xref: /kvm-unit-tests/x86/svm_tests.c (revision 493d27d41fd9cdb4fb58fcbfe10783d80d0d75d4)
1ad879127SKrish Sadhukhan #include "svm.h"
2ad879127SKrish Sadhukhan #include "libcflat.h"
3ad879127SKrish Sadhukhan #include "processor.h"
4ad879127SKrish Sadhukhan #include "desc.h"
5ad879127SKrish Sadhukhan #include "msr.h"
6ad879127SKrish Sadhukhan #include "vm.h"
7ad879127SKrish Sadhukhan #include "smp.h"
8ad879127SKrish Sadhukhan #include "types.h"
9ad879127SKrish Sadhukhan #include "alloc_page.h"
10ad879127SKrish Sadhukhan #include "isr.h"
11ad879127SKrish Sadhukhan #include "apic.h"
129da1f4d8SCathy Avery #include "delay.h"
138177dc62SManali Shukla #include "x86/usermode.h"
14ad879127SKrish Sadhukhan 
15ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f
16ad879127SKrish Sadhukhan 
17ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000
18ad879127SKrish Sadhukhan 
19ad879127SKrish Sadhukhan u64 tsc_start;
20ad879127SKrish Sadhukhan u64 tsc_end;
21ad879127SKrish Sadhukhan 
22ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum;
23ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum;
24ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum;
25ad879127SKrish Sadhukhan u64 latvmrun_max;
26ad879127SKrish Sadhukhan u64 latvmrun_min;
27ad879127SKrish Sadhukhan u64 latvmexit_max;
28ad879127SKrish Sadhukhan u64 latvmexit_min;
29ad879127SKrish Sadhukhan u64 latvmload_max;
30ad879127SKrish Sadhukhan u64 latvmload_min;
31ad879127SKrish Sadhukhan u64 latvmsave_max;
32ad879127SKrish Sadhukhan u64 latvmsave_min;
33ad879127SKrish Sadhukhan u64 latstgi_max;
34ad879127SKrish Sadhukhan u64 latstgi_min;
35ad879127SKrish Sadhukhan u64 latclgi_max;
36ad879127SKrish Sadhukhan u64 latclgi_min;
37ad879127SKrish Sadhukhan u64 runs;
38ad879127SKrish Sadhukhan 
39ad879127SKrish Sadhukhan static void null_test(struct svm_test *test)
40ad879127SKrish Sadhukhan {
41ad879127SKrish Sadhukhan }
42ad879127SKrish Sadhukhan 
43ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test)
44ad879127SKrish Sadhukhan {
45096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_VMMCALL;
46ad879127SKrish Sadhukhan }
47ad879127SKrish Sadhukhan 
48ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test)
49ad879127SKrish Sadhukhan {
50096cf7feSPaolo Bonzini 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN);
51ad879127SKrish Sadhukhan }
52ad879127SKrish Sadhukhan 
53ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test)
54ad879127SKrish Sadhukhan {
55096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_ERR;
56ad879127SKrish Sadhukhan }
57ad879127SKrish Sadhukhan 
58ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test)
59ad879127SKrish Sadhukhan {
60096cf7feSPaolo Bonzini 	asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb)));
61ad879127SKrish Sadhukhan }
62ad879127SKrish Sadhukhan 
63ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test)
64ad879127SKrish Sadhukhan {
65096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_VMRUN;
66ad879127SKrish Sadhukhan }
67ad879127SKrish Sadhukhan 
68401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test)
69401299a5SPaolo Bonzini {
70401299a5SPaolo Bonzini 	default_prepare(test);
71401299a5SPaolo Bonzini 	vmcb->control.intercept |= 1 << INTERCEPT_RSM;
72401299a5SPaolo Bonzini 	vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR);
73401299a5SPaolo Bonzini }
74401299a5SPaolo Bonzini 
75401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test)
76401299a5SPaolo Bonzini {
77401299a5SPaolo Bonzini 	asm volatile ("rsm" : : : "memory");
78401299a5SPaolo Bonzini }
79401299a5SPaolo Bonzini 
80401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test)
81401299a5SPaolo Bonzini {
82401299a5SPaolo Bonzini 	return get_test_stage(test) == 2;
83401299a5SPaolo Bonzini }
84401299a5SPaolo Bonzini 
85401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test)
86401299a5SPaolo Bonzini {
87401299a5SPaolo Bonzini 	switch (get_test_stage(test)) {
88401299a5SPaolo Bonzini 	case 0:
89401299a5SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_RSM) {
90198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to rsm. Exit reason 0x%x",
91401299a5SPaolo Bonzini 				    vmcb->control.exit_code);
92401299a5SPaolo Bonzini 			return true;
93401299a5SPaolo Bonzini 		}
94401299a5SPaolo Bonzini 		vmcb->control.intercept &= ~(1 << INTERCEPT_RSM);
95401299a5SPaolo Bonzini 		inc_test_stage(test);
96401299a5SPaolo Bonzini 		break;
97401299a5SPaolo Bonzini 
98401299a5SPaolo Bonzini 	case 1:
99401299a5SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) {
100198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to #UD. Exit reason 0x%x",
101401299a5SPaolo Bonzini 				    vmcb->control.exit_code);
102401299a5SPaolo Bonzini 			return true;
103401299a5SPaolo Bonzini 		}
104401299a5SPaolo Bonzini 		vmcb->save.rip += 2;
105401299a5SPaolo Bonzini 		inc_test_stage(test);
106401299a5SPaolo Bonzini 		break;
107401299a5SPaolo Bonzini 
108401299a5SPaolo Bonzini 	default:
109401299a5SPaolo Bonzini 		return true;
110401299a5SPaolo Bonzini 	}
111401299a5SPaolo Bonzini 	return get_test_stage(test) == 2;
112401299a5SPaolo Bonzini }
113401299a5SPaolo Bonzini 
114ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test)
115ad879127SKrish Sadhukhan {
116ad879127SKrish Sadhukhan 	default_prepare(test);
117096cf7feSPaolo Bonzini 	vmcb->control.intercept_cr_read |= 1 << 3;
118ad879127SKrish Sadhukhan }
119ad879127SKrish Sadhukhan 
120ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test)
121ad879127SKrish Sadhukhan {
122ad879127SKrish Sadhukhan 	asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory");
123ad879127SKrish Sadhukhan }
124ad879127SKrish Sadhukhan 
125ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test)
126ad879127SKrish Sadhukhan {
127096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_READ_CR3;
128ad879127SKrish Sadhukhan }
129ad879127SKrish Sadhukhan 
130ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test)
131ad879127SKrish Sadhukhan {
132ad879127SKrish Sadhukhan 	return null_check(test) && test->scratch == read_cr3();
133ad879127SKrish Sadhukhan }
134ad879127SKrish Sadhukhan 
135ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test)
136ad879127SKrish Sadhukhan {
137ad879127SKrish Sadhukhan 	struct svm_test *test = _test;
138ad879127SKrish Sadhukhan 	extern volatile u32 mmio_insn;
139ad879127SKrish Sadhukhan 
140ad879127SKrish Sadhukhan 	while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2))
141ad879127SKrish Sadhukhan 		pause();
142ad879127SKrish Sadhukhan 	pause();
143ad879127SKrish Sadhukhan 	pause();
144ad879127SKrish Sadhukhan 	pause();
145ad879127SKrish Sadhukhan 	mmio_insn = 0x90d8200f;  // mov %cr3, %rax; nop
146ad879127SKrish Sadhukhan }
147ad879127SKrish Sadhukhan 
148ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test)
149ad879127SKrish Sadhukhan {
150ad879127SKrish Sadhukhan 	default_prepare(test);
151096cf7feSPaolo Bonzini 	vmcb->control.intercept_cr_read |= 1 << 3;
152ad879127SKrish Sadhukhan 	on_cpu_async(1, corrupt_cr3_intercept_bypass, test);
153ad879127SKrish Sadhukhan }
154ad879127SKrish Sadhukhan 
155ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test)
156ad879127SKrish Sadhukhan {
157ad879127SKrish Sadhukhan 	ulong a = 0xa0000;
158ad879127SKrish Sadhukhan 
159ad879127SKrish Sadhukhan 	test->scratch = 1;
160ad879127SKrish Sadhukhan 	while (test->scratch != 2)
161ad879127SKrish Sadhukhan 		barrier();
162ad879127SKrish Sadhukhan 
163ad879127SKrish Sadhukhan 	asm volatile ("mmio_insn: mov %0, (%0); nop"
164ad879127SKrish Sadhukhan 		      : "+a"(a) : : "memory");
165ad879127SKrish Sadhukhan 	test->scratch = a;
166ad879127SKrish Sadhukhan }
167ad879127SKrish Sadhukhan 
168ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test)
169ad879127SKrish Sadhukhan {
170ad879127SKrish Sadhukhan 	default_prepare(test);
171096cf7feSPaolo Bonzini 	vmcb->control.intercept_dr_read = 0xff;
172096cf7feSPaolo Bonzini 	vmcb->control.intercept_dr_write = 0xff;
173ad879127SKrish Sadhukhan }
174ad879127SKrish Sadhukhan 
175ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test)
176ad879127SKrish Sadhukhan {
177ad879127SKrish Sadhukhan 	unsigned int i, failcnt = 0;
178ad879127SKrish Sadhukhan 
179ad879127SKrish Sadhukhan 	/* Loop testing debug register reads */
180ad879127SKrish Sadhukhan 	for (i = 0; i < 8; i++) {
181ad879127SKrish Sadhukhan 
182ad879127SKrish Sadhukhan 		switch (i) {
183ad879127SKrish Sadhukhan 		case 0:
184ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory");
185ad879127SKrish Sadhukhan 			break;
186ad879127SKrish Sadhukhan 		case 1:
187ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory");
188ad879127SKrish Sadhukhan 			break;
189ad879127SKrish Sadhukhan 		case 2:
190ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory");
191ad879127SKrish Sadhukhan 			break;
192ad879127SKrish Sadhukhan 		case 3:
193ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory");
194ad879127SKrish Sadhukhan 			break;
195ad879127SKrish Sadhukhan 		case 4:
196ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory");
197ad879127SKrish Sadhukhan 			break;
198ad879127SKrish Sadhukhan 		case 5:
199ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory");
200ad879127SKrish Sadhukhan 			break;
201ad879127SKrish Sadhukhan 		case 6:
202ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory");
203ad879127SKrish Sadhukhan 			break;
204ad879127SKrish Sadhukhan 		case 7:
205ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory");
206ad879127SKrish Sadhukhan 			break;
207ad879127SKrish Sadhukhan 		}
208ad879127SKrish Sadhukhan 
209ad879127SKrish Sadhukhan 		if (test->scratch != i) {
210198dfd0eSJanis Schoetterl-Glausch 			report_fail("dr%u read intercept", i);
211ad879127SKrish Sadhukhan 			failcnt++;
212ad879127SKrish Sadhukhan 		}
213ad879127SKrish Sadhukhan 	}
214ad879127SKrish Sadhukhan 
215ad879127SKrish Sadhukhan 	/* Loop testing debug register writes */
216ad879127SKrish Sadhukhan 	for (i = 0; i < 8; i++) {
217ad879127SKrish Sadhukhan 
218ad879127SKrish Sadhukhan 		switch (i) {
219ad879127SKrish Sadhukhan 		case 0:
220ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory");
221ad879127SKrish Sadhukhan 			break;
222ad879127SKrish Sadhukhan 		case 1:
223ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory");
224ad879127SKrish Sadhukhan 			break;
225ad879127SKrish Sadhukhan 		case 2:
226ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory");
227ad879127SKrish Sadhukhan 			break;
228ad879127SKrish Sadhukhan 		case 3:
229ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory");
230ad879127SKrish Sadhukhan 			break;
231ad879127SKrish Sadhukhan 		case 4:
232ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory");
233ad879127SKrish Sadhukhan 			break;
234ad879127SKrish Sadhukhan 		case 5:
235ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory");
236ad879127SKrish Sadhukhan 			break;
237ad879127SKrish Sadhukhan 		case 6:
238ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory");
239ad879127SKrish Sadhukhan 			break;
240ad879127SKrish Sadhukhan 		case 7:
241ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory");
242ad879127SKrish Sadhukhan 			break;
243ad879127SKrish Sadhukhan 		}
244ad879127SKrish Sadhukhan 
245ad879127SKrish Sadhukhan 		if (test->scratch != i) {
246198dfd0eSJanis Schoetterl-Glausch 			report_fail("dr%u write intercept", i);
247ad879127SKrish Sadhukhan 			failcnt++;
248ad879127SKrish Sadhukhan 		}
249ad879127SKrish Sadhukhan 	}
250ad879127SKrish Sadhukhan 
251ad879127SKrish Sadhukhan 	test->scratch = failcnt;
252ad879127SKrish Sadhukhan }
253ad879127SKrish Sadhukhan 
254ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test)
255ad879127SKrish Sadhukhan {
256096cf7feSPaolo Bonzini 	ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0);
257ad879127SKrish Sadhukhan 
258ad879127SKrish Sadhukhan 	/* Only expect DR intercepts */
259ad879127SKrish Sadhukhan 	if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0))
260ad879127SKrish Sadhukhan 		return true;
261ad879127SKrish Sadhukhan 
262ad879127SKrish Sadhukhan 	/*
263ad879127SKrish Sadhukhan 	 * Compute debug register number.
264ad879127SKrish Sadhukhan 	 * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture
265ad879127SKrish Sadhukhan 	 * Programmer's Manual Volume 2 - System Programming:
266ad879127SKrish Sadhukhan 	 * http://support.amd.com/TechDocs/24593.pdf
267ad879127SKrish Sadhukhan 	 * there are 16 VMEXIT codes each for DR read and write.
268ad879127SKrish Sadhukhan 	 */
269ad879127SKrish Sadhukhan 	test->scratch = (n % 16);
270ad879127SKrish Sadhukhan 
271ad879127SKrish Sadhukhan 	/* Jump over MOV instruction */
272096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
273ad879127SKrish Sadhukhan 
274ad879127SKrish Sadhukhan 	return false;
275ad879127SKrish Sadhukhan }
276ad879127SKrish Sadhukhan 
277ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test)
278ad879127SKrish Sadhukhan {
279ad879127SKrish Sadhukhan 	return !test->scratch;
280ad879127SKrish Sadhukhan }
281ad879127SKrish Sadhukhan 
282ad879127SKrish Sadhukhan static bool next_rip_supported(void)
283ad879127SKrish Sadhukhan {
284ad879127SKrish Sadhukhan 	return this_cpu_has(X86_FEATURE_NRIPS);
285ad879127SKrish Sadhukhan }
286ad879127SKrish Sadhukhan 
287ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test)
288ad879127SKrish Sadhukhan {
289096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC);
290ad879127SKrish Sadhukhan }
291ad879127SKrish Sadhukhan 
292ad879127SKrish Sadhukhan 
293ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test)
294ad879127SKrish Sadhukhan {
295ad879127SKrish Sadhukhan 	asm volatile ("rdtsc\n\t"
296ad879127SKrish Sadhukhan 		      ".globl exp_next_rip\n\t"
297ad879127SKrish Sadhukhan 		      "exp_next_rip:\n\t" ::: "eax", "edx");
298ad879127SKrish Sadhukhan }
299ad879127SKrish Sadhukhan 
300ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test)
301ad879127SKrish Sadhukhan {
302ad879127SKrish Sadhukhan 	extern char exp_next_rip;
303ad879127SKrish Sadhukhan 	unsigned long address = (unsigned long)&exp_next_rip;
304ad879127SKrish Sadhukhan 
305096cf7feSPaolo Bonzini 	return address == vmcb->control.next_rip;
306ad879127SKrish Sadhukhan }
307ad879127SKrish Sadhukhan 
308ad879127SKrish Sadhukhan extern u8 *msr_bitmap;
309ad879127SKrish Sadhukhan 
310ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test)
311ad879127SKrish Sadhukhan {
312ad879127SKrish Sadhukhan 	default_prepare(test);
313096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT);
314096cf7feSPaolo Bonzini 	vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR);
315ad879127SKrish Sadhukhan 	memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE);
316ad879127SKrish Sadhukhan }
317ad879127SKrish Sadhukhan 
318ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test)
319ad879127SKrish Sadhukhan {
320ad879127SKrish Sadhukhan 	unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */
321ad879127SKrish Sadhukhan 	unsigned long msr_index;
322ad879127SKrish Sadhukhan 
323ad879127SKrish Sadhukhan 	for (msr_index = 0; msr_index <= 0xc0011fff; msr_index++) {
324ad879127SKrish Sadhukhan 		if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) {
325ad879127SKrish Sadhukhan 			/*
326ad879127SKrish Sadhukhan 			 * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture
327ad879127SKrish Sadhukhan 			 * Programmer's Manual volume 2 - System Programming:
328ad879127SKrish Sadhukhan 			 * http://support.amd.com/TechDocs/24593.pdf
329ad879127SKrish Sadhukhan 			 * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR.
330ad879127SKrish Sadhukhan 			 */
331ad879127SKrish Sadhukhan 			continue;
332ad879127SKrish Sadhukhan 		}
333ad879127SKrish Sadhukhan 
334ad879127SKrish Sadhukhan 		/* Skips gaps between supported MSR ranges */
335ad879127SKrish Sadhukhan 		if (msr_index == 0x2000)
336ad879127SKrish Sadhukhan 			msr_index = 0xc0000000;
337ad879127SKrish Sadhukhan 		else if (msr_index == 0xc0002000)
338ad879127SKrish Sadhukhan 			msr_index = 0xc0010000;
339ad879127SKrish Sadhukhan 
340ad879127SKrish Sadhukhan 		test->scratch = -1;
341ad879127SKrish Sadhukhan 
342ad879127SKrish Sadhukhan 		rdmsr(msr_index);
343ad879127SKrish Sadhukhan 
344ad879127SKrish Sadhukhan 		/* Check that a read intercept occurred for MSR at msr_index */
345ad879127SKrish Sadhukhan 		if (test->scratch != msr_index)
346198dfd0eSJanis Schoetterl-Glausch 			report_fail("MSR 0x%lx read intercept", msr_index);
347ad879127SKrish Sadhukhan 
348ad879127SKrish Sadhukhan 		/*
349ad879127SKrish Sadhukhan 		 * Poor man approach to generate a value that
350ad879127SKrish Sadhukhan 		 * seems arbitrary each time around the loop.
351ad879127SKrish Sadhukhan 		 */
352ad879127SKrish Sadhukhan 		msr_value += (msr_value << 1);
353ad879127SKrish Sadhukhan 
354ad879127SKrish Sadhukhan 		wrmsr(msr_index, msr_value);
355ad879127SKrish Sadhukhan 
356ad879127SKrish Sadhukhan 		/* Check that a write intercept occurred for MSR with msr_value */
357ad879127SKrish Sadhukhan 		if (test->scratch != msr_value)
358198dfd0eSJanis Schoetterl-Glausch 			report_fail("MSR 0x%lx write intercept", msr_index);
359ad879127SKrish Sadhukhan 	}
360ad879127SKrish Sadhukhan 
361ad879127SKrish Sadhukhan 	test->scratch = -2;
362ad879127SKrish Sadhukhan }
363ad879127SKrish Sadhukhan 
364ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test)
365ad879127SKrish Sadhukhan {
366096cf7feSPaolo Bonzini 	u32 exit_code = vmcb->control.exit_code;
367ad879127SKrish Sadhukhan 	u64 exit_info_1;
368ad879127SKrish Sadhukhan 	u8 *opcode;
369ad879127SKrish Sadhukhan 
370ad879127SKrish Sadhukhan 	if (exit_code == SVM_EXIT_MSR) {
371096cf7feSPaolo Bonzini 		exit_info_1 = vmcb->control.exit_info_1;
372ad879127SKrish Sadhukhan 	} else {
373ad879127SKrish Sadhukhan 		/*
374ad879127SKrish Sadhukhan 		 * If #GP exception occurs instead, check that it was
375ad879127SKrish Sadhukhan 		 * for RDMSR/WRMSR and set exit_info_1 accordingly.
376ad879127SKrish Sadhukhan 		 */
377ad879127SKrish Sadhukhan 
378ad879127SKrish Sadhukhan 		if (exit_code != (SVM_EXIT_EXCP_BASE + GP_VECTOR))
379ad879127SKrish Sadhukhan 			return true;
380ad879127SKrish Sadhukhan 
381096cf7feSPaolo Bonzini 		opcode = (u8 *)vmcb->save.rip;
382ad879127SKrish Sadhukhan 		if (opcode[0] != 0x0f)
383ad879127SKrish Sadhukhan 			return true;
384ad879127SKrish Sadhukhan 
385ad879127SKrish Sadhukhan 		switch (opcode[1]) {
386ad879127SKrish Sadhukhan 		case 0x30: /* WRMSR */
387ad879127SKrish Sadhukhan 			exit_info_1 = 1;
388ad879127SKrish Sadhukhan 			break;
389ad879127SKrish Sadhukhan 		case 0x32: /* RDMSR */
390ad879127SKrish Sadhukhan 			exit_info_1 = 0;
391ad879127SKrish Sadhukhan 			break;
392ad879127SKrish Sadhukhan 		default:
393ad879127SKrish Sadhukhan 			return true;
394ad879127SKrish Sadhukhan 		}
395ad879127SKrish Sadhukhan 
396ad879127SKrish Sadhukhan 		/*
3973f27d772SManali Shukla 		 * Warn that #GP exception occured instead.
398ad879127SKrish Sadhukhan 		 * RCX holds the MSR index.
399ad879127SKrish Sadhukhan 		 */
400ad879127SKrish Sadhukhan 		printf("%s 0x%lx #GP exception\n",
401ad879127SKrish Sadhukhan 		       exit_info_1 ? "WRMSR" : "RDMSR", get_regs().rcx);
402ad879127SKrish Sadhukhan 	}
403ad879127SKrish Sadhukhan 
404ad879127SKrish Sadhukhan 	/* Jump over RDMSR/WRMSR instruction */
405096cf7feSPaolo Bonzini 	vmcb->save.rip += 2;
406ad879127SKrish Sadhukhan 
407ad879127SKrish Sadhukhan 	/*
408ad879127SKrish Sadhukhan 	 * Test whether the intercept was for RDMSR/WRMSR.
409ad879127SKrish Sadhukhan 	 * For RDMSR, test->scratch is set to the MSR index;
410ad879127SKrish Sadhukhan 	 *      RCX holds the MSR index.
411ad879127SKrish Sadhukhan 	 * For WRMSR, test->scratch is set to the MSR value;
412ad879127SKrish Sadhukhan 	 *      RDX holds the upper 32 bits of the MSR value,
413ad879127SKrish Sadhukhan 	 *      while RAX hold its lower 32 bits.
414ad879127SKrish Sadhukhan 	 */
415ad879127SKrish Sadhukhan 	if (exit_info_1)
416ad879127SKrish Sadhukhan 		test->scratch =
417096cf7feSPaolo Bonzini 			((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff));
418ad879127SKrish Sadhukhan 	else
419ad879127SKrish Sadhukhan 		test->scratch = get_regs().rcx;
420ad879127SKrish Sadhukhan 
421ad879127SKrish Sadhukhan 	return false;
422ad879127SKrish Sadhukhan }
423ad879127SKrish Sadhukhan 
424ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test)
425ad879127SKrish Sadhukhan {
426ad879127SKrish Sadhukhan 	memset(msr_bitmap, 0, MSR_BITMAP_SIZE);
427ad879127SKrish Sadhukhan 	return (test->scratch == -2);
428ad879127SKrish Sadhukhan }
429ad879127SKrish Sadhukhan 
430ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test)
431ad879127SKrish Sadhukhan {
432096cf7feSPaolo Bonzini 	vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR)
433ad879127SKrish Sadhukhan 		|  (1ULL << UD_VECTOR)
434ad879127SKrish Sadhukhan 		|  (1ULL << DF_VECTOR)
435ad879127SKrish Sadhukhan 		|  (1ULL << PF_VECTOR);
436ad879127SKrish Sadhukhan 	test->scratch = 0;
437ad879127SKrish Sadhukhan }
438ad879127SKrish Sadhukhan 
439ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test)
440ad879127SKrish Sadhukhan {
441ad879127SKrish Sadhukhan 	asm volatile("	cli\n"
442ad879127SKrish Sadhukhan 		     "	ljmp *1f\n" /* jump to 32-bit code segment */
443ad879127SKrish Sadhukhan 		     "1:\n"
444ad879127SKrish Sadhukhan 		     "	.long 2f\n"
445ad879127SKrish Sadhukhan 		     "	.long " xstr(KERNEL_CS32) "\n"
446ad879127SKrish Sadhukhan 		     ".code32\n"
447ad879127SKrish Sadhukhan 		     "2:\n"
448ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
449ad879127SKrish Sadhukhan 		     "	btcl  $31, %%eax\n" /* clear PG */
450ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
451ad879127SKrish Sadhukhan 		     "	movl $0xc0000080, %%ecx\n" /* EFER */
452ad879127SKrish Sadhukhan 		     "	rdmsr\n"
453ad879127SKrish Sadhukhan 		     "	btcl $8, %%eax\n" /* clear LME */
454ad879127SKrish Sadhukhan 		     "	wrmsr\n"
455ad879127SKrish Sadhukhan 		     "	movl %%cr4, %%eax\n"
456ad879127SKrish Sadhukhan 		     "	btcl $5, %%eax\n" /* clear PAE */
457ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr4\n"
458ad879127SKrish Sadhukhan 		     "	movw %[ds16], %%ax\n"
459ad879127SKrish Sadhukhan 		     "	movw %%ax, %%ds\n"
460ad879127SKrish Sadhukhan 		     "	ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */
461ad879127SKrish Sadhukhan 		     ".code16\n"
462ad879127SKrish Sadhukhan 		     "3:\n"
463ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
464ad879127SKrish Sadhukhan 		     "	btcl $0, %%eax\n" /* clear PE  */
465ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
466ad879127SKrish Sadhukhan 		     "	ljmpl $0, $4f\n"   /* jump to real-mode */
467ad879127SKrish Sadhukhan 		     "4:\n"
468ad879127SKrish Sadhukhan 		     "	vmmcall\n"
469ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
470ad879127SKrish Sadhukhan 		     "	btsl $0, %%eax\n" /* set PE  */
471ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
472ad879127SKrish Sadhukhan 		     "	ljmpl %[cs32], $5f\n" /* back to protected mode */
473ad879127SKrish Sadhukhan 		     ".code32\n"
474ad879127SKrish Sadhukhan 		     "5:\n"
475ad879127SKrish Sadhukhan 		     "	movl %%cr4, %%eax\n"
476ad879127SKrish Sadhukhan 		     "	btsl $5, %%eax\n" /* set PAE */
477ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr4\n"
478ad879127SKrish Sadhukhan 		     "	movl $0xc0000080, %%ecx\n" /* EFER */
479ad879127SKrish Sadhukhan 		     "	rdmsr\n"
480ad879127SKrish Sadhukhan 		     "	btsl $8, %%eax\n" /* set LME */
481ad879127SKrish Sadhukhan 		     "	wrmsr\n"
482ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
483ad879127SKrish Sadhukhan 		     "	btsl  $31, %%eax\n" /* set PG */
484ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
485ad879127SKrish Sadhukhan 		     "	ljmpl %[cs64], $6f\n"    /* back to long mode */
486ad879127SKrish Sadhukhan 		     ".code64\n\t"
487ad879127SKrish Sadhukhan 		     "6:\n"
488ad879127SKrish Sadhukhan 		     "	vmmcall\n"
489ad879127SKrish Sadhukhan 		     :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16),
490ad879127SKrish Sadhukhan 		      [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64)
491ad879127SKrish Sadhukhan 		     : "rax", "rbx", "rcx", "rdx", "memory");
492ad879127SKrish Sadhukhan }
493ad879127SKrish Sadhukhan 
494ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test)
495ad879127SKrish Sadhukhan {
496ad879127SKrish Sadhukhan 	u64 cr0, cr4, efer;
497ad879127SKrish Sadhukhan 
498096cf7feSPaolo Bonzini 	cr0  = vmcb->save.cr0;
499096cf7feSPaolo Bonzini 	cr4  = vmcb->save.cr4;
500096cf7feSPaolo Bonzini 	efer = vmcb->save.efer;
501ad879127SKrish Sadhukhan 
502ad879127SKrish Sadhukhan 	/* Only expect VMMCALL intercepts */
503096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL)
504ad879127SKrish Sadhukhan 		return true;
505ad879127SKrish Sadhukhan 
506ad879127SKrish Sadhukhan 	/* Jump over VMMCALL instruction */
507096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
508ad879127SKrish Sadhukhan 
509ad879127SKrish Sadhukhan 	/* Do sanity checks */
510ad879127SKrish Sadhukhan 	switch (test->scratch) {
511ad879127SKrish Sadhukhan 	case 0:
512ad879127SKrish Sadhukhan 		/* Test should be in real mode now - check for this */
513ad879127SKrish Sadhukhan 		if ((cr0  & 0x80000001) || /* CR0.PG, CR0.PE */
514ad879127SKrish Sadhukhan 		    (cr4  & 0x00000020) || /* CR4.PAE */
515ad879127SKrish Sadhukhan 		    (efer & 0x00000500))   /* EFER.LMA, EFER.LME */
516ad879127SKrish Sadhukhan 			return true;
517ad879127SKrish Sadhukhan 		break;
518ad879127SKrish Sadhukhan 	case 2:
519ad879127SKrish Sadhukhan 		/* Test should be back in long-mode now - check for this */
520ad879127SKrish Sadhukhan 		if (((cr0  & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */
521ad879127SKrish Sadhukhan 		    ((cr4  & 0x00000020) != 0x00000020) || /* CR4.PAE */
522ad879127SKrish Sadhukhan 		    ((efer & 0x00000500) != 0x00000500))   /* EFER.LMA, EFER.LME */
523ad879127SKrish Sadhukhan 			return true;
524ad879127SKrish Sadhukhan 		break;
525ad879127SKrish Sadhukhan 	}
526ad879127SKrish Sadhukhan 
527ad879127SKrish Sadhukhan 	/* one step forward */
528ad879127SKrish Sadhukhan 	test->scratch += 1;
529ad879127SKrish Sadhukhan 
530ad879127SKrish Sadhukhan 	return test->scratch == 2;
531ad879127SKrish Sadhukhan }
532ad879127SKrish Sadhukhan 
533ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test)
534ad879127SKrish Sadhukhan {
535ad879127SKrish Sadhukhan 	return test->scratch == 2;
536ad879127SKrish Sadhukhan }
537ad879127SKrish Sadhukhan 
538ad879127SKrish Sadhukhan extern u8 *io_bitmap;
539ad879127SKrish Sadhukhan 
540ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test)
541ad879127SKrish Sadhukhan {
542096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT);
543ad879127SKrish Sadhukhan 	test->scratch = 0;
544ad879127SKrish Sadhukhan 	memset(io_bitmap, 0, 8192);
545ad879127SKrish Sadhukhan 	io_bitmap[8192] = 0xFF;
546ad879127SKrish Sadhukhan }
547ad879127SKrish Sadhukhan 
548ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test)
549ad879127SKrish Sadhukhan {
550ad879127SKrish Sadhukhan 	// stage 0, test IO pass
551ad879127SKrish Sadhukhan 	inb(0x5000);
552ad879127SKrish Sadhukhan 	outb(0x0, 0x5000);
553ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 0)
554ad879127SKrish Sadhukhan 		goto fail;
555ad879127SKrish Sadhukhan 
556ad879127SKrish Sadhukhan 	// test IO width, in/out
557ad879127SKrish Sadhukhan 	io_bitmap[0] = 0xFF;
558ad879127SKrish Sadhukhan 	inc_test_stage(test);
559ad879127SKrish Sadhukhan 	inb(0x0);
560ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 2)
561ad879127SKrish Sadhukhan 		goto fail;
562ad879127SKrish Sadhukhan 
563ad879127SKrish Sadhukhan 	outw(0x0, 0x0);
564ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 3)
565ad879127SKrish Sadhukhan 		goto fail;
566ad879127SKrish Sadhukhan 
567ad879127SKrish Sadhukhan 	inl(0x0);
568ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 4)
569ad879127SKrish Sadhukhan 		goto fail;
570ad879127SKrish Sadhukhan 
571ad879127SKrish Sadhukhan 	// test low/high IO port
572ad879127SKrish Sadhukhan 	io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
573ad879127SKrish Sadhukhan 	inb(0x5000);
574ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 5)
575ad879127SKrish Sadhukhan 		goto fail;
576ad879127SKrish Sadhukhan 
577ad879127SKrish Sadhukhan 	io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8));
578ad879127SKrish Sadhukhan 	inw(0x9000);
579ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 6)
580ad879127SKrish Sadhukhan 		goto fail;
581ad879127SKrish Sadhukhan 
582ad879127SKrish Sadhukhan 	// test partial pass
583ad879127SKrish Sadhukhan 	io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
584ad879127SKrish Sadhukhan 	inl(0x4FFF);
585ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 7)
586ad879127SKrish Sadhukhan 		goto fail;
587ad879127SKrish Sadhukhan 
588ad879127SKrish Sadhukhan 	// test across pages
589ad879127SKrish Sadhukhan 	inc_test_stage(test);
590ad879127SKrish Sadhukhan 	inl(0x7FFF);
591ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 8)
592ad879127SKrish Sadhukhan 		goto fail;
593ad879127SKrish Sadhukhan 
594ad879127SKrish Sadhukhan 	inc_test_stage(test);
595ad879127SKrish Sadhukhan 	io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8);
596ad879127SKrish Sadhukhan 	inl(0x7FFF);
597ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 10)
598ad879127SKrish Sadhukhan 		goto fail;
599ad879127SKrish Sadhukhan 
600ad879127SKrish Sadhukhan 	io_bitmap[0] = 0;
601ad879127SKrish Sadhukhan 	inl(0xFFFF);
602ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 11)
603ad879127SKrish Sadhukhan 		goto fail;
604ad879127SKrish Sadhukhan 
605ad879127SKrish Sadhukhan 	io_bitmap[0] = 0xFF;
606ad879127SKrish Sadhukhan 	io_bitmap[8192] = 0;
607ad879127SKrish Sadhukhan 	inl(0xFFFF);
608ad879127SKrish Sadhukhan 	inc_test_stage(test);
609ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 12)
610ad879127SKrish Sadhukhan 		goto fail;
611ad879127SKrish Sadhukhan 
612ad879127SKrish Sadhukhan 	return;
613ad879127SKrish Sadhukhan 
614ad879127SKrish Sadhukhan fail:
615198dfd0eSJanis Schoetterl-Glausch 	report_fail("stage %d", get_test_stage(test));
616ad879127SKrish Sadhukhan 	test->scratch = -1;
617ad879127SKrish Sadhukhan }
618ad879127SKrish Sadhukhan 
619ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test)
620ad879127SKrish Sadhukhan {
621ad879127SKrish Sadhukhan 	unsigned port, size;
622ad879127SKrish Sadhukhan 
623ad879127SKrish Sadhukhan 	/* Only expect IOIO intercepts */
624096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code == SVM_EXIT_VMMCALL)
625ad879127SKrish Sadhukhan 		return true;
626ad879127SKrish Sadhukhan 
627096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code != SVM_EXIT_IOIO)
628ad879127SKrish Sadhukhan 		return true;
629ad879127SKrish Sadhukhan 
630ad879127SKrish Sadhukhan 	/* one step forward */
631ad879127SKrish Sadhukhan 	test->scratch += 1;
632ad879127SKrish Sadhukhan 
633096cf7feSPaolo Bonzini 	port = vmcb->control.exit_info_1 >> 16;
634096cf7feSPaolo Bonzini 	size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7;
635ad879127SKrish Sadhukhan 
636ad879127SKrish Sadhukhan 	while (size--) {
637ad879127SKrish Sadhukhan 		io_bitmap[port / 8] &= ~(1 << (port & 7));
638ad879127SKrish Sadhukhan 		port++;
639ad879127SKrish Sadhukhan 	}
640ad879127SKrish Sadhukhan 
641ad879127SKrish Sadhukhan 	return false;
642ad879127SKrish Sadhukhan }
643ad879127SKrish Sadhukhan 
644ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test)
645ad879127SKrish Sadhukhan {
646ad879127SKrish Sadhukhan 	memset(io_bitmap, 0, 8193);
647ad879127SKrish Sadhukhan 	return test->scratch != -1;
648ad879127SKrish Sadhukhan }
649ad879127SKrish Sadhukhan 
650ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test)
651ad879127SKrish Sadhukhan {
652096cf7feSPaolo Bonzini 	vmcb->control.asid = 0;
653ad879127SKrish Sadhukhan }
654ad879127SKrish Sadhukhan 
655ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test)
656ad879127SKrish Sadhukhan {
657ad879127SKrish Sadhukhan 	asm volatile ("vmmcall\n\t");
658ad879127SKrish Sadhukhan }
659ad879127SKrish Sadhukhan 
660ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test)
661ad879127SKrish Sadhukhan {
662096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_ERR;
663ad879127SKrish Sadhukhan }
664ad879127SKrish Sadhukhan 
665ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test)
666ad879127SKrish Sadhukhan {
667096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0);
668ad879127SKrish Sadhukhan }
669ad879127SKrish Sadhukhan 
670ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test)
671ad879127SKrish Sadhukhan {
672ad879127SKrish Sadhukhan 	return true;
673ad879127SKrish Sadhukhan }
674ad879127SKrish Sadhukhan 
675ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test)
676ad879127SKrish Sadhukhan {
677ad879127SKrish Sadhukhan 	unsigned long cr0;
678ad879127SKrish Sadhukhan 
679ad879127SKrish Sadhukhan 	/* read cr0, clear CD, and write back */
680ad879127SKrish Sadhukhan 	cr0  = read_cr0();
681ad879127SKrish Sadhukhan 	cr0 |= (1UL << 30);
682ad879127SKrish Sadhukhan 	write_cr0(cr0);
683ad879127SKrish Sadhukhan 
684ad879127SKrish Sadhukhan 	/*
685ad879127SKrish Sadhukhan 	 * If we are here the test failed, not sure what to do now because we
686ad879127SKrish Sadhukhan 	 * are not in guest-mode anymore so we can't trigger an intercept.
687ad879127SKrish Sadhukhan 	 * Trigger a tripple-fault for now.
688ad879127SKrish Sadhukhan 	 */
689198dfd0eSJanis Schoetterl-Glausch 	report_fail("sel_cr0 test. Can not recover from this - exiting");
690ad879127SKrish Sadhukhan 	exit(report_summary());
691ad879127SKrish Sadhukhan }
692ad879127SKrish Sadhukhan 
693ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test)
694ad879127SKrish Sadhukhan {
695096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE;
696ad879127SKrish Sadhukhan }
697ad879127SKrish Sadhukhan 
698ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE    (1ll << 32)
699f3154609SBill Wendling #define TSC_OFFSET_VALUE    (~0ull << 48)
700ad879127SKrish Sadhukhan static bool ok;
701ad879127SKrish Sadhukhan 
70210a65fc4SNadav Amit static bool tsc_adjust_supported(void)
70310a65fc4SNadav Amit {
70410a65fc4SNadav Amit 	return this_cpu_has(X86_FEATURE_TSC_ADJUST);
70510a65fc4SNadav Amit }
70610a65fc4SNadav Amit 
707ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test)
708ad879127SKrish Sadhukhan {
709ad879127SKrish Sadhukhan 	default_prepare(test);
710096cf7feSPaolo Bonzini 	vmcb->control.tsc_offset = TSC_OFFSET_VALUE;
711ad879127SKrish Sadhukhan 
712ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE);
713ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
714ad879127SKrish Sadhukhan 	ok = adjust == -TSC_ADJUST_VALUE;
715ad879127SKrish Sadhukhan }
716ad879127SKrish Sadhukhan 
717ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test)
718ad879127SKrish Sadhukhan {
719ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
720ad879127SKrish Sadhukhan 	ok &= adjust == -TSC_ADJUST_VALUE;
721ad879127SKrish Sadhukhan 
722ad879127SKrish Sadhukhan 	uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE;
723ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE);
724ad879127SKrish Sadhukhan 
725ad879127SKrish Sadhukhan 	adjust = rdmsr(MSR_IA32_TSC_ADJUST);
726ad879127SKrish Sadhukhan 	ok &= adjust <= -2 * TSC_ADJUST_VALUE;
727ad879127SKrish Sadhukhan 
728ad879127SKrish Sadhukhan 	uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE;
729ad879127SKrish Sadhukhan 	ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
730ad879127SKrish Sadhukhan 
731ad879127SKrish Sadhukhan 	uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE;
732ad879127SKrish Sadhukhan 	ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
733ad879127SKrish Sadhukhan }
734ad879127SKrish Sadhukhan 
735ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test)
736ad879127SKrish Sadhukhan {
737ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
738ad879127SKrish Sadhukhan 
739ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC_ADJUST, 0);
740ad879127SKrish Sadhukhan 	return ok && adjust <= -2 * TSC_ADJUST_VALUE;
741ad879127SKrish Sadhukhan }
742ad879127SKrish Sadhukhan 
743a8503d50SMaxim Levitsky 
744a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value;
745a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */
746a8503d50SMaxim Levitsky #define TSC_SHIFT 24
747a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10
748a8503d50SMaxim Levitsky 
749a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test)
750a8503d50SMaxim Levitsky {
751a8503d50SMaxim Levitsky 	u64 start_tsc = rdtsc();
752a8503d50SMaxim Levitsky 
753a8503d50SMaxim Levitsky 	while (rdtsc() - start_tsc < guest_tsc_delay_value)
754a8503d50SMaxim Levitsky 		cpu_relax();
755a8503d50SMaxim Levitsky }
756a8503d50SMaxim Levitsky 
757a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration,
758a8503d50SMaxim Levitsky 				       double tsc_scale, u64 tsc_offset)
759a8503d50SMaxim Levitsky {
760a8503d50SMaxim Levitsky 	u64 start_tsc, actual_duration;
761a8503d50SMaxim Levitsky 
762a8503d50SMaxim Levitsky 	guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale;
763a8503d50SMaxim Levitsky 
764a8503d50SMaxim Levitsky 	test_set_guest(svm_tsc_scale_guest);
765a8503d50SMaxim Levitsky 	vmcb->control.tsc_offset = tsc_offset;
766a8503d50SMaxim Levitsky 	wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32)));
767a8503d50SMaxim Levitsky 
768a8503d50SMaxim Levitsky 	start_tsc = rdtsc();
769a8503d50SMaxim Levitsky 
770a8503d50SMaxim Levitsky 	if (svm_vmrun() != SVM_EXIT_VMMCALL)
771a8503d50SMaxim Levitsky 		report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code);
772a8503d50SMaxim Levitsky 
773a8503d50SMaxim Levitsky 	actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT;
774a8503d50SMaxim Levitsky 
775a8503d50SMaxim Levitsky 	report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)",
776a8503d50SMaxim Levitsky 	       duration, actual_duration);
777a8503d50SMaxim Levitsky }
778a8503d50SMaxim Levitsky 
779a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void)
780a8503d50SMaxim Levitsky {
781a8503d50SMaxim Levitsky 	int i;
782a8503d50SMaxim Levitsky 
783a8503d50SMaxim Levitsky 	if (!tsc_scale_supported()) {
784a8503d50SMaxim Levitsky 		report_skip("TSC scale not supported in the guest");
785a8503d50SMaxim Levitsky 		return;
786a8503d50SMaxim Levitsky 	}
787a8503d50SMaxim Levitsky 
788a8503d50SMaxim Levitsky 	report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT,
789a8503d50SMaxim Levitsky 	       "initial TSC scale ratio");
790a8503d50SMaxim Levitsky 
791a8503d50SMaxim Levitsky 	for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) {
792a8503d50SMaxim Levitsky 
793a8503d50SMaxim Levitsky 		double tsc_scale = (double)(rdrand() % 100 + 1) / 10;
794a8503d50SMaxim Levitsky 		int duration = rdrand() % 50 + 1;
795a8503d50SMaxim Levitsky 		u64 tsc_offset = rdrand();
796a8503d50SMaxim Levitsky 
797a8503d50SMaxim Levitsky 		report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld",
798a8503d50SMaxim Levitsky 			    duration, (int)(tsc_scale * 100), tsc_offset);
799a8503d50SMaxim Levitsky 
800a8503d50SMaxim Levitsky 		svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset);
801a8503d50SMaxim Levitsky 	}
802a8503d50SMaxim Levitsky 
803a8503d50SMaxim Levitsky 	svm_tsc_scale_run_testcase(50, 255, rdrand());
804a8503d50SMaxim Levitsky 	svm_tsc_scale_run_testcase(50, 0.0001, rdrand());
805a8503d50SMaxim Levitsky }
806a8503d50SMaxim Levitsky 
807ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test)
808ad879127SKrish Sadhukhan {
809ad879127SKrish Sadhukhan 	default_prepare(test);
810ad879127SKrish Sadhukhan 	runs = LATENCY_RUNS;
811ad879127SKrish Sadhukhan 	latvmrun_min = latvmexit_min = -1ULL;
812ad879127SKrish Sadhukhan 	latvmrun_max = latvmexit_max = 0;
813ad879127SKrish Sadhukhan 	vmrun_sum = vmexit_sum = 0;
814ad879127SKrish Sadhukhan 	tsc_start = rdtsc();
815ad879127SKrish Sadhukhan }
816ad879127SKrish Sadhukhan 
817ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test)
818ad879127SKrish Sadhukhan {
819ad879127SKrish Sadhukhan 	u64 cycles;
820ad879127SKrish Sadhukhan 
821ad879127SKrish Sadhukhan start:
822ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
823ad879127SKrish Sadhukhan 
824ad879127SKrish Sadhukhan 	cycles = tsc_end - tsc_start;
825ad879127SKrish Sadhukhan 
826ad879127SKrish Sadhukhan 	if (cycles > latvmrun_max)
827ad879127SKrish Sadhukhan 		latvmrun_max = cycles;
828ad879127SKrish Sadhukhan 
829ad879127SKrish Sadhukhan 	if (cycles < latvmrun_min)
830ad879127SKrish Sadhukhan 		latvmrun_min = cycles;
831ad879127SKrish Sadhukhan 
832ad879127SKrish Sadhukhan 	vmrun_sum += cycles;
833ad879127SKrish Sadhukhan 
834ad879127SKrish Sadhukhan 	tsc_start = rdtsc();
835ad879127SKrish Sadhukhan 
836ad879127SKrish Sadhukhan 	asm volatile ("vmmcall" : : : "memory");
837ad879127SKrish Sadhukhan 	goto start;
838ad879127SKrish Sadhukhan }
839ad879127SKrish Sadhukhan 
840ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test)
841ad879127SKrish Sadhukhan {
842ad879127SKrish Sadhukhan 	u64 cycles;
843ad879127SKrish Sadhukhan 
844ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
845ad879127SKrish Sadhukhan 
846ad879127SKrish Sadhukhan 	cycles = tsc_end - tsc_start;
847ad879127SKrish Sadhukhan 
848ad879127SKrish Sadhukhan 	if (cycles > latvmexit_max)
849ad879127SKrish Sadhukhan 		latvmexit_max = cycles;
850ad879127SKrish Sadhukhan 
851ad879127SKrish Sadhukhan 	if (cycles < latvmexit_min)
852ad879127SKrish Sadhukhan 		latvmexit_min = cycles;
853ad879127SKrish Sadhukhan 
854ad879127SKrish Sadhukhan 	vmexit_sum += cycles;
855ad879127SKrish Sadhukhan 
856096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
857ad879127SKrish Sadhukhan 
858ad879127SKrish Sadhukhan 	runs -= 1;
859ad879127SKrish Sadhukhan 
860ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
861ad879127SKrish Sadhukhan 
862ad879127SKrish Sadhukhan 	return runs == 0;
863ad879127SKrish Sadhukhan }
864ad879127SKrish Sadhukhan 
865f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test)
866f7fa53dcSPaolo Bonzini {
867f7fa53dcSPaolo Bonzini 	vmcb->control.clean = VMCB_CLEAN_ALL;
868f7fa53dcSPaolo Bonzini 	return latency_finished(test);
869f7fa53dcSPaolo Bonzini }
870f7fa53dcSPaolo Bonzini 
871ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test)
872ad879127SKrish Sadhukhan {
873ad879127SKrish Sadhukhan 	printf("    Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max,
874ad879127SKrish Sadhukhan 	       latvmrun_min, vmrun_sum / LATENCY_RUNS);
875ad879127SKrish Sadhukhan 	printf("    Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max,
876ad879127SKrish Sadhukhan 	       latvmexit_min, vmexit_sum / LATENCY_RUNS);
877ad879127SKrish Sadhukhan 	return true;
878ad879127SKrish Sadhukhan }
879ad879127SKrish Sadhukhan 
880ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test)
881ad879127SKrish Sadhukhan {
882ad879127SKrish Sadhukhan 	default_prepare(test);
883ad879127SKrish Sadhukhan 	runs = LATENCY_RUNS;
884ad879127SKrish Sadhukhan 	latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL;
885ad879127SKrish Sadhukhan 	latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0;
886ad879127SKrish Sadhukhan 	vmload_sum = vmsave_sum = stgi_sum = clgi_sum;
887ad879127SKrish Sadhukhan }
888ad879127SKrish Sadhukhan 
889ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test)
890ad879127SKrish Sadhukhan {
891096cf7feSPaolo Bonzini 	u64 vmcb_phys = virt_to_phys(vmcb);
892ad879127SKrish Sadhukhan 	u64 cycles;
893ad879127SKrish Sadhukhan 
894ad879127SKrish Sadhukhan 	for ( ; runs != 0; runs--) {
895ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
896ad879127SKrish Sadhukhan 		asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory");
897ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
898ad879127SKrish Sadhukhan 		if (cycles > latvmload_max)
899ad879127SKrish Sadhukhan 			latvmload_max = cycles;
900ad879127SKrish Sadhukhan 		if (cycles < latvmload_min)
901ad879127SKrish Sadhukhan 			latvmload_min = cycles;
902ad879127SKrish Sadhukhan 		vmload_sum += cycles;
903ad879127SKrish Sadhukhan 
904ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
905ad879127SKrish Sadhukhan 		asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory");
906ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
907ad879127SKrish Sadhukhan 		if (cycles > latvmsave_max)
908ad879127SKrish Sadhukhan 			latvmsave_max = cycles;
909ad879127SKrish Sadhukhan 		if (cycles < latvmsave_min)
910ad879127SKrish Sadhukhan 			latvmsave_min = cycles;
911ad879127SKrish Sadhukhan 		vmsave_sum += cycles;
912ad879127SKrish Sadhukhan 
913ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
914ad879127SKrish Sadhukhan 		asm volatile("stgi\n\t");
915ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
916ad879127SKrish Sadhukhan 		if (cycles > latstgi_max)
917ad879127SKrish Sadhukhan 			latstgi_max = cycles;
918ad879127SKrish Sadhukhan 		if (cycles < latstgi_min)
919ad879127SKrish Sadhukhan 			latstgi_min = cycles;
920ad879127SKrish Sadhukhan 		stgi_sum += cycles;
921ad879127SKrish Sadhukhan 
922ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
923ad879127SKrish Sadhukhan 		asm volatile("clgi\n\t");
924ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
925ad879127SKrish Sadhukhan 		if (cycles > latclgi_max)
926ad879127SKrish Sadhukhan 			latclgi_max = cycles;
927ad879127SKrish Sadhukhan 		if (cycles < latclgi_min)
928ad879127SKrish Sadhukhan 			latclgi_min = cycles;
929ad879127SKrish Sadhukhan 		clgi_sum += cycles;
930ad879127SKrish Sadhukhan 	}
931ad879127SKrish Sadhukhan 
932ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
933ad879127SKrish Sadhukhan 
934ad879127SKrish Sadhukhan 	return true;
935ad879127SKrish Sadhukhan }
936ad879127SKrish Sadhukhan 
937ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test)
938ad879127SKrish Sadhukhan {
939ad879127SKrish Sadhukhan 	printf("    Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max,
940ad879127SKrish Sadhukhan 	       latvmload_min, vmload_sum / LATENCY_RUNS);
941ad879127SKrish Sadhukhan 	printf("    Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max,
942ad879127SKrish Sadhukhan 	       latvmsave_min, vmsave_sum / LATENCY_RUNS);
943ad879127SKrish Sadhukhan 	printf("    Latency STGI:   max: %ld min: %ld avg: %ld\n", latstgi_max,
944ad879127SKrish Sadhukhan 	       latstgi_min, stgi_sum / LATENCY_RUNS);
945ad879127SKrish Sadhukhan 	printf("    Latency CLGI:   max: %ld min: %ld avg: %ld\n", latclgi_max,
946ad879127SKrish Sadhukhan 	       latclgi_min, clgi_sum / LATENCY_RUNS);
947ad879127SKrish Sadhukhan 	return true;
948ad879127SKrish Sadhukhan }
949ad879127SKrish Sadhukhan 
950*493d27d4SSean Christopherson /*
951*493d27d4SSean Christopherson  * Report failures from SVM guest code, and on failure, set the stage to -1 and
952*493d27d4SSean Christopherson  * do VMMCALL to terminate the test (host side must treat -1 as "finished").
953*493d27d4SSean Christopherson  * TODO: fix the tests that don't play nice with a straight report, e.g. the
954*493d27d4SSean Christopherson  * V_TPR test fails if report() is invoked.
955*493d27d4SSean Christopherson  */
956*493d27d4SSean Christopherson #define report_svm_guest(cond, test, fmt, args...)	\
957*493d27d4SSean Christopherson do {							\
958*493d27d4SSean Christopherson 	if (!(cond)) {					\
959*493d27d4SSean Christopherson 		report_fail(fmt, ##args);		\
960*493d27d4SSean Christopherson 		set_test_stage(test, -1);		\
961*493d27d4SSean Christopherson 		vmmcall();				\
962*493d27d4SSean Christopherson 	}						\
963*493d27d4SSean Christopherson } while (0)
964*493d27d4SSean Christopherson 
965ad879127SKrish Sadhukhan bool pending_event_ipi_fired;
966ad879127SKrish Sadhukhan bool pending_event_guest_run;
967ad879127SKrish Sadhukhan 
968ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs)
969ad879127SKrish Sadhukhan {
970ad879127SKrish Sadhukhan 	pending_event_ipi_fired = true;
971ad879127SKrish Sadhukhan 	eoi();
972ad879127SKrish Sadhukhan }
973ad879127SKrish Sadhukhan 
974ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test)
975ad879127SKrish Sadhukhan {
976ad879127SKrish Sadhukhan 	int ipi_vector = 0xf1;
977ad879127SKrish Sadhukhan 
978ad879127SKrish Sadhukhan 	default_prepare(test);
979ad879127SKrish Sadhukhan 
980ad879127SKrish Sadhukhan 	pending_event_ipi_fired = false;
981ad879127SKrish Sadhukhan 
982ad879127SKrish Sadhukhan 	handle_irq(ipi_vector, pending_event_ipi_isr);
983ad879127SKrish Sadhukhan 
984ad879127SKrish Sadhukhan 	pending_event_guest_run = false;
985ad879127SKrish Sadhukhan 
986096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
987096cf7feSPaolo Bonzini 	vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
988ad879127SKrish Sadhukhan 
989ad879127SKrish Sadhukhan 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
990ad879127SKrish Sadhukhan 		       APIC_DM_FIXED | ipi_vector, 0);
991ad879127SKrish Sadhukhan 
992ad879127SKrish Sadhukhan 	set_test_stage(test, 0);
993ad879127SKrish Sadhukhan }
994ad879127SKrish Sadhukhan 
995ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test)
996ad879127SKrish Sadhukhan {
997ad879127SKrish Sadhukhan 	pending_event_guest_run = true;
998ad879127SKrish Sadhukhan }
999ad879127SKrish Sadhukhan 
1000ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test)
1001ad879127SKrish Sadhukhan {
1002ad879127SKrish Sadhukhan 	switch (get_test_stage(test)) {
1003ad879127SKrish Sadhukhan 	case 0:
1004096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_INTR) {
1005198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x",
1006096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
1007ad879127SKrish Sadhukhan 			return true;
1008ad879127SKrish Sadhukhan 		}
1009ad879127SKrish Sadhukhan 
1010096cf7feSPaolo Bonzini 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
1011096cf7feSPaolo Bonzini 		vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
1012ad879127SKrish Sadhukhan 
1013ad879127SKrish Sadhukhan 		if (pending_event_guest_run) {
1014198dfd0eSJanis Schoetterl-Glausch 			report_fail("Guest ran before host received IPI\n");
1015ad879127SKrish Sadhukhan 			return true;
1016ad879127SKrish Sadhukhan 		}
1017ad879127SKrish Sadhukhan 
1018ad879127SKrish Sadhukhan 		irq_enable();
1019ad879127SKrish Sadhukhan 		asm volatile ("nop");
1020ad879127SKrish Sadhukhan 		irq_disable();
1021ad879127SKrish Sadhukhan 
1022ad879127SKrish Sadhukhan 		if (!pending_event_ipi_fired) {
1023198dfd0eSJanis Schoetterl-Glausch 			report_fail("Pending interrupt not dispatched after IRQ enabled\n");
1024ad879127SKrish Sadhukhan 			return true;
1025ad879127SKrish Sadhukhan 		}
1026ad879127SKrish Sadhukhan 		break;
1027ad879127SKrish Sadhukhan 
1028ad879127SKrish Sadhukhan 	case 1:
1029ad879127SKrish Sadhukhan 		if (!pending_event_guest_run) {
1030198dfd0eSJanis Schoetterl-Glausch 			report_fail("Guest did not resume when no interrupt\n");
1031ad879127SKrish Sadhukhan 			return true;
1032ad879127SKrish Sadhukhan 		}
1033ad879127SKrish Sadhukhan 		break;
1034ad879127SKrish Sadhukhan 	}
1035ad879127SKrish Sadhukhan 
1036ad879127SKrish Sadhukhan 	inc_test_stage(test);
1037ad879127SKrish Sadhukhan 
1038ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1039ad879127SKrish Sadhukhan }
1040ad879127SKrish Sadhukhan 
1041ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test)
1042ad879127SKrish Sadhukhan {
1043ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1044ad879127SKrish Sadhukhan }
1045ad879127SKrish Sadhukhan 
104685dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test)
1047ad879127SKrish Sadhukhan {
1048ad879127SKrish Sadhukhan 	default_prepare(test);
1049ad879127SKrish Sadhukhan 
1050ad879127SKrish Sadhukhan 	pending_event_ipi_fired = false;
1051ad879127SKrish Sadhukhan 
1052ad879127SKrish Sadhukhan 	handle_irq(0xf1, pending_event_ipi_isr);
1053ad879127SKrish Sadhukhan 
1054ad879127SKrish Sadhukhan 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1055ad879127SKrish Sadhukhan 		       APIC_DM_FIXED | 0xf1, 0);
1056ad879127SKrish Sadhukhan 
1057ad879127SKrish Sadhukhan 	set_test_stage(test, 0);
1058ad879127SKrish Sadhukhan }
1059ad879127SKrish Sadhukhan 
106085dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test)
1061ad879127SKrish Sadhukhan {
1062ad879127SKrish Sadhukhan 	asm("cli");
1063ad879127SKrish Sadhukhan }
1064ad879127SKrish Sadhukhan 
106585dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test)
1066ad879127SKrish Sadhukhan {
1067*493d27d4SSean Christopherson 	report_svm_guest(!pending_event_ipi_fired, test,
1068*493d27d4SSean Christopherson 			 "IRQ should NOT be delivered while IRQs disabled");
1069ad879127SKrish Sadhukhan 
107085dc2aceSPaolo Bonzini 	/* VINTR_MASKING is zero.  This should cause the IPI to fire.  */
1071ad879127SKrish Sadhukhan 	irq_enable();
1072ad879127SKrish Sadhukhan 	asm volatile ("nop");
1073ad879127SKrish Sadhukhan 	irq_disable();
1074ad879127SKrish Sadhukhan 
1075*493d27d4SSean Christopherson 	report_svm_guest(pending_event_ipi_fired, test,
1076*493d27d4SSean Christopherson 			 "IRQ should be delivered after enabling IRQs");
1077ad879127SKrish Sadhukhan 	vmmcall();
1078ad879127SKrish Sadhukhan 
107985dc2aceSPaolo Bonzini 	/*
108085dc2aceSPaolo Bonzini 	 * Now VINTR_MASKING=1, but no interrupt is pending so
108185dc2aceSPaolo Bonzini 	 * the VINTR interception should be clear in VMCB02.  Check
108285dc2aceSPaolo Bonzini 	 * that L0 did not leave a stale VINTR in the VMCB.
108385dc2aceSPaolo Bonzini 	 */
1084ad879127SKrish Sadhukhan 	irq_enable();
1085ad879127SKrish Sadhukhan 	asm volatile ("nop");
1086ad879127SKrish Sadhukhan 	irq_disable();
1087ad879127SKrish Sadhukhan }
1088ad879127SKrish Sadhukhan 
108985dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test)
1090ad879127SKrish Sadhukhan {
1091*493d27d4SSean Christopherson 	report_svm_guest(vmcb->control.exit_code == SVM_EXIT_VMMCALL, test,
1092*493d27d4SSean Christopherson 			 "Wanted VMMCALL VM-Exit, got exit reason 0x%x",
1093096cf7feSPaolo Bonzini 			 vmcb->control.exit_code);
1094ad879127SKrish Sadhukhan 
1095ad879127SKrish Sadhukhan 	switch (get_test_stage(test)) {
1096ad879127SKrish Sadhukhan 	case 0:
1097096cf7feSPaolo Bonzini 		vmcb->save.rip += 3;
1098ad879127SKrish Sadhukhan 
1099ad879127SKrish Sadhukhan 		pending_event_ipi_fired = false;
1100ad879127SKrish Sadhukhan 
1101096cf7feSPaolo Bonzini 		vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
1102ad879127SKrish Sadhukhan 
110385dc2aceSPaolo Bonzini 		/* Now entering again with VINTR_MASKING=1.  */
1104ad879127SKrish Sadhukhan 		apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1105ad879127SKrish Sadhukhan 			       APIC_DM_FIXED | 0xf1, 0);
1106ad879127SKrish Sadhukhan 
1107ad879127SKrish Sadhukhan 		break;
1108ad879127SKrish Sadhukhan 
1109ad879127SKrish Sadhukhan 	case 1:
1110ad879127SKrish Sadhukhan 		if (pending_event_ipi_fired == true) {
1111198dfd0eSJanis Schoetterl-Glausch 			report_fail("Interrupt triggered by guest");
1112ad879127SKrish Sadhukhan 			return true;
1113ad879127SKrish Sadhukhan 		}
1114ad879127SKrish Sadhukhan 
1115ad879127SKrish Sadhukhan 		irq_enable();
1116ad879127SKrish Sadhukhan 		asm volatile ("nop");
1117ad879127SKrish Sadhukhan 		irq_disable();
1118ad879127SKrish Sadhukhan 
1119ad879127SKrish Sadhukhan 		if (pending_event_ipi_fired != true) {
1120198dfd0eSJanis Schoetterl-Glausch 			report_fail("Interrupt not triggered by host");
1121ad879127SKrish Sadhukhan 			return true;
1122ad879127SKrish Sadhukhan 		}
1123ad879127SKrish Sadhukhan 
1124ad879127SKrish Sadhukhan 		break;
1125ad879127SKrish Sadhukhan 
1126ad879127SKrish Sadhukhan 	default:
1127ad879127SKrish Sadhukhan 		return true;
1128ad879127SKrish Sadhukhan 	}
1129ad879127SKrish Sadhukhan 
1130ad879127SKrish Sadhukhan 	inc_test_stage(test);
1131ad879127SKrish Sadhukhan 
1132ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1133ad879127SKrish Sadhukhan }
1134ad879127SKrish Sadhukhan 
113585dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test)
1136ad879127SKrish Sadhukhan {
1137ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1138ad879127SKrish Sadhukhan }
1139ad879127SKrish Sadhukhan 
114085dc2aceSPaolo Bonzini #define TIMER_VECTOR    222
114185dc2aceSPaolo Bonzini 
114285dc2aceSPaolo Bonzini static volatile bool timer_fired;
114385dc2aceSPaolo Bonzini 
114485dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs)
114585dc2aceSPaolo Bonzini {
114685dc2aceSPaolo Bonzini 	timer_fired = true;
114785dc2aceSPaolo Bonzini 	apic_write(APIC_EOI, 0);
114885dc2aceSPaolo Bonzini }
114985dc2aceSPaolo Bonzini 
115085dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test)
115185dc2aceSPaolo Bonzini {
115285dc2aceSPaolo Bonzini 	default_prepare(test);
115385dc2aceSPaolo Bonzini 	handle_irq(TIMER_VECTOR, timer_isr);
115485dc2aceSPaolo Bonzini 	timer_fired = false;
115585dc2aceSPaolo Bonzini 	set_test_stage(test, 0);
115685dc2aceSPaolo Bonzini }
115785dc2aceSPaolo Bonzini 
115885dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test)
115985dc2aceSPaolo Bonzini {
116085dc2aceSPaolo Bonzini 	long long start, loops;
116185dc2aceSPaolo Bonzini 
116285dc2aceSPaolo Bonzini 	apic_write(APIC_LVTT, TIMER_VECTOR);
116385dc2aceSPaolo Bonzini 	irq_enable();
116485dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 1); //Timer Initial Count Register 0x380 one-shot
116585dc2aceSPaolo Bonzini 	for (loops = 0; loops < 10000000 && !timer_fired; loops++)
116685dc2aceSPaolo Bonzini 		asm volatile ("nop");
116785dc2aceSPaolo Bonzini 
1168*493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test,
1169*493d27d4SSean Christopherson 			 "direct interrupt while running guest");
117085dc2aceSPaolo Bonzini 
117185dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 0);
117285dc2aceSPaolo Bonzini 	irq_disable();
117385dc2aceSPaolo Bonzini 	vmmcall();
117485dc2aceSPaolo Bonzini 
117585dc2aceSPaolo Bonzini 	timer_fired = false;
117685dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 1);
117785dc2aceSPaolo Bonzini 	for (loops = 0; loops < 10000000 && !timer_fired; loops++)
117885dc2aceSPaolo Bonzini 		asm volatile ("nop");
117985dc2aceSPaolo Bonzini 
1180*493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test,
1181*493d27d4SSean Christopherson 			 "intercepted interrupt while running guest");
118285dc2aceSPaolo Bonzini 
118385dc2aceSPaolo Bonzini 	irq_enable();
118485dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 0);
118585dc2aceSPaolo Bonzini 	irq_disable();
118685dc2aceSPaolo Bonzini 
118785dc2aceSPaolo Bonzini 	timer_fired = false;
118885dc2aceSPaolo Bonzini 	start = rdtsc();
118985dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 1000000);
1190a3001422SOliver Upton 	safe_halt();
119185dc2aceSPaolo Bonzini 
1192*493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test, "direct interrupt + hlt");
1193*493d27d4SSean Christopherson 	report(rdtsc() - start > 10000, "IRQ arrived after expected delay");
119485dc2aceSPaolo Bonzini 
119585dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 0);
119685dc2aceSPaolo Bonzini 	irq_disable();
119785dc2aceSPaolo Bonzini 	vmmcall();
119885dc2aceSPaolo Bonzini 
119985dc2aceSPaolo Bonzini 	timer_fired = false;
120085dc2aceSPaolo Bonzini 	start = rdtsc();
120185dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 1000000);
120285dc2aceSPaolo Bonzini 	asm volatile ("hlt");
120385dc2aceSPaolo Bonzini 
1204*493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test, "intercepted interrupt + hlt");
1205*493d27d4SSean Christopherson 	report(rdtsc() - start > 10000, "IRQ arrived after expected delay");
120685dc2aceSPaolo Bonzini 
120785dc2aceSPaolo Bonzini 	apic_write(APIC_TMICT, 0);
120885dc2aceSPaolo Bonzini 	irq_disable();
120985dc2aceSPaolo Bonzini }
121085dc2aceSPaolo Bonzini 
121185dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test)
121285dc2aceSPaolo Bonzini {
121385dc2aceSPaolo Bonzini 	switch (get_test_stage(test)) {
121485dc2aceSPaolo Bonzini 	case 0:
121585dc2aceSPaolo Bonzini 	case 2:
1216096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1217198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1218096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
121985dc2aceSPaolo Bonzini 			return true;
122085dc2aceSPaolo Bonzini 		}
1221096cf7feSPaolo Bonzini 		vmcb->save.rip += 3;
122285dc2aceSPaolo Bonzini 
1223096cf7feSPaolo Bonzini 		vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1224096cf7feSPaolo Bonzini 		vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
122585dc2aceSPaolo Bonzini 		break;
122685dc2aceSPaolo Bonzini 
122785dc2aceSPaolo Bonzini 	case 1:
122885dc2aceSPaolo Bonzini 	case 3:
1229096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_INTR) {
1230198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x",
1231096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
123285dc2aceSPaolo Bonzini 			return true;
123385dc2aceSPaolo Bonzini 		}
123485dc2aceSPaolo Bonzini 
123585dc2aceSPaolo Bonzini 		irq_enable();
123685dc2aceSPaolo Bonzini 		asm volatile ("nop");
123785dc2aceSPaolo Bonzini 		irq_disable();
123885dc2aceSPaolo Bonzini 
1239096cf7feSPaolo Bonzini 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
1240096cf7feSPaolo Bonzini 		vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
124185dc2aceSPaolo Bonzini 		break;
124285dc2aceSPaolo Bonzini 
124385dc2aceSPaolo Bonzini 	case 4:
124485dc2aceSPaolo Bonzini 		break;
124585dc2aceSPaolo Bonzini 
124685dc2aceSPaolo Bonzini 	default:
124785dc2aceSPaolo Bonzini 		return true;
124885dc2aceSPaolo Bonzini 	}
124985dc2aceSPaolo Bonzini 
125085dc2aceSPaolo Bonzini 	inc_test_stage(test);
125185dc2aceSPaolo Bonzini 
125285dc2aceSPaolo Bonzini 	return get_test_stage(test) == 5;
125385dc2aceSPaolo Bonzini }
125485dc2aceSPaolo Bonzini 
125585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test)
125685dc2aceSPaolo Bonzini {
125785dc2aceSPaolo Bonzini 	return get_test_stage(test) == 5;
125885dc2aceSPaolo Bonzini }
125985dc2aceSPaolo Bonzini 
1260d4db486bSCathy Avery static volatile bool nmi_fired;
1261d4db486bSCathy Avery 
12624a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs)
1263d4db486bSCathy Avery {
1264d4db486bSCathy Avery 	nmi_fired = true;
1265d4db486bSCathy Avery }
1266d4db486bSCathy Avery 
1267d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test)
1268d4db486bSCathy Avery {
1269d4db486bSCathy Avery 	default_prepare(test);
1270d4db486bSCathy Avery 	nmi_fired = false;
12714a1207f6SMaxim Levitsky 	handle_exception(NMI_VECTOR, nmi_handler);
1272d4db486bSCathy Avery 	set_test_stage(test, 0);
1273d4db486bSCathy Avery }
1274d4db486bSCathy Avery 
1275d4db486bSCathy Avery static void nmi_test(struct svm_test *test)
1276d4db486bSCathy Avery {
1277d4db486bSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1278d4db486bSCathy Avery 
1279*493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "direct NMI while running guest");
1280d4db486bSCathy Avery 
1281d4db486bSCathy Avery 	vmmcall();
1282d4db486bSCathy Avery 
1283d4db486bSCathy Avery 	nmi_fired = false;
1284d4db486bSCathy Avery 
1285d4db486bSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1286d4db486bSCathy Avery 
1287*493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "intercepted pending NMI delivered to guest");
1288d4db486bSCathy Avery }
1289d4db486bSCathy Avery 
1290d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test)
1291d4db486bSCathy Avery {
1292d4db486bSCathy Avery 	switch (get_test_stage(test)) {
1293d4db486bSCathy Avery 	case 0:
1294d4db486bSCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1295198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1296d4db486bSCathy Avery 				    vmcb->control.exit_code);
1297d4db486bSCathy Avery 			return true;
1298d4db486bSCathy Avery 		}
1299d4db486bSCathy Avery 		vmcb->save.rip += 3;
1300d4db486bSCathy Avery 
1301d4db486bSCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
1302d4db486bSCathy Avery 		break;
1303d4db486bSCathy Avery 
1304d4db486bSCathy Avery 	case 1:
1305d4db486bSCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1306198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
1307d4db486bSCathy Avery 				    vmcb->control.exit_code);
1308d4db486bSCathy Avery 			return true;
1309d4db486bSCathy Avery 		}
1310d4db486bSCathy Avery 
13115c3582f0SJanis Schoetterl-Glausch 		report_pass("NMI intercept while running guest");
1312d4db486bSCathy Avery 		break;
1313d4db486bSCathy Avery 
1314d4db486bSCathy Avery 	case 2:
1315d4db486bSCathy Avery 		break;
1316d4db486bSCathy Avery 
1317d4db486bSCathy Avery 	default:
1318d4db486bSCathy Avery 		return true;
1319d4db486bSCathy Avery 	}
1320d4db486bSCathy Avery 
1321d4db486bSCathy Avery 	inc_test_stage(test);
1322d4db486bSCathy Avery 
1323d4db486bSCathy Avery 	return get_test_stage(test) == 3;
1324d4db486bSCathy Avery }
1325d4db486bSCathy Avery 
1326d4db486bSCathy Avery static bool nmi_check(struct svm_test *test)
1327d4db486bSCathy Avery {
1328d4db486bSCathy Avery 	return get_test_stage(test) == 3;
1329d4db486bSCathy Avery }
1330d4db486bSCathy Avery 
13319da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL
13329da1f4d8SCathy Avery 
13339da1f4d8SCathy Avery static void nmi_message_thread(void *_test)
13349da1f4d8SCathy Avery {
13359da1f4d8SCathy Avery 	struct svm_test *test = _test;
13369da1f4d8SCathy Avery 
13379da1f4d8SCathy Avery 	while (get_test_stage(test) != 1)
13389da1f4d8SCathy Avery 		pause();
13399da1f4d8SCathy Avery 
13409da1f4d8SCathy Avery 	delay(NMI_DELAY);
13419da1f4d8SCathy Avery 
13429da1f4d8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
13439da1f4d8SCathy Avery 
13449da1f4d8SCathy Avery 	while (get_test_stage(test) != 2)
13459da1f4d8SCathy Avery 		pause();
13469da1f4d8SCathy Avery 
13479da1f4d8SCathy Avery 	delay(NMI_DELAY);
13489da1f4d8SCathy Avery 
13499da1f4d8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
13509da1f4d8SCathy Avery }
13519da1f4d8SCathy Avery 
13529da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test)
13539da1f4d8SCathy Avery {
13549da1f4d8SCathy Avery 	long long start;
13559da1f4d8SCathy Avery 
13569da1f4d8SCathy Avery 	on_cpu_async(1, nmi_message_thread, test);
13579da1f4d8SCathy Avery 
13589da1f4d8SCathy Avery 	start = rdtsc();
13599da1f4d8SCathy Avery 
13609da1f4d8SCathy Avery 	set_test_stage(test, 1);
13619da1f4d8SCathy Avery 
13629da1f4d8SCathy Avery 	asm volatile ("hlt");
13639da1f4d8SCathy Avery 
1364*493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "direct NMI + hlt");
1365*493d27d4SSean Christopherson 	report(rdtsc() - start > NMI_DELAY, "direct NMI after expected delay");
13669da1f4d8SCathy Avery 
13679da1f4d8SCathy Avery 	nmi_fired = false;
13689da1f4d8SCathy Avery 
13699da1f4d8SCathy Avery 	vmmcall();
13709da1f4d8SCathy Avery 
13719da1f4d8SCathy Avery 	start = rdtsc();
13729da1f4d8SCathy Avery 
13739da1f4d8SCathy Avery 	set_test_stage(test, 2);
13749da1f4d8SCathy Avery 
13759da1f4d8SCathy Avery 	asm volatile ("hlt");
13769da1f4d8SCathy Avery 
1377*493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "intercepted NMI + hlt");
1378*493d27d4SSean Christopherson 	report(rdtsc() - start > NMI_DELAY, "intercepted NMI after expected delay");
13799da1f4d8SCathy Avery 
13809da1f4d8SCathy Avery 	set_test_stage(test, 3);
13819da1f4d8SCathy Avery }
13829da1f4d8SCathy Avery 
13839da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test)
13849da1f4d8SCathy Avery {
13859da1f4d8SCathy Avery 	switch (get_test_stage(test)) {
13869da1f4d8SCathy Avery 	case 1:
13879da1f4d8SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1388198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
13899da1f4d8SCathy Avery 				    vmcb->control.exit_code);
13909da1f4d8SCathy Avery 			return true;
13919da1f4d8SCathy Avery 		}
13929da1f4d8SCathy Avery 		vmcb->save.rip += 3;
13939da1f4d8SCathy Avery 
13949da1f4d8SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
13959da1f4d8SCathy Avery 		break;
13969da1f4d8SCathy Avery 
13979da1f4d8SCathy Avery 	case 2:
13989da1f4d8SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1399198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
14009da1f4d8SCathy Avery 				    vmcb->control.exit_code);
14019da1f4d8SCathy Avery 			return true;
14029da1f4d8SCathy Avery 		}
14039da1f4d8SCathy Avery 
14045c3582f0SJanis Schoetterl-Glausch 		report_pass("NMI intercept while running guest");
14059da1f4d8SCathy Avery 		break;
14069da1f4d8SCathy Avery 
14079da1f4d8SCathy Avery 	case 3:
14089da1f4d8SCathy Avery 		break;
14099da1f4d8SCathy Avery 
14109da1f4d8SCathy Avery 	default:
14119da1f4d8SCathy Avery 		return true;
14129da1f4d8SCathy Avery 	}
14139da1f4d8SCathy Avery 
14149da1f4d8SCathy Avery 	return get_test_stage(test) == 3;
14159da1f4d8SCathy Avery }
14169da1f4d8SCathy Avery 
14179da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test)
14189da1f4d8SCathy Avery {
14199da1f4d8SCathy Avery 	return get_test_stage(test) == 3;
14209da1f4d8SCathy Avery }
14219da1f4d8SCathy Avery 
14224b4fb247SPaolo Bonzini static volatile int count_exc = 0;
14234b4fb247SPaolo Bonzini 
14244b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r)
14254b4fb247SPaolo Bonzini {
14264b4fb247SPaolo Bonzini 	count_exc++;
14274b4fb247SPaolo Bonzini }
14284b4fb247SPaolo Bonzini 
14294b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test)
14304b4fb247SPaolo Bonzini {
14318634a266SPaolo Bonzini 	default_prepare(test);
14324b4fb247SPaolo Bonzini 	handle_exception(DE_VECTOR, my_isr);
14334b4fb247SPaolo Bonzini 	handle_exception(NMI_VECTOR, my_isr);
14344b4fb247SPaolo Bonzini }
14354b4fb247SPaolo Bonzini 
14364b4fb247SPaolo Bonzini 
14374b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test)
14384b4fb247SPaolo Bonzini {
14394b4fb247SPaolo Bonzini 	asm volatile ("vmmcall\n\tvmmcall\n\t");
14404b4fb247SPaolo Bonzini }
14414b4fb247SPaolo Bonzini 
14424b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test)
14434b4fb247SPaolo Bonzini {
14444b4fb247SPaolo Bonzini 	switch (get_test_stage(test)) {
14454b4fb247SPaolo Bonzini 	case 0:
14464b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1447198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
14484b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
14494b4fb247SPaolo Bonzini 			return true;
14504b4fb247SPaolo Bonzini 		}
14512c1ca866SNadav Amit 		vmcb->save.rip += 3;
14524b4fb247SPaolo Bonzini 		vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
14534b4fb247SPaolo Bonzini 		break;
14544b4fb247SPaolo Bonzini 
14554b4fb247SPaolo Bonzini 	case 1:
14564b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_ERR) {
1457198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to error. Exit reason 0x%x",
14584b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
14594b4fb247SPaolo Bonzini 			return true;
14604b4fb247SPaolo Bonzini 		}
14614b4fb247SPaolo Bonzini 		report(count_exc == 0, "exception with vector 2 not injected");
14624b4fb247SPaolo Bonzini 		vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
14634b4fb247SPaolo Bonzini 		break;
14644b4fb247SPaolo Bonzini 
14654b4fb247SPaolo Bonzini 	case 2:
14664b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1467198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
14684b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
14694b4fb247SPaolo Bonzini 			return true;
14704b4fb247SPaolo Bonzini 		}
14712c1ca866SNadav Amit 		vmcb->save.rip += 3;
14724b4fb247SPaolo Bonzini 		report(count_exc == 1, "divide overflow exception injected");
14734b4fb247SPaolo Bonzini 		report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared");
14744b4fb247SPaolo Bonzini 		break;
14754b4fb247SPaolo Bonzini 
14764b4fb247SPaolo Bonzini 	default:
14774b4fb247SPaolo Bonzini 		return true;
14784b4fb247SPaolo Bonzini 	}
14794b4fb247SPaolo Bonzini 
14804b4fb247SPaolo Bonzini 	inc_test_stage(test);
14814b4fb247SPaolo Bonzini 
14824b4fb247SPaolo Bonzini 	return get_test_stage(test) == 3;
14834b4fb247SPaolo Bonzini }
14844b4fb247SPaolo Bonzini 
14854b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test)
14864b4fb247SPaolo Bonzini {
14874b4fb247SPaolo Bonzini 	return count_exc == 1 && get_test_stage(test) == 3;
14884b4fb247SPaolo Bonzini }
14894b4fb247SPaolo Bonzini 
14909c838954SCathy Avery static volatile bool virq_fired;
14919c838954SCathy Avery 
14929c838954SCathy Avery static void virq_isr(isr_regs_t *regs)
14939c838954SCathy Avery {
14949c838954SCathy Avery 	virq_fired = true;
14959c838954SCathy Avery }
14969c838954SCathy Avery 
14979c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test)
14989c838954SCathy Avery {
14999c838954SCathy Avery 	handle_irq(0xf1, virq_isr);
15009c838954SCathy Avery 	default_prepare(test);
15019c838954SCathy Avery 	vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
15029c838954SCathy Avery 		(0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority
15039c838954SCathy Avery 	vmcb->control.int_vector = 0xf1;
15049c838954SCathy Avery 	virq_fired = false;
15059c838954SCathy Avery 	set_test_stage(test, 0);
15069c838954SCathy Avery }
15079c838954SCathy Avery 
15089c838954SCathy Avery static void virq_inject_test(struct svm_test *test)
15099c838954SCathy Avery {
1510*493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli");
15119c838954SCathy Avery 
15129c838954SCathy Avery 	irq_enable();
15139c838954SCathy Avery 	asm volatile ("nop");
15149c838954SCathy Avery 	irq_disable();
15159c838954SCathy Avery 
1516*493d27d4SSean Christopherson 	report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti");
15179c838954SCathy Avery 
15189c838954SCathy Avery 	vmmcall();
15199c838954SCathy Avery 
1520*493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli");
15219c838954SCathy Avery 
15229c838954SCathy Avery 	irq_enable();
15239c838954SCathy Avery 	asm volatile ("nop");
15249c838954SCathy Avery 	irq_disable();
15259c838954SCathy Avery 
1526*493d27d4SSean Christopherson 	report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti");
15279c838954SCathy Avery 
15289c838954SCathy Avery 	vmmcall();
15299c838954SCathy Avery 
15309c838954SCathy Avery 	irq_enable();
15319c838954SCathy Avery 	asm volatile ("nop");
15329c838954SCathy Avery 	irq_disable();
15339c838954SCathy Avery 
1534*493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test,
1535*493d27d4SSean Christopherson 			  "virtual IRQ blocked V_IRQ_PRIO less than V_TPR");
15369c838954SCathy Avery 
15379c838954SCathy Avery 	vmmcall();
15389c838954SCathy Avery 	vmmcall();
15399c838954SCathy Avery }
15409c838954SCathy Avery 
15419c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test)
15429c838954SCathy Avery {
15439c838954SCathy Avery 	vmcb->save.rip += 3;
15449c838954SCathy Avery 
15459c838954SCathy Avery 	switch (get_test_stage(test)) {
15469c838954SCathy Avery 	case 0:
15479c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1548198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15499c838954SCathy Avery 				    vmcb->control.exit_code);
15509c838954SCathy Avery 			return true;
15519c838954SCathy Avery 		}
15529c838954SCathy Avery 		if (vmcb->control.int_ctl & V_IRQ_MASK) {
1553198dfd0eSJanis Schoetterl-Glausch 			report_fail("V_IRQ not cleared on VMEXIT after firing");
15549c838954SCathy Avery 			return true;
15559c838954SCathy Avery 		}
15569c838954SCathy Avery 		virq_fired = false;
15579c838954SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
15589c838954SCathy Avery 		vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
15599c838954SCathy Avery 			(0x0f << V_INTR_PRIO_SHIFT);
15609c838954SCathy Avery 		break;
15619c838954SCathy Avery 
15629c838954SCathy Avery 	case 1:
15639c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VINTR) {
1564198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vintr. Exit reason 0x%x",
15659c838954SCathy Avery 				    vmcb->control.exit_code);
15669c838954SCathy Avery 			return true;
15679c838954SCathy Avery 		}
15689c838954SCathy Avery 		if (virq_fired) {
1569198dfd0eSJanis Schoetterl-Glausch 			report_fail("V_IRQ fired before SVM_EXIT_VINTR");
15709c838954SCathy Avery 			return true;
15719c838954SCathy Avery 		}
15729c838954SCathy Avery 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR);
15739c838954SCathy Avery 		break;
15749c838954SCathy Avery 
15759c838954SCathy Avery 	case 2:
15769c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1577198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15789c838954SCathy Avery 				    vmcb->control.exit_code);
15799c838954SCathy Avery 			return true;
15809c838954SCathy Avery 		}
15819c838954SCathy Avery 		virq_fired = false;
15829c838954SCathy Avery 		// Set irq to lower priority
15839c838954SCathy Avery 		vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
15849c838954SCathy Avery 			(0x08 << V_INTR_PRIO_SHIFT);
15859c838954SCathy Avery 		// Raise guest TPR
15869c838954SCathy Avery 		vmcb->control.int_ctl |= 0x0a & V_TPR_MASK;
15879c838954SCathy Avery 		break;
15889c838954SCathy Avery 
15899c838954SCathy Avery 	case 3:
15909c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1591198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15929c838954SCathy Avery 				    vmcb->control.exit_code);
15939c838954SCathy Avery 			return true;
15949c838954SCathy Avery 		}
15959c838954SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
15969c838954SCathy Avery 		break;
15979c838954SCathy Avery 
15989c838954SCathy Avery 	case 4:
15999c838954SCathy Avery 		// INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR
16009c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1601198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16029c838954SCathy Avery 				    vmcb->control.exit_code);
16039c838954SCathy Avery 			return true;
16049c838954SCathy Avery 		}
16059c838954SCathy Avery 		break;
16069c838954SCathy Avery 
16079c838954SCathy Avery 	default:
16089c838954SCathy Avery 		return true;
16099c838954SCathy Avery 	}
16109c838954SCathy Avery 
16119c838954SCathy Avery 	inc_test_stage(test);
16129c838954SCathy Avery 
16139c838954SCathy Avery 	return get_test_stage(test) == 5;
16149c838954SCathy Avery }
16159c838954SCathy Avery 
16169c838954SCathy Avery static bool virq_inject_check(struct svm_test *test)
16179c838954SCathy Avery {
16189c838954SCathy Avery 	return get_test_stage(test) == 5;
16199c838954SCathy Avery }
16209c838954SCathy Avery 
1621da338a31SMaxim Levitsky /*
1622da338a31SMaxim Levitsky  * Detect nested guest RIP corruption as explained in kernel commit
1623da338a31SMaxim Levitsky  * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73
1624da338a31SMaxim Levitsky  *
1625da338a31SMaxim Levitsky  * In the assembly loop below 'ins' is executed while IO instructions
1626da338a31SMaxim Levitsky  * are not intercepted; the instruction is emulated by L0.
1627da338a31SMaxim Levitsky  *
1628da338a31SMaxim Levitsky  * At the same time we are getting interrupts from the local APIC timer,
1629da338a31SMaxim Levitsky  * and we do intercept them in L1
1630da338a31SMaxim Levitsky  *
1631da338a31SMaxim Levitsky  * If the interrupt happens on the insb instruction, L0 will VMexit, emulate
1632da338a31SMaxim Levitsky  * the insb instruction and then it will inject the interrupt to L1 through
1633da338a31SMaxim Levitsky  * a nested VMexit.  Due to a bug, it would leave pre-emulation values of RIP,
1634da338a31SMaxim Levitsky  * RAX and RSP in the VMCB.
1635da338a31SMaxim Levitsky  *
1636da338a31SMaxim Levitsky  * In our intercept handler we detect the bug by checking that RIP is that of
1637da338a31SMaxim Levitsky  * the insb instruction, but its memory operand has already been written.
1638da338a31SMaxim Levitsky  * This means that insb was already executed.
1639da338a31SMaxim Levitsky  */
1640da338a31SMaxim Levitsky 
1641da338a31SMaxim Levitsky static volatile int isr_cnt = 0;
1642da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA;
1643da338a31SMaxim Levitsky extern const char insb_instruction_label[];
1644da338a31SMaxim Levitsky 
1645da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs)
1646da338a31SMaxim Levitsky {
1647da338a31SMaxim Levitsky 	isr_cnt++;
1648da338a31SMaxim Levitsky 	apic_write(APIC_EOI, 0);
1649da338a31SMaxim Levitsky }
1650da338a31SMaxim Levitsky 
1651da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test)
1652da338a31SMaxim Levitsky {
1653da338a31SMaxim Levitsky 	default_prepare(test);
1654da338a31SMaxim Levitsky 	set_test_stage(test, 0);
1655da338a31SMaxim Levitsky 
1656da338a31SMaxim Levitsky 	vmcb->control.int_ctl = V_INTR_MASKING_MASK;
1657da338a31SMaxim Levitsky 	vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1658da338a31SMaxim Levitsky 
1659da338a31SMaxim Levitsky 	handle_irq(TIMER_VECTOR, reg_corruption_isr);
1660da338a31SMaxim Levitsky 
1661da338a31SMaxim Levitsky 	/* set local APIC to inject external interrupts */
1662da338a31SMaxim Levitsky 	apic_write(APIC_TMICT, 0);
1663da338a31SMaxim Levitsky 	apic_write(APIC_TDCR, 0);
1664da338a31SMaxim Levitsky 	apic_write(APIC_LVTT, TIMER_VECTOR | APIC_LVT_TIMER_PERIODIC);
1665da338a31SMaxim Levitsky 	apic_write(APIC_TMICT, 1000);
1666da338a31SMaxim Levitsky }
1667da338a31SMaxim Levitsky 
1668da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test)
1669da338a31SMaxim Levitsky {
1670da338a31SMaxim Levitsky 	/* this is endless loop, which is interrupted by the timer interrupt */
1671da338a31SMaxim Levitsky 	asm volatile (
1672da338a31SMaxim Levitsky 		      "1:\n\t"
1673da338a31SMaxim Levitsky 		      "movw $0x4d0, %%dx\n\t" // IO port
1674da338a31SMaxim Levitsky 		      "lea %[io_port_var], %%rdi\n\t"
1675da338a31SMaxim Levitsky 		      "movb $0xAA, %[io_port_var]\n\t"
1676da338a31SMaxim Levitsky 		      "insb_instruction_label:\n\t"
1677da338a31SMaxim Levitsky 		      "insb\n\t"
1678da338a31SMaxim Levitsky 		      "jmp 1b\n\t"
1679da338a31SMaxim Levitsky 
1680da338a31SMaxim Levitsky 		      : [io_port_var] "=m" (io_port_var)
1681da338a31SMaxim Levitsky 		      : /* no inputs*/
1682da338a31SMaxim Levitsky 		      : "rdx", "rdi"
1683da338a31SMaxim Levitsky 		      );
1684da338a31SMaxim Levitsky }
1685da338a31SMaxim Levitsky 
1686da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test)
1687da338a31SMaxim Levitsky {
1688da338a31SMaxim Levitsky 	if (isr_cnt == 10000) {
16895c3582f0SJanis Schoetterl-Glausch 		report_pass("No RIP corruption detected after %d timer interrupts",
1690da338a31SMaxim Levitsky 			    isr_cnt);
1691da338a31SMaxim Levitsky 		set_test_stage(test, 1);
1692491bbc64SMaxim Levitsky 		goto cleanup;
1693da338a31SMaxim Levitsky 	}
1694da338a31SMaxim Levitsky 
1695da338a31SMaxim Levitsky 	if (vmcb->control.exit_code == SVM_EXIT_INTR) {
1696da338a31SMaxim Levitsky 
1697da338a31SMaxim Levitsky 		void* guest_rip = (void*)vmcb->save.rip;
1698da338a31SMaxim Levitsky 
1699da338a31SMaxim Levitsky 		irq_enable();
1700da338a31SMaxim Levitsky 		asm volatile ("nop");
1701da338a31SMaxim Levitsky 		irq_disable();
1702da338a31SMaxim Levitsky 
1703da338a31SMaxim Levitsky 		if (guest_rip == insb_instruction_label && io_port_var != 0xAA) {
1704198dfd0eSJanis Schoetterl-Glausch 			report_fail("RIP corruption detected after %d timer interrupts",
1705da338a31SMaxim Levitsky 				    isr_cnt);
1706491bbc64SMaxim Levitsky 			goto cleanup;
1707da338a31SMaxim Levitsky 		}
1708da338a31SMaxim Levitsky 
1709da338a31SMaxim Levitsky 	}
1710da338a31SMaxim Levitsky 	return false;
1711491bbc64SMaxim Levitsky cleanup:
1712491bbc64SMaxim Levitsky 	apic_write(APIC_LVTT, APIC_LVT_TIMER_MASK);
1713491bbc64SMaxim Levitsky 	apic_write(APIC_TMICT, 0);
1714491bbc64SMaxim Levitsky 	return true;
1715491bbc64SMaxim Levitsky 
1716da338a31SMaxim Levitsky }
1717da338a31SMaxim Levitsky 
1718da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test)
1719da338a31SMaxim Levitsky {
1720da338a31SMaxim Levitsky 	return get_test_stage(test) == 1;
1721da338a31SMaxim Levitsky }
1722da338a31SMaxim Levitsky 
17234770e9c8SCathy Avery static void get_tss_entry(void *data)
17244770e9c8SCathy Avery {
1725a7f32d87SPaolo Bonzini 	*((gdt_entry_t **)data) = get_tss_descr();
17264770e9c8SCathy Avery }
17274770e9c8SCathy Avery 
17284770e9c8SCathy Avery static int orig_cpu_count;
17294770e9c8SCathy Avery 
17304770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test)
17314770e9c8SCathy Avery {
1732a7f32d87SPaolo Bonzini 	gdt_entry_t *tss_entry;
17334770e9c8SCathy Avery 	int i;
17344770e9c8SCathy Avery 
17354770e9c8SCathy Avery 	on_cpu(1, get_tss_entry, &tss_entry);
17364770e9c8SCathy Avery 
1737d36b378fSVarad Gautam 	orig_cpu_count = atomic_read(&cpu_online_count);
17384770e9c8SCathy Avery 
17394770e9c8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT,
17404770e9c8SCathy Avery 		       id_map[1]);
17414770e9c8SCathy Avery 
17424770e9c8SCathy Avery 	delay(100000000ULL);
17434770e9c8SCathy Avery 
1744d36b378fSVarad Gautam 	atomic_dec(&cpu_online_count);
17454770e9c8SCathy Avery 
1746a7f32d87SPaolo Bonzini 	tss_entry->type &= ~DESC_BUSY;
17474770e9c8SCathy Avery 
17484770e9c8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]);
17494770e9c8SCathy Avery 
1750d36b378fSVarad Gautam 	for (i = 0; i < 5 && atomic_read(&cpu_online_count) < orig_cpu_count; i++)
17514770e9c8SCathy Avery 		delay(100000000ULL);
17524770e9c8SCathy Avery }
17534770e9c8SCathy Avery 
17544770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test)
17554770e9c8SCathy Avery {
17564770e9c8SCathy Avery 	return true;
17574770e9c8SCathy Avery }
17584770e9c8SCathy Avery 
17594770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test)
17604770e9c8SCathy Avery {
1761d36b378fSVarad Gautam 	return atomic_read(&cpu_online_count) == orig_cpu_count;
17624770e9c8SCathy Avery }
17634770e9c8SCathy Avery 
1764d5da6dfeSCathy Avery static volatile bool init_intercept;
1765d5da6dfeSCathy Avery 
1766d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test)
1767d5da6dfeSCathy Avery {
1768d5da6dfeSCathy Avery 	init_intercept = false;
1769d5da6dfeSCathy Avery 	vmcb->control.intercept |= (1ULL << INTERCEPT_INIT);
1770d5da6dfeSCathy Avery }
1771d5da6dfeSCathy Avery 
1772d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test)
1773d5da6dfeSCathy Avery {
1774d5da6dfeSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0);
1775d5da6dfeSCathy Avery }
1776d5da6dfeSCathy Avery 
1777d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test)
1778d5da6dfeSCathy Avery {
1779d5da6dfeSCathy Avery 	vmcb->save.rip += 3;
1780d5da6dfeSCathy Avery 
1781d5da6dfeSCathy Avery 	if (vmcb->control.exit_code != SVM_EXIT_INIT) {
1782198dfd0eSJanis Schoetterl-Glausch 		report_fail("VMEXIT not due to init intercept. Exit reason 0x%x",
1783d5da6dfeSCathy Avery 			    vmcb->control.exit_code);
1784d5da6dfeSCathy Avery 
1785d5da6dfeSCathy Avery 		return true;
1786d5da6dfeSCathy Avery 	}
1787d5da6dfeSCathy Avery 
1788d5da6dfeSCathy Avery 	init_intercept = true;
1789d5da6dfeSCathy Avery 
17905c3582f0SJanis Schoetterl-Glausch 	report_pass("INIT to vcpu intercepted");
1791d5da6dfeSCathy Avery 
1792d5da6dfeSCathy Avery 	return true;
1793d5da6dfeSCathy Avery }
1794d5da6dfeSCathy Avery 
1795d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test)
1796d5da6dfeSCathy Avery {
1797d5da6dfeSCathy Avery 	return init_intercept;
1798d5da6dfeSCathy Avery }
1799d5da6dfeSCathy Avery 
18007839b0ecSKrish Sadhukhan /*
18017839b0ecSKrish Sadhukhan  * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the
18027839b0ecSKrish Sadhukhan  * host side (i.e., after the #VMEXIT from the guest).
18037839b0ecSKrish Sadhukhan  *
18040689a980SKrish Sadhukhan  * Setting host EFLAGS.RF suppresses any potential instruction breakpoint
18050689a980SKrish Sadhukhan  * match on the VMRUN and completion of the VMRUN instruction clears the
18060689a980SKrish Sadhukhan  * host EFLAGS.RF bit.
18070689a980SKrish Sadhukhan  *
18087839b0ecSKrish Sadhukhan  * [AMD APM]
18097839b0ecSKrish Sadhukhan  */
18107839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0;
18117839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0;
18127839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false;
18137839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false;
18147839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false;
18150689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false;
18160689a980SKrish Sadhukhan static u64 rip_detected;
18177839b0ecSKrish Sadhukhan 
18187839b0ecSKrish Sadhukhan extern u64 *vmrun_rip;
18197839b0ecSKrish Sadhukhan 
18207839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r)
18217839b0ecSKrish Sadhukhan {
18227839b0ecSKrish Sadhukhan 	if (host_rflags_ss_on_vmrun) {
18237839b0ecSKrish Sadhukhan 		if (host_rflags_vmrun_reached) {
18240689a980SKrish Sadhukhan 			if (!host_rflags_set_rf) {
18257839b0ecSKrish Sadhukhan 				r->rflags &= ~X86_EFLAGS_TF;
18260689a980SKrish Sadhukhan 				rip_detected = r->rip;
18277839b0ecSKrish Sadhukhan 			} else {
18280689a980SKrish Sadhukhan 				r->rflags |= X86_EFLAGS_RF;
18290689a980SKrish Sadhukhan 				++host_rflags_db_handler_flag;
18300689a980SKrish Sadhukhan 			}
18310689a980SKrish Sadhukhan 		} else {
18320689a980SKrish Sadhukhan 			if (r->rip == (u64)&vmrun_rip) {
18337839b0ecSKrish Sadhukhan 				host_rflags_vmrun_reached = true;
18340689a980SKrish Sadhukhan 
18350689a980SKrish Sadhukhan 				if (host_rflags_set_rf) {
18360689a980SKrish Sadhukhan 					host_rflags_guest_main_flag = 0;
18370689a980SKrish Sadhukhan 					rip_detected = r->rip;
18380689a980SKrish Sadhukhan 					r->rflags &= ~X86_EFLAGS_TF;
18390689a980SKrish Sadhukhan 
18400689a980SKrish Sadhukhan 					/* Trigger #DB via debug registers */
18410689a980SKrish Sadhukhan 					write_dr0((void *)&vmrun_rip);
18420689a980SKrish Sadhukhan 					write_dr7(0x403);
18430689a980SKrish Sadhukhan 				}
18440689a980SKrish Sadhukhan 			}
18457839b0ecSKrish Sadhukhan 		}
18467839b0ecSKrish Sadhukhan 	} else {
18477839b0ecSKrish Sadhukhan 		r->rflags &= ~X86_EFLAGS_TF;
18487839b0ecSKrish Sadhukhan 	}
18497839b0ecSKrish Sadhukhan }
18507839b0ecSKrish Sadhukhan 
18517839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test)
18527839b0ecSKrish Sadhukhan {
18537839b0ecSKrish Sadhukhan 	default_prepare(test);
18547839b0ecSKrish Sadhukhan 	handle_exception(DB_VECTOR, host_rflags_db_handler);
18557839b0ecSKrish Sadhukhan 	set_test_stage(test, 0);
18567839b0ecSKrish Sadhukhan }
18577839b0ecSKrish Sadhukhan 
18587839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test)
18597839b0ecSKrish Sadhukhan {
18607839b0ecSKrish Sadhukhan 	if (host_rflags_set_tf)
18617839b0ecSKrish Sadhukhan 		write_rflags(read_rflags() | X86_EFLAGS_TF);
18627839b0ecSKrish Sadhukhan }
18637839b0ecSKrish Sadhukhan 
18647839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test)
18657839b0ecSKrish Sadhukhan {
18667839b0ecSKrish Sadhukhan 	while (1) {
18670689a980SKrish Sadhukhan 		if (get_test_stage(test) > 0) {
18680689a980SKrish Sadhukhan 			if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) ||
18690689a980SKrish Sadhukhan 			    (host_rflags_set_rf && host_rflags_db_handler_flag == 1))
18707839b0ecSKrish Sadhukhan 				host_rflags_guest_main_flag = 1;
18710689a980SKrish Sadhukhan 		}
18720689a980SKrish Sadhukhan 
18730689a980SKrish Sadhukhan 		if (get_test_stage(test) == 4)
18747839b0ecSKrish Sadhukhan 			break;
18757839b0ecSKrish Sadhukhan 		vmmcall();
18767839b0ecSKrish Sadhukhan 	}
18777839b0ecSKrish Sadhukhan }
18787839b0ecSKrish Sadhukhan 
18797839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test)
18807839b0ecSKrish Sadhukhan {
18817839b0ecSKrish Sadhukhan 	switch (get_test_stage(test)) {
18827839b0ecSKrish Sadhukhan 	case 0:
18837839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1884198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT. Exit reason 0x%x",
18857839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
18867839b0ecSKrish Sadhukhan 			return true;
18877839b0ecSKrish Sadhukhan 		}
18887839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
18897839b0ecSKrish Sadhukhan 		/*
18907839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF not immediately before VMRUN, causes
18917839b0ecSKrish Sadhukhan 		 * #DB trap before first guest instruction is executed
18927839b0ecSKrish Sadhukhan 		 */
18937839b0ecSKrish Sadhukhan 		host_rflags_set_tf = true;
18947839b0ecSKrish Sadhukhan 		break;
18957839b0ecSKrish Sadhukhan 	case 1:
18967839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
18970689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1) {
1898198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or #DB handler"
18997839b0ecSKrish Sadhukhan 				    " invoked before guest main. Exit reason 0x%x",
19007839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
19017839b0ecSKrish Sadhukhan 			return true;
19027839b0ecSKrish Sadhukhan 		}
19037839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
19047839b0ecSKrish Sadhukhan 		/*
19057839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF immediately before VMRUN, causes #DB
19067839b0ecSKrish Sadhukhan 		 * trap after VMRUN completes on the host side (i.e., after
19077839b0ecSKrish Sadhukhan 		 * VMEXIT from guest).
19087839b0ecSKrish Sadhukhan 		 */
19097839b0ecSKrish Sadhukhan 		host_rflags_ss_on_vmrun = true;
19107839b0ecSKrish Sadhukhan 		break;
19117839b0ecSKrish Sadhukhan 	case 2:
19127839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
19130c22fd44SPaolo Bonzini 		    rip_detected != (u64)&vmrun_rip + 3) {
1914198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch."
19150689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
19160689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
19170c22fd44SPaolo Bonzini 				    (u64)&vmrun_rip + 3, rip_detected);
19180689a980SKrish Sadhukhan 			return true;
19190689a980SKrish Sadhukhan 		}
19200689a980SKrish Sadhukhan 		host_rflags_set_rf = true;
19210689a980SKrish Sadhukhan 		host_rflags_guest_main_flag = 0;
19220689a980SKrish Sadhukhan 		host_rflags_vmrun_reached = false;
19230689a980SKrish Sadhukhan 		vmcb->save.rip += 3;
19240689a980SKrish Sadhukhan 		break;
19250689a980SKrish Sadhukhan 	case 3:
19260689a980SKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
19270689a980SKrish Sadhukhan 		    rip_detected != (u64)&vmrun_rip ||
19280689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1 ||
19290689a980SKrish Sadhukhan 		    host_rflags_db_handler_flag > 1 ||
19300689a980SKrish Sadhukhan 		    read_rflags() & X86_EFLAGS_RF) {
1931198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch or "
19320689a980SKrish Sadhukhan 				    "EFLAGS.RF not cleared."
19330689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
19340689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
19350689a980SKrish Sadhukhan 				    (u64)&vmrun_rip, rip_detected);
19367839b0ecSKrish Sadhukhan 			return true;
19377839b0ecSKrish Sadhukhan 		}
19387839b0ecSKrish Sadhukhan 		host_rflags_set_tf = false;
19390689a980SKrish Sadhukhan 		host_rflags_set_rf = false;
19407839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
19417839b0ecSKrish Sadhukhan 		break;
19427839b0ecSKrish Sadhukhan 	default:
19437839b0ecSKrish Sadhukhan 		return true;
19447839b0ecSKrish Sadhukhan 	}
19457839b0ecSKrish Sadhukhan 	inc_test_stage(test);
19460689a980SKrish Sadhukhan 	return get_test_stage(test) == 5;
19477839b0ecSKrish Sadhukhan }
19487839b0ecSKrish Sadhukhan 
19497839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test)
19507839b0ecSKrish Sadhukhan {
19510689a980SKrish Sadhukhan 	return get_test_stage(test) == 4;
19527839b0ecSKrish Sadhukhan }
19537839b0ecSKrish Sadhukhan 
19548660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name }
19558660d1b5SKrish Sadhukhan 
1956ba29942cSKrish Sadhukhan /*
1957ba29942cSKrish Sadhukhan  * v2 tests
1958ba29942cSKrish Sadhukhan  */
1959ba29942cSKrish Sadhukhan 
1960f32183f5SJim Mattson /*
1961f32183f5SJim Mattson  * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE
1962f32183f5SJim Mattson  * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different
1963f32183f5SJim Mattson  * value than in L1.
1964f32183f5SJim Mattson  */
1965f32183f5SJim Mattson 
1966f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test)
1967f32183f5SJim Mattson {
1968f32183f5SJim Mattson 	write_cr4(read_cr4() & ~X86_CR4_OSXSAVE);
1969f32183f5SJim Mattson }
1970f32183f5SJim Mattson 
1971f32183f5SJim Mattson static void svm_cr4_osxsave_test(void)
1972f32183f5SJim Mattson {
1973f32183f5SJim Mattson 	if (!this_cpu_has(X86_FEATURE_XSAVE)) {
1974f32183f5SJim Mattson 		report_skip("XSAVE not detected");
1975f32183f5SJim Mattson 		return;
1976f32183f5SJim Mattson 	}
1977f32183f5SJim Mattson 
1978f32183f5SJim Mattson 	if (!(read_cr4() & X86_CR4_OSXSAVE)) {
1979f32183f5SJim Mattson 		unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE;
1980f32183f5SJim Mattson 
1981f32183f5SJim Mattson 		write_cr4(cr4);
1982f32183f5SJim Mattson 		vmcb->save.cr4 = cr4;
1983f32183f5SJim Mattson 	}
1984f32183f5SJim Mattson 
1985816c0359SSean Christopherson 	report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set before VMRUN");
1986f32183f5SJim Mattson 
1987f32183f5SJim Mattson 	test_set_guest(svm_cr4_osxsave_test_guest);
1988f32183f5SJim Mattson 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
1989f32183f5SJim Mattson 	       "svm_cr4_osxsave_test_guest finished with VMMCALL");
1990f32183f5SJim Mattson 
1991816c0359SSean Christopherson 	report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set after VMRUN");
1992f32183f5SJim Mattson }
1993f32183f5SJim Mattson 
1994ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test)
1995ba29942cSKrish Sadhukhan {
1996ba29942cSKrish Sadhukhan }
1997ba29942cSKrish Sadhukhan 
1998eae10e8fSKrish Sadhukhan 
1999eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val,	\
2000eae10e8fSKrish Sadhukhan 				   resv_mask)				\
2001eae10e8fSKrish Sadhukhan {									\
2002eae10e8fSKrish Sadhukhan 	u64 tmp, mask;							\
2003eae10e8fSKrish Sadhukhan 	int i;								\
2004eae10e8fSKrish Sadhukhan 									\
2005eae10e8fSKrish Sadhukhan 	for (i = start; i <= end; i = i + inc) {			\
2006eae10e8fSKrish Sadhukhan 		mask = 1ull << i;					\
2007eae10e8fSKrish Sadhukhan 		if (!(mask & resv_mask))				\
2008eae10e8fSKrish Sadhukhan 			continue;					\
2009eae10e8fSKrish Sadhukhan 		tmp = val | mask;					\
2010eae10e8fSKrish Sadhukhan 		reg = tmp;						\
2011eae10e8fSKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx", \
2012eae10e8fSKrish Sadhukhan 		       str_name, end, start, tmp);			\
2013eae10e8fSKrish Sadhukhan 	}								\
2014eae10e8fSKrish Sadhukhan }
2015eae10e8fSKrish Sadhukhan 
20166d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask,	\
2017cb6524f3SPaolo Bonzini 				  exit_code, test_name)			\
2018a79c9495SKrish Sadhukhan {									\
2019a79c9495SKrish Sadhukhan 	u64 tmp, mask;							\
20208ae6d77fSSean Christopherson 	u32 r;								\
2021a79c9495SKrish Sadhukhan 	int i;								\
2022a79c9495SKrish Sadhukhan 									\
2023a79c9495SKrish Sadhukhan 	for (i = start; i <= end; i = i + inc) {			\
2024a79c9495SKrish Sadhukhan 		mask = 1ull << i;					\
2025a79c9495SKrish Sadhukhan 		if (!(mask & resv_mask))				\
2026a79c9495SKrish Sadhukhan 			continue;					\
2027a79c9495SKrish Sadhukhan 		tmp = val | mask;					\
2028a79c9495SKrish Sadhukhan 		switch (cr) {						\
2029a79c9495SKrish Sadhukhan 		case 0:							\
2030a79c9495SKrish Sadhukhan 			vmcb->save.cr0 = tmp;				\
2031a79c9495SKrish Sadhukhan 			break;						\
2032a79c9495SKrish Sadhukhan 		case 3:							\
2033a79c9495SKrish Sadhukhan 			vmcb->save.cr3 = tmp;				\
2034a79c9495SKrish Sadhukhan 			break;						\
2035a79c9495SKrish Sadhukhan 		case 4:							\
2036a79c9495SKrish Sadhukhan 			vmcb->save.cr4 = tmp;				\
2037a79c9495SKrish Sadhukhan 		}							\
20388ae6d77fSSean Christopherson 		r = svm_vmrun();					\
20398ae6d77fSSean Christopherson 		report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x", \
20408ae6d77fSSean Christopherson 		       cr, test_name, end, start, tmp, exit_code, r);	\
2041a79c9495SKrish Sadhukhan 	}								\
2042a79c9495SKrish Sadhukhan }
2043e8d7a8f6SKrish Sadhukhan 
2044a79c9495SKrish Sadhukhan static void test_efer(void)
2045a79c9495SKrish Sadhukhan {
2046e8d7a8f6SKrish Sadhukhan 	/*
2047e8d7a8f6SKrish Sadhukhan 	 * Un-setting EFER.SVME is illegal
2048e8d7a8f6SKrish Sadhukhan 	 */
2049ba29942cSKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2050ba29942cSKrish Sadhukhan 	u64 efer = efer_saved;
2051ba29942cSKrish Sadhukhan 
2052ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer);
2053ba29942cSKrish Sadhukhan 	efer &= ~EFER_SVME;
2054ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer;
2055ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer);
2056ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2057e8d7a8f6SKrish Sadhukhan 
2058e8d7a8f6SKrish Sadhukhan 	/*
2059a79c9495SKrish Sadhukhan 	 * EFER MBZ bits: 63:16, 9
2060a79c9495SKrish Sadhukhan 	 */
2061a79c9495SKrish Sadhukhan 	efer_saved = vmcb->save.efer;
2062a79c9495SKrish Sadhukhan 
2063a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer,
2064a79c9495SKrish Sadhukhan 				   efer_saved, SVM_EFER_RESERVED_MASK);
2065a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer,
2066a79c9495SKrish Sadhukhan 				   efer_saved, SVM_EFER_RESERVED_MASK);
2067a79c9495SKrish Sadhukhan 
20681d7bde08SKrish Sadhukhan 	/*
20691d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR4.PAE is zero.
20701d7bde08SKrish Sadhukhan 	 */
20711d7bde08SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
20721d7bde08SKrish Sadhukhan 	u64 cr0;
20731d7bde08SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
20741d7bde08SKrish Sadhukhan 	u64 cr4;
20751d7bde08SKrish Sadhukhan 
20761d7bde08SKrish Sadhukhan 	efer = efer_saved | EFER_LME;
20771d7bde08SKrish Sadhukhan 	vmcb->save.efer = efer;
20781d7bde08SKrish Sadhukhan 	cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE;
20791d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
20801d7bde08SKrish Sadhukhan 	cr4 = cr4_saved & ~X86_CR4_PAE;
20811d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4;
20821d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
20831d7bde08SKrish Sadhukhan 	       "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4);
20841d7bde08SKrish Sadhukhan 
20851d7bde08SKrish Sadhukhan 	/*
20861d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR0.PE is zero.
2087fc050452SLara Lazier 	 * CR4.PAE needs to be set as we otherwise cannot
2088fc050452SLara Lazier 	 * determine if CR4.PAE=0 or CR0.PE=0 triggered the
2089fc050452SLara Lazier 	 * SVM_EXIT_ERR.
20901d7bde08SKrish Sadhukhan 	 */
2091fc050452SLara Lazier 	cr4 = cr4_saved | X86_CR4_PAE;
2092fc050452SLara Lazier 	vmcb->save.cr4 = cr4;
20931d7bde08SKrish Sadhukhan 	cr0 &= ~X86_CR0_PE;
20941d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
20951d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
20961d7bde08SKrish Sadhukhan 	       "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0);
20971d7bde08SKrish Sadhukhan 
20981d7bde08SKrish Sadhukhan 	/*
20991d7bde08SKrish Sadhukhan 	 * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero.
21001d7bde08SKrish Sadhukhan 	 */
21011d7bde08SKrish Sadhukhan 	u32 cs_attrib_saved = vmcb->save.cs.attrib;
21021d7bde08SKrish Sadhukhan 	u32 cs_attrib;
21031d7bde08SKrish Sadhukhan 
21041d7bde08SKrish Sadhukhan 	cr0 |= X86_CR0_PE;
21051d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
21061d7bde08SKrish Sadhukhan 	cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK |
21071d7bde08SKrish Sadhukhan 		SVM_SELECTOR_DB_MASK;
21081d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib;
21091d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
21101d7bde08SKrish Sadhukhan 	       "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)",
21111d7bde08SKrish Sadhukhan 	       efer, cr0, cr4, cs_attrib);
21121d7bde08SKrish Sadhukhan 
21131d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
21141d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2115a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
21161d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib_saved;
2117a79c9495SKrish Sadhukhan }
2118a79c9495SKrish Sadhukhan 
2119a79c9495SKrish Sadhukhan static void test_cr0(void)
2120a79c9495SKrish Sadhukhan {
2121a79c9495SKrish Sadhukhan 	/*
2122e8d7a8f6SKrish Sadhukhan 	 * Un-setting CR0.CD and setting CR0.NW is illegal combination
2123e8d7a8f6SKrish Sadhukhan 	 */
2124e8d7a8f6SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
2125e8d7a8f6SKrish Sadhukhan 	u64 cr0 = cr0_saved;
2126e8d7a8f6SKrish Sadhukhan 
2127e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_CD;
2128e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2129e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2130a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx",
2131a79c9495SKrish Sadhukhan 		cr0);
2132e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2133e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2134a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx",
2135a79c9495SKrish Sadhukhan 		cr0);
2136e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2137e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_CD;
2138e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2139a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx",
2140a79c9495SKrish Sadhukhan 		cr0);
2141e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2142e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2143a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx",
2144a79c9495SKrish Sadhukhan 		cr0);
2145e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
21465c052c90SKrish Sadhukhan 
21475c052c90SKrish Sadhukhan 	/*
21485c052c90SKrish Sadhukhan 	 * CR0[63:32] are not zero
21495c052c90SKrish Sadhukhan 	 */
21505c052c90SKrish Sadhukhan 	cr0 = cr0_saved;
2151eae10e8fSKrish Sadhukhan 
2152eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved,
2153eae10e8fSKrish Sadhukhan 				   SVM_CR0_RESERVED_MASK);
21545c052c90SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
2155a79c9495SKrish Sadhukhan }
2156eae10e8fSKrish Sadhukhan 
2157a79c9495SKrish Sadhukhan static void test_cr3(void)
2158a79c9495SKrish Sadhukhan {
2159a79c9495SKrish Sadhukhan 	/*
2160a79c9495SKrish Sadhukhan 	 * CR3 MBZ bits based on different modes:
216129a01803SNadav Amit 	 *   [63:52] - long mode
2162a79c9495SKrish Sadhukhan 	 */
2163a79c9495SKrish Sadhukhan 	u64 cr3_saved = vmcb->save.cr3;
2164a79c9495SKrish Sadhukhan 
2165a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved,
2166cb6524f3SPaolo Bonzini 				  SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, "");
21676d0ecbf6SKrish Sadhukhan 
21686d0ecbf6SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK;
21696d0ecbf6SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
21706d0ecbf6SKrish Sadhukhan 	       vmcb->save.cr3);
21716d0ecbf6SKrish Sadhukhan 
21726d0ecbf6SKrish Sadhukhan 	/*
21736d0ecbf6SKrish Sadhukhan 	 * CR3 non-MBZ reserved bits based on different modes:
2174cb6524f3SPaolo Bonzini 	 *   [11:5] [2:0] - long mode (PCIDE=0)
21756d0ecbf6SKrish Sadhukhan 	 *          [2:0] - PAE legacy mode
21766d0ecbf6SKrish Sadhukhan 	 */
21776d0ecbf6SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
21786d0ecbf6SKrish Sadhukhan 	u64 *pdpe = npt_get_pml4e();
21796d0ecbf6SKrish Sadhukhan 
21806d0ecbf6SKrish Sadhukhan 	/*
21816d0ecbf6SKrish Sadhukhan 	 * Long mode
21826d0ecbf6SKrish Sadhukhan 	 */
21836d0ecbf6SKrish Sadhukhan 	if (this_cpu_has(X86_FEATURE_PCID)) {
21846d0ecbf6SKrish Sadhukhan 		vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE;
21856d0ecbf6SKrish Sadhukhan 		SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2186cb6524f3SPaolo Bonzini 					  SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) ");
21876d0ecbf6SKrish Sadhukhan 
21886d0ecbf6SKrish Sadhukhan 		vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK;
21896d0ecbf6SKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
21906d0ecbf6SKrish Sadhukhan 		       vmcb->save.cr3);
2191cb6524f3SPaolo Bonzini 	}
21926d0ecbf6SKrish Sadhukhan 
21936d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE;
21946d0ecbf6SKrish Sadhukhan 
2195993749ffSSean Christopherson 	if (!npt_supported())
2196993749ffSSean Christopherson 		goto skip_npt_only;
2197993749ffSSean Christopherson 
21986d0ecbf6SKrish Sadhukhan 	/* Clear P (Present) bit in NPT in order to trigger #NPF */
21996d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
22006d0ecbf6SKrish Sadhukhan 
22016d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2202cb6524f3SPaolo Bonzini 				  SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) ");
22036d0ecbf6SKrish Sadhukhan 
22046d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2205cb6524f3SPaolo Bonzini 	vmcb->save.cr3 = cr3_saved;
22066d0ecbf6SKrish Sadhukhan 
22076d0ecbf6SKrish Sadhukhan 	/*
22086d0ecbf6SKrish Sadhukhan 	 * PAE legacy
22096d0ecbf6SKrish Sadhukhan 	 */
22106d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
22116d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved | X86_CR4_PAE;
22126d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved,
2213cb6524f3SPaolo Bonzini 				  SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) ");
22146d0ecbf6SKrish Sadhukhan 
22156d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2216993749ffSSean Christopherson 
2217993749ffSSean Christopherson skip_npt_only:
2218a79c9495SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved;
22196d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2220a79c9495SKrish Sadhukhan }
2221a79c9495SKrish Sadhukhan 
2222d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */
2223a79c9495SKrish Sadhukhan static void test_cr4(void)
2224a79c9495SKrish Sadhukhan {
2225a79c9495SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
2226a79c9495SKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2227a79c9495SKrish Sadhukhan 	u64 efer = efer_saved;
2228a79c9495SKrish Sadhukhan 
2229a79c9495SKrish Sadhukhan 	efer &= ~EFER_LME;
2230a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2231a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2232cb6524f3SPaolo Bonzini 				  SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, "");
2233a79c9495SKrish Sadhukhan 
2234a79c9495SKrish Sadhukhan 	efer |= EFER_LME;
2235a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2236a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2237cb6524f3SPaolo Bonzini 				  SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2238a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved,
2239cb6524f3SPaolo Bonzini 				  SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2240a79c9495SKrish Sadhukhan 
2241a79c9495SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2242a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2243a79c9495SKrish Sadhukhan }
2244a79c9495SKrish Sadhukhan 
2245a79c9495SKrish Sadhukhan static void test_dr(void)
2246a79c9495SKrish Sadhukhan {
2247eae10e8fSKrish Sadhukhan 	/*
2248eae10e8fSKrish Sadhukhan 	 * DR6[63:32] and DR7[63:32] are MBZ
2249eae10e8fSKrish Sadhukhan 	 */
2250eae10e8fSKrish Sadhukhan 	u64 dr_saved = vmcb->save.dr6;
2251eae10e8fSKrish Sadhukhan 
2252eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved,
2253eae10e8fSKrish Sadhukhan 				   SVM_DR6_RESERVED_MASK);
2254eae10e8fSKrish Sadhukhan 	vmcb->save.dr6 = dr_saved;
2255eae10e8fSKrish Sadhukhan 
2256eae10e8fSKrish Sadhukhan 	dr_saved = vmcb->save.dr7;
2257eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved,
2258eae10e8fSKrish Sadhukhan 				   SVM_DR7_RESERVED_MASK);
2259eae10e8fSKrish Sadhukhan 
2260eae10e8fSKrish Sadhukhan 	vmcb->save.dr7 = dr_saved;
2261a79c9495SKrish Sadhukhan }
2262eae10e8fSKrish Sadhukhan 
2263abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */
2264abe82380SKrish Sadhukhan #define	TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code,		\
2265abe82380SKrish Sadhukhan 			 msg) {						\
2266abe82380SKrish Sadhukhan 		vmcb->control.intercept = saved_intercept | 1ULL << type; \
2267abe82380SKrish Sadhukhan 		if (type == INTERCEPT_MSR_PROT)				\
2268abe82380SKrish Sadhukhan 			vmcb->control.msrpm_base_pa = addr;		\
2269abe82380SKrish Sadhukhan 		else							\
2270abe82380SKrish Sadhukhan 			vmcb->control.iopm_base_pa = addr;		\
2271abe82380SKrish Sadhukhan 		report(svm_vmrun() == exit_code,			\
2272abe82380SKrish Sadhukhan 		       "Test %s address: %lx", msg, addr);		\
2273abe82380SKrish Sadhukhan 	}
2274abe82380SKrish Sadhukhan 
2275abe82380SKrish Sadhukhan /*
2276abe82380SKrish Sadhukhan  * If the MSR or IOIO intercept table extends to a physical address that
2277abe82380SKrish Sadhukhan  * is greater than or equal to the maximum supported physical address, the
2278abe82380SKrish Sadhukhan  * guest state is illegal.
2279abe82380SKrish Sadhukhan  *
2280abe82380SKrish Sadhukhan  * The VMRUN instruction ignores the lower 12 bits of the address specified
2281abe82380SKrish Sadhukhan  * in the VMCB.
2282abe82380SKrish Sadhukhan  *
2283abe82380SKrish Sadhukhan  * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB
2284abe82380SKrish Sadhukhan  * pages + 1 byte.
2285abe82380SKrish Sadhukhan  *
2286abe82380SKrish Sadhukhan  * [APM vol 2]
2287abe82380SKrish Sadhukhan  *
2288abe82380SKrish Sadhukhan  * Note: Unallocated MSRPM addresses conforming to consistency checks, generate
2289abe82380SKrish Sadhukhan  * #NPF.
2290abe82380SKrish Sadhukhan  */
2291abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void)
2292abe82380SKrish Sadhukhan {
2293abe82380SKrish Sadhukhan 	u64 saved_intercept = vmcb->control.intercept;
2294abe82380SKrish Sadhukhan 	u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr();
2295abe82380SKrish Sadhukhan 	u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1));
2296abe82380SKrish Sadhukhan 
2297abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2298abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2299abe82380SKrish Sadhukhan 			 "MSRPM");
2300abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2301abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR,
2302abe82380SKrish Sadhukhan 			 "MSRPM");
2303abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2304abe82380SKrish Sadhukhan 			 addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2305abe82380SKrish Sadhukhan 			 "MSRPM");
2306abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2307abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "MSRPM");
2308abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2309abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2310abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "MSRPM");
2311abe82380SKrish Sadhukhan 
2312abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2313abe82380SKrish Sadhukhan 			 addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2314abe82380SKrish Sadhukhan 			 "IOPM");
2315abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2316abe82380SKrish Sadhukhan 			 addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2317abe82380SKrish Sadhukhan 			 "IOPM");
2318abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2319abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL,
2320abe82380SKrish Sadhukhan 			 "IOPM");
2321abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2322abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2323abe82380SKrish Sadhukhan 			 "IOPM");
2324abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2325abe82380SKrish Sadhukhan 			 addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2326abe82380SKrish Sadhukhan 			 "IOPM");
2327abe82380SKrish Sadhukhan 	addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1));
2328abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2329abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "IOPM");
2330abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2331abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2332abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "IOPM");
2333abe82380SKrish Sadhukhan 
2334abe82380SKrish Sadhukhan 	vmcb->control.intercept = saved_intercept;
2335abe82380SKrish Sadhukhan }
2336abe82380SKrish Sadhukhan 
2337ba3c9773SLara Lazier /*
2338ba3c9773SLara Lazier  * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical
2339ba3c9773SLara Lazier  * segment bases in the VMCB.  However, VMENTRY succeeds as documented.
2340ba3c9773SLara Lazier  */
2341ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg)				\
2342a99070ebSKrish Sadhukhan 	saved_addr = seg_base;						\
2343a99070ebSKrish Sadhukhan 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2344ba3c9773SLara Lazier 	return_value = svm_vmrun();					\
2345ba3c9773SLara Lazier 	report(return_value == SVM_EXIT_VMMCALL,			\
2346ba3c9773SLara Lazier 	       "Successful VMRUN with noncanonical %s.base", msg);	\
2347a99070ebSKrish Sadhukhan 	seg_base = saved_addr;
2348a99070ebSKrish Sadhukhan 
2349ba3c9773SLara Lazier 
2350ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg)				\
2351ba3c9773SLara Lazier 	saved_addr = seg_base;						\
2352ba3c9773SLara Lazier 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2353ba3c9773SLara Lazier 	asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory");	\
2354ba3c9773SLara Lazier 	asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory");	\
2355ba3c9773SLara Lazier 	report(is_canonical(seg_base),					\
2356ba3c9773SLara Lazier 	       "Test %s.base for canonical form: %lx", msg, seg_base);	\
2357ba3c9773SLara Lazier 	seg_base = saved_addr;
2358ba3c9773SLara Lazier 
2359ba3c9773SLara Lazier static void test_canonicalization(void)
2360a99070ebSKrish Sadhukhan {
2361a99070ebSKrish Sadhukhan 	u64 saved_addr;
2362ba3c9773SLara Lazier 	u64 return_value;
2363ba3c9773SLara Lazier 	u64 addr_limit;
2364ba3c9773SLara Lazier 	u64 vmcb_phys = virt_to_phys(vmcb);
2365ba3c9773SLara Lazier 
2366ba3c9773SLara Lazier 	addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48;
2367a99070ebSKrish Sadhukhan 	u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1);
2368a99070ebSKrish Sadhukhan 
2369ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS");
2370ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS");
2371ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR");
2372ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR");
2373ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS");
2374ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES");
2375ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS");
2376ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS");
2377ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS");
2378ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR");
2379ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR");
2380a99070ebSKrish Sadhukhan }
2381a99070ebSKrish Sadhukhan 
2382665f5677SKrish Sadhukhan /*
2383665f5677SKrish Sadhukhan  * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not
2384665f5677SKrish Sadhukhan  * cause a trace trap between the VMRUN and the first guest instruction, but
2385665f5677SKrish Sadhukhan  * rather after completion of the first guest instruction.
2386665f5677SKrish Sadhukhan  *
2387665f5677SKrish Sadhukhan  * [APM vol 2]
2388665f5677SKrish Sadhukhan  */
2389665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip;
2390665f5677SKrish Sadhukhan 
2391665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r)
2392665f5677SKrish Sadhukhan {
2393665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = r->rip;
2394665f5677SKrish Sadhukhan 	r->rflags &= ~X86_EFLAGS_TF;
2395665f5677SKrish Sadhukhan }
2396665f5677SKrish Sadhukhan 
2397a79c9495SKrish Sadhukhan static void svm_guest_state_test(void)
2398a79c9495SKrish Sadhukhan {
2399a79c9495SKrish Sadhukhan 	test_set_guest(basic_guest_main);
2400a79c9495SKrish Sadhukhan 	test_efer();
2401a79c9495SKrish Sadhukhan 	test_cr0();
2402a79c9495SKrish Sadhukhan 	test_cr3();
2403a79c9495SKrish Sadhukhan 	test_cr4();
2404a79c9495SKrish Sadhukhan 	test_dr();
2405abe82380SKrish Sadhukhan 	test_msrpm_iopm_bitmap_addrs();
2406ba3c9773SLara Lazier 	test_canonicalization();
2407ba29942cSKrish Sadhukhan }
2408ba29942cSKrish Sadhukhan 
2409665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test);
2410665f5677SKrish Sadhukhan extern u64 *insn2;
2411665f5677SKrish Sadhukhan extern u64 *guest_end;
2412665f5677SKrish Sadhukhan 
2413665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t"
2414665f5677SKrish Sadhukhan     "push %rbp\n\t"
2415665f5677SKrish Sadhukhan     ".global insn2\n\t"
2416665f5677SKrish Sadhukhan     "insn2:\n\t"
2417665f5677SKrish Sadhukhan     "mov %rsp,%rbp\n\t"
2418665f5677SKrish Sadhukhan     "vmmcall\n\t"
2419665f5677SKrish Sadhukhan     "vmmcall\n\t"
2420665f5677SKrish Sadhukhan     ".global guest_end\n\t"
2421665f5677SKrish Sadhukhan     "guest_end:\n\t"
2422665f5677SKrish Sadhukhan     "vmmcall\n\t"
2423665f5677SKrish Sadhukhan     "pop %rbp\n\t"
2424665f5677SKrish Sadhukhan     "ret");
2425665f5677SKrish Sadhukhan 
2426665f5677SKrish Sadhukhan static void svm_test_singlestep(void)
2427665f5677SKrish Sadhukhan {
2428665f5677SKrish Sadhukhan 	handle_exception(DB_VECTOR, guest_rflags_test_db_handler);
2429665f5677SKrish Sadhukhan 
2430665f5677SKrish Sadhukhan 	/*
2431665f5677SKrish Sadhukhan 	 * Trap expected after completion of first guest instruction
2432665f5677SKrish Sadhukhan 	 */
2433665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2434665f5677SKrish Sadhukhan 	report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL &&
2435665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == (u64)&insn2,
2436665f5677SKrish Sadhukhan 		"Test EFLAGS.TF on VMRUN: trap expected  after completion of first guest instruction");
2437665f5677SKrish Sadhukhan 	/*
2438665f5677SKrish Sadhukhan 	 * No trap expected
2439665f5677SKrish Sadhukhan 	 */
2440665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = 0;
2441665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2442665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2443665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2444665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected");
2445665f5677SKrish Sadhukhan 
2446665f5677SKrish Sadhukhan 	/*
2447665f5677SKrish Sadhukhan 	 * Let guest finish execution
2448665f5677SKrish Sadhukhan 	 */
2449665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2450665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2451665f5677SKrish Sadhukhan 		vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion");
2452665f5677SKrish Sadhukhan }
2453665f5677SKrish Sadhukhan 
24547a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false;
24557a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0;
24567a57ef5dSMaxim Levitsky 
24577a57ef5dSMaxim Levitsky 
24587a57ef5dSMaxim Levitsky /*
24597a57ef5dSMaxim Levitsky  *
24607a57ef5dSMaxim Levitsky  * Test the following errata:
24617a57ef5dSMaxim Levitsky  * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest,
24627a57ef5dSMaxim Levitsky  * the CPU would first check the EAX against host reserved memory
24637a57ef5dSMaxim Levitsky  * regions (so far only SMM_ADDR/SMM_MASK are known to cause it),
24647a57ef5dSMaxim Levitsky  * and only then signal #VMexit
24657a57ef5dSMaxim Levitsky  *
24667a57ef5dSMaxim Levitsky  * Try to reproduce this by trying vmsave on each possible 4K aligned memory
24677a57ef5dSMaxim Levitsky  * address in the low 4G where the SMM area has to reside.
24687a57ef5dSMaxim Levitsky  */
24697a57ef5dSMaxim Levitsky 
24707a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r)
24717a57ef5dSMaxim Levitsky {
24727a57ef5dSMaxim Levitsky 	svm_errata_reproduced = true;
24737a57ef5dSMaxim Levitsky 	/* skip over the vmsave instruction*/
24747a57ef5dSMaxim Levitsky 	r->rip += 3;
24757a57ef5dSMaxim Levitsky }
24767a57ef5dSMaxim Levitsky 
24777a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void)
24787a57ef5dSMaxim Levitsky {
24797a57ef5dSMaxim Levitsky 	unsigned long *last_page = NULL;
24807a57ef5dSMaxim Levitsky 
24817a57ef5dSMaxim Levitsky 	handle_exception(GP_VECTOR, gp_isr);
24827a57ef5dSMaxim Levitsky 
24837a57ef5dSMaxim Levitsky 	while (!svm_errata_reproduced) {
24847a57ef5dSMaxim Levitsky 
24857a57ef5dSMaxim Levitsky 		unsigned long *page = alloc_pages(1);
24867a57ef5dSMaxim Levitsky 
24877a57ef5dSMaxim Levitsky 		if (!page) {
24885c3582f0SJanis Schoetterl-Glausch 			report_pass("All guest memory tested, no bug found");
24897a57ef5dSMaxim Levitsky 			break;
24907a57ef5dSMaxim Levitsky 		}
24917a57ef5dSMaxim Levitsky 
24927a57ef5dSMaxim Levitsky 		physical = virt_to_phys(page);
24937a57ef5dSMaxim Levitsky 
24947a57ef5dSMaxim Levitsky 		asm volatile (
24957a57ef5dSMaxim Levitsky 			      "mov %[_physical], %%rax\n\t"
24967a57ef5dSMaxim Levitsky 			      "vmsave %%rax\n\t"
24977a57ef5dSMaxim Levitsky 
24987a57ef5dSMaxim Levitsky 			      : [_physical] "=m" (physical)
24997a57ef5dSMaxim Levitsky 			      : /* no inputs*/
25007a57ef5dSMaxim Levitsky 			      : "rax" /*clobbers*/
25017a57ef5dSMaxim Levitsky 			      );
25027a57ef5dSMaxim Levitsky 
25037a57ef5dSMaxim Levitsky 		if (svm_errata_reproduced) {
2504198dfd0eSJanis Schoetterl-Glausch 			report_fail("Got #GP exception - svm errata reproduced at 0x%lx",
25057a57ef5dSMaxim Levitsky 				    physical);
25067a57ef5dSMaxim Levitsky 			break;
25077a57ef5dSMaxim Levitsky 		}
25087a57ef5dSMaxim Levitsky 
25097a57ef5dSMaxim Levitsky 		*page = (unsigned long)last_page;
25107a57ef5dSMaxim Levitsky 		last_page = page;
25117a57ef5dSMaxim Levitsky 	}
25127a57ef5dSMaxim Levitsky 
25137a57ef5dSMaxim Levitsky 	while (last_page) {
25147a57ef5dSMaxim Levitsky 		unsigned long *page = last_page;
25157a57ef5dSMaxim Levitsky 		last_page = (unsigned long *)*last_page;
25167a57ef5dSMaxim Levitsky 		free_pages_by_order(page, 1);
25177a57ef5dSMaxim Levitsky 	}
25187a57ef5dSMaxim Levitsky }
25197a57ef5dSMaxim Levitsky 
25200b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test)
25210b6f6cedSKrish Sadhukhan {
25220b6f6cedSKrish Sadhukhan 	u64 vmcb_phys = virt_to_phys(vmcb);
25230b6f6cedSKrish Sadhukhan 
25240b6f6cedSKrish Sadhukhan 	asm volatile ("vmload %0" : : "a"(vmcb_phys));
25250b6f6cedSKrish Sadhukhan 	asm volatile ("vmsave %0" : : "a"(vmcb_phys));
25260b6f6cedSKrish Sadhukhan }
25270b6f6cedSKrish Sadhukhan 
25280b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void)
25290b6f6cedSKrish Sadhukhan {
25300b6f6cedSKrish Sadhukhan 	u32 intercept_saved = vmcb->control.intercept;
25310b6f6cedSKrish Sadhukhan 
25320b6f6cedSKrish Sadhukhan 	test_set_guest(vmload_vmsave_guest_main);
25330b6f6cedSKrish Sadhukhan 
25340b6f6cedSKrish Sadhukhan 	/*
25350b6f6cedSKrish Sadhukhan 	 * Disabling intercept for VMLOAD and VMSAVE doesn't cause
25360b6f6cedSKrish Sadhukhan 	 * respective #VMEXIT to host
25370b6f6cedSKrish Sadhukhan 	 */
25380b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
25390b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
25400b6f6cedSKrish Sadhukhan 	svm_vmrun();
25410b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
25420b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
25430b6f6cedSKrish Sadhukhan 
25440b6f6cedSKrish Sadhukhan 	/*
25450b6f6cedSKrish Sadhukhan 	 * Enabling intercept for VMLOAD and VMSAVE causes respective
25460b6f6cedSKrish Sadhukhan 	 * #VMEXIT to host
25470b6f6cedSKrish Sadhukhan 	 */
25480b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
25490b6f6cedSKrish Sadhukhan 	svm_vmrun();
25500b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
25510b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
25520b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
25530b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
25540b6f6cedSKrish Sadhukhan 	svm_vmrun();
25550b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
25560b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
25570b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
25580b6f6cedSKrish Sadhukhan 	svm_vmrun();
25590b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
25600b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
25610b6f6cedSKrish Sadhukhan 
25620b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
25630b6f6cedSKrish Sadhukhan 	svm_vmrun();
25640b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
25650b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
25660b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
25670b6f6cedSKrish Sadhukhan 	svm_vmrun();
25680b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
25690b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
25700b6f6cedSKrish Sadhukhan 
25710b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
25720b6f6cedSKrish Sadhukhan 	svm_vmrun();
25730b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
25740b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
25750b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
25760b6f6cedSKrish Sadhukhan 	svm_vmrun();
25770b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
25780b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
25790b6f6cedSKrish Sadhukhan 
25800b6f6cedSKrish Sadhukhan 	vmcb->control.intercept = intercept_saved;
25810b6f6cedSKrish Sadhukhan }
25820b6f6cedSKrish Sadhukhan 
2583f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test)
2584f6972bd6SLara Lazier {
2585f6972bd6SLara Lazier 	default_prepare(test);
2586f6972bd6SLara Lazier }
2587f6972bd6SLara Lazier 
2588f6972bd6SLara Lazier static void test_vgif(struct svm_test *test)
2589f6972bd6SLara Lazier {
2590f6972bd6SLara Lazier 	asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t");
2591f6972bd6SLara Lazier }
2592f6972bd6SLara Lazier 
2593f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test)
2594f6972bd6SLara Lazier {
2595f6972bd6SLara Lazier 	switch (get_test_stage(test))
2596f6972bd6SLara Lazier 		{
2597f6972bd6SLara Lazier 		case 0:
2598f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2599198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2600f6972bd6SLara Lazier 				return true;
2601f6972bd6SLara Lazier 			}
2602f6972bd6SLara Lazier 			vmcb->control.int_ctl |= V_GIF_ENABLED_MASK;
2603f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2604f6972bd6SLara Lazier 			inc_test_stage(test);
2605f6972bd6SLara Lazier 			break;
2606f6972bd6SLara Lazier 		case 1:
2607f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2608198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2609f6972bd6SLara Lazier 				return true;
2610f6972bd6SLara Lazier 			}
2611f6972bd6SLara Lazier 			if (!(vmcb->control.int_ctl & V_GIF_MASK)) {
2612198dfd0eSJanis Schoetterl-Glausch 				report_fail("Failed to set VGIF when executing STGI.");
2613f6972bd6SLara Lazier 				vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2614f6972bd6SLara Lazier 				return true;
2615f6972bd6SLara Lazier 			}
26165c3582f0SJanis Schoetterl-Glausch 			report_pass("STGI set VGIF bit.");
2617f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2618f6972bd6SLara Lazier 			inc_test_stage(test);
2619f6972bd6SLara Lazier 			break;
2620f6972bd6SLara Lazier 		case 2:
2621f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2622198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2623f6972bd6SLara Lazier 				return true;
2624f6972bd6SLara Lazier 			}
2625f6972bd6SLara Lazier 			if (vmcb->control.int_ctl & V_GIF_MASK) {
2626198dfd0eSJanis Schoetterl-Glausch 				report_fail("Failed to clear VGIF when executing CLGI.");
2627f6972bd6SLara Lazier 				vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2628f6972bd6SLara Lazier 				return true;
2629f6972bd6SLara Lazier 			}
26305c3582f0SJanis Schoetterl-Glausch 			report_pass("CLGI cleared VGIF bit.");
2631f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2632f6972bd6SLara Lazier 			inc_test_stage(test);
2633f6972bd6SLara Lazier 			vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2634f6972bd6SLara Lazier 			break;
2635f6972bd6SLara Lazier 		default:
2636f6972bd6SLara Lazier 			return true;
2637f6972bd6SLara Lazier 			break;
2638f6972bd6SLara Lazier 		}
2639f6972bd6SLara Lazier 
2640f6972bd6SLara Lazier 	return get_test_stage(test) == 3;
2641f6972bd6SLara Lazier }
2642f6972bd6SLara Lazier 
2643f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test)
2644f6972bd6SLara Lazier {
2645f6972bd6SLara Lazier 	return get_test_stage(test) == 3;
2646f6972bd6SLara Lazier }
2647f6972bd6SLara Lazier 
26488650dffeSMaxim Levitsky 
26498650dffeSMaxim Levitsky static int pause_test_counter;
26508650dffeSMaxim Levitsky static int wait_counter;
26518650dffeSMaxim Levitsky 
26528650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test)
26538650dffeSMaxim Levitsky {
26548650dffeSMaxim Levitsky 	int i;
26558650dffeSMaxim Levitsky 	for (i = 0 ; i < pause_test_counter ; i++)
26568650dffeSMaxim Levitsky 		pause();
26578650dffeSMaxim Levitsky 
26588650dffeSMaxim Levitsky 	if (!wait_counter)
26598650dffeSMaxim Levitsky 		return;
26608650dffeSMaxim Levitsky 
26618650dffeSMaxim Levitsky 	for (i = 0; i < wait_counter; i++)
26628650dffeSMaxim Levitsky 		;
26638650dffeSMaxim Levitsky 
26648650dffeSMaxim Levitsky 	for (i = 0 ; i < pause_test_counter ; i++)
26658650dffeSMaxim Levitsky 		pause();
26668650dffeSMaxim Levitsky 
26678650dffeSMaxim Levitsky }
26688650dffeSMaxim Levitsky 
26698650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold)
26708650dffeSMaxim Levitsky {
26718650dffeSMaxim Levitsky 	test_set_guest(pause_filter_test_guest_main);
26728650dffeSMaxim Levitsky 
26738650dffeSMaxim Levitsky 	pause_test_counter = pause_iterations;
26748650dffeSMaxim Levitsky 	wait_counter = wait_iterations;
26758650dffeSMaxim Levitsky 
26768650dffeSMaxim Levitsky 	vmcb->control.pause_filter_count = filter_value;
26778650dffeSMaxim Levitsky 	vmcb->control.pause_filter_thresh = threshold;
26788650dffeSMaxim Levitsky 	svm_vmrun();
26798650dffeSMaxim Levitsky 
26808650dffeSMaxim Levitsky 	if (filter_value <= pause_iterations || wait_iterations < threshold)
26818650dffeSMaxim Levitsky 		report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit");
26828650dffeSMaxim Levitsky 	else
26838650dffeSMaxim Levitsky 		report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit");
26848650dffeSMaxim Levitsky }
26858650dffeSMaxim Levitsky 
26868650dffeSMaxim Levitsky static void pause_filter_test(void)
26878650dffeSMaxim Levitsky {
26888650dffeSMaxim Levitsky 	if (!pause_filter_supported()) {
26898650dffeSMaxim Levitsky 		report_skip("PAUSE filter not supported in the guest");
26908650dffeSMaxim Levitsky 		return;
26918650dffeSMaxim Levitsky 	}
26928650dffeSMaxim Levitsky 
26938650dffeSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_PAUSE);
26948650dffeSMaxim Levitsky 
26958650dffeSMaxim Levitsky 	// filter count more that pause count - no VMexit
26968650dffeSMaxim Levitsky 	pause_filter_run_test(10, 9, 0, 0);
26978650dffeSMaxim Levitsky 
26988650dffeSMaxim Levitsky 	// filter count smaller pause count - no VMexit
26998650dffeSMaxim Levitsky 	pause_filter_run_test(20, 21, 0, 0);
27008650dffeSMaxim Levitsky 
27018650dffeSMaxim Levitsky 
27028650dffeSMaxim Levitsky 	if (pause_threshold_supported()) {
27038650dffeSMaxim Levitsky 		// filter count smaller pause count - no VMexit +  large enough threshold
27048650dffeSMaxim Levitsky 		// so that filter counter resets
27058650dffeSMaxim Levitsky 		pause_filter_run_test(20, 21, 1000, 10);
27068650dffeSMaxim Levitsky 
27078650dffeSMaxim Levitsky 		// filter count smaller pause count - no VMexit +  small threshold
27088650dffeSMaxim Levitsky 		// so that filter doesn't reset
27098650dffeSMaxim Levitsky 		pause_filter_run_test(20, 21, 10, 1000);
27108650dffeSMaxim Levitsky 	} else {
27118650dffeSMaxim Levitsky 		report_skip("PAUSE threshold not supported in the guest");
27128650dffeSMaxim Levitsky 		return;
27138650dffeSMaxim Levitsky 	}
27148650dffeSMaxim Levitsky }
27158650dffeSMaxim Levitsky 
2716694e59baSManali Shukla /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */
2717694e59baSManali Shukla static void svm_no_nm_test(void)
27185c92f156SManali Shukla {
27195c92f156SManali Shukla 	write_cr0(read_cr0() & ~X86_CR0_TS);
2720694e59baSManali Shukla 	test_set_guest((test_guest_func)fnop);
27215c92f156SManali Shukla 
27225c92f156SManali Shukla 	vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM);
2723694e59baSManali Shukla 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
27243f27d772SManali Shukla 	       "fnop with CR0.TS and CR0.EM unset no #NM excpetion");
27255c92f156SManali Shukla }
2726f6972bd6SLara Lazier 
2727537d39dfSMaxim Levitsky static bool check_lbr(u64 *from_excepted, u64 *to_expected)
2728537d39dfSMaxim Levitsky {
2729537d39dfSMaxim Levitsky 	u64 from = rdmsr(MSR_IA32_LASTBRANCHFROMIP);
2730537d39dfSMaxim Levitsky 	u64 to = rdmsr(MSR_IA32_LASTBRANCHTOIP);
2731537d39dfSMaxim Levitsky 
2732537d39dfSMaxim Levitsky 	if ((u64)from_excepted != from) {
2733537d39dfSMaxim Levitsky 		report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx",
2734537d39dfSMaxim Levitsky 		       (u64)from_excepted, from);
2735537d39dfSMaxim Levitsky 		return false;
2736537d39dfSMaxim Levitsky 	}
2737537d39dfSMaxim Levitsky 
2738537d39dfSMaxim Levitsky 	if ((u64)to_expected != to) {
2739537d39dfSMaxim Levitsky 		report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx",
2740537d39dfSMaxim Levitsky 		       (u64)from_excepted, from);
2741537d39dfSMaxim Levitsky 		return false;
2742537d39dfSMaxim Levitsky 	}
2743537d39dfSMaxim Levitsky 
2744537d39dfSMaxim Levitsky 	return true;
2745537d39dfSMaxim Levitsky }
2746537d39dfSMaxim Levitsky 
2747537d39dfSMaxim Levitsky static bool check_dbgctl(u64 dbgctl, u64 dbgctl_expected)
2748537d39dfSMaxim Levitsky {
2749537d39dfSMaxim Levitsky 	if (dbgctl != dbgctl_expected) {
2750537d39dfSMaxim Levitsky 		report(false, "Unexpected MSR_IA32_DEBUGCTLMSR value 0x%lx", dbgctl);
2751537d39dfSMaxim Levitsky 		return false;
2752537d39dfSMaxim Levitsky 	}
2753537d39dfSMaxim Levitsky 	return true;
2754537d39dfSMaxim Levitsky }
2755537d39dfSMaxim Levitsky 
2756537d39dfSMaxim Levitsky 
2757537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name)				\
2758537d39dfSMaxim Levitsky 	asm volatile (					\
2759537d39dfSMaxim Levitsky 		      # branch_name "_from:"		\
2760537d39dfSMaxim Levitsky 		      "jmp " # branch_name  "_to\n"	\
2761537d39dfSMaxim Levitsky 		      "nop\n"				\
2762537d39dfSMaxim Levitsky 		      "nop\n"				\
2763537d39dfSMaxim Levitsky 		      # branch_name  "_to:"		\
2764537d39dfSMaxim Levitsky 		      "nop\n"				\
2765537d39dfSMaxim Levitsky 		       )
2766537d39dfSMaxim Levitsky 
2767537d39dfSMaxim Levitsky 
2768537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to;
2769537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to;
2770537d39dfSMaxim Levitsky 
2771537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to;
2772537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to;
2773537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to;
2774537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to;
2775537d39dfSMaxim Levitsky 
2776537d39dfSMaxim Levitsky u64 dbgctl;
2777537d39dfSMaxim Levitsky 
2778537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void)
2779537d39dfSMaxim Levitsky {
2780537d39dfSMaxim Levitsky 	/*
2781537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be already enabled when it starts,
2782537d39dfSMaxim Levitsky 	 * it does a branch, and then disables the LBR and then checks.
2783537d39dfSMaxim Levitsky 	 */
2784537d39dfSMaxim Levitsky 
2785537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch0);
2786537d39dfSMaxim Levitsky 
2787537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2788537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2789537d39dfSMaxim Levitsky 
2790537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
2791537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2792537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0)
2793537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2794537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch0_from)
2795537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2796537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch0_to)
2797537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2798537d39dfSMaxim Levitsky 
2799537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
2800537d39dfSMaxim Levitsky }
2801537d39dfSMaxim Levitsky 
2802537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void)
2803537d39dfSMaxim Levitsky {
2804537d39dfSMaxim Levitsky 	/*
2805537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be disabled when it starts,
2806537d39dfSMaxim Levitsky 	 * enables it, does a branch, disables it and then checks.
2807537d39dfSMaxim Levitsky 	 */
2808537d39dfSMaxim Levitsky 
2809537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch1);
2810537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2811537d39dfSMaxim Levitsky 
2812537d39dfSMaxim Levitsky 	if (dbgctl != 0)
2813537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2814537d39dfSMaxim Levitsky 
2815537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&host_branch2_from)
2816537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2817537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&host_branch2_to)
2818537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2819537d39dfSMaxim Levitsky 
2820537d39dfSMaxim Levitsky 
2821537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2822537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2823537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch2);
2824537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2825537d39dfSMaxim Levitsky 
2826537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
2827537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2828537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch2_from)
2829537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2830537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch2_to)
2831537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2832537d39dfSMaxim Levitsky 
2833537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
2834537d39dfSMaxim Levitsky }
2835537d39dfSMaxim Levitsky 
2836537d39dfSMaxim Levitsky static void svm_lbrv_test0(void)
2837537d39dfSMaxim Levitsky {
2838537d39dfSMaxim Levitsky 	report(true, "Basic LBR test");
2839537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2840537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch0);
2841537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2842537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2843537d39dfSMaxim Levitsky 
2844537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
2845537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2846537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
2847537d39dfSMaxim Levitsky 
2848537d39dfSMaxim Levitsky 	check_lbr(&host_branch0_from, &host_branch0_to);
2849537d39dfSMaxim Levitsky }
2850537d39dfSMaxim Levitsky 
2851537d39dfSMaxim Levitsky static void svm_lbrv_test1(void)
2852537d39dfSMaxim Levitsky {
2853537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)");
2854537d39dfSMaxim Levitsky 
2855537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest1;
2856537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
2857537d39dfSMaxim Levitsky 
2858537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2859537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch1);
2860537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2861537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2862537d39dfSMaxim Levitsky 
2863537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2864537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
2865537d39dfSMaxim Levitsky 		       vmcb->control.exit_code);
2866537d39dfSMaxim Levitsky 		return;
2867537d39dfSMaxim Levitsky 	}
2868537d39dfSMaxim Levitsky 
2869537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
2870537d39dfSMaxim Levitsky 	check_lbr(&guest_branch0_from, &guest_branch0_to);
2871537d39dfSMaxim Levitsky }
2872537d39dfSMaxim Levitsky 
2873537d39dfSMaxim Levitsky static void svm_lbrv_test2(void)
2874537d39dfSMaxim Levitsky {
2875537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)");
2876537d39dfSMaxim Levitsky 
2877537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest2;
2878537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
2879537d39dfSMaxim Levitsky 
2880537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2881537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch2);
2882537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2883537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2884537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2885537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2886537d39dfSMaxim Levitsky 
2887537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2888537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
2889537d39dfSMaxim Levitsky 		       vmcb->control.exit_code);
2890537d39dfSMaxim Levitsky 		return;
2891537d39dfSMaxim Levitsky 	}
2892537d39dfSMaxim Levitsky 
2893537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
2894537d39dfSMaxim Levitsky 	check_lbr(&guest_branch2_from, &guest_branch2_to);
2895537d39dfSMaxim Levitsky }
2896537d39dfSMaxim Levitsky 
2897537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void)
2898537d39dfSMaxim Levitsky {
2899537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
2900537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
2901537d39dfSMaxim Levitsky 		return;
2902537d39dfSMaxim Levitsky 	}
2903537d39dfSMaxim Levitsky 
2904537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)");
2905537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest1;
2906537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
2907537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = DEBUGCTLMSR_LBR;
2908537d39dfSMaxim Levitsky 
2909537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2910537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch3);
2911537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2912537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2913537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2914537d39dfSMaxim Levitsky 
2915537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2916537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
2917537d39dfSMaxim Levitsky 		       vmcb->control.exit_code);
2918537d39dfSMaxim Levitsky 		return;
2919537d39dfSMaxim Levitsky 	}
2920537d39dfSMaxim Levitsky 
2921537d39dfSMaxim Levitsky 	if (vmcb->save.dbgctl != 0) {
2922537d39dfSMaxim Levitsky 		report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl);
2923537d39dfSMaxim Levitsky 		return;
2924537d39dfSMaxim Levitsky 	}
2925537d39dfSMaxim Levitsky 
2926537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
2927537d39dfSMaxim Levitsky 	check_lbr(&host_branch3_from, &host_branch3_to);
2928537d39dfSMaxim Levitsky }
29293f27d772SManali Shukla 
2930537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void)
2931537d39dfSMaxim Levitsky {
2932537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
2933537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
2934537d39dfSMaxim Levitsky 		return;
2935537d39dfSMaxim Levitsky 	}
2936537d39dfSMaxim Levitsky 
2937537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)");
2938537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest2;
2939537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
2940537d39dfSMaxim Levitsky 
2941537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = 0;
2942537d39dfSMaxim Levitsky 	vmcb->save.br_from = (u64)&host_branch2_from;
2943537d39dfSMaxim Levitsky 	vmcb->save.br_to = (u64)&host_branch2_to;
2944537d39dfSMaxim Levitsky 
2945537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2946537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch4);
2947537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2948537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2949537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2950537d39dfSMaxim Levitsky 
2951537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2952537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
2953537d39dfSMaxim Levitsky 		       vmcb->control.exit_code);
2954537d39dfSMaxim Levitsky 		return;
2955537d39dfSMaxim Levitsky 	}
2956537d39dfSMaxim Levitsky 
2957537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
2958537d39dfSMaxim Levitsky 	check_lbr(&host_branch4_from, &host_branch4_to);
2959537d39dfSMaxim Levitsky }
2960537d39dfSMaxim Levitsky 
2961c45bccfcSMaxim Levitsky 
2962c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception
2963c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works
2964c45bccfcSMaxim Levitsky 
2965c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied;
2966c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs)
2967c45bccfcSMaxim Levitsky {
2968c45bccfcSMaxim Levitsky 	dummy_isr_recevied++;
2969c45bccfcSMaxim Levitsky 	eoi();
2970c45bccfcSMaxim Levitsky }
2971c45bccfcSMaxim Levitsky 
2972c45bccfcSMaxim Levitsky 
2973c45bccfcSMaxim Levitsky static volatile int nmi_recevied;
2974c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs)
2975c45bccfcSMaxim Levitsky {
2976c45bccfcSMaxim Levitsky 	nmi_recevied++;
2977c45bccfcSMaxim Levitsky }
2978c45bccfcSMaxim Levitsky 
2979c45bccfcSMaxim Levitsky 
2980c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit)
2981c45bccfcSMaxim Levitsky {
2982c45bccfcSMaxim Levitsky 	if (counter)
2983c45bccfcSMaxim Levitsky 		*counter = 0;
2984c45bccfcSMaxim Levitsky 
2985c45bccfcSMaxim Levitsky 	sti();  // host IF value should not matter
2986c45bccfcSMaxim Levitsky 	clgi(); // vmrun will set back GI to 1
2987c45bccfcSMaxim Levitsky 
2988c45bccfcSMaxim Levitsky 	svm_vmrun();
2989c45bccfcSMaxim Levitsky 
2990c45bccfcSMaxim Levitsky 	if (counter)
2991c45bccfcSMaxim Levitsky 		report(!*counter, "No interrupt expected");
2992c45bccfcSMaxim Levitsky 
2993c45bccfcSMaxim Levitsky 	stgi();
2994c45bccfcSMaxim Levitsky 
2995c45bccfcSMaxim Levitsky 	if (counter)
2996c45bccfcSMaxim Levitsky 		report(*counter == 1, "Interrupt is expected");
2997c45bccfcSMaxim Levitsky 
2998c45bccfcSMaxim Levitsky 	report (vmcb->control.exit_code == expected_vmexit, "Test expected VM exit");
2999c45bccfcSMaxim Levitsky 	report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now");
3000c45bccfcSMaxim Levitsky 	cli();
3001c45bccfcSMaxim Levitsky }
3002c45bccfcSMaxim Levitsky 
3003c45bccfcSMaxim Levitsky 
3004c45bccfcSMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enought to trigger an interrupt
3005c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test)
3006c45bccfcSMaxim Levitsky {
3007c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3008c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3009c45bccfcSMaxim Levitsky 	sti();
3010c45bccfcSMaxim Levitsky 	asm volatile("nop");
3011c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3012c45bccfcSMaxim Levitsky }
3013c45bccfcSMaxim Levitsky 
3014c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void)
3015c45bccfcSMaxim Levitsky {
3016c45bccfcSMaxim Levitsky 	// make a physical interrupt to be pending
3017c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3018c45bccfcSMaxim Levitsky 
3019c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3020c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3021c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3022c45bccfcSMaxim Levitsky 
3023c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_if_guest);
3024c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3025c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3026c45bccfcSMaxim Levitsky }
3027c45bccfcSMaxim Levitsky 
3028c45bccfcSMaxim Levitsky 
3029c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3030c45bccfcSMaxim Levitsky // if GIF is not intercepted
3031c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test)
3032c45bccfcSMaxim Levitsky {
3033c45bccfcSMaxim Levitsky 
3034c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3035c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3036c45bccfcSMaxim Levitsky 
3037c45bccfcSMaxim Levitsky 	// clear GIF and enable IF
3038c45bccfcSMaxim Levitsky 	// that should still not cause VM exit
3039c45bccfcSMaxim Levitsky 	clgi();
3040c45bccfcSMaxim Levitsky 	sti();
3041c45bccfcSMaxim Levitsky 	asm volatile("nop");
3042c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3043c45bccfcSMaxim Levitsky 
3044c45bccfcSMaxim Levitsky 	stgi();
3045c45bccfcSMaxim Levitsky 	asm volatile("nop");
3046c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3047c45bccfcSMaxim Levitsky }
3048c45bccfcSMaxim Levitsky 
3049c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void)
3050c45bccfcSMaxim Levitsky {
3051c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3052c45bccfcSMaxim Levitsky 
3053c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3054c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3055c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3056c45bccfcSMaxim Levitsky 
3057c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest);
3058c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3059c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3060c45bccfcSMaxim Levitsky }
3061c45bccfcSMaxim Levitsky 
3062c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3063c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest
3064c45bccfcSMaxim Levitsky // started running
3065c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test)
3066c45bccfcSMaxim Levitsky {
3067c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3068c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3069c45bccfcSMaxim Levitsky 
3070c45bccfcSMaxim Levitsky 	clgi();
3071c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3072c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3073c45bccfcSMaxim Levitsky 
3074c45bccfcSMaxim Levitsky 	stgi();
3075c45bccfcSMaxim Levitsky 	asm volatile("nop");
3076c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3077c45bccfcSMaxim Levitsky }
3078c45bccfcSMaxim Levitsky 
3079c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void)
3080c45bccfcSMaxim Levitsky {
3081c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3082c45bccfcSMaxim Levitsky 
3083c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3084c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3085c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3086c45bccfcSMaxim Levitsky 
3087c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest2);
3088c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3089c45bccfcSMaxim Levitsky }
3090c45bccfcSMaxim Levitsky 
3091c45bccfcSMaxim Levitsky 
3092c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF
3093c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test)
3094c45bccfcSMaxim Levitsky {
3095c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3096c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3097c45bccfcSMaxim Levitsky 	cli(); // should have no effect
3098c45bccfcSMaxim Levitsky 
3099c45bccfcSMaxim Levitsky 	clgi();
3100c45bccfcSMaxim Levitsky 	asm volatile("nop");
3101c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0);
3102c45bccfcSMaxim Levitsky 	sti(); // should have no effect
3103c45bccfcSMaxim Levitsky 	asm volatile("nop");
3104c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3105c45bccfcSMaxim Levitsky 
3106c45bccfcSMaxim Levitsky 	stgi();
3107c45bccfcSMaxim Levitsky 	asm volatile("nop");
3108c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3109c45bccfcSMaxim Levitsky }
3110c45bccfcSMaxim Levitsky 
3111c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void)
3112c45bccfcSMaxim Levitsky {
3113c45bccfcSMaxim Levitsky 	handle_exception(2, dummy_nmi_handler);
3114c45bccfcSMaxim Levitsky 
3115c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_NMI);
3116c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3117c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3118c45bccfcSMaxim Levitsky 
3119c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_nmi_guest);
3120c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI);
3121c45bccfcSMaxim Levitsky }
3122c45bccfcSMaxim Levitsky 
3123c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF
3124c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang
3125c45bccfcSMaxim Levitsky // and VMexits on SMI
3126c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test)
3127c45bccfcSMaxim Levitsky {
3128c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3129c45bccfcSMaxim Levitsky 
3130c45bccfcSMaxim Levitsky 	clgi();
3131c45bccfcSMaxim Levitsky 	asm volatile("nop");
3132c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0);
3133c45bccfcSMaxim Levitsky 	sti(); // should have no effect
3134c45bccfcSMaxim Levitsky 	asm volatile("nop");
3135c45bccfcSMaxim Levitsky 	stgi();
3136c45bccfcSMaxim Levitsky 	asm volatile("nop");
3137c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3138c45bccfcSMaxim Levitsky }
3139c45bccfcSMaxim Levitsky 
3140c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void)
3141c45bccfcSMaxim Levitsky {
3142c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_SMI);
3143c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3144c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_smi_guest);
3145c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI);
3146c45bccfcSMaxim Levitsky }
3147c45bccfcSMaxim Levitsky 
31488177dc62SManali Shukla static void svm_l2_ac_test(void)
31498177dc62SManali Shukla {
31508177dc62SManali Shukla 	bool hit_ac = false;
31518177dc62SManali Shukla 
31528177dc62SManali Shukla 	write_cr0(read_cr0() | X86_CR0_AM);
31538177dc62SManali Shukla 	write_rflags(read_rflags() | X86_EFLAGS_AC);
31548177dc62SManali Shukla 
31558177dc62SManali Shukla 	run_in_user(generate_usermode_ac, AC_VECTOR, 0, 0, 0, 0, &hit_ac);
31568177dc62SManali Shukla 	report(hit_ac, "Usermode #AC handled in L2");
31578177dc62SManali Shukla 	vmmcall();
31588177dc62SManali Shukla }
31598177dc62SManali Shukla 
31608177dc62SManali Shukla struct svm_exception_test {
31618177dc62SManali Shukla 	u8 vector;
31628177dc62SManali Shukla 	void (*guest_code)(void);
31638177dc62SManali Shukla };
31648177dc62SManali Shukla 
31658177dc62SManali Shukla struct svm_exception_test svm_exception_tests[] = {
31668177dc62SManali Shukla 	{ GP_VECTOR, generate_non_canonical_gp },
31678177dc62SManali Shukla 	{ UD_VECTOR, generate_ud },
31688177dc62SManali Shukla 	{ DE_VECTOR, generate_de },
31698177dc62SManali Shukla 	{ DB_VECTOR, generate_single_step_db },
317044550f53SManali Shukla 	{ BP_VECTOR, generate_bp },
31718177dc62SManali Shukla 	{ AC_VECTOR, svm_l2_ac_test },
31720851b7f7SManali Shukla 	{ OF_VECTOR, generate_of },
3173694e59baSManali Shukla 	{ NM_VECTOR, generate_cr0_ts_nm },
3174694e59baSManali Shukla 	{ NM_VECTOR, generate_cr0_em_nm },
31758177dc62SManali Shukla };
31768177dc62SManali Shukla 
31778177dc62SManali Shukla static u8 svm_exception_test_vector;
31788177dc62SManali Shukla 
31798177dc62SManali Shukla static void svm_exception_handler(struct ex_regs *regs)
31808177dc62SManali Shukla {
31818177dc62SManali Shukla 	report(regs->vector == svm_exception_test_vector,
31828177dc62SManali Shukla 		"Handling %s in L2's exception handler",
31838177dc62SManali Shukla 		exception_mnemonic(svm_exception_test_vector));
31848177dc62SManali Shukla 	vmmcall();
31858177dc62SManali Shukla }
31868177dc62SManali Shukla 
31878177dc62SManali Shukla static void handle_exception_in_l2(u8 vector)
31888177dc62SManali Shukla {
31898177dc62SManali Shukla 	handler old_handler = handle_exception(vector, svm_exception_handler);
31908177dc62SManali Shukla 	svm_exception_test_vector = vector;
31918177dc62SManali Shukla 
31928177dc62SManali Shukla 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
31938177dc62SManali Shukla 		"%s handled by L2", exception_mnemonic(vector));
31948177dc62SManali Shukla 
31958177dc62SManali Shukla 	handle_exception(vector, old_handler);
31968177dc62SManali Shukla }
31978177dc62SManali Shukla 
31988177dc62SManali Shukla static void handle_exception_in_l1(u32 vector)
31998177dc62SManali Shukla {
32008177dc62SManali Shukla 	u32 old_ie = vmcb->control.intercept_exceptions;
32018177dc62SManali Shukla 
32028177dc62SManali Shukla 	vmcb->control.intercept_exceptions |= (1ULL << vector);
32038177dc62SManali Shukla 
32048177dc62SManali Shukla 	report(svm_vmrun() == (SVM_EXIT_EXCP_BASE + vector),
32058177dc62SManali Shukla 		"%s handled by L1",  exception_mnemonic(vector));
32068177dc62SManali Shukla 
32078177dc62SManali Shukla 	vmcb->control.intercept_exceptions = old_ie;
32088177dc62SManali Shukla }
32098177dc62SManali Shukla 
32108177dc62SManali Shukla static void svm_exception_test(void)
32118177dc62SManali Shukla {
32128177dc62SManali Shukla 	struct svm_exception_test *t;
32138177dc62SManali Shukla 	int i;
32148177dc62SManali Shukla 
32158177dc62SManali Shukla 	for (i = 0; i < ARRAY_SIZE(svm_exception_tests); i++) {
32168177dc62SManali Shukla 		t = &svm_exception_tests[i];
32178177dc62SManali Shukla 		test_set_guest((test_guest_func)t->guest_code);
32188177dc62SManali Shukla 
32198177dc62SManali Shukla 		handle_exception_in_l2(t->vector);
32208177dc62SManali Shukla 		vmcb_ident(vmcb);
32218177dc62SManali Shukla 
32228177dc62SManali Shukla 		handle_exception_in_l1(t->vector);
32238177dc62SManali Shukla 		vmcb_ident(vmcb);
32248177dc62SManali Shukla 	}
32258177dc62SManali Shukla }
32268177dc62SManali Shukla 
32273f27d772SManali Shukla struct svm_test svm_tests[] = {
3228ad879127SKrish Sadhukhan 	{ "null", default_supported, default_prepare,
3229ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test,
3230ad879127SKrish Sadhukhan 	  default_finished, null_check },
3231ad879127SKrish Sadhukhan 	{ "vmrun", default_supported, default_prepare,
3232ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_vmrun,
3233ad879127SKrish Sadhukhan 	  default_finished, check_vmrun },
3234ad879127SKrish Sadhukhan 	{ "ioio", default_supported, prepare_ioio,
3235ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_ioio,
3236ad879127SKrish Sadhukhan 	  ioio_finished, check_ioio },
3237ad879127SKrish Sadhukhan 	{ "vmrun intercept check", default_supported, prepare_no_vmrun_int,
3238ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test, default_finished,
3239ad879127SKrish Sadhukhan 	  check_no_vmrun_int },
3240401299a5SPaolo Bonzini 	{ "rsm", default_supported,
3241401299a5SPaolo Bonzini 	  prepare_rsm_intercept, default_prepare_gif_clear,
3242401299a5SPaolo Bonzini 	  test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept },
3243ad879127SKrish Sadhukhan 	{ "cr3 read intercept", default_supported,
3244ad879127SKrish Sadhukhan 	  prepare_cr3_intercept, default_prepare_gif_clear,
3245ad879127SKrish Sadhukhan 	  test_cr3_intercept, default_finished, check_cr3_intercept },
3246ad879127SKrish Sadhukhan 	{ "cr3 read nointercept", default_supported, default_prepare,
3247ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_cr3_intercept, default_finished,
3248ad879127SKrish Sadhukhan 	  check_cr3_nointercept },
3249ad879127SKrish Sadhukhan 	{ "cr3 read intercept emulate", smp_supported,
3250ad879127SKrish Sadhukhan 	  prepare_cr3_intercept_bypass, default_prepare_gif_clear,
3251ad879127SKrish Sadhukhan 	  test_cr3_intercept_bypass, default_finished, check_cr3_intercept },
3252ad879127SKrish Sadhukhan 	{ "dr intercept check", default_supported, prepare_dr_intercept,
3253ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished,
3254ad879127SKrish Sadhukhan 	  check_dr_intercept },
3255ad879127SKrish Sadhukhan 	{ "next_rip", next_rip_supported, prepare_next_rip,
3256ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_next_rip,
3257ad879127SKrish Sadhukhan 	  default_finished, check_next_rip },
3258ad879127SKrish Sadhukhan 	{ "msr intercept check", default_supported, prepare_msr_intercept,
3259ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_msr_intercept,
3260ad879127SKrish Sadhukhan 	  msr_intercept_finished, check_msr_intercept },
3261ad879127SKrish Sadhukhan 	{ "mode_switch", default_supported, prepare_mode_switch,
3262ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_mode_switch,
3263ad879127SKrish Sadhukhan 	  mode_switch_finished, check_mode_switch },
3264ad879127SKrish Sadhukhan 	{ "asid_zero", default_supported, prepare_asid_zero,
3265ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_asid_zero,
3266ad879127SKrish Sadhukhan 	  default_finished, check_asid_zero },
3267ad879127SKrish Sadhukhan 	{ "sel_cr0_bug", default_supported, sel_cr0_bug_prepare,
3268ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, sel_cr0_bug_test,
3269ad879127SKrish Sadhukhan 	  sel_cr0_bug_finished, sel_cr0_bug_check },
327010a65fc4SNadav Amit 	{ "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare,
3271ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, tsc_adjust_test,
3272ad879127SKrish Sadhukhan 	  default_finished, tsc_adjust_check },
3273ad879127SKrish Sadhukhan 	{ "latency_run_exit", default_supported, latency_prepare,
3274ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, latency_test,
3275ad879127SKrish Sadhukhan 	  latency_finished, latency_check },
3276f7fa53dcSPaolo Bonzini 	{ "latency_run_exit_clean", default_supported, latency_prepare,
3277f7fa53dcSPaolo Bonzini 	  default_prepare_gif_clear, latency_test,
3278f7fa53dcSPaolo Bonzini 	  latency_finished_clean, latency_check },
3279ad879127SKrish Sadhukhan 	{ "latency_svm_insn", default_supported, lat_svm_insn_prepare,
3280ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test,
3281ad879127SKrish Sadhukhan 	  lat_svm_insn_finished, lat_svm_insn_check },
32824b4fb247SPaolo Bonzini 	{ "exc_inject", default_supported, exc_inject_prepare,
32834b4fb247SPaolo Bonzini 	  default_prepare_gif_clear, exc_inject_test,
32844b4fb247SPaolo Bonzini 	  exc_inject_finished, exc_inject_check },
3285ad879127SKrish Sadhukhan 	{ "pending_event", default_supported, pending_event_prepare,
3286ad879127SKrish Sadhukhan 	  default_prepare_gif_clear,
3287ad879127SKrish Sadhukhan 	  pending_event_test, pending_event_finished, pending_event_check },
328885dc2aceSPaolo Bonzini 	{ "pending_event_cli", default_supported, pending_event_cli_prepare,
328985dc2aceSPaolo Bonzini 	  pending_event_cli_prepare_gif_clear,
329085dc2aceSPaolo Bonzini 	  pending_event_cli_test, pending_event_cli_finished,
329185dc2aceSPaolo Bonzini 	  pending_event_cli_check },
329285dc2aceSPaolo Bonzini 	{ "interrupt", default_supported, interrupt_prepare,
329385dc2aceSPaolo Bonzini 	  default_prepare_gif_clear, interrupt_test,
329485dc2aceSPaolo Bonzini 	  interrupt_finished, interrupt_check },
3295d4db486bSCathy Avery 	{ "nmi", default_supported, nmi_prepare,
3296d4db486bSCathy Avery 	  default_prepare_gif_clear, nmi_test,
3297d4db486bSCathy Avery 	  nmi_finished, nmi_check },
32989da1f4d8SCathy Avery 	{ "nmi_hlt", smp_supported, nmi_prepare,
32999da1f4d8SCathy Avery 	  default_prepare_gif_clear, nmi_hlt_test,
33009da1f4d8SCathy Avery 	  nmi_hlt_finished, nmi_hlt_check },
33019c838954SCathy Avery 	{ "virq_inject", default_supported, virq_inject_prepare,
33029c838954SCathy Avery 	  default_prepare_gif_clear, virq_inject_test,
33039c838954SCathy Avery 	  virq_inject_finished, virq_inject_check },
3304da338a31SMaxim Levitsky 	{ "reg_corruption", default_supported, reg_corruption_prepare,
3305da338a31SMaxim Levitsky 	  default_prepare_gif_clear, reg_corruption_test,
3306da338a31SMaxim Levitsky 	  reg_corruption_finished, reg_corruption_check },
33074770e9c8SCathy Avery 	{ "svm_init_startup_test", smp_supported, init_startup_prepare,
33084770e9c8SCathy Avery 	  default_prepare_gif_clear, null_test,
33094770e9c8SCathy Avery 	  init_startup_finished, init_startup_check },
3310d5da6dfeSCathy Avery 	{ "svm_init_intercept_test", smp_supported, init_intercept_prepare,
3311d5da6dfeSCathy Avery 	  default_prepare_gif_clear, init_intercept_test,
3312d5da6dfeSCathy Avery 	  init_intercept_finished, init_intercept_check, .on_vcpu = 2 },
33137839b0ecSKrish Sadhukhan 	{ "host_rflags", default_supported, host_rflags_prepare,
33147839b0ecSKrish Sadhukhan 	  host_rflags_prepare_gif_clear, host_rflags_test,
33157839b0ecSKrish Sadhukhan 	  host_rflags_finished, host_rflags_check },
3316f6972bd6SLara Lazier 	{ "vgif", vgif_supported, prepare_vgif_enabled,
3317f6972bd6SLara Lazier 	  default_prepare_gif_clear, test_vgif, vgif_finished,
3318f6972bd6SLara Lazier 	  vgif_check },
3319f32183f5SJim Mattson 	TEST(svm_cr4_osxsave_test),
3320ba29942cSKrish Sadhukhan 	TEST(svm_guest_state_test),
33217a57ef5dSMaxim Levitsky 	TEST(svm_vmrun_errata_test),
33220b6f6cedSKrish Sadhukhan 	TEST(svm_vmload_vmsave),
3323665f5677SKrish Sadhukhan 	TEST(svm_test_singlestep),
3324694e59baSManali Shukla 	TEST(svm_no_nm_test),
33258177dc62SManali Shukla 	TEST(svm_exception_test),
3326537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test0),
3327537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test1),
3328537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test2),
3329537d39dfSMaxim Levitsky 	TEST(svm_lbrv_nested_test1),
3330537d39dfSMaxim Levitsky 	TEST(svm_lbrv_nested_test2),
3331c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_if),
3332c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_gif),
3333c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_gif2),
3334c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_nmi),
3335c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_smi),
3336a8503d50SMaxim Levitsky 	TEST(svm_tsc_scale_test),
33378650dffeSMaxim Levitsky 	TEST(pause_filter_test),
3338ad879127SKrish Sadhukhan 	{ NULL, NULL, NULL, NULL, NULL, NULL, NULL }
3339ad879127SKrish Sadhukhan };
3340712840d5SManali Shukla 
3341712840d5SManali Shukla int main(int ac, char **av)
3342712840d5SManali Shukla {
3343ade7601dSSean Christopherson 	setup_vm();
3344712840d5SManali Shukla 	return run_svm_tests(ac, av, svm_tests);
3345712840d5SManali Shukla }
3346