = filter_value; 26778650dffeSMaxim Levitsky vmcb->control.pause_filter_thresh = threshold; 26788650dffeSMaxim Levitsky svm_vmrun(); 26798650dffeSMaxim Levitsky 26808650dffeSMaxim Levitsky if (filter_value <= pause_iterations || wait_iterations < threshold) 26818650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit"); 26828650dffeSMaxim Levitsky else 26838650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit"); 26848650dffeSMaxim Levitsky } 26858650dffeSMaxim Levitsky 26868650dffeSMaxim Levitsky static void pause_filter_test(void) 26878650dffeSMaxim Levitsky { 26888650dffeSMaxim Levitsky if (!pause_filter_supported()) { 26898650dffeSMaxim Levitsky report_skip("PAUSE filter not supported in the guest"); 26908650dffeSMaxim Levitsky return; 26918650dffeSMaxim Levitsky } 26928650dffeSMaxim Levitsky 26938650dffeSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_PAUSE); 26948650dffeSMaxim Levitsky 26958650dffeSMaxim Levitsky // filter count more that pause count - no VMexit 26968650dffeSMaxim Levitsky pause_filter_run_test(10, 9, 0, 0); 26978650dffeSMaxim Levitsky 26988650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit 26998650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 0, 0); 27008650dffeSMaxim Levitsky 27018650dffeSMaxim Levitsky 27028650dffeSMaxim Levitsky if (pause_threshold_supported()) { 27038650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + large enough threshold 27048650dffeSMaxim Levitsky // so that filter counter resets 27058650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 1000, 10); 27068650dffeSMaxim Levitsky 27078650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + small threshold 27088650dffeSMaxim Levitsky // so that filter doesn't reset 27098650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 10, 1000); 27108650dffeSMaxim Levitsky } else { 27118650dffeSMaxim Levitsky report_skip("PAUSE threshold not supported in the guest"); 27128650dffeSMaxim Levitsky return; 27138650dffeSMaxim Levitsky } 27148650dffeSMaxim Levitsky } 27158650dffeSMaxim Levitsky 2716694e59baSManali Shukla /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */ 2717694e59baSManali Shukla static void svm_no_nm_test(void) 27185c92f156SManali Shukla { 27195c92f156SManali Shukla write_cr0(read_cr0() & ~X86_CR0_TS); 2720694e59baSManali Shukla test_set_guest((test_guest_func)fnop); 27215c92f156SManali Shukla 27225c92f156SManali Shukla vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM); 2723694e59baSManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL, 27243f27d772SManali Shukla "fnop with CR0.TS and CR0.EM unset no #NM excpetion"); 27255c92f156SManali Shukla } 2726f6972bd6SLara Lazier 2727537d39dfSMaxim Levitsky static bool check_lbr(u64 *from_excepted, u64 *to_expected) 2728537d39dfSMaxim Levitsky { 2729537d39dfSMaxim Levitsky u64 from = rdmsr(MSR_IA32_LASTBRANCHFROMIP); 2730537d39dfSMaxim Levitsky u64 to = rdmsr(MSR_IA32_LASTBRANCHTOIP); 2731537d39dfSMaxim Levitsky 2732537d39dfSMaxim Levitsky if ((u64)from_excepted != from) { 2733537d39dfSMaxim Levitsky report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx", 2734537d39dfSMaxim Levitsky (u64)from_excepted, from); 2735537d39dfSMaxim Levitsky return false; 2736537d39dfSMaxim Levitsky } 2737537d39dfSMaxim Levitsky 2738537d39dfSMaxim Levitsky if ((u64)to_expected != to) { 2739537d39dfSMaxim Levitsky report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx", 2740537d39dfSMaxim Levitsky (u64)from_excepted, from); 2741537d39dfSMaxim Levitsky return false; 2742537d39dfSMaxim Levitsky } 2743537d39dfSMaxim Levitsky 2744537d39dfSMaxim Levitsky return true; 2745537d39dfSMaxim Levitsky } 2746537d39dfSMaxim Levitsky 2747537d39dfSMaxim Levitsky static bool check_dbgctl(u64 dbgctl, u64 dbgctl_expected) 2748537d39dfSMaxim Levitsky { 2749537d39dfSMaxim Levitsky if (dbgctl != dbgctl_expected) { 2750537d39dfSMaxim Levitsky report(false, "Unexpected MSR_IA32_DEBUGCTLMSR value 0x%lx", dbgctl); 2751537d39dfSMaxim Levitsky return false; 2752537d39dfSMaxim Levitsky } 2753537d39dfSMaxim Levitsky return true; 2754537d39dfSMaxim Levitsky } 2755537d39dfSMaxim Levitsky 2756537d39dfSMaxim Levitsky 2757537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name) \ 2758537d39dfSMaxim Levitsky asm volatile ( \ 2759537d39dfSMaxim Levitsky # branch_name "_from:" \ 2760537d39dfSMaxim Levitsky "jmp " # branch_name "_to\n" \ 2761537d39dfSMaxim Levitsky "nop\n" \ 2762537d39dfSMaxim Levitsky "nop\n" \ 2763537d39dfSMaxim Levitsky # branch_name "_to:" \ 2764537d39dfSMaxim Levitsky "nop\n" \ 2765537d39dfSMaxim Levitsky ) 2766537d39dfSMaxim Levitsky 2767537d39dfSMaxim Levitsky 2768537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to; 2769537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to; 2770537d39dfSMaxim Levitsky 2771537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to; 2772537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to; 2773537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to; 2774537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to; 2775537d39dfSMaxim Levitsky 2776537d39dfSMaxim Levitsky u64 dbgctl; 2777537d39dfSMaxim Levitsky 2778537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void) 2779537d39dfSMaxim Levitsky { 2780537d39dfSMaxim Levitsky /* 2781537d39dfSMaxim Levitsky * This guest expects the LBR to be already enabled when it starts, 2782537d39dfSMaxim Levitsky * it does a branch, and then disables the LBR and then checks. 2783537d39dfSMaxim Levitsky */ 2784537d39dfSMaxim Levitsky 2785537d39dfSMaxim Levitsky DO_BRANCH(guest_branch0); 2786537d39dfSMaxim Levitsky 2787537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2788537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2789537d39dfSMaxim Levitsky 2790537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 2791537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2792537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0) 2793537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2794537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch0_from) 2795537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2796537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch0_to) 2797537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2798537d39dfSMaxim Levitsky 2799537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 2800537d39dfSMaxim Levitsky } 2801537d39dfSMaxim Levitsky 2802537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void) 2803537d39dfSMaxim Levitsky { 2804537d39dfSMaxim Levitsky /* 2805537d39dfSMaxim Levitsky * This guest expects the LBR to be disabled when it starts, 2806537d39dfSMaxim Levitsky * enables it, does a branch, disables it and then checks. 2807537d39dfSMaxim Levitsky */ 2808537d39dfSMaxim Levitsky 2809537d39dfSMaxim Levitsky DO_BRANCH(guest_branch1); 2810537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2811537d39dfSMaxim Levitsky 2812537d39dfSMaxim Levitsky if (dbgctl != 0) 2813537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2814537d39dfSMaxim Levitsky 2815537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&host_branch2_from) 2816537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2817537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&host_branch2_to) 2818537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2819537d39dfSMaxim Levitsky 2820537d39dfSMaxim Levitsky 2821537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2822537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2823537d39dfSMaxim Levitsky DO_BRANCH(guest_branch2); 2824537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2825537d39dfSMaxim Levitsky 2826537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 2827537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2828537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch2_from) 2829537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2830537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch2_to) 2831537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2832537d39dfSMaxim Levitsky 2833537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 2834537d39dfSMaxim Levitsky } 2835537d39dfSMaxim Levitsky 2836537d39dfSMaxim Levitsky static void svm_lbrv_test0(void) 2837537d39dfSMaxim Levitsky { 2838537d39dfSMaxim Levitsky report(true, "Basic LBR test"); 2839537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2840537d39dfSMaxim Levitsky DO_BRANCH(host_branch0); 2841537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2842537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2843537d39dfSMaxim Levitsky 2844537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 2845537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2846537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 2847537d39dfSMaxim Levitsky 2848537d39dfSMaxim Levitsky check_lbr(&host_branch0_from, &host_branch0_to); 2849537d39dfSMaxim Levitsky } 2850537d39dfSMaxim Levitsky 2851537d39dfSMaxim Levitsky static void svm_lbrv_test1(void) 2852537d39dfSMaxim Levitsky { 2853537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)"); 2854537d39dfSMaxim Levitsky 2855537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest1; 2856537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 2857537d39dfSMaxim Levitsky 2858537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2859537d39dfSMaxim Levitsky DO_BRANCH(host_branch1); 2860537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2861537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2862537d39dfSMaxim Levitsky 2863537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2864537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 2865537d39dfSMaxim Levitsky vmcb->control.exit_code); 2866537d39dfSMaxim Levitsky return; 2867537d39dfSMaxim Levitsky } 2868537d39dfSMaxim Levitsky 2869537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 2870537d39dfSMaxim Levitsky check_lbr(&guest_branch0_from, &guest_branch0_to); 2871537d39dfSMaxim Levitsky } 2872537d39dfSMaxim Levitsky 2873537d39dfSMaxim Levitsky static void svm_lbrv_test2(void) 2874537d39dfSMaxim Levitsky { 2875537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)"); 2876537d39dfSMaxim Levitsky 2877537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest2; 2878537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 2879537d39dfSMaxim Levitsky 2880537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2881537d39dfSMaxim Levitsky DO_BRANCH(host_branch2); 2882537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2883537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2884537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2885537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2886537d39dfSMaxim Levitsky 2887537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2888537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 2889537d39dfSMaxim Levitsky vmcb->control.exit_code); 2890537d39dfSMaxim Levitsky return; 2891537d39dfSMaxim Levitsky } 2892537d39dfSMaxim Levitsky 2893537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 2894537d39dfSMaxim Levitsky check_lbr(&guest_branch2_from, &guest_branch2_to); 2895537d39dfSMaxim Levitsky } 2896537d39dfSMaxim Levitsky 2897537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void) 2898537d39dfSMaxim Levitsky { 2899537d39dfSMaxim Levitsky if (!lbrv_supported()) { 2900537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 2901537d39dfSMaxim Levitsky return; 2902537d39dfSMaxim Levitsky } 2903537d39dfSMaxim Levitsky 2904537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)"); 2905537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest1; 2906537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 2907537d39dfSMaxim Levitsky vmcb->save.dbgctl = DEBUGCTLMSR_LBR; 2908537d39dfSMaxim Levitsky 2909537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2910537d39dfSMaxim Levitsky DO_BRANCH(host_branch3); 2911537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2912537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2913537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2914537d39dfSMaxim Levitsky 2915537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2916537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 2917537d39dfSMaxim Levitsky vmcb->control.exit_code); 2918537d39dfSMaxim Levitsky return; 2919537d39dfSMaxim Levitsky } 2920537d39dfSMaxim Levitsky 2921537d39dfSMaxim Levitsky if (vmcb->save.dbgctl != 0) { 2922537d39dfSMaxim Levitsky report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl); 2923537d39dfSMaxim Levitsky return; 2924537d39dfSMaxim Levitsky } 2925537d39dfSMaxim Levitsky 2926537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 2927537d39dfSMaxim Levitsky check_lbr(&host_branch3_from, &host_branch3_to); 2928537d39dfSMaxim Levitsky } 29293f27d772SManali Shukla 2930537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void) 2931537d39dfSMaxim Levitsky { 2932537d39dfSMaxim Levitsky if (!lbrv_supported()) { 2933537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 2934537d39dfSMaxim Levitsky return; 2935537d39dfSMaxim Levitsky } 2936537d39dfSMaxim Levitsky 2937537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)"); 2938537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest2; 2939537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 2940537d39dfSMaxim Levitsky 2941537d39dfSMaxim Levitsky vmcb->save.dbgctl = 0; 2942537d39dfSMaxim Levitsky vmcb->save.br_from = (u64)&host_branch2_from; 2943537d39dfSMaxim Levitsky vmcb->save.br_to = (u64)&host_branch2_to; 2944537d39dfSMaxim Levitsky 2945537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2946537d39dfSMaxim Levitsky DO_BRANCH(host_branch4); 2947537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2948537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2949537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2950537d39dfSMaxim Levitsky 2951537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2952537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 2953537d39dfSMaxim Levitsky vmcb->control.exit_code); 2954537d39dfSMaxim Levitsky return; 2955537d39dfSMaxim Levitsky } 2956537d39dfSMaxim Levitsky 2957537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 2958537d39dfSMaxim Levitsky check_lbr(&host_branch4_from, &host_branch4_to); 2959537d39dfSMaxim Levitsky } 2960537d39dfSMaxim Levitsky 2961c45bccfcSMaxim Levitsky 2962c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception 2963c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works 2964c45bccfcSMaxim Levitsky 2965c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied; 2966c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs) 2967c45bccfcSMaxim Levitsky { 2968c45bccfcSMaxim Levitsky dummy_isr_recevied++; 2969c45bccfcSMaxim Levitsky eoi(); 2970c45bccfcSMaxim Levitsky } 2971c45bccfcSMaxim Levitsky 2972c45bccfcSMaxim Levitsky 2973c45bccfcSMaxim Levitsky static volatile int nmi_recevied; 2974c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs) 2975c45bccfcSMaxim Levitsky { 2976c45bccfcSMaxim Levitsky nmi_recevied++; 2977c45bccfcSMaxim Levitsky } 2978c45bccfcSMaxim Levitsky 2979c45bccfcSMaxim Levitsky 2980c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit) 2981c45bccfcSMaxim Levitsky { 2982c45bccfcSMaxim Levitsky if (counter) 2983c45bccfcSMaxim Levitsky *counter = 0; 2984c45bccfcSMaxim Levitsky 2985c45bccfcSMaxim Levitsky sti(); // host IF value should not matter 2986c45bccfcSMaxim Levitsky clgi(); // vmrun will set back GI to 1 2987c45bccfcSMaxim Levitsky 2988c45bccfcSMaxim Levitsky svm_vmrun(); 2989c45bccfcSMaxim Levitsky 2990c45bccfcSMaxim Levitsky if (counter) 2991c45bccfcSMaxim Levitsky report(!*counter, "No interrupt expected"); 2992c45bccfcSMaxim Levitsky 2993c45bccfcSMaxim Levitsky stgi(); 2994c45bccfcSMaxim Levitsky 2995c45bccfcSMaxim Levitsky if (counter) 2996c45bccfcSMaxim Levitsky report(*counter == 1, "Interrupt is expected"); 2997c45bccfcSMaxim Levitsky 2998c45bccfcSMaxim Levitsky report (vmcb->control.exit_code == expected_vmexit, "Test expected VM exit"); 2999c45bccfcSMaxim Levitsky report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now"); 3000c45bccfcSMaxim Levitsky cli(); 3001c45bccfcSMaxim Levitsky } 3002c45bccfcSMaxim Levitsky 3003c45bccfcSMaxim Levitsky 3004c45bccfcSMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enought to trigger an interrupt 3005c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test) 3006c45bccfcSMaxim Levitsky { 3007c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3008c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3009c45bccfcSMaxim Levitsky sti(); 3010c45bccfcSMaxim Levitsky asm volatile("nop"); 3011c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3012c45bccfcSMaxim Levitsky } 3013c45bccfcSMaxim Levitsky 3014c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void) 3015c45bccfcSMaxim Levitsky { 3016c45bccfcSMaxim Levitsky // make a physical interrupt to be pending 3017c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3018c45bccfcSMaxim Levitsky 3019c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3020c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3021c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3022c45bccfcSMaxim Levitsky 3023c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_if_guest); 3024c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3025c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3026c45bccfcSMaxim Levitsky } 3027c45bccfcSMaxim Levitsky 3028c45bccfcSMaxim Levitsky 3029c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3030c45bccfcSMaxim Levitsky // if GIF is not intercepted 3031c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test) 3032c45bccfcSMaxim Levitsky { 3033c45bccfcSMaxim Levitsky 3034c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3035c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3036c45bccfcSMaxim Levitsky 3037c45bccfcSMaxim Levitsky // clear GIF and enable IF 3038c45bccfcSMaxim Levitsky // that should still not cause VM exit 3039c45bccfcSMaxim Levitsky clgi(); 3040c45bccfcSMaxim Levitsky sti(); 3041c45bccfcSMaxim Levitsky asm volatile("nop"); 3042c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3043c45bccfcSMaxim Levitsky 3044c45bccfcSMaxim Levitsky stgi(); 3045c45bccfcSMaxim Levitsky asm volatile("nop"); 3046c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3047c45bccfcSMaxim Levitsky } 3048c45bccfcSMaxim Levitsky 3049c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void) 3050c45bccfcSMaxim Levitsky { 3051c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3052c45bccfcSMaxim Levitsky 3053c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3054c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3055c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3056c45bccfcSMaxim Levitsky 3057c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest); 3058c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3059c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3060c45bccfcSMaxim Levitsky } 3061c45bccfcSMaxim Levitsky 3062c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3063c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest 3064c45bccfcSMaxim Levitsky // started running 3065c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test) 3066c45bccfcSMaxim Levitsky { 3067c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3068c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3069c45bccfcSMaxim Levitsky 3070c45bccfcSMaxim Levitsky clgi(); 3071c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3072c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3073c45bccfcSMaxim Levitsky 3074c45bccfcSMaxim Levitsky stgi(); 3075c45bccfcSMaxim Levitsky asm volatile("nop"); 3076c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3077c45bccfcSMaxim Levitsky } 3078c45bccfcSMaxim Levitsky 3079c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void) 3080c45bccfcSMaxim Levitsky { 3081c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3082c45bccfcSMaxim Levitsky 3083c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3084c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3085c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3086c45bccfcSMaxim Levitsky 3087c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest2); 3088c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3089c45bccfcSMaxim Levitsky } 3090c45bccfcSMaxim Levitsky 3091c45bccfcSMaxim Levitsky 3092c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF 3093c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test) 3094c45bccfcSMaxim Levitsky { 3095c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3096c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3097c45bccfcSMaxim Levitsky cli(); // should have no effect 3098c45bccfcSMaxim Levitsky 3099c45bccfcSMaxim Levitsky clgi(); 3100c45bccfcSMaxim Levitsky asm volatile("nop"); 3101c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0); 3102c45bccfcSMaxim Levitsky sti(); // should have no effect 3103c45bccfcSMaxim Levitsky asm volatile("nop"); 3104c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3105c45bccfcSMaxim Levitsky 3106c45bccfcSMaxim Levitsky stgi(); 3107c45bccfcSMaxim Levitsky asm volatile("nop"); 3108c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3109c45bccfcSMaxim Levitsky } 3110c45bccfcSMaxim Levitsky 3111c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void) 3112c45bccfcSMaxim Levitsky { 3113c45bccfcSMaxim Levitsky handle_exception(2, dummy_nmi_handler); 3114c45bccfcSMaxim Levitsky 3115c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_NMI); 3116c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3117c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3118c45bccfcSMaxim Levitsky 3119c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_nmi_guest); 3120c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI); 3121c45bccfcSMaxim Levitsky } 3122c45bccfcSMaxim Levitsky 3123c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF 3124c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang 3125c45bccfcSMaxim Levitsky // and VMexits on SMI 3126c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test) 3127c45bccfcSMaxim Levitsky { 3128c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3129c45bccfcSMaxim Levitsky 3130c45bccfcSMaxim Levitsky clgi(); 3131c45bccfcSMaxim Levitsky asm volatile("nop"); 3132c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0); 3133c45bccfcSMaxim Levitsky sti(); // should have no effect 3134c45bccfcSMaxim Levitsky asm volatile("nop"); 3135c45bccfcSMaxim Levitsky stgi(); 3136c45bccfcSMaxim Levitsky asm volatile("nop"); 3137c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3138c45bccfcSMaxim Levitsky } 3139c45bccfcSMaxim Levitsky 3140c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void) 3141c45bccfcSMaxim Levitsky { 3142c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_SMI); 3143c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3144c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_smi_guest); 3145c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI); 3146c45bccfcSMaxim Levitsky } 3147c45bccfcSMaxim Levitsky 31488177dc62SManali Shukla static void svm_l2_ac_test(void) 31498177dc62SManali Shukla { 31508177dc62SManali Shukla bool hit_ac = false; 31518177dc62SManali Shukla 31528177dc62SManali Shukla write_cr0(read_cr0() | X86_CR0_AM); 31538177dc62SManali Shukla write_rflags(read_rflags() | X86_EFLAGS_AC); 31548177dc62SManali Shukla 31558177dc62SManali Shukla run_in_user(generate_usermode_ac, AC_VECTOR, 0, 0, 0, 0, &hit_ac); 31568177dc62SManali Shukla report(hit_ac, "Usermode #AC handled in L2"); 31578177dc62SManali Shukla vmmcall(); 31588177dc62SManali Shukla } 31598177dc62SManali Shukla 31608177dc62SManali Shukla struct svm_exception_test { 31618177dc62SManali Shukla u8 vector; 31628177dc62SManali Shukla void (*guest_code)(void); 31638177dc62SManali Shukla }; 31648177dc62SManali Shukla 31658177dc62SManali Shukla struct svm_exception_test svm_exception_tests[] = { 31668177dc62SManali Shukla { GP_VECTOR, generate_non_canonical_gp }, 31678177dc62SManali Shukla { UD_VECTOR, generate_ud }, 31688177dc62SManali Shukla { DE_VECTOR, generate_de }, 31698177dc62SManali Shukla { DB_VECTOR, generate_single_step_db }, 317044550f53SManali Shukla { BP_VECTOR, generate_bp }, 31718177dc62SManali Shukla { AC_VECTOR, svm_l2_ac_test }, 31720851b7f7SManali Shukla { OF_VECTOR, generate_of }, 3173694e59baSManali Shukla { NM_VECTOR, generate_cr0_ts_nm }, 3174694e59baSManali Shukla { NM_VECTOR, generate_cr0_em_nm }, 31758177dc62SManali Shukla }; 31768177dc62SManali Shukla 31778177dc62SManali Shukla static u8 svm_exception_test_vector; 31788177dc62SManali Shukla 31798177dc62SManali Shukla static void svm_exception_handler(struct ex_regs *regs) 31808177dc62SManali Shukla { 31818177dc62SManali Shukla report(regs->vector == svm_exception_test_vector, 31828177dc62SManali Shukla "Handling %s in L2's exception handler", 31838177dc62SManali Shukla exception_mnemonic(svm_exception_test_vector)); 31848177dc62SManali Shukla vmmcall(); 31858177dc62SManali Shukla } 31868177dc62SManali Shukla 31878177dc62SManali Shukla static void handle_exception_in_l2(u8 vector) 31888177dc62SManali Shukla { 31898177dc62SManali Shukla handler old_handler = handle_exception(vector, svm_exception_handler); 31908177dc62SManali Shukla svm_exception_test_vector = vector; 31918177dc62SManali Shukla 31928177dc62SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL, 31938177dc62SManali Shukla "%s handled by L2", exception_mnemonic(vector)); 31948177dc62SManali Shukla 31958177dc62SManali Shukla handle_exception(vector, old_handler); 31968177dc62SManali Shukla } 31978177dc62SManali Shukla 31988177dc62SManali Shukla static void handle_exception_in_l1(u32 vector) 31998177dc62SManali Shukla { 32008177dc62SManali Shukla u32 old_ie = vmcb->control.intercept_exceptions; 32018177dc62SManali Shukla 32028177dc62SManali Shukla vmcb->control.intercept_exceptions |= (1ULL << vector); 32038177dc62SManali Shukla 32048177dc62SManali Shukla report(svm_vmrun() == (SVM_EXIT_EXCP_BASE + vector), 32058177dc62SManali Shukla "%s handled by L1", exception_mnemonic(vector)); 32068177dc62SManali Shukla 32078177dc62SManali Shukla vmcb->control.intercept_exceptions = old_ie; 32088177dc62SManali Shukla } 32098177dc62SManali Shukla 32108177dc62SManali Shukla static void svm_exception_test(void) 32118177dc62SManali Shukla { 32128177dc62SManali Shukla struct svm_exception_test *t; 32138177dc62SManali Shukla int i; 32148177dc62SManali Shukla 32158177dc62SManali Shukla for (i = 0; i < ARRAY_SIZE(svm_exception_tests); i++) { 32168177dc62SManali Shukla t = &svm_exception_tests[i]; 32178177dc62SManali Shukla test_set_guest((test_guest_func)t->guest_code); 32188177dc62SManali Shukla 32198177dc62SManali Shukla handle_exception_in_l2(t->vector); 32208177dc62SManali Shukla vmcb_ident(vmcb); 32218177dc62SManali Shukla 32228177dc62SManali Shukla handle_exception_in_l1(t->vector); 32238177dc62SManali Shukla vmcb_ident(vmcb); 32248177dc62SManali Shukla } 32258177dc62SManali Shukla } 32268177dc62SManali Shukla 32273f27d772SManali Shukla struct svm_test svm_tests[] = { 3228ad879127SKrish Sadhukhan { "null", default_supported, default_prepare, 3229ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3230ad879127SKrish Sadhukhan default_finished, null_check }, 3231ad879127SKrish Sadhukhan { "vmrun", default_supported, default_prepare, 3232ad879127SKrish Sadhukhan default_prepare_gif_clear, test_vmrun, 3233ad879127SKrish Sadhukhan default_finished, check_vmrun }, 3234ad879127SKrish Sadhukhan { "ioio", default_supported, prepare_ioio, 3235ad879127SKrish Sadhukhan default_prepare_gif_clear, test_ioio, 3236ad879127SKrish Sadhukhan ioio_finished, check_ioio }, 3237ad879127SKrish Sadhukhan { "vmrun intercept check", default_supported, prepare_no_vmrun_int, 3238ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, default_finished, 3239ad879127SKrish Sadhukhan check_no_vmrun_int }, 3240401299a5SPaolo Bonzini { "rsm", default_supported, 3241401299a5SPaolo Bonzini prepare_rsm_intercept, default_prepare_gif_clear, 3242401299a5SPaolo Bonzini test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept }, 3243ad879127SKrish Sadhukhan { "cr3 read intercept", default_supported, 3244ad879127SKrish Sadhukhan prepare_cr3_intercept, default_prepare_gif_clear, 3245ad879127SKrish Sadhukhan test_cr3_intercept, default_finished, check_cr3_intercept }, 3246ad879127SKrish Sadhukhan { "cr3 read nointercept", default_supported, default_prepare, 3247ad879127SKrish Sadhukhan default_prepare_gif_clear, test_cr3_intercept, default_finished, 3248ad879127SKrish Sadhukhan check_cr3_nointercept }, 3249ad879127SKrish Sadhukhan { "cr3 read intercept emulate", smp_supported, 3250ad879127SKrish Sadhukhan prepare_cr3_intercept_bypass, default_prepare_gif_clear, 3251ad879127SKrish Sadhukhan test_cr3_intercept_bypass, default_finished, check_cr3_intercept }, 3252ad879127SKrish Sadhukhan { "dr intercept check", default_supported, prepare_dr_intercept, 3253ad879127SKrish Sadhukhan default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished, 3254ad879127SKrish Sadhukhan check_dr_intercept }, 3255ad879127SKrish Sadhukhan { "next_rip", next_rip_supported, prepare_next_rip, 3256ad879127SKrish Sadhukhan default_prepare_gif_clear, test_next_rip, 3257ad879127SKrish Sadhukhan default_finished, check_next_rip }, 3258ad879127SKrish Sadhukhan { "msr intercept check", default_supported, prepare_msr_intercept, 3259ad879127SKrish Sadhukhan default_prepare_gif_clear, test_msr_intercept, 3260ad879127SKrish Sadhukhan msr_intercept_finished, check_msr_intercept }, 3261ad879127SKrish Sadhukhan { "mode_switch", default_supported, prepare_mode_switch, 3262ad879127SKrish Sadhukhan default_prepare_gif_clear, test_mode_switch, 3263ad879127SKrish Sadhukhan mode_switch_finished, check_mode_switch }, 3264ad879127SKrish Sadhukhan { "asid_zero", default_supported, prepare_asid_zero, 3265ad879127SKrish Sadhukhan default_prepare_gif_clear, test_asid_zero, 3266ad879127SKrish Sadhukhan default_finished, check_asid_zero }, 3267ad879127SKrish Sadhukhan { "sel_cr0_bug", default_supported, sel_cr0_bug_prepare, 3268ad879127SKrish Sadhukhan default_prepare_gif_clear, sel_cr0_bug_test, 3269ad879127SKrish Sadhukhan sel_cr0_bug_finished, sel_cr0_bug_check }, 327010a65fc4SNadav Amit { "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare, 3271ad879127SKrish Sadhukhan default_prepare_gif_clear, tsc_adjust_test, 3272ad879127SKrish Sadhukhan default_finished, tsc_adjust_check }, 3273ad879127SKrish Sadhukhan { "latency_run_exit", default_supported, latency_prepare, 3274ad879127SKrish Sadhukhan default_prepare_gif_clear, latency_test, 3275ad879127SKrish Sadhukhan latency_finished, latency_check }, 3276f7fa53dcSPaolo Bonzini { "latency_run_exit_clean", default_supported, latency_prepare, 3277f7fa53dcSPaolo Bonzini default_prepare_gif_clear, latency_test, 3278f7fa53dcSPaolo Bonzini latency_finished_clean, latency_check }, 3279ad879127SKrish Sadhukhan { "latency_svm_insn", default_supported, lat_svm_insn_prepare, 3280ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3281ad879127SKrish Sadhukhan lat_svm_insn_finished, lat_svm_insn_check }, 32824b4fb247SPaolo Bonzini { "exc_inject", default_supported, exc_inject_prepare, 32834b4fb247SPaolo Bonzini default_prepare_gif_clear, exc_inject_test, 32844b4fb247SPaolo Bonzini exc_inject_finished, exc_inject_check }, 3285ad879127SKrish Sadhukhan { "pending_event", default_supported, pending_event_prepare, 3286ad879127SKrish Sadhukhan default_prepare_gif_clear, 3287ad879127SKrish Sadhukhan pending_event_test, pending_event_finished, pending_event_check }, 328885dc2aceSPaolo Bonzini { "pending_event_cli", default_supported, pending_event_cli_prepare, 328985dc2aceSPaolo Bonzini pending_event_cli_prepare_gif_clear, 329085dc2aceSPaolo Bonzini pending_event_cli_test, pending_event_cli_finished, 329185dc2aceSPaolo Bonzini pending_event_cli_check }, 329285dc2aceSPaolo Bonzini { "interrupt", default_supported, interrupt_prepare, 329385dc2aceSPaolo Bonzini default_prepare_gif_clear, interrupt_test, 329485dc2aceSPaolo Bonzini interrupt_finished, interrupt_check }, 3295d4db486bSCathy Avery { "nmi", default_supported, nmi_prepare, 3296d4db486bSCathy Avery default_prepare_gif_clear, nmi_test, 3297d4db486bSCathy Avery nmi_finished, nmi_check }, 32989da1f4d8SCathy Avery { "nmi_hlt", smp_supported, nmi_prepare, 32999da1f4d8SCathy Avery default_prepare_gif_clear, nmi_hlt_test, 33009da1f4d8SCathy Avery nmi_hlt_finished, nmi_hlt_check }, 33019c838954SCathy Avery { "virq_inject", default_supported, virq_inject_prepare, 33029c838954SCathy Avery default_prepare_gif_clear, virq_inject_test, 33039c838954SCathy Avery virq_inject_finished, virq_inject_check }, 3304da338a31SMaxim Levitsky { "reg_corruption", default_supported, reg_corruption_prepare, 3305da338a31SMaxim Levitsky default_prepare_gif_clear, reg_corruption_test, 3306da338a31SMaxim Levitsky reg_corruption_finished, reg_corruption_check }, 33074770e9c8SCathy Avery { "svm_init_startup_test", smp_supported, init_startup_prepare, 33084770e9c8SCathy Avery default_prepare_gif_clear, null_test, 33094770e9c8SCathy Avery init_startup_finished, init_startup_check }, 3310d5da6dfeSCathy Avery { "svm_init_intercept_test", smp_supported, init_intercept_prepare, 3311d5da6dfeSCathy Avery default_prepare_gif_clear, init_intercept_test, 3312d5da6dfeSCathy Avery init_intercept_finished, init_intercept_check, .on_vcpu = 2 }, 33137839b0ecSKrish Sadhukhan { "host_rflags", default_supported, host_rflags_prepare, 33147839b0ecSKrish Sadhukhan host_rflags_prepare_gif_clear, host_rflags_test, 33157839b0ecSKrish Sadhukhan host_rflags_finished, host_rflags_check }, 3316f6972bd6SLara Lazier { "vgif", vgif_supported, prepare_vgif_enabled, 3317f6972bd6SLara Lazier default_prepare_gif_clear, test_vgif, vgif_finished, 3318f6972bd6SLara Lazier vgif_check }, 3319f32183f5SJim Mattson TEST(svm_cr4_osxsave_test), 3320ba29942cSKrish Sadhukhan TEST(svm_guest_state_test), 33217a57ef5dSMaxim Levitsky TEST(svm_vmrun_errata_test), 33220b6f6cedSKrish Sadhukhan TEST(svm_vmload_vmsave), 3323665f5677SKrish Sadhukhan TEST(svm_test_singlestep), 3324694e59baSManali Shukla TEST(svm_no_nm_test), 33258177dc62SManali Shukla TEST(svm_exception_test), 3326537d39dfSMaxim Levitsky TEST(svm_lbrv_test0), 3327537d39dfSMaxim Levitsky TEST(svm_lbrv_test1), 3328537d39dfSMaxim Levitsky TEST(svm_lbrv_test2), 3329537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test1), 3330537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test2), 3331c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_if), 3332c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif), 3333c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif2), 3334c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_nmi), 3335c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_smi), 3336a8503d50SMaxim Levitsky TEST(svm_tsc_scale_test), 33378650dffeSMaxim Levitsky TEST(pause_filter_test), 3338ad879127SKrish Sadhukhan { NULL, NULL, NULL, NULL, NULL, NULL, NULL } 3339ad879127SKrish Sadhukhan }; 3340712840d5SManali Shukla 3341712840d5SManali Shukla int main(int ac, char **av) 3342712840d5SManali Shukla { 3343ade7601dSSean Christopherson setup_vm(); 3344712840d5SManali Shukla return run_svm_tests(ac, av, svm_tests); 3345712840d5SManali Shukla } 3346