1ad879127SKrish Sadhukhan #include "svm.h" 2ad879127SKrish Sadhukhan #include "libcflat.h" 3ad879127SKrish Sadhukhan #include "processor.h" 4ad879127SKrish Sadhukhan #include "desc.h" 5ad879127SKrish Sadhukhan #include "msr.h" 6ad879127SKrish Sadhukhan #include "vm.h" 7ad879127SKrish Sadhukhan #include "smp.h" 8ad879127SKrish Sadhukhan #include "alloc_page.h" 9ad879127SKrish Sadhukhan #include "isr.h" 10ad879127SKrish Sadhukhan #include "apic.h" 119da1f4d8SCathy Avery #include "delay.h" 12ddb85855SSean Christopherson #include "util.h" 138177dc62SManali Shukla #include "x86/usermode.h" 14c64f24fdSMaxim Levitsky #include "vmalloc.h" 15ad879127SKrish Sadhukhan 16ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f 17ad879127SKrish Sadhukhan 18ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000 19ad879127SKrish Sadhukhan 20ad879127SKrish Sadhukhan u64 tsc_start; 21ad879127SKrish Sadhukhan u64 tsc_end; 22ad879127SKrish Sadhukhan 23ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum; 24ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum; 25ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum; 26ad879127SKrish Sadhukhan u64 latvmrun_max; 27ad879127SKrish Sadhukhan u64 latvmrun_min; 28ad879127SKrish Sadhukhan u64 latvmexit_max; 29ad879127SKrish Sadhukhan u64 latvmexit_min; 30ad879127SKrish Sadhukhan u64 latvmload_max; 31ad879127SKrish Sadhukhan u64 latvmload_min; 32ad879127SKrish Sadhukhan u64 latvmsave_max; 33ad879127SKrish Sadhukhan u64 latvmsave_min; 34ad879127SKrish Sadhukhan u64 latstgi_max; 35ad879127SKrish Sadhukhan u64 latstgi_min; 36ad879127SKrish Sadhukhan u64 latclgi_max; 37ad879127SKrish Sadhukhan u64 latclgi_min; 38ad879127SKrish Sadhukhan u64 runs; 39ad879127SKrish Sadhukhan 40ad879127SKrish Sadhukhan static void null_test(struct svm_test *test) 41ad879127SKrish Sadhukhan { 42ad879127SKrish Sadhukhan } 43ad879127SKrish Sadhukhan 44ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test) 45ad879127SKrish Sadhukhan { 46096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMMCALL; 47ad879127SKrish Sadhukhan } 48ad879127SKrish Sadhukhan 49ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test) 50ad879127SKrish Sadhukhan { 51096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN); 52ad879127SKrish Sadhukhan } 53ad879127SKrish Sadhukhan 54ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test) 55ad879127SKrish Sadhukhan { 56096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 57ad879127SKrish Sadhukhan } 58ad879127SKrish Sadhukhan 59ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test) 60ad879127SKrish Sadhukhan { 61096cf7feSPaolo Bonzini asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb))); 62ad879127SKrish Sadhukhan } 63ad879127SKrish Sadhukhan 64ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test) 65ad879127SKrish Sadhukhan { 66096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMRUN; 67ad879127SKrish Sadhukhan } 68ad879127SKrish Sadhukhan 69401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test) 70401299a5SPaolo Bonzini { 71401299a5SPaolo Bonzini default_prepare(test); 72401299a5SPaolo Bonzini vmcb->control.intercept |= 1 << INTERCEPT_RSM; 73401299a5SPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR); 74401299a5SPaolo Bonzini } 75401299a5SPaolo Bonzini 76401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test) 77401299a5SPaolo Bonzini { 78401299a5SPaolo Bonzini asm volatile ("rsm" : : : "memory"); 79401299a5SPaolo Bonzini } 80401299a5SPaolo Bonzini 81401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test) 82401299a5SPaolo Bonzini { 83401299a5SPaolo Bonzini return get_test_stage(test) == 2; 84401299a5SPaolo Bonzini } 85401299a5SPaolo Bonzini 86401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test) 87401299a5SPaolo Bonzini { 88401299a5SPaolo Bonzini switch (get_test_stage(test)) { 89401299a5SPaolo Bonzini case 0: 90401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_RSM) { 91198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to rsm. Exit reason 0x%x", 92401299a5SPaolo Bonzini vmcb->control.exit_code); 93401299a5SPaolo Bonzini return true; 94401299a5SPaolo Bonzini } 95401299a5SPaolo Bonzini vmcb->control.intercept &= ~(1 << INTERCEPT_RSM); 96401299a5SPaolo Bonzini inc_test_stage(test); 97401299a5SPaolo Bonzini break; 98401299a5SPaolo Bonzini 99401299a5SPaolo Bonzini case 1: 100401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) { 101198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to #UD. Exit reason 0x%x", 102401299a5SPaolo Bonzini vmcb->control.exit_code); 103401299a5SPaolo Bonzini return true; 104401299a5SPaolo Bonzini } 105401299a5SPaolo Bonzini vmcb->save.rip += 2; 106401299a5SPaolo Bonzini inc_test_stage(test); 107401299a5SPaolo Bonzini break; 108401299a5SPaolo Bonzini 109401299a5SPaolo Bonzini default: 110401299a5SPaolo Bonzini return true; 111401299a5SPaolo Bonzini } 112401299a5SPaolo Bonzini return get_test_stage(test) == 2; 113401299a5SPaolo Bonzini } 114401299a5SPaolo Bonzini 115ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test) 116ad879127SKrish Sadhukhan { 117ad879127SKrish Sadhukhan default_prepare(test); 118096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 119ad879127SKrish Sadhukhan } 120ad879127SKrish Sadhukhan 121ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test) 122ad879127SKrish Sadhukhan { 123ad879127SKrish Sadhukhan asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory"); 124ad879127SKrish Sadhukhan } 125ad879127SKrish Sadhukhan 126ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test) 127ad879127SKrish Sadhukhan { 128096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_READ_CR3; 129ad879127SKrish Sadhukhan } 130ad879127SKrish Sadhukhan 131ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test) 132ad879127SKrish Sadhukhan { 133ad879127SKrish Sadhukhan return null_check(test) && test->scratch == read_cr3(); 134ad879127SKrish Sadhukhan } 135ad879127SKrish Sadhukhan 136ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test) 137ad879127SKrish Sadhukhan { 138ad879127SKrish Sadhukhan struct svm_test *test = _test; 139ad879127SKrish Sadhukhan extern volatile u32 mmio_insn; 140ad879127SKrish Sadhukhan 141ad879127SKrish Sadhukhan while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2)) 142ad879127SKrish Sadhukhan pause(); 143ad879127SKrish Sadhukhan pause(); 144ad879127SKrish Sadhukhan pause(); 145ad879127SKrish Sadhukhan pause(); 146ad879127SKrish Sadhukhan mmio_insn = 0x90d8200f; // mov %cr3, %rax; nop 147ad879127SKrish Sadhukhan } 148ad879127SKrish Sadhukhan 149ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test) 150ad879127SKrish Sadhukhan { 151ad879127SKrish Sadhukhan default_prepare(test); 152096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 153ad879127SKrish Sadhukhan on_cpu_async(1, corrupt_cr3_intercept_bypass, test); 154ad879127SKrish Sadhukhan } 155ad879127SKrish Sadhukhan 156ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test) 157ad879127SKrish Sadhukhan { 158ad879127SKrish Sadhukhan ulong a = 0xa0000; 159ad879127SKrish Sadhukhan 160ad879127SKrish Sadhukhan test->scratch = 1; 161ad879127SKrish Sadhukhan while (test->scratch != 2) 162ad879127SKrish Sadhukhan barrier(); 163ad879127SKrish Sadhukhan 164ad879127SKrish Sadhukhan asm volatile ("mmio_insn: mov %0, (%0); nop" 165ad879127SKrish Sadhukhan : "+a"(a) : : "memory"); 166ad879127SKrish Sadhukhan test->scratch = a; 167ad879127SKrish Sadhukhan } 168ad879127SKrish Sadhukhan 169ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test) 170ad879127SKrish Sadhukhan { 171ad879127SKrish Sadhukhan default_prepare(test); 172096cf7feSPaolo Bonzini vmcb->control.intercept_dr_read = 0xff; 173096cf7feSPaolo Bonzini vmcb->control.intercept_dr_write = 0xff; 174ad879127SKrish Sadhukhan } 175ad879127SKrish Sadhukhan 176ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test) 177ad879127SKrish Sadhukhan { 178ad879127SKrish Sadhukhan unsigned int i, failcnt = 0; 179ad879127SKrish Sadhukhan 180ad879127SKrish Sadhukhan /* Loop testing debug register reads */ 181ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 182ad879127SKrish Sadhukhan 183ad879127SKrish Sadhukhan switch (i) { 184ad879127SKrish Sadhukhan case 0: 185ad879127SKrish Sadhukhan asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory"); 186ad879127SKrish Sadhukhan break; 187ad879127SKrish Sadhukhan case 1: 188ad879127SKrish Sadhukhan asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory"); 189ad879127SKrish Sadhukhan break; 190ad879127SKrish Sadhukhan case 2: 191ad879127SKrish Sadhukhan asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory"); 192ad879127SKrish Sadhukhan break; 193ad879127SKrish Sadhukhan case 3: 194ad879127SKrish Sadhukhan asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory"); 195ad879127SKrish Sadhukhan break; 196ad879127SKrish Sadhukhan case 4: 197ad879127SKrish Sadhukhan asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory"); 198ad879127SKrish Sadhukhan break; 199ad879127SKrish Sadhukhan case 5: 200ad879127SKrish Sadhukhan asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory"); 201ad879127SKrish Sadhukhan break; 202ad879127SKrish Sadhukhan case 6: 203ad879127SKrish Sadhukhan asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory"); 204ad879127SKrish Sadhukhan break; 205ad879127SKrish Sadhukhan case 7: 206ad879127SKrish Sadhukhan asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory"); 207ad879127SKrish Sadhukhan break; 208ad879127SKrish Sadhukhan } 209ad879127SKrish Sadhukhan 210ad879127SKrish Sadhukhan if (test->scratch != i) { 211198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u read intercept", i); 212ad879127SKrish Sadhukhan failcnt++; 213ad879127SKrish Sadhukhan } 214ad879127SKrish Sadhukhan } 215ad879127SKrish Sadhukhan 216ad879127SKrish Sadhukhan /* Loop testing debug register writes */ 217ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 218ad879127SKrish Sadhukhan 219ad879127SKrish Sadhukhan switch (i) { 220ad879127SKrish Sadhukhan case 0: 221ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory"); 222ad879127SKrish Sadhukhan break; 223ad879127SKrish Sadhukhan case 1: 224ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory"); 225ad879127SKrish Sadhukhan break; 226ad879127SKrish Sadhukhan case 2: 227ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory"); 228ad879127SKrish Sadhukhan break; 229ad879127SKrish Sadhukhan case 3: 230ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory"); 231ad879127SKrish Sadhukhan break; 232ad879127SKrish Sadhukhan case 4: 233ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory"); 234ad879127SKrish Sadhukhan break; 235ad879127SKrish Sadhukhan case 5: 236ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory"); 237ad879127SKrish Sadhukhan break; 238ad879127SKrish Sadhukhan case 6: 239ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory"); 240ad879127SKrish Sadhukhan break; 241ad879127SKrish Sadhukhan case 7: 242ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory"); 243ad879127SKrish Sadhukhan break; 244ad879127SKrish Sadhukhan } 245ad879127SKrish Sadhukhan 246ad879127SKrish Sadhukhan if (test->scratch != i) { 247198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u write intercept", i); 248ad879127SKrish Sadhukhan failcnt++; 249ad879127SKrish Sadhukhan } 250ad879127SKrish Sadhukhan } 251ad879127SKrish Sadhukhan 252ad879127SKrish Sadhukhan test->scratch = failcnt; 253ad879127SKrish Sadhukhan } 254ad879127SKrish Sadhukhan 255ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test) 256ad879127SKrish Sadhukhan { 257096cf7feSPaolo Bonzini ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0); 258ad879127SKrish Sadhukhan 259ad879127SKrish Sadhukhan /* Only expect DR intercepts */ 260ad879127SKrish Sadhukhan if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0)) 261ad879127SKrish Sadhukhan return true; 262ad879127SKrish Sadhukhan 263ad879127SKrish Sadhukhan /* 264ad879127SKrish Sadhukhan * Compute debug register number. 265ad879127SKrish Sadhukhan * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture 266ad879127SKrish Sadhukhan * Programmer's Manual Volume 2 - System Programming: 267ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 268ad879127SKrish Sadhukhan * there are 16 VMEXIT codes each for DR read and write. 269ad879127SKrish Sadhukhan */ 270ad879127SKrish Sadhukhan test->scratch = (n % 16); 271ad879127SKrish Sadhukhan 272ad879127SKrish Sadhukhan /* Jump over MOV instruction */ 273096cf7feSPaolo Bonzini vmcb->save.rip += 3; 274ad879127SKrish Sadhukhan 275ad879127SKrish Sadhukhan return false; 276ad879127SKrish Sadhukhan } 277ad879127SKrish Sadhukhan 278ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test) 279ad879127SKrish Sadhukhan { 280ad879127SKrish Sadhukhan return !test->scratch; 281ad879127SKrish Sadhukhan } 282ad879127SKrish Sadhukhan 283ad879127SKrish Sadhukhan static bool next_rip_supported(void) 284ad879127SKrish Sadhukhan { 285ad879127SKrish Sadhukhan return this_cpu_has(X86_FEATURE_NRIPS); 286ad879127SKrish Sadhukhan } 287ad879127SKrish Sadhukhan 288ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test) 289ad879127SKrish Sadhukhan { 290096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC); 291ad879127SKrish Sadhukhan } 292ad879127SKrish Sadhukhan 293ad879127SKrish Sadhukhan 294ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test) 295ad879127SKrish Sadhukhan { 296ad879127SKrish Sadhukhan asm volatile ("rdtsc\n\t" 297ad879127SKrish Sadhukhan ".globl exp_next_rip\n\t" 298ad879127SKrish Sadhukhan "exp_next_rip:\n\t" ::: "eax", "edx"); 299ad879127SKrish Sadhukhan } 300ad879127SKrish Sadhukhan 301ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test) 302ad879127SKrish Sadhukhan { 303ad879127SKrish Sadhukhan extern char exp_next_rip; 304ad879127SKrish Sadhukhan unsigned long address = (unsigned long)&exp_next_rip; 305ad879127SKrish Sadhukhan 306096cf7feSPaolo Bonzini return address == vmcb->control.next_rip; 307ad879127SKrish Sadhukhan } 308ad879127SKrish Sadhukhan 309ad879127SKrish Sadhukhan extern u8 *msr_bitmap; 310ad879127SKrish Sadhukhan 311ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test) 312ad879127SKrish Sadhukhan { 313ad879127SKrish Sadhukhan default_prepare(test); 314096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT); 315ad879127SKrish Sadhukhan memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE); 316ad879127SKrish Sadhukhan } 317ad879127SKrish Sadhukhan 318ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test) 319ad879127SKrish Sadhukhan { 320ad879127SKrish Sadhukhan unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */ 321ad879127SKrish Sadhukhan unsigned long msr_index; 32227eeac46SSean Christopherson u64 ignored; 32327eeac46SSean Christopherson int vector; 324ad879127SKrish Sadhukhan 325*573d62c6SSean Christopherson for (msr_index = 0; msr_index <= 0xc0012000; msr_index++) { 326ad879127SKrish Sadhukhan if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) { 327ad879127SKrish Sadhukhan /* 328ad879127SKrish Sadhukhan * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture 329ad879127SKrish Sadhukhan * Programmer's Manual volume 2 - System Programming: 330ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 331ad879127SKrish Sadhukhan * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR. 332ad879127SKrish Sadhukhan */ 333ad879127SKrish Sadhukhan continue; 334ad879127SKrish Sadhukhan } 335ad879127SKrish Sadhukhan 336*573d62c6SSean Christopherson /* 337*573d62c6SSean Christopherson * Test one MSR just before and after each range, but otherwise 338*573d62c6SSean Christopherson * skips gaps between supported MSR ranges. 339*573d62c6SSean Christopherson */ 340*573d62c6SSean Christopherson if (msr_index == 0x2000 + 1) 341*573d62c6SSean Christopherson msr_index = 0xc0000000 - 1; 342*573d62c6SSean Christopherson else if (msr_index == 0xc0002000 + 1) 343*573d62c6SSean Christopherson msr_index = 0xc0010000 - 1; 344ad879127SKrish Sadhukhan 345ad879127SKrish Sadhukhan test->scratch = -1; 346ad879127SKrish Sadhukhan 34727eeac46SSean Christopherson vector = rdmsr_safe(msr_index, &ignored); 34827eeac46SSean Christopherson if (vector) 34927eeac46SSean Christopherson report_fail("Expected RDMSR(0x%lx) to #VMEXIT, got exception '%u'", 35027eeac46SSean Christopherson msr_index, vector); 35127eeac46SSean Christopherson else if (test->scratch != msr_index) 35227eeac46SSean Christopherson report_fail("Expected RDMSR(0x%lx) to #VMEXIT, got scratch '%ld", 35327eeac46SSean Christopherson msr_index, test->scratch); 354ad879127SKrish Sadhukhan 355ad879127SKrish Sadhukhan /* 356ad879127SKrish Sadhukhan * Poor man approach to generate a value that 357ad879127SKrish Sadhukhan * seems arbitrary each time around the loop. 358ad879127SKrish Sadhukhan */ 359ad879127SKrish Sadhukhan msr_value += (msr_value << 1); 360ad879127SKrish Sadhukhan 36127eeac46SSean Christopherson vector = wrmsr_safe(msr_index, msr_value); 36227eeac46SSean Christopherson if (vector) 36327eeac46SSean Christopherson report_fail("Expected WRMSR(0x%0lx) to #VMEXIT, got exception '%u'", 36427eeac46SSean Christopherson msr_index, vector); 36527eeac46SSean Christopherson else if (test->scratch != msr_value) 36627eeac46SSean Christopherson report_fail("Expected WRMSR(0x%lx) to #VMEXIT, got scratch '%ld' (wanted %ld)", 36727eeac46SSean Christopherson msr_index, test->scratch, msr_value); 368ad879127SKrish Sadhukhan } 369ad879127SKrish Sadhukhan 370ad879127SKrish Sadhukhan test->scratch = -2; 371ad879127SKrish Sadhukhan } 372ad879127SKrish Sadhukhan 373ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test) 374ad879127SKrish Sadhukhan { 375096cf7feSPaolo Bonzini u32 exit_code = vmcb->control.exit_code; 376ad879127SKrish Sadhukhan 37727eeac46SSean Christopherson if (exit_code == SVM_EXIT_VMMCALL) 378ad879127SKrish Sadhukhan return true; 379ad879127SKrish Sadhukhan 38027eeac46SSean Christopherson if (exit_code != SVM_EXIT_MSR) { 38127eeac46SSean Christopherson report_fail("Wanted MSR VM-Exit, got reason 0x%x", exit_code); 382ad879127SKrish Sadhukhan return true; 383ad879127SKrish Sadhukhan } 384ad879127SKrish Sadhukhan 385ad879127SKrish Sadhukhan /* Jump over RDMSR/WRMSR instruction */ 386096cf7feSPaolo Bonzini vmcb->save.rip += 2; 387ad879127SKrish Sadhukhan 388ad879127SKrish Sadhukhan /* 389ad879127SKrish Sadhukhan * Test whether the intercept was for RDMSR/WRMSR. 390ad879127SKrish Sadhukhan * For RDMSR, test->scratch is set to the MSR index; 391ad879127SKrish Sadhukhan * RCX holds the MSR index. 392ad879127SKrish Sadhukhan * For WRMSR, test->scratch is set to the MSR value; 393ad879127SKrish Sadhukhan * RDX holds the upper 32 bits of the MSR value, 394ad879127SKrish Sadhukhan * while RAX hold its lower 32 bits. 395ad879127SKrish Sadhukhan */ 39627eeac46SSean Christopherson if (vmcb->control.exit_info_1) 39727eeac46SSean Christopherson test->scratch = ((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff)); 398ad879127SKrish Sadhukhan else 399ad879127SKrish Sadhukhan test->scratch = get_regs().rcx; 400ad879127SKrish Sadhukhan 401ad879127SKrish Sadhukhan return false; 402ad879127SKrish Sadhukhan } 403ad879127SKrish Sadhukhan 404ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test) 405ad879127SKrish Sadhukhan { 406ad879127SKrish Sadhukhan memset(msr_bitmap, 0, MSR_BITMAP_SIZE); 407ad879127SKrish Sadhukhan return (test->scratch == -2); 408ad879127SKrish Sadhukhan } 409ad879127SKrish Sadhukhan 410ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test) 411ad879127SKrish Sadhukhan { 412096cf7feSPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR) 413ad879127SKrish Sadhukhan | (1ULL << UD_VECTOR) 414ad879127SKrish Sadhukhan | (1ULL << DF_VECTOR) 415ad879127SKrish Sadhukhan | (1ULL << PF_VECTOR); 416ad879127SKrish Sadhukhan test->scratch = 0; 417ad879127SKrish Sadhukhan } 418ad879127SKrish Sadhukhan 419ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test) 420ad879127SKrish Sadhukhan { 421ad879127SKrish Sadhukhan asm volatile(" cli\n" 422ad879127SKrish Sadhukhan " ljmp *1f\n" /* jump to 32-bit code segment */ 423ad879127SKrish Sadhukhan "1:\n" 424ad879127SKrish Sadhukhan " .long 2f\n" 425ad879127SKrish Sadhukhan " .long " xstr(KERNEL_CS32) "\n" 426ad879127SKrish Sadhukhan ".code32\n" 427ad879127SKrish Sadhukhan "2:\n" 428ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 429ad879127SKrish Sadhukhan " btcl $31, %%eax\n" /* clear PG */ 430ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 431ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 432ad879127SKrish Sadhukhan " rdmsr\n" 433ad879127SKrish Sadhukhan " btcl $8, %%eax\n" /* clear LME */ 434ad879127SKrish Sadhukhan " wrmsr\n" 435ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 436ad879127SKrish Sadhukhan " btcl $5, %%eax\n" /* clear PAE */ 437ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 438ad879127SKrish Sadhukhan " movw %[ds16], %%ax\n" 439ad879127SKrish Sadhukhan " movw %%ax, %%ds\n" 440ad879127SKrish Sadhukhan " ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */ 441ad879127SKrish Sadhukhan ".code16\n" 442ad879127SKrish Sadhukhan "3:\n" 443ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 444ad879127SKrish Sadhukhan " btcl $0, %%eax\n" /* clear PE */ 445ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 446ad879127SKrish Sadhukhan " ljmpl $0, $4f\n" /* jump to real-mode */ 447ad879127SKrish Sadhukhan "4:\n" 448ad879127SKrish Sadhukhan " vmmcall\n" 449ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 450ad879127SKrish Sadhukhan " btsl $0, %%eax\n" /* set PE */ 451ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 452ad879127SKrish Sadhukhan " ljmpl %[cs32], $5f\n" /* back to protected mode */ 453ad879127SKrish Sadhukhan ".code32\n" 454ad879127SKrish Sadhukhan "5:\n" 455ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 456ad879127SKrish Sadhukhan " btsl $5, %%eax\n" /* set PAE */ 457ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 458ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 459ad879127SKrish Sadhukhan " rdmsr\n" 460ad879127SKrish Sadhukhan " btsl $8, %%eax\n" /* set LME */ 461ad879127SKrish Sadhukhan " wrmsr\n" 462ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 463ad879127SKrish Sadhukhan " btsl $31, %%eax\n" /* set PG */ 464ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 465ad879127SKrish Sadhukhan " ljmpl %[cs64], $6f\n" /* back to long mode */ 466ad879127SKrish Sadhukhan ".code64\n\t" 467ad879127SKrish Sadhukhan "6:\n" 468ad879127SKrish Sadhukhan " vmmcall\n" 469ad879127SKrish Sadhukhan :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16), 470ad879127SKrish Sadhukhan [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64) 471ad879127SKrish Sadhukhan : "rax", "rbx", "rcx", "rdx", "memory"); 472ad879127SKrish Sadhukhan } 473ad879127SKrish Sadhukhan 474ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test) 475ad879127SKrish Sadhukhan { 476ad879127SKrish Sadhukhan u64 cr0, cr4, efer; 477ad879127SKrish Sadhukhan 478096cf7feSPaolo Bonzini cr0 = vmcb->save.cr0; 479096cf7feSPaolo Bonzini cr4 = vmcb->save.cr4; 480096cf7feSPaolo Bonzini efer = vmcb->save.efer; 481ad879127SKrish Sadhukhan 482ad879127SKrish Sadhukhan /* Only expect VMMCALL intercepts */ 483096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) 484ad879127SKrish Sadhukhan return true; 485ad879127SKrish Sadhukhan 486ad879127SKrish Sadhukhan /* Jump over VMMCALL instruction */ 487096cf7feSPaolo Bonzini vmcb->save.rip += 3; 488ad879127SKrish Sadhukhan 489ad879127SKrish Sadhukhan /* Do sanity checks */ 490ad879127SKrish Sadhukhan switch (test->scratch) { 491ad879127SKrish Sadhukhan case 0: 492ad879127SKrish Sadhukhan /* Test should be in real mode now - check for this */ 493ad879127SKrish Sadhukhan if ((cr0 & 0x80000001) || /* CR0.PG, CR0.PE */ 494ad879127SKrish Sadhukhan (cr4 & 0x00000020) || /* CR4.PAE */ 495ad879127SKrish Sadhukhan (efer & 0x00000500)) /* EFER.LMA, EFER.LME */ 496ad879127SKrish Sadhukhan return true; 497ad879127SKrish Sadhukhan break; 498ad879127SKrish Sadhukhan case 2: 499ad879127SKrish Sadhukhan /* Test should be back in long-mode now - check for this */ 500ad879127SKrish Sadhukhan if (((cr0 & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */ 501ad879127SKrish Sadhukhan ((cr4 & 0x00000020) != 0x00000020) || /* CR4.PAE */ 502ad879127SKrish Sadhukhan ((efer & 0x00000500) != 0x00000500)) /* EFER.LMA, EFER.LME */ 503ad879127SKrish Sadhukhan return true; 504ad879127SKrish Sadhukhan break; 505ad879127SKrish Sadhukhan } 506ad879127SKrish Sadhukhan 507ad879127SKrish Sadhukhan /* one step forward */ 508ad879127SKrish Sadhukhan test->scratch += 1; 509ad879127SKrish Sadhukhan 510ad879127SKrish Sadhukhan return test->scratch == 2; 511ad879127SKrish Sadhukhan } 512ad879127SKrish Sadhukhan 513ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test) 514ad879127SKrish Sadhukhan { 515ad879127SKrish Sadhukhan return test->scratch == 2; 516ad879127SKrish Sadhukhan } 517ad879127SKrish Sadhukhan 518ad879127SKrish Sadhukhan extern u8 *io_bitmap; 519ad879127SKrish Sadhukhan 520ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test) 521ad879127SKrish Sadhukhan { 522096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT); 523ad879127SKrish Sadhukhan test->scratch = 0; 524ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8192); 525ad879127SKrish Sadhukhan io_bitmap[8192] = 0xFF; 526ad879127SKrish Sadhukhan } 527ad879127SKrish Sadhukhan 528ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test) 529ad879127SKrish Sadhukhan { 530ad879127SKrish Sadhukhan // stage 0, test IO pass 531ad879127SKrish Sadhukhan inb(0x5000); 532ad879127SKrish Sadhukhan outb(0x0, 0x5000); 533ad879127SKrish Sadhukhan if (get_test_stage(test) != 0) 534ad879127SKrish Sadhukhan goto fail; 535ad879127SKrish Sadhukhan 536ad879127SKrish Sadhukhan // test IO width, in/out 537ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 538ad879127SKrish Sadhukhan inc_test_stage(test); 539ad879127SKrish Sadhukhan inb(0x0); 540ad879127SKrish Sadhukhan if (get_test_stage(test) != 2) 541ad879127SKrish Sadhukhan goto fail; 542ad879127SKrish Sadhukhan 543ad879127SKrish Sadhukhan outw(0x0, 0x0); 544ad879127SKrish Sadhukhan if (get_test_stage(test) != 3) 545ad879127SKrish Sadhukhan goto fail; 546ad879127SKrish Sadhukhan 547ad879127SKrish Sadhukhan inl(0x0); 548ad879127SKrish Sadhukhan if (get_test_stage(test) != 4) 549ad879127SKrish Sadhukhan goto fail; 550ad879127SKrish Sadhukhan 551ad879127SKrish Sadhukhan // test low/high IO port 552ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 553ad879127SKrish Sadhukhan inb(0x5000); 554ad879127SKrish Sadhukhan if (get_test_stage(test) != 5) 555ad879127SKrish Sadhukhan goto fail; 556ad879127SKrish Sadhukhan 557ad879127SKrish Sadhukhan io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8)); 558ad879127SKrish Sadhukhan inw(0x9000); 559ad879127SKrish Sadhukhan if (get_test_stage(test) != 6) 560ad879127SKrish Sadhukhan goto fail; 561ad879127SKrish Sadhukhan 562ad879127SKrish Sadhukhan // test partial pass 563ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 564ad879127SKrish Sadhukhan inl(0x4FFF); 565ad879127SKrish Sadhukhan if (get_test_stage(test) != 7) 566ad879127SKrish Sadhukhan goto fail; 567ad879127SKrish Sadhukhan 568ad879127SKrish Sadhukhan // test across pages 569ad879127SKrish Sadhukhan inc_test_stage(test); 570ad879127SKrish Sadhukhan inl(0x7FFF); 571ad879127SKrish Sadhukhan if (get_test_stage(test) != 8) 572ad879127SKrish Sadhukhan goto fail; 573ad879127SKrish Sadhukhan 574ad879127SKrish Sadhukhan inc_test_stage(test); 575ad879127SKrish Sadhukhan io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8); 576ad879127SKrish Sadhukhan inl(0x7FFF); 577ad879127SKrish Sadhukhan if (get_test_stage(test) != 10) 578ad879127SKrish Sadhukhan goto fail; 579ad879127SKrish Sadhukhan 580ad879127SKrish Sadhukhan io_bitmap[0] = 0; 581ad879127SKrish Sadhukhan inl(0xFFFF); 582ad879127SKrish Sadhukhan if (get_test_stage(test) != 11) 583ad879127SKrish Sadhukhan goto fail; 584ad879127SKrish Sadhukhan 585ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 586ad879127SKrish Sadhukhan io_bitmap[8192] = 0; 587ad879127SKrish Sadhukhan inl(0xFFFF); 588ad879127SKrish Sadhukhan inc_test_stage(test); 589ad879127SKrish Sadhukhan if (get_test_stage(test) != 12) 590ad879127SKrish Sadhukhan goto fail; 591ad879127SKrish Sadhukhan 592ad879127SKrish Sadhukhan return; 593ad879127SKrish Sadhukhan 594ad879127SKrish Sadhukhan fail: 595198dfd0eSJanis Schoetterl-Glausch report_fail("stage %d", get_test_stage(test)); 596ad879127SKrish Sadhukhan test->scratch = -1; 597ad879127SKrish Sadhukhan } 598ad879127SKrish Sadhukhan 599ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test) 600ad879127SKrish Sadhukhan { 601ad879127SKrish Sadhukhan unsigned port, size; 602ad879127SKrish Sadhukhan 603ad879127SKrish Sadhukhan /* Only expect IOIO intercepts */ 604096cf7feSPaolo Bonzini if (vmcb->control.exit_code == SVM_EXIT_VMMCALL) 605ad879127SKrish Sadhukhan return true; 606ad879127SKrish Sadhukhan 607096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_IOIO) 608ad879127SKrish Sadhukhan return true; 609ad879127SKrish Sadhukhan 610ad879127SKrish Sadhukhan /* one step forward */ 611ad879127SKrish Sadhukhan test->scratch += 1; 612ad879127SKrish Sadhukhan 613096cf7feSPaolo Bonzini port = vmcb->control.exit_info_1 >> 16; 614096cf7feSPaolo Bonzini size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7; 615ad879127SKrish Sadhukhan 616ad879127SKrish Sadhukhan while (size--) { 617ad879127SKrish Sadhukhan io_bitmap[port / 8] &= ~(1 << (port & 7)); 618ad879127SKrish Sadhukhan port++; 619ad879127SKrish Sadhukhan } 620ad879127SKrish Sadhukhan 621ad879127SKrish Sadhukhan return false; 622ad879127SKrish Sadhukhan } 623ad879127SKrish Sadhukhan 624ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test) 625ad879127SKrish Sadhukhan { 626ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8193); 627ad879127SKrish Sadhukhan return test->scratch != -1; 628ad879127SKrish Sadhukhan } 629ad879127SKrish Sadhukhan 630ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test) 631ad879127SKrish Sadhukhan { 632096cf7feSPaolo Bonzini vmcb->control.asid = 0; 633ad879127SKrish Sadhukhan } 634ad879127SKrish Sadhukhan 635ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test) 636ad879127SKrish Sadhukhan { 637ad879127SKrish Sadhukhan asm volatile ("vmmcall\n\t"); 638ad879127SKrish Sadhukhan } 639ad879127SKrish Sadhukhan 640ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test) 641ad879127SKrish Sadhukhan { 642096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 643ad879127SKrish Sadhukhan } 644ad879127SKrish Sadhukhan 645ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test) 646ad879127SKrish Sadhukhan { 647096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0); 648ad879127SKrish Sadhukhan } 649ad879127SKrish Sadhukhan 650ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test) 651ad879127SKrish Sadhukhan { 652ad879127SKrish Sadhukhan return true; 653ad879127SKrish Sadhukhan } 654ad879127SKrish Sadhukhan 655ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test) 656ad879127SKrish Sadhukhan { 657ad879127SKrish Sadhukhan unsigned long cr0; 658ad879127SKrish Sadhukhan 659ad879127SKrish Sadhukhan /* read cr0, clear CD, and write back */ 660ad879127SKrish Sadhukhan cr0 = read_cr0(); 661ad879127SKrish Sadhukhan cr0 |= (1UL << 30); 662ad879127SKrish Sadhukhan write_cr0(cr0); 663ad879127SKrish Sadhukhan 664ad879127SKrish Sadhukhan /* 665ad879127SKrish Sadhukhan * If we are here the test failed, not sure what to do now because we 666ad879127SKrish Sadhukhan * are not in guest-mode anymore so we can't trigger an intercept. 667ad879127SKrish Sadhukhan * Trigger a tripple-fault for now. 668ad879127SKrish Sadhukhan */ 669198dfd0eSJanis Schoetterl-Glausch report_fail("sel_cr0 test. Can not recover from this - exiting"); 670ad879127SKrish Sadhukhan exit(report_summary()); 671ad879127SKrish Sadhukhan } 672ad879127SKrish Sadhukhan 673ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test) 674ad879127SKrish Sadhukhan { 675096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE; 676ad879127SKrish Sadhukhan } 677ad879127SKrish Sadhukhan 678ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE (1ll << 32) 679f3154609SBill Wendling #define TSC_OFFSET_VALUE (~0ull << 48) 680ad879127SKrish Sadhukhan static bool ok; 681ad879127SKrish Sadhukhan 68210a65fc4SNadav Amit static bool tsc_adjust_supported(void) 68310a65fc4SNadav Amit { 68410a65fc4SNadav Amit return this_cpu_has(X86_FEATURE_TSC_ADJUST); 68510a65fc4SNadav Amit } 68610a65fc4SNadav Amit 687ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test) 688ad879127SKrish Sadhukhan { 689ad879127SKrish Sadhukhan default_prepare(test); 690096cf7feSPaolo Bonzini vmcb->control.tsc_offset = TSC_OFFSET_VALUE; 691ad879127SKrish Sadhukhan 692ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE); 693ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 694ad879127SKrish Sadhukhan ok = adjust == -TSC_ADJUST_VALUE; 695ad879127SKrish Sadhukhan } 696ad879127SKrish Sadhukhan 697ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test) 698ad879127SKrish Sadhukhan { 699ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 700ad879127SKrish Sadhukhan ok &= adjust == -TSC_ADJUST_VALUE; 701ad879127SKrish Sadhukhan 702ad879127SKrish Sadhukhan uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE; 703ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE); 704ad879127SKrish Sadhukhan 705ad879127SKrish Sadhukhan adjust = rdmsr(MSR_IA32_TSC_ADJUST); 706ad879127SKrish Sadhukhan ok &= adjust <= -2 * TSC_ADJUST_VALUE; 707ad879127SKrish Sadhukhan 708ad879127SKrish Sadhukhan uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE; 709ad879127SKrish Sadhukhan ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 710ad879127SKrish Sadhukhan 711ad879127SKrish Sadhukhan uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE; 712ad879127SKrish Sadhukhan ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 713ad879127SKrish Sadhukhan } 714ad879127SKrish Sadhukhan 715ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test) 716ad879127SKrish Sadhukhan { 717ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 718ad879127SKrish Sadhukhan 719ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, 0); 720ad879127SKrish Sadhukhan return ok && adjust <= -2 * TSC_ADJUST_VALUE; 721ad879127SKrish Sadhukhan } 722ad879127SKrish Sadhukhan 723a8503d50SMaxim Levitsky 724a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value; 725a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */ 726a8503d50SMaxim Levitsky #define TSC_SHIFT 24 727a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10 728a8503d50SMaxim Levitsky 729a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test) 730a8503d50SMaxim Levitsky { 731a8503d50SMaxim Levitsky u64 start_tsc = rdtsc(); 732a8503d50SMaxim Levitsky 733a8503d50SMaxim Levitsky while (rdtsc() - start_tsc < guest_tsc_delay_value) 734a8503d50SMaxim Levitsky cpu_relax(); 735a8503d50SMaxim Levitsky } 736a8503d50SMaxim Levitsky 737a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration, 738a8503d50SMaxim Levitsky double tsc_scale, u64 tsc_offset) 739a8503d50SMaxim Levitsky { 740a8503d50SMaxim Levitsky u64 start_tsc, actual_duration; 741a8503d50SMaxim Levitsky 742a8503d50SMaxim Levitsky guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale; 743a8503d50SMaxim Levitsky 744a8503d50SMaxim Levitsky test_set_guest(svm_tsc_scale_guest); 745a8503d50SMaxim Levitsky vmcb->control.tsc_offset = tsc_offset; 746a8503d50SMaxim Levitsky wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32))); 747a8503d50SMaxim Levitsky 748a8503d50SMaxim Levitsky start_tsc = rdtsc(); 749a8503d50SMaxim Levitsky 750a8503d50SMaxim Levitsky if (svm_vmrun() != SVM_EXIT_VMMCALL) 751a8503d50SMaxim Levitsky report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code); 752a8503d50SMaxim Levitsky 753a8503d50SMaxim Levitsky actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT; 754a8503d50SMaxim Levitsky 755a8503d50SMaxim Levitsky report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)", 756a8503d50SMaxim Levitsky duration, actual_duration); 757a8503d50SMaxim Levitsky } 758a8503d50SMaxim Levitsky 759a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void) 760a8503d50SMaxim Levitsky { 761a8503d50SMaxim Levitsky int i; 762a8503d50SMaxim Levitsky 763a8503d50SMaxim Levitsky if (!tsc_scale_supported()) { 764a8503d50SMaxim Levitsky report_skip("TSC scale not supported in the guest"); 765a8503d50SMaxim Levitsky return; 766a8503d50SMaxim Levitsky } 767a8503d50SMaxim Levitsky 768a8503d50SMaxim Levitsky report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT, 769a8503d50SMaxim Levitsky "initial TSC scale ratio"); 770a8503d50SMaxim Levitsky 771a8503d50SMaxim Levitsky for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) { 772a8503d50SMaxim Levitsky 773a8503d50SMaxim Levitsky double tsc_scale = (double)(rdrand() % 100 + 1) / 10; 774a8503d50SMaxim Levitsky int duration = rdrand() % 50 + 1; 775a8503d50SMaxim Levitsky u64 tsc_offset = rdrand(); 776a8503d50SMaxim Levitsky 777a8503d50SMaxim Levitsky report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld", 778a8503d50SMaxim Levitsky duration, (int)(tsc_scale * 100), tsc_offset); 779a8503d50SMaxim Levitsky 780a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset); 781a8503d50SMaxim Levitsky } 782a8503d50SMaxim Levitsky 783a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 255, rdrand()); 784a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 0.0001, rdrand()); 785a8503d50SMaxim Levitsky } 786a8503d50SMaxim Levitsky 787ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test) 788ad879127SKrish Sadhukhan { 789ad879127SKrish Sadhukhan default_prepare(test); 790ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 791ad879127SKrish Sadhukhan latvmrun_min = latvmexit_min = -1ULL; 792ad879127SKrish Sadhukhan latvmrun_max = latvmexit_max = 0; 793ad879127SKrish Sadhukhan vmrun_sum = vmexit_sum = 0; 794ad879127SKrish Sadhukhan tsc_start = rdtsc(); 795ad879127SKrish Sadhukhan } 796ad879127SKrish Sadhukhan 797ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test) 798ad879127SKrish Sadhukhan { 799ad879127SKrish Sadhukhan u64 cycles; 800ad879127SKrish Sadhukhan 801ad879127SKrish Sadhukhan start: 802ad879127SKrish Sadhukhan tsc_end = rdtsc(); 803ad879127SKrish Sadhukhan 804ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 805ad879127SKrish Sadhukhan 806ad879127SKrish Sadhukhan if (cycles > latvmrun_max) 807ad879127SKrish Sadhukhan latvmrun_max = cycles; 808ad879127SKrish Sadhukhan 809ad879127SKrish Sadhukhan if (cycles < latvmrun_min) 810ad879127SKrish Sadhukhan latvmrun_min = cycles; 811ad879127SKrish Sadhukhan 812ad879127SKrish Sadhukhan vmrun_sum += cycles; 813ad879127SKrish Sadhukhan 814ad879127SKrish Sadhukhan tsc_start = rdtsc(); 815ad879127SKrish Sadhukhan 816ad879127SKrish Sadhukhan asm volatile ("vmmcall" : : : "memory"); 817ad879127SKrish Sadhukhan goto start; 818ad879127SKrish Sadhukhan } 819ad879127SKrish Sadhukhan 820ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test) 821ad879127SKrish Sadhukhan { 822ad879127SKrish Sadhukhan u64 cycles; 823ad879127SKrish Sadhukhan 824ad879127SKrish Sadhukhan tsc_end = rdtsc(); 825ad879127SKrish Sadhukhan 826ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 827ad879127SKrish Sadhukhan 828ad879127SKrish Sadhukhan if (cycles > latvmexit_max) 829ad879127SKrish Sadhukhan latvmexit_max = cycles; 830ad879127SKrish Sadhukhan 831ad879127SKrish Sadhukhan if (cycles < latvmexit_min) 832ad879127SKrish Sadhukhan latvmexit_min = cycles; 833ad879127SKrish Sadhukhan 834ad879127SKrish Sadhukhan vmexit_sum += cycles; 835ad879127SKrish Sadhukhan 836096cf7feSPaolo Bonzini vmcb->save.rip += 3; 837ad879127SKrish Sadhukhan 838ad879127SKrish Sadhukhan runs -= 1; 839ad879127SKrish Sadhukhan 840ad879127SKrish Sadhukhan tsc_end = rdtsc(); 841ad879127SKrish Sadhukhan 842ad879127SKrish Sadhukhan return runs == 0; 843ad879127SKrish Sadhukhan } 844ad879127SKrish Sadhukhan 845f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test) 846f7fa53dcSPaolo Bonzini { 847f7fa53dcSPaolo Bonzini vmcb->control.clean = VMCB_CLEAN_ALL; 848f7fa53dcSPaolo Bonzini return latency_finished(test); 849f7fa53dcSPaolo Bonzini } 850f7fa53dcSPaolo Bonzini 851ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test) 852ad879127SKrish Sadhukhan { 853ad879127SKrish Sadhukhan printf(" Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max, 854ad879127SKrish Sadhukhan latvmrun_min, vmrun_sum / LATENCY_RUNS); 855ad879127SKrish Sadhukhan printf(" Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max, 856ad879127SKrish Sadhukhan latvmexit_min, vmexit_sum / LATENCY_RUNS); 857ad879127SKrish Sadhukhan return true; 858ad879127SKrish Sadhukhan } 859ad879127SKrish Sadhukhan 860ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test) 861ad879127SKrish Sadhukhan { 862ad879127SKrish Sadhukhan default_prepare(test); 863ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 864ad879127SKrish Sadhukhan latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL; 865ad879127SKrish Sadhukhan latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0; 866ad879127SKrish Sadhukhan vmload_sum = vmsave_sum = stgi_sum = clgi_sum; 867ad879127SKrish Sadhukhan } 868ad879127SKrish Sadhukhan 869ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test) 870ad879127SKrish Sadhukhan { 871096cf7feSPaolo Bonzini u64 vmcb_phys = virt_to_phys(vmcb); 872ad879127SKrish Sadhukhan u64 cycles; 873ad879127SKrish Sadhukhan 874ad879127SKrish Sadhukhan for ( ; runs != 0; runs--) { 875ad879127SKrish Sadhukhan tsc_start = rdtsc(); 876ad879127SKrish Sadhukhan asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory"); 877ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 878ad879127SKrish Sadhukhan if (cycles > latvmload_max) 879ad879127SKrish Sadhukhan latvmload_max = cycles; 880ad879127SKrish Sadhukhan if (cycles < latvmload_min) 881ad879127SKrish Sadhukhan latvmload_min = cycles; 882ad879127SKrish Sadhukhan vmload_sum += cycles; 883ad879127SKrish Sadhukhan 884ad879127SKrish Sadhukhan tsc_start = rdtsc(); 885ad879127SKrish Sadhukhan asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory"); 886ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 887ad879127SKrish Sadhukhan if (cycles > latvmsave_max) 888ad879127SKrish Sadhukhan latvmsave_max = cycles; 889ad879127SKrish Sadhukhan if (cycles < latvmsave_min) 890ad879127SKrish Sadhukhan latvmsave_min = cycles; 891ad879127SKrish Sadhukhan vmsave_sum += cycles; 892ad879127SKrish Sadhukhan 893ad879127SKrish Sadhukhan tsc_start = rdtsc(); 894ad879127SKrish Sadhukhan asm volatile("stgi\n\t"); 895ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 896ad879127SKrish Sadhukhan if (cycles > latstgi_max) 897ad879127SKrish Sadhukhan latstgi_max = cycles; 898ad879127SKrish Sadhukhan if (cycles < latstgi_min) 899ad879127SKrish Sadhukhan latstgi_min = cycles; 900ad879127SKrish Sadhukhan stgi_sum += cycles; 901ad879127SKrish Sadhukhan 902ad879127SKrish Sadhukhan tsc_start = rdtsc(); 903ad879127SKrish Sadhukhan asm volatile("clgi\n\t"); 904ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 905ad879127SKrish Sadhukhan if (cycles > latclgi_max) 906ad879127SKrish Sadhukhan latclgi_max = cycles; 907ad879127SKrish Sadhukhan if (cycles < latclgi_min) 908ad879127SKrish Sadhukhan latclgi_min = cycles; 909ad879127SKrish Sadhukhan clgi_sum += cycles; 910ad879127SKrish Sadhukhan } 911ad879127SKrish Sadhukhan 912ad879127SKrish Sadhukhan tsc_end = rdtsc(); 913ad879127SKrish Sadhukhan 914ad879127SKrish Sadhukhan return true; 915ad879127SKrish Sadhukhan } 916ad879127SKrish Sadhukhan 917ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test) 918ad879127SKrish Sadhukhan { 919ad879127SKrish Sadhukhan printf(" Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max, 920ad879127SKrish Sadhukhan latvmload_min, vmload_sum / LATENCY_RUNS); 921ad879127SKrish Sadhukhan printf(" Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max, 922ad879127SKrish Sadhukhan latvmsave_min, vmsave_sum / LATENCY_RUNS); 923ad879127SKrish Sadhukhan printf(" Latency STGI: max: %ld min: %ld avg: %ld\n", latstgi_max, 924ad879127SKrish Sadhukhan latstgi_min, stgi_sum / LATENCY_RUNS); 925ad879127SKrish Sadhukhan printf(" Latency CLGI: max: %ld min: %ld avg: %ld\n", latclgi_max, 926ad879127SKrish Sadhukhan latclgi_min, clgi_sum / LATENCY_RUNS); 927ad879127SKrish Sadhukhan return true; 928ad879127SKrish Sadhukhan } 929ad879127SKrish Sadhukhan 930493d27d4SSean Christopherson /* 931493d27d4SSean Christopherson * Report failures from SVM guest code, and on failure, set the stage to -1 and 932493d27d4SSean Christopherson * do VMMCALL to terminate the test (host side must treat -1 as "finished"). 933493d27d4SSean Christopherson * TODO: fix the tests that don't play nice with a straight report, e.g. the 934493d27d4SSean Christopherson * V_TPR test fails if report() is invoked. 935493d27d4SSean Christopherson */ 936493d27d4SSean Christopherson #define report_svm_guest(cond, test, fmt, args...) \ 937493d27d4SSean Christopherson do { \ 938493d27d4SSean Christopherson if (!(cond)) { \ 939493d27d4SSean Christopherson report_fail(fmt, ##args); \ 940493d27d4SSean Christopherson set_test_stage(test, -1); \ 941493d27d4SSean Christopherson vmmcall(); \ 942493d27d4SSean Christopherson } \ 943493d27d4SSean Christopherson } while (0) 944493d27d4SSean Christopherson 945ad879127SKrish Sadhukhan bool pending_event_ipi_fired; 946ad879127SKrish Sadhukhan bool pending_event_guest_run; 947ad879127SKrish Sadhukhan 948ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs) 949ad879127SKrish Sadhukhan { 950ad879127SKrish Sadhukhan pending_event_ipi_fired = true; 951ad879127SKrish Sadhukhan eoi(); 952ad879127SKrish Sadhukhan } 953ad879127SKrish Sadhukhan 954ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test) 955ad879127SKrish Sadhukhan { 956ad879127SKrish Sadhukhan int ipi_vector = 0xf1; 957ad879127SKrish Sadhukhan 958ad879127SKrish Sadhukhan default_prepare(test); 959ad879127SKrish Sadhukhan 960ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 961ad879127SKrish Sadhukhan 962ad879127SKrish Sadhukhan handle_irq(ipi_vector, pending_event_ipi_isr); 963ad879127SKrish Sadhukhan 964ad879127SKrish Sadhukhan pending_event_guest_run = false; 965ad879127SKrish Sadhukhan 966096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 967096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 968ad879127SKrish Sadhukhan 969ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 970ad879127SKrish Sadhukhan APIC_DM_FIXED | ipi_vector, 0); 971ad879127SKrish Sadhukhan 972ad879127SKrish Sadhukhan set_test_stage(test, 0); 973ad879127SKrish Sadhukhan } 974ad879127SKrish Sadhukhan 975ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test) 976ad879127SKrish Sadhukhan { 977ad879127SKrish Sadhukhan pending_event_guest_run = true; 978ad879127SKrish Sadhukhan } 979ad879127SKrish Sadhukhan 980ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test) 981ad879127SKrish Sadhukhan { 982ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 983ad879127SKrish Sadhukhan case 0: 984096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 985198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x", 986096cf7feSPaolo Bonzini vmcb->control.exit_code); 987ad879127SKrish Sadhukhan return true; 988ad879127SKrish Sadhukhan } 989ad879127SKrish Sadhukhan 990096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 991096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 992ad879127SKrish Sadhukhan 993ad879127SKrish Sadhukhan if (pending_event_guest_run) { 994198dfd0eSJanis Schoetterl-Glausch report_fail("Guest ran before host received IPI\n"); 995ad879127SKrish Sadhukhan return true; 996ad879127SKrish Sadhukhan } 997ad879127SKrish Sadhukhan 998e4007e62SMaxim Levitsky sti_nop_cli(); 999ad879127SKrish Sadhukhan 1000ad879127SKrish Sadhukhan if (!pending_event_ipi_fired) { 1001198dfd0eSJanis Schoetterl-Glausch report_fail("Pending interrupt not dispatched after IRQ enabled\n"); 1002ad879127SKrish Sadhukhan return true; 1003ad879127SKrish Sadhukhan } 1004ad879127SKrish Sadhukhan break; 1005ad879127SKrish Sadhukhan 1006ad879127SKrish Sadhukhan case 1: 1007ad879127SKrish Sadhukhan if (!pending_event_guest_run) { 1008198dfd0eSJanis Schoetterl-Glausch report_fail("Guest did not resume when no interrupt\n"); 1009ad879127SKrish Sadhukhan return true; 1010ad879127SKrish Sadhukhan } 1011ad879127SKrish Sadhukhan break; 1012ad879127SKrish Sadhukhan } 1013ad879127SKrish Sadhukhan 1014ad879127SKrish Sadhukhan inc_test_stage(test); 1015ad879127SKrish Sadhukhan 1016ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1017ad879127SKrish Sadhukhan } 1018ad879127SKrish Sadhukhan 1019ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test) 1020ad879127SKrish Sadhukhan { 1021ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1022ad879127SKrish Sadhukhan } 1023ad879127SKrish Sadhukhan 102485dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test) 1025ad879127SKrish Sadhukhan { 1026ad879127SKrish Sadhukhan default_prepare(test); 1027ad879127SKrish Sadhukhan 1028ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1029ad879127SKrish Sadhukhan 1030ad879127SKrish Sadhukhan handle_irq(0xf1, pending_event_ipi_isr); 1031ad879127SKrish Sadhukhan 1032ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1033ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1034ad879127SKrish Sadhukhan 1035ad879127SKrish Sadhukhan set_test_stage(test, 0); 1036ad879127SKrish Sadhukhan } 1037ad879127SKrish Sadhukhan 103885dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test) 1039ad879127SKrish Sadhukhan { 1040ad879127SKrish Sadhukhan asm("cli"); 1041ad879127SKrish Sadhukhan } 1042ad879127SKrish Sadhukhan 104385dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test) 1044ad879127SKrish Sadhukhan { 1045493d27d4SSean Christopherson report_svm_guest(!pending_event_ipi_fired, test, 1046493d27d4SSean Christopherson "IRQ should NOT be delivered while IRQs disabled"); 1047ad879127SKrish Sadhukhan 104885dc2aceSPaolo Bonzini /* VINTR_MASKING is zero. This should cause the IPI to fire. */ 1049e4007e62SMaxim Levitsky sti_nop_cli(); 1050ad879127SKrish Sadhukhan 1051493d27d4SSean Christopherson report_svm_guest(pending_event_ipi_fired, test, 1052493d27d4SSean Christopherson "IRQ should be delivered after enabling IRQs"); 1053ad879127SKrish Sadhukhan vmmcall(); 1054ad879127SKrish Sadhukhan 105585dc2aceSPaolo Bonzini /* 105685dc2aceSPaolo Bonzini * Now VINTR_MASKING=1, but no interrupt is pending so 105785dc2aceSPaolo Bonzini * the VINTR interception should be clear in VMCB02. Check 105885dc2aceSPaolo Bonzini * that L0 did not leave a stale VINTR in the VMCB. 105985dc2aceSPaolo Bonzini */ 1060e4007e62SMaxim Levitsky sti_nop_cli(); 1061ad879127SKrish Sadhukhan } 1062ad879127SKrish Sadhukhan 106385dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test) 1064ad879127SKrish Sadhukhan { 1065493d27d4SSean Christopherson report_svm_guest(vmcb->control.exit_code == SVM_EXIT_VMMCALL, test, 1066493d27d4SSean Christopherson "Wanted VMMCALL VM-Exit, got exit reason 0x%x", 1067096cf7feSPaolo Bonzini vmcb->control.exit_code); 1068ad879127SKrish Sadhukhan 1069ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 1070ad879127SKrish Sadhukhan case 0: 1071096cf7feSPaolo Bonzini vmcb->save.rip += 3; 1072ad879127SKrish Sadhukhan 1073ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1074ad879127SKrish Sadhukhan 1075096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 1076ad879127SKrish Sadhukhan 107785dc2aceSPaolo Bonzini /* Now entering again with VINTR_MASKING=1. */ 1078ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1079ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1080ad879127SKrish Sadhukhan 1081ad879127SKrish Sadhukhan break; 1082ad879127SKrish Sadhukhan 1083ad879127SKrish Sadhukhan case 1: 1084ad879127SKrish Sadhukhan if (pending_event_ipi_fired == true) { 1085198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt triggered by guest"); 1086ad879127SKrish Sadhukhan return true; 1087ad879127SKrish Sadhukhan } 1088ad879127SKrish Sadhukhan 1089e4007e62SMaxim Levitsky sti_nop_cli(); 1090ad879127SKrish Sadhukhan 1091ad879127SKrish Sadhukhan if (pending_event_ipi_fired != true) { 1092198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt not triggered by host"); 1093ad879127SKrish Sadhukhan return true; 1094ad879127SKrish Sadhukhan } 1095ad879127SKrish Sadhukhan 1096ad879127SKrish Sadhukhan break; 1097ad879127SKrish Sadhukhan 1098ad879127SKrish Sadhukhan default: 1099ad879127SKrish Sadhukhan return true; 1100ad879127SKrish Sadhukhan } 1101ad879127SKrish Sadhukhan 1102ad879127SKrish Sadhukhan inc_test_stage(test); 1103ad879127SKrish Sadhukhan 1104ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1105ad879127SKrish Sadhukhan } 1106ad879127SKrish Sadhukhan 110785dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test) 1108ad879127SKrish Sadhukhan { 1109ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1110ad879127SKrish Sadhukhan } 1111ad879127SKrish Sadhukhan 111285dc2aceSPaolo Bonzini #define TIMER_VECTOR 222 111385dc2aceSPaolo Bonzini 111485dc2aceSPaolo Bonzini static volatile bool timer_fired; 111585dc2aceSPaolo Bonzini 111685dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs) 111785dc2aceSPaolo Bonzini { 111885dc2aceSPaolo Bonzini timer_fired = true; 111985dc2aceSPaolo Bonzini apic_write(APIC_EOI, 0); 112085dc2aceSPaolo Bonzini } 112185dc2aceSPaolo Bonzini 112285dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test) 112385dc2aceSPaolo Bonzini { 112485dc2aceSPaolo Bonzini default_prepare(test); 112585dc2aceSPaolo Bonzini handle_irq(TIMER_VECTOR, timer_isr); 112685dc2aceSPaolo Bonzini timer_fired = false; 112785dc2aceSPaolo Bonzini set_test_stage(test, 0); 112885dc2aceSPaolo Bonzini } 112985dc2aceSPaolo Bonzini 113085dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test) 113185dc2aceSPaolo Bonzini { 113285dc2aceSPaolo Bonzini long long start, loops; 113385dc2aceSPaolo Bonzini 1134a2c7dff7SMaxim Levitsky apic_setup_timer(TIMER_VECTOR, APIC_LVT_TIMER_PERIODIC); 1135787f0aebSMaxim Levitsky sti(); 113698eb2a39SPaolo Bonzini apic_start_timer(1000); 1137a2c7dff7SMaxim Levitsky 113885dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 113985dc2aceSPaolo Bonzini asm volatile ("nop"); 114085dc2aceSPaolo Bonzini 1141493d27d4SSean Christopherson report_svm_guest(timer_fired, test, 1142493d27d4SSean Christopherson "direct interrupt while running guest"); 114385dc2aceSPaolo Bonzini 1144a2c7dff7SMaxim Levitsky apic_stop_timer(); 1145787f0aebSMaxim Levitsky cli(); 114685dc2aceSPaolo Bonzini vmmcall(); 114785dc2aceSPaolo Bonzini 114885dc2aceSPaolo Bonzini timer_fired = false; 114998eb2a39SPaolo Bonzini apic_start_timer(1000); 115085dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 115185dc2aceSPaolo Bonzini asm volatile ("nop"); 115285dc2aceSPaolo Bonzini 1153493d27d4SSean Christopherson report_svm_guest(timer_fired, test, 1154493d27d4SSean Christopherson "intercepted interrupt while running guest"); 115585dc2aceSPaolo Bonzini 1156787f0aebSMaxim Levitsky sti(); 1157a2c7dff7SMaxim Levitsky apic_stop_timer(); 1158787f0aebSMaxim Levitsky cli(); 115985dc2aceSPaolo Bonzini 116085dc2aceSPaolo Bonzini timer_fired = false; 116185dc2aceSPaolo Bonzini start = rdtsc(); 1162a2c7dff7SMaxim Levitsky apic_start_timer(1000000); 1163a3001422SOliver Upton safe_halt(); 116485dc2aceSPaolo Bonzini 1165493d27d4SSean Christopherson report_svm_guest(timer_fired, test, "direct interrupt + hlt"); 1166493d27d4SSean Christopherson report(rdtsc() - start > 10000, "IRQ arrived after expected delay"); 116785dc2aceSPaolo Bonzini 1168a2c7dff7SMaxim Levitsky apic_stop_timer(); 1169787f0aebSMaxim Levitsky cli(); 117085dc2aceSPaolo Bonzini vmmcall(); 117185dc2aceSPaolo Bonzini 117285dc2aceSPaolo Bonzini timer_fired = false; 117385dc2aceSPaolo Bonzini start = rdtsc(); 1174a2c7dff7SMaxim Levitsky apic_start_timer(1000000); 117585dc2aceSPaolo Bonzini asm volatile ("hlt"); 117685dc2aceSPaolo Bonzini 1177493d27d4SSean Christopherson report_svm_guest(timer_fired, test, "intercepted interrupt + hlt"); 1178493d27d4SSean Christopherson report(rdtsc() - start > 10000, "IRQ arrived after expected delay"); 117985dc2aceSPaolo Bonzini 1180a2c7dff7SMaxim Levitsky apic_cleanup_timer(); 118185dc2aceSPaolo Bonzini } 118285dc2aceSPaolo Bonzini 118385dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test) 118485dc2aceSPaolo Bonzini { 118585dc2aceSPaolo Bonzini switch (get_test_stage(test)) { 118685dc2aceSPaolo Bonzini case 0: 118785dc2aceSPaolo Bonzini case 2: 1188096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1189198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1190096cf7feSPaolo Bonzini vmcb->control.exit_code); 119185dc2aceSPaolo Bonzini return true; 119285dc2aceSPaolo Bonzini } 1193096cf7feSPaolo Bonzini vmcb->save.rip += 3; 119485dc2aceSPaolo Bonzini 1195096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1196096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 119785dc2aceSPaolo Bonzini break; 119885dc2aceSPaolo Bonzini 119985dc2aceSPaolo Bonzini case 1: 120085dc2aceSPaolo Bonzini case 3: 1201096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 1202198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x", 1203096cf7feSPaolo Bonzini vmcb->control.exit_code); 120485dc2aceSPaolo Bonzini return true; 120585dc2aceSPaolo Bonzini } 120685dc2aceSPaolo Bonzini 1207e4007e62SMaxim Levitsky sti_nop_cli(); 120885dc2aceSPaolo Bonzini 1209096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 1210096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 121185dc2aceSPaolo Bonzini break; 121285dc2aceSPaolo Bonzini 121385dc2aceSPaolo Bonzini case 4: 121485dc2aceSPaolo Bonzini break; 121585dc2aceSPaolo Bonzini 121685dc2aceSPaolo Bonzini default: 121785dc2aceSPaolo Bonzini return true; 121885dc2aceSPaolo Bonzini } 121985dc2aceSPaolo Bonzini 122085dc2aceSPaolo Bonzini inc_test_stage(test); 122185dc2aceSPaolo Bonzini 122285dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 122385dc2aceSPaolo Bonzini } 122485dc2aceSPaolo Bonzini 122585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test) 122685dc2aceSPaolo Bonzini { 122785dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 122885dc2aceSPaolo Bonzini } 122985dc2aceSPaolo Bonzini 1230d4db486bSCathy Avery static volatile bool nmi_fired; 1231d4db486bSCathy Avery 12324a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs) 1233d4db486bSCathy Avery { 1234d4db486bSCathy Avery nmi_fired = true; 1235d4db486bSCathy Avery } 1236d4db486bSCathy Avery 1237d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test) 1238d4db486bSCathy Avery { 1239d4db486bSCathy Avery default_prepare(test); 1240d4db486bSCathy Avery nmi_fired = false; 12414a1207f6SMaxim Levitsky handle_exception(NMI_VECTOR, nmi_handler); 1242d4db486bSCathy Avery set_test_stage(test, 0); 1243d4db486bSCathy Avery } 1244d4db486bSCathy Avery 1245d4db486bSCathy Avery static void nmi_test(struct svm_test *test) 1246d4db486bSCathy Avery { 1247d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1248d4db486bSCathy Avery 1249493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "direct NMI while running guest"); 1250d4db486bSCathy Avery 1251d4db486bSCathy Avery vmmcall(); 1252d4db486bSCathy Avery 1253d4db486bSCathy Avery nmi_fired = false; 1254d4db486bSCathy Avery 1255d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1256d4db486bSCathy Avery 1257493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "intercepted pending NMI delivered to guest"); 1258d4db486bSCathy Avery } 1259d4db486bSCathy Avery 1260d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test) 1261d4db486bSCathy Avery { 1262d4db486bSCathy Avery switch (get_test_stage(test)) { 1263d4db486bSCathy Avery case 0: 1264d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1265198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1266d4db486bSCathy Avery vmcb->control.exit_code); 1267d4db486bSCathy Avery return true; 1268d4db486bSCathy Avery } 1269d4db486bSCathy Avery vmcb->save.rip += 3; 1270d4db486bSCathy Avery 1271d4db486bSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 1272d4db486bSCathy Avery break; 1273d4db486bSCathy Avery 1274d4db486bSCathy Avery case 1: 1275d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1276198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 1277d4db486bSCathy Avery vmcb->control.exit_code); 1278d4db486bSCathy Avery return true; 1279d4db486bSCathy Avery } 1280d4db486bSCathy Avery 12815c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 1282d4db486bSCathy Avery break; 1283d4db486bSCathy Avery 1284d4db486bSCathy Avery case 2: 1285d4db486bSCathy Avery break; 1286d4db486bSCathy Avery 1287d4db486bSCathy Avery default: 1288d4db486bSCathy Avery return true; 1289d4db486bSCathy Avery } 1290d4db486bSCathy Avery 1291d4db486bSCathy Avery inc_test_stage(test); 1292d4db486bSCathy Avery 1293d4db486bSCathy Avery return get_test_stage(test) == 3; 1294d4db486bSCathy Avery } 1295d4db486bSCathy Avery 1296d4db486bSCathy Avery static bool nmi_check(struct svm_test *test) 1297d4db486bSCathy Avery { 1298d4db486bSCathy Avery return get_test_stage(test) == 3; 1299d4db486bSCathy Avery } 1300d4db486bSCathy Avery 13019da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL 13029da1f4d8SCathy Avery 13039da1f4d8SCathy Avery static void nmi_message_thread(void *_test) 13049da1f4d8SCathy Avery { 13059da1f4d8SCathy Avery struct svm_test *test = _test; 13069da1f4d8SCathy Avery 13079da1f4d8SCathy Avery while (get_test_stage(test) != 1) 13089da1f4d8SCathy Avery pause(); 13099da1f4d8SCathy Avery 13109da1f4d8SCathy Avery delay(NMI_DELAY); 13119da1f4d8SCathy Avery 13129da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 13139da1f4d8SCathy Avery 13149da1f4d8SCathy Avery while (get_test_stage(test) != 2) 13159da1f4d8SCathy Avery pause(); 13169da1f4d8SCathy Avery 13179da1f4d8SCathy Avery delay(NMI_DELAY); 13189da1f4d8SCathy Avery 13199da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 13209da1f4d8SCathy Avery } 13219da1f4d8SCathy Avery 13229da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test) 13239da1f4d8SCathy Avery { 13249da1f4d8SCathy Avery long long start; 13259da1f4d8SCathy Avery 13269da1f4d8SCathy Avery on_cpu_async(1, nmi_message_thread, test); 13279da1f4d8SCathy Avery 13289da1f4d8SCathy Avery start = rdtsc(); 13299da1f4d8SCathy Avery 13309da1f4d8SCathy Avery set_test_stage(test, 1); 13319da1f4d8SCathy Avery 13329da1f4d8SCathy Avery asm volatile ("hlt"); 13339da1f4d8SCathy Avery 1334493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "direct NMI + hlt"); 1335493d27d4SSean Christopherson report(rdtsc() - start > NMI_DELAY, "direct NMI after expected delay"); 13369da1f4d8SCathy Avery 13379da1f4d8SCathy Avery nmi_fired = false; 13389da1f4d8SCathy Avery 13399da1f4d8SCathy Avery vmmcall(); 13409da1f4d8SCathy Avery 13419da1f4d8SCathy Avery start = rdtsc(); 13429da1f4d8SCathy Avery 13439da1f4d8SCathy Avery set_test_stage(test, 2); 13449da1f4d8SCathy Avery 13459da1f4d8SCathy Avery asm volatile ("hlt"); 13469da1f4d8SCathy Avery 1347493d27d4SSean Christopherson report_svm_guest(nmi_fired, test, "intercepted NMI + hlt"); 1348493d27d4SSean Christopherson report(rdtsc() - start > NMI_DELAY, "intercepted NMI after expected delay"); 13499da1f4d8SCathy Avery 13509da1f4d8SCathy Avery set_test_stage(test, 3); 13519da1f4d8SCathy Avery } 13529da1f4d8SCathy Avery 13539da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test) 13549da1f4d8SCathy Avery { 13559da1f4d8SCathy Avery switch (get_test_stage(test)) { 13569da1f4d8SCathy Avery case 1: 13579da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1358198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 13599da1f4d8SCathy Avery vmcb->control.exit_code); 13609da1f4d8SCathy Avery return true; 13619da1f4d8SCathy Avery } 13629da1f4d8SCathy Avery vmcb->save.rip += 3; 13639da1f4d8SCathy Avery 13649da1f4d8SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 13659da1f4d8SCathy Avery break; 13669da1f4d8SCathy Avery 13679da1f4d8SCathy Avery case 2: 13689da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1369198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 13709da1f4d8SCathy Avery vmcb->control.exit_code); 13719da1f4d8SCathy Avery return true; 13729da1f4d8SCathy Avery } 13739da1f4d8SCathy Avery 13745c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 13759da1f4d8SCathy Avery break; 13769da1f4d8SCathy Avery 13779da1f4d8SCathy Avery case 3: 13789da1f4d8SCathy Avery break; 13799da1f4d8SCathy Avery 13809da1f4d8SCathy Avery default: 13819da1f4d8SCathy Avery return true; 13829da1f4d8SCathy Avery } 13839da1f4d8SCathy Avery 13849da1f4d8SCathy Avery return get_test_stage(test) == 3; 13859da1f4d8SCathy Avery } 13869da1f4d8SCathy Avery 13879da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test) 13889da1f4d8SCathy Avery { 13899da1f4d8SCathy Avery return get_test_stage(test) == 3; 13909da1f4d8SCathy Avery } 13919da1f4d8SCathy Avery 139208200397SSantosh Shukla static void vnmi_prepare(struct svm_test *test) 139308200397SSantosh Shukla { 139408200397SSantosh Shukla nmi_prepare(test); 139508200397SSantosh Shukla 139608200397SSantosh Shukla /* 139708200397SSantosh Shukla * Disable NMI interception to start. Enabling vNMI without 139808200397SSantosh Shukla * intercepting "real" NMIs should result in an ERR VM-Exit. 139908200397SSantosh Shukla */ 140008200397SSantosh Shukla vmcb->control.intercept &= ~(1ULL << INTERCEPT_NMI); 140108200397SSantosh Shukla vmcb->control.int_ctl = V_NMI_ENABLE_MASK; 140208200397SSantosh Shukla vmcb->control.int_vector = NMI_VECTOR; 140308200397SSantosh Shukla } 140408200397SSantosh Shukla 140508200397SSantosh Shukla static void vnmi_test(struct svm_test *test) 140608200397SSantosh Shukla { 140708200397SSantosh Shukla report_svm_guest(!nmi_fired, test, "No vNMI before injection"); 140808200397SSantosh Shukla vmmcall(); 140908200397SSantosh Shukla 141008200397SSantosh Shukla report_svm_guest(nmi_fired, test, "vNMI delivered after injection"); 141108200397SSantosh Shukla vmmcall(); 141208200397SSantosh Shukla } 141308200397SSantosh Shukla 141408200397SSantosh Shukla static bool vnmi_finished(struct svm_test *test) 141508200397SSantosh Shukla { 141608200397SSantosh Shukla switch (get_test_stage(test)) { 141708200397SSantosh Shukla case 0: 141808200397SSantosh Shukla if (vmcb->control.exit_code != SVM_EXIT_ERR) { 141908200397SSantosh Shukla report_fail("Wanted ERR VM-Exit, got 0x%x", 142008200397SSantosh Shukla vmcb->control.exit_code); 142108200397SSantosh Shukla return true; 142208200397SSantosh Shukla } 142308200397SSantosh Shukla report(!nmi_fired, "vNMI enabled but NMI_INTERCEPT unset!"); 142408200397SSantosh Shukla vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 142508200397SSantosh Shukla vmcb->save.rip += 3; 142608200397SSantosh Shukla break; 142708200397SSantosh Shukla 142808200397SSantosh Shukla case 1: 142908200397SSantosh Shukla if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 143008200397SSantosh Shukla report_fail("Wanted VMMCALL VM-Exit, got 0x%x", 143108200397SSantosh Shukla vmcb->control.exit_code); 143208200397SSantosh Shukla return true; 143308200397SSantosh Shukla } 143408200397SSantosh Shukla report(!nmi_fired, "vNMI with vector 2 not injected"); 143508200397SSantosh Shukla vmcb->control.int_ctl |= V_NMI_PENDING_MASK; 143608200397SSantosh Shukla vmcb->save.rip += 3; 143708200397SSantosh Shukla break; 143808200397SSantosh Shukla 143908200397SSantosh Shukla case 2: 144008200397SSantosh Shukla if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 144108200397SSantosh Shukla report_fail("Wanted VMMCALL VM-Exit, got 0x%x", 144208200397SSantosh Shukla vmcb->control.exit_code); 144308200397SSantosh Shukla return true; 144408200397SSantosh Shukla } 144508200397SSantosh Shukla if (vmcb->control.int_ctl & V_NMI_BLOCKING_MASK) { 144608200397SSantosh Shukla report_fail("V_NMI_BLOCKING_MASK not cleared on VMEXIT"); 144708200397SSantosh Shukla return true; 144808200397SSantosh Shukla } 144908200397SSantosh Shukla report_pass("VNMI serviced"); 145008200397SSantosh Shukla vmcb->save.rip += 3; 145108200397SSantosh Shukla break; 145208200397SSantosh Shukla 145308200397SSantosh Shukla default: 145408200397SSantosh Shukla return true; 145508200397SSantosh Shukla } 145608200397SSantosh Shukla 145708200397SSantosh Shukla inc_test_stage(test); 145808200397SSantosh Shukla 145908200397SSantosh Shukla return get_test_stage(test) == 3; 146008200397SSantosh Shukla } 146108200397SSantosh Shukla 146208200397SSantosh Shukla static bool vnmi_check(struct svm_test *test) 146308200397SSantosh Shukla { 146408200397SSantosh Shukla return get_test_stage(test) == 3; 146508200397SSantosh Shukla } 146608200397SSantosh Shukla 14674b4fb247SPaolo Bonzini static volatile int count_exc = 0; 14684b4fb247SPaolo Bonzini 14694b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r) 14704b4fb247SPaolo Bonzini { 14714b4fb247SPaolo Bonzini count_exc++; 14724b4fb247SPaolo Bonzini } 14734b4fb247SPaolo Bonzini 14744b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test) 14754b4fb247SPaolo Bonzini { 14768634a266SPaolo Bonzini default_prepare(test); 14774b4fb247SPaolo Bonzini handle_exception(DE_VECTOR, my_isr); 14784b4fb247SPaolo Bonzini handle_exception(NMI_VECTOR, my_isr); 14794b4fb247SPaolo Bonzini } 14804b4fb247SPaolo Bonzini 14814b4fb247SPaolo Bonzini 14824b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test) 14834b4fb247SPaolo Bonzini { 14844b4fb247SPaolo Bonzini asm volatile ("vmmcall\n\tvmmcall\n\t"); 14854b4fb247SPaolo Bonzini } 14864b4fb247SPaolo Bonzini 14874b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test) 14884b4fb247SPaolo Bonzini { 14894b4fb247SPaolo Bonzini switch (get_test_stage(test)) { 14904b4fb247SPaolo Bonzini case 0: 14914b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1492198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 14934b4fb247SPaolo Bonzini vmcb->control.exit_code); 14944b4fb247SPaolo Bonzini return true; 14954b4fb247SPaolo Bonzini } 14962c1ca866SNadav Amit vmcb->save.rip += 3; 14974b4fb247SPaolo Bonzini vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 14984b4fb247SPaolo Bonzini break; 14994b4fb247SPaolo Bonzini 15004b4fb247SPaolo Bonzini case 1: 15014b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_ERR) { 1502198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to error. Exit reason 0x%x", 15034b4fb247SPaolo Bonzini vmcb->control.exit_code); 15044b4fb247SPaolo Bonzini return true; 15054b4fb247SPaolo Bonzini } 15064b4fb247SPaolo Bonzini report(count_exc == 0, "exception with vector 2 not injected"); 15074b4fb247SPaolo Bonzini vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 15084b4fb247SPaolo Bonzini break; 15094b4fb247SPaolo Bonzini 15104b4fb247SPaolo Bonzini case 2: 15114b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1512198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15134b4fb247SPaolo Bonzini vmcb->control.exit_code); 15144b4fb247SPaolo Bonzini return true; 15154b4fb247SPaolo Bonzini } 15162c1ca866SNadav Amit vmcb->save.rip += 3; 15174b4fb247SPaolo Bonzini report(count_exc == 1, "divide overflow exception injected"); 15184b4fb247SPaolo Bonzini report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared"); 15194b4fb247SPaolo Bonzini break; 15204b4fb247SPaolo Bonzini 15214b4fb247SPaolo Bonzini default: 15224b4fb247SPaolo Bonzini return true; 15234b4fb247SPaolo Bonzini } 15244b4fb247SPaolo Bonzini 15254b4fb247SPaolo Bonzini inc_test_stage(test); 15264b4fb247SPaolo Bonzini 15274b4fb247SPaolo Bonzini return get_test_stage(test) == 3; 15284b4fb247SPaolo Bonzini } 15294b4fb247SPaolo Bonzini 15304b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test) 15314b4fb247SPaolo Bonzini { 15324b4fb247SPaolo Bonzini return count_exc == 1 && get_test_stage(test) == 3; 15334b4fb247SPaolo Bonzini } 15344b4fb247SPaolo Bonzini 15359c838954SCathy Avery static volatile bool virq_fired; 15364b3c6114SPaolo Bonzini static volatile unsigned long virq_rip; 15379c838954SCathy Avery 15389c838954SCathy Avery static void virq_isr(isr_regs_t *regs) 15399c838954SCathy Avery { 15409c838954SCathy Avery virq_fired = true; 15414b3c6114SPaolo Bonzini virq_rip = regs->rip; 15429c838954SCathy Avery } 15439c838954SCathy Avery 15449c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test) 15459c838954SCathy Avery { 15469c838954SCathy Avery handle_irq(0xf1, virq_isr); 15479c838954SCathy Avery default_prepare(test); 15489c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 15499c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority 15509c838954SCathy Avery vmcb->control.int_vector = 0xf1; 15519c838954SCathy Avery virq_fired = false; 15524b3c6114SPaolo Bonzini virq_rip = -1; 15539c838954SCathy Avery set_test_stage(test, 0); 15549c838954SCathy Avery } 15559c838954SCathy Avery 15569c838954SCathy Avery static void virq_inject_test(struct svm_test *test) 15579c838954SCathy Avery { 1558493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, "virtual IRQ blocked after L2 cli"); 15599c838954SCathy Avery 1560e4007e62SMaxim Levitsky sti_nop_cli(); 15619c838954SCathy Avery 1562493d27d4SSean Christopherson report_svm_guest(virq_fired, test, "virtual IRQ fired after L2 sti"); 15639c838954SCathy Avery 15649c838954SCathy Avery vmmcall(); 15659c838954SCathy Avery 1566493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, "intercepted VINTR blocked after L2 cli"); 15679c838954SCathy Avery 1568e4007e62SMaxim Levitsky sti_nop_cli(); 15699c838954SCathy Avery 1570493d27d4SSean Christopherson report_svm_guest(virq_fired, test, "intercepted VINTR fired after L2 sti"); 15719c838954SCathy Avery 15729c838954SCathy Avery vmmcall(); 15739c838954SCathy Avery 1574e4007e62SMaxim Levitsky sti_nop_cli(); 15759c838954SCathy Avery 1576493d27d4SSean Christopherson report_svm_guest(!virq_fired, test, 1577493d27d4SSean Christopherson "virtual IRQ blocked V_IRQ_PRIO less than V_TPR"); 15789c838954SCathy Avery 15799c838954SCathy Avery vmmcall(); 15809c838954SCathy Avery vmmcall(); 15819c838954SCathy Avery } 15829c838954SCathy Avery 15839c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test) 15849c838954SCathy Avery { 15859c838954SCathy Avery vmcb->save.rip += 3; 15869c838954SCathy Avery 15879c838954SCathy Avery switch (get_test_stage(test)) { 15889c838954SCathy Avery case 0: 15899c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1590198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15919c838954SCathy Avery vmcb->control.exit_code); 15929c838954SCathy Avery return true; 15939c838954SCathy Avery } 15949c838954SCathy Avery if (vmcb->control.int_ctl & V_IRQ_MASK) { 1595198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ not cleared on VMEXIT after firing"); 15969c838954SCathy Avery return true; 15979c838954SCathy Avery } 15989c838954SCathy Avery virq_fired = false; 15999c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 16009c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 16019c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); 16029c838954SCathy Avery break; 16039c838954SCathy Avery 16049c838954SCathy Avery case 1: 16059c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VINTR) { 1606198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vintr. Exit reason 0x%x", 16079c838954SCathy Avery vmcb->control.exit_code); 16089c838954SCathy Avery return true; 16099c838954SCathy Avery } 16109c838954SCathy Avery if (virq_fired) { 1611198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ fired before SVM_EXIT_VINTR"); 16129c838954SCathy Avery return true; 16139c838954SCathy Avery } 16149c838954SCathy Avery vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR); 16159c838954SCathy Avery break; 16169c838954SCathy Avery 16179c838954SCathy Avery case 2: 16189c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1619198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16209c838954SCathy Avery vmcb->control.exit_code); 16219c838954SCathy Avery return true; 16229c838954SCathy Avery } 16239c838954SCathy Avery virq_fired = false; 16249c838954SCathy Avery // Set irq to lower priority 16259c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 16269c838954SCathy Avery (0x08 << V_INTR_PRIO_SHIFT); 16279c838954SCathy Avery // Raise guest TPR 16289c838954SCathy Avery vmcb->control.int_ctl |= 0x0a & V_TPR_MASK; 16299c838954SCathy Avery break; 16309c838954SCathy Avery 16319c838954SCathy Avery case 3: 16329c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1633198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16349c838954SCathy Avery vmcb->control.exit_code); 16359c838954SCathy Avery return true; 16369c838954SCathy Avery } 16379c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 16389c838954SCathy Avery break; 16399c838954SCathy Avery 16409c838954SCathy Avery case 4: 16419c838954SCathy Avery // INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR 16429c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1643198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16449c838954SCathy Avery vmcb->control.exit_code); 16459c838954SCathy Avery return true; 16469c838954SCathy Avery } 16479c838954SCathy Avery break; 16489c838954SCathy Avery 16499c838954SCathy Avery default: 16509c838954SCathy Avery return true; 16519c838954SCathy Avery } 16529c838954SCathy Avery 16539c838954SCathy Avery inc_test_stage(test); 16549c838954SCathy Avery 16559c838954SCathy Avery return get_test_stage(test) == 5; 16569c838954SCathy Avery } 16579c838954SCathy Avery 16589c838954SCathy Avery static bool virq_inject_check(struct svm_test *test) 16599c838954SCathy Avery { 16609c838954SCathy Avery return get_test_stage(test) == 5; 16619c838954SCathy Avery } 16629c838954SCathy Avery 16634b3c6114SPaolo Bonzini static void virq_inject_within_shadow_prepare(struct svm_test *test) 16644b3c6114SPaolo Bonzini { 16654b3c6114SPaolo Bonzini virq_inject_prepare(test); 16664b3c6114SPaolo Bonzini vmcb->control.int_state = SVM_INTERRUPT_SHADOW_MASK; 16674b3c6114SPaolo Bonzini vmcb->save.rflags |= X86_EFLAGS_IF; 16684b3c6114SPaolo Bonzini } 16694b3c6114SPaolo Bonzini 16704b3c6114SPaolo Bonzini extern void virq_inject_within_shadow_test(struct svm_test *test); 16714b3c6114SPaolo Bonzini asm("virq_inject_within_shadow_test: nop; nop; vmmcall"); 16724b3c6114SPaolo Bonzini 16734b3c6114SPaolo Bonzini static void virq_inject_within_shadow_prepare_gif_clear(struct svm_test *test) 16744b3c6114SPaolo Bonzini { 16754b3c6114SPaolo Bonzini vmcb->save.rip = (unsigned long) test->guest_func; 16764b3c6114SPaolo Bonzini } 16774b3c6114SPaolo Bonzini 16784b3c6114SPaolo Bonzini static bool virq_inject_within_shadow_finished(struct svm_test *test) 16794b3c6114SPaolo Bonzini { 16804b3c6114SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) 16814b3c6114SPaolo Bonzini report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16824b3c6114SPaolo Bonzini vmcb->control.exit_code); 16834b3c6114SPaolo Bonzini if (!virq_fired) 16844b3c6114SPaolo Bonzini report_fail("V_IRQ did not fire"); 16854b3c6114SPaolo Bonzini else if (virq_rip != (unsigned long) virq_inject_within_shadow_test + 1) 16864b3c6114SPaolo Bonzini report_fail("Unexpected RIP for interrupt handler"); 16874b3c6114SPaolo Bonzini else if (vmcb->control.int_ctl & V_IRQ_MASK) 16884b3c6114SPaolo Bonzini report_fail("V_IRQ not cleared on VMEXIT after firing"); 16894b3c6114SPaolo Bonzini else if (vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK) 16904b3c6114SPaolo Bonzini report_fail("Interrupt shadow not cleared"); 16914b3c6114SPaolo Bonzini else 16924b3c6114SPaolo Bonzini inc_test_stage(test); 16934b3c6114SPaolo Bonzini 16944b3c6114SPaolo Bonzini return true; 16954b3c6114SPaolo Bonzini } 16964b3c6114SPaolo Bonzini 16974b3c6114SPaolo Bonzini static bool virq_inject_within_shadow_check(struct svm_test *test) 16984b3c6114SPaolo Bonzini { 16994b3c6114SPaolo Bonzini return get_test_stage(test) == 1; 17004b3c6114SPaolo Bonzini } 17014b3c6114SPaolo Bonzini 1702da338a31SMaxim Levitsky /* 1703da338a31SMaxim Levitsky * Detect nested guest RIP corruption as explained in kernel commit 1704da338a31SMaxim Levitsky * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73 1705da338a31SMaxim Levitsky * 1706da338a31SMaxim Levitsky * In the assembly loop below 'ins' is executed while IO instructions 1707da338a31SMaxim Levitsky * are not intercepted; the instruction is emulated by L0. 1708da338a31SMaxim Levitsky * 1709da338a31SMaxim Levitsky * At the same time we are getting interrupts from the local APIC timer, 1710da338a31SMaxim Levitsky * and we do intercept them in L1 1711da338a31SMaxim Levitsky * 1712da338a31SMaxim Levitsky * If the interrupt happens on the insb instruction, L0 will VMexit, emulate 1713da338a31SMaxim Levitsky * the insb instruction and then it will inject the interrupt to L1 through 1714da338a31SMaxim Levitsky * a nested VMexit. Due to a bug, it would leave pre-emulation values of RIP, 1715da338a31SMaxim Levitsky * RAX and RSP in the VMCB. 1716da338a31SMaxim Levitsky * 1717da338a31SMaxim Levitsky * In our intercept handler we detect the bug by checking that RIP is that of 1718da338a31SMaxim Levitsky * the insb instruction, but its memory operand has already been written. 1719da338a31SMaxim Levitsky * This means that insb was already executed. 1720da338a31SMaxim Levitsky */ 1721da338a31SMaxim Levitsky 1722da338a31SMaxim Levitsky static volatile int isr_cnt = 0; 1723da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA; 1724da338a31SMaxim Levitsky extern const char insb_instruction_label[]; 1725da338a31SMaxim Levitsky 1726da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs) 1727da338a31SMaxim Levitsky { 1728da338a31SMaxim Levitsky isr_cnt++; 1729da338a31SMaxim Levitsky apic_write(APIC_EOI, 0); 1730da338a31SMaxim Levitsky } 1731da338a31SMaxim Levitsky 1732da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test) 1733da338a31SMaxim Levitsky { 1734da338a31SMaxim Levitsky default_prepare(test); 1735da338a31SMaxim Levitsky set_test_stage(test, 0); 1736da338a31SMaxim Levitsky 1737da338a31SMaxim Levitsky vmcb->control.int_ctl = V_INTR_MASKING_MASK; 1738da338a31SMaxim Levitsky vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1739da338a31SMaxim Levitsky 1740da338a31SMaxim Levitsky handle_irq(TIMER_VECTOR, reg_corruption_isr); 1741da338a31SMaxim Levitsky 1742da338a31SMaxim Levitsky /* set local APIC to inject external interrupts */ 1743a2c7dff7SMaxim Levitsky apic_setup_timer(TIMER_VECTOR, APIC_LVT_TIMER_PERIODIC); 1744a2c7dff7SMaxim Levitsky apic_start_timer(1000); 1745da338a31SMaxim Levitsky } 1746da338a31SMaxim Levitsky 1747da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test) 1748da338a31SMaxim Levitsky { 1749da338a31SMaxim Levitsky /* this is endless loop, which is interrupted by the timer interrupt */ 1750da338a31SMaxim Levitsky asm volatile ( 1751da338a31SMaxim Levitsky "1:\n\t" 1752da338a31SMaxim Levitsky "movw $0x4d0, %%dx\n\t" // IO port 1753da338a31SMaxim Levitsky "lea %[io_port_var], %%rdi\n\t" 1754da338a31SMaxim Levitsky "movb $0xAA, %[io_port_var]\n\t" 1755da338a31SMaxim Levitsky "insb_instruction_label:\n\t" 1756da338a31SMaxim Levitsky "insb\n\t" 1757da338a31SMaxim Levitsky "jmp 1b\n\t" 1758da338a31SMaxim Levitsky 1759da338a31SMaxim Levitsky : [io_port_var] "=m" (io_port_var) 1760da338a31SMaxim Levitsky : /* no inputs*/ 1761da338a31SMaxim Levitsky : "rdx", "rdi" 1762da338a31SMaxim Levitsky ); 1763da338a31SMaxim Levitsky } 1764da338a31SMaxim Levitsky 1765da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test) 1766da338a31SMaxim Levitsky { 1767da338a31SMaxim Levitsky if (isr_cnt == 10000) { 17685c3582f0SJanis Schoetterl-Glausch report_pass("No RIP corruption detected after %d timer interrupts", 1769da338a31SMaxim Levitsky isr_cnt); 1770da338a31SMaxim Levitsky set_test_stage(test, 1); 1771491bbc64SMaxim Levitsky goto cleanup; 1772da338a31SMaxim Levitsky } 1773da338a31SMaxim Levitsky 1774da338a31SMaxim Levitsky if (vmcb->control.exit_code == SVM_EXIT_INTR) { 1775da338a31SMaxim Levitsky 1776da338a31SMaxim Levitsky void* guest_rip = (void*)vmcb->save.rip; 1777da338a31SMaxim Levitsky 1778e4007e62SMaxim Levitsky sti_nop_cli(); 1779da338a31SMaxim Levitsky 1780da338a31SMaxim Levitsky if (guest_rip == insb_instruction_label && io_port_var != 0xAA) { 1781198dfd0eSJanis Schoetterl-Glausch report_fail("RIP corruption detected after %d timer interrupts", 1782da338a31SMaxim Levitsky isr_cnt); 1783491bbc64SMaxim Levitsky goto cleanup; 1784da338a31SMaxim Levitsky } 1785da338a31SMaxim Levitsky 1786da338a31SMaxim Levitsky } 1787da338a31SMaxim Levitsky return false; 1788491bbc64SMaxim Levitsky cleanup: 1789a2c7dff7SMaxim Levitsky apic_cleanup_timer(); 1790491bbc64SMaxim Levitsky return true; 1791491bbc64SMaxim Levitsky 1792da338a31SMaxim Levitsky } 1793da338a31SMaxim Levitsky 1794da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test) 1795da338a31SMaxim Levitsky { 1796da338a31SMaxim Levitsky return get_test_stage(test) == 1; 1797da338a31SMaxim Levitsky } 1798da338a31SMaxim Levitsky 17994770e9c8SCathy Avery static void get_tss_entry(void *data) 18004770e9c8SCathy Avery { 1801a7f32d87SPaolo Bonzini *((gdt_entry_t **)data) = get_tss_descr(); 18024770e9c8SCathy Avery } 18034770e9c8SCathy Avery 18044770e9c8SCathy Avery static int orig_cpu_count; 18054770e9c8SCathy Avery 18064770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test) 18074770e9c8SCathy Avery { 1808a7f32d87SPaolo Bonzini gdt_entry_t *tss_entry; 18094770e9c8SCathy Avery int i; 18104770e9c8SCathy Avery 18114770e9c8SCathy Avery on_cpu(1, get_tss_entry, &tss_entry); 18124770e9c8SCathy Avery 1813d36b378fSVarad Gautam orig_cpu_count = atomic_read(&cpu_online_count); 18144770e9c8SCathy Avery 18154770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 18164770e9c8SCathy Avery id_map[1]); 18174770e9c8SCathy Avery 18184770e9c8SCathy Avery delay(100000000ULL); 18194770e9c8SCathy Avery 1820d36b378fSVarad Gautam atomic_dec(&cpu_online_count); 18214770e9c8SCathy Avery 1822a7f32d87SPaolo Bonzini tss_entry->type &= ~DESC_BUSY; 18234770e9c8SCathy Avery 18244770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]); 18254770e9c8SCathy Avery 1826d36b378fSVarad Gautam for (i = 0; i < 5 && atomic_read(&cpu_online_count) < orig_cpu_count; i++) 18274770e9c8SCathy Avery delay(100000000ULL); 18284770e9c8SCathy Avery } 18294770e9c8SCathy Avery 18304770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test) 18314770e9c8SCathy Avery { 18324770e9c8SCathy Avery return true; 18334770e9c8SCathy Avery } 18344770e9c8SCathy Avery 18354770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test) 18364770e9c8SCathy Avery { 1837d36b378fSVarad Gautam return atomic_read(&cpu_online_count) == orig_cpu_count; 18384770e9c8SCathy Avery } 18394770e9c8SCathy Avery 1840d5da6dfeSCathy Avery static volatile bool init_intercept; 1841d5da6dfeSCathy Avery 1842d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test) 1843d5da6dfeSCathy Avery { 1844d5da6dfeSCathy Avery init_intercept = false; 1845d5da6dfeSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_INIT); 1846d5da6dfeSCathy Avery } 1847d5da6dfeSCathy Avery 1848d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test) 1849d5da6dfeSCathy Avery { 1850d5da6dfeSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0); 1851d5da6dfeSCathy Avery } 1852d5da6dfeSCathy Avery 1853d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test) 1854d5da6dfeSCathy Avery { 1855d5da6dfeSCathy Avery vmcb->save.rip += 3; 1856d5da6dfeSCathy Avery 1857d5da6dfeSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_INIT) { 1858198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to init intercept. Exit reason 0x%x", 1859d5da6dfeSCathy Avery vmcb->control.exit_code); 1860d5da6dfeSCathy Avery 1861d5da6dfeSCathy Avery return true; 1862d5da6dfeSCathy Avery } 1863d5da6dfeSCathy Avery 1864d5da6dfeSCathy Avery init_intercept = true; 1865d5da6dfeSCathy Avery 18665c3582f0SJanis Schoetterl-Glausch report_pass("INIT to vcpu intercepted"); 1867d5da6dfeSCathy Avery 1868d5da6dfeSCathy Avery return true; 1869d5da6dfeSCathy Avery } 1870d5da6dfeSCathy Avery 1871d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test) 1872d5da6dfeSCathy Avery { 1873d5da6dfeSCathy Avery return init_intercept; 1874d5da6dfeSCathy Avery } 1875d5da6dfeSCathy Avery 18767839b0ecSKrish Sadhukhan /* 18777839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the 18787839b0ecSKrish Sadhukhan * host side (i.e., after the #VMEXIT from the guest). 18797839b0ecSKrish Sadhukhan * 18800689a980SKrish Sadhukhan * Setting host EFLAGS.RF suppresses any potential instruction breakpoint 18810689a980SKrish Sadhukhan * match on the VMRUN and completion of the VMRUN instruction clears the 18820689a980SKrish Sadhukhan * host EFLAGS.RF bit. 18830689a980SKrish Sadhukhan * 18847839b0ecSKrish Sadhukhan * [AMD APM] 18857839b0ecSKrish Sadhukhan */ 18867839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0; 18877839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0; 18887839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false; 18897839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false; 18907839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false; 18910689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false; 18920689a980SKrish Sadhukhan static u64 rip_detected; 18937839b0ecSKrish Sadhukhan 18947839b0ecSKrish Sadhukhan extern u64 *vmrun_rip; 18957839b0ecSKrish Sadhukhan 18967839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r) 18977839b0ecSKrish Sadhukhan { 18987839b0ecSKrish Sadhukhan if (host_rflags_ss_on_vmrun) { 18997839b0ecSKrish Sadhukhan if (host_rflags_vmrun_reached) { 19000689a980SKrish Sadhukhan if (!host_rflags_set_rf) { 19017839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 19020689a980SKrish Sadhukhan rip_detected = r->rip; 19037839b0ecSKrish Sadhukhan } else { 19040689a980SKrish Sadhukhan r->rflags |= X86_EFLAGS_RF; 19050689a980SKrish Sadhukhan ++host_rflags_db_handler_flag; 19060689a980SKrish Sadhukhan } 19070689a980SKrish Sadhukhan } else { 19080689a980SKrish Sadhukhan if (r->rip == (u64)&vmrun_rip) { 19097839b0ecSKrish Sadhukhan host_rflags_vmrun_reached = true; 19100689a980SKrish Sadhukhan 19110689a980SKrish Sadhukhan if (host_rflags_set_rf) { 19120689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 19130689a980SKrish Sadhukhan rip_detected = r->rip; 19140689a980SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 19150689a980SKrish Sadhukhan 19160689a980SKrish Sadhukhan /* Trigger #DB via debug registers */ 19170689a980SKrish Sadhukhan write_dr0((void *)&vmrun_rip); 19180689a980SKrish Sadhukhan write_dr7(0x403); 19190689a980SKrish Sadhukhan } 19200689a980SKrish Sadhukhan } 19217839b0ecSKrish Sadhukhan } 19227839b0ecSKrish Sadhukhan } else { 19237839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 19247839b0ecSKrish Sadhukhan } 19257839b0ecSKrish Sadhukhan } 19267839b0ecSKrish Sadhukhan 19277839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test) 19287839b0ecSKrish Sadhukhan { 19297839b0ecSKrish Sadhukhan default_prepare(test); 19307839b0ecSKrish Sadhukhan handle_exception(DB_VECTOR, host_rflags_db_handler); 19317839b0ecSKrish Sadhukhan set_test_stage(test, 0); 19327839b0ecSKrish Sadhukhan } 19337839b0ecSKrish Sadhukhan 19347839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test) 19357839b0ecSKrish Sadhukhan { 19367839b0ecSKrish Sadhukhan if (host_rflags_set_tf) 19377839b0ecSKrish Sadhukhan write_rflags(read_rflags() | X86_EFLAGS_TF); 19387839b0ecSKrish Sadhukhan } 19397839b0ecSKrish Sadhukhan 19407839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test) 19417839b0ecSKrish Sadhukhan { 19427839b0ecSKrish Sadhukhan while (1) { 19430689a980SKrish Sadhukhan if (get_test_stage(test) > 0) { 19440689a980SKrish Sadhukhan if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) || 19450689a980SKrish Sadhukhan (host_rflags_set_rf && host_rflags_db_handler_flag == 1)) 19467839b0ecSKrish Sadhukhan host_rflags_guest_main_flag = 1; 19470689a980SKrish Sadhukhan } 19480689a980SKrish Sadhukhan 19490689a980SKrish Sadhukhan if (get_test_stage(test) == 4) 19507839b0ecSKrish Sadhukhan break; 19517839b0ecSKrish Sadhukhan vmmcall(); 19527839b0ecSKrish Sadhukhan } 19537839b0ecSKrish Sadhukhan } 19547839b0ecSKrish Sadhukhan 19557839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test) 19567839b0ecSKrish Sadhukhan { 19577839b0ecSKrish Sadhukhan switch (get_test_stage(test)) { 19587839b0ecSKrish Sadhukhan case 0: 19597839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1960198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT. Exit reason 0x%x", 19617839b0ecSKrish Sadhukhan vmcb->control.exit_code); 19627839b0ecSKrish Sadhukhan return true; 19637839b0ecSKrish Sadhukhan } 19647839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 19657839b0ecSKrish Sadhukhan /* 19667839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF not immediately before VMRUN, causes 19677839b0ecSKrish Sadhukhan * #DB trap before first guest instruction is executed 19687839b0ecSKrish Sadhukhan */ 19697839b0ecSKrish Sadhukhan host_rflags_set_tf = true; 19707839b0ecSKrish Sadhukhan break; 19717839b0ecSKrish Sadhukhan case 1: 19727839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 19730689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1) { 1974198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or #DB handler" 19757839b0ecSKrish Sadhukhan " invoked before guest main. Exit reason 0x%x", 19767839b0ecSKrish Sadhukhan vmcb->control.exit_code); 19777839b0ecSKrish Sadhukhan return true; 19787839b0ecSKrish Sadhukhan } 19797839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 19807839b0ecSKrish Sadhukhan /* 19817839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF immediately before VMRUN, causes #DB 19827839b0ecSKrish Sadhukhan * trap after VMRUN completes on the host side (i.e., after 19837839b0ecSKrish Sadhukhan * VMEXIT from guest). 19847839b0ecSKrish Sadhukhan */ 19857839b0ecSKrish Sadhukhan host_rflags_ss_on_vmrun = true; 19867839b0ecSKrish Sadhukhan break; 19877839b0ecSKrish Sadhukhan case 2: 19887839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 19890c22fd44SPaolo Bonzini rip_detected != (u64)&vmrun_rip + 3) { 1990198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch." 19910689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 19920689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 19930c22fd44SPaolo Bonzini (u64)&vmrun_rip + 3, rip_detected); 19940689a980SKrish Sadhukhan return true; 19950689a980SKrish Sadhukhan } 19960689a980SKrish Sadhukhan host_rflags_set_rf = true; 19970689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 19980689a980SKrish Sadhukhan host_rflags_vmrun_reached = false; 19990689a980SKrish Sadhukhan vmcb->save.rip += 3; 20000689a980SKrish Sadhukhan break; 20010689a980SKrish Sadhukhan case 3: 20020689a980SKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 20030689a980SKrish Sadhukhan rip_detected != (u64)&vmrun_rip || 20040689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1 || 20050689a980SKrish Sadhukhan host_rflags_db_handler_flag > 1 || 20060689a980SKrish Sadhukhan read_rflags() & X86_EFLAGS_RF) { 2007198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch or " 20080689a980SKrish Sadhukhan "EFLAGS.RF not cleared." 20090689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 20100689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 20110689a980SKrish Sadhukhan (u64)&vmrun_rip, rip_detected); 20127839b0ecSKrish Sadhukhan return true; 20137839b0ecSKrish Sadhukhan } 20147839b0ecSKrish Sadhukhan host_rflags_set_tf = false; 20150689a980SKrish Sadhukhan host_rflags_set_rf = false; 20167839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 20177839b0ecSKrish Sadhukhan break; 20187839b0ecSKrish Sadhukhan default: 20197839b0ecSKrish Sadhukhan return true; 20207839b0ecSKrish Sadhukhan } 20217839b0ecSKrish Sadhukhan inc_test_stage(test); 20220689a980SKrish Sadhukhan return get_test_stage(test) == 5; 20237839b0ecSKrish Sadhukhan } 20247839b0ecSKrish Sadhukhan 20257839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test) 20267839b0ecSKrish Sadhukhan { 20270689a980SKrish Sadhukhan return get_test_stage(test) == 4; 20287839b0ecSKrish Sadhukhan } 20297839b0ecSKrish Sadhukhan 20308660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name } 20318660d1b5SKrish Sadhukhan 2032ba29942cSKrish Sadhukhan /* 2033ba29942cSKrish Sadhukhan * v2 tests 2034ba29942cSKrish Sadhukhan */ 2035ba29942cSKrish Sadhukhan 2036f32183f5SJim Mattson /* 2037f32183f5SJim Mattson * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE 2038f32183f5SJim Mattson * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different 2039f32183f5SJim Mattson * value than in L1. 2040f32183f5SJim Mattson */ 2041f32183f5SJim Mattson 2042f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test) 2043f32183f5SJim Mattson { 2044f32183f5SJim Mattson write_cr4(read_cr4() & ~X86_CR4_OSXSAVE); 2045f32183f5SJim Mattson } 2046f32183f5SJim Mattson 2047f32183f5SJim Mattson static void svm_cr4_osxsave_test(void) 2048f32183f5SJim Mattson { 2049f32183f5SJim Mattson if (!this_cpu_has(X86_FEATURE_XSAVE)) { 2050f32183f5SJim Mattson report_skip("XSAVE not detected"); 2051f32183f5SJim Mattson return; 2052f32183f5SJim Mattson } 2053f32183f5SJim Mattson 2054f32183f5SJim Mattson if (!(read_cr4() & X86_CR4_OSXSAVE)) { 2055f32183f5SJim Mattson unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE; 2056f32183f5SJim Mattson 2057f32183f5SJim Mattson write_cr4(cr4); 2058f32183f5SJim Mattson vmcb->save.cr4 = cr4; 2059f32183f5SJim Mattson } 2060f32183f5SJim Mattson 2061816c0359SSean Christopherson report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set before VMRUN"); 2062f32183f5SJim Mattson 2063f32183f5SJim Mattson test_set_guest(svm_cr4_osxsave_test_guest); 2064f32183f5SJim Mattson report(svm_vmrun() == SVM_EXIT_VMMCALL, 2065f32183f5SJim Mattson "svm_cr4_osxsave_test_guest finished with VMMCALL"); 2066f32183f5SJim Mattson 2067816c0359SSean Christopherson report(this_cpu_has(X86_FEATURE_OSXSAVE), "CPUID.01H:ECX.XSAVE set after VMRUN"); 2068f32183f5SJim Mattson } 2069f32183f5SJim Mattson 2070ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test) 2071ba29942cSKrish Sadhukhan { 2072ba29942cSKrish Sadhukhan } 2073ba29942cSKrish Sadhukhan 2074eae10e8fSKrish Sadhukhan 2075eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val, \ 2076eae10e8fSKrish Sadhukhan resv_mask) \ 2077eae10e8fSKrish Sadhukhan { \ 2078eae10e8fSKrish Sadhukhan u64 tmp, mask; \ 2079eae10e8fSKrish Sadhukhan int i; \ 2080eae10e8fSKrish Sadhukhan \ 2081eae10e8fSKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2082eae10e8fSKrish Sadhukhan mask = 1ull << i; \ 2083eae10e8fSKrish Sadhukhan if (!(mask & resv_mask)) \ 2084eae10e8fSKrish Sadhukhan continue; \ 2085eae10e8fSKrish Sadhukhan tmp = val | mask; \ 2086eae10e8fSKrish Sadhukhan reg = tmp; \ 2087eae10e8fSKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx", \ 2088eae10e8fSKrish Sadhukhan str_name, end, start, tmp); \ 2089eae10e8fSKrish Sadhukhan } \ 2090eae10e8fSKrish Sadhukhan } 2091eae10e8fSKrish Sadhukhan 20926d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask, \ 2093cb6524f3SPaolo Bonzini exit_code, test_name) \ 2094a79c9495SKrish Sadhukhan { \ 2095a79c9495SKrish Sadhukhan u64 tmp, mask; \ 20968ae6d77fSSean Christopherson u32 r; \ 2097a79c9495SKrish Sadhukhan int i; \ 2098a79c9495SKrish Sadhukhan \ 2099a79c9495SKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2100a79c9495SKrish Sadhukhan mask = 1ull << i; \ 2101a79c9495SKrish Sadhukhan if (!(mask & resv_mask)) \ 2102a79c9495SKrish Sadhukhan continue; \ 2103a79c9495SKrish Sadhukhan tmp = val | mask; \ 2104a79c9495SKrish Sadhukhan switch (cr) { \ 2105a79c9495SKrish Sadhukhan case 0: \ 2106a79c9495SKrish Sadhukhan vmcb->save.cr0 = tmp; \ 2107a79c9495SKrish Sadhukhan break; \ 2108a79c9495SKrish Sadhukhan case 3: \ 2109a79c9495SKrish Sadhukhan vmcb->save.cr3 = tmp; \ 2110a79c9495SKrish Sadhukhan break; \ 2111a79c9495SKrish Sadhukhan case 4: \ 2112a79c9495SKrish Sadhukhan vmcb->save.cr4 = tmp; \ 2113a79c9495SKrish Sadhukhan } \ 21148ae6d77fSSean Christopherson r = svm_vmrun(); \ 21158ae6d77fSSean Christopherson report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x", \ 21168ae6d77fSSean Christopherson cr, test_name, end, start, tmp, exit_code, r); \ 2117a79c9495SKrish Sadhukhan } \ 2118a79c9495SKrish Sadhukhan } 2119e8d7a8f6SKrish Sadhukhan 2120a79c9495SKrish Sadhukhan static void test_efer(void) 2121a79c9495SKrish Sadhukhan { 2122e8d7a8f6SKrish Sadhukhan /* 2123e8d7a8f6SKrish Sadhukhan * Un-setting EFER.SVME is illegal 2124e8d7a8f6SKrish Sadhukhan */ 2125ba29942cSKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2126ba29942cSKrish Sadhukhan u64 efer = efer_saved; 2127ba29942cSKrish Sadhukhan 2128ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer); 2129ba29942cSKrish Sadhukhan efer &= ~EFER_SVME; 2130ba29942cSKrish Sadhukhan vmcb->save.efer = efer; 2131ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer); 2132ba29942cSKrish Sadhukhan vmcb->save.efer = efer_saved; 2133e8d7a8f6SKrish Sadhukhan 2134e8d7a8f6SKrish Sadhukhan /* 2135a79c9495SKrish Sadhukhan * EFER MBZ bits: 63:16, 9 2136a79c9495SKrish Sadhukhan */ 2137a79c9495SKrish Sadhukhan efer_saved = vmcb->save.efer; 2138a79c9495SKrish Sadhukhan 2139a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer, 2140a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2141a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer, 2142a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2143a79c9495SKrish Sadhukhan 21441d7bde08SKrish Sadhukhan /* 21451d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR4.PAE is zero. 21461d7bde08SKrish Sadhukhan */ 21471d7bde08SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 21481d7bde08SKrish Sadhukhan u64 cr0; 21491d7bde08SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 21501d7bde08SKrish Sadhukhan u64 cr4; 21511d7bde08SKrish Sadhukhan 21521d7bde08SKrish Sadhukhan efer = efer_saved | EFER_LME; 21531d7bde08SKrish Sadhukhan vmcb->save.efer = efer; 21541d7bde08SKrish Sadhukhan cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE; 21551d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 21561d7bde08SKrish Sadhukhan cr4 = cr4_saved & ~X86_CR4_PAE; 21571d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4; 21581d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 21591d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4); 21601d7bde08SKrish Sadhukhan 21611d7bde08SKrish Sadhukhan /* 21621d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR0.PE is zero. 2163fc050452SLara Lazier * CR4.PAE needs to be set as we otherwise cannot 2164fc050452SLara Lazier * determine if CR4.PAE=0 or CR0.PE=0 triggered the 2165fc050452SLara Lazier * SVM_EXIT_ERR. 21661d7bde08SKrish Sadhukhan */ 2167fc050452SLara Lazier cr4 = cr4_saved | X86_CR4_PAE; 2168fc050452SLara Lazier vmcb->save.cr4 = cr4; 21691d7bde08SKrish Sadhukhan cr0 &= ~X86_CR0_PE; 21701d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 21711d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 21721d7bde08SKrish Sadhukhan "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0); 21731d7bde08SKrish Sadhukhan 21741d7bde08SKrish Sadhukhan /* 21751d7bde08SKrish Sadhukhan * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero. 21761d7bde08SKrish Sadhukhan */ 21771d7bde08SKrish Sadhukhan u32 cs_attrib_saved = vmcb->save.cs.attrib; 21781d7bde08SKrish Sadhukhan u32 cs_attrib; 21791d7bde08SKrish Sadhukhan 21801d7bde08SKrish Sadhukhan cr0 |= X86_CR0_PE; 21811d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 21821d7bde08SKrish Sadhukhan cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK | 21831d7bde08SKrish Sadhukhan SVM_SELECTOR_DB_MASK; 21841d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib; 21851d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 21861d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)", 21871d7bde08SKrish Sadhukhan efer, cr0, cr4, cs_attrib); 21881d7bde08SKrish Sadhukhan 21891d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 21901d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2191a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 21921d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib_saved; 2193a79c9495SKrish Sadhukhan } 2194a79c9495SKrish Sadhukhan 2195a79c9495SKrish Sadhukhan static void test_cr0(void) 2196a79c9495SKrish Sadhukhan { 2197a79c9495SKrish Sadhukhan /* 2198e8d7a8f6SKrish Sadhukhan * Un-setting CR0.CD and setting CR0.NW is illegal combination 2199e8d7a8f6SKrish Sadhukhan */ 2200e8d7a8f6SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 2201e8d7a8f6SKrish Sadhukhan u64 cr0 = cr0_saved; 2202e8d7a8f6SKrish Sadhukhan 2203e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_CD; 2204e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2205e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2206a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx", 2207a79c9495SKrish Sadhukhan cr0); 2208e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2209e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2210a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx", 2211a79c9495SKrish Sadhukhan cr0); 2212e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2213e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_CD; 2214e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2215a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx", 2216a79c9495SKrish Sadhukhan cr0); 2217e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2218e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2219a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx", 2220a79c9495SKrish Sadhukhan cr0); 2221e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 22225c052c90SKrish Sadhukhan 22235c052c90SKrish Sadhukhan /* 22245c052c90SKrish Sadhukhan * CR0[63:32] are not zero 22255c052c90SKrish Sadhukhan */ 22265c052c90SKrish Sadhukhan cr0 = cr0_saved; 2227eae10e8fSKrish Sadhukhan 2228eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved, 2229eae10e8fSKrish Sadhukhan SVM_CR0_RESERVED_MASK); 22305c052c90SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 2231a79c9495SKrish Sadhukhan } 2232eae10e8fSKrish Sadhukhan 2233a79c9495SKrish Sadhukhan static void test_cr3(void) 2234a79c9495SKrish Sadhukhan { 2235a79c9495SKrish Sadhukhan /* 2236a79c9495SKrish Sadhukhan * CR3 MBZ bits based on different modes: 223729a01803SNadav Amit * [63:52] - long mode 2238a79c9495SKrish Sadhukhan */ 2239a79c9495SKrish Sadhukhan u64 cr3_saved = vmcb->save.cr3; 2240a79c9495SKrish Sadhukhan 2241a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved, 2242cb6524f3SPaolo Bonzini SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, ""); 22436d0ecbf6SKrish Sadhukhan 22446d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK; 22456d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 22466d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 22476d0ecbf6SKrish Sadhukhan 22486d0ecbf6SKrish Sadhukhan /* 22496d0ecbf6SKrish Sadhukhan * CR3 non-MBZ reserved bits based on different modes: 2250cb6524f3SPaolo Bonzini * [11:5] [2:0] - long mode (PCIDE=0) 22516d0ecbf6SKrish Sadhukhan * [2:0] - PAE legacy mode 22526d0ecbf6SKrish Sadhukhan */ 22536d0ecbf6SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 22546d0ecbf6SKrish Sadhukhan u64 *pdpe = npt_get_pml4e(); 22556d0ecbf6SKrish Sadhukhan 22566d0ecbf6SKrish Sadhukhan /* 22576d0ecbf6SKrish Sadhukhan * Long mode 22586d0ecbf6SKrish Sadhukhan */ 22596d0ecbf6SKrish Sadhukhan if (this_cpu_has(X86_FEATURE_PCID)) { 22606d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE; 22616d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2262cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) "); 22636d0ecbf6SKrish Sadhukhan 22646d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK; 22656d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 22666d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 2267cb6524f3SPaolo Bonzini } 22686d0ecbf6SKrish Sadhukhan 22696d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE; 22706d0ecbf6SKrish Sadhukhan 2271993749ffSSean Christopherson if (!npt_supported()) 2272993749ffSSean Christopherson goto skip_npt_only; 2273993749ffSSean Christopherson 22746d0ecbf6SKrish Sadhukhan /* Clear P (Present) bit in NPT in order to trigger #NPF */ 22756d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 22766d0ecbf6SKrish Sadhukhan 22776d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2278cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) "); 22796d0ecbf6SKrish Sadhukhan 22806d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2281cb6524f3SPaolo Bonzini vmcb->save.cr3 = cr3_saved; 22826d0ecbf6SKrish Sadhukhan 22836d0ecbf6SKrish Sadhukhan /* 22846d0ecbf6SKrish Sadhukhan * PAE legacy 22856d0ecbf6SKrish Sadhukhan */ 22866d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 22876d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PAE; 22886d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved, 2289cb6524f3SPaolo Bonzini SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) "); 22906d0ecbf6SKrish Sadhukhan 22916d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2292993749ffSSean Christopherson 2293993749ffSSean Christopherson skip_npt_only: 2294a79c9495SKrish Sadhukhan vmcb->save.cr3 = cr3_saved; 22956d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2296a79c9495SKrish Sadhukhan } 2297a79c9495SKrish Sadhukhan 2298d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */ 2299a79c9495SKrish Sadhukhan static void test_cr4(void) 2300a79c9495SKrish Sadhukhan { 2301a79c9495SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 2302a79c9495SKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2303a79c9495SKrish Sadhukhan u64 efer = efer_saved; 2304a79c9495SKrish Sadhukhan 2305a79c9495SKrish Sadhukhan efer &= ~EFER_LME; 2306a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2307a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2308cb6524f3SPaolo Bonzini SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, ""); 2309a79c9495SKrish Sadhukhan 2310a79c9495SKrish Sadhukhan efer |= EFER_LME; 2311a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2312a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2313cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2314a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved, 2315cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2316a79c9495SKrish Sadhukhan 2317a79c9495SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2318a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 2319a79c9495SKrish Sadhukhan } 2320a79c9495SKrish Sadhukhan 2321a79c9495SKrish Sadhukhan static void test_dr(void) 2322a79c9495SKrish Sadhukhan { 2323eae10e8fSKrish Sadhukhan /* 2324eae10e8fSKrish Sadhukhan * DR6[63:32] and DR7[63:32] are MBZ 2325eae10e8fSKrish Sadhukhan */ 2326eae10e8fSKrish Sadhukhan u64 dr_saved = vmcb->save.dr6; 2327eae10e8fSKrish Sadhukhan 2328eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved, 2329eae10e8fSKrish Sadhukhan SVM_DR6_RESERVED_MASK); 2330eae10e8fSKrish Sadhukhan vmcb->save.dr6 = dr_saved; 2331eae10e8fSKrish Sadhukhan 2332eae10e8fSKrish Sadhukhan dr_saved = vmcb->save.dr7; 2333eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved, 2334eae10e8fSKrish Sadhukhan SVM_DR7_RESERVED_MASK); 2335eae10e8fSKrish Sadhukhan 2336eae10e8fSKrish Sadhukhan vmcb->save.dr7 = dr_saved; 2337a79c9495SKrish Sadhukhan } 2338eae10e8fSKrish Sadhukhan 2339abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */ 2340abe82380SKrish Sadhukhan #define TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code, \ 2341abe82380SKrish Sadhukhan msg) { \ 2342abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept | 1ULL << type; \ 2343abe82380SKrish Sadhukhan if (type == INTERCEPT_MSR_PROT) \ 2344abe82380SKrish Sadhukhan vmcb->control.msrpm_base_pa = addr; \ 2345abe82380SKrish Sadhukhan else \ 2346abe82380SKrish Sadhukhan vmcb->control.iopm_base_pa = addr; \ 2347abe82380SKrish Sadhukhan report(svm_vmrun() == exit_code, \ 2348abe82380SKrish Sadhukhan "Test %s address: %lx", msg, addr); \ 2349abe82380SKrish Sadhukhan } 2350abe82380SKrish Sadhukhan 2351abe82380SKrish Sadhukhan /* 2352abe82380SKrish Sadhukhan * If the MSR or IOIO intercept table extends to a physical address that 2353abe82380SKrish Sadhukhan * is greater than or equal to the maximum supported physical address, the 2354abe82380SKrish Sadhukhan * guest state is illegal. 2355abe82380SKrish Sadhukhan * 2356abe82380SKrish Sadhukhan * The VMRUN instruction ignores the lower 12 bits of the address specified 2357abe82380SKrish Sadhukhan * in the VMCB. 2358abe82380SKrish Sadhukhan * 2359abe82380SKrish Sadhukhan * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB 2360abe82380SKrish Sadhukhan * pages + 1 byte. 2361abe82380SKrish Sadhukhan * 2362abe82380SKrish Sadhukhan * [APM vol 2] 2363abe82380SKrish Sadhukhan * 2364abe82380SKrish Sadhukhan * Note: Unallocated MSRPM addresses conforming to consistency checks, generate 2365abe82380SKrish Sadhukhan * #NPF. 2366abe82380SKrish Sadhukhan */ 2367abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void) 2368abe82380SKrish Sadhukhan { 2369abe82380SKrish Sadhukhan u64 saved_intercept = vmcb->control.intercept; 2370abe82380SKrish Sadhukhan u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr(); 2371abe82380SKrish Sadhukhan u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1)); 2372abe82380SKrish Sadhukhan 2373abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2374abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2375abe82380SKrish Sadhukhan "MSRPM"); 2376abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2377abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR, 2378abe82380SKrish Sadhukhan "MSRPM"); 2379abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2380abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2381abe82380SKrish Sadhukhan "MSRPM"); 2382abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2383abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2384abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2385abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2386abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2387abe82380SKrish Sadhukhan 2388abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2389abe82380SKrish Sadhukhan addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2390abe82380SKrish Sadhukhan "IOPM"); 2391abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2392abe82380SKrish Sadhukhan addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2393abe82380SKrish Sadhukhan "IOPM"); 2394abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2395abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL, 2396abe82380SKrish Sadhukhan "IOPM"); 2397abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2398abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2399abe82380SKrish Sadhukhan "IOPM"); 2400abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2401abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2402abe82380SKrish Sadhukhan "IOPM"); 2403abe82380SKrish Sadhukhan addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1)); 2404abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2405abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2406abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2407abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2408abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2409abe82380SKrish Sadhukhan 2410abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept; 2411abe82380SKrish Sadhukhan } 2412abe82380SKrish Sadhukhan 2413ba3c9773SLara Lazier /* 2414ba3c9773SLara Lazier * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical 2415ba3c9773SLara Lazier * segment bases in the VMCB. However, VMENTRY succeeds as documented. 2416ba3c9773SLara Lazier */ 2417ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg) \ 2418a99070ebSKrish Sadhukhan saved_addr = seg_base; \ 2419a99070ebSKrish Sadhukhan seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2420ba3c9773SLara Lazier return_value = svm_vmrun(); \ 2421ba3c9773SLara Lazier report(return_value == SVM_EXIT_VMMCALL, \ 2422ba3c9773SLara Lazier "Successful VMRUN with noncanonical %s.base", msg); \ 2423a99070ebSKrish Sadhukhan seg_base = saved_addr; 2424a99070ebSKrish Sadhukhan 2425ba3c9773SLara Lazier 2426ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg) \ 2427ba3c9773SLara Lazier saved_addr = seg_base; \ 2428ba3c9773SLara Lazier seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2429ba3c9773SLara Lazier asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory"); \ 2430ba3c9773SLara Lazier asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory"); \ 2431ba3c9773SLara Lazier report(is_canonical(seg_base), \ 2432ba3c9773SLara Lazier "Test %s.base for canonical form: %lx", msg, seg_base); \ 2433ba3c9773SLara Lazier seg_base = saved_addr; 2434ba3c9773SLara Lazier 2435ba3c9773SLara Lazier static void test_canonicalization(void) 2436a99070ebSKrish Sadhukhan { 2437a99070ebSKrish Sadhukhan u64 saved_addr; 2438ba3c9773SLara Lazier u64 return_value; 2439ba3c9773SLara Lazier u64 addr_limit; 2440ba3c9773SLara Lazier u64 vmcb_phys = virt_to_phys(vmcb); 2441ba3c9773SLara Lazier 2442ba3c9773SLara Lazier addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48; 2443a99070ebSKrish Sadhukhan u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1); 2444a99070ebSKrish Sadhukhan 2445ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS"); 2446ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS"); 2447ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR"); 2448ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR"); 2449ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS"); 2450ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES"); 2451ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS"); 2452ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS"); 2453ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS"); 2454ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR"); 2455ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR"); 2456a99070ebSKrish Sadhukhan } 2457a99070ebSKrish Sadhukhan 2458665f5677SKrish Sadhukhan /* 2459665f5677SKrish Sadhukhan * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not 2460665f5677SKrish Sadhukhan * cause a trace trap between the VMRUN and the first guest instruction, but 2461665f5677SKrish Sadhukhan * rather after completion of the first guest instruction. 2462665f5677SKrish Sadhukhan * 2463665f5677SKrish Sadhukhan * [APM vol 2] 2464665f5677SKrish Sadhukhan */ 2465665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip; 2466665f5677SKrish Sadhukhan 2467665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r) 2468665f5677SKrish Sadhukhan { 2469665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = r->rip; 2470665f5677SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 2471665f5677SKrish Sadhukhan } 2472665f5677SKrish Sadhukhan 2473a79c9495SKrish Sadhukhan static void svm_guest_state_test(void) 2474a79c9495SKrish Sadhukhan { 2475a79c9495SKrish Sadhukhan test_set_guest(basic_guest_main); 2476a79c9495SKrish Sadhukhan test_efer(); 2477a79c9495SKrish Sadhukhan test_cr0(); 2478a79c9495SKrish Sadhukhan test_cr3(); 2479a79c9495SKrish Sadhukhan test_cr4(); 2480a79c9495SKrish Sadhukhan test_dr(); 2481abe82380SKrish Sadhukhan test_msrpm_iopm_bitmap_addrs(); 2482ba3c9773SLara Lazier test_canonicalization(); 2483ba29942cSKrish Sadhukhan } 2484ba29942cSKrish Sadhukhan 2485665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test); 2486665f5677SKrish Sadhukhan extern u64 *insn2; 2487665f5677SKrish Sadhukhan extern u64 *guest_end; 2488665f5677SKrish Sadhukhan 2489665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t" 2490665f5677SKrish Sadhukhan "push %rbp\n\t" 2491665f5677SKrish Sadhukhan ".global insn2\n\t" 2492665f5677SKrish Sadhukhan "insn2:\n\t" 2493665f5677SKrish Sadhukhan "mov %rsp,%rbp\n\t" 2494665f5677SKrish Sadhukhan "vmmcall\n\t" 2495665f5677SKrish Sadhukhan "vmmcall\n\t" 2496665f5677SKrish Sadhukhan ".global guest_end\n\t" 2497665f5677SKrish Sadhukhan "guest_end:\n\t" 2498665f5677SKrish Sadhukhan "vmmcall\n\t" 2499665f5677SKrish Sadhukhan "pop %rbp\n\t" 2500665f5677SKrish Sadhukhan "ret"); 2501665f5677SKrish Sadhukhan 2502665f5677SKrish Sadhukhan static void svm_test_singlestep(void) 2503665f5677SKrish Sadhukhan { 2504665f5677SKrish Sadhukhan handle_exception(DB_VECTOR, guest_rflags_test_db_handler); 2505665f5677SKrish Sadhukhan 2506665f5677SKrish Sadhukhan /* 2507665f5677SKrish Sadhukhan * Trap expected after completion of first guest instruction 2508665f5677SKrish Sadhukhan */ 2509665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2510665f5677SKrish Sadhukhan report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL && 2511665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == (u64)&insn2, 2512665f5677SKrish Sadhukhan "Test EFLAGS.TF on VMRUN: trap expected after completion of first guest instruction"); 2513665f5677SKrish Sadhukhan /* 2514665f5677SKrish Sadhukhan * No trap expected 2515665f5677SKrish Sadhukhan */ 2516665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = 0; 2517665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2518665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2519665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2520665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected"); 2521665f5677SKrish Sadhukhan 2522665f5677SKrish Sadhukhan /* 2523665f5677SKrish Sadhukhan * Let guest finish execution 2524665f5677SKrish Sadhukhan */ 2525665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2526665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2527665f5677SKrish Sadhukhan vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion"); 2528665f5677SKrish Sadhukhan } 2529665f5677SKrish Sadhukhan 25307a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false; 25317a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0; 25327a57ef5dSMaxim Levitsky 25337a57ef5dSMaxim Levitsky 25347a57ef5dSMaxim Levitsky /* 25357a57ef5dSMaxim Levitsky * 25367a57ef5dSMaxim Levitsky * Test the following errata: 25377a57ef5dSMaxim Levitsky * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest, 25387a57ef5dSMaxim Levitsky * the CPU would first check the EAX against host reserved memory 25397a57ef5dSMaxim Levitsky * regions (so far only SMM_ADDR/SMM_MASK are known to cause it), 25407a57ef5dSMaxim Levitsky * and only then signal #VMexit 25417a57ef5dSMaxim Levitsky * 25427a57ef5dSMaxim Levitsky * Try to reproduce this by trying vmsave on each possible 4K aligned memory 25437a57ef5dSMaxim Levitsky * address in the low 4G where the SMM area has to reside. 25447a57ef5dSMaxim Levitsky */ 25457a57ef5dSMaxim Levitsky 25467a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r) 25477a57ef5dSMaxim Levitsky { 25487a57ef5dSMaxim Levitsky svm_errata_reproduced = true; 25497a57ef5dSMaxim Levitsky /* skip over the vmsave instruction*/ 25507a57ef5dSMaxim Levitsky r->rip += 3; 25517a57ef5dSMaxim Levitsky } 25527a57ef5dSMaxim Levitsky 25537a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void) 25547a57ef5dSMaxim Levitsky { 25557a57ef5dSMaxim Levitsky unsigned long *last_page = NULL; 25567a57ef5dSMaxim Levitsky 25577a57ef5dSMaxim Levitsky handle_exception(GP_VECTOR, gp_isr); 25587a57ef5dSMaxim Levitsky 25597a57ef5dSMaxim Levitsky while (!svm_errata_reproduced) { 25607a57ef5dSMaxim Levitsky 25617a57ef5dSMaxim Levitsky unsigned long *page = alloc_pages(1); 25627a57ef5dSMaxim Levitsky 25637a57ef5dSMaxim Levitsky if (!page) { 25645c3582f0SJanis Schoetterl-Glausch report_pass("All guest memory tested, no bug found"); 25657a57ef5dSMaxim Levitsky break; 25667a57ef5dSMaxim Levitsky } 25677a57ef5dSMaxim Levitsky 25687a57ef5dSMaxim Levitsky physical = virt_to_phys(page); 25697a57ef5dSMaxim Levitsky 25707a57ef5dSMaxim Levitsky asm volatile ( 25717a57ef5dSMaxim Levitsky "mov %[_physical], %%rax\n\t" 25727a57ef5dSMaxim Levitsky "vmsave %%rax\n\t" 25737a57ef5dSMaxim Levitsky 25747a57ef5dSMaxim Levitsky : [_physical] "=m" (physical) 25757a57ef5dSMaxim Levitsky : /* no inputs*/ 25767a57ef5dSMaxim Levitsky : "rax" /*clobbers*/ 25777a57ef5dSMaxim Levitsky ); 25787a57ef5dSMaxim Levitsky 25797a57ef5dSMaxim Levitsky if (svm_errata_reproduced) { 2580198dfd0eSJanis Schoetterl-Glausch report_fail("Got #GP exception - svm errata reproduced at 0x%lx", 25817a57ef5dSMaxim Levitsky physical); 25827a57ef5dSMaxim Levitsky break; 25837a57ef5dSMaxim Levitsky } 25847a57ef5dSMaxim Levitsky 25857a57ef5dSMaxim Levitsky *page = (unsigned long)last_page; 25867a57ef5dSMaxim Levitsky last_page = page; 25877a57ef5dSMaxim Levitsky } 25887a57ef5dSMaxim Levitsky 25897a57ef5dSMaxim Levitsky while (last_page) { 25907a57ef5dSMaxim Levitsky unsigned long *page = last_page; 25917a57ef5dSMaxim Levitsky last_page = (unsigned long *)*last_page; 25927a57ef5dSMaxim Levitsky free_pages_by_order(page, 1); 25937a57ef5dSMaxim Levitsky } 25947a57ef5dSMaxim Levitsky } 25957a57ef5dSMaxim Levitsky 25960b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test) 25970b6f6cedSKrish Sadhukhan { 25980b6f6cedSKrish Sadhukhan u64 vmcb_phys = virt_to_phys(vmcb); 25990b6f6cedSKrish Sadhukhan 26000b6f6cedSKrish Sadhukhan asm volatile ("vmload %0" : : "a"(vmcb_phys)); 26010b6f6cedSKrish Sadhukhan asm volatile ("vmsave %0" : : "a"(vmcb_phys)); 26020b6f6cedSKrish Sadhukhan } 26030b6f6cedSKrish Sadhukhan 26040b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void) 26050b6f6cedSKrish Sadhukhan { 26060b6f6cedSKrish Sadhukhan u32 intercept_saved = vmcb->control.intercept; 26070b6f6cedSKrish Sadhukhan 26080b6f6cedSKrish Sadhukhan test_set_guest(vmload_vmsave_guest_main); 26090b6f6cedSKrish Sadhukhan 26100b6f6cedSKrish Sadhukhan /* 26110b6f6cedSKrish Sadhukhan * Disabling intercept for VMLOAD and VMSAVE doesn't cause 26120b6f6cedSKrish Sadhukhan * respective #VMEXIT to host 26130b6f6cedSKrish Sadhukhan */ 26140b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 26150b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 26160b6f6cedSKrish Sadhukhan svm_vmrun(); 26170b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 26180b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 26190b6f6cedSKrish Sadhukhan 26200b6f6cedSKrish Sadhukhan /* 26210b6f6cedSKrish Sadhukhan * Enabling intercept for VMLOAD and VMSAVE causes respective 26220b6f6cedSKrish Sadhukhan * #VMEXIT to host 26230b6f6cedSKrish Sadhukhan */ 26240b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 26250b6f6cedSKrish Sadhukhan svm_vmrun(); 26260b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 26270b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 26280b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 26290b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 26300b6f6cedSKrish Sadhukhan svm_vmrun(); 26310b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 26320b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 26330b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 26340b6f6cedSKrish Sadhukhan svm_vmrun(); 26350b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 26360b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 26370b6f6cedSKrish Sadhukhan 26380b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 26390b6f6cedSKrish Sadhukhan svm_vmrun(); 26400b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 26410b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 26420b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 26430b6f6cedSKrish Sadhukhan svm_vmrun(); 26440b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 26450b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 26460b6f6cedSKrish Sadhukhan 26470b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 26480b6f6cedSKrish Sadhukhan svm_vmrun(); 26490b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 26500b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 26510b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 26520b6f6cedSKrish Sadhukhan svm_vmrun(); 26530b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 26540b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 26550b6f6cedSKrish Sadhukhan 26560b6f6cedSKrish Sadhukhan vmcb->control.intercept = intercept_saved; 26570b6f6cedSKrish Sadhukhan } 26580b6f6cedSKrish Sadhukhan 2659f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test) 2660f6972bd6SLara Lazier { 2661f6972bd6SLara Lazier default_prepare(test); 2662f6972bd6SLara Lazier } 2663f6972bd6SLara Lazier 2664f6972bd6SLara Lazier static void test_vgif(struct svm_test *test) 2665f6972bd6SLara Lazier { 2666f6972bd6SLara Lazier asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t"); 2667f6972bd6SLara Lazier } 2668f6972bd6SLara Lazier 2669f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test) 2670f6972bd6SLara Lazier { 2671f6972bd6SLara Lazier switch (get_test_stage(test)) 2672f6972bd6SLara Lazier { 2673f6972bd6SLara Lazier case 0: 2674f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2675198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2676f6972bd6SLara Lazier return true; 2677f6972bd6SLara Lazier } 2678f6972bd6SLara Lazier vmcb->control.int_ctl |= V_GIF_ENABLED_MASK; 2679f6972bd6SLara Lazier vmcb->save.rip += 3; 2680f6972bd6SLara Lazier inc_test_stage(test); 2681f6972bd6SLara Lazier break; 2682f6972bd6SLara Lazier case 1: 2683f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2684198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2685f6972bd6SLara Lazier return true; 2686f6972bd6SLara Lazier } 2687f6972bd6SLara Lazier if (!(vmcb->control.int_ctl & V_GIF_MASK)) { 2688198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to set VGIF when executing STGI."); 2689f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2690f6972bd6SLara Lazier return true; 2691f6972bd6SLara Lazier } 26925c3582f0SJanis Schoetterl-Glausch report_pass("STGI set VGIF bit."); 2693f6972bd6SLara Lazier vmcb->save.rip += 3; 2694f6972bd6SLara Lazier inc_test_stage(test); 2695f6972bd6SLara Lazier break; 2696f6972bd6SLara Lazier case 2: 2697f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2698198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2699f6972bd6SLara Lazier return true; 2700f6972bd6SLara Lazier } 2701f6972bd6SLara Lazier if (vmcb->control.int_ctl & V_GIF_MASK) { 2702198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to clear VGIF when executing CLGI."); 2703f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2704f6972bd6SLara Lazier return true; 2705f6972bd6SLara Lazier } 27065c3582f0SJanis Schoetterl-Glausch report_pass("CLGI cleared VGIF bit."); 2707f6972bd6SLara Lazier vmcb->save.rip += 3; 2708f6972bd6SLara Lazier inc_test_stage(test); 2709f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 2710f6972bd6SLara Lazier break; 2711f6972bd6SLara Lazier default: 2712f6972bd6SLara Lazier return true; 2713f6972bd6SLara Lazier break; 2714f6972bd6SLara Lazier } 2715f6972bd6SLara Lazier 2716f6972bd6SLara Lazier return get_test_stage(test) == 3; 2717f6972bd6SLara Lazier } 2718f6972bd6SLara Lazier 2719f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test) 2720f6972bd6SLara Lazier { 2721f6972bd6SLara Lazier return get_test_stage(test) == 3; 2722f6972bd6SLara Lazier } 2723f6972bd6SLara Lazier 27248650dffeSMaxim Levitsky 27258650dffeSMaxim Levitsky static int pause_test_counter; 27268650dffeSMaxim Levitsky static int wait_counter; 27278650dffeSMaxim Levitsky 27288650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test) 27298650dffeSMaxim Levitsky { 27308650dffeSMaxim Levitsky int i; 27318650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 27328650dffeSMaxim Levitsky pause(); 27338650dffeSMaxim Levitsky 27348650dffeSMaxim Levitsky if (!wait_counter) 27358650dffeSMaxim Levitsky return; 27368650dffeSMaxim Levitsky 27378650dffeSMaxim Levitsky for (i = 0; i < wait_counter; i++) 27388650dffeSMaxim Levitsky ; 27398650dffeSMaxim Levitsky 27408650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 27418650dffeSMaxim Levitsky pause(); 27428650dffeSMaxim Levitsky 27438650dffeSMaxim Levitsky } 27448650dffeSMaxim Levitsky 27458650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold) 27468650dffeSMaxim Levitsky { 27478650dffeSMaxim Levitsky test_set_guest(pause_filter_test_guest_main); 27488650dffeSMaxim Levitsky 27498650dffeSMaxim Levitsky pause_test_counter = pause_iterations; 27508650dffeSMaxim Levitsky wait_counter = wait_iterations; 27518650dffeSMaxim Levitsky 27528650dffeSMaxim Levitsky vmcb->control.pause_filter_count = filter_value; 27538650dffeSMaxim Levitsky vmcb->control.pause_filter_thresh = threshold; 27548650dffeSMaxim Levitsky svm_vmrun(); 27558650dffeSMaxim Levitsky 27568650dffeSMaxim Levitsky if (filter_value <= pause_iterations || wait_iterations < threshold) 27578650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit"); 27588650dffeSMaxim Levitsky else 27598650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit"); 27608650dffeSMaxim Levitsky } 27618650dffeSMaxim Levitsky 27628650dffeSMaxim Levitsky static void pause_filter_test(void) 27638650dffeSMaxim Levitsky { 27648650dffeSMaxim Levitsky if (!pause_filter_supported()) { 27658650dffeSMaxim Levitsky report_skip("PAUSE filter not supported in the guest"); 27668650dffeSMaxim Levitsky return; 27678650dffeSMaxim Levitsky } 27688650dffeSMaxim Levitsky 27698650dffeSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_PAUSE); 27708650dffeSMaxim Levitsky 27718650dffeSMaxim Levitsky // filter count more that pause count - no VMexit 27728650dffeSMaxim Levitsky pause_filter_run_test(10, 9, 0, 0); 27738650dffeSMaxim Levitsky 27748650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit 27758650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 0, 0); 27768650dffeSMaxim Levitsky 27778650dffeSMaxim Levitsky 27788650dffeSMaxim Levitsky if (pause_threshold_supported()) { 27798650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + large enough threshold 27808650dffeSMaxim Levitsky // so that filter counter resets 27818650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 1000, 10); 27828650dffeSMaxim Levitsky 27838650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + small threshold 27848650dffeSMaxim Levitsky // so that filter doesn't reset 27858650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 10, 1000); 27868650dffeSMaxim Levitsky } else { 27878650dffeSMaxim Levitsky report_skip("PAUSE threshold not supported in the guest"); 27888650dffeSMaxim Levitsky return; 27898650dffeSMaxim Levitsky } 27908650dffeSMaxim Levitsky } 27918650dffeSMaxim Levitsky 2792694e59baSManali Shukla /* If CR0.TS and CR0.EM are cleared in L2, no #NM is generated. */ 2793694e59baSManali Shukla static void svm_no_nm_test(void) 27945c92f156SManali Shukla { 27955c92f156SManali Shukla write_cr0(read_cr0() & ~X86_CR0_TS); 2796694e59baSManali Shukla test_set_guest((test_guest_func)fnop); 27975c92f156SManali Shukla 27985c92f156SManali Shukla vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM); 2799694e59baSManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL, 2800d4ae0a71SThomas Huth "fnop with CR0.TS and CR0.EM unset no #NM exception"); 28015c92f156SManali Shukla } 2802f6972bd6SLara Lazier 2803ddb85855SSean Christopherson static u64 amd_get_lbr_rip(u32 msr) 2804537d39dfSMaxim Levitsky { 2805ddb85855SSean Christopherson return rdmsr(msr) & ~AMD_LBR_RECORD_MISPREDICT; 2806537d39dfSMaxim Levitsky } 2807537d39dfSMaxim Levitsky 2808ddb85855SSean Christopherson #define HOST_CHECK_LBR(from_expected, to_expected) \ 2809ddb85855SSean Christopherson do { \ 2810ddb85855SSean Christopherson TEST_EXPECT_EQ((u64)from_expected, amd_get_lbr_rip(MSR_IA32_LASTBRANCHFROMIP)); \ 2811ddb85855SSean Christopherson TEST_EXPECT_EQ((u64)to_expected, amd_get_lbr_rip(MSR_IA32_LASTBRANCHTOIP)); \ 2812ddb85855SSean Christopherson } while (0) 2813537d39dfSMaxim Levitsky 2814ddb85855SSean Christopherson /* 2815ddb85855SSean Christopherson * FIXME: Do something other than generate an exception to communicate failure. 2816ddb85855SSean Christopherson * Debugging without expected vs. actual is an absolute nightmare. 2817ddb85855SSean Christopherson */ 2818ddb85855SSean Christopherson #define GUEST_CHECK_LBR(from_expected, to_expected) \ 2819ddb85855SSean Christopherson do { \ 2820ddb85855SSean Christopherson if ((u64)(from_expected) != amd_get_lbr_rip(MSR_IA32_LASTBRANCHFROMIP)) \ 2821ddb85855SSean Christopherson asm volatile("ud2"); \ 2822ddb85855SSean Christopherson if ((u64)(to_expected) != amd_get_lbr_rip(MSR_IA32_LASTBRANCHTOIP)) \ 2823ddb85855SSean Christopherson asm volatile("ud2"); \ 2824ddb85855SSean Christopherson } while (0) 2825537d39dfSMaxim Levitsky 282692098120SSean Christopherson #define REPORT_GUEST_LBR_ERROR(vmcb) \ 282792098120SSean Christopherson report(false, "LBR guest test failed. Exit reason 0x%x, RIP = %lx, from = %lx, to = %lx, ex from = %lx, ex to = %lx", \ 282892098120SSean Christopherson vmcb->control.exit_code, vmcb->save.rip, \ 282992098120SSean Christopherson vmcb->save.br_from, vmcb->save.br_to, \ 283092098120SSean Christopherson vmcb->save.last_excp_from, vmcb->save.last_excp_to) 283192098120SSean Christopherson 2832537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name) \ 2833537d39dfSMaxim Levitsky asm volatile ( \ 2834537d39dfSMaxim Levitsky # branch_name "_from:" \ 2835537d39dfSMaxim Levitsky "jmp " # branch_name "_to\n" \ 2836537d39dfSMaxim Levitsky "nop\n" \ 2837537d39dfSMaxim Levitsky "nop\n" \ 2838537d39dfSMaxim Levitsky # branch_name "_to:" \ 2839537d39dfSMaxim Levitsky "nop\n" \ 2840537d39dfSMaxim Levitsky ) 2841537d39dfSMaxim Levitsky 2842537d39dfSMaxim Levitsky 2843537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to; 2844537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to; 2845537d39dfSMaxim Levitsky 2846537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to; 2847537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to; 2848537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to; 2849537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to; 2850537d39dfSMaxim Levitsky 2851537d39dfSMaxim Levitsky u64 dbgctl; 2852537d39dfSMaxim Levitsky 2853537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void) 2854537d39dfSMaxim Levitsky { 2855537d39dfSMaxim Levitsky /* 2856537d39dfSMaxim Levitsky * This guest expects the LBR to be already enabled when it starts, 2857537d39dfSMaxim Levitsky * it does a branch, and then disables the LBR and then checks. 2858537d39dfSMaxim Levitsky */ 2859537d39dfSMaxim Levitsky 2860537d39dfSMaxim Levitsky DO_BRANCH(guest_branch0); 2861537d39dfSMaxim Levitsky 2862537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2863537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2864537d39dfSMaxim Levitsky 2865537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 2866537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2867537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0) 2868537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2869537d39dfSMaxim Levitsky 2870ddb85855SSean Christopherson GUEST_CHECK_LBR(&guest_branch0_from, &guest_branch0_to); 2871537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 2872537d39dfSMaxim Levitsky } 2873537d39dfSMaxim Levitsky 2874537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void) 2875537d39dfSMaxim Levitsky { 2876537d39dfSMaxim Levitsky /* 2877537d39dfSMaxim Levitsky * This guest expects the LBR to be disabled when it starts, 2878537d39dfSMaxim Levitsky * enables it, does a branch, disables it and then checks. 2879537d39dfSMaxim Levitsky */ 2880537d39dfSMaxim Levitsky 2881537d39dfSMaxim Levitsky DO_BRANCH(guest_branch1); 2882537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2883537d39dfSMaxim Levitsky 2884537d39dfSMaxim Levitsky if (dbgctl != 0) 2885537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2886537d39dfSMaxim Levitsky 2887ddb85855SSean Christopherson GUEST_CHECK_LBR(&host_branch2_from, &host_branch2_to); 2888537d39dfSMaxim Levitsky 2889537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2890537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2891537d39dfSMaxim Levitsky DO_BRANCH(guest_branch2); 2892537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2893537d39dfSMaxim Levitsky 2894537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 2895537d39dfSMaxim Levitsky asm volatile("ud2\n"); 2896ddb85855SSean Christopherson GUEST_CHECK_LBR(&guest_branch2_from, &guest_branch2_to); 2897537d39dfSMaxim Levitsky 2898537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 2899537d39dfSMaxim Levitsky } 2900537d39dfSMaxim Levitsky 2901537d39dfSMaxim Levitsky static void svm_lbrv_test0(void) 2902537d39dfSMaxim Levitsky { 2903537d39dfSMaxim Levitsky report(true, "Basic LBR test"); 2904537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2905537d39dfSMaxim Levitsky DO_BRANCH(host_branch0); 2906537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2907537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2908537d39dfSMaxim Levitsky 2909554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR); 2910537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2911554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, 0); 2912537d39dfSMaxim Levitsky 2913ddb85855SSean Christopherson HOST_CHECK_LBR(&host_branch0_from, &host_branch0_to); 2914537d39dfSMaxim Levitsky } 2915537d39dfSMaxim Levitsky 2916537d39dfSMaxim Levitsky static void svm_lbrv_test1(void) 2917537d39dfSMaxim Levitsky { 2918537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)"); 2919537d39dfSMaxim Levitsky 29205200c1f1SSean Christopherson svm_setup_vmrun((u64)svm_lbrv_test_guest1); 2921537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 2922537d39dfSMaxim Levitsky 2923537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2924537d39dfSMaxim Levitsky DO_BRANCH(host_branch1); 2925537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2926537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2927537d39dfSMaxim Levitsky 2928537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 292992098120SSean Christopherson REPORT_GUEST_LBR_ERROR(vmcb); 2930537d39dfSMaxim Levitsky return; 2931537d39dfSMaxim Levitsky } 2932537d39dfSMaxim Levitsky 2933554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, 0); 2934ddb85855SSean Christopherson HOST_CHECK_LBR(&guest_branch0_from, &guest_branch0_to); 2935537d39dfSMaxim Levitsky } 2936537d39dfSMaxim Levitsky 2937537d39dfSMaxim Levitsky static void svm_lbrv_test2(void) 2938537d39dfSMaxim Levitsky { 2939537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)"); 2940537d39dfSMaxim Levitsky 29415200c1f1SSean Christopherson svm_setup_vmrun((u64)svm_lbrv_test_guest2); 2942537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 2943537d39dfSMaxim Levitsky 2944537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2945537d39dfSMaxim Levitsky DO_BRANCH(host_branch2); 2946537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2947537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2948537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2949537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2950537d39dfSMaxim Levitsky 2951537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 295292098120SSean Christopherson REPORT_GUEST_LBR_ERROR(vmcb); 2953537d39dfSMaxim Levitsky return; 2954537d39dfSMaxim Levitsky } 2955537d39dfSMaxim Levitsky 2956554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, 0); 2957ddb85855SSean Christopherson HOST_CHECK_LBR(&guest_branch2_from, &guest_branch2_to); 2958537d39dfSMaxim Levitsky } 2959537d39dfSMaxim Levitsky 2960537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void) 2961537d39dfSMaxim Levitsky { 2962537d39dfSMaxim Levitsky if (!lbrv_supported()) { 2963537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 2964537d39dfSMaxim Levitsky return; 2965537d39dfSMaxim Levitsky } 2966537d39dfSMaxim Levitsky 2967537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)"); 29685200c1f1SSean Christopherson svm_setup_vmrun((u64)svm_lbrv_test_guest1); 2969537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 2970537d39dfSMaxim Levitsky vmcb->save.dbgctl = DEBUGCTLMSR_LBR; 2971537d39dfSMaxim Levitsky 2972537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 2973537d39dfSMaxim Levitsky DO_BRANCH(host_branch3); 2974537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 2975537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 2976537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 2977537d39dfSMaxim Levitsky 2978537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 297992098120SSean Christopherson REPORT_GUEST_LBR_ERROR(vmcb); 2980537d39dfSMaxim Levitsky return; 2981537d39dfSMaxim Levitsky } 2982537d39dfSMaxim Levitsky 2983537d39dfSMaxim Levitsky if (vmcb->save.dbgctl != 0) { 2984537d39dfSMaxim Levitsky report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl); 2985537d39dfSMaxim Levitsky return; 2986537d39dfSMaxim Levitsky } 2987537d39dfSMaxim Levitsky 2988554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR); 2989ddb85855SSean Christopherson HOST_CHECK_LBR(&host_branch3_from, &host_branch3_to); 2990537d39dfSMaxim Levitsky } 29913f27d772SManali Shukla 2992537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void) 2993537d39dfSMaxim Levitsky { 2994537d39dfSMaxim Levitsky if (!lbrv_supported()) { 2995537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 2996537d39dfSMaxim Levitsky return; 2997537d39dfSMaxim Levitsky } 2998537d39dfSMaxim Levitsky 2999537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)"); 30005200c1f1SSean Christopherson svm_setup_vmrun((u64)svm_lbrv_test_guest2); 3001537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 3002537d39dfSMaxim Levitsky 3003537d39dfSMaxim Levitsky vmcb->save.dbgctl = 0; 3004537d39dfSMaxim Levitsky vmcb->save.br_from = (u64)&host_branch2_from; 3005537d39dfSMaxim Levitsky vmcb->save.br_to = (u64)&host_branch2_to; 3006537d39dfSMaxim Levitsky 3007537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3008537d39dfSMaxim Levitsky DO_BRANCH(host_branch4); 3009537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 3010537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3011537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3012537d39dfSMaxim Levitsky 3013537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 301492098120SSean Christopherson REPORT_GUEST_LBR_ERROR(vmcb); 3015537d39dfSMaxim Levitsky return; 3016537d39dfSMaxim Levitsky } 3017537d39dfSMaxim Levitsky 3018554fa461SSean Christopherson TEST_EXPECT_EQ(dbgctl, DEBUGCTLMSR_LBR); 3019ddb85855SSean Christopherson HOST_CHECK_LBR(&host_branch4_from, &host_branch4_to); 3020537d39dfSMaxim Levitsky } 3021537d39dfSMaxim Levitsky 3022c45bccfcSMaxim Levitsky 3023c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception 3024c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works 3025c45bccfcSMaxim Levitsky 3026c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied; 3027c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs) 3028c45bccfcSMaxim Levitsky { 3029c45bccfcSMaxim Levitsky dummy_isr_recevied++; 3030c45bccfcSMaxim Levitsky eoi(); 3031c45bccfcSMaxim Levitsky } 3032c45bccfcSMaxim Levitsky 3033c45bccfcSMaxim Levitsky 3034c45bccfcSMaxim Levitsky static volatile int nmi_recevied; 3035c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs) 3036c45bccfcSMaxim Levitsky { 3037c45bccfcSMaxim Levitsky nmi_recevied++; 3038c45bccfcSMaxim Levitsky } 3039c45bccfcSMaxim Levitsky 3040c45bccfcSMaxim Levitsky 3041c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit) 3042c45bccfcSMaxim Levitsky { 3043c45bccfcSMaxim Levitsky if (counter) 3044c45bccfcSMaxim Levitsky *counter = 0; 3045c45bccfcSMaxim Levitsky 3046c45bccfcSMaxim Levitsky sti(); // host IF value should not matter 304727eeac46SSean Christopherson clgi(); // vmrun will set back GIF to 1 3048c45bccfcSMaxim Levitsky 3049c45bccfcSMaxim Levitsky svm_vmrun(); 3050c45bccfcSMaxim Levitsky 3051c45bccfcSMaxim Levitsky if (counter) 3052c45bccfcSMaxim Levitsky report(!*counter, "No interrupt expected"); 3053c45bccfcSMaxim Levitsky 3054c45bccfcSMaxim Levitsky stgi(); 3055c45bccfcSMaxim Levitsky 3056c45bccfcSMaxim Levitsky if (counter) 3057c45bccfcSMaxim Levitsky report(*counter == 1, "Interrupt is expected"); 3058c45bccfcSMaxim Levitsky 305927eeac46SSean Christopherson report(vmcb->control.exit_code == expected_vmexit, 306027eeac46SSean Christopherson "Wanted VM-Exit reason 0x%x, got 0x%x", 306127eeac46SSean Christopherson expected_vmexit, vmcb->control.exit_code); 3062c45bccfcSMaxim Levitsky report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now"); 3063c45bccfcSMaxim Levitsky cli(); 3064c45bccfcSMaxim Levitsky } 3065c45bccfcSMaxim Levitsky 3066c45bccfcSMaxim Levitsky 3067d0458710SMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enough to trigger an interrupt 3068c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test) 3069c45bccfcSMaxim Levitsky { 3070c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3071c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3072e4007e62SMaxim Levitsky sti_nop(); 3073c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3074c45bccfcSMaxim Levitsky } 3075c45bccfcSMaxim Levitsky 3076c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void) 3077c45bccfcSMaxim Levitsky { 3078c45bccfcSMaxim Levitsky // make a physical interrupt to be pending 3079c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3080c45bccfcSMaxim Levitsky 3081c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3082c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3083c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3084c45bccfcSMaxim Levitsky 3085c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_if_guest); 30862602a896SMaxim Levitsky cli(); 3087c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3088c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3089c45bccfcSMaxim Levitsky } 3090c45bccfcSMaxim Levitsky 3091c45bccfcSMaxim Levitsky 3092c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3093c45bccfcSMaxim Levitsky // if GIF is not intercepted 3094c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test) 3095c45bccfcSMaxim Levitsky { 3096c45bccfcSMaxim Levitsky 3097c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3098c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3099c45bccfcSMaxim Levitsky 3100c45bccfcSMaxim Levitsky // clear GIF and enable IF 3101c45bccfcSMaxim Levitsky // that should still not cause VM exit 3102c45bccfcSMaxim Levitsky clgi(); 3103e4007e62SMaxim Levitsky sti_nop(); 3104c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3105c45bccfcSMaxim Levitsky 3106c45bccfcSMaxim Levitsky stgi(); 3107c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3108c45bccfcSMaxim Levitsky } 3109c45bccfcSMaxim Levitsky 3110c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void) 3111c45bccfcSMaxim Levitsky { 3112c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3113c45bccfcSMaxim Levitsky 3114c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3115c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3116c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3117c45bccfcSMaxim Levitsky 3118c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest); 31192602a896SMaxim Levitsky cli(); 3120c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3121c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3122c45bccfcSMaxim Levitsky } 3123c45bccfcSMaxim Levitsky 3124c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3125c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest 3126c45bccfcSMaxim Levitsky // started running 3127c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test) 3128c45bccfcSMaxim Levitsky { 3129c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3130c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3131c45bccfcSMaxim Levitsky 3132c45bccfcSMaxim Levitsky clgi(); 3133c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3134c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3135c45bccfcSMaxim Levitsky 3136c45bccfcSMaxim Levitsky stgi(); 3137c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3138c45bccfcSMaxim Levitsky } 3139c45bccfcSMaxim Levitsky 3140c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void) 3141c45bccfcSMaxim Levitsky { 3142c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3143c45bccfcSMaxim Levitsky 3144c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3145c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3146c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3147c45bccfcSMaxim Levitsky 3148c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest2); 3149c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3150c45bccfcSMaxim Levitsky } 3151c45bccfcSMaxim Levitsky 3152c45bccfcSMaxim Levitsky 3153c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF 3154c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test) 3155c45bccfcSMaxim Levitsky { 3156c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3157c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3158c45bccfcSMaxim Levitsky cli(); // should have no effect 3159c45bccfcSMaxim Levitsky 3160c45bccfcSMaxim Levitsky clgi(); 3161c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0); 3162e4007e62SMaxim Levitsky sti_nop(); // should have no effect 3163c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3164c45bccfcSMaxim Levitsky 3165c45bccfcSMaxim Levitsky stgi(); 3166c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3167c45bccfcSMaxim Levitsky } 3168c45bccfcSMaxim Levitsky 3169c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void) 3170c45bccfcSMaxim Levitsky { 3171c45bccfcSMaxim Levitsky handle_exception(2, dummy_nmi_handler); 3172c45bccfcSMaxim Levitsky 3173c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_NMI); 3174c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3175c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3176c45bccfcSMaxim Levitsky 3177c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_nmi_guest); 3178c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI); 3179c45bccfcSMaxim Levitsky } 3180c45bccfcSMaxim Levitsky 3181c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF 3182c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang 3183c45bccfcSMaxim Levitsky // and VMexits on SMI 3184c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test) 3185c45bccfcSMaxim Levitsky { 3186c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3187c45bccfcSMaxim Levitsky 3188c45bccfcSMaxim Levitsky clgi(); 3189c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0); 3190e4007e62SMaxim Levitsky sti_nop(); // should have no effect 3191c45bccfcSMaxim Levitsky stgi(); 3192c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3193c45bccfcSMaxim Levitsky } 3194c45bccfcSMaxim Levitsky 3195c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void) 3196c45bccfcSMaxim Levitsky { 3197c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_SMI); 3198c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3199c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_smi_guest); 3200c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI); 3201c45bccfcSMaxim Levitsky } 3202c45bccfcSMaxim Levitsky 32038177dc62SManali Shukla static void svm_l2_ac_test(void) 32048177dc62SManali Shukla { 32058177dc62SManali Shukla bool hit_ac = false; 32068177dc62SManali Shukla 32078177dc62SManali Shukla write_cr0(read_cr0() | X86_CR0_AM); 32088177dc62SManali Shukla write_rflags(read_rflags() | X86_EFLAGS_AC); 32098177dc62SManali Shukla 32108177dc62SManali Shukla run_in_user(generate_usermode_ac, AC_VECTOR, 0, 0, 0, 0, &hit_ac); 32118177dc62SManali Shukla report(hit_ac, "Usermode #AC handled in L2"); 32128177dc62SManali Shukla vmmcall(); 32138177dc62SManali Shukla } 32148177dc62SManali Shukla 32158177dc62SManali Shukla struct svm_exception_test { 32168177dc62SManali Shukla u8 vector; 32178177dc62SManali Shukla void (*guest_code)(void); 32188177dc62SManali Shukla }; 32198177dc62SManali Shukla 32208177dc62SManali Shukla struct svm_exception_test svm_exception_tests[] = { 32218177dc62SManali Shukla { GP_VECTOR, generate_non_canonical_gp }, 32228177dc62SManali Shukla { UD_VECTOR, generate_ud }, 32238177dc62SManali Shukla { DE_VECTOR, generate_de }, 32248177dc62SManali Shukla { DB_VECTOR, generate_single_step_db }, 322544550f53SManali Shukla { BP_VECTOR, generate_bp }, 32268177dc62SManali Shukla { AC_VECTOR, svm_l2_ac_test }, 32270851b7f7SManali Shukla { OF_VECTOR, generate_of }, 3228694e59baSManali Shukla { NM_VECTOR, generate_cr0_ts_nm }, 3229694e59baSManali Shukla { NM_VECTOR, generate_cr0_em_nm }, 32308177dc62SManali Shukla }; 32318177dc62SManali Shukla 32328177dc62SManali Shukla static u8 svm_exception_test_vector; 32338177dc62SManali Shukla 32348177dc62SManali Shukla static void svm_exception_handler(struct ex_regs *regs) 32358177dc62SManali Shukla { 32368177dc62SManali Shukla report(regs->vector == svm_exception_test_vector, 32378177dc62SManali Shukla "Handling %s in L2's exception handler", 32388177dc62SManali Shukla exception_mnemonic(svm_exception_test_vector)); 32398177dc62SManali Shukla vmmcall(); 32408177dc62SManali Shukla } 32418177dc62SManali Shukla 32428177dc62SManali Shukla static void handle_exception_in_l2(u8 vector) 32438177dc62SManali Shukla { 32448177dc62SManali Shukla handler old_handler = handle_exception(vector, svm_exception_handler); 32458177dc62SManali Shukla svm_exception_test_vector = vector; 32468177dc62SManali Shukla 32478177dc62SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL, 32488177dc62SManali Shukla "%s handled by L2", exception_mnemonic(vector)); 32498177dc62SManali Shukla 32508177dc62SManali Shukla handle_exception(vector, old_handler); 32518177dc62SManali Shukla } 32528177dc62SManali Shukla 32538177dc62SManali Shukla static void handle_exception_in_l1(u32 vector) 32548177dc62SManali Shukla { 32558177dc62SManali Shukla u32 old_ie = vmcb->control.intercept_exceptions; 32568177dc62SManali Shukla 32578177dc62SManali Shukla vmcb->control.intercept_exceptions |= (1ULL << vector); 32588177dc62SManali Shukla 32598177dc62SManali Shukla report(svm_vmrun() == (SVM_EXIT_EXCP_BASE + vector), 32608177dc62SManali Shukla "%s handled by L1", exception_mnemonic(vector)); 32618177dc62SManali Shukla 32628177dc62SManali Shukla vmcb->control.intercept_exceptions = old_ie; 32638177dc62SManali Shukla } 32648177dc62SManali Shukla 32658177dc62SManali Shukla static void svm_exception_test(void) 32668177dc62SManali Shukla { 32678177dc62SManali Shukla struct svm_exception_test *t; 32688177dc62SManali Shukla int i; 32698177dc62SManali Shukla 32708177dc62SManali Shukla for (i = 0; i < ARRAY_SIZE(svm_exception_tests); i++) { 32718177dc62SManali Shukla t = &svm_exception_tests[i]; 32728177dc62SManali Shukla test_set_guest((test_guest_func)t->guest_code); 32738177dc62SManali Shukla 32748177dc62SManali Shukla handle_exception_in_l2(t->vector); 32758177dc62SManali Shukla vmcb_ident(vmcb); 32768177dc62SManali Shukla 32778177dc62SManali Shukla handle_exception_in_l1(t->vector); 32788177dc62SManali Shukla vmcb_ident(vmcb); 32798177dc62SManali Shukla } 32808177dc62SManali Shukla } 32818177dc62SManali Shukla 3282c64f24fdSMaxim Levitsky static void shutdown_intercept_test_guest(struct svm_test *test) 3283c64f24fdSMaxim Levitsky { 3284c64f24fdSMaxim Levitsky asm volatile ("ud2"); 3285c64f24fdSMaxim Levitsky report_fail("should not reach here\n"); 3286c64f24fdSMaxim Levitsky 3287c64f24fdSMaxim Levitsky } 3288c64f24fdSMaxim Levitsky 3289c64f24fdSMaxim Levitsky static void svm_shutdown_intercept_test(void) 3290c64f24fdSMaxim Levitsky { 3291c64f24fdSMaxim Levitsky test_set_guest(shutdown_intercept_test_guest); 3292c64f24fdSMaxim Levitsky vmcb->save.idtr.base = (u64)alloc_vpage(); 3293c64f24fdSMaxim Levitsky vmcb->control.intercept |= (1ULL << INTERCEPT_SHUTDOWN); 3294c64f24fdSMaxim Levitsky svm_vmrun(); 3295c64f24fdSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_SHUTDOWN, "shutdown test passed"); 3296c64f24fdSMaxim Levitsky } 3297c64f24fdSMaxim Levitsky 32983f27d772SManali Shukla struct svm_test svm_tests[] = { 3299ad879127SKrish Sadhukhan { "null", default_supported, default_prepare, 3300ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3301ad879127SKrish Sadhukhan default_finished, null_check }, 3302ad879127SKrish Sadhukhan { "vmrun", default_supported, default_prepare, 3303ad879127SKrish Sadhukhan default_prepare_gif_clear, test_vmrun, 3304ad879127SKrish Sadhukhan default_finished, check_vmrun }, 3305ad879127SKrish Sadhukhan { "ioio", default_supported, prepare_ioio, 3306ad879127SKrish Sadhukhan default_prepare_gif_clear, test_ioio, 3307ad879127SKrish Sadhukhan ioio_finished, check_ioio }, 3308ad879127SKrish Sadhukhan { "vmrun intercept check", default_supported, prepare_no_vmrun_int, 3309ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, default_finished, 3310ad879127SKrish Sadhukhan check_no_vmrun_int }, 3311401299a5SPaolo Bonzini { "rsm", default_supported, 3312401299a5SPaolo Bonzini prepare_rsm_intercept, default_prepare_gif_clear, 3313401299a5SPaolo Bonzini test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept }, 3314ad879127SKrish Sadhukhan { "cr3 read intercept", default_supported, 3315ad879127SKrish Sadhukhan prepare_cr3_intercept, default_prepare_gif_clear, 3316ad879127SKrish Sadhukhan test_cr3_intercept, default_finished, check_cr3_intercept }, 3317ad879127SKrish Sadhukhan { "cr3 read nointercept", default_supported, default_prepare, 3318ad879127SKrish Sadhukhan default_prepare_gif_clear, test_cr3_intercept, default_finished, 3319ad879127SKrish Sadhukhan check_cr3_nointercept }, 3320ad879127SKrish Sadhukhan { "cr3 read intercept emulate", smp_supported, 3321ad879127SKrish Sadhukhan prepare_cr3_intercept_bypass, default_prepare_gif_clear, 3322ad879127SKrish Sadhukhan test_cr3_intercept_bypass, default_finished, check_cr3_intercept }, 3323ad879127SKrish Sadhukhan { "dr intercept check", default_supported, prepare_dr_intercept, 3324ad879127SKrish Sadhukhan default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished, 3325ad879127SKrish Sadhukhan check_dr_intercept }, 3326ad879127SKrish Sadhukhan { "next_rip", next_rip_supported, prepare_next_rip, 3327ad879127SKrish Sadhukhan default_prepare_gif_clear, test_next_rip, 3328ad879127SKrish Sadhukhan default_finished, check_next_rip }, 3329ad879127SKrish Sadhukhan { "msr intercept check", default_supported, prepare_msr_intercept, 3330ad879127SKrish Sadhukhan default_prepare_gif_clear, test_msr_intercept, 3331ad879127SKrish Sadhukhan msr_intercept_finished, check_msr_intercept }, 3332ad879127SKrish Sadhukhan { "mode_switch", default_supported, prepare_mode_switch, 3333ad879127SKrish Sadhukhan default_prepare_gif_clear, test_mode_switch, 3334ad879127SKrish Sadhukhan mode_switch_finished, check_mode_switch }, 3335ad879127SKrish Sadhukhan { "asid_zero", default_supported, prepare_asid_zero, 3336ad879127SKrish Sadhukhan default_prepare_gif_clear, test_asid_zero, 3337ad879127SKrish Sadhukhan default_finished, check_asid_zero }, 3338ad879127SKrish Sadhukhan { "sel_cr0_bug", default_supported, sel_cr0_bug_prepare, 3339ad879127SKrish Sadhukhan default_prepare_gif_clear, sel_cr0_bug_test, 3340ad879127SKrish Sadhukhan sel_cr0_bug_finished, sel_cr0_bug_check }, 334110a65fc4SNadav Amit { "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare, 3342ad879127SKrish Sadhukhan default_prepare_gif_clear, tsc_adjust_test, 3343ad879127SKrish Sadhukhan default_finished, tsc_adjust_check }, 3344ad879127SKrish Sadhukhan { "latency_run_exit", default_supported, latency_prepare, 3345ad879127SKrish Sadhukhan default_prepare_gif_clear, latency_test, 3346ad879127SKrish Sadhukhan latency_finished, latency_check }, 3347f7fa53dcSPaolo Bonzini { "latency_run_exit_clean", default_supported, latency_prepare, 3348f7fa53dcSPaolo Bonzini default_prepare_gif_clear, latency_test, 3349f7fa53dcSPaolo Bonzini latency_finished_clean, latency_check }, 3350ad879127SKrish Sadhukhan { "latency_svm_insn", default_supported, lat_svm_insn_prepare, 3351ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3352ad879127SKrish Sadhukhan lat_svm_insn_finished, lat_svm_insn_check }, 33534b4fb247SPaolo Bonzini { "exc_inject", default_supported, exc_inject_prepare, 33544b4fb247SPaolo Bonzini default_prepare_gif_clear, exc_inject_test, 33554b4fb247SPaolo Bonzini exc_inject_finished, exc_inject_check }, 3356ad879127SKrish Sadhukhan { "pending_event", default_supported, pending_event_prepare, 3357ad879127SKrish Sadhukhan default_prepare_gif_clear, 3358ad879127SKrish Sadhukhan pending_event_test, pending_event_finished, pending_event_check }, 335985dc2aceSPaolo Bonzini { "pending_event_cli", default_supported, pending_event_cli_prepare, 336085dc2aceSPaolo Bonzini pending_event_cli_prepare_gif_clear, 336185dc2aceSPaolo Bonzini pending_event_cli_test, pending_event_cli_finished, 336285dc2aceSPaolo Bonzini pending_event_cli_check }, 336385dc2aceSPaolo Bonzini { "interrupt", default_supported, interrupt_prepare, 336485dc2aceSPaolo Bonzini default_prepare_gif_clear, interrupt_test, 336585dc2aceSPaolo Bonzini interrupt_finished, interrupt_check }, 3366d4db486bSCathy Avery { "nmi", default_supported, nmi_prepare, 3367d4db486bSCathy Avery default_prepare_gif_clear, nmi_test, 3368d4db486bSCathy Avery nmi_finished, nmi_check }, 33699da1f4d8SCathy Avery { "nmi_hlt", smp_supported, nmi_prepare, 33709da1f4d8SCathy Avery default_prepare_gif_clear, nmi_hlt_test, 33719da1f4d8SCathy Avery nmi_hlt_finished, nmi_hlt_check }, 337208200397SSantosh Shukla { "vnmi", vnmi_supported, vnmi_prepare, 337308200397SSantosh Shukla default_prepare_gif_clear, vnmi_test, 337408200397SSantosh Shukla vnmi_finished, vnmi_check }, 33759c838954SCathy Avery { "virq_inject", default_supported, virq_inject_prepare, 33769c838954SCathy Avery default_prepare_gif_clear, virq_inject_test, 33779c838954SCathy Avery virq_inject_finished, virq_inject_check }, 33784b3c6114SPaolo Bonzini { "virq_inject_within_shadow", default_supported, virq_inject_within_shadow_prepare, 33794b3c6114SPaolo Bonzini virq_inject_within_shadow_prepare_gif_clear, virq_inject_within_shadow_test, 33804b3c6114SPaolo Bonzini virq_inject_within_shadow_finished, virq_inject_within_shadow_check }, 3381da338a31SMaxim Levitsky { "reg_corruption", default_supported, reg_corruption_prepare, 3382da338a31SMaxim Levitsky default_prepare_gif_clear, reg_corruption_test, 3383da338a31SMaxim Levitsky reg_corruption_finished, reg_corruption_check }, 33844770e9c8SCathy Avery { "svm_init_startup_test", smp_supported, init_startup_prepare, 33854770e9c8SCathy Avery default_prepare_gif_clear, null_test, 33864770e9c8SCathy Avery init_startup_finished, init_startup_check }, 3387d5da6dfeSCathy Avery { "svm_init_intercept_test", smp_supported, init_intercept_prepare, 3388d5da6dfeSCathy Avery default_prepare_gif_clear, init_intercept_test, 3389d5da6dfeSCathy Avery init_intercept_finished, init_intercept_check, .on_vcpu = 2 }, 33907839b0ecSKrish Sadhukhan { "host_rflags", default_supported, host_rflags_prepare, 33917839b0ecSKrish Sadhukhan host_rflags_prepare_gif_clear, host_rflags_test, 33927839b0ecSKrish Sadhukhan host_rflags_finished, host_rflags_check }, 3393f6972bd6SLara Lazier { "vgif", vgif_supported, prepare_vgif_enabled, 3394f6972bd6SLara Lazier default_prepare_gif_clear, test_vgif, vgif_finished, 3395f6972bd6SLara Lazier vgif_check }, 3396f32183f5SJim Mattson TEST(svm_cr4_osxsave_test), 3397ba29942cSKrish Sadhukhan TEST(svm_guest_state_test), 33987a57ef5dSMaxim Levitsky TEST(svm_vmrun_errata_test), 33990b6f6cedSKrish Sadhukhan TEST(svm_vmload_vmsave), 3400665f5677SKrish Sadhukhan TEST(svm_test_singlestep), 3401694e59baSManali Shukla TEST(svm_no_nm_test), 34028177dc62SManali Shukla TEST(svm_exception_test), 3403537d39dfSMaxim Levitsky TEST(svm_lbrv_test0), 3404537d39dfSMaxim Levitsky TEST(svm_lbrv_test1), 3405537d39dfSMaxim Levitsky TEST(svm_lbrv_test2), 3406537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test1), 3407537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test2), 3408c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_if), 3409c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif), 3410c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif2), 3411c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_nmi), 3412c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_smi), 3413a8503d50SMaxim Levitsky TEST(svm_tsc_scale_test), 34148650dffeSMaxim Levitsky TEST(pause_filter_test), 3415c64f24fdSMaxim Levitsky TEST(svm_shutdown_intercept_test), 3416ad879127SKrish Sadhukhan { NULL, NULL, NULL, NULL, NULL, NULL, NULL } 3417ad879127SKrish Sadhukhan }; 3418712840d5SManali Shukla 3419712840d5SManali Shukla int main(int ac, char **av) 3420712840d5SManali Shukla { 3421ade7601dSSean Christopherson setup_vm(); 3422712840d5SManali Shukla return run_svm_tests(ac, av, svm_tests); 3423712840d5SManali Shukla } 3424