xref: /kvm-unit-tests/x86/svm_tests.c (revision 573d62c697feca4c76e1bb62bd4e6b611aa2ee93)
1ad879127SKrish Sadhukhan #include "svm.h"
2ad879127SKrish Sadhukhan #include "libcflat.h"
3ad879127SKrish Sadhukhan #include "processor.h"
4ad879127SKrish Sadhukhan #include "desc.h"
5ad879127SKrish Sadhukhan #include "msr.h"
6ad879127SKrish Sadhukhan #include "vm.h"
7ad879127SKrish Sadhukhan #include "smp.h"
8ad879127SKrish Sadhukhan #include "alloc_page.h"
9ad879127SKrish Sadhukhan #include "isr.h"
10ad879127SKrish Sadhukhan #include "apic.h"
119da1f4d8SCathy Avery #include "delay.h"
12ddb85855SSean Christopherson #include "util.h"
138177dc62SManali Shukla #include "x86/usermode.h"
14c64f24fdSMaxim Levitsky #include "vmalloc.h"
15ad879127SKrish Sadhukhan 
16ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f
17ad879127SKrish Sadhukhan 
18ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000
19ad879127SKrish Sadhukhan 
20ad879127SKrish Sadhukhan u64 tsc_start;
21ad879127SKrish Sadhukhan u64 tsc_end;
22ad879127SKrish Sadhukhan 
23ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum;
24ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum;
25ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum;
26ad879127SKrish Sadhukhan u64 latvmrun_max;
27ad879127SKrish Sadhukhan u64 latvmrun_min;
28ad879127SKrish Sadhukhan u64 latvmexit_max;
29ad879127SKrish Sadhukhan u64 latvmexit_min;
30ad879127SKrish Sadhukhan u64 latvmload_max;
31ad879127SKrish Sadhukhan u64 latvmload_min;
32ad879127SKrish Sadhukhan u64 latvmsave_max;
33ad879127SKrish Sadhukhan u64 latvmsave_min;
34ad879127SKrish Sadhukhan u64 latstgi_max;
35ad879127SKrish Sadhukhan u64 latstgi_min;
36ad879127SKrish Sadhukhan u64 latclgi_max;
37ad879127SKrish Sadhukhan u64 latclgi_min;
38ad879127SKrish Sadhukhan u64 runs;
39ad879127SKrish Sadhukhan 
40ad879127SKrish Sadhukhan static void null_test(struct svm_test *test)
41ad879127SKrish Sadhukhan {
42ad879127SKrish Sadhukhan }
43ad879127SKrish Sadhukhan 
44ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test)
45ad879127SKrish Sadhukhan {
46096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_VMMCALL;
47ad879127SKrish Sadhukhan }
48ad879127SKrish Sadhukhan 
49ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test)
50ad879127SKrish Sadhukhan {
51096cf7feSPaolo Bonzini 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN);
52ad879127SKrish Sadhukhan }
53ad879127SKrish Sadhukhan 
54ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test)
55ad879127SKrish Sadhukhan {
56096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_ERR;
57ad879127SKrish Sadhukhan }
58ad879127SKrish Sadhukhan 
59ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test)
60ad879127SKrish Sadhukhan {
61096cf7feSPaolo Bonzini 	asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb)));
62ad879127SKrish Sadhukhan }
63ad879127SKrish Sadhukhan 
64ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test)
65ad879127SKrish Sadhukhan {
66096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_VMRUN;
67ad879127SKrish Sadhukhan }
68ad879127SKrish Sadhukhan 
69401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test)
70401299a5SPaolo Bonzini {
71401299a5SPaolo Bonzini 	default_prepare(test);
72401299a5SPaolo Bonzini 	vmcb->control.intercept |= 1 << INTERCEPT_RSM;
73401299a5SPaolo Bonzini 	vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR);
74401299a5SPaolo Bonzini }
75401299a5SPaolo Bonzini 
76401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test)
77401299a5SPaolo Bonzini {
78401299a5SPaolo Bonzini 	asm volatile ("rsm" : : : "memory");
79401299a5SPaolo Bonzini }
80401299a5SPaolo Bonzini 
81401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test)
82401299a5SPaolo Bonzini {
83401299a5SPaolo Bonzini 	return get_test_stage(test) == 2;
84401299a5SPaolo Bonzini }
85401299a5SPaolo Bonzini 
86401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test)
87401299a5SPaolo Bonzini {
88401299a5SPaolo Bonzini 	switch (get_test_stage(test)) {
89401299a5SPaolo Bonzini 	case 0:
90401299a5SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_RSM) {
91198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to rsm. Exit reason 0x%x",
92401299a5SPaolo Bonzini 				    vmcb->control.exit_code);
93401299a5SPaolo Bonzini 			return true;
94401299a5SPaolo Bonzini 		}
95401299a5SPaolo Bonzini 		vmcb->control.intercept &= ~(1 << INTERCEPT_RSM);
96401299a5SPaolo Bonzini 		inc_test_stage(test);
97401299a5SPaolo Bonzini 		break;
98401299a5SPaolo Bonzini 
99401299a5SPaolo Bonzini 	case 1:
100401299a5SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) {
101198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to #UD. Exit reason 0x%x",
102401299a5SPaolo Bonzini 				    vmcb->control.exit_code);
103401299a5SPaolo Bonzini 			return true;
104401299a5SPaolo Bonzini 		}
105401299a5SPaolo Bonzini 		vmcb->save.rip += 2;
106401299a5SPaolo Bonzini 		inc_test_stage(test);
107401299a5SPaolo Bonzini 		break;
108401299a5SPaolo Bonzini 
109401299a5SPaolo Bonzini 	default:
110401299a5SPaolo Bonzini 		return true;
111401299a5SPaolo Bonzini 	}
112401299a5SPaolo Bonzini 	return get_test_stage(test) == 2;
113401299a5SPaolo Bonzini }
114401299a5SPaolo Bonzini 
115ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test)
116ad879127SKrish Sadhukhan {
117ad879127SKrish Sadhukhan 	default_prepare(test);
118096cf7feSPaolo Bonzini 	vmcb->control.intercept_cr_read |= 1 << 3;
119ad879127SKrish Sadhukhan }
120ad879127SKrish Sadhukhan 
121ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test)
122ad879127SKrish Sadhukhan {
123ad879127SKrish Sadhukhan 	asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory");
124ad879127SKrish Sadhukhan }
125ad879127SKrish Sadhukhan 
126ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test)
127ad879127SKrish Sadhukhan {
128096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_READ_CR3;
129ad879127SKrish Sadhukhan }
130ad879127SKrish Sadhukhan 
131ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test)
132ad879127SKrish Sadhukhan {
133ad879127SKrish Sadhukhan 	return null_check(test) && test->scratch == read_cr3();
134ad879127SKrish Sadhukhan }
135ad879127SKrish Sadhukhan 
136ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test)
137ad879127SKrish Sadhukhan {
138ad879127SKrish Sadhukhan 	struct svm_test *test = _test;
139ad879127SKrish Sadhukhan 	extern volatile u32 mmio_insn;
140ad879127SKrish Sadhukhan 
141ad879127SKrish Sadhukhan 	while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2))
142ad879127SKrish Sadhukhan 		pause();
143ad879127SKrish Sadhukhan 	pause();
144ad879127SKrish Sadhukhan 	pause();
145ad879127SKrish Sadhukhan 	pause();
146ad879127SKrish Sadhukhan 	mmio_insn = 0x90d8200f;  // mov %cr3, %rax; nop
147ad879127SKrish Sadhukhan }
148ad879127SKrish Sadhukhan 
149ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test)
150ad879127SKrish Sadhukhan {
151ad879127SKrish Sadhukhan 	default_prepare(test);
152096cf7feSPaolo Bonzini 	vmcb->control.intercept_cr_read |= 1 << 3;
153ad879127SKrish Sadhukhan 	on_cpu_async(1, corrupt_cr3_intercept_bypass, test);
154ad879127SKrish Sadhukhan }
155ad879127SKrish Sadhukhan 
156ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test)
157ad879127SKrish Sadhukhan {
158ad879127SKrish Sadhukhan 	ulong a = 0xa0000;
159ad879127SKrish Sadhukhan 
160ad879127SKrish Sadhukhan 	test->scratch = 1;
161ad879127SKrish Sadhukhan 	while (test->scratch != 2)
162ad879127SKrish Sadhukhan 		barrier();
163ad879127SKrish Sadhukhan 
164ad879127SKrish Sadhukhan 	asm volatile ("mmio_insn: mov %0, (%0); nop"
165ad879127SKrish Sadhukhan 		      : "+a"(a) : : "memory");
166ad879127SKrish Sadhukhan 	test->scratch = a;
167ad879127SKrish Sadhukhan }
168ad879127SKrish Sadhukhan 
169ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test)
170ad879127SKrish Sadhukhan {
171ad879127SKrish Sadhukhan 	default_prepare(test);
172096cf7feSPaolo Bonzini 	vmcb->control.intercept_dr_read = 0xff;
173096cf7feSPaolo Bonzini 	vmcb->control.intercept_dr_write = 0xff;
174ad879127SKrish Sadhukhan }
175ad879127SKrish Sadhukhan 
176ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test)
177ad879127SKrish Sadhukhan {
178ad879127SKrish Sadhukhan 	unsigned int i, failcnt = 0;
179ad879127SKrish Sadhukhan 
180ad879127SKrish Sadhukhan 	/* Loop testing debug register reads */
181ad879127SKrish Sadhukhan 	for (i = 0; i < 8; i++) {
182ad879127SKrish Sadhukhan 
183ad879127SKrish Sadhukhan 		switch (i) {
184ad879127SKrish Sadhukhan 		case 0:
185ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory");
186ad879127SKrish Sadhukhan 			break;
187ad879127SKrish Sadhukhan 		case 1:
188ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory");
189ad879127SKrish Sadhukhan 			break;
190ad879127SKrish Sadhukhan 		case 2:
191ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory");
192ad879127SKrish Sadhukhan 			break;
193ad879127SKrish Sadhukhan 		case 3:
194ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory");
195ad879127SKrish Sadhukhan 			break;
196ad879127SKrish Sadhukhan 		case 4:
197ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory");
198ad879127SKrish Sadhukhan 			break;
199ad879127SKrish Sadhukhan 		case 5:
200ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory");
201ad879127SKrish Sadhukhan 			break;
202ad879127SKrish Sadhukhan 		case 6:
203ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory");
204ad879127SKrish Sadhukhan 			break;
205ad879127SKrish Sadhukhan 		case 7:
206ad879127SKrish Sadhukhan 			asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory");
207ad879127SKrish Sadhukhan 			break;
208ad879127SKrish Sadhukhan 		}
209ad879127SKrish Sadhukhan 
210ad879127SKrish Sadhukhan 		if (test->scratch != i) {
211198dfd0eSJanis Schoetterl-Glausch 			report_fail("dr%u read intercept", i);
212ad879127SKrish Sadhukhan 			failcnt++;
213ad879127SKrish Sadhukhan 		}
214ad879127SKrish Sadhukhan 	}
215ad879127SKrish Sadhukhan 
216ad879127SKrish Sadhukhan 	/* Loop testing debug register writes */
217ad879127SKrish Sadhukhan 	for (i = 0; i < 8; i++) {
218ad879127SKrish Sadhukhan 
219ad879127SKrish Sadhukhan 		switch (i) {
220ad879127SKrish Sadhukhan 		case 0:
221ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory");
222ad879127SKrish Sadhukhan 			break;
223ad879127SKrish Sadhukhan 		case 1:
224ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory");
225ad879127SKrish Sadhukhan 			break;
226ad879127SKrish Sadhukhan 		case 2:
227ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory");
228ad879127SKrish Sadhukhan 			break;
229ad879127SKrish Sadhukhan 		case 3:
230ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory");
231ad879127SKrish Sadhukhan 			break;
232ad879127SKrish Sadhukhan 		case 4:
233ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory");
234ad879127SKrish Sadhukhan 			break;
235ad879127SKrish Sadhukhan 		case 5:
236ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory");
237ad879127SKrish Sadhukhan 			break;
238ad879127SKrish Sadhukhan 		case 6:
239ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory");
240ad879127SKrish Sadhukhan 			break;
241ad879127SKrish Sadhukhan 		case 7:
242ad879127SKrish Sadhukhan 			asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory");
243ad879127SKrish Sadhukhan 			break;
244ad879127SKrish Sadhukhan 		}
245ad879127SKrish Sadhukhan 
246ad879127SKrish Sadhukhan 		if (test->scratch != i) {
247198dfd0eSJanis Schoetterl-Glausch 			report_fail("dr%u write intercept", i);
248ad879127SKrish Sadhukhan 			failcnt++;
249ad879127SKrish Sadhukhan 		}
250ad879127SKrish Sadhukhan 	}
251ad879127SKrish Sadhukhan 
252ad879127SKrish Sadhukhan 	test->scratch = failcnt;
253ad879127SKrish Sadhukhan }
254ad879127SKrish Sadhukhan 
255ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test)
256ad879127SKrish Sadhukhan {
257096cf7feSPaolo Bonzini 	ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0);
258ad879127SKrish Sadhukhan 
259ad879127SKrish Sadhukhan 	/* Only expect DR intercepts */
260ad879127SKrish Sadhukhan 	if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0))
261ad879127SKrish Sadhukhan 		return true;
262ad879127SKrish Sadhukhan 
263ad879127SKrish Sadhukhan 	/*
264ad879127SKrish Sadhukhan 	 * Compute debug register number.
265ad879127SKrish Sadhukhan 	 * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture
266ad879127SKrish Sadhukhan 	 * Programmer's Manual Volume 2 - System Programming:
267ad879127SKrish Sadhukhan 	 * http://support.amd.com/TechDocs/24593.pdf
268ad879127SKrish Sadhukhan 	 * there are 16 VMEXIT codes each for DR read and write.
269ad879127SKrish Sadhukhan 	 */
270ad879127SKrish Sadhukhan 	test->scratch = (n % 16);
271ad879127SKrish Sadhukhan 
272ad879127SKrish Sadhukhan 	/* Jump over MOV instruction */
273096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
274ad879127SKrish Sadhukhan 
275ad879127SKrish Sadhukhan 	return false;
276ad879127SKrish Sadhukhan }
277ad879127SKrish Sadhukhan 
278ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test)
279ad879127SKrish Sadhukhan {
280ad879127SKrish Sadhukhan 	return !test->scratch;
281ad879127SKrish Sadhukhan }
282ad879127SKrish Sadhukhan 
283ad879127SKrish Sadhukhan static bool next_rip_supported(void)
284ad879127SKrish Sadhukhan {
285ad879127SKrish Sadhukhan 	return this_cpu_has(X86_FEATURE_NRIPS);
286ad879127SKrish Sadhukhan }
287ad879127SKrish Sadhukhan 
288ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test)
289ad879127SKrish Sadhukhan {
290096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC);
291ad879127SKrish Sadhukhan }
292ad879127SKrish Sadhukhan 
293ad879127SKrish Sadhukhan 
294ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test)
295ad879127SKrish Sadhukhan {
296ad879127SKrish Sadhukhan 	asm volatile ("rdtsc\n\t"
297ad879127SKrish Sadhukhan 		      ".globl exp_next_rip\n\t"
298ad879127SKrish Sadhukhan 		      "exp_next_rip:\n\t" ::: "eax", "edx");
299ad879127SKrish Sadhukhan }
300ad879127SKrish Sadhukhan 
301ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test)
302ad879127SKrish Sadhukhan {
303ad879127SKrish Sadhukhan 	extern char exp_next_rip;
304ad879127SKrish Sadhukhan 	unsigned long address = (unsigned long)&exp_next_rip;
305ad879127SKrish Sadhukhan 
306096cf7feSPaolo Bonzini 	return address == vmcb->control.next_rip;
307ad879127SKrish Sadhukhan }
308ad879127SKrish Sadhukhan 
309ad879127SKrish Sadhukhan extern u8 *msr_bitmap;
310ad879127SKrish Sadhukhan 
311ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test)
312ad879127SKrish Sadhukhan {
313ad879127SKrish Sadhukhan 	default_prepare(test);
314096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT);
315ad879127SKrish Sadhukhan 	memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE);
316ad879127SKrish Sadhukhan }
317ad879127SKrish Sadhukhan 
318ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test)
319ad879127SKrish Sadhukhan {
320ad879127SKrish Sadhukhan 	unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */
321ad879127SKrish Sadhukhan 	unsigned long msr_index;
32227eeac46SSean Christopherson 	u64 ignored;
32327eeac46SSean Christopherson 	int vector;
324ad879127SKrish Sadhukhan 
325*573d62c6SSean Christopherson 	for (msr_index = 0; msr_index <= 0xc0012000; msr_index++) {
326ad879127SKrish Sadhukhan 		if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) {
327ad879127SKrish Sadhukhan 			/*
328ad879127SKrish Sadhukhan 			 * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture
329ad879127SKrish Sadhukhan 			 * Programmer's Manual volume 2 - System Programming:
330ad879127SKrish Sadhukhan 			 * http://support.amd.com/TechDocs/24593.pdf
331ad879127SKrish Sadhukhan 			 * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR.
332ad879127SKrish Sadhukhan 			 */
333ad879127SKrish Sadhukhan 			continue;
334ad879127SKrish Sadhukhan 		}
335ad879127SKrish Sadhukhan 
336*573d62c6SSean Christopherson 		/*
337*573d62c6SSean Christopherson 		 * Test one MSR just before and after each range, but otherwise
338*573d62c6SSean Christopherson 		 * skips gaps between supported MSR ranges.
339*573d62c6SSean Christopherson 		 */
340*573d62c6SSean Christopherson 		if (msr_index == 0x2000 + 1)
341*573d62c6SSean Christopherson 			msr_index = 0xc0000000 - 1;
342*573d62c6SSean Christopherson 		else if (msr_index == 0xc0002000 + 1)
343*573d62c6SSean Christopherson 			msr_index = 0xc0010000 - 1;
344ad879127SKrish Sadhukhan 
345ad879127SKrish Sadhukhan 		test->scratch = -1;
346ad879127SKrish Sadhukhan 
34727eeac46SSean Christopherson 		vector = rdmsr_safe(msr_index, &ignored);
34827eeac46SSean Christopherson 		if (vector)
34927eeac46SSean Christopherson 			report_fail("Expected RDMSR(0x%lx) to #VMEXIT, got exception '%u'",
35027eeac46SSean Christopherson 				    msr_index, vector);
35127eeac46SSean Christopherson 		else if (test->scratch != msr_index)
35227eeac46SSean Christopherson 			report_fail("Expected RDMSR(0x%lx) to #VMEXIT, got scratch '%ld",
35327eeac46SSean Christopherson 				    msr_index, test->scratch);
354ad879127SKrish Sadhukhan 
355ad879127SKrish Sadhukhan 		/*
356ad879127SKrish Sadhukhan 		 * Poor man approach to generate a value that
357ad879127SKrish Sadhukhan 		 * seems arbitrary each time around the loop.
358ad879127SKrish Sadhukhan 		 */
359ad879127SKrish Sadhukhan 		msr_value += (msr_value << 1);
360ad879127SKrish Sadhukhan 
36127eeac46SSean Christopherson 		vector = wrmsr_safe(msr_index, msr_value);
36227eeac46SSean Christopherson 		if (vector)
36327eeac46SSean Christopherson 			report_fail("Expected WRMSR(0x%0lx) to #VMEXIT, got exception '%u'",
36427eeac46SSean Christopherson 				    msr_index, vector);
36527eeac46SSean Christopherson 		else if (test->scratch != msr_value)
36627eeac46SSean Christopherson 			report_fail("Expected WRMSR(0x%lx) to #VMEXIT, got scratch '%ld' (wanted %ld)",
36727eeac46SSean Christopherson 				    msr_index, test->scratch, msr_value);
368ad879127SKrish Sadhukhan 	}
369ad879127SKrish Sadhukhan 
370ad879127SKrish Sadhukhan 	test->scratch = -2;
371ad879127SKrish Sadhukhan }
372ad879127SKrish Sadhukhan 
373ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test)
374ad879127SKrish Sadhukhan {
375096cf7feSPaolo Bonzini 	u32 exit_code = vmcb->control.exit_code;
376ad879127SKrish Sadhukhan 
37727eeac46SSean Christopherson 	if (exit_code == SVM_EXIT_VMMCALL)
378ad879127SKrish Sadhukhan 		return true;
379ad879127SKrish Sadhukhan 
38027eeac46SSean Christopherson 	if (exit_code != SVM_EXIT_MSR) {
38127eeac46SSean Christopherson 		report_fail("Wanted MSR VM-Exit, got reason 0x%x", exit_code);
382ad879127SKrish Sadhukhan 		return true;
383ad879127SKrish Sadhukhan 	}
384ad879127SKrish Sadhukhan 
385ad879127SKrish Sadhukhan 	/* Jump over RDMSR/WRMSR instruction */
386096cf7feSPaolo Bonzini 	vmcb->save.rip += 2;
387ad879127SKrish Sadhukhan 
388ad879127SKrish Sadhukhan 	/*
389ad879127SKrish Sadhukhan 	 * Test whether the intercept was for RDMSR/WRMSR.
390ad879127SKrish Sadhukhan 	 * For RDMSR, test->scratch is set to the MSR index;
391ad879127SKrish Sadhukhan 	 *      RCX holds the MSR index.
392ad879127SKrish Sadhukhan 	 * For WRMSR, test->scratch is set to the MSR value;
393ad879127SKrish Sadhukhan 	 *      RDX holds the upper 32 bits of the MSR value,
394ad879127SKrish Sadhukhan 	 *      while RAX hold its lower 32 bits.
395ad879127SKrish Sadhukhan 	 */
39627eeac46SSean Christopherson 	if (vmcb->control.exit_info_1)
39727eeac46SSean Christopherson 		test->scratch = ((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff));
398ad879127SKrish Sadhukhan 	else
399ad879127SKrish Sadhukhan 		test->scratch = get_regs().rcx;
400ad879127SKrish Sadhukhan 
401ad879127SKrish Sadhukhan 	return false;
402ad879127SKrish Sadhukhan }
403ad879127SKrish Sadhukhan 
404ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test)
405ad879127SKrish Sadhukhan {
406ad879127SKrish Sadhukhan 	memset(msr_bitmap, 0, MSR_BITMAP_SIZE);
407ad879127SKrish Sadhukhan 	return (test->scratch == -2);
408ad879127SKrish Sadhukhan }
409ad879127SKrish Sadhukhan 
410ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test)
411ad879127SKrish Sadhukhan {
412096cf7feSPaolo Bonzini 	vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR)
413ad879127SKrish Sadhukhan 		|  (1ULL << UD_VECTOR)
414ad879127SKrish Sadhukhan 		|  (1ULL << DF_VECTOR)
415ad879127SKrish Sadhukhan 		|  (1ULL << PF_VECTOR);
416ad879127SKrish Sadhukhan 	test->scratch = 0;
417ad879127SKrish Sadhukhan }
418ad879127SKrish Sadhukhan 
419ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test)
420ad879127SKrish Sadhukhan {
421ad879127SKrish Sadhukhan 	asm volatile("	cli\n"
422ad879127SKrish Sadhukhan 		     "	ljmp *1f\n" /* jump to 32-bit code segment */
423ad879127SKrish Sadhukhan 		     "1:\n"
424ad879127SKrish Sadhukhan 		     "	.long 2f\n"
425ad879127SKrish Sadhukhan 		     "	.long " xstr(KERNEL_CS32) "\n"
426ad879127SKrish Sadhukhan 		     ".code32\n"
427ad879127SKrish Sadhukhan 		     "2:\n"
428ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
429ad879127SKrish Sadhukhan 		     "	btcl  $31, %%eax\n" /* clear PG */
430ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
431ad879127SKrish Sadhukhan 		     "	movl $0xc0000080, %%ecx\n" /* EFER */
432ad879127SKrish Sadhukhan 		     "	rdmsr\n"
433ad879127SKrish Sadhukhan 		     "	btcl $8, %%eax\n" /* clear LME */
434ad879127SKrish Sadhukhan 		     "	wrmsr\n"
435ad879127SKrish Sadhukhan 		     "	movl %%cr4, %%eax\n"
436ad879127SKrish Sadhukhan 		     "	btcl $5, %%eax\n" /* clear PAE */
437ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr4\n"
438ad879127SKrish Sadhukhan 		     "	movw %[ds16], %%ax\n"
439ad879127SKrish Sadhukhan 		     "	movw %%ax, %%ds\n"
440ad879127SKrish Sadhukhan 		     "	ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */
441ad879127SKrish Sadhukhan 		     ".code16\n"
442ad879127SKrish Sadhukhan 		     "3:\n"
443ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
444ad879127SKrish Sadhukhan 		     "	btcl $0, %%eax\n" /* clear PE  */
445ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
446ad879127SKrish Sadhukhan 		     "	ljmpl $0, $4f\n"   /* jump to real-mode */
447ad879127SKrish Sadhukhan 		     "4:\n"
448ad879127SKrish Sadhukhan 		     "	vmmcall\n"
449ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
450ad879127SKrish Sadhukhan 		     "	btsl $0, %%eax\n" /* set PE  */
451ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
452ad879127SKrish Sadhukhan 		     "	ljmpl %[cs32], $5f\n" /* back to protected mode */
453ad879127SKrish Sadhukhan 		     ".code32\n"
454ad879127SKrish Sadhukhan 		     "5:\n"
455ad879127SKrish Sadhukhan 		     "	movl %%cr4, %%eax\n"
456ad879127SKrish Sadhukhan 		     "	btsl $5, %%eax\n" /* set PAE */
457ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr4\n"
458ad879127SKrish Sadhukhan 		     "	movl $0xc0000080, %%ecx\n" /* EFER */
459ad879127SKrish Sadhukhan 		     "	rdmsr\n"
460ad879127SKrish Sadhukhan 		     "	btsl $8, %%eax\n" /* set LME */
461ad879127SKrish Sadhukhan 		     "	wrmsr\n"
462ad879127SKrish Sadhukhan 		     "	movl %%cr0, %%eax\n"
463ad879127SKrish Sadhukhan 		     "	btsl  $31, %%eax\n" /* set PG */
464ad879127SKrish Sadhukhan 		     "	movl %%eax, %%cr0\n"
465ad879127SKrish Sadhukhan 		     "	ljmpl %[cs64], $6f\n"    /* back to long mode */
466ad879127SKrish Sadhukhan 		     ".code64\n\t"
467ad879127SKrish Sadhukhan 		     "6:\n"
468ad879127SKrish Sadhukhan 		     "	vmmcall\n"
469ad879127SKrish Sadhukhan 		     :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16),
470ad879127SKrish Sadhukhan 		      [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64)
471ad879127SKrish Sadhukhan 		     : "rax", "rbx", "rcx", "rdx", "memory");
472ad879127SKrish Sadhukhan }
473ad879127SKrish Sadhukhan 
474ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test)
475ad879127SKrish Sadhukhan {
476ad879127SKrish Sadhukhan 	u64 cr0, cr4, efer;
477ad879127SKrish Sadhukhan 
478096cf7feSPaolo Bonzini 	cr0  = vmcb->save.cr0;
479096cf7feSPaolo Bonzini 	cr4  = vmcb->save.cr4;
480096cf7feSPaolo Bonzini 	efer = vmcb->save.efer;
481ad879127SKrish Sadhukhan 
482ad879127SKrish Sadhukhan 	/* Only expect VMMCALL intercepts */
483096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL)
484ad879127SKrish Sadhukhan 		return true;
485ad879127SKrish Sadhukhan 
486ad879127SKrish Sadhukhan 	/* Jump over VMMCALL instruction */
487096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
488ad879127SKrish Sadhukhan 
489ad879127SKrish Sadhukhan 	/* Do sanity checks */
490ad879127SKrish Sadhukhan 	switch (test->scratch) {
491ad879127SKrish Sadhukhan 	case 0:
492ad879127SKrish Sadhukhan 		/* Test should be in real mode now - check for this */
493ad879127SKrish Sadhukhan 		if ((cr0  & 0x80000001) || /* CR0.PG, CR0.PE */
494ad879127SKrish Sadhukhan 		    (cr4  & 0x00000020) || /* CR4.PAE */
495ad879127SKrish Sadhukhan 		    (efer & 0x00000500))   /* EFER.LMA, EFER.LME */
496ad879127SKrish Sadhukhan 			return true;
497ad879127SKrish Sadhukhan 		break;
498ad879127SKrish Sadhukhan 	case 2:
499ad879127SKrish Sadhukhan 		/* Test should be back in long-mode now - check for this */
500ad879127SKrish Sadhukhan 		if (((cr0  & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */
501ad879127SKrish Sadhukhan 		    ((cr4  & 0x00000020) != 0x00000020) || /* CR4.PAE */
502ad879127SKrish Sadhukhan 		    ((efer & 0x00000500) != 0x00000500))   /* EFER.LMA, EFER.LME */
503ad879127SKrish Sadhukhan 			return true;
504ad879127SKrish Sadhukhan 		break;
505ad879127SKrish Sadhukhan 	}
506ad879127SKrish Sadhukhan 
507ad879127SKrish Sadhukhan 	/* one step forward */
508ad879127SKrish Sadhukhan 	test->scratch += 1;
509ad879127SKrish Sadhukhan 
510ad879127SKrish Sadhukhan 	return test->scratch == 2;
511ad879127SKrish Sadhukhan }
512ad879127SKrish Sadhukhan 
513ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test)
514ad879127SKrish Sadhukhan {
515ad879127SKrish Sadhukhan 	return test->scratch == 2;
516ad879127SKrish Sadhukhan }
517ad879127SKrish Sadhukhan 
518ad879127SKrish Sadhukhan extern u8 *io_bitmap;
519ad879127SKrish Sadhukhan 
520ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test)
521ad879127SKrish Sadhukhan {
522096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT);
523ad879127SKrish Sadhukhan 	test->scratch = 0;
524ad879127SKrish Sadhukhan 	memset(io_bitmap, 0, 8192);
525ad879127SKrish Sadhukhan 	io_bitmap[8192] = 0xFF;
526ad879127SKrish Sadhukhan }
527ad879127SKrish Sadhukhan 
528ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test)
529ad879127SKrish Sadhukhan {
530ad879127SKrish Sadhukhan 	// stage 0, test IO pass
531ad879127SKrish Sadhukhan 	inb(0x5000);
532ad879127SKrish Sadhukhan 	outb(0x0, 0x5000);
533ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 0)
534ad879127SKrish Sadhukhan 		goto fail;
535ad879127SKrish Sadhukhan 
536ad879127SKrish Sadhukhan 	// test IO width, in/out
537ad879127SKrish Sadhukhan 	io_bitmap[0] = 0xFF;
538ad879127SKrish Sadhukhan 	inc_test_stage(test);
539ad879127SKrish Sadhukhan 	inb(0x0);
540ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 2)
541ad879127SKrish Sadhukhan 		goto fail;
542ad879127SKrish Sadhukhan 
543ad879127SKrish Sadhukhan 	outw(0x0, 0x0);
544ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 3)
545ad879127SKrish Sadhukhan 		goto fail;
546ad879127SKrish Sadhukhan 
547ad879127SKrish Sadhukhan 	inl(0x0);
548ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 4)
549ad879127SKrish Sadhukhan 		goto fail;
550ad879127SKrish Sadhukhan 
551ad879127SKrish Sadhukhan 	// test low/high IO port
552ad879127SKrish Sadhukhan 	io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
553ad879127SKrish Sadhukhan 	inb(0x5000);
554ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 5)
555ad879127SKrish Sadhukhan 		goto fail;
556ad879127SKrish Sadhukhan 
557ad879127SKrish Sadhukhan 	io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8));
558ad879127SKrish Sadhukhan 	inw(0x9000);
559ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 6)
560ad879127SKrish Sadhukhan 		goto fail;
561ad879127SKrish Sadhukhan 
562ad879127SKrish Sadhukhan 	// test partial pass
563ad879127SKrish Sadhukhan 	io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
564ad879127SKrish Sadhukhan 	inl(0x4FFF);
565ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 7)
566ad879127SKrish Sadhukhan 		goto fail;
567ad879127SKrish Sadhukhan 
568ad879127SKrish Sadhukhan 	// test across pages
569ad879127SKrish Sadhukhan 	inc_test_stage(test);
570ad879127SKrish Sadhukhan 	inl(0x7FFF);
571ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 8)
572ad879127SKrish Sadhukhan 		goto fail;
573ad879127SKrish Sadhukhan 
574ad879127SKrish Sadhukhan 	inc_test_stage(test);
575ad879127SKrish Sadhukhan 	io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8);
576ad879127SKrish Sadhukhan 	inl(0x7FFF);
577ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 10)
578ad879127SKrish Sadhukhan 		goto fail;
579ad879127SKrish Sadhukhan 
580ad879127SKrish Sadhukhan 	io_bitmap[0] = 0;
581ad879127SKrish Sadhukhan 	inl(0xFFFF);
582ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 11)
583ad879127SKrish Sadhukhan 		goto fail;
584ad879127SKrish Sadhukhan 
585ad879127SKrish Sadhukhan 	io_bitmap[0] = 0xFF;
586ad879127SKrish Sadhukhan 	io_bitmap[8192] = 0;
587ad879127SKrish Sadhukhan 	inl(0xFFFF);
588ad879127SKrish Sadhukhan 	inc_test_stage(test);
589ad879127SKrish Sadhukhan 	if (get_test_stage(test) != 12)
590ad879127SKrish Sadhukhan 		goto fail;
591ad879127SKrish Sadhukhan 
592ad879127SKrish Sadhukhan 	return;
593ad879127SKrish Sadhukhan 
594ad879127SKrish Sadhukhan fail:
595198dfd0eSJanis Schoetterl-Glausch 	report_fail("stage %d", get_test_stage(test));
596ad879127SKrish Sadhukhan 	test->scratch = -1;
597ad879127SKrish Sadhukhan }
598ad879127SKrish Sadhukhan 
599ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test)
600ad879127SKrish Sadhukhan {
601ad879127SKrish Sadhukhan 	unsigned port, size;
602ad879127SKrish Sadhukhan 
603ad879127SKrish Sadhukhan 	/* Only expect IOIO intercepts */
604096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code == SVM_EXIT_VMMCALL)
605ad879127SKrish Sadhukhan 		return true;
606ad879127SKrish Sadhukhan 
607096cf7feSPaolo Bonzini 	if (vmcb->control.exit_code != SVM_EXIT_IOIO)
608ad879127SKrish Sadhukhan 		return true;
609ad879127SKrish Sadhukhan 
610ad879127SKrish Sadhukhan 	/* one step forward */
611ad879127SKrish Sadhukhan 	test->scratch += 1;
612ad879127SKrish Sadhukhan 
613096cf7feSPaolo Bonzini 	port = vmcb->control.exit_info_1 >> 16;
614096cf7feSPaolo Bonzini 	size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7;
615ad879127SKrish Sadhukhan 
616ad879127SKrish Sadhukhan 	while (size--) {
617ad879127SKrish Sadhukhan 		io_bitmap[port / 8] &= ~(1 << (port & 7));
618ad879127SKrish Sadhukhan 		port++;
619ad879127SKrish Sadhukhan 	}
620ad879127SKrish Sadhukhan 
621ad879127SKrish Sadhukhan 	return false;
622ad879127SKrish Sadhukhan }
623ad879127SKrish Sadhukhan 
624ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test)
625ad879127SKrish Sadhukhan {
626ad879127SKrish Sadhukhan 	memset(io_bitmap, 0, 8193);
627ad879127SKrish Sadhukhan 	return test->scratch != -1;
628ad879127SKrish Sadhukhan }
629ad879127SKrish Sadhukhan 
630ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test)
631ad879127SKrish Sadhukhan {
632096cf7feSPaolo Bonzini 	vmcb->control.asid = 0;
633ad879127SKrish Sadhukhan }
634ad879127SKrish Sadhukhan 
635ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test)
636ad879127SKrish Sadhukhan {
637ad879127SKrish Sadhukhan 	asm volatile ("vmmcall\n\t");
638ad879127SKrish Sadhukhan }
639ad879127SKrish Sadhukhan 
640ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test)
641ad879127SKrish Sadhukhan {
642096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_ERR;
643ad879127SKrish Sadhukhan }
644ad879127SKrish Sadhukhan 
645ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test)
646ad879127SKrish Sadhukhan {
647096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0);
648ad879127SKrish Sadhukhan }
649ad879127SKrish Sadhukhan 
650ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test)
651ad879127SKrish Sadhukhan {
652ad879127SKrish Sadhukhan 	return true;
653ad879127SKrish Sadhukhan }
654ad879127SKrish Sadhukhan 
655ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test)
656ad879127SKrish Sadhukhan {
657ad879127SKrish Sadhukhan 	unsigned long cr0;
658ad879127SKrish Sadhukhan 
659ad879127SKrish Sadhukhan 	/* read cr0, clear CD, and write back */
660ad879127SKrish Sadhukhan 	cr0  = read_cr0();
661ad879127SKrish Sadhukhan 	cr0 |= (1UL << 30);
662ad879127SKrish Sadhukhan 	write_cr0(cr0);
663ad879127SKrish Sadhukhan 
664ad879127SKrish Sadhukhan 	/*
665ad879127SKrish Sadhukhan 	 * If we are here the test failed, not sure what to do now because we
666ad879127SKrish Sadhukhan 	 * are not in guest-mode anymore so we can't trigger an intercept.
667ad879127SKrish Sadhukhan 	 * Trigger a tripple-fault for now.
668ad879127SKrish Sadhukhan 	 */
669198dfd0eSJanis Schoetterl-Glausch 	report_fail("sel_cr0 test. Can not recover from this - exiting");
670ad879127SKrish Sadhukhan 	exit(report_summary());
671ad879127SKrish Sadhukhan }
672ad879127SKrish Sadhukhan 
673ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test)
674ad879127SKrish Sadhukhan {
675096cf7feSPaolo Bonzini 	return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE;
676ad879127SKrish Sadhukhan }
677ad879127SKrish Sadhukhan 
678ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE    (1ll << 32)
679f3154609SBill Wendling #define TSC_OFFSET_VALUE    (~0ull << 48)
680ad879127SKrish Sadhukhan static bool ok;
681ad879127SKrish Sadhukhan 
68210a65fc4SNadav Amit static bool tsc_adjust_supported(void)
68310a65fc4SNadav Amit {
68410a65fc4SNadav Amit 	return this_cpu_has(X86_FEATURE_TSC_ADJUST);
68510a65fc4SNadav Amit }
68610a65fc4SNadav Amit 
687ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test)
688ad879127SKrish Sadhukhan {
689ad879127SKrish Sadhukhan 	default_prepare(test);
690096cf7feSPaolo Bonzini 	vmcb->control.tsc_offset = TSC_OFFSET_VALUE;
691ad879127SKrish Sadhukhan 
692ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE);
693ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
694ad879127SKrish Sadhukhan 	ok = adjust == -TSC_ADJUST_VALUE;
695ad879127SKrish Sadhukhan }
696ad879127SKrish Sadhukhan 
697ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test)
698ad879127SKrish Sadhukhan {
699ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
700ad879127SKrish Sadhukhan 	ok &= adjust == -TSC_ADJUST_VALUE;
701ad879127SKrish Sadhukhan 
702ad879127SKrish Sadhukhan 	uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE;
703ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE);
704ad879127SKrish Sadhukhan 
705ad879127SKrish Sadhukhan 	adjust = rdmsr(MSR_IA32_TSC_ADJUST);
706ad879127SKrish Sadhukhan 	ok &= adjust <= -2 * TSC_ADJUST_VALUE;
707ad879127SKrish Sadhukhan 
708ad879127SKrish Sadhukhan 	uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE;
709ad879127SKrish Sadhukhan 	ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
710ad879127SKrish Sadhukhan 
711ad879127SKrish Sadhukhan 	uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE;
712ad879127SKrish Sadhukhan 	ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
713ad879127SKrish Sadhukhan }
714ad879127SKrish Sadhukhan 
715ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test)
716ad879127SKrish Sadhukhan {
717ad879127SKrish Sadhukhan 	int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
718ad879127SKrish Sadhukhan 
719ad879127SKrish Sadhukhan 	wrmsr(MSR_IA32_TSC_ADJUST, 0);
720ad879127SKrish Sadhukhan 	return ok && adjust <= -2 * TSC_ADJUST_VALUE;
721ad879127SKrish Sadhukhan }
722ad879127SKrish Sadhukhan 
723a8503d50SMaxim Levitsky 
724a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value;
725a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */
726a8503d50SMaxim Levitsky #define TSC_SHIFT 24
727a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10
728a8503d50SMaxim Levitsky 
729a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test)
730a8503d50SMaxim Levitsky {
731a8503d50SMaxim Levitsky 	u64 start_tsc = rdtsc();
732a8503d50SMaxim Levitsky 
733a8503d50SMaxim Levitsky 	while (rdtsc() - start_tsc < guest_tsc_delay_value)
734a8503d50SMaxim Levitsky 		cpu_relax();
735a8503d50SMaxim Levitsky }
736a8503d50SMaxim Levitsky 
737a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration,
738a8503d50SMaxim Levitsky 				       double tsc_scale, u64 tsc_offset)
739a8503d50SMaxim Levitsky {
740a8503d50SMaxim Levitsky 	u64 start_tsc, actual_duration;
741a8503d50SMaxim Levitsky 
742a8503d50SMaxim Levitsky 	guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale;
743a8503d50SMaxim Levitsky 
744a8503d50SMaxim Levitsky 	test_set_guest(svm_tsc_scale_guest);
745a8503d50SMaxim Levitsky 	vmcb->control.tsc_offset = tsc_offset;
746a8503d50SMaxim Levitsky 	wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32)));
747a8503d50SMaxim Levitsky 
748a8503d50SMaxim Levitsky 	start_tsc = rdtsc();
749a8503d50SMaxim Levitsky 
750a8503d50SMaxim Levitsky 	if (svm_vmrun() != SVM_EXIT_VMMCALL)
751a8503d50SMaxim Levitsky 		report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code);
752a8503d50SMaxim Levitsky 
753a8503d50SMaxim Levitsky 	actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT;
754a8503d50SMaxim Levitsky 
755a8503d50SMaxim Levitsky 	report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)",
756a8503d50SMaxim Levitsky 	       duration, actual_duration);
757a8503d50SMaxim Levitsky }
758a8503d50SMaxim Levitsky 
759a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void)
760a8503d50SMaxim Levitsky {
761a8503d50SMaxim Levitsky 	int i;
762a8503d50SMaxim Levitsky 
763a8503d50SMaxim Levitsky 	if (!tsc_scale_supported()) {
764a8503d50SMaxim Levitsky 		report_skip("TSC scale not supported in the guest");
765a8503d50SMaxim Levitsky 		return;
766a8503d50SMaxim Levitsky 	}
767a8503d50SMaxim Levitsky 
768a8503d50SMaxim Levitsky 	report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT,
769a8503d50SMaxim Levitsky 	       "initial TSC scale ratio");
770a8503d50SMaxim Levitsky 
771a8503d50SMaxim Levitsky 	for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) {
772a8503d50SMaxim Levitsky 
773a8503d50SMaxim Levitsky 		double tsc_scale = (double)(rdrand() % 100 + 1) / 10;
774a8503d50SMaxim Levitsky 		int duration = rdrand() % 50 + 1;
775a8503d50SMaxim Levitsky 		u64 tsc_offset = rdrand();
776a8503d50SMaxim Levitsky 
777a8503d50SMaxim Levitsky 		report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld",
778a8503d50SMaxim Levitsky 			    duration, (int)(tsc_scale * 100), tsc_offset);
779a8503d50SMaxim Levitsky 
780a8503d50SMaxim Levitsky 		svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset);
781a8503d50SMaxim Levitsky 	}
782a8503d50SMaxim Levitsky 
783a8503d50SMaxim Levitsky 	svm_tsc_scale_run_testcase(50, 255, rdrand());
784a8503d50SMaxim Levitsky 	svm_tsc_scale_run_testcase(50, 0.0001, rdrand());
785a8503d50SMaxim Levitsky }
786a8503d50SMaxim Levitsky 
787ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test)
788ad879127SKrish Sadhukhan {
789ad879127SKrish Sadhukhan 	default_prepare(test);
790ad879127SKrish Sadhukhan 	runs = LATENCY_RUNS;
791ad879127SKrish Sadhukhan 	latvmrun_min = latvmexit_min = -1ULL;
792ad879127SKrish Sadhukhan 	latvmrun_max = latvmexit_max = 0;
793ad879127SKrish Sadhukhan 	vmrun_sum = vmexit_sum = 0;
794ad879127SKrish Sadhukhan 	tsc_start = rdtsc();
795ad879127SKrish Sadhukhan }
796ad879127SKrish Sadhukhan 
797ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test)
798ad879127SKrish Sadhukhan {
799ad879127SKrish Sadhukhan 	u64 cycles;
800ad879127SKrish Sadhukhan 
801ad879127SKrish Sadhukhan start:
802ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
803ad879127SKrish Sadhukhan 
804ad879127SKrish Sadhukhan 	cycles = tsc_end - tsc_start;
805ad879127SKrish Sadhukhan 
806ad879127SKrish Sadhukhan 	if (cycles > latvmrun_max)
807ad879127SKrish Sadhukhan 		latvmrun_max = cycles;
808ad879127SKrish Sadhukhan 
809ad879127SKrish Sadhukhan 	if (cycles < latvmrun_min)
810ad879127SKrish Sadhukhan 		latvmrun_min = cycles;
811ad879127SKrish Sadhukhan 
812ad879127SKrish Sadhukhan 	vmrun_sum += cycles;
813ad879127SKrish Sadhukhan 
814ad879127SKrish Sadhukhan 	tsc_start = rdtsc();
815ad879127SKrish Sadhukhan 
816ad879127SKrish Sadhukhan 	asm volatile ("vmmcall" : : : "memory");
817ad879127SKrish Sadhukhan 	goto start;
818ad879127SKrish Sadhukhan }
819ad879127SKrish Sadhukhan 
820ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test)
821ad879127SKrish Sadhukhan {
822ad879127SKrish Sadhukhan 	u64 cycles;
823ad879127SKrish Sadhukhan 
824ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
825ad879127SKrish Sadhukhan 
826ad879127SKrish Sadhukhan 	cycles = tsc_end - tsc_start;
827ad879127SKrish Sadhukhan 
828ad879127SKrish Sadhukhan 	if (cycles > latvmexit_max)
829ad879127SKrish Sadhukhan 		latvmexit_max = cycles;
830ad879127SKrish Sadhukhan 
831ad879127SKrish Sadhukhan 	if (cycles < latvmexit_min)
832ad879127SKrish Sadhukhan 		latvmexit_min = cycles;
833ad879127SKrish Sadhukhan 
834ad879127SKrish Sadhukhan 	vmexit_sum += cycles;
835ad879127SKrish Sadhukhan 
836096cf7feSPaolo Bonzini 	vmcb->save.rip += 3;
837ad879127SKrish Sadhukhan 
838ad879127SKrish Sadhukhan 	runs -= 1;
839ad879127SKrish Sadhukhan 
840ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
841ad879127SKrish Sadhukhan 
842ad879127SKrish Sadhukhan 	return runs == 0;
843ad879127SKrish Sadhukhan }
844ad879127SKrish Sadhukhan 
845f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test)
846f7fa53dcSPaolo Bonzini {
847f7fa53dcSPaolo Bonzini 	vmcb->control.clean = VMCB_CLEAN_ALL;
848f7fa53dcSPaolo Bonzini 	return latency_finished(test);
849f7fa53dcSPaolo Bonzini }
850f7fa53dcSPaolo Bonzini 
851ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test)
852ad879127SKrish Sadhukhan {
853ad879127SKrish Sadhukhan 	printf("    Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max,
854ad879127SKrish Sadhukhan 	       latvmrun_min, vmrun_sum / LATENCY_RUNS);
855ad879127SKrish Sadhukhan 	printf("    Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max,
856ad879127SKrish Sadhukhan 	       latvmexit_min, vmexit_sum / LATENCY_RUNS);
857ad879127SKrish Sadhukhan 	return true;
858ad879127SKrish Sadhukhan }
859ad879127SKrish Sadhukhan 
860ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test)
861ad879127SKrish Sadhukhan {
862ad879127SKrish Sadhukhan 	default_prepare(test);
863ad879127SKrish Sadhukhan 	runs = LATENCY_RUNS;
864ad879127SKrish Sadhukhan 	latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL;
865ad879127SKrish Sadhukhan 	latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0;
866ad879127SKrish Sadhukhan 	vmload_sum = vmsave_sum = stgi_sum = clgi_sum;
867ad879127SKrish Sadhukhan }
868ad879127SKrish Sadhukhan 
869ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test)
870ad879127SKrish Sadhukhan {
871096cf7feSPaolo Bonzini 	u64 vmcb_phys = virt_to_phys(vmcb);
872ad879127SKrish Sadhukhan 	u64 cycles;
873ad879127SKrish Sadhukhan 
874ad879127SKrish Sadhukhan 	for ( ; runs != 0; runs--) {
875ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
876ad879127SKrish Sadhukhan 		asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory");
877ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
878ad879127SKrish Sadhukhan 		if (cycles > latvmload_max)
879ad879127SKrish Sadhukhan 			latvmload_max = cycles;
880ad879127SKrish Sadhukhan 		if (cycles < latvmload_min)
881ad879127SKrish Sadhukhan 			latvmload_min = cycles;
882ad879127SKrish Sadhukhan 		vmload_sum += cycles;
883ad879127SKrish Sadhukhan 
884ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
885ad879127SKrish Sadhukhan 		asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory");
886ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
887ad879127SKrish Sadhukhan 		if (cycles > latvmsave_max)
888ad879127SKrish Sadhukhan 			latvmsave_max = cycles;
889ad879127SKrish Sadhukhan 		if (cycles < latvmsave_min)
890ad879127SKrish Sadhukhan 			latvmsave_min = cycles;
891ad879127SKrish Sadhukhan 		vmsave_sum += cycles;
892ad879127SKrish Sadhukhan 
893ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
894ad879127SKrish Sadhukhan 		asm volatile("stgi\n\t");
895ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
896ad879127SKrish Sadhukhan 		if (cycles > latstgi_max)
897ad879127SKrish Sadhukhan 			latstgi_max = cycles;
898ad879127SKrish Sadhukhan 		if (cycles < latstgi_min)
899ad879127SKrish Sadhukhan 			latstgi_min = cycles;
900ad879127SKrish Sadhukhan 		stgi_sum += cycles;
901ad879127SKrish Sadhukhan 
902ad879127SKrish Sadhukhan 		tsc_start = rdtsc();
903ad879127SKrish Sadhukhan 		asm volatile("clgi\n\t");
904ad879127SKrish Sadhukhan 		cycles = rdtsc() - tsc_start;
905ad879127SKrish Sadhukhan 		if (cycles > latclgi_max)
906ad879127SKrish Sadhukhan 			latclgi_max = cycles;
907ad879127SKrish Sadhukhan 		if (cycles < latclgi_min)
908ad879127SKrish Sadhukhan 			latclgi_min = cycles;
909ad879127SKrish Sadhukhan 		clgi_sum += cycles;
910ad879127SKrish Sadhukhan 	}
911ad879127SKrish Sadhukhan 
912ad879127SKrish Sadhukhan 	tsc_end = rdtsc();
913ad879127SKrish Sadhukhan 
914ad879127SKrish Sadhukhan 	return true;
915ad879127SKrish Sadhukhan }
916ad879127SKrish Sadhukhan 
917ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test)
918ad879127SKrish Sadhukhan {
919ad879127SKrish Sadhukhan 	printf("    Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max,
920ad879127SKrish Sadhukhan 	       latvmload_min, vmload_sum / LATENCY_RUNS);
921ad879127SKrish Sadhukhan 	printf("    Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max,
922ad879127SKrish Sadhukhan 	       latvmsave_min, vmsave_sum / LATENCY_RUNS);
923ad879127SKrish Sadhukhan 	printf("    Latency STGI:   max: %ld min: %ld avg: %ld\n", latstgi_max,
924ad879127SKrish Sadhukhan 	       latstgi_min, stgi_sum / LATENCY_RUNS);
925ad879127SKrish Sadhukhan 	printf("    Latency CLGI:   max: %ld min: %ld avg: %ld\n", latclgi_max,
926ad879127SKrish Sadhukhan 	       latclgi_min, clgi_sum / LATENCY_RUNS);
927ad879127SKrish Sadhukhan 	return true;
928ad879127SKrish Sadhukhan }
929ad879127SKrish Sadhukhan 
930493d27d4SSean Christopherson /*
931493d27d4SSean Christopherson  * Report failures from SVM guest code, and on failure, set the stage to -1 and
932493d27d4SSean Christopherson  * do VMMCALL to terminate the test (host side must treat -1 as "finished").
933493d27d4SSean Christopherson  * TODO: fix the tests that don't play nice with a straight report, e.g. the
934493d27d4SSean Christopherson  * V_TPR test fails if report() is invoked.
935493d27d4SSean Christopherson  */
936493d27d4SSean Christopherson #define report_svm_guest(cond, test, fmt, args...)	\
937493d27d4SSean Christopherson do {							\
938493d27d4SSean Christopherson 	if (!(cond)) {					\
939493d27d4SSean Christopherson 		report_fail(fmt, ##args);		\
940493d27d4SSean Christopherson 		set_test_stage(test, -1);		\
941493d27d4SSean Christopherson 		vmmcall();				\
942493d27d4SSean Christopherson 	}						\
943493d27d4SSean Christopherson } while (0)
944493d27d4SSean Christopherson 
945ad879127SKrish Sadhukhan bool pending_event_ipi_fired;
946ad879127SKrish Sadhukhan bool pending_event_guest_run;
947ad879127SKrish Sadhukhan 
948ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs)
949ad879127SKrish Sadhukhan {
950ad879127SKrish Sadhukhan 	pending_event_ipi_fired = true;
951ad879127SKrish Sadhukhan 	eoi();
952ad879127SKrish Sadhukhan }
953ad879127SKrish Sadhukhan 
954ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test)
955ad879127SKrish Sadhukhan {
956ad879127SKrish Sadhukhan 	int ipi_vector = 0xf1;
957ad879127SKrish Sadhukhan 
958ad879127SKrish Sadhukhan 	default_prepare(test);
959ad879127SKrish Sadhukhan 
960ad879127SKrish Sadhukhan 	pending_event_ipi_fired = false;
961ad879127SKrish Sadhukhan 
962ad879127SKrish Sadhukhan 	handle_irq(ipi_vector, pending_event_ipi_isr);
963ad879127SKrish Sadhukhan 
964ad879127SKrish Sadhukhan 	pending_event_guest_run = false;
965ad879127SKrish Sadhukhan 
966096cf7feSPaolo Bonzini 	vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
967096cf7feSPaolo Bonzini 	vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
968ad879127SKrish Sadhukhan 
969ad879127SKrish Sadhukhan 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
970ad879127SKrish Sadhukhan 		       APIC_DM_FIXED | ipi_vector, 0);
971ad879127SKrish Sadhukhan 
972ad879127SKrish Sadhukhan 	set_test_stage(test, 0);
973ad879127SKrish Sadhukhan }
974ad879127SKrish Sadhukhan 
975ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test)
976ad879127SKrish Sadhukhan {
977ad879127SKrish Sadhukhan 	pending_event_guest_run = true;
978ad879127SKrish Sadhukhan }
979ad879127SKrish Sadhukhan 
980ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test)
981ad879127SKrish Sadhukhan {
982ad879127SKrish Sadhukhan 	switch (get_test_stage(test)) {
983ad879127SKrish Sadhukhan 	case 0:
984096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_INTR) {
985198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x",
986096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
987ad879127SKrish Sadhukhan 			return true;
988ad879127SKrish Sadhukhan 		}
989ad879127SKrish Sadhukhan 
990096cf7feSPaolo Bonzini 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
991096cf7feSPaolo Bonzini 		vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
992ad879127SKrish Sadhukhan 
993ad879127SKrish Sadhukhan 		if (pending_event_guest_run) {
994198dfd0eSJanis Schoetterl-Glausch 			report_fail("Guest ran before host received IPI\n");
995ad879127SKrish Sadhukhan 			return true;
996ad879127SKrish Sadhukhan 		}
997ad879127SKrish Sadhukhan 
998e4007e62SMaxim Levitsky 		sti_nop_cli();
999ad879127SKrish Sadhukhan 
1000ad879127SKrish Sadhukhan 		if (!pending_event_ipi_fired) {
1001198dfd0eSJanis Schoetterl-Glausch 			report_fail("Pending interrupt not dispatched after IRQ enabled\n");
1002ad879127SKrish Sadhukhan 			return true;
1003ad879127SKrish Sadhukhan 		}
1004ad879127SKrish Sadhukhan 		break;
1005ad879127SKrish Sadhukhan 
1006ad879127SKrish Sadhukhan 	case 1:
1007ad879127SKrish Sadhukhan 		if (!pending_event_guest_run) {
1008198dfd0eSJanis Schoetterl-Glausch 			report_fail("Guest did not resume when no interrupt\n");
1009ad879127SKrish Sadhukhan 			return true;
1010ad879127SKrish Sadhukhan 		}
1011ad879127SKrish Sadhukhan 		break;
1012ad879127SKrish Sadhukhan 	}
1013ad879127SKrish Sadhukhan 
1014ad879127SKrish Sadhukhan 	inc_test_stage(test);
1015ad879127SKrish Sadhukhan 
1016ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1017ad879127SKrish Sadhukhan }
1018ad879127SKrish Sadhukhan 
1019ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test)
1020ad879127SKrish Sadhukhan {
1021ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1022ad879127SKrish Sadhukhan }
1023ad879127SKrish Sadhukhan 
102485dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test)
1025ad879127SKrish Sadhukhan {
1026ad879127SKrish Sadhukhan 	default_prepare(test);
1027ad879127SKrish Sadhukhan 
1028ad879127SKrish Sadhukhan 	pending_event_ipi_fired = false;
1029ad879127SKrish Sadhukhan 
1030ad879127SKrish Sadhukhan 	handle_irq(0xf1, pending_event_ipi_isr);
1031ad879127SKrish Sadhukhan 
1032ad879127SKrish Sadhukhan 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1033ad879127SKrish Sadhukhan 		       APIC_DM_FIXED | 0xf1, 0);
1034ad879127SKrish Sadhukhan 
1035ad879127SKrish Sadhukhan 	set_test_stage(test, 0);
1036ad879127SKrish Sadhukhan }
1037ad879127SKrish Sadhukhan 
103885dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test)
1039ad879127SKrish Sadhukhan {
1040ad879127SKrish Sadhukhan 	asm("cli");
1041ad879127SKrish Sadhukhan }
1042ad879127SKrish Sadhukhan 
104385dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test)
1044ad879127SKrish Sadhukhan {
1045493d27d4SSean Christopherson 	report_svm_guest(!pending_event_ipi_fired, test,
1046493d27d4SSean Christopherson 			 "IRQ should NOT be delivered while IRQs disabled");
1047ad879127SKrish Sadhukhan 
104885dc2aceSPaolo Bonzini 	/* VINTR_MASKING is zero.  This should cause the IPI to fire.  */
1049e4007e62SMaxim Levitsky 	sti_nop_cli();
1050ad879127SKrish Sadhukhan 
1051493d27d4SSean Christopherson 	report_svm_guest(pending_event_ipi_fired, test,
1052493d27d4SSean Christopherson 			 "IRQ should be delivered after enabling IRQs");
1053ad879127SKrish Sadhukhan 	vmmcall();
1054ad879127SKrish Sadhukhan 
105585dc2aceSPaolo Bonzini 	/*
105685dc2aceSPaolo Bonzini 	 * Now VINTR_MASKING=1, but no interrupt is pending so
105785dc2aceSPaolo Bonzini 	 * the VINTR interception should be clear in VMCB02.  Check
105885dc2aceSPaolo Bonzini 	 * that L0 did not leave a stale VINTR in the VMCB.
105985dc2aceSPaolo Bonzini 	 */
1060e4007e62SMaxim Levitsky 	sti_nop_cli();
1061ad879127SKrish Sadhukhan }
1062ad879127SKrish Sadhukhan 
106385dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test)
1064ad879127SKrish Sadhukhan {
1065493d27d4SSean Christopherson 	report_svm_guest(vmcb->control.exit_code == SVM_EXIT_VMMCALL, test,
1066493d27d4SSean Christopherson 			 "Wanted VMMCALL VM-Exit, got exit reason 0x%x",
1067096cf7feSPaolo Bonzini 			 vmcb->control.exit_code);
1068ad879127SKrish Sadhukhan 
1069ad879127SKrish Sadhukhan 	switch (get_test_stage(test)) {
1070ad879127SKrish Sadhukhan 	case 0:
1071096cf7feSPaolo Bonzini 		vmcb->save.rip += 3;
1072ad879127SKrish Sadhukhan 
1073ad879127SKrish Sadhukhan 		pending_event_ipi_fired = false;
1074ad879127SKrish Sadhukhan 
1075096cf7feSPaolo Bonzini 		vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
1076ad879127SKrish Sadhukhan 
107785dc2aceSPaolo Bonzini 		/* Now entering again with VINTR_MASKING=1.  */
1078ad879127SKrish Sadhukhan 		apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1079ad879127SKrish Sadhukhan 			       APIC_DM_FIXED | 0xf1, 0);
1080ad879127SKrish Sadhukhan 
1081ad879127SKrish Sadhukhan 		break;
1082ad879127SKrish Sadhukhan 
1083ad879127SKrish Sadhukhan 	case 1:
1084ad879127SKrish Sadhukhan 		if (pending_event_ipi_fired == true) {
1085198dfd0eSJanis Schoetterl-Glausch 			report_fail("Interrupt triggered by guest");
1086ad879127SKrish Sadhukhan 			return true;
1087ad879127SKrish Sadhukhan 		}
1088ad879127SKrish Sadhukhan 
1089e4007e62SMaxim Levitsky 		sti_nop_cli();
1090ad879127SKrish Sadhukhan 
1091ad879127SKrish Sadhukhan 		if (pending_event_ipi_fired != true) {
1092198dfd0eSJanis Schoetterl-Glausch 			report_fail("Interrupt not triggered by host");
1093ad879127SKrish Sadhukhan 			return true;
1094ad879127SKrish Sadhukhan 		}
1095ad879127SKrish Sadhukhan 
1096ad879127SKrish Sadhukhan 		break;
1097ad879127SKrish Sadhukhan 
1098ad879127SKrish Sadhukhan 	default:
1099ad879127SKrish Sadhukhan 		return true;
1100ad879127SKrish Sadhukhan 	}
1101ad879127SKrish Sadhukhan 
1102ad879127SKrish Sadhukhan 	inc_test_stage(test);
1103ad879127SKrish Sadhukhan 
1104ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1105ad879127SKrish Sadhukhan }
1106ad879127SKrish Sadhukhan 
110785dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test)
1108ad879127SKrish Sadhukhan {
1109ad879127SKrish Sadhukhan 	return get_test_stage(test) == 2;
1110ad879127SKrish Sadhukhan }
1111ad879127SKrish Sadhukhan 
111285dc2aceSPaolo Bonzini #define TIMER_VECTOR    222
111385dc2aceSPaolo Bonzini 
111485dc2aceSPaolo Bonzini static volatile bool timer_fired;
111585dc2aceSPaolo Bonzini 
111685dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs)
111785dc2aceSPaolo Bonzini {
111885dc2aceSPaolo Bonzini 	timer_fired = true;
111985dc2aceSPaolo Bonzini 	apic_write(APIC_EOI, 0);
112085dc2aceSPaolo Bonzini }
112185dc2aceSPaolo Bonzini 
112285dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test)
112385dc2aceSPaolo Bonzini {
112485dc2aceSPaolo Bonzini 	default_prepare(test);
112585dc2aceSPaolo Bonzini 	handle_irq(TIMER_VECTOR, timer_isr);
112685dc2aceSPaolo Bonzini 	timer_fired = false;
112785dc2aceSPaolo Bonzini 	set_test_stage(test, 0);
112885dc2aceSPaolo Bonzini }
112985dc2aceSPaolo Bonzini 
113085dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test)
113185dc2aceSPaolo Bonzini {
113285dc2aceSPaolo Bonzini 	long long start, loops;
113385dc2aceSPaolo Bonzini 
1134a2c7dff7SMaxim Levitsky 	apic_setup_timer(TIMER_VECTOR, APIC_LVT_TIMER_PERIODIC);
1135787f0aebSMaxim Levitsky 	sti();
113698eb2a39SPaolo Bonzini 	apic_start_timer(1000);
1137a2c7dff7SMaxim Levitsky 
113885dc2aceSPaolo Bonzini 	for (loops = 0; loops < 10000000 && !timer_fired; loops++)
113985dc2aceSPaolo Bonzini 		asm volatile ("nop");
114085dc2aceSPaolo Bonzini 
1141493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test,
1142493d27d4SSean Christopherson 			 "direct interrupt while running guest");
114385dc2aceSPaolo Bonzini 
1144a2c7dff7SMaxim Levitsky 	apic_stop_timer();
1145787f0aebSMaxim Levitsky 	cli();
114685dc2aceSPaolo Bonzini 	vmmcall();
114785dc2aceSPaolo Bonzini 
114885dc2aceSPaolo Bonzini 	timer_fired = false;
114998eb2a39SPaolo Bonzini 	apic_start_timer(1000);
115085dc2aceSPaolo Bonzini 	for (loops = 0; loops < 10000000 && !timer_fired; loops++)
115185dc2aceSPaolo Bonzini 		asm volatile ("nop");
115285dc2aceSPaolo Bonzini 
1153493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test,
1154493d27d4SSean Christopherson 			 "intercepted interrupt while running guest");
115585dc2aceSPaolo Bonzini 
1156787f0aebSMaxim Levitsky 	sti();
1157a2c7dff7SMaxim Levitsky 	apic_stop_timer();
1158787f0aebSMaxim Levitsky 	cli();
115985dc2aceSPaolo Bonzini 
116085dc2aceSPaolo Bonzini 	timer_fired = false;
116185dc2aceSPaolo Bonzini 	start = rdtsc();
1162a2c7dff7SMaxim Levitsky 	apic_start_timer(1000000);
1163a3001422SOliver Upton 	safe_halt();
116485dc2aceSPaolo Bonzini 
1165493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test, "direct interrupt + hlt");
1166493d27d4SSean Christopherson 	report(rdtsc() - start > 10000, "IRQ arrived after expected delay");
116785dc2aceSPaolo Bonzini 
1168a2c7dff7SMaxim Levitsky 	apic_stop_timer();
1169787f0aebSMaxim Levitsky 	cli();
117085dc2aceSPaolo Bonzini 	vmmcall();
117185dc2aceSPaolo Bonzini 
117285dc2aceSPaolo Bonzini 	timer_fired = false;
117385dc2aceSPaolo Bonzini 	start = rdtsc();
1174a2c7dff7SMaxim Levitsky 	apic_start_timer(1000000);
117585dc2aceSPaolo Bonzini 	asm volatile ("hlt");
117685dc2aceSPaolo Bonzini 
1177493d27d4SSean Christopherson 	report_svm_guest(timer_fired, test, "intercepted interrupt + hlt");
1178493d27d4SSean Christopherson 	report(rdtsc() - start > 10000, "IRQ arrived after expected delay");
117985dc2aceSPaolo Bonzini 
1180a2c7dff7SMaxim Levitsky 	apic_cleanup_timer();
118185dc2aceSPaolo Bonzini }
118285dc2aceSPaolo Bonzini 
118385dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test)
118485dc2aceSPaolo Bonzini {
118585dc2aceSPaolo Bonzini 	switch (get_test_stage(test)) {
118685dc2aceSPaolo Bonzini 	case 0:
118785dc2aceSPaolo Bonzini 	case 2:
1188096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1189198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1190096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
119185dc2aceSPaolo Bonzini 			return true;
119285dc2aceSPaolo Bonzini 		}
1193096cf7feSPaolo Bonzini 		vmcb->save.rip += 3;
119485dc2aceSPaolo Bonzini 
1195096cf7feSPaolo Bonzini 		vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1196096cf7feSPaolo Bonzini 		vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
119785dc2aceSPaolo Bonzini 		break;
119885dc2aceSPaolo Bonzini 
119985dc2aceSPaolo Bonzini 	case 1:
120085dc2aceSPaolo Bonzini 	case 3:
1201096cf7feSPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_INTR) {
1202198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x",
1203096cf7feSPaolo Bonzini 				    vmcb->control.exit_code);
120485dc2aceSPaolo Bonzini 			return true;
120585dc2aceSPaolo Bonzini 		}
120685dc2aceSPaolo Bonzini 
1207e4007e62SMaxim Levitsky 		sti_nop_cli();
120885dc2aceSPaolo Bonzini 
1209096cf7feSPaolo Bonzini 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
1210096cf7feSPaolo Bonzini 		vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
121185dc2aceSPaolo Bonzini 		break;
121285dc2aceSPaolo Bonzini 
121385dc2aceSPaolo Bonzini 	case 4:
121485dc2aceSPaolo Bonzini 		break;
121585dc2aceSPaolo Bonzini 
121685dc2aceSPaolo Bonzini 	default:
121785dc2aceSPaolo Bonzini 		return true;
121885dc2aceSPaolo Bonzini 	}
121985dc2aceSPaolo Bonzini 
122085dc2aceSPaolo Bonzini 	inc_test_stage(test);
122185dc2aceSPaolo Bonzini 
122285dc2aceSPaolo Bonzini 	return get_test_stage(test) == 5;
122385dc2aceSPaolo Bonzini }
122485dc2aceSPaolo Bonzini 
122585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test)
122685dc2aceSPaolo Bonzini {
122785dc2aceSPaolo Bonzini 	return get_test_stage(test) == 5;
122885dc2aceSPaolo Bonzini }
122985dc2aceSPaolo Bonzini 
1230d4db486bSCathy Avery static volatile bool nmi_fired;
1231d4db486bSCathy Avery 
12324a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs)
1233d4db486bSCathy Avery {
1234d4db486bSCathy Avery 	nmi_fired = true;
1235d4db486bSCathy Avery }
1236d4db486bSCathy Avery 
1237d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test)
1238d4db486bSCathy Avery {
1239d4db486bSCathy Avery 	default_prepare(test);
1240d4db486bSCathy Avery 	nmi_fired = false;
12414a1207f6SMaxim Levitsky 	handle_exception(NMI_VECTOR, nmi_handler);
1242d4db486bSCathy Avery 	set_test_stage(test, 0);
1243d4db486bSCathy Avery }
1244d4db486bSCathy Avery 
1245d4db486bSCathy Avery static void nmi_test(struct svm_test *test)
1246d4db486bSCathy Avery {
1247d4db486bSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1248d4db486bSCathy Avery 
1249493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "direct NMI while running guest");
1250d4db486bSCathy Avery 
1251d4db486bSCathy Avery 	vmmcall();
1252d4db486bSCathy Avery 
1253d4db486bSCathy Avery 	nmi_fired = false;
1254d4db486bSCathy Avery 
1255d4db486bSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1256d4db486bSCathy Avery 
1257493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "intercepted pending NMI delivered to guest");
1258d4db486bSCathy Avery }
1259d4db486bSCathy Avery 
1260d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test)
1261d4db486bSCathy Avery {
1262d4db486bSCathy Avery 	switch (get_test_stage(test)) {
1263d4db486bSCathy Avery 	case 0:
1264d4db486bSCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1265198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1266d4db486bSCathy Avery 				    vmcb->control.exit_code);
1267d4db486bSCathy Avery 			return true;
1268d4db486bSCathy Avery 		}
1269d4db486bSCathy Avery 		vmcb->save.rip += 3;
1270d4db486bSCathy Avery 
1271d4db486bSCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
1272d4db486bSCathy Avery 		break;
1273d4db486bSCathy Avery 
1274d4db486bSCathy Avery 	case 1:
1275d4db486bSCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1276198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
1277d4db486bSCathy Avery 				    vmcb->control.exit_code);
1278d4db486bSCathy Avery 			return true;
1279d4db486bSCathy Avery 		}
1280d4db486bSCathy Avery 
12815c3582f0SJanis Schoetterl-Glausch 		report_pass("NMI intercept while running guest");
1282d4db486bSCathy Avery 		break;
1283d4db486bSCathy Avery 
1284d4db486bSCathy Avery 	case 2:
1285d4db486bSCathy Avery 		break;
1286d4db486bSCathy Avery 
1287d4db486bSCathy Avery 	default:
1288d4db486bSCathy Avery 		return true;
1289d4db486bSCathy Avery 	}
1290d4db486bSCathy Avery 
1291d4db486bSCathy Avery 	inc_test_stage(test);
1292d4db486bSCathy Avery 
1293d4db486bSCathy Avery 	return get_test_stage(test) == 3;
1294d4db486bSCathy Avery }
1295d4db486bSCathy Avery 
1296d4db486bSCathy Avery static bool nmi_check(struct svm_test *test)
1297d4db486bSCathy Avery {
1298d4db486bSCathy Avery 	return get_test_stage(test) == 3;
1299d4db486bSCathy Avery }
1300d4db486bSCathy Avery 
13019da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL
13029da1f4d8SCathy Avery 
13039da1f4d8SCathy Avery static void nmi_message_thread(void *_test)
13049da1f4d8SCathy Avery {
13059da1f4d8SCathy Avery 	struct svm_test *test = _test;
13069da1f4d8SCathy Avery 
13079da1f4d8SCathy Avery 	while (get_test_stage(test) != 1)
13089da1f4d8SCathy Avery 		pause();
13099da1f4d8SCathy Avery 
13109da1f4d8SCathy Avery 	delay(NMI_DELAY);
13119da1f4d8SCathy Avery 
13129da1f4d8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
13139da1f4d8SCathy Avery 
13149da1f4d8SCathy Avery 	while (get_test_stage(test) != 2)
13159da1f4d8SCathy Avery 		pause();
13169da1f4d8SCathy Avery 
13179da1f4d8SCathy Avery 	delay(NMI_DELAY);
13189da1f4d8SCathy Avery 
13199da1f4d8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
13209da1f4d8SCathy Avery }
13219da1f4d8SCathy Avery 
13229da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test)
13239da1f4d8SCathy Avery {
13249da1f4d8SCathy Avery 	long long start;
13259da1f4d8SCathy Avery 
13269da1f4d8SCathy Avery 	on_cpu_async(1, nmi_message_thread, test);
13279da1f4d8SCathy Avery 
13289da1f4d8SCathy Avery 	start = rdtsc();
13299da1f4d8SCathy Avery 
13309da1f4d8SCathy Avery 	set_test_stage(test, 1);
13319da1f4d8SCathy Avery 
13329da1f4d8SCathy Avery 	asm volatile ("hlt");
13339da1f4d8SCathy Avery 
1334493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "direct NMI + hlt");
1335493d27d4SSean Christopherson 	report(rdtsc() - start > NMI_DELAY, "direct NMI after expected delay");
13369da1f4d8SCathy Avery 
13379da1f4d8SCathy Avery 	nmi_fired = false;
13389da1f4d8SCathy Avery 
13399da1f4d8SCathy Avery 	vmmcall();
13409da1f4d8SCathy Avery 
13419da1f4d8SCathy Avery 	start = rdtsc();
13429da1f4d8SCathy Avery 
13439da1f4d8SCathy Avery 	set_test_stage(test, 2);
13449da1f4d8SCathy Avery 
13459da1f4d8SCathy Avery 	asm volatile ("hlt");
13469da1f4d8SCathy Avery 
1347493d27d4SSean Christopherson 	report_svm_guest(nmi_fired, test, "intercepted NMI + hlt");
1348493d27d4SSean Christopherson 	report(rdtsc() - start > NMI_DELAY, "intercepted NMI after expected delay");
13499da1f4d8SCathy Avery 
13509da1f4d8SCathy Avery 	set_test_stage(test, 3);
13519da1f4d8SCathy Avery }
13529da1f4d8SCathy Avery 
13539da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test)
13549da1f4d8SCathy Avery {
13559da1f4d8SCathy Avery 	switch (get_test_stage(test)) {
13569da1f4d8SCathy Avery 	case 1:
13579da1f4d8SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1358198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
13599da1f4d8SCathy Avery 				    vmcb->control.exit_code);
13609da1f4d8SCathy Avery 			return true;
13619da1f4d8SCathy Avery 		}
13629da1f4d8SCathy Avery 		vmcb->save.rip += 3;
13639da1f4d8SCathy Avery 
13649da1f4d8SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
13659da1f4d8SCathy Avery 		break;
13669da1f4d8SCathy Avery 
13679da1f4d8SCathy Avery 	case 2:
13689da1f4d8SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1369198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
13709da1f4d8SCathy Avery 				    vmcb->control.exit_code);
13719da1f4d8SCathy Avery 			return true;
13729da1f4d8SCathy Avery 		}
13739da1f4d8SCathy Avery 
13745c3582f0SJanis Schoetterl-Glausch 		report_pass("NMI intercept while running guest");
13759da1f4d8SCathy Avery 		break;
13769da1f4d8SCathy Avery 
13779da1f4d8SCathy Avery 	case 3:
13789da1f4d8SCathy Avery 		break;
13799da1f4d8SCathy Avery 
13809da1f4d8SCathy Avery 	default:
13819da1f4d8SCathy Avery 		return true;
13829da1f4d8SCathy Avery 	}
13839da1f4d8SCathy Avery 
13849da1f4d8SCathy Avery 	return get_test_stage(test) == 3;
13859da1f4d8SCathy Avery }
13869da1f4d8SCathy Avery 
13879da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test)
13889da1f4d8SCathy Avery {
13899da1f4d8SCathy Avery 	return get_test_stage(test) == 3;
13909da1f4d8SCathy Avery }
13919da1f4d8SCathy Avery 
139208200397SSantosh Shukla static void vnmi_prepare(struct svm_test *test)
139308200397SSantosh Shukla {
139408200397SSantosh Shukla 	nmi_prepare(test);
139508200397SSantosh Shukla 
139608200397SSantosh Shukla 	/*
139708200397SSantosh Shukla 	 * Disable NMI interception to start.  Enabling vNMI without
139808200397SSantosh Shukla 	 * intercepting "real" NMIs should result in an ERR VM-Exit.
139908200397SSantosh Shukla 	 */
140008200397SSantosh Shukla 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_NMI);
140108200397SSantosh Shukla 	vmcb->control.int_ctl = V_NMI_ENABLE_MASK;
140208200397SSantosh Shukla 	vmcb->control.int_vector = NMI_VECTOR;
140308200397SSantosh Shukla }
140408200397SSantosh Shukla 
140508200397SSantosh Shukla static void vnmi_test(struct svm_test *test)
140608200397SSantosh Shukla {
140708200397SSantosh Shukla 	report_svm_guest(!nmi_fired, test, "No vNMI before injection");
140808200397SSantosh Shukla 	vmmcall();
140908200397SSantosh Shukla 
141008200397SSantosh Shukla 	report_svm_guest(nmi_fired, test, "vNMI delivered after injection");
141108200397SSantosh Shukla 	vmmcall();
141208200397SSantosh Shukla }
141308200397SSantosh Shukla 
141408200397SSantosh Shukla static bool vnmi_finished(struct svm_test *test)
141508200397SSantosh Shukla {
141608200397SSantosh Shukla 	switch (get_test_stage(test)) {
141708200397SSantosh Shukla 	case 0:
141808200397SSantosh Shukla 		if (vmcb->control.exit_code != SVM_EXIT_ERR) {
141908200397SSantosh Shukla 			report_fail("Wanted ERR VM-Exit, got 0x%x",
142008200397SSantosh Shukla 				    vmcb->control.exit_code);
142108200397SSantosh Shukla 			return true;
142208200397SSantosh Shukla 		}
142308200397SSantosh Shukla 		report(!nmi_fired, "vNMI enabled but NMI_INTERCEPT unset!");
142408200397SSantosh Shukla 		vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
142508200397SSantosh Shukla 		vmcb->save.rip += 3;
142608200397SSantosh Shukla 		break;
142708200397SSantosh Shukla 
142808200397SSantosh Shukla 	case 1:
142908200397SSantosh Shukla 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
143008200397SSantosh Shukla 			report_fail("Wanted VMMCALL VM-Exit, got 0x%x",
143108200397SSantosh Shukla 				    vmcb->control.exit_code);
143208200397SSantosh Shukla 			return true;
143308200397SSantosh Shukla 		}
143408200397SSantosh Shukla 		report(!nmi_fired, "vNMI with vector 2 not injected");
143508200397SSantosh Shukla 		vmcb->control.int_ctl |= V_NMI_PENDING_MASK;
143608200397SSantosh Shukla 		vmcb->save.rip += 3;
143708200397SSantosh Shukla 		break;
143808200397SSantosh Shukla 
143908200397SSantosh Shukla 	case 2:
144008200397SSantosh Shukla 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
144108200397SSantosh Shukla 			report_fail("Wanted VMMCALL VM-Exit, got 0x%x",
144208200397SSantosh Shukla 				    vmcb->control.exit_code);
144308200397SSantosh Shukla 			return true;
144408200397SSantosh Shukla 		}
144508200397SSantosh Shukla 		if (vmcb->control.int_ctl & V_NMI_BLOCKING_MASK) {
144608200397SSantosh Shukla 			report_fail("V_NMI_BLOCKING_MASK not cleared on VMEXIT");
144708200397SSantosh Shukla 			return true;
144808200397SSantosh Shukla 		}
144908200397SSantosh Shukla 		report_pass("VNMI serviced");
145008200397SSantosh Shukla 		vmcb->save.rip += 3;
145108200397SSantosh Shukla 		break;
145208200397SSantosh Shukla 
145308200397SSantosh Shukla 	default:
145408200397SSantosh Shukla 		return true;
145508200397SSantosh Shukla 	}
145608200397SSantosh Shukla 
145708200397SSantosh Shukla 	inc_test_stage(test);
145808200397SSantosh Shukla 
145908200397SSantosh Shukla 	return get_test_stage(test) == 3;
146008200397SSantosh Shukla }
146108200397SSantosh Shukla 
146208200397SSantosh Shukla static bool vnmi_check(struct svm_test *test)
146308200397SSantosh Shukla {
146408200397SSantosh Shukla 	return get_test_stage(test) == 3;
146508200397SSantosh Shukla }
146608200397SSantosh Shukla 
14674b4fb247SPaolo Bonzini static volatile int count_exc = 0;
14684b4fb247SPaolo Bonzini 
14694b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r)
14704b4fb247SPaolo Bonzini {
14714b4fb247SPaolo Bonzini 	count_exc++;
14724b4fb247SPaolo Bonzini }
14734b4fb247SPaolo Bonzini 
14744b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test)
14754b4fb247SPaolo Bonzini {
14768634a266SPaolo Bonzini 	default_prepare(test);
14774b4fb247SPaolo Bonzini 	handle_exception(DE_VECTOR, my_isr);
14784b4fb247SPaolo Bonzini 	handle_exception(NMI_VECTOR, my_isr);
14794b4fb247SPaolo Bonzini }
14804b4fb247SPaolo Bonzini 
14814b4fb247SPaolo Bonzini 
14824b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test)
14834b4fb247SPaolo Bonzini {
14844b4fb247SPaolo Bonzini 	asm volatile ("vmmcall\n\tvmmcall\n\t");
14854b4fb247SPaolo Bonzini }
14864b4fb247SPaolo Bonzini 
14874b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test)
14884b4fb247SPaolo Bonzini {
14894b4fb247SPaolo Bonzini 	switch (get_test_stage(test)) {
14904b4fb247SPaolo Bonzini 	case 0:
14914b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1492198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
14934b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
14944b4fb247SPaolo Bonzini 			return true;
14954b4fb247SPaolo Bonzini 		}
14962c1ca866SNadav Amit 		vmcb->save.rip += 3;
14974b4fb247SPaolo Bonzini 		vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
14984b4fb247SPaolo Bonzini 		break;
14994b4fb247SPaolo Bonzini 
15004b4fb247SPaolo Bonzini 	case 1:
15014b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_ERR) {
1502198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to error. Exit reason 0x%x",
15034b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
15044b4fb247SPaolo Bonzini 			return true;
15054b4fb247SPaolo Bonzini 		}
15064b4fb247SPaolo Bonzini 		report(count_exc == 0, "exception with vector 2 not injected");
15074b4fb247SPaolo Bonzini 		vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
15084b4fb247SPaolo Bonzini 		break;
15094b4fb247SPaolo Bonzini 
15104b4fb247SPaolo Bonzini 	case 2:
15114b4fb247SPaolo Bonzini 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1512198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15134b4fb247SPaolo Bonzini 				    vmcb->control.exit_code);
15144b4fb247SPaolo Bonzini 			return true;
15154b4fb247SPaolo Bonzini 		}
15162c1ca866SNadav Amit 		vmcb->save.rip += 3;
15174b4fb247SPaolo Bonzini 		report(count_exc == 1, "divide overflow exception injected");
15184b4fb247SPaolo Bonzini 		report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared");
15194b4fb247SPaolo Bonzini 		break;
15204b4fb247SPaolo Bonzini 
15214b4fb247SPaolo Bonzini 	default:
15224b4fb247SPaolo Bonzini 		return true;
15234b4fb247SPaolo Bonzini 	}
15244b4fb247SPaolo Bonzini 
15254b4fb247SPaolo Bonzini 	inc_test_stage(test);
15264b4fb247SPaolo Bonzini 
15274b4fb247SPaolo Bonzini 	return get_test_stage(test) == 3;
15284b4fb247SPaolo Bonzini }
15294b4fb247SPaolo Bonzini 
15304b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test)
15314b4fb247SPaolo Bonzini {
15324b4fb247SPaolo Bonzini 	return count_exc == 1 && get_test_stage(test) == 3;
15334b4fb247SPaolo Bonzini }
15344b4fb247SPaolo Bonzini 
15359c838954SCathy Avery static volatile bool virq_fired;
15364b3c6114SPaolo Bonzini static volatile unsigned long virq_rip;
15379c838954SCathy Avery 
15389c838954SCathy Avery static void virq_isr(isr_regs_t *regs)
15399c838954SCathy Avery {
15409c838954SCathy Avery 	virq_fired = true;
15414b3c6114SPaolo Bonzini 	virq_rip = regs->rip;
15429c838954SCathy Avery }
15439c838954SCathy Avery 
15449c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test)
15459c838954SCathy Avery {
15469c838954SCathy Avery 	handle_irq(0xf1, virq_isr);
15479c838954SCathy Avery 	default_prepare(test);
15489c838954SCathy Avery 	vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
15499c838954SCathy Avery 		(0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority
15509c838954SCathy Avery 	vmcb->control.int_vector = 0xf1;
15519c838954SCathy Avery 	virq_fired = false;
15524b3c6114SPaolo Bonzini 	virq_rip = -1;
15539c838954SCathy Avery 	set_test_stage(test, 0);
15549c838954SCathy Avery }
15559c838954SCathy Avery 
15569c838954SCathy Avery static void virq_inject_test(struct svm_test *test)
15579c838954SCathy Avery {
1558493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli");
15599c838954SCathy Avery 
1560e4007e62SMaxim Levitsky 	sti_nop_cli();
15619c838954SCathy Avery 
1562493d27d4SSean Christopherson 	report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti");
15639c838954SCathy Avery 
15649c838954SCathy Avery 	vmmcall();
15659c838954SCathy Avery 
1566493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli");
15679c838954SCathy Avery 
1568e4007e62SMaxim Levitsky 	sti_nop_cli();
15699c838954SCathy Avery 
1570493d27d4SSean Christopherson 	report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti");
15719c838954SCathy Avery 
15729c838954SCathy Avery 	vmmcall();
15739c838954SCathy Avery 
1574e4007e62SMaxim Levitsky 	sti_nop_cli();
15759c838954SCathy Avery 
1576493d27d4SSean Christopherson 	report_svm_guest(!virq_fired, test,
1577493d27d4SSean Christopherson 			  "virtual IRQ blocked V_IRQ_PRIO less than V_TPR");
15789c838954SCathy Avery 
15799c838954SCathy Avery 	vmmcall();
15809c838954SCathy Avery 	vmmcall();
15819c838954SCathy Avery }
15829c838954SCathy Avery 
15839c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test)
15849c838954SCathy Avery {
15859c838954SCathy Avery 	vmcb->save.rip += 3;
15869c838954SCathy Avery 
15879c838954SCathy Avery 	switch (get_test_stage(test)) {
15889c838954SCathy Avery 	case 0:
15899c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1590198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15919c838954SCathy Avery 				    vmcb->control.exit_code);
15929c838954SCathy Avery 			return true;
15939c838954SCathy Avery 		}
15949c838954SCathy Avery 		if (vmcb->control.int_ctl & V_IRQ_MASK) {
1595198dfd0eSJanis Schoetterl-Glausch 			report_fail("V_IRQ not cleared on VMEXIT after firing");
15969c838954SCathy Avery 			return true;
15979c838954SCathy Avery 		}
15989c838954SCathy Avery 		virq_fired = false;
15999c838954SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
16009c838954SCathy Avery 		vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
16019c838954SCathy Avery 			(0x0f << V_INTR_PRIO_SHIFT);
16029c838954SCathy Avery 		break;
16039c838954SCathy Avery 
16049c838954SCathy Avery 	case 1:
16059c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VINTR) {
1606198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vintr. Exit reason 0x%x",
16079c838954SCathy Avery 				    vmcb->control.exit_code);
16089c838954SCathy Avery 			return true;
16099c838954SCathy Avery 		}
16109c838954SCathy Avery 		if (virq_fired) {
1611198dfd0eSJanis Schoetterl-Glausch 			report_fail("V_IRQ fired before SVM_EXIT_VINTR");
16129c838954SCathy Avery 			return true;
16139c838954SCathy Avery 		}
16149c838954SCathy Avery 		vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR);
16159c838954SCathy Avery 		break;
16169c838954SCathy Avery 
16179c838954SCathy Avery 	case 2:
16189c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1619198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16209c838954SCathy Avery 				    vmcb->control.exit_code);
16219c838954SCathy Avery 			return true;
16229c838954SCathy Avery 		}
16239c838954SCathy Avery 		virq_fired = false;
16249c838954SCathy Avery 		// Set irq to lower priority
16259c838954SCathy Avery 		vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
16269c838954SCathy Avery 			(0x08 << V_INTR_PRIO_SHIFT);
16279c838954SCathy Avery 		// Raise guest TPR
16289c838954SCathy Avery 		vmcb->control.int_ctl |= 0x0a & V_TPR_MASK;
16299c838954SCathy Avery 		break;
16309c838954SCathy Avery 
16319c838954SCathy Avery 	case 3:
16329c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1633198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16349c838954SCathy Avery 				    vmcb->control.exit_code);
16359c838954SCathy Avery 			return true;
16369c838954SCathy Avery 		}
16379c838954SCathy Avery 		vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
16389c838954SCathy Avery 		break;
16399c838954SCathy Avery 
16409c838954SCathy Avery 	case 4:
16419c838954SCathy Avery 		// INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR
16429c838954SCathy Avery 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1643198dfd0eSJanis Schoetterl-Glausch 			report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16449c838954SCathy Avery 				    vmcb->control.exit_code);
16459c838954SCathy Avery 			return true;
16469c838954SCathy Avery 		}
16479c838954SCathy Avery 		break;
16489c838954SCathy Avery 
16499c838954SCathy Avery 	default:
16509c838954SCathy Avery 		return true;
16519c838954SCathy Avery 	}
16529c838954SCathy Avery 
16539c838954SCathy Avery 	inc_test_stage(test);
16549c838954SCathy Avery 
16559c838954SCathy Avery 	return get_test_stage(test) == 5;
16569c838954SCathy Avery }
16579c838954SCathy Avery 
16589c838954SCathy Avery static bool virq_inject_check(struct svm_test *test)
16599c838954SCathy Avery {
16609c838954SCathy Avery 	return get_test_stage(test) == 5;
16619c838954SCathy Avery }
16629c838954SCathy Avery 
16634b3c6114SPaolo Bonzini static void virq_inject_within_shadow_prepare(struct svm_test *test)
16644b3c6114SPaolo Bonzini {
16654b3c6114SPaolo Bonzini 	virq_inject_prepare(test);
16664b3c6114SPaolo Bonzini 	vmcb->control.int_state = SVM_INTERRUPT_SHADOW_MASK;
16674b3c6114SPaolo Bonzini 	vmcb->save.rflags |= X86_EFLAGS_IF;
16684b3c6114SPaolo Bonzini }
16694b3c6114SPaolo Bonzini 
16704b3c6114SPaolo Bonzini extern void virq_inject_within_shadow_test(struct svm_test *test);
16714b3c6114SPaolo Bonzini asm("virq_inject_within_shadow_test: nop; nop; vmmcall");
16724b3c6114SPaolo Bonzini 
16734b3c6114SPaolo Bonzini static void virq_inject_within_shadow_prepare_gif_clear(struct svm_test *test)
16744b3c6114SPaolo Bonzini {
16754b3c6114SPaolo Bonzini 	vmcb->save.rip = (unsigned long) test->guest_func;
16764b3c6114SPaolo Bonzini }
16774b3c6114SPaolo Bonzini 
16784b3c6114SPaolo Bonzini static bool virq_inject_within_shadow_finished(struct svm_test *test)
16794b3c6114SPaolo Bonzini {
16804b3c6114SPaolo Bonzini 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL)
16814b3c6114SPaolo Bonzini 		report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16824b3c6114SPaolo Bonzini 			    vmcb->control.exit_code);
16834b3c6114SPaolo Bonzini 	if (!virq_fired)
16844b3c6114SPaolo Bonzini 		report_fail("V_IRQ did not fire");
16854b3c6114SPaolo Bonzini 	else if (virq_rip != (unsigned long) virq_inject_within_shadow_test + 1)
16864b3c6114SPaolo Bonzini 		report_fail("Unexpected RIP for interrupt handler");
16874b3c6114SPaolo Bonzini 	else if (vmcb->control.int_ctl & V_IRQ_MASK)
16884b3c6114SPaolo Bonzini 		report_fail("V_IRQ not cleared on VMEXIT after firing");
16894b3c6114SPaolo Bonzini 	else if (vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK)
16904b3c6114SPaolo Bonzini 		report_fail("Interrupt shadow not cleared");
16914b3c6114SPaolo Bonzini 	else
16924b3c6114SPaolo Bonzini 		inc_test_stage(test);
16934b3c6114SPaolo Bonzini 
16944b3c6114SPaolo Bonzini 	return true;
16954b3c6114SPaolo Bonzini }
16964b3c6114SPaolo Bonzini 
16974b3c6114SPaolo Bonzini static bool virq_inject_within_shadow_check(struct svm_test *test)
16984b3c6114SPaolo Bonzini {
16994b3c6114SPaolo Bonzini 	return get_test_stage(test) == 1;
17004b3c6114SPaolo Bonzini }
17014b3c6114SPaolo Bonzini 
1702da338a31SMaxim Levitsky /*
1703da338a31SMaxim Levitsky  * Detect nested guest RIP corruption as explained in kernel commit
1704da338a31SMaxim Levitsky  * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73
1705da338a31SMaxim Levitsky  *
1706da338a31SMaxim Levitsky  * In the assembly loop below 'ins' is executed while IO instructions
1707da338a31SMaxim Levitsky  * are not intercepted; the instruction is emulated by L0.
1708da338a31SMaxim Levitsky  *
1709da338a31SMaxim Levitsky  * At the same time we are getting interrupts from the local APIC timer,
1710da338a31SMaxim Levitsky  * and we do intercept them in L1
1711da338a31SMaxim Levitsky  *
1712da338a31SMaxim Levitsky  * If the interrupt happens on the insb instruction, L0 will VMexit, emulate
1713da338a31SMaxim Levitsky  * the insb instruction and then it will inject the interrupt to L1 through
1714da338a31SMaxim Levitsky  * a nested VMexit.  Due to a bug, it would leave pre-emulation values of RIP,
1715da338a31SMaxim Levitsky  * RAX and RSP in the VMCB.
1716da338a31SMaxim Levitsky  *
1717da338a31SMaxim Levitsky  * In our intercept handler we detect the bug by checking that RIP is that of
1718da338a31SMaxim Levitsky  * the insb instruction, but its memory operand has already been written.
1719da338a31SMaxim Levitsky  * This means that insb was already executed.
1720da338a31SMaxim Levitsky  */
1721da338a31SMaxim Levitsky 
1722da338a31SMaxim Levitsky static volatile int isr_cnt = 0;
1723da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA;
1724da338a31SMaxim Levitsky extern const char insb_instruction_label[];
1725da338a31SMaxim Levitsky 
1726da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs)
1727da338a31SMaxim Levitsky {
1728da338a31SMaxim Levitsky 	isr_cnt++;
1729da338a31SMaxim Levitsky 	apic_write(APIC_EOI, 0);
1730da338a31SMaxim Levitsky }
1731da338a31SMaxim Levitsky 
1732da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test)
1733da338a31SMaxim Levitsky {
1734da338a31SMaxim Levitsky 	default_prepare(test);
1735da338a31SMaxim Levitsky 	set_test_stage(test, 0);
1736da338a31SMaxim Levitsky 
1737da338a31SMaxim Levitsky 	vmcb->control.int_ctl = V_INTR_MASKING_MASK;
1738da338a31SMaxim Levitsky 	vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1739da338a31SMaxim Levitsky 
1740da338a31SMaxim Levitsky 	handle_irq(TIMER_VECTOR, reg_corruption_isr);
1741da338a31SMaxim Levitsky 
1742da338a31SMaxim Levitsky 	/* set local APIC to inject external interrupts */
1743a2c7dff7SMaxim Levitsky 	apic_setup_timer(TIMER_VECTOR, APIC_LVT_TIMER_PERIODIC);
1744a2c7dff7SMaxim Levitsky 	apic_start_timer(1000);
1745da338a31SMaxim Levitsky }
1746da338a31SMaxim Levitsky 
1747da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test)
1748da338a31SMaxim Levitsky {
1749da338a31SMaxim Levitsky 	/* this is endless loop, which is interrupted by the timer interrupt */
1750da338a31SMaxim Levitsky 	asm volatile (
1751da338a31SMaxim Levitsky 		      "1:\n\t"
1752da338a31SMaxim Levitsky 		      "movw $0x4d0, %%dx\n\t" // IO port
1753da338a31SMaxim Levitsky 		      "lea %[io_port_var], %%rdi\n\t"
1754da338a31SMaxim Levitsky 		      "movb $0xAA, %[io_port_var]\n\t"
1755da338a31SMaxim Levitsky 		      "insb_instruction_label:\n\t"
1756da338a31SMaxim Levitsky 		      "insb\n\t"
1757da338a31SMaxim Levitsky 		      "jmp 1b\n\t"
1758da338a31SMaxim Levitsky 
1759da338a31SMaxim Levitsky 		      : [io_port_var] "=m" (io_port_var)
1760da338a31SMaxim Levitsky 		      : /* no inputs*/
1761da338a31SMaxim Levitsky 		      : "rdx", "rdi"
1762da338a31SMaxim Levitsky 		      );
1763da338a31SMaxim Levitsky }
1764da338a31SMaxim Levitsky 
1765da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test)
1766da338a31SMaxim Levitsky {
1767da338a31SMaxim Levitsky 	if (isr_cnt == 10000) {
17685c3582f0SJanis Schoetterl-Glausch 		report_pass("No RIP corruption detected after %d timer interrupts",
1769da338a31SMaxim Levitsky 			    isr_cnt);
1770da338a31SMaxim Levitsky 		set_test_stage(test, 1);
1771491bbc64SMaxim Levitsky 		goto cleanup;
1772da338a31SMaxim Levitsky 	}
1773da338a31SMaxim Levitsky 
1774da338a31SMaxim Levitsky 	if (vmcb->control.exit_code == SVM_EXIT_INTR) {
1775da338a31SMaxim Levitsky 
1776da338a31SMaxim Levitsky 		void* guest_rip = (void*)vmcb->save.rip;
1777da338a31SMaxim Levitsky 
1778e4007e62SMaxim Levitsky 		sti_nop_cli();
1779da338a31SMaxim Levitsky 
1780da338a31SMaxim Levitsky 		if (guest_rip == insb_instruction_label && io_port_var != 0xAA) {
1781198dfd0eSJanis Schoetterl-Glausch 			report_fail("RIP corruption detected after %d timer interrupts",
1782da338a31SMaxim Levitsky 				    isr_cnt);
1783491bbc64SMaxim Levitsky 			goto cleanup;
1784da338a31SMaxim Levitsky 		}
1785da338a31SMaxim Levitsky 
1786da338a31SMaxim Levitsky 	}
1787da338a31SMaxim Levitsky 	return false;
1788491bbc64SMaxim Levitsky cleanup:
1789a2c7dff7SMaxim Levitsky 	apic_cleanup_timer();
1790491bbc64SMaxim Levitsky 	return true;
1791491bbc64SMaxim Levitsky 
1792da338a31SMaxim Levitsky }
1793da338a31SMaxim Levitsky 
1794da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test)
1795da338a31SMaxim Levitsky {
1796da338a31SMaxim Levitsky 	return get_test_stage(test) == 1;
1797da338a31SMaxim Levitsky }
1798da338a31SMaxim Levitsky 
17994770e9c8SCathy Avery static void get_tss_entry(void *data)
18004770e9c8SCathy Avery {
1801a7f32d87SPaolo Bonzini 	*((gdt_entry_t **)data) = get_tss_descr();
18024770e9c8SCathy Avery }
18034770e9c8SCathy Avery 
18044770e9c8SCathy Avery static int orig_cpu_count;
18054770e9c8SCathy Avery 
18064770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test)
18074770e9c8SCathy Avery {
1808a7f32d87SPaolo Bonzini 	gdt_entry_t *tss_entry;
18094770e9c8SCathy Avery 	int i;
18104770e9c8SCathy Avery 
18114770e9c8SCathy Avery 	on_cpu(1, get_tss_entry, &tss_entry);
18124770e9c8SCathy Avery 
1813d36b378fSVarad Gautam 	orig_cpu_count = atomic_read(&cpu_online_count);
18144770e9c8SCathy Avery 
18154770e9c8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT,
18164770e9c8SCathy Avery 		       id_map[1]);
18174770e9c8SCathy Avery 
18184770e9c8SCathy Avery 	delay(100000000ULL);
18194770e9c8SCathy Avery 
1820d36b378fSVarad Gautam 	atomic_dec(&cpu_online_count);
18214770e9c8SCathy Avery 
1822a7f32d87SPaolo Bonzini 	tss_entry->type &= ~DESC_BUSY;
18234770e9c8SCathy Avery 
18244770e9c8SCathy Avery 	apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]);
18254770e9c8SCathy Avery 
1826d36b378fSVarad Gautam 	for (i = 0; i < 5 && atomic_read(&cpu_online_count) < orig_cpu_count; i++)
18274770e9c8SCathy Avery 		delay(100000000ULL);
18284770e9c8SCathy Avery }
18294770e9c8SCathy Avery 
18304770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test)
18314770e9c8SCathy Avery {
18324770e9c8SCathy Avery 	return true;
18334770e9c8SCathy Avery }
18344770e9c8SCathy Avery 
18354770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test)
18364770e9c8SCathy Avery {
1837d36b378fSVarad Gautam 	return atomic_read(&cpu_online_count) == orig_cpu_count;
18384770e9c8SCathy Avery }
18394770e9c8SCathy Avery 
1840d5da6dfeSCathy Avery static volatile bool init_intercept;
1841d5da6dfeSCathy Avery 
1842d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test)
1843d5da6dfeSCathy Avery {
1844d5da6dfeSCathy Avery 	init_intercept = false;
1845d5da6dfeSCathy Avery 	vmcb->control.intercept |= (1ULL << INTERCEPT_INIT);
1846d5da6dfeSCathy Avery }
1847d5da6dfeSCathy Avery 
1848d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test)
1849d5da6dfeSCathy Avery {
1850d5da6dfeSCathy Avery 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0);
1851d5da6dfeSCathy Avery }
1852d5da6dfeSCathy Avery 
1853d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test)
1854d5da6dfeSCathy Avery {
1855d5da6dfeSCathy Avery 	vmcb->save.rip += 3;
1856d5da6dfeSCathy Avery 
1857d5da6dfeSCathy Avery 	if (vmcb->control.exit_code != SVM_EXIT_INIT) {
1858198dfd0eSJanis Schoetterl-Glausch 		report_fail("VMEXIT not due to init intercept. Exit reason 0x%x",
1859d5da6dfeSCathy Avery 			    vmcb->control.exit_code);
1860d5da6dfeSCathy Avery 
1861d5da6dfeSCathy Avery 		return true;
1862d5da6dfeSCathy Avery 	}
1863d5da6dfeSCathy Avery 
1864d5da6dfeSCathy Avery 	init_intercept = true;
1865d5da6dfeSCathy Avery 
18665c3582f0SJanis Schoetterl-Glausch 	report_pass("INIT to vcpu intercepted");
1867d5da6dfeSCathy Avery 
1868d5da6dfeSCathy Avery 	return true;
1869d5da6dfeSCathy Avery }
1870d5da6dfeSCathy Avery 
1871d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test)
1872d5da6dfeSCathy Avery {
1873d5da6dfeSCathy Avery 	return init_intercept;
1874d5da6dfeSCathy Avery }
1875d5da6dfeSCathy Avery 
18767839b0ecSKrish Sadhukhan /*
18777839b0ecSKrish Sadhukhan  * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the
18787839b0ecSKrish Sadhukhan  * host side (i.e., after the #VMEXIT from the guest).
18797839b0ecSKrish Sadhukhan  *
18800689a980SKrish Sadhukhan  * Setting host EFLAGS.RF suppresses any potential instruction breakpoint
18810689a980SKrish Sadhukhan  * match on the VMRUN and completion of the VMRUN instruction clears the
18820689a980SKrish Sadhukhan  * host EFLAGS.RF bit.
18830689a980SKrish Sadhukhan  *
18847839b0ecSKrish Sadhukhan  * [AMD APM]
18857839b0ecSKrish Sadhukhan  */
18867839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0;
18877839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0;
18887839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false;
18897839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false;
18907839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false;
18910689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false;
18920689a980SKrish Sadhukhan static u64 rip_detected;
18937839b0ecSKrish Sadhukhan 
18947839b0ecSKrish Sadhukhan extern u64 *vmrun_rip;
18957839b0ecSKrish Sadhukhan 
18967839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r)
18977839b0ecSKrish Sadhukhan {
18987839b0ecSKrish Sadhukhan 	if (host_rflags_ss_on_vmrun) {
18997839b0ecSKrish Sadhukhan 		if (host_rflags_vmrun_reached) {
19000689a980SKrish Sadhukhan 			if (!host_rflags_set_rf) {
19017839b0ecSKrish Sadhukhan 				r->rflags &= ~X86_EFLAGS_TF;
19020689a980SKrish Sadhukhan 				rip_detected = r->rip;
19037839b0ecSKrish Sadhukhan 			} else {
19040689a980SKrish Sadhukhan 				r->rflags |= X86_EFLAGS_RF;
19050689a980SKrish Sadhukhan 				++host_rflags_db_handler_flag;
19060689a980SKrish Sadhukhan 			}
19070689a980SKrish Sadhukhan 		} else {
19080689a980SKrish Sadhukhan 			if (r->rip == (u64)&vmrun_rip) {
19097839b0ecSKrish Sadhukhan 				host_rflags_vmrun_reached = true;
19100689a980SKrish Sadhukhan 
19110689a980SKrish Sadhukhan 				if (host_rflags_set_rf) {
19120689a980SKrish Sadhukhan 					host_rflags_guest_main_flag = 0;
19130689a980SKrish Sadhukhan 					rip_detected = r->rip;
19140689a980SKrish Sadhukhan 					r->rflags &= ~X86_EFLAGS_TF;
19150689a980SKrish Sadhukhan 
19160689a980SKrish Sadhukhan 					/* Trigger #DB via debug registers */
19170689a980SKrish Sadhukhan 					write_dr0((void *)&vmrun_rip);
19180689a980SKrish Sadhukhan 					write_dr7(0x403);
19190689a980SKrish Sadhukhan 				}
19200689a980SKrish Sadhukhan 			}
19217839b0ecSKrish Sadhukhan 		}
19227839b0ecSKrish Sadhukhan 	} else {
19237839b0ecSKrish Sadhukhan 		r->rflags &= ~X86_EFLAGS_TF;
19247839b0ecSKrish Sadhukhan 	}
19257839b0ecSKrish Sadhukhan }
19267839b0ecSKrish Sadhukhan 
19277839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test)
19287839b0ecSKrish Sadhukhan {
19297839b0ecSKrish Sadhukhan 	default_prepare(test);
19307839b0ecSKrish Sadhukhan 	handle_exception(DB_VECTOR, host_rflags_db_handler);
19317839b0ecSKrish Sadhukhan 	set_test_stage(test, 0);
19327839b0ecSKrish Sadhukhan }
19337839b0ecSKrish Sadhukhan 
19347839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test)
19357839b0ecSKrish Sadhukhan {
19367839b0ecSKrish Sadhukhan 	if (host_rflags_set_tf)
19377839b0ecSKrish Sadhukhan 		write_rflags(read_rflags() | X86_EFLAGS_TF);
19387839b0ecSKrish Sadhukhan }
19397839b0ecSKrish Sadhukhan 
19407839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test)
19417839b0ecSKrish Sadhukhan {
19427839b0ecSKrish Sadhukhan 	while (1) {
19430689a980SKrish Sadhukhan 		if (get_test_stage(test) > 0) {
19440689a980SKrish Sadhukhan 			if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) ||
19450689a980SKrish Sadhukhan 			    (host_rflags_set_rf && host_rflags_db_handler_flag == 1))
19467839b0ecSKrish Sadhukhan 				host_rflags_guest_main_flag = 1;
19470689a980SKrish Sadhukhan 		}
19480689a980SKrish Sadhukhan 
19490689a980SKrish Sadhukhan 		if (get_test_stage(test) == 4)
19507839b0ecSKrish Sadhukhan 			break;
19517839b0ecSKrish Sadhukhan 		vmmcall();
19527839b0ecSKrish Sadhukhan 	}
19537839b0ecSKrish Sadhukhan }
19547839b0ecSKrish Sadhukhan 
19557839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test)
19567839b0ecSKrish Sadhukhan {
19577839b0ecSKrish Sadhukhan 	switch (get_test_stage(test)) {
19587839b0ecSKrish Sadhukhan 	case 0:
19597839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1960198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT. Exit reason 0x%x",
19617839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
19627839b0ecSKrish Sadhukhan 			return true;
19637839b0ecSKrish Sadhukhan 		}
19647839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
19657839b0ecSKrish Sadhukhan 		/*
19667839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF not immediately before VMRUN, causes
19677839b0ecSKrish Sadhukhan 		 * #DB trap before first guest instruction is executed
19687839b0ecSKrish Sadhukhan 		 */
19697839b0ecSKrish Sadhukhan 		host_rflags_set_tf = true;
19707839b0ecSKrish Sadhukhan 		break;
19717839b0ecSKrish Sadhukhan 	case 1:
19727839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
19730689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1) {
1974198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or #DB handler"
19757839b0ecSKrish Sadhukhan 				    " invoked before guest main. Exit reason 0x%x",
19767839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
19777839b0ecSKrish Sadhukhan 			return true;
19787839b0ecSKrish Sadhukhan 		}
19797839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
19807839b0ecSKrish Sadhukhan 		/*
19817839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF immediately before VMRUN, causes #DB
19827839b0ecSKrish Sadhukhan 		 * trap after VMRUN completes on the host side (i.e., after
19837839b0ecSKrish Sadhukhan 		 * VMEXIT from guest).
19847839b0ecSKrish Sadhukhan 		 */
19857839b0ecSKrish Sadhukhan 		host_rflags_ss_on_vmrun = true;
19867839b0ecSKrish Sadhukhan 		break;
19877839b0ecSKrish Sadhukhan 	case 2:
19887839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
19890c22fd44SPaolo Bonzini 		    rip_detected != (u64)&vmrun_rip + 3) {
1990198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch."
19910689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
19920689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
19930c22fd44SPaolo Bonzini 				    (u64)&vmrun_rip + 3, rip_detected);
19940689a980SKrish Sadhukhan 			return true;
19950689a980SKrish Sadhukhan 		}
19960689a980SKrish Sadhukhan 		host_rflags_set_rf = true;
19970689a980SKrish Sadhukhan 		host_rflags_guest_main_flag = 0;
19980689a980SKrish Sadhukhan 		host_rflags_vmrun_reached = false;
19990689a980SKrish Sadhukhan 		vmcb->save.rip += 3;
20000689a980SKrish Sadhukhan 		break;
20010689a980SKrish Sadhukhan 	case 3:
20020689a980SKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
20030689a980SKrish Sadhukhan 		    rip_detected != (u64)&vmrun_rip ||
20040689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1 ||
20050689a980SKrish Sadhukhan 		    host_rflags_db_handler_flag > 1 ||
20060689a980SKrish Sadhukhan 		    read_rflags() & X86_EFLAGS_RF) {
2007198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch or "
20080689a980SKrish Sadhukhan 				    "EFLAGS.RF not cleared."
20090689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
20100689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
20110689a980SKrish Sadhukhan 				    (u64)&vmrun_rip, rip_detected);
20127839b0ecSKrish Sadhukhan 			return true;
20137839b0ecSKrish Sadhukhan 		}
20147839b0ecSKrish Sadhukhan 		host_rflags_set_tf = false;
20150689a980SKrish Sadhukhan 		host_rflags_set_rf = false;
20167839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
20177839b0ecSKrish Sadhukhan 		break;
20187839b0ecSKrish Sadhukhan 	default:
20197839b0ecSKrish Sadhukhan 		return true;
20207839b0ecSKrish Sadhukhan 	}
20217839b0ecSKrish Sadhukhan 	inc_test_stage(test);
20220689a980SKrish Sadhukhan 	return get_test_stage(test) == 5;
20237839b0ecSKrish Sadhukhan }
20247839b0ecSKrish Sadhukhan 
20257839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test)
20267839b0ecSKrish Sadhukhan {
20270689a980SKrish Sadhukhan 	return get_test_stage(test) == 4;
20287839b0ecSKrish Sadhukhan }
20297839b0ecSKrish Sadhukhan 
20308660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name }
20318660d1b5SKrish Sadhukhan 
2032ba29942cSKrish Sadhukhan /*
2033ba29942cSKrish Sadhukhan  * v2 tests
2034ba29942cSKrish Sadhukhan  */
2035ba29942cSKrish Sadhukhan 
2036f32183f5SJim Mattson /*
2037f32183f5SJim Mattson  * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE
2038f32183f5SJim Mattson  * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different
2039f32183f5SJim Mattson  * value than in L1.
2040f32183f5SJim Mattson  */
2041f32183f5SJim Mattson 
2042f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test)
2043f32183f5SJim Mattson {
2044f32183f5SJim Mattson 	write_cr4(read_cr4() & ~X86_CR4_OSXSAVE);
2045f32183f5SJim Mattson }
2046f32183f5SJim Mattson 
2047f32183f5SJim Mattson static void svm_cr4_osxsave_test(void)
2048f32183f5SJim Mattson {
2049f32183f5SJim Mattson 	if (!this_cpu_has(X86_FEATURE_XSAVE)) {
2050f32183f5SJim Mattson 		report_skip("XSAVE not detected");
2051f32183f5SJim Mattson 		return;
2052f32183f5SJim Mattson 	}
2053f32183f5SJim Mattson 
2054f32183f5SJim Mattson 	if (!(read_cr4() & X86_CR4_OSXSAVE)) {
2055f32183f5SJim Mattson 		unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE;
2056f32183f5SJim Mattson 
2057f32183f5SJim Mattson 		write_cr4(cr4);
2058f32183f5SJim Mattson 		vmcb->save.cr4 = cr4;
2059f32183f5SJim Mattson 	}
2060f32183f5SJim Mattson 
2061816c0359SSean Christopherson 	report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set before VMRUN");
2062f32183f5SJim Mattson 
2063f32183f5SJim Mattson 	test_set_guest(svm_cr4_osxsave_test_guest);
2064f32183f5SJim Mattson 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
2065f32183f5SJim Mattson 	       "svm_cr4_osxsave_test_guest finished with VMMCALL");
2066f32183f5SJim Mattson 
2067816c0359SSean Christopherson 	report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set after VMRUN");
2068f32183f5SJim Mattson }
2069f32183f5SJim Mattson 
2070ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test)
2071ba29942cSKrish Sadhukhan {
2072ba29942cSKrish Sadhukhan }
2073ba29942cSKrish Sadhukhan 
2074eae10e8fSKrish Sadhukhan 
2075eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val,	\
2076eae10e8fSKrish Sadhukhan 				   resv_mask)				\
2077eae10e8fSKrish Sadhukhan {									\
2078eae10e8fSKrish Sadhukhan 	u64 tmp, mask;							\
2079eae10e8fSKrish Sadhukhan 	int i;								\
2080eae10e8fSKrish Sadhukhan 									\
2081eae10e8fSKrish Sadhukhan 	for (i = start; i <= end; i = i + inc) {			\
2082eae10e8fSKrish Sadhukhan 		mask = 1ull << i;					\
2083eae10e8fSKrish Sadhukhan 		if (!(mask & resv_mask))				\
2084eae10e8fSKrish Sadhukhan 			continue;					\
2085eae10e8fSKrish Sadhukhan 		tmp = val | mask;					\
2086eae10e8fSKrish Sadhukhan 		reg = tmp;						\
2087eae10e8fSKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx", \
2088eae10e8fSKrish Sadhukhan 		       str_name, end, start, tmp);			\
2089eae10e8fSKrish Sadhukhan 	}								\
2090eae10e8fSKrish Sadhukhan }
2091eae10e8fSKrish Sadhukhan 
20926d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask,	\
2093cb6524f3SPaolo Bonzini 				  exit_code, test_name)			\
2094a79c9495SKrish Sadhukhan {									\
2095a79c9495SKrish Sadhukhan 	u64 tmp, mask;							\
20968ae6d77fSSean Christopherson 	u32 r;								\
2097a79c9495SKrish Sadhukhan 	int i;								\
2098a79c9495SKrish Sadhukhan 									\
2099a79c9495SKrish Sadhukhan 	for (i = start; i <= end; i = i + inc) {			\
2100a79c9495SKrish Sadhukhan 		mask = 1ull << i;					\
2101a79c9495SKrish Sadhukhan 		if (!(mask & resv_mask))				\
2102a79c9495SKrish Sadhukhan 			continue;					\
2103a79c9495SKrish Sadhukhan 		tmp = val | mask;					\
2104a79c9495SKrish Sadhukhan 		switch (cr) {						\
2105a79c9495SKrish Sadhukhan 		case 0:							\
2106a79c9495SKrish Sadhukhan 			vmcb->save.cr0 = tmp;				\
2107a79c9495SKrish Sadhukhan 			break;						\
2108a79c9495SKrish Sadhukhan 		case 3:							\
2109a79c9495SKrish Sadhukhan 			vmcb->save.cr3 = tmp;				\
2110a79c9495SKrish Sadhukhan 			break;						\
2111a79c9495SKrish Sadhukhan 		case 4:							\
2112a79c9495SKrish Sadhukhan 			vmcb->save.cr4 = tmp;				\
2113a79c9495SKrish Sadhukhan 		}							\
21148ae6d77fSSean Christopherson 		r = svm_vmrun();					\
21158ae6d77fSSean Christopherson 		report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x", \
21168ae6d77fSSean Christopherson 		       cr, test_name, end, start, tmp, exit_code, r);	\
2117a79c9495SKrish Sadhukhan 	}								\
2118a79c9495SKrish Sadhukhan }
2119e8d7a8f6SKrish Sadhukhan 
2120a79c9495SKrish Sadhukhan static void test_efer(void)
2121a79c9495SKrish Sadhukhan {
2122e8d7a8f6SKrish Sadhukhan 	/*
2123e8d7a8f6SKrish Sadhukhan 	 * Un-setting EFER.SVME is illegal
2124e8d7a8f6SKrish Sadhukhan 	 */
2125ba29942cSKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2126ba29942cSKrish Sadhukhan 	u64 efer = efer_saved;
2127ba29942cSKrish Sadhukhan 
2128ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer);
2129ba29942cSKrish Sadhukhan 	efer &= ~EFER_SVME;
2130ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer;
2131ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer);
2132ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2133e8d7a8f6SKrish Sadhukhan 
2134e8d7a8f6SKrish Sadhukhan 	/*
2135a79c9495SKrish Sadhukhan 	 * EFER MBZ bits: 63:16, 9
2136a79c9495SKrish Sadhukhan 	 */
2137a79c9495SKrish Sadhukhan 	efer_saved = vmcb->save.efer;
2138a79c9495SKrish Sadhukhan 
2139a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer,
2140a79c9495SKrish Sadhukhan 				   efer_saved, SVM_EFER_RESERVED_MASK);
2141a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer,
2142a79c9495SKrish Sadhukhan 				   efer_saved, SVM_EFER_RESERVED_MASK);
2143a79c9495SKrish Sadhukhan 
21441d7bde08SKrish Sadhukhan 	/*
21451d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR4.PAE is zero.
21461d7bde08SKrish Sadhukhan 	 */
21471d7bde08SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
21481d7bde08SKrish Sadhukhan 	u64 cr0;
21491d7bde08SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
21501d7bde08SKrish Sadhukhan 	u64 cr4;
21511d7bde08SKrish Sadhukhan 
21521d7bde08SKrish Sadhukhan 	efer = efer_saved | EFER_LME;
21531d7bde08SKrish Sadhukhan 	vmcb->save.efer = efer;
21541d7bde08SKrish Sadhukhan 	cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE;
21551d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
21561d7bde08SKrish Sadhukhan 	cr4 = cr4_saved & ~X86_CR4_PAE;
21571d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4;
21581d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
21591d7bde08SKrish Sadhukhan 	       "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4);
21601d7bde08SKrish Sadhukhan 
21611d7bde08SKrish Sadhukhan 	/*
21621d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR0.PE is zero.
2163fc050452SLara Lazier 	 * CR4.PAE needs to be set as we otherwise cannot
2164fc050452SLara Lazier 	 * determine if CR4.PAE=0 or CR0.PE=0 triggered the
2165fc050452SLara Lazier 	 * SVM_EXIT_ERR.
21661d7bde08SKrish Sadhukhan 	 */
2167fc050452SLara Lazier 	cr4 = cr4_saved | X86_CR4_PAE;
2168fc050452SLara Lazier 	vmcb->save.cr4 = cr4;
21691d7bde08SKrish Sadhukhan 	cr0 &= ~X86_CR0_PE;
21701d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
21711d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
21721d7bde08SKrish Sadhukhan 	       "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0);
21731d7bde08SKrish Sadhukhan 
21741d7bde08SKrish Sadhukhan 	/*
21751d7bde08SKrish Sadhukhan 	 * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero.
21761d7bde08SKrish Sadhukhan 	 */
21771d7bde08SKrish Sadhukhan 	u32 cs_attrib_saved = vmcb->save.cs.attrib;
21781d7bde08SKrish Sadhukhan 	u32 cs_attrib;
21791d7bde08SKrish Sadhukhan 
21801d7bde08SKrish Sadhukhan 	cr0 |= X86_CR0_PE;
21811d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
21821d7bde08SKrish Sadhukhan 	cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK |
21831d7bde08SKrish Sadhukhan 		SVM_SELECTOR_DB_MASK;
21841d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib;
21851d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
21861d7bde08SKrish Sadhukhan 	       "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)",
21871d7bde08SKrish Sadhukhan 	       efer, cr0, cr4, cs_attrib);
21881d7bde08SKrish Sadhukhan 
21891d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
21901d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2191a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
21921d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib_saved;
2193a79c9495SKrish Sadhukhan }
2194a79c9495SKrish Sadhukhan 
2195a79c9495SKrish Sadhukhan static void test_cr0(void)
2196a79c9495SKrish Sadhukhan {
2197a79c9495SKrish Sadhukhan 	/*
2198e8d7a8f6SKrish Sadhukhan 	 * Un-setting CR0.CD and setting CR0.NW is illegal combination
2199e8d7a8f6SKrish Sadhukhan 	 */
2200e8d7a8f6SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
2201e8d7a8f6SKrish Sadhukhan 	u64 cr0 = cr0_saved;
2202e8d7a8f6SKrish Sadhukhan 
2203e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_CD;
2204e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2205e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2206a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx",
2207a79c9495SKrish Sadhukhan 		cr0);
2208e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2209e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2210a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx",
2211a79c9495SKrish Sadhukhan 		cr0);
2212e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2213e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_CD;
2214e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2215a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx",
2216a79c9495SKrish Sadhukhan 		cr0);
2217e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2218e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2219a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx",
2220a79c9495SKrish Sadhukhan 		cr0);
2221e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
22225c052c90SKrish Sadhukhan 
22235c052c90SKrish Sadhukhan 	/*
22245c052c90SKrish Sadhukhan 	 * CR0[63:32] are not zero
22255c052c90SKrish Sadhukhan 	 */
22265c052c90SKrish Sadhukhan 	cr0 = cr0_saved;
2227eae10e8fSKrish Sadhukhan 
2228eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved,
2229eae10e8fSKrish Sadhukhan 				   SVM_CR0_RESERVED_MASK);
22305c052c90SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
2231a79c9495SKrish Sadhukhan }
2232eae10e8fSKrish Sadhukhan 
2233a79c9495SKrish Sadhukhan static void test_cr3(void)
2234a79c9495SKrish Sadhukhan {
2235a79c9495SKrish Sadhukhan 	/*
2236a79c9495SKrish Sadhukhan 	 * CR3 MBZ bits based on different modes:
223729a01803SNadav Amit 	 *   [63:52] - long mode
2238a79c9495SKrish Sadhukhan 	 */
2239a79c9495SKrish Sadhukhan 	u64 cr3_saved = vmcb->save.cr3;
2240a79c9495SKrish Sadhukhan 
2241a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved,
2242cb6524f3SPaolo Bonzini 				  SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, "");
22436d0ecbf6SKrish Sadhukhan 
22446d0ecbf6SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK;
22456d0ecbf6SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
22466d0ecbf6SKrish Sadhukhan 	       vmcb->save.cr3);
22476d0ecbf6SKrish Sadhukhan 
22486d0ecbf6SKrish Sadhukhan 	/*
22496d0ecbf6SKrish Sadhukhan 	 * CR3 non-MBZ reserved bits based on different modes:
2250cb6524f3SPaolo Bonzini 	 *   [11:5] [2:0] - long mode (PCIDE=0)
22516d0ecbf6SKrish Sadhukhan 	 *          [2:0] - PAE legacy mode
22526d0ecbf6SKrish Sadhukhan 	 */
22536d0ecbf6SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
22546d0ecbf6SKrish Sadhukhan 	u64 *pdpe = npt_get_pml4e();
22556d0ecbf6SKrish Sadhukhan 
22566d0ecbf6SKrish Sadhukhan 	/*
22576d0ecbf6SKrish Sadhukhan 	 * Long mode
22586d0ecbf6SKrish Sadhukhan 	 */
22596d0ecbf6SKrish Sadhukhan 	if (this_cpu_has(X86_FEATURE_PCID)) {
22606d0ecbf6SKrish Sadhukhan 		vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE;
22616d0ecbf6SKrish Sadhukhan 		SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2262cb6524f3SPaolo Bonzini 					  SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) ");
22636d0ecbf6SKrish Sadhukhan 
22646d0ecbf6SKrish Sadhukhan 		vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK;
22656d0ecbf6SKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
22666d0ecbf6SKrish Sadhukhan 		       vmcb->save.cr3);
2267cb6524f3SPaolo Bonzini 	}
22686d0ecbf6SKrish Sadhukhan 
22696d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE;
22706d0ecbf6SKrish Sadhukhan 
2271993749ffSSean Christopherson 	if (!npt_supported())
2272993749ffSSean Christopherson 		goto skip_npt_only;
2273993749ffSSean Christopherson 
22746d0ecbf6SKrish Sadhukhan 	/* Clear P (Present) bit in NPT in order to trigger #NPF */
22756d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
22766d0ecbf6SKrish Sadhukhan 
22776d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2278cb6524f3SPaolo Bonzini 				  SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) ");
22796d0ecbf6SKrish Sadhukhan 
22806d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2281cb6524f3SPaolo Bonzini 	vmcb->save.cr3 = cr3_saved;
22826d0ecbf6SKrish Sadhukhan 
22836d0ecbf6SKrish Sadhukhan 	/*
22846d0ecbf6SKrish Sadhukhan 	 * PAE legacy
22856d0ecbf6SKrish Sadhukhan 	 */
22866d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
22876d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved | X86_CR4_PAE;
22886d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved,
2289cb6524f3SPaolo Bonzini 				  SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) ");
22906d0ecbf6SKrish Sadhukhan 
22916d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2292993749ffSSean Christopherson 
2293993749ffSSean Christopherson skip_npt_only:
2294a79c9495SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved;
22956d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2296a79c9495SKrish Sadhukhan }
2297a79c9495SKrish Sadhukhan 
2298d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */
2299a79c9495SKrish Sadhukhan static void test_cr4(void)
2300a79c9495SKrish Sadhukhan {
2301a79c9495SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
2302a79c9495SKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2303a79c9495SKrish Sadhukhan 	u64 efer = efer_saved;
2304a79c9495SKrish Sadhukhan 
2305a79c9495SKrish Sadhukhan 	efer &= ~EFER_LME;
2306a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2307a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2308cb6524f3SPaolo Bonzini 				  SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, "");
2309a79c9495SKrish Sadhukhan 
2310a79c9495SKrish Sadhukhan 	efer |= EFER_LME;
2311a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2312a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2313cb6524f3SPaolo Bonzini 				  SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2314a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved,
2315cb6524f3SPaolo Bonzini 				  SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2316a79c9495SKrish Sadhukhan 
2317a79c9495SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2318a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2319a79c9495SKrish Sadhukhan }
2320a79c9495SKrish Sadhukhan 
2321a79c9495SKrish Sadhukhan static void test_dr(void)
2322a79c9495SKrish Sadhukhan {
2323eae10e8fSKrish Sadhukhan 	/*
2324eae10e8fSKrish Sadhukhan 	 * DR6[63:32] and DR7[63:32] are MBZ
2325eae10e8fSKrish Sadhukhan 	 */
2326eae10e8fSKrish Sadhukhan 	u64 dr_saved = vmcb->save.dr6;
2327eae10e8fSKrish Sadhukhan 
2328eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved,
2329eae10e8fSKrish Sadhukhan 				   SVM_DR6_RESERVED_MASK);
2330eae10e8fSKrish Sadhukhan 	vmcb->save.dr6 = dr_saved;
2331eae10e8fSKrish Sadhukhan 
2332eae10e8fSKrish Sadhukhan 	dr_saved = vmcb->save.dr7;
2333eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved,
2334eae10e8fSKrish Sadhukhan 				   SVM_DR7_RESERVED_MASK);
2335eae10e8fSKrish Sadhukhan 
2336eae10e8fSKrish Sadhukhan 	vmcb->save.dr7 = dr_saved;
2337a79c9495SKrish Sadhukhan }
2338eae10e8fSKrish Sadhukhan 
2339abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */
2340abe82380SKrish Sadhukhan #define	TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code,		\
2341abe82380SKrish Sadhukhan 			 msg) {						\
2342abe82380SKrish Sadhukhan 		vmcb->control.intercept = saved_intercept | 1ULL << type; \
2343abe82380SKrish Sadhukhan 		if (type == INTERCEPT_MSR_PROT)				\
2344abe82380SKrish Sadhukhan 			vmcb->control.msrpm_base_pa = addr;		\
2345abe82380SKrish Sadhukhan 		else							\
2346abe82380SKrish Sadhukhan 			vmcb->control.iopm_base_pa = addr;		\
2347abe82380SKrish Sadhukhan 		report(svm_vmrun() == exit_code,			\
2348abe82380SKrish Sadhukhan 		       "Test %s address: %lx", msg, addr);		\
2349abe82380SKrish Sadhukhan 	}
2350abe82380SKrish Sadhukhan 
2351abe82380SKrish Sadhukhan /*
2352abe82380SKrish Sadhukhan  * If the MSR or IOIO intercept table extends to a physical address that
2353abe82380SKrish Sadhukhan  * is greater than or equal to the maximum supported physical address, the
2354abe82380SKrish Sadhukhan  * guest state is illegal.
2355abe82380SKrish Sadhukhan  *
2356abe82380SKrish Sadhukhan  * The VMRUN instruction ignores the lower 12 bits of the address specified
2357abe82380SKrish Sadhukhan  * in the VMCB.
2358abe82380SKrish Sadhukhan  *
2359abe82380SKrish Sadhukhan  * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB
2360abe82380SKrish Sadhukhan  * pages + 1 byte.
2361abe82380SKrish Sadhukhan  *
2362abe82380SKrish Sadhukhan  * [APM vol 2]
2363abe82380SKrish Sadhukhan  *
2364abe82380SKrish Sadhukhan  * Note: Unallocated MSRPM addresses conforming to consistency checks, generate
2365abe82380SKrish Sadhukhan  * #NPF.
2366abe82380SKrish Sadhukhan  */
2367abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void)
2368abe82380SKrish Sadhukhan {
2369abe82380SKrish Sadhukhan 	u64 saved_intercept = vmcb->control.intercept;
2370abe82380SKrish Sadhukhan 	u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr();
2371abe82380SKrish Sadhukhan 	u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1));
2372abe82380SKrish Sadhukhan 
2373abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2374abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2375abe82380SKrish Sadhukhan 			 "MSRPM");
2376abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2377abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR,
2378abe82380SKrish Sadhukhan 			 "MSRPM");
2379abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2380abe82380SKrish Sadhukhan 			 addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2381abe82380SKrish Sadhukhan 			 "MSRPM");
2382abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2383abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "MSRPM");
2384abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2385abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2386abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "MSRPM");
2387abe82380SKrish Sadhukhan 
2388abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2389abe82380SKrish Sadhukhan 			 addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2390abe82380SKrish Sadhukhan 			 "IOPM");
2391abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2392abe82380SKrish Sadhukhan 			 addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2393abe82380SKrish Sadhukhan 			 "IOPM");
2394abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2395abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL,
2396abe82380SKrish Sadhukhan 			 "IOPM");
2397abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2398abe82380SKrish Sadhukhan 			 addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2399abe82380SKrish Sadhukhan 			 "IOPM");
2400abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2401abe82380SKrish Sadhukhan 			 addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2402abe82380SKrish Sadhukhan 			 "IOPM");
2403abe82380SKrish Sadhukhan 	addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1));
2404abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2405abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "IOPM");
2406abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2407abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2408abe82380SKrish Sadhukhan 			 SVM_EXIT_VMMCALL, "IOPM");
2409abe82380SKrish Sadhukhan 
2410abe82380SKrish Sadhukhan 	vmcb->control.intercept = saved_intercept;
2411abe82380SKrish Sadhukhan }
2412abe82380SKrish Sadhukhan 
2413ba3c9773SLara Lazier /*
2414ba3c9773SLara Lazier  * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical
2415ba3c9773SLara Lazier  * segment bases in the VMCB.  However, VMENTRY succeeds as documented.
2416ba3c9773SLara Lazier  */
2417ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg)				\
2418a99070ebSKrish Sadhukhan 	saved_addr = seg_base;						\
2419a99070ebSKrish Sadhukhan 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2420ba3c9773SLara Lazier 	return_value = svm_vmrun();					\
2421ba3c9773SLara Lazier 	report(return_value == SVM_EXIT_VMMCALL,			\
2422ba3c9773SLara Lazier 	       "Successful VMRUN with noncanonical %s.base", msg);	\
2423a99070ebSKrish Sadhukhan 	seg_base = saved_addr;
2424a99070ebSKrish Sadhukhan 
2425ba3c9773SLara Lazier 
2426ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg)				\
2427ba3c9773SLara Lazier 	saved_addr = seg_base;						\
2428ba3c9773SLara Lazier 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2429ba3c9773SLara Lazier 	asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory");	\
2430ba3c9773SLara Lazier 	asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory");	\
2431ba3c9773SLara Lazier 	report(is_canonical(seg_base),					\
2432ba3c9773SLara Lazier 	       "Test %s.base for canonical form: %lx", msg, seg_base);	\
2433ba3c9773SLara Lazier 	seg_base = saved_addr;
2434ba3c9773SLara Lazier 
2435ba3c9773SLara Lazier static void test_canonicalization(void)
2436a99070ebSKrish Sadhukhan {
2437a99070ebSKrish Sadhukhan 	u64 saved_addr;
2438ba3c9773SLara Lazier 	u64 return_value;
2439ba3c9773SLara Lazier 	u64 addr_limit;
2440ba3c9773SLara Lazier 	u64 vmcb_phys = virt_to_phys(vmcb);
2441ba3c9773SLara Lazier 
2442ba3c9773SLara Lazier 	addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48;
2443a99070ebSKrish Sadhukhan 	u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1);
2444a99070ebSKrish Sadhukhan 
2445ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS");
2446ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS");
2447ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR");
2448ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR");
2449ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS");
2450ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES");
2451ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS");
2452ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS");
2453ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS");
2454ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR");
2455ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR");
2456a99070ebSKrish Sadhukhan }
2457a99070ebSKrish Sadhukhan 
2458665f5677SKrish Sadhukhan /*
2459665f5677SKrish Sadhukhan  * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not
2460665f5677SKrish Sadhukhan  * cause a trace trap between the VMRUN and the first guest instruction, but
2461665f5677SKrish Sadhukhan  * rather after completion of the first guest instruction.
2462665f5677SKrish Sadhukhan  *
2463665f5677SKrish Sadhukhan  * [APM vol 2]
2464665f5677SKrish Sadhukhan  */
2465665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip;
2466665f5677SKrish Sadhukhan 
2467665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r)
2468665f5677SKrish Sadhukhan {
2469665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = r->rip;
2470665f5677SKrish Sadhukhan 	r->rflags &= ~X86_EFLAGS_TF;
2471665f5677SKrish Sadhukhan }
2472665f5677SKrish Sadhukhan 
2473a79c9495SKrish Sadhukhan static void svm_guest_state_test(void)
2474a79c9495SKrish Sadhukhan {
2475a79c9495SKrish Sadhukhan 	test_set_guest(basic_guest_main);
2476a79c9495SKrish Sadhukhan 	test_efer();
2477a79c9495SKrish Sadhukhan 	test_cr0();
2478a79c9495SKrish Sadhukhan 	test_cr3();
2479a79c9495SKrish Sadhukhan 	test_cr4();
2480a79c9495SKrish Sadhukhan 	test_dr();
2481abe82380SKrish Sadhukhan 	test_msrpm_iopm_bitmap_addrs();
2482ba3c9773SLara Lazier 	test_canonicalization();
2483ba29942cSKrish Sadhukhan }
2484ba29942cSKrish Sadhukhan 
2485665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test);
2486665f5677SKrish Sadhukhan extern u64 *insn2;
2487665f5677SKrish Sadhukhan extern u64 *guest_end;
2488665f5677SKrish Sadhukhan 
2489665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t"
2490665f5677SKrish Sadhukhan     "push %rbp\n\t"
2491665f5677SKrish Sadhukhan     ".global insn2\n\t"
2492665f5677SKrish Sadhukhan     "insn2:\n\t"
2493665f5677SKrish Sadhukhan     "mov %rsp,%rbp\n\t"
2494665f5677SKrish Sadhukhan     "vmmcall\n\t"
2495665f5677SKrish Sadhukhan     "vmmcall\n\t"
2496665f5677SKrish Sadhukhan     ".global guest_end\n\t"
2497665f5677SKrish Sadhukhan     "guest_end:\n\t"
2498665f5677SKrish Sadhukhan     "vmmcall\n\t"
2499665f5677SKrish Sadhukhan     "pop %rbp\n\t"
2500665f5677SKrish Sadhukhan     "ret");
2501665f5677SKrish Sadhukhan 
2502665f5677SKrish Sadhukhan static void svm_test_singlestep(void)
2503665f5677SKrish Sadhukhan {
2504665f5677SKrish Sadhukhan 	handle_exception(DB_VECTOR, guest_rflags_test_db_handler);
2505665f5677SKrish Sadhukhan 
2506665f5677SKrish Sadhukhan 	/*
2507665f5677SKrish Sadhukhan 	 * Trap expected after completion of first guest instruction
2508665f5677SKrish Sadhukhan 	 */
2509665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2510665f5677SKrish Sadhukhan 	report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL &&
2511665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == (u64)&insn2,
2512665f5677SKrish Sadhukhan 		"Test EFLAGS.TF on VMRUN: trap expected  after completion of first guest instruction");
2513665f5677SKrish Sadhukhan 	/*
2514665f5677SKrish Sadhukhan 	 * No trap expected
2515665f5677SKrish Sadhukhan 	 */
2516665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = 0;
2517665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2518665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2519665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2520665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected");
2521665f5677SKrish Sadhukhan 
2522665f5677SKrish Sadhukhan 	/*
2523665f5677SKrish Sadhukhan 	 * Let guest finish execution
2524665f5677SKrish Sadhukhan 	 */
2525665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2526665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2527665f5677SKrish Sadhukhan 		vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion");
2528665f5677SKrish Sadhukhan }
2529665f5677SKrish Sadhukhan 
25307a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false;
25317a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0;
25327a57ef5dSMaxim Levitsky 
25337a57ef5dSMaxim Levitsky 
25347a57ef5dSMaxim Levitsky /*
25357a57ef5dSMaxim Levitsky  *
25367a57ef5dSMaxim Levitsky  * Test the following errata:
25377a57ef5dSMaxim Levitsky  * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest,
25387a57ef5dSMaxim Levitsky  * the CPU would first check the EAX against host reserved memory
25397a57ef5dSMaxim Levitsky  * regions (so far only SMM_ADDR/SMM_MASK are known to cause it),
25407a57ef5dSMaxim Levitsky  * and only then signal #VMexit
25417a57ef5dSMaxim Levitsky  *
25427a57ef5dSMaxim Levitsky  * Try to reproduce this by trying vmsave on each possible 4K aligned memory
25437a57ef5dSMaxim Levitsky  * address in the low 4G where the SMM area has to reside.
25447a57ef5dSMaxim Levitsky  */
25457a57ef5dSMaxim Levitsky 
25467a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r)
25477a57ef5dSMaxim Levitsky {
25487a57ef5dSMaxim Levitsky 	svm_errata_reproduced = true;
25497a57ef5dSMaxim Levitsky 	/* skip over the vmsave instruction*/
25507a57ef5dSMaxim Levitsky 	r->rip += 3;
25517a57ef5dSMaxim Levitsky }
25527a57ef5dSMaxim Levitsky 
25537a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void)
25547a57ef5dSMaxim Levitsky {
25557a57ef5dSMaxim Levitsky 	unsigned long *last_page = NULL;
25567a57ef5dSMaxim Levitsky 
25577a57ef5dSMaxim Levitsky 	handle_exception(GP_VECTOR, gp_isr);
25587a57ef5dSMaxim Levitsky 
25597a57ef5dSMaxim Levitsky 	while (!svm_errata_reproduced) {
25607a57ef5dSMaxim Levitsky 
25617a57ef5dSMaxim Levitsky 		unsigned long *page = alloc_pages(1);
25627a57ef5dSMaxim Levitsky 
25637a57ef5dSMaxim Levitsky 		if (!page) {
25645c3582f0SJanis Schoetterl-Glausch 			report_pass("All guest memory tested, no bug found");
25657a57ef5dSMaxim Levitsky 			break;
25667a57ef5dSMaxim Levitsky 		}
25677a57ef5dSMaxim Levitsky 
25687a57ef5dSMaxim Levitsky 		physical = virt_to_phys(page);
25697a57ef5dSMaxim Levitsky 
25707a57ef5dSMaxim Levitsky 		asm volatile (
25717a57ef5dSMaxim Levitsky 			      "mov %[_physical], %%rax\n\t"
25727a57ef5dSMaxim Levitsky 			      "vmsave %%rax\n\t"
25737a57ef5dSMaxim Levitsky 
25747a57ef5dSMaxim Levitsky 			      : [_physical] "=m" (physical)
25757a57ef5dSMaxim Levitsky 			      : /* no inputs*/
25767a57ef5dSMaxim Levitsky 			      : "rax" /*clobbers*/
25777a57ef5dSMaxim Levitsky 			      );
25787a57ef5dSMaxim Levitsky 
25797a57ef5dSMaxim Levitsky 		if (svm_errata_reproduced) {
2580198dfd0eSJanis Schoetterl-Glausch 			report_fail("Got #GP exception - svm errata reproduced at 0x%lx",
25817a57ef5dSMaxim Levitsky 				    physical);
25827a57ef5dSMaxim Levitsky 			break;
25837a57ef5dSMaxim Levitsky 		}
25847a57ef5dSMaxim Levitsky 
25857a57ef5dSMaxim Levitsky 		*page = (unsigned long)last_page;
25867a57ef5dSMaxim Levitsky 		last_page = page;
25877a57ef5dSMaxim Levitsky 	}
25887a57ef5dSMaxim Levitsky 
25897a57ef5dSMaxim Levitsky 	while (last_page) {
25907a57ef5dSMaxim Levitsky 		unsigned long *page = last_page;
25917a57ef5dSMaxim Levitsky 		last_page = (unsigned long *)*last_page;
25927a57ef5dSMaxim Levitsky 		free_pages_by_order(page, 1);
25937a57ef5dSMaxim Levitsky 	}
25947a57ef5dSMaxim Levitsky }
25957a57ef5dSMaxim Levitsky 
25960b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test)
25970b6f6cedSKrish Sadhukhan {
25980b6f6cedSKrish Sadhukhan 	u64 vmcb_phys = virt_to_phys(vmcb);
25990b6f6cedSKrish Sadhukhan 
26000b6f6cedSKrish Sadhukhan 	asm volatile ("vmload %0" : : "a"(vmcb_phys));
26010b6f6cedSKrish Sadhukhan 	asm volatile ("vmsave %0" : : "a"(vmcb_phys));
26020b6f6cedSKrish Sadhukhan }
26030b6f6cedSKrish Sadhukhan 
26040b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void)
26050b6f6cedSKrish Sadhukhan {
26060b6f6cedSKrish Sadhukhan 	u32 intercept_saved = vmcb->control.intercept;
26070b6f6cedSKrish Sadhukhan 
26080b6f6cedSKrish Sadhukhan 	test_set_guest(vmload_vmsave_guest_main);
26090b6f6cedSKrish Sadhukhan 
26100b6f6cedSKrish Sadhukhan 	/*
26110b6f6cedSKrish Sadhukhan 	 * Disabling intercept for VMLOAD and VMSAVE doesn't cause
26120b6f6cedSKrish Sadhukhan 	 * respective #VMEXIT to host
26130b6f6cedSKrish Sadhukhan 	 */
26140b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
26150b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
26160b6f6cedSKrish Sadhukhan 	svm_vmrun();
26170b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
26180b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
26190b6f6cedSKrish Sadhukhan 
26200b6f6cedSKrish Sadhukhan 	/*
26210b6f6cedSKrish Sadhukhan 	 * Enabling intercept for VMLOAD and VMSAVE causes respective
26220b6f6cedSKrish Sadhukhan 	 * #VMEXIT to host
26230b6f6cedSKrish Sadhukhan 	 */
26240b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
26250b6f6cedSKrish Sadhukhan 	svm_vmrun();
26260b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
26270b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
26280b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
26290b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
26300b6f6cedSKrish Sadhukhan 	svm_vmrun();
26310b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
26320b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
26330b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
26340b6f6cedSKrish Sadhukhan 	svm_vmrun();
26350b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
26360b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
26370b6f6cedSKrish Sadhukhan 
26380b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
26390b6f6cedSKrish Sadhukhan 	svm_vmrun();
26400b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
26410b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
26420b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
26430b6f6cedSKrish Sadhukhan 	svm_vmrun();
26440b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
26450b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
26460b6f6cedSKrish Sadhukhan 
26470b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
26480b6f6cedSKrish Sadhukhan 	svm_vmrun();
26490b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
26500b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
26510b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
26520b6f6cedSKrish Sadhukhan 	svm_vmrun();
26530b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
26540b6f6cedSKrish Sadhukhan 	       "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
26550b6f6cedSKrish Sadhukhan 
26560b6f6cedSKrish Sadhukhan 	vmcb->control.intercept = intercept_saved;
26570b6f6cedSKrish Sadhukhan }
26580b6f6cedSKrish Sadhukhan 
2659f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test)
2660f6972bd6SLara Lazier {
2661f6972bd6SLara Lazier 	default_prepare(test);
2662f6972bd6SLara Lazier }
2663f6972bd6SLara Lazier 
2664f6972bd6SLara Lazier static void test_vgif(struct svm_test *test)
2665f6972bd6SLara Lazier {
2666f6972bd6SLara Lazier 	asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t");
2667f6972bd6SLara Lazier }
2668f6972bd6SLara Lazier 
2669f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test)
2670f6972bd6SLara Lazier {
2671f6972bd6SLara Lazier 	switch (get_test_stage(test))
2672f6972bd6SLara Lazier 		{
2673f6972bd6SLara Lazier 		case 0:
2674f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2675198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2676f6972bd6SLara Lazier 				return true;
2677f6972bd6SLara Lazier 			}
2678f6972bd6SLara Lazier 			vmcb->control.int_ctl |= V_GIF_ENABLED_MASK;
2679f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2680f6972bd6SLara Lazier 			inc_test_stage(test);
2681f6972bd6SLara Lazier 			break;
2682f6972bd6SLara Lazier 		case 1:
2683f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2684198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2685f6972bd6SLara Lazier 				return true;
2686f6972bd6SLara Lazier 			}
2687f6972bd6SLara Lazier 			if (!(vmcb->control.int_ctl & V_GIF_MASK)) {
2688198dfd0eSJanis Schoetterl-Glausch 				report_fail("Failed to set VGIF when executing STGI.");
2689f6972bd6SLara Lazier 				vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2690f6972bd6SLara Lazier 				return true;
2691f6972bd6SLara Lazier 			}
26925c3582f0SJanis Schoetterl-Glausch 			report_pass("STGI set VGIF bit.");
2693f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2694f6972bd6SLara Lazier 			inc_test_stage(test);
2695f6972bd6SLara Lazier 			break;
2696f6972bd6SLara Lazier 		case 2:
2697f6972bd6SLara Lazier 			if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2698198dfd0eSJanis Schoetterl-Glausch 				report_fail("VMEXIT not due to vmmcall.");
2699f6972bd6SLara Lazier 				return true;
2700f6972bd6SLara Lazier 			}
2701f6972bd6SLara Lazier 			if (vmcb->control.int_ctl & V_GIF_MASK) {
2702198dfd0eSJanis Schoetterl-Glausch 				report_fail("Failed to clear VGIF when executing CLGI.");
2703f6972bd6SLara Lazier 				vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2704f6972bd6SLara Lazier 				return true;
2705f6972bd6SLara Lazier 			}
27065c3582f0SJanis Schoetterl-Glausch 			report_pass("CLGI cleared VGIF bit.");
2707f6972bd6SLara Lazier 			vmcb->save.rip += 3;
2708f6972bd6SLara Lazier 			inc_test_stage(test);
2709f6972bd6SLara Lazier 			vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
2710f6972bd6SLara Lazier 			break;
2711f6972bd6SLara Lazier 		default:
2712f6972bd6SLara Lazier 			return true;
2713f6972bd6SLara Lazier 			break;
2714f6972bd6SLara Lazier 		}
2715f6972bd6SLara Lazier 
2716f6972bd6SLara Lazier 	return get_test_stage(test) == 3;
2717f6972bd6SLara Lazier }
2718f6972bd6SLara Lazier 
2719f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test)
2720f6972bd6SLara Lazier {
2721f6972bd6SLara Lazier 	return get_test_stage(test) == 3;
2722f6972bd6SLara Lazier }
2723f6972bd6SLara Lazier 
27248650dffeSMaxim Levitsky 
27258650dffeSMaxim Levitsky static int pause_test_counter;
27268650dffeSMaxim Levitsky static int wait_counter;
27278650dffeSMaxim Levitsky 
27288650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test)
27298650dffeSMaxim Levitsky {
27308650dffeSMaxim Levitsky 	int i;
27318650dffeSMaxim Levitsky 	for (i = 0 ; i < pause_test_counter ; i++)
27328650dffeSMaxim Levitsky 		pause();
27338650dffeSMaxim Levitsky 
27348650dffeSMaxim Levitsky 	if (!wait_counter)
27358650dffeSMaxim Levitsky 		return;
27368650dffeSMaxim Levitsky 
27378650dffeSMaxim Levitsky 	for (i = 0; i < wait_counter; i++)
27388650dffeSMaxim Levitsky 		;
27398650dffeSMaxim Levitsky 
27408650dffeSMaxim Levitsky 	for (i = 0 ; i < pause_test_counter ; i++)
27418650dffeSMaxim Levitsky 		pause();
27428650dffeSMaxim Levitsky 
27438650dffeSMaxim Levitsky }
27448650dffeSMaxim Levitsky 
27458650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold)
27468650dffeSMaxim Levitsky {
27478650dffeSMaxim Levitsky 	test_set_guest(pause_filter_test_guest_main);
27488650dffeSMaxim Levitsky 
27498650dffeSMaxim Levitsky 	pause_test_counter = pause_iterations;
27508650dffeSMaxim Levitsky 	wait_counter = wait_iterations;
27518650dffeSMaxim Levitsky 
27528650dffeSMaxim Levitsky 	vmcb->control.pause_filter_count = filter_value;
27538650dffeSMaxim Levitsky 	vmcb->control.pause_filter_thresh = threshold;
27548650dffeSMaxim Levitsky 	svm_vmrun();
27558650dffeSMaxim Levitsky 
27568650dffeSMaxim Levitsky 	if (filter_value <= pause_iterations || wait_iterations < threshold)
27578650dffeSMaxim Levitsky 		report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit");
27588650dffeSMaxim Levitsky 	else
27598650dffeSMaxim Levitsky 		report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit");
27608650dffeSMaxim Levitsky }
27618650dffeSMaxim Levitsky 
27628650dffeSMaxim Levitsky static void pause_filter_test(void)
27638650dffeSMaxim Levitsky {
27648650dffeSMaxim Levitsky 	if (!pause_filter_supported()) {
27658650dffeSMaxim Levitsky 		report_skip("PAUSE filter not supported in the guest");
27668650dffeSMaxim Levitsky 		return;
27678650dffeSMaxim Levitsky 	}
27688650dffeSMaxim Levitsky 
27698650dffeSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_PAUSE);
27708650dffeSMaxim Levitsky 
27718650dffeSMaxim Levitsky 	// filter count more that pause count - no VMexit
27728650dffeSMaxim Levitsky 	pause_filter_run_test(10, 9, 0, 0);
27738650dffeSMaxim Levitsky 
27748650dffeSMaxim Levitsky 	// filter count smaller pause count - no VMexit
27758650dffeSMaxim Levitsky 	pause_filter_run_test(20, 21, 0, 0);
27768650dffeSMaxim Levitsky 
27778650dffeSMaxim Levitsky 
27788650dffeSMaxim Levitsky 	if (pause_threshold_supported()) {
27798650dffeSMaxim Levitsky 		// filter count smaller pause count - no VMexit +  large enough threshold
27808650dffeSMaxim Levitsky 		// so that filter counter resets
27818650dffeSMaxim Levitsky 		pause_filter_run_test(20, 21, 1000, 10);
27828650dffeSMaxim Levitsky 
27838650dffeSMaxim Levitsky 		// filter count smaller pause count - no VMexit +  small threshold
27848650dffeSMaxim Levitsky 		// so that filter doesn't reset
27858650dffeSMaxim Levitsky 		pause_filter_run_test(20, 21, 10, 1000);
27868650dffeSMaxim Levitsky 	} else {
27878650dffeSMaxim Levitsky 		report_skip("PAUSE threshold not supported in the guest");
27888650dffeSMaxim Levitsky 		return;
27898650dffeSMaxim Levitsky 	}
27908650dffeSMaxim Levitsky }
27918650dffeSMaxim Levitsky 
2792694e59baSManali Shukla /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */
2793694e59baSManali Shukla static void svm_no_nm_test(void)
27945c92f156SManali Shukla {
27955c92f156SManali Shukla 	write_cr0(read_cr0() & ~X86_CR0_TS);
2796694e59baSManali Shukla 	test_set_guest((test_guest_func)fnop);
27975c92f156SManali Shukla 
27985c92f156SManali Shukla 	vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM);
2799694e59baSManali Shukla 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
2800d4ae0a71SThomas Huth 	       "fnop with CR0.TS and CR0.EM unset no #NM exception");
28015c92f156SManali Shukla }
2802f6972bd6SLara Lazier 
2803ddb85855SSean Christopherson static u64 amd_get_lbr_rip(u32 msr)
2804537d39dfSMaxim Levitsky {
2805ddb85855SSean Christopherson 	return rdmsr(msr) & ~AMD_LBR_RECORD_MISPREDICT;
2806537d39dfSMaxim Levitsky }
2807537d39dfSMaxim Levitsky 
2808ddb85855SSean Christopherson #define HOST_CHECK_LBR(from_expected, to_expected)					\
2809ddb85855SSean Christopherson do {											\
2810ddb85855SSean Christopherson 	TEST_EXPECT_EQ((u64)from_expected, amd_get_lbr_rip(MSR_IA32_LASTBRANCHFROMIP));	\
2811ddb85855SSean Christopherson 	TEST_EXPECT_EQ((u64)to_expected, amd_get_lbr_rip(MSR_IA32_LASTBRANCHTOIP));	\
2812ddb85855SSean Christopherson } while (0)
2813537d39dfSMaxim Levitsky 
2814ddb85855SSean Christopherson /*
2815ddb85855SSean Christopherson  * FIXME: Do something other than generate an exception to communicate failure.
2816ddb85855SSean Christopherson  * Debugging without expected vs. actual is an absolute nightmare.
2817ddb85855SSean Christopherson  */
2818ddb85855SSean Christopherson #define GUEST_CHECK_LBR(from_expected, to_expected)				\
2819ddb85855SSean Christopherson do {										\
2820ddb85855SSean Christopherson 	if ((u64)(from_expected) != amd_get_lbr_rip(MSR_IA32_LASTBRANCHFROMIP))	\
2821ddb85855SSean Christopherson 		asm volatile("ud2");						\
2822ddb85855SSean Christopherson 	if ((u64)(to_expected) != amd_get_lbr_rip(MSR_IA32_LASTBRANCHTOIP))	\
2823ddb85855SSean Christopherson 		asm volatile("ud2");						\
2824ddb85855SSean Christopherson } while (0)
2825537d39dfSMaxim Levitsky 
282692098120SSean Christopherson #define REPORT_GUEST_LBR_ERROR(vmcb)						\
282792098120SSean Christopherson 	report(false, "LBR guest test failed.  Exit reason 0x%x, RIP = %lx, from = %lx, to = %lx, ex from = %lx, ex to = %lx", \
282892098120SSean Christopherson 		       vmcb->control.exit_code, vmcb->save.rip,			\
282992098120SSean Christopherson 		       vmcb->save.br_from, vmcb->save.br_to,			\
283092098120SSean Christopherson 		       vmcb->save.last_excp_from, vmcb->save.last_excp_to)
283192098120SSean Christopherson 
2832537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name)				\
2833537d39dfSMaxim Levitsky 	asm volatile (					\
2834537d39dfSMaxim Levitsky 		      # branch_name "_from:"		\
2835537d39dfSMaxim Levitsky 		      "jmp " # branch_name  "_to\n"	\
2836537d39dfSMaxim Levitsky 		      "nop\n"				\
2837537d39dfSMaxim Levitsky 		      "nop\n"				\
2838537d39dfSMaxim Levitsky 		      # branch_name  "_to:"		\
2839537d39dfSMaxim Levitsky 		      "nop\n"				\
2840537d39dfSMaxim Levitsky 		       )
2841537d39dfSMaxim Levitsky 
2842537d39dfSMaxim Levitsky 
2843537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to;
2844537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to;
2845537d39dfSMaxim Levitsky 
2846537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to;
2847537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to;
2848537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to;
2849537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to;
2850537d39dfSMaxim Levitsky 
2851537d39dfSMaxim Levitsky u64 dbgctl;
2852537d39dfSMaxim Levitsky 
2853537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void)
2854537d39dfSMaxim Levitsky {
2855537d39dfSMaxim Levitsky 	/*
2856537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be already enabled when it starts,
2857537d39dfSMaxim Levitsky 	 * it does a branch, and then disables the LBR and then checks.
2858537d39dfSMaxim Levitsky 	 */
2859537d39dfSMaxim Levitsky 
2860537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch0);
2861537d39dfSMaxim Levitsky 
2862537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2863537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2864537d39dfSMaxim Levitsky 
2865537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
2866537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2867537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0)
2868537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2869537d39dfSMaxim Levitsky 
2870ddb85855SSean Christopherson 	GUEST_CHECK_LBR(&guest_branch0_from, &guest_branch0_to);
2871537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
2872537d39dfSMaxim Levitsky }
2873537d39dfSMaxim Levitsky 
2874537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void)
2875537d39dfSMaxim Levitsky {
2876537d39dfSMaxim Levitsky 	/*
2877537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be disabled when it starts,
2878537d39dfSMaxim Levitsky 	 * enables it, does a branch, disables it and then checks.
2879537d39dfSMaxim Levitsky 	 */
2880537d39dfSMaxim Levitsky 
2881537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch1);
2882537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2883537d39dfSMaxim Levitsky 
2884537d39dfSMaxim Levitsky 	if (dbgctl != 0)
2885537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2886537d39dfSMaxim Levitsky 
2887ddb85855SSean Christopherson 	GUEST_CHECK_LBR(&host_branch2_from, &host_branch2_to);
2888537d39dfSMaxim Levitsky 
2889537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2890537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2891537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch2);
2892537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2893537d39dfSMaxim Levitsky 
2894537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
2895537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
2896ddb85855SSean Christopherson 	GUEST_CHECK_LBR(&guest_branch2_from, &guest_branch2_to);
2897537d39dfSMaxim Levitsky 
2898537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
2899537d39dfSMaxim Levitsky }
2900537d39dfSMaxim Levitsky 
2901537d39dfSMaxim Levitsky static void svm_lbrv_test0(void)
2902537d39dfSMaxim Levitsky {
2903537d39dfSMaxim Levitsky 	report(true, "Basic LBR test");
2904537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2905537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch0);
2906537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2907537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2908537d39dfSMaxim Levitsky 
2909554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR);
2910537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2911554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, 0);
2912537d39dfSMaxim Levitsky 
2913ddb85855SSean Christopherson 	HOST_CHECK_LBR(&host_branch0_from, &host_branch0_to);
2914537d39dfSMaxim Levitsky }
2915537d39dfSMaxim Levitsky 
2916537d39dfSMaxim Levitsky static void svm_lbrv_test1(void)
2917537d39dfSMaxim Levitsky {
2918537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)");
2919537d39dfSMaxim Levitsky 
29205200c1f1SSean Christopherson 	svm_setup_vmrun((u64)svm_lbrv_test_guest1);
2921537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
2922537d39dfSMaxim Levitsky 
2923537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2924537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch1);
2925537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2926537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2927537d39dfSMaxim Levitsky 
2928537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
292992098120SSean Christopherson 		REPORT_GUEST_LBR_ERROR(vmcb);
2930537d39dfSMaxim Levitsky 		return;
2931537d39dfSMaxim Levitsky 	}
2932537d39dfSMaxim Levitsky 
2933554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, 0);
2934ddb85855SSean Christopherson 	HOST_CHECK_LBR(&guest_branch0_from, &guest_branch0_to);
2935537d39dfSMaxim Levitsky }
2936537d39dfSMaxim Levitsky 
2937537d39dfSMaxim Levitsky static void svm_lbrv_test2(void)
2938537d39dfSMaxim Levitsky {
2939537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)");
2940537d39dfSMaxim Levitsky 
29415200c1f1SSean Christopherson 	svm_setup_vmrun((u64)svm_lbrv_test_guest2);
2942537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
2943537d39dfSMaxim Levitsky 
2944537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2945537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch2);
2946537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2947537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2948537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2949537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2950537d39dfSMaxim Levitsky 
2951537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
295292098120SSean Christopherson 		REPORT_GUEST_LBR_ERROR(vmcb);
2953537d39dfSMaxim Levitsky 		return;
2954537d39dfSMaxim Levitsky 	}
2955537d39dfSMaxim Levitsky 
2956554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, 0);
2957ddb85855SSean Christopherson 	HOST_CHECK_LBR(&guest_branch2_from, &guest_branch2_to);
2958537d39dfSMaxim Levitsky }
2959537d39dfSMaxim Levitsky 
2960537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void)
2961537d39dfSMaxim Levitsky {
2962537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
2963537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
2964537d39dfSMaxim Levitsky 		return;
2965537d39dfSMaxim Levitsky 	}
2966537d39dfSMaxim Levitsky 
2967537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)");
29685200c1f1SSean Christopherson 	svm_setup_vmrun((u64)svm_lbrv_test_guest1);
2969537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
2970537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = DEBUGCTLMSR_LBR;
2971537d39dfSMaxim Levitsky 
2972537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
2973537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch3);
2974537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
2975537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
2976537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
2977537d39dfSMaxim Levitsky 
2978537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
297992098120SSean Christopherson 		REPORT_GUEST_LBR_ERROR(vmcb);
2980537d39dfSMaxim Levitsky 		return;
2981537d39dfSMaxim Levitsky 	}
2982537d39dfSMaxim Levitsky 
2983537d39dfSMaxim Levitsky 	if (vmcb->save.dbgctl != 0) {
2984537d39dfSMaxim Levitsky 		report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl);
2985537d39dfSMaxim Levitsky 		return;
2986537d39dfSMaxim Levitsky 	}
2987537d39dfSMaxim Levitsky 
2988554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR);
2989ddb85855SSean Christopherson 	HOST_CHECK_LBR(&host_branch3_from, &host_branch3_to);
2990537d39dfSMaxim Levitsky }
29913f27d772SManali Shukla 
2992537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void)
2993537d39dfSMaxim Levitsky {
2994537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
2995537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
2996537d39dfSMaxim Levitsky 		return;
2997537d39dfSMaxim Levitsky 	}
2998537d39dfSMaxim Levitsky 
2999537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)");
30005200c1f1SSean Christopherson 	svm_setup_vmrun((u64)svm_lbrv_test_guest2);
3001537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
3002537d39dfSMaxim Levitsky 
3003537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = 0;
3004537d39dfSMaxim Levitsky 	vmcb->save.br_from = (u64)&host_branch2_from;
3005537d39dfSMaxim Levitsky 	vmcb->save.br_to = (u64)&host_branch2_to;
3006537d39dfSMaxim Levitsky 
3007537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3008537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch4);
3009537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
3010537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3011537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3012537d39dfSMaxim Levitsky 
3013537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
301492098120SSean Christopherson 		REPORT_GUEST_LBR_ERROR(vmcb);
3015537d39dfSMaxim Levitsky 		return;
3016537d39dfSMaxim Levitsky 	}
3017537d39dfSMaxim Levitsky 
3018554fa461SSean Christopherson 	TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR);
3019ddb85855SSean Christopherson 	HOST_CHECK_LBR(&host_branch4_from, &host_branch4_to);
3020537d39dfSMaxim Levitsky }
3021537d39dfSMaxim Levitsky 
3022c45bccfcSMaxim Levitsky 
3023c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception
3024c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works
3025c45bccfcSMaxim Levitsky 
3026c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied;
3027c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs)
3028c45bccfcSMaxim Levitsky {
3029c45bccfcSMaxim Levitsky 	dummy_isr_recevied++;
3030c45bccfcSMaxim Levitsky 	eoi();
3031c45bccfcSMaxim Levitsky }
3032c45bccfcSMaxim Levitsky 
3033c45bccfcSMaxim Levitsky 
3034c45bccfcSMaxim Levitsky static volatile int nmi_recevied;
3035c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs)
3036c45bccfcSMaxim Levitsky {
3037c45bccfcSMaxim Levitsky 	nmi_recevied++;
3038c45bccfcSMaxim Levitsky }
3039c45bccfcSMaxim Levitsky 
3040c45bccfcSMaxim Levitsky 
3041c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit)
3042c45bccfcSMaxim Levitsky {
3043c45bccfcSMaxim Levitsky 	if (counter)
3044c45bccfcSMaxim Levitsky 		*counter = 0;
3045c45bccfcSMaxim Levitsky 
3046c45bccfcSMaxim Levitsky 	sti();  // host IF value should not matter
304727eeac46SSean Christopherson 	clgi(); // vmrun will set back GIF to 1
3048c45bccfcSMaxim Levitsky 
3049c45bccfcSMaxim Levitsky 	svm_vmrun();
3050c45bccfcSMaxim Levitsky 
3051c45bccfcSMaxim Levitsky 	if (counter)
3052c45bccfcSMaxim Levitsky 		report(!*counter, "No interrupt expected");
3053c45bccfcSMaxim Levitsky 
3054c45bccfcSMaxim Levitsky 	stgi();
3055c45bccfcSMaxim Levitsky 
3056c45bccfcSMaxim Levitsky 	if (counter)
3057c45bccfcSMaxim Levitsky 		report(*counter == 1, "Interrupt is expected");
3058c45bccfcSMaxim Levitsky 
305927eeac46SSean Christopherson 	report(vmcb->control.exit_code == expected_vmexit,
306027eeac46SSean Christopherson 	       "Wanted VM-Exit reason 0x%x, got 0x%x",
306127eeac46SSean Christopherson 	       expected_vmexit, vmcb->control.exit_code);
3062c45bccfcSMaxim Levitsky 	report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now");
3063c45bccfcSMaxim Levitsky 	cli();
3064c45bccfcSMaxim Levitsky }
3065c45bccfcSMaxim Levitsky 
3066c45bccfcSMaxim Levitsky 
3067d0458710SMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enough to trigger an interrupt
3068c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test)
3069c45bccfcSMaxim Levitsky {
3070c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3071c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3072e4007e62SMaxim Levitsky 	sti_nop();
3073c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3074c45bccfcSMaxim Levitsky }
3075c45bccfcSMaxim Levitsky 
3076c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void)
3077c45bccfcSMaxim Levitsky {
3078c45bccfcSMaxim Levitsky 	// make a physical interrupt to be pending
3079c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3080c45bccfcSMaxim Levitsky 
3081c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3082c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3083c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3084c45bccfcSMaxim Levitsky 
3085c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_if_guest);
30862602a896SMaxim Levitsky 	cli();
3087c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3088c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3089c45bccfcSMaxim Levitsky }
3090c45bccfcSMaxim Levitsky 
3091c45bccfcSMaxim Levitsky 
3092c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3093c45bccfcSMaxim Levitsky // if GIF is not intercepted
3094c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test)
3095c45bccfcSMaxim Levitsky {
3096c45bccfcSMaxim Levitsky 
3097c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3098c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3099c45bccfcSMaxim Levitsky 
3100c45bccfcSMaxim Levitsky 	// clear GIF and enable IF
3101c45bccfcSMaxim Levitsky 	// that should still not cause VM exit
3102c45bccfcSMaxim Levitsky 	clgi();
3103e4007e62SMaxim Levitsky 	sti_nop();
3104c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3105c45bccfcSMaxim Levitsky 
3106c45bccfcSMaxim Levitsky 	stgi();
3107c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3108c45bccfcSMaxim Levitsky }
3109c45bccfcSMaxim Levitsky 
3110c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void)
3111c45bccfcSMaxim Levitsky {
3112c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3113c45bccfcSMaxim Levitsky 
3114c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3115c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3116c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3117c45bccfcSMaxim Levitsky 
3118c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest);
31192602a896SMaxim Levitsky 	cli();
3120c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3121c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3122c45bccfcSMaxim Levitsky }
3123c45bccfcSMaxim Levitsky 
3124c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3125c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest
3126c45bccfcSMaxim Levitsky // started running
3127c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test)
3128c45bccfcSMaxim Levitsky {
3129c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3130c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3131c45bccfcSMaxim Levitsky 
3132c45bccfcSMaxim Levitsky 	clgi();
3133c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3134c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3135c45bccfcSMaxim Levitsky 
3136c45bccfcSMaxim Levitsky 	stgi();
3137c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3138c45bccfcSMaxim Levitsky }
3139c45bccfcSMaxim Levitsky 
3140c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void)
3141c45bccfcSMaxim Levitsky {
3142c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3143c45bccfcSMaxim Levitsky 
3144c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3145c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3146c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3147c45bccfcSMaxim Levitsky 
3148c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest2);
3149c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3150c45bccfcSMaxim Levitsky }
3151c45bccfcSMaxim Levitsky 
3152c45bccfcSMaxim Levitsky 
3153c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF
3154c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test)
3155c45bccfcSMaxim Levitsky {
3156c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3157c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3158c45bccfcSMaxim Levitsky 	cli(); // should have no effect
3159c45bccfcSMaxim Levitsky 
3160c45bccfcSMaxim Levitsky 	clgi();
3161c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0);
3162e4007e62SMaxim Levitsky 	sti_nop(); // should have no effect
3163c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3164c45bccfcSMaxim Levitsky 
3165c45bccfcSMaxim Levitsky 	stgi();
3166c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3167c45bccfcSMaxim Levitsky }
3168c45bccfcSMaxim Levitsky 
3169c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void)
3170c45bccfcSMaxim Levitsky {
3171c45bccfcSMaxim Levitsky 	handle_exception(2, dummy_nmi_handler);
3172c45bccfcSMaxim Levitsky 
3173c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_NMI);
3174c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3175c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3176c45bccfcSMaxim Levitsky 
3177c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_nmi_guest);
3178c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI);
3179c45bccfcSMaxim Levitsky }
3180c45bccfcSMaxim Levitsky 
3181c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF
3182c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang
3183c45bccfcSMaxim Levitsky // and VMexits on SMI
3184c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test)
3185c45bccfcSMaxim Levitsky {
3186c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3187c45bccfcSMaxim Levitsky 
3188c45bccfcSMaxim Levitsky 	clgi();
3189c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0);
3190e4007e62SMaxim Levitsky 	sti_nop(); // should have no effect
3191c45bccfcSMaxim Levitsky 	stgi();
3192c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3193c45bccfcSMaxim Levitsky }
3194c45bccfcSMaxim Levitsky 
3195c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void)
3196c45bccfcSMaxim Levitsky {
3197c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_SMI);
3198c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3199c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_smi_guest);
3200c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI);
3201c45bccfcSMaxim Levitsky }
3202c45bccfcSMaxim Levitsky 
32038177dc62SManali Shukla static void svm_l2_ac_test(void)
32048177dc62SManali Shukla {
32058177dc62SManali Shukla 	bool hit_ac = false;
32068177dc62SManali Shukla 
32078177dc62SManali Shukla 	write_cr0(read_cr0() | X86_CR0_AM);
32088177dc62SManali Shukla 	write_rflags(read_rflags() | X86_EFLAGS_AC);
32098177dc62SManali Shukla 
32108177dc62SManali Shukla 	run_in_user(generate_usermode_ac, AC_VECTOR, 0, 0, 0, 0, &hit_ac);
32118177dc62SManali Shukla 	report(hit_ac, "Usermode #AC handled in L2");
32128177dc62SManali Shukla 	vmmcall();
32138177dc62SManali Shukla }
32148177dc62SManali Shukla 
32158177dc62SManali Shukla struct svm_exception_test {
32168177dc62SManali Shukla 	u8 vector;
32178177dc62SManali Shukla 	void (*guest_code)(void);
32188177dc62SManali Shukla };
32198177dc62SManali Shukla 
32208177dc62SManali Shukla struct svm_exception_test svm_exception_tests[] = {
32218177dc62SManali Shukla 	{ GP_VECTOR, generate_non_canonical_gp },
32228177dc62SManali Shukla 	{ UD_VECTOR, generate_ud },
32238177dc62SManali Shukla 	{ DE_VECTOR, generate_de },
32248177dc62SManali Shukla 	{ DB_VECTOR, generate_single_step_db },
322544550f53SManali Shukla 	{ BP_VECTOR, generate_bp },
32268177dc62SManali Shukla 	{ AC_VECTOR, svm_l2_ac_test },
32270851b7f7SManali Shukla 	{ OF_VECTOR, generate_of },
3228694e59baSManali Shukla 	{ NM_VECTOR, generate_cr0_ts_nm },
3229694e59baSManali Shukla 	{ NM_VECTOR, generate_cr0_em_nm },
32308177dc62SManali Shukla };
32318177dc62SManali Shukla 
32328177dc62SManali Shukla static u8 svm_exception_test_vector;
32338177dc62SManali Shukla 
32348177dc62SManali Shukla static void svm_exception_handler(struct ex_regs *regs)
32358177dc62SManali Shukla {
32368177dc62SManali Shukla 	report(regs->vector == svm_exception_test_vector,
32378177dc62SManali Shukla 		"Handling %s in L2's exception handler",
32388177dc62SManali Shukla 		exception_mnemonic(svm_exception_test_vector));
32398177dc62SManali Shukla 	vmmcall();
32408177dc62SManali Shukla }
32418177dc62SManali Shukla 
32428177dc62SManali Shukla static void handle_exception_in_l2(u8 vector)
32438177dc62SManali Shukla {
32448177dc62SManali Shukla 	handler old_handler = handle_exception(vector, svm_exception_handler);
32458177dc62SManali Shukla 	svm_exception_test_vector = vector;
32468177dc62SManali Shukla 
32478177dc62SManali Shukla 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
32488177dc62SManali Shukla 		"%s handled by L2", exception_mnemonic(vector));
32498177dc62SManali Shukla 
32508177dc62SManali Shukla 	handle_exception(vector, old_handler);
32518177dc62SManali Shukla }
32528177dc62SManali Shukla 
32538177dc62SManali Shukla static void handle_exception_in_l1(u32 vector)
32548177dc62SManali Shukla {
32558177dc62SManali Shukla 	u32 old_ie = vmcb->control.intercept_exceptions;
32568177dc62SManali Shukla 
32578177dc62SManali Shukla 	vmcb->control.intercept_exceptions |= (1ULL << vector);
32588177dc62SManali Shukla 
32598177dc62SManali Shukla 	report(svm_vmrun() == (SVM_EXIT_EXCP_BASE + vector),
32608177dc62SManali Shukla 		"%s handled by L1",  exception_mnemonic(vector));
32618177dc62SManali Shukla 
32628177dc62SManali Shukla 	vmcb->control.intercept_exceptions = old_ie;
32638177dc62SManali Shukla }
32648177dc62SManali Shukla 
32658177dc62SManali Shukla static void svm_exception_test(void)
32668177dc62SManali Shukla {
32678177dc62SManali Shukla 	struct svm_exception_test *t;
32688177dc62SManali Shukla 	int i;
32698177dc62SManali Shukla 
32708177dc62SManali Shukla 	for (i = 0; i < ARRAY_SIZE(svm_exception_tests); i++) {
32718177dc62SManali Shukla 		t = &svm_exception_tests[i];
32728177dc62SManali Shukla 		test_set_guest((test_guest_func)t->guest_code);
32738177dc62SManali Shukla 
32748177dc62SManali Shukla 		handle_exception_in_l2(t->vector);
32758177dc62SManali Shukla 		vmcb_ident(vmcb);
32768177dc62SManali Shukla 
32778177dc62SManali Shukla 		handle_exception_in_l1(t->vector);
32788177dc62SManali Shukla 		vmcb_ident(vmcb);
32798177dc62SManali Shukla 	}
32808177dc62SManali Shukla }
32818177dc62SManali Shukla 
3282c64f24fdSMaxim Levitsky static void shutdown_intercept_test_guest(struct svm_test *test)
3283c64f24fdSMaxim Levitsky {
3284c64f24fdSMaxim Levitsky 	asm volatile ("ud2");
3285c64f24fdSMaxim Levitsky 	report_fail("should not reach here\n");
3286c64f24fdSMaxim Levitsky 
3287c64f24fdSMaxim Levitsky }
3288c64f24fdSMaxim Levitsky 
3289c64f24fdSMaxim Levitsky static void svm_shutdown_intercept_test(void)
3290c64f24fdSMaxim Levitsky {
3291c64f24fdSMaxim Levitsky 	test_set_guest(shutdown_intercept_test_guest);
3292c64f24fdSMaxim Levitsky 	vmcb->save.idtr.base = (u64)alloc_vpage();
3293c64f24fdSMaxim Levitsky 	vmcb->control.intercept |= (1ULL << INTERCEPT_SHUTDOWN);
3294c64f24fdSMaxim Levitsky 	svm_vmrun();
3295c64f24fdSMaxim Levitsky 	report(vmcb->control.exit_code == SVM_EXIT_SHUTDOWN, "shutdown test passed");
3296c64f24fdSMaxim Levitsky }
3297c64f24fdSMaxim Levitsky 
32983f27d772SManali Shukla struct svm_test svm_tests[] = {
3299ad879127SKrish Sadhukhan 	{ "null", default_supported, default_prepare,
3300ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test,
3301ad879127SKrish Sadhukhan 	  default_finished, null_check },
3302ad879127SKrish Sadhukhan 	{ "vmrun", default_supported, default_prepare,
3303ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_vmrun,
3304ad879127SKrish Sadhukhan 	  default_finished, check_vmrun },
3305ad879127SKrish Sadhukhan 	{ "ioio", default_supported, prepare_ioio,
3306ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_ioio,
3307ad879127SKrish Sadhukhan 	  ioio_finished, check_ioio },
3308ad879127SKrish Sadhukhan 	{ "vmrun intercept check", default_supported, prepare_no_vmrun_int,
3309ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test, default_finished,
3310ad879127SKrish Sadhukhan 	  check_no_vmrun_int },
3311401299a5SPaolo Bonzini 	{ "rsm", default_supported,
3312401299a5SPaolo Bonzini 	  prepare_rsm_intercept, default_prepare_gif_clear,
3313401299a5SPaolo Bonzini 	  test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept },
3314ad879127SKrish Sadhukhan 	{ "cr3 read intercept", default_supported,
3315ad879127SKrish Sadhukhan 	  prepare_cr3_intercept, default_prepare_gif_clear,
3316ad879127SKrish Sadhukhan 	  test_cr3_intercept, default_finished, check_cr3_intercept },
3317ad879127SKrish Sadhukhan 	{ "cr3 read nointercept", default_supported, default_prepare,
3318ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_cr3_intercept, default_finished,
3319ad879127SKrish Sadhukhan 	  check_cr3_nointercept },
3320ad879127SKrish Sadhukhan 	{ "cr3 read intercept emulate", smp_supported,
3321ad879127SKrish Sadhukhan 	  prepare_cr3_intercept_bypass, default_prepare_gif_clear,
3322ad879127SKrish Sadhukhan 	  test_cr3_intercept_bypass, default_finished, check_cr3_intercept },
3323ad879127SKrish Sadhukhan 	{ "dr intercept check", default_supported, prepare_dr_intercept,
3324ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished,
3325ad879127SKrish Sadhukhan 	  check_dr_intercept },
3326ad879127SKrish Sadhukhan 	{ "next_rip", next_rip_supported, prepare_next_rip,
3327ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_next_rip,
3328ad879127SKrish Sadhukhan 	  default_finished, check_next_rip },
3329ad879127SKrish Sadhukhan 	{ "msr intercept check", default_supported, prepare_msr_intercept,
3330ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_msr_intercept,
3331ad879127SKrish Sadhukhan 	  msr_intercept_finished, check_msr_intercept },
3332ad879127SKrish Sadhukhan 	{ "mode_switch", default_supported, prepare_mode_switch,
3333ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_mode_switch,
3334ad879127SKrish Sadhukhan 	  mode_switch_finished, check_mode_switch },
3335ad879127SKrish Sadhukhan 	{ "asid_zero", default_supported, prepare_asid_zero,
3336ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, test_asid_zero,
3337ad879127SKrish Sadhukhan 	  default_finished, check_asid_zero },
3338ad879127SKrish Sadhukhan 	{ "sel_cr0_bug", default_supported, sel_cr0_bug_prepare,
3339ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, sel_cr0_bug_test,
3340ad879127SKrish Sadhukhan 	  sel_cr0_bug_finished, sel_cr0_bug_check },
334110a65fc4SNadav Amit 	{ "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare,
3342ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, tsc_adjust_test,
3343ad879127SKrish Sadhukhan 	  default_finished, tsc_adjust_check },
3344ad879127SKrish Sadhukhan 	{ "latency_run_exit", default_supported, latency_prepare,
3345ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, latency_test,
3346ad879127SKrish Sadhukhan 	  latency_finished, latency_check },
3347f7fa53dcSPaolo Bonzini 	{ "latency_run_exit_clean", default_supported, latency_prepare,
3348f7fa53dcSPaolo Bonzini 	  default_prepare_gif_clear, latency_test,
3349f7fa53dcSPaolo Bonzini 	  latency_finished_clean, latency_check },
3350ad879127SKrish Sadhukhan 	{ "latency_svm_insn", default_supported, lat_svm_insn_prepare,
3351ad879127SKrish Sadhukhan 	  default_prepare_gif_clear, null_test,
3352ad879127SKrish Sadhukhan 	  lat_svm_insn_finished, lat_svm_insn_check },
33534b4fb247SPaolo Bonzini 	{ "exc_inject", default_supported, exc_inject_prepare,
33544b4fb247SPaolo Bonzini 	  default_prepare_gif_clear, exc_inject_test,
33554b4fb247SPaolo Bonzini 	  exc_inject_finished, exc_inject_check },
3356ad879127SKrish Sadhukhan 	{ "pending_event", default_supported, pending_event_prepare,
3357ad879127SKrish Sadhukhan 	  default_prepare_gif_clear,
3358ad879127SKrish Sadhukhan 	  pending_event_test, pending_event_finished, pending_event_check },
335985dc2aceSPaolo Bonzini 	{ "pending_event_cli", default_supported, pending_event_cli_prepare,
336085dc2aceSPaolo Bonzini 	  pending_event_cli_prepare_gif_clear,
336185dc2aceSPaolo Bonzini 	  pending_event_cli_test, pending_event_cli_finished,
336285dc2aceSPaolo Bonzini 	  pending_event_cli_check },
336385dc2aceSPaolo Bonzini 	{ "interrupt", default_supported, interrupt_prepare,
336485dc2aceSPaolo Bonzini 	  default_prepare_gif_clear, interrupt_test,
336585dc2aceSPaolo Bonzini 	  interrupt_finished, interrupt_check },
3366d4db486bSCathy Avery 	{ "nmi", default_supported, nmi_prepare,
3367d4db486bSCathy Avery 	  default_prepare_gif_clear, nmi_test,
3368d4db486bSCathy Avery 	  nmi_finished, nmi_check },
33699da1f4d8SCathy Avery 	{ "nmi_hlt", smp_supported, nmi_prepare,
33709da1f4d8SCathy Avery 	  default_prepare_gif_clear, nmi_hlt_test,
33719da1f4d8SCathy Avery 	  nmi_hlt_finished, nmi_hlt_check },
337208200397SSantosh Shukla         { "vnmi", vnmi_supported, vnmi_prepare,
337308200397SSantosh Shukla           default_prepare_gif_clear, vnmi_test,
337408200397SSantosh Shukla           vnmi_finished, vnmi_check },
33759c838954SCathy Avery 	{ "virq_inject", default_supported, virq_inject_prepare,
33769c838954SCathy Avery 	  default_prepare_gif_clear, virq_inject_test,
33779c838954SCathy Avery 	  virq_inject_finished, virq_inject_check },
33784b3c6114SPaolo Bonzini 	{ "virq_inject_within_shadow", default_supported, virq_inject_within_shadow_prepare,
33794b3c6114SPaolo Bonzini 	  virq_inject_within_shadow_prepare_gif_clear, virq_inject_within_shadow_test,
33804b3c6114SPaolo Bonzini 	  virq_inject_within_shadow_finished, virq_inject_within_shadow_check },
3381da338a31SMaxim Levitsky 	{ "reg_corruption", default_supported, reg_corruption_prepare,
3382da338a31SMaxim Levitsky 	  default_prepare_gif_clear, reg_corruption_test,
3383da338a31SMaxim Levitsky 	  reg_corruption_finished, reg_corruption_check },
33844770e9c8SCathy Avery 	{ "svm_init_startup_test", smp_supported, init_startup_prepare,
33854770e9c8SCathy Avery 	  default_prepare_gif_clear, null_test,
33864770e9c8SCathy Avery 	  init_startup_finished, init_startup_check },
3387d5da6dfeSCathy Avery 	{ "svm_init_intercept_test", smp_supported, init_intercept_prepare,
3388d5da6dfeSCathy Avery 	  default_prepare_gif_clear, init_intercept_test,
3389d5da6dfeSCathy Avery 	  init_intercept_finished, init_intercept_check, .on_vcpu = 2 },
33907839b0ecSKrish Sadhukhan 	{ "host_rflags", default_supported, host_rflags_prepare,
33917839b0ecSKrish Sadhukhan 	  host_rflags_prepare_gif_clear, host_rflags_test,
33927839b0ecSKrish Sadhukhan 	  host_rflags_finished, host_rflags_check },
3393f6972bd6SLara Lazier 	{ "vgif", vgif_supported, prepare_vgif_enabled,
3394f6972bd6SLara Lazier 	  default_prepare_gif_clear, test_vgif, vgif_finished,
3395f6972bd6SLara Lazier 	  vgif_check },
3396f32183f5SJim Mattson 	TEST(svm_cr4_osxsave_test),
3397ba29942cSKrish Sadhukhan 	TEST(svm_guest_state_test),
33987a57ef5dSMaxim Levitsky 	TEST(svm_vmrun_errata_test),
33990b6f6cedSKrish Sadhukhan 	TEST(svm_vmload_vmsave),
3400665f5677SKrish Sadhukhan 	TEST(svm_test_singlestep),
3401694e59baSManali Shukla 	TEST(svm_no_nm_test),
34028177dc62SManali Shukla 	TEST(svm_exception_test),
3403537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test0),
3404537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test1),
3405537d39dfSMaxim Levitsky 	TEST(svm_lbrv_test2),
3406537d39dfSMaxim Levitsky 	TEST(svm_lbrv_nested_test1),
3407537d39dfSMaxim Levitsky 	TEST(svm_lbrv_nested_test2),
3408c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_if),
3409c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_gif),
3410c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_gif2),
3411c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_nmi),
3412c45bccfcSMaxim Levitsky 	TEST(svm_intr_intercept_mix_smi),
3413a8503d50SMaxim Levitsky 	TEST(svm_tsc_scale_test),
34148650dffeSMaxim Levitsky 	TEST(pause_filter_test),
3415c64f24fdSMaxim Levitsky 	TEST(svm_shutdown_intercept_test),
3416ad879127SKrish Sadhukhan 	{ NULL, NULL, NULL, NULL, NULL, NULL, NULL }
3417ad879127SKrish Sadhukhan };
3418712840d5SManali Shukla 
3419712840d5SManali Shukla int main(int ac, char **av)
3420712840d5SManali Shukla {
3421ade7601dSSean Christopherson 	setup_vm();
3422712840d5SManali Shukla 	return run_svm_tests(ac, av, svm_tests);
3423712840d5SManali Shukla }
3424