xref: /kvm-unit-tests/x86/svm_tests.c (revision 712840d50122f9b9cb7893abdf892b21dc5b88b3)
1ad879127SKrish Sadhukhan #include "svm.h"
2ad879127SKrish Sadhukhan #include "libcflat.h"
3ad879127SKrish Sadhukhan #include "processor.h"
4ad879127SKrish Sadhukhan #include "desc.h"
5ad879127SKrish Sadhukhan #include "msr.h"
6ad879127SKrish Sadhukhan #include "vm.h"
7ad879127SKrish Sadhukhan #include "smp.h"
8ad879127SKrish Sadhukhan #include "types.h"
9ad879127SKrish Sadhukhan #include "alloc_page.h"
10ad879127SKrish Sadhukhan #include "isr.h"
11ad879127SKrish Sadhukhan #include "apic.h"
129da1f4d8SCathy Avery #include "delay.h"
13*712840d5SManali Shukla #include "vmalloc.h"
14ad879127SKrish Sadhukhan 
15ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f
16ad879127SKrish Sadhukhan 
17ad879127SKrish Sadhukhan static void *scratch_page;
18ad879127SKrish Sadhukhan 
19ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000
20ad879127SKrish Sadhukhan 
214770e9c8SCathy Avery extern u16 cpu_online_count;
224770e9c8SCathy Avery 
23ad879127SKrish Sadhukhan u64 tsc_start;
24ad879127SKrish Sadhukhan u64 tsc_end;
25ad879127SKrish Sadhukhan 
26ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum;
27ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum;
28ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum;
29ad879127SKrish Sadhukhan u64 latvmrun_max;
30ad879127SKrish Sadhukhan u64 latvmrun_min;
31ad879127SKrish Sadhukhan u64 latvmexit_max;
32ad879127SKrish Sadhukhan u64 latvmexit_min;
33ad879127SKrish Sadhukhan u64 latvmload_max;
34ad879127SKrish Sadhukhan u64 latvmload_min;
35ad879127SKrish Sadhukhan u64 latvmsave_max;
36ad879127SKrish Sadhukhan u64 latvmsave_min;
37ad879127SKrish Sadhukhan u64 latstgi_max;
38ad879127SKrish Sadhukhan u64 latstgi_min;
39ad879127SKrish Sadhukhan u64 latclgi_max;
40ad879127SKrish Sadhukhan u64 latclgi_min;
41ad879127SKrish Sadhukhan u64 runs;
42ad879127SKrish Sadhukhan 
43ad879127SKrish Sadhukhan static void null_test(struct svm_test *test)
44ad879127SKrish Sadhukhan {
45ad879127SKrish Sadhukhan }
46ad879127SKrish Sadhukhan 
47ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test)
48ad879127SKrish Sadhukhan {
49096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_VMMCALL;
50ad879127SKrish Sadhukhan }
51ad879127SKrish Sadhukhan 
52ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test)
53ad879127SKrish Sadhukhan {
54096cf7feSPaolo Bonzini     vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN);
55ad879127SKrish Sadhukhan }
56ad879127SKrish Sadhukhan 
57ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test)
58ad879127SKrish Sadhukhan {
59096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_ERR;
60ad879127SKrish Sadhukhan }
61ad879127SKrish Sadhukhan 
62ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test)
63ad879127SKrish Sadhukhan {
64096cf7feSPaolo Bonzini     asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb)));
65ad879127SKrish Sadhukhan }
66ad879127SKrish Sadhukhan 
67ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test)
68ad879127SKrish Sadhukhan {
69096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_VMRUN;
70ad879127SKrish Sadhukhan }
71ad879127SKrish Sadhukhan 
72401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test)
73401299a5SPaolo Bonzini {
74401299a5SPaolo Bonzini     default_prepare(test);
75401299a5SPaolo Bonzini     vmcb->control.intercept |= 1 << INTERCEPT_RSM;
76401299a5SPaolo Bonzini     vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR);
77401299a5SPaolo Bonzini }
78401299a5SPaolo Bonzini 
79401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test)
80401299a5SPaolo Bonzini {
81401299a5SPaolo Bonzini     asm volatile ("rsm" : : : "memory");
82401299a5SPaolo Bonzini }
83401299a5SPaolo Bonzini 
84401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test)
85401299a5SPaolo Bonzini {
86401299a5SPaolo Bonzini     return get_test_stage(test) == 2;
87401299a5SPaolo Bonzini }
88401299a5SPaolo Bonzini 
89401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test)
90401299a5SPaolo Bonzini {
91401299a5SPaolo Bonzini     switch (get_test_stage(test)) {
92401299a5SPaolo Bonzini     case 0:
93401299a5SPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_RSM) {
94198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to rsm. Exit reason 0x%x",
95401299a5SPaolo Bonzini                         vmcb->control.exit_code);
96401299a5SPaolo Bonzini             return true;
97401299a5SPaolo Bonzini         }
98401299a5SPaolo Bonzini         vmcb->control.intercept &= ~(1 << INTERCEPT_RSM);
99401299a5SPaolo Bonzini         inc_test_stage(test);
100401299a5SPaolo Bonzini         break;
101401299a5SPaolo Bonzini 
102401299a5SPaolo Bonzini     case 1:
103401299a5SPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) {
104198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to #UD. Exit reason 0x%x",
105401299a5SPaolo Bonzini                         vmcb->control.exit_code);
106401299a5SPaolo Bonzini             return true;
107401299a5SPaolo Bonzini         }
108401299a5SPaolo Bonzini         vmcb->save.rip += 2;
109401299a5SPaolo Bonzini         inc_test_stage(test);
110401299a5SPaolo Bonzini         break;
111401299a5SPaolo Bonzini 
112401299a5SPaolo Bonzini     default:
113401299a5SPaolo Bonzini         return true;
114401299a5SPaolo Bonzini     }
115401299a5SPaolo Bonzini     return get_test_stage(test) == 2;
116401299a5SPaolo Bonzini }
117401299a5SPaolo Bonzini 
118ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test)
119ad879127SKrish Sadhukhan {
120ad879127SKrish Sadhukhan     default_prepare(test);
121096cf7feSPaolo Bonzini     vmcb->control.intercept_cr_read |= 1 << 3;
122ad879127SKrish Sadhukhan }
123ad879127SKrish Sadhukhan 
124ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test)
125ad879127SKrish Sadhukhan {
126ad879127SKrish Sadhukhan     asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory");
127ad879127SKrish Sadhukhan }
128ad879127SKrish Sadhukhan 
129ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test)
130ad879127SKrish Sadhukhan {
131096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_READ_CR3;
132ad879127SKrish Sadhukhan }
133ad879127SKrish Sadhukhan 
134ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test)
135ad879127SKrish Sadhukhan {
136ad879127SKrish Sadhukhan     return null_check(test) && test->scratch == read_cr3();
137ad879127SKrish Sadhukhan }
138ad879127SKrish Sadhukhan 
139ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test)
140ad879127SKrish Sadhukhan {
141ad879127SKrish Sadhukhan     struct svm_test *test = _test;
142ad879127SKrish Sadhukhan     extern volatile u32 mmio_insn;
143ad879127SKrish Sadhukhan 
144ad879127SKrish Sadhukhan     while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2))
145ad879127SKrish Sadhukhan         pause();
146ad879127SKrish Sadhukhan     pause();
147ad879127SKrish Sadhukhan     pause();
148ad879127SKrish Sadhukhan     pause();
149ad879127SKrish Sadhukhan     mmio_insn = 0x90d8200f;  // mov %cr3, %rax; nop
150ad879127SKrish Sadhukhan }
151ad879127SKrish Sadhukhan 
152ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test)
153ad879127SKrish Sadhukhan {
154ad879127SKrish Sadhukhan     default_prepare(test);
155096cf7feSPaolo Bonzini     vmcb->control.intercept_cr_read |= 1 << 3;
156ad879127SKrish Sadhukhan     on_cpu_async(1, corrupt_cr3_intercept_bypass, test);
157ad879127SKrish Sadhukhan }
158ad879127SKrish Sadhukhan 
159ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test)
160ad879127SKrish Sadhukhan {
161ad879127SKrish Sadhukhan     ulong a = 0xa0000;
162ad879127SKrish Sadhukhan 
163ad879127SKrish Sadhukhan     test->scratch = 1;
164ad879127SKrish Sadhukhan     while (test->scratch != 2)
165ad879127SKrish Sadhukhan         barrier();
166ad879127SKrish Sadhukhan 
167ad879127SKrish Sadhukhan     asm volatile ("mmio_insn: mov %0, (%0); nop"
168ad879127SKrish Sadhukhan                   : "+a"(a) : : "memory");
169ad879127SKrish Sadhukhan     test->scratch = a;
170ad879127SKrish Sadhukhan }
171ad879127SKrish Sadhukhan 
172ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test)
173ad879127SKrish Sadhukhan {
174ad879127SKrish Sadhukhan     default_prepare(test);
175096cf7feSPaolo Bonzini     vmcb->control.intercept_dr_read = 0xff;
176096cf7feSPaolo Bonzini     vmcb->control.intercept_dr_write = 0xff;
177ad879127SKrish Sadhukhan }
178ad879127SKrish Sadhukhan 
179ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test)
180ad879127SKrish Sadhukhan {
181ad879127SKrish Sadhukhan     unsigned int i, failcnt = 0;
182ad879127SKrish Sadhukhan 
183ad879127SKrish Sadhukhan     /* Loop testing debug register reads */
184ad879127SKrish Sadhukhan     for (i = 0; i < 8; i++) {
185ad879127SKrish Sadhukhan 
186ad879127SKrish Sadhukhan         switch (i) {
187ad879127SKrish Sadhukhan         case 0:
188ad879127SKrish Sadhukhan             asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory");
189ad879127SKrish Sadhukhan             break;
190ad879127SKrish Sadhukhan         case 1:
191ad879127SKrish Sadhukhan             asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory");
192ad879127SKrish Sadhukhan             break;
193ad879127SKrish Sadhukhan         case 2:
194ad879127SKrish Sadhukhan             asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory");
195ad879127SKrish Sadhukhan             break;
196ad879127SKrish Sadhukhan         case 3:
197ad879127SKrish Sadhukhan             asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory");
198ad879127SKrish Sadhukhan             break;
199ad879127SKrish Sadhukhan         case 4:
200ad879127SKrish Sadhukhan             asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory");
201ad879127SKrish Sadhukhan             break;
202ad879127SKrish Sadhukhan         case 5:
203ad879127SKrish Sadhukhan             asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory");
204ad879127SKrish Sadhukhan             break;
205ad879127SKrish Sadhukhan         case 6:
206ad879127SKrish Sadhukhan             asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory");
207ad879127SKrish Sadhukhan             break;
208ad879127SKrish Sadhukhan         case 7:
209ad879127SKrish Sadhukhan             asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory");
210ad879127SKrish Sadhukhan             break;
211ad879127SKrish Sadhukhan         }
212ad879127SKrish Sadhukhan 
213ad879127SKrish Sadhukhan         if (test->scratch != i) {
214198dfd0eSJanis Schoetterl-Glausch             report_fail("dr%u read intercept", i);
215ad879127SKrish Sadhukhan             failcnt++;
216ad879127SKrish Sadhukhan         }
217ad879127SKrish Sadhukhan     }
218ad879127SKrish Sadhukhan 
219ad879127SKrish Sadhukhan     /* Loop testing debug register writes */
220ad879127SKrish Sadhukhan     for (i = 0; i < 8; i++) {
221ad879127SKrish Sadhukhan 
222ad879127SKrish Sadhukhan         switch (i) {
223ad879127SKrish Sadhukhan         case 0:
224ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory");
225ad879127SKrish Sadhukhan             break;
226ad879127SKrish Sadhukhan         case 1:
227ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory");
228ad879127SKrish Sadhukhan             break;
229ad879127SKrish Sadhukhan         case 2:
230ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory");
231ad879127SKrish Sadhukhan             break;
232ad879127SKrish Sadhukhan         case 3:
233ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory");
234ad879127SKrish Sadhukhan             break;
235ad879127SKrish Sadhukhan         case 4:
236ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory");
237ad879127SKrish Sadhukhan             break;
238ad879127SKrish Sadhukhan         case 5:
239ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory");
240ad879127SKrish Sadhukhan             break;
241ad879127SKrish Sadhukhan         case 6:
242ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory");
243ad879127SKrish Sadhukhan             break;
244ad879127SKrish Sadhukhan         case 7:
245ad879127SKrish Sadhukhan             asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory");
246ad879127SKrish Sadhukhan             break;
247ad879127SKrish Sadhukhan         }
248ad879127SKrish Sadhukhan 
249ad879127SKrish Sadhukhan         if (test->scratch != i) {
250198dfd0eSJanis Schoetterl-Glausch             report_fail("dr%u write intercept", i);
251ad879127SKrish Sadhukhan             failcnt++;
252ad879127SKrish Sadhukhan         }
253ad879127SKrish Sadhukhan     }
254ad879127SKrish Sadhukhan 
255ad879127SKrish Sadhukhan     test->scratch = failcnt;
256ad879127SKrish Sadhukhan }
257ad879127SKrish Sadhukhan 
258ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test)
259ad879127SKrish Sadhukhan {
260096cf7feSPaolo Bonzini     ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0);
261ad879127SKrish Sadhukhan 
262ad879127SKrish Sadhukhan     /* Only expect DR intercepts */
263ad879127SKrish Sadhukhan     if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0))
264ad879127SKrish Sadhukhan         return true;
265ad879127SKrish Sadhukhan 
266ad879127SKrish Sadhukhan     /*
267ad879127SKrish Sadhukhan      * Compute debug register number.
268ad879127SKrish Sadhukhan      * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture
269ad879127SKrish Sadhukhan      * Programmer's Manual Volume 2 - System Programming:
270ad879127SKrish Sadhukhan      * http://support.amd.com/TechDocs/24593.pdf
271ad879127SKrish Sadhukhan      * there are 16 VMEXIT codes each for DR read and write.
272ad879127SKrish Sadhukhan      */
273ad879127SKrish Sadhukhan     test->scratch = (n % 16);
274ad879127SKrish Sadhukhan 
275ad879127SKrish Sadhukhan     /* Jump over MOV instruction */
276096cf7feSPaolo Bonzini     vmcb->save.rip += 3;
277ad879127SKrish Sadhukhan 
278ad879127SKrish Sadhukhan     return false;
279ad879127SKrish Sadhukhan }
280ad879127SKrish Sadhukhan 
281ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test)
282ad879127SKrish Sadhukhan {
283ad879127SKrish Sadhukhan     return !test->scratch;
284ad879127SKrish Sadhukhan }
285ad879127SKrish Sadhukhan 
286ad879127SKrish Sadhukhan static bool next_rip_supported(void)
287ad879127SKrish Sadhukhan {
288ad879127SKrish Sadhukhan     return this_cpu_has(X86_FEATURE_NRIPS);
289ad879127SKrish Sadhukhan }
290ad879127SKrish Sadhukhan 
291ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test)
292ad879127SKrish Sadhukhan {
293096cf7feSPaolo Bonzini     vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC);
294ad879127SKrish Sadhukhan }
295ad879127SKrish Sadhukhan 
296ad879127SKrish Sadhukhan 
297ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test)
298ad879127SKrish Sadhukhan {
299ad879127SKrish Sadhukhan     asm volatile ("rdtsc\n\t"
300ad879127SKrish Sadhukhan                   ".globl exp_next_rip\n\t"
301ad879127SKrish Sadhukhan                   "exp_next_rip:\n\t" ::: "eax", "edx");
302ad879127SKrish Sadhukhan }
303ad879127SKrish Sadhukhan 
304ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test)
305ad879127SKrish Sadhukhan {
306ad879127SKrish Sadhukhan     extern char exp_next_rip;
307ad879127SKrish Sadhukhan     unsigned long address = (unsigned long)&exp_next_rip;
308ad879127SKrish Sadhukhan 
309096cf7feSPaolo Bonzini     return address == vmcb->control.next_rip;
310ad879127SKrish Sadhukhan }
311ad879127SKrish Sadhukhan 
312ad879127SKrish Sadhukhan extern u8 *msr_bitmap;
313ad879127SKrish Sadhukhan 
314ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test)
315ad879127SKrish Sadhukhan {
316ad879127SKrish Sadhukhan     default_prepare(test);
317096cf7feSPaolo Bonzini     vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT);
318096cf7feSPaolo Bonzini     vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR);
319ad879127SKrish Sadhukhan     memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE);
320ad879127SKrish Sadhukhan }
321ad879127SKrish Sadhukhan 
322ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test)
323ad879127SKrish Sadhukhan {
324ad879127SKrish Sadhukhan     unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */
325ad879127SKrish Sadhukhan     unsigned long msr_index;
326ad879127SKrish Sadhukhan 
327ad879127SKrish Sadhukhan     for (msr_index = 0; msr_index <= 0xc0011fff; msr_index++) {
328ad879127SKrish Sadhukhan         if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) {
329ad879127SKrish Sadhukhan             /*
330ad879127SKrish Sadhukhan              * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture
331ad879127SKrish Sadhukhan              * Programmer's Manual volume 2 - System Programming:
332ad879127SKrish Sadhukhan              * http://support.amd.com/TechDocs/24593.pdf
333ad879127SKrish Sadhukhan              * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR.
334ad879127SKrish Sadhukhan              */
335ad879127SKrish Sadhukhan             continue;
336ad879127SKrish Sadhukhan         }
337ad879127SKrish Sadhukhan 
338ad879127SKrish Sadhukhan         /* Skips gaps between supported MSR ranges */
339ad879127SKrish Sadhukhan         if (msr_index == 0x2000)
340ad879127SKrish Sadhukhan             msr_index = 0xc0000000;
341ad879127SKrish Sadhukhan         else if (msr_index == 0xc0002000)
342ad879127SKrish Sadhukhan             msr_index = 0xc0010000;
343ad879127SKrish Sadhukhan 
344ad879127SKrish Sadhukhan         test->scratch = -1;
345ad879127SKrish Sadhukhan 
346ad879127SKrish Sadhukhan         rdmsr(msr_index);
347ad879127SKrish Sadhukhan 
348ad879127SKrish Sadhukhan         /* Check that a read intercept occurred for MSR at msr_index */
349ad879127SKrish Sadhukhan         if (test->scratch != msr_index)
350198dfd0eSJanis Schoetterl-Glausch             report_fail("MSR 0x%lx read intercept", msr_index);
351ad879127SKrish Sadhukhan 
352ad879127SKrish Sadhukhan         /*
353ad879127SKrish Sadhukhan          * Poor man approach to generate a value that
354ad879127SKrish Sadhukhan          * seems arbitrary each time around the loop.
355ad879127SKrish Sadhukhan          */
356ad879127SKrish Sadhukhan         msr_value += (msr_value << 1);
357ad879127SKrish Sadhukhan 
358ad879127SKrish Sadhukhan         wrmsr(msr_index, msr_value);
359ad879127SKrish Sadhukhan 
360ad879127SKrish Sadhukhan         /* Check that a write intercept occurred for MSR with msr_value */
361ad879127SKrish Sadhukhan         if (test->scratch != msr_value)
362198dfd0eSJanis Schoetterl-Glausch             report_fail("MSR 0x%lx write intercept", msr_index);
363ad879127SKrish Sadhukhan     }
364ad879127SKrish Sadhukhan 
365ad879127SKrish Sadhukhan     test->scratch = -2;
366ad879127SKrish Sadhukhan }
367ad879127SKrish Sadhukhan 
368ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test)
369ad879127SKrish Sadhukhan {
370096cf7feSPaolo Bonzini     u32 exit_code = vmcb->control.exit_code;
371ad879127SKrish Sadhukhan     u64 exit_info_1;
372ad879127SKrish Sadhukhan     u8 *opcode;
373ad879127SKrish Sadhukhan 
374ad879127SKrish Sadhukhan     if (exit_code == SVM_EXIT_MSR) {
375096cf7feSPaolo Bonzini         exit_info_1 = vmcb->control.exit_info_1;
376ad879127SKrish Sadhukhan     } else {
377ad879127SKrish Sadhukhan         /*
378ad879127SKrish Sadhukhan          * If #GP exception occurs instead, check that it was
379ad879127SKrish Sadhukhan          * for RDMSR/WRMSR and set exit_info_1 accordingly.
380ad879127SKrish Sadhukhan          */
381ad879127SKrish Sadhukhan 
382ad879127SKrish Sadhukhan         if (exit_code != (SVM_EXIT_EXCP_BASE + GP_VECTOR))
383ad879127SKrish Sadhukhan             return true;
384ad879127SKrish Sadhukhan 
385096cf7feSPaolo Bonzini         opcode = (u8 *)vmcb->save.rip;
386ad879127SKrish Sadhukhan         if (opcode[0] != 0x0f)
387ad879127SKrish Sadhukhan             return true;
388ad879127SKrish Sadhukhan 
389ad879127SKrish Sadhukhan         switch (opcode[1]) {
390ad879127SKrish Sadhukhan         case 0x30: /* WRMSR */
391ad879127SKrish Sadhukhan             exit_info_1 = 1;
392ad879127SKrish Sadhukhan             break;
393ad879127SKrish Sadhukhan         case 0x32: /* RDMSR */
394ad879127SKrish Sadhukhan             exit_info_1 = 0;
395ad879127SKrish Sadhukhan             break;
396ad879127SKrish Sadhukhan         default:
397ad879127SKrish Sadhukhan             return true;
398ad879127SKrish Sadhukhan         }
399ad879127SKrish Sadhukhan 
400ad879127SKrish Sadhukhan         /*
401912c0d72SThomas Huth          * Warn that #GP exception occurred instead.
402ad879127SKrish Sadhukhan          * RCX holds the MSR index.
403ad879127SKrish Sadhukhan          */
404ad879127SKrish Sadhukhan         printf("%s 0x%lx #GP exception\n",
405ad879127SKrish Sadhukhan             exit_info_1 ? "WRMSR" : "RDMSR", get_regs().rcx);
406ad879127SKrish Sadhukhan     }
407ad879127SKrish Sadhukhan 
408ad879127SKrish Sadhukhan     /* Jump over RDMSR/WRMSR instruction */
409096cf7feSPaolo Bonzini     vmcb->save.rip += 2;
410ad879127SKrish Sadhukhan 
411ad879127SKrish Sadhukhan     /*
412ad879127SKrish Sadhukhan      * Test whether the intercept was for RDMSR/WRMSR.
413ad879127SKrish Sadhukhan      * For RDMSR, test->scratch is set to the MSR index;
414ad879127SKrish Sadhukhan      *      RCX holds the MSR index.
415ad879127SKrish Sadhukhan      * For WRMSR, test->scratch is set to the MSR value;
416ad879127SKrish Sadhukhan      *      RDX holds the upper 32 bits of the MSR value,
417ad879127SKrish Sadhukhan      *      while RAX hold its lower 32 bits.
418ad879127SKrish Sadhukhan      */
419ad879127SKrish Sadhukhan     if (exit_info_1)
420ad879127SKrish Sadhukhan         test->scratch =
421096cf7feSPaolo Bonzini             ((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff));
422ad879127SKrish Sadhukhan     else
423ad879127SKrish Sadhukhan         test->scratch = get_regs().rcx;
424ad879127SKrish Sadhukhan 
425ad879127SKrish Sadhukhan     return false;
426ad879127SKrish Sadhukhan }
427ad879127SKrish Sadhukhan 
428ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test)
429ad879127SKrish Sadhukhan {
430ad879127SKrish Sadhukhan     memset(msr_bitmap, 0, MSR_BITMAP_SIZE);
431ad879127SKrish Sadhukhan     return (test->scratch == -2);
432ad879127SKrish Sadhukhan }
433ad879127SKrish Sadhukhan 
434ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test)
435ad879127SKrish Sadhukhan {
436096cf7feSPaolo Bonzini     vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR)
437ad879127SKrish Sadhukhan                                              |  (1ULL << UD_VECTOR)
438ad879127SKrish Sadhukhan                                              |  (1ULL << DF_VECTOR)
439ad879127SKrish Sadhukhan                                              |  (1ULL << PF_VECTOR);
440ad879127SKrish Sadhukhan     test->scratch = 0;
441ad879127SKrish Sadhukhan }
442ad879127SKrish Sadhukhan 
443ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test)
444ad879127SKrish Sadhukhan {
445ad879127SKrish Sadhukhan     asm volatile("	cli\n"
446ad879127SKrish Sadhukhan 		 "	ljmp *1f\n" /* jump to 32-bit code segment */
447ad879127SKrish Sadhukhan 		 "1:\n"
448ad879127SKrish Sadhukhan 		 "	.long 2f\n"
449ad879127SKrish Sadhukhan 		 "	.long " xstr(KERNEL_CS32) "\n"
450ad879127SKrish Sadhukhan 		 ".code32\n"
451ad879127SKrish Sadhukhan 		 "2:\n"
452ad879127SKrish Sadhukhan 		 "	movl %%cr0, %%eax\n"
453ad879127SKrish Sadhukhan 		 "	btcl  $31, %%eax\n" /* clear PG */
454ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr0\n"
455ad879127SKrish Sadhukhan 		 "	movl $0xc0000080, %%ecx\n" /* EFER */
456ad879127SKrish Sadhukhan 		 "	rdmsr\n"
457ad879127SKrish Sadhukhan 		 "	btcl $8, %%eax\n" /* clear LME */
458ad879127SKrish Sadhukhan 		 "	wrmsr\n"
459ad879127SKrish Sadhukhan 		 "	movl %%cr4, %%eax\n"
460ad879127SKrish Sadhukhan 		 "	btcl $5, %%eax\n" /* clear PAE */
461ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr4\n"
462ad879127SKrish Sadhukhan 		 "	movw %[ds16], %%ax\n"
463ad879127SKrish Sadhukhan 		 "	movw %%ax, %%ds\n"
464ad879127SKrish Sadhukhan 		 "	ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */
465ad879127SKrish Sadhukhan 		 ".code16\n"
466ad879127SKrish Sadhukhan 		 "3:\n"
467ad879127SKrish Sadhukhan 		 "	movl %%cr0, %%eax\n"
468ad879127SKrish Sadhukhan 		 "	btcl $0, %%eax\n" /* clear PE  */
469ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr0\n"
470ad879127SKrish Sadhukhan 		 "	ljmpl $0, $4f\n"   /* jump to real-mode */
471ad879127SKrish Sadhukhan 		 "4:\n"
472ad879127SKrish Sadhukhan 		 "	vmmcall\n"
473ad879127SKrish Sadhukhan 		 "	movl %%cr0, %%eax\n"
474ad879127SKrish Sadhukhan 		 "	btsl $0, %%eax\n" /* set PE  */
475ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr0\n"
476ad879127SKrish Sadhukhan 		 "	ljmpl %[cs32], $5f\n" /* back to protected mode */
477ad879127SKrish Sadhukhan 		 ".code32\n"
478ad879127SKrish Sadhukhan 		 "5:\n"
479ad879127SKrish Sadhukhan 		 "	movl %%cr4, %%eax\n"
480ad879127SKrish Sadhukhan 		 "	btsl $5, %%eax\n" /* set PAE */
481ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr4\n"
482ad879127SKrish Sadhukhan 		 "	movl $0xc0000080, %%ecx\n" /* EFER */
483ad879127SKrish Sadhukhan 		 "	rdmsr\n"
484ad879127SKrish Sadhukhan 		 "	btsl $8, %%eax\n" /* set LME */
485ad879127SKrish Sadhukhan 		 "	wrmsr\n"
486ad879127SKrish Sadhukhan 		 "	movl %%cr0, %%eax\n"
487ad879127SKrish Sadhukhan 		 "	btsl  $31, %%eax\n" /* set PG */
488ad879127SKrish Sadhukhan 		 "	movl %%eax, %%cr0\n"
489ad879127SKrish Sadhukhan 		 "	ljmpl %[cs64], $6f\n"    /* back to long mode */
490ad879127SKrish Sadhukhan 		 ".code64\n\t"
491ad879127SKrish Sadhukhan 		 "6:\n"
492ad879127SKrish Sadhukhan 		 "	vmmcall\n"
493ad879127SKrish Sadhukhan 		 :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16),
494ad879127SKrish Sadhukhan 		    [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64)
495ad879127SKrish Sadhukhan 		 : "rax", "rbx", "rcx", "rdx", "memory");
496ad879127SKrish Sadhukhan }
497ad879127SKrish Sadhukhan 
498ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test)
499ad879127SKrish Sadhukhan {
500ad879127SKrish Sadhukhan     u64 cr0, cr4, efer;
501ad879127SKrish Sadhukhan 
502096cf7feSPaolo Bonzini     cr0  = vmcb->save.cr0;
503096cf7feSPaolo Bonzini     cr4  = vmcb->save.cr4;
504096cf7feSPaolo Bonzini     efer = vmcb->save.efer;
505ad879127SKrish Sadhukhan 
506ad879127SKrish Sadhukhan     /* Only expect VMMCALL intercepts */
507096cf7feSPaolo Bonzini     if (vmcb->control.exit_code != SVM_EXIT_VMMCALL)
508ad879127SKrish Sadhukhan 	    return true;
509ad879127SKrish Sadhukhan 
510ad879127SKrish Sadhukhan     /* Jump over VMMCALL instruction */
511096cf7feSPaolo Bonzini     vmcb->save.rip += 3;
512ad879127SKrish Sadhukhan 
513ad879127SKrish Sadhukhan     /* Do sanity checks */
514ad879127SKrish Sadhukhan     switch (test->scratch) {
515ad879127SKrish Sadhukhan     case 0:
516ad879127SKrish Sadhukhan         /* Test should be in real mode now - check for this */
517ad879127SKrish Sadhukhan         if ((cr0  & 0x80000001) || /* CR0.PG, CR0.PE */
518ad879127SKrish Sadhukhan             (cr4  & 0x00000020) || /* CR4.PAE */
519ad879127SKrish Sadhukhan             (efer & 0x00000500))   /* EFER.LMA, EFER.LME */
520ad879127SKrish Sadhukhan                 return true;
521ad879127SKrish Sadhukhan         break;
522ad879127SKrish Sadhukhan     case 2:
523ad879127SKrish Sadhukhan         /* Test should be back in long-mode now - check for this */
524ad879127SKrish Sadhukhan         if (((cr0  & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */
525ad879127SKrish Sadhukhan             ((cr4  & 0x00000020) != 0x00000020) || /* CR4.PAE */
526ad879127SKrish Sadhukhan             ((efer & 0x00000500) != 0x00000500))   /* EFER.LMA, EFER.LME */
527ad879127SKrish Sadhukhan 		    return true;
528ad879127SKrish Sadhukhan 	break;
529ad879127SKrish Sadhukhan     }
530ad879127SKrish Sadhukhan 
531ad879127SKrish Sadhukhan     /* one step forward */
532ad879127SKrish Sadhukhan     test->scratch += 1;
533ad879127SKrish Sadhukhan 
534ad879127SKrish Sadhukhan     return test->scratch == 2;
535ad879127SKrish Sadhukhan }
536ad879127SKrish Sadhukhan 
537ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test)
538ad879127SKrish Sadhukhan {
539ad879127SKrish Sadhukhan 	return test->scratch == 2;
540ad879127SKrish Sadhukhan }
541ad879127SKrish Sadhukhan 
542ad879127SKrish Sadhukhan extern u8 *io_bitmap;
543ad879127SKrish Sadhukhan 
544ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test)
545ad879127SKrish Sadhukhan {
546096cf7feSPaolo Bonzini     vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT);
547ad879127SKrish Sadhukhan     test->scratch = 0;
548ad879127SKrish Sadhukhan     memset(io_bitmap, 0, 8192);
549ad879127SKrish Sadhukhan     io_bitmap[8192] = 0xFF;
550ad879127SKrish Sadhukhan }
551ad879127SKrish Sadhukhan 
552ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test)
553ad879127SKrish Sadhukhan {
554ad879127SKrish Sadhukhan     // stage 0, test IO pass
555ad879127SKrish Sadhukhan     inb(0x5000);
556ad879127SKrish Sadhukhan     outb(0x0, 0x5000);
557ad879127SKrish Sadhukhan     if (get_test_stage(test) != 0)
558ad879127SKrish Sadhukhan         goto fail;
559ad879127SKrish Sadhukhan 
560ad879127SKrish Sadhukhan     // test IO width, in/out
561ad879127SKrish Sadhukhan     io_bitmap[0] = 0xFF;
562ad879127SKrish Sadhukhan     inc_test_stage(test);
563ad879127SKrish Sadhukhan     inb(0x0);
564ad879127SKrish Sadhukhan     if (get_test_stage(test) != 2)
565ad879127SKrish Sadhukhan         goto fail;
566ad879127SKrish Sadhukhan 
567ad879127SKrish Sadhukhan     outw(0x0, 0x0);
568ad879127SKrish Sadhukhan     if (get_test_stage(test) != 3)
569ad879127SKrish Sadhukhan         goto fail;
570ad879127SKrish Sadhukhan 
571ad879127SKrish Sadhukhan     inl(0x0);
572ad879127SKrish Sadhukhan     if (get_test_stage(test) != 4)
573ad879127SKrish Sadhukhan         goto fail;
574ad879127SKrish Sadhukhan 
575ad879127SKrish Sadhukhan     // test low/high IO port
576ad879127SKrish Sadhukhan     io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
577ad879127SKrish Sadhukhan     inb(0x5000);
578ad879127SKrish Sadhukhan     if (get_test_stage(test) != 5)
579ad879127SKrish Sadhukhan         goto fail;
580ad879127SKrish Sadhukhan 
581ad879127SKrish Sadhukhan     io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8));
582ad879127SKrish Sadhukhan     inw(0x9000);
583ad879127SKrish Sadhukhan     if (get_test_stage(test) != 6)
584ad879127SKrish Sadhukhan         goto fail;
585ad879127SKrish Sadhukhan 
586ad879127SKrish Sadhukhan     // test partial pass
587ad879127SKrish Sadhukhan     io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8));
588ad879127SKrish Sadhukhan     inl(0x4FFF);
589ad879127SKrish Sadhukhan     if (get_test_stage(test) != 7)
590ad879127SKrish Sadhukhan         goto fail;
591ad879127SKrish Sadhukhan 
592ad879127SKrish Sadhukhan     // test across pages
593ad879127SKrish Sadhukhan     inc_test_stage(test);
594ad879127SKrish Sadhukhan     inl(0x7FFF);
595ad879127SKrish Sadhukhan     if (get_test_stage(test) != 8)
596ad879127SKrish Sadhukhan         goto fail;
597ad879127SKrish Sadhukhan 
598ad879127SKrish Sadhukhan     inc_test_stage(test);
599ad879127SKrish Sadhukhan     io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8);
600ad879127SKrish Sadhukhan     inl(0x7FFF);
601ad879127SKrish Sadhukhan     if (get_test_stage(test) != 10)
602ad879127SKrish Sadhukhan         goto fail;
603ad879127SKrish Sadhukhan 
604ad879127SKrish Sadhukhan     io_bitmap[0] = 0;
605ad879127SKrish Sadhukhan     inl(0xFFFF);
606ad879127SKrish Sadhukhan     if (get_test_stage(test) != 11)
607ad879127SKrish Sadhukhan         goto fail;
608ad879127SKrish Sadhukhan 
609ad879127SKrish Sadhukhan     io_bitmap[0] = 0xFF;
610ad879127SKrish Sadhukhan     io_bitmap[8192] = 0;
611ad879127SKrish Sadhukhan     inl(0xFFFF);
612ad879127SKrish Sadhukhan     inc_test_stage(test);
613ad879127SKrish Sadhukhan     if (get_test_stage(test) != 12)
614ad879127SKrish Sadhukhan         goto fail;
615ad879127SKrish Sadhukhan 
616ad879127SKrish Sadhukhan     return;
617ad879127SKrish Sadhukhan 
618ad879127SKrish Sadhukhan fail:
619198dfd0eSJanis Schoetterl-Glausch     report_fail("stage %d", get_test_stage(test));
620ad879127SKrish Sadhukhan     test->scratch = -1;
621ad879127SKrish Sadhukhan }
622ad879127SKrish Sadhukhan 
623ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test)
624ad879127SKrish Sadhukhan {
625ad879127SKrish Sadhukhan     unsigned port, size;
626ad879127SKrish Sadhukhan 
627ad879127SKrish Sadhukhan     /* Only expect IOIO intercepts */
628096cf7feSPaolo Bonzini     if (vmcb->control.exit_code == SVM_EXIT_VMMCALL)
629ad879127SKrish Sadhukhan         return true;
630ad879127SKrish Sadhukhan 
631096cf7feSPaolo Bonzini     if (vmcb->control.exit_code != SVM_EXIT_IOIO)
632ad879127SKrish Sadhukhan         return true;
633ad879127SKrish Sadhukhan 
634ad879127SKrish Sadhukhan     /* one step forward */
635ad879127SKrish Sadhukhan     test->scratch += 1;
636ad879127SKrish Sadhukhan 
637096cf7feSPaolo Bonzini     port = vmcb->control.exit_info_1 >> 16;
638096cf7feSPaolo Bonzini     size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7;
639ad879127SKrish Sadhukhan 
640ad879127SKrish Sadhukhan     while (size--) {
641ad879127SKrish Sadhukhan         io_bitmap[port / 8] &= ~(1 << (port & 7));
642ad879127SKrish Sadhukhan         port++;
643ad879127SKrish Sadhukhan     }
644ad879127SKrish Sadhukhan 
645ad879127SKrish Sadhukhan     return false;
646ad879127SKrish Sadhukhan }
647ad879127SKrish Sadhukhan 
648ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test)
649ad879127SKrish Sadhukhan {
650ad879127SKrish Sadhukhan     memset(io_bitmap, 0, 8193);
651ad879127SKrish Sadhukhan     return test->scratch != -1;
652ad879127SKrish Sadhukhan }
653ad879127SKrish Sadhukhan 
654ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test)
655ad879127SKrish Sadhukhan {
656096cf7feSPaolo Bonzini     vmcb->control.asid = 0;
657ad879127SKrish Sadhukhan }
658ad879127SKrish Sadhukhan 
659ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test)
660ad879127SKrish Sadhukhan {
661ad879127SKrish Sadhukhan     asm volatile ("vmmcall\n\t");
662ad879127SKrish Sadhukhan }
663ad879127SKrish Sadhukhan 
664ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test)
665ad879127SKrish Sadhukhan {
666096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_ERR;
667ad879127SKrish Sadhukhan }
668ad879127SKrish Sadhukhan 
669ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test)
670ad879127SKrish Sadhukhan {
671096cf7feSPaolo Bonzini     vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0);
672ad879127SKrish Sadhukhan }
673ad879127SKrish Sadhukhan 
674ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test)
675ad879127SKrish Sadhukhan {
676ad879127SKrish Sadhukhan 	return true;
677ad879127SKrish Sadhukhan }
678ad879127SKrish Sadhukhan 
679ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test)
680ad879127SKrish Sadhukhan {
681ad879127SKrish Sadhukhan     unsigned long cr0;
682ad879127SKrish Sadhukhan 
683ad879127SKrish Sadhukhan     /* read cr0, clear CD, and write back */
684ad879127SKrish Sadhukhan     cr0  = read_cr0();
685ad879127SKrish Sadhukhan     cr0 |= (1UL << 30);
686ad879127SKrish Sadhukhan     write_cr0(cr0);
687ad879127SKrish Sadhukhan 
688ad879127SKrish Sadhukhan     /*
689ad879127SKrish Sadhukhan      * If we are here the test failed, not sure what to do now because we
690ad879127SKrish Sadhukhan      * are not in guest-mode anymore so we can't trigger an intercept.
691ad879127SKrish Sadhukhan      * Trigger a tripple-fault for now.
692ad879127SKrish Sadhukhan      */
693198dfd0eSJanis Schoetterl-Glausch     report_fail("sel_cr0 test. Can not recover from this - exiting");
694ad879127SKrish Sadhukhan     exit(report_summary());
695ad879127SKrish Sadhukhan }
696ad879127SKrish Sadhukhan 
697ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test)
698ad879127SKrish Sadhukhan {
699096cf7feSPaolo Bonzini     return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE;
700ad879127SKrish Sadhukhan }
701ad879127SKrish Sadhukhan 
702ad879127SKrish Sadhukhan static void npt_nx_prepare(struct svm_test *test)
703ad879127SKrish Sadhukhan {
704ad879127SKrish Sadhukhan     u64 *pte;
705ad879127SKrish Sadhukhan 
7061a0bbf91SSean Christopherson     test->scratch = rdmsr(MSR_EFER);
7071a0bbf91SSean Christopherson     wrmsr(MSR_EFER, test->scratch | EFER_NX);
7081a0bbf91SSean Christopherson 
7093fdf0e6eSSean Christopherson     /* Clear the guest's EFER.NX, it should not affect NPT behavior. */
7103fdf0e6eSSean Christopherson     vmcb->save.efer &= ~EFER_NX;
7113fdf0e6eSSean Christopherson 
712ad879127SKrish Sadhukhan     pte = npt_get_pte((u64)null_test);
713ad879127SKrish Sadhukhan 
7149bb2b6ebSSean Christopherson     *pte |= PT64_NX_MASK;
715ad879127SKrish Sadhukhan }
716ad879127SKrish Sadhukhan 
717ad879127SKrish Sadhukhan static bool npt_nx_check(struct svm_test *test)
718ad879127SKrish Sadhukhan {
719ad879127SKrish Sadhukhan     u64 *pte = npt_get_pte((u64)null_test);
720ad879127SKrish Sadhukhan 
7211a0bbf91SSean Christopherson     wrmsr(MSR_EFER, test->scratch);
7221a0bbf91SSean Christopherson 
7239bb2b6ebSSean Christopherson     *pte &= ~PT64_NX_MASK;
724ad879127SKrish Sadhukhan 
725096cf7feSPaolo Bonzini     return (vmcb->control.exit_code == SVM_EXIT_NPF)
726096cf7feSPaolo Bonzini            && (vmcb->control.exit_info_1 == 0x100000015ULL);
727ad879127SKrish Sadhukhan }
728ad879127SKrish Sadhukhan 
7296faca2a5SKrish Sadhukhan static void npt_np_prepare(struct svm_test *test)
7306faca2a5SKrish Sadhukhan {
7316faca2a5SKrish Sadhukhan     u64 *pte;
7326faca2a5SKrish Sadhukhan 
7336faca2a5SKrish Sadhukhan     scratch_page = alloc_page();
7346faca2a5SKrish Sadhukhan     pte = npt_get_pte((u64)scratch_page);
7356faca2a5SKrish Sadhukhan 
7366faca2a5SKrish Sadhukhan     *pte &= ~1ULL;
7376faca2a5SKrish Sadhukhan }
7386faca2a5SKrish Sadhukhan 
7396faca2a5SKrish Sadhukhan static void npt_np_test(struct svm_test *test)
7406faca2a5SKrish Sadhukhan {
7416faca2a5SKrish Sadhukhan     (void) *(volatile u64 *)scratch_page;
7426faca2a5SKrish Sadhukhan }
7436faca2a5SKrish Sadhukhan 
7446faca2a5SKrish Sadhukhan static bool npt_np_check(struct svm_test *test)
7456faca2a5SKrish Sadhukhan {
7466faca2a5SKrish Sadhukhan     u64 *pte = npt_get_pte((u64)scratch_page);
7476faca2a5SKrish Sadhukhan 
7486faca2a5SKrish Sadhukhan     *pte |= 1ULL;
7496faca2a5SKrish Sadhukhan 
7506faca2a5SKrish Sadhukhan     return (vmcb->control.exit_code == SVM_EXIT_NPF)
7516faca2a5SKrish Sadhukhan            && (vmcb->control.exit_info_1 == 0x100000004ULL);
7526faca2a5SKrish Sadhukhan }
7536faca2a5SKrish Sadhukhan 
754ad879127SKrish Sadhukhan static void npt_us_prepare(struct svm_test *test)
755ad879127SKrish Sadhukhan {
756ad879127SKrish Sadhukhan     u64 *pte;
757ad879127SKrish Sadhukhan 
758ad879127SKrish Sadhukhan     scratch_page = alloc_page();
759ad879127SKrish Sadhukhan     pte = npt_get_pte((u64)scratch_page);
760ad879127SKrish Sadhukhan 
761ad879127SKrish Sadhukhan     *pte &= ~(1ULL << 2);
762ad879127SKrish Sadhukhan }
763ad879127SKrish Sadhukhan 
764ad879127SKrish Sadhukhan static void npt_us_test(struct svm_test *test)
765ad879127SKrish Sadhukhan {
766ad879127SKrish Sadhukhan     (void) *(volatile u64 *)scratch_page;
767ad879127SKrish Sadhukhan }
768ad879127SKrish Sadhukhan 
769ad879127SKrish Sadhukhan static bool npt_us_check(struct svm_test *test)
770ad879127SKrish Sadhukhan {
771ad879127SKrish Sadhukhan     u64 *pte = npt_get_pte((u64)scratch_page);
772ad879127SKrish Sadhukhan 
773ad879127SKrish Sadhukhan     *pte |= (1ULL << 2);
774ad879127SKrish Sadhukhan 
775096cf7feSPaolo Bonzini     return (vmcb->control.exit_code == SVM_EXIT_NPF)
776096cf7feSPaolo Bonzini            && (vmcb->control.exit_info_1 == 0x100000005ULL);
777ad879127SKrish Sadhukhan }
778ad879127SKrish Sadhukhan 
779ad879127SKrish Sadhukhan static void npt_rw_prepare(struct svm_test *test)
780ad879127SKrish Sadhukhan {
781ad879127SKrish Sadhukhan 
782ad879127SKrish Sadhukhan     u64 *pte;
783ad879127SKrish Sadhukhan 
784ad879127SKrish Sadhukhan     pte = npt_get_pte(0x80000);
785ad879127SKrish Sadhukhan 
786ad879127SKrish Sadhukhan     *pte &= ~(1ULL << 1);
787ad879127SKrish Sadhukhan }
788ad879127SKrish Sadhukhan 
789ad879127SKrish Sadhukhan static void npt_rw_test(struct svm_test *test)
790ad879127SKrish Sadhukhan {
791ad879127SKrish Sadhukhan     u64 *data = (void*)(0x80000);
792ad879127SKrish Sadhukhan 
793ad879127SKrish Sadhukhan     *data = 0;
794ad879127SKrish Sadhukhan }
795ad879127SKrish Sadhukhan 
796ad879127SKrish Sadhukhan static bool npt_rw_check(struct svm_test *test)
797ad879127SKrish Sadhukhan {
798ad879127SKrish Sadhukhan     u64 *pte = npt_get_pte(0x80000);
799ad879127SKrish Sadhukhan 
800ad879127SKrish Sadhukhan     *pte |= (1ULL << 1);
801ad879127SKrish Sadhukhan 
802096cf7feSPaolo Bonzini     return (vmcb->control.exit_code == SVM_EXIT_NPF)
803096cf7feSPaolo Bonzini            && (vmcb->control.exit_info_1 == 0x100000007ULL);
804ad879127SKrish Sadhukhan }
805ad879127SKrish Sadhukhan 
806ad879127SKrish Sadhukhan static void npt_rw_pfwalk_prepare(struct svm_test *test)
807ad879127SKrish Sadhukhan {
808ad879127SKrish Sadhukhan 
809ad879127SKrish Sadhukhan     u64 *pte;
810ad879127SKrish Sadhukhan 
811ad879127SKrish Sadhukhan     pte = npt_get_pte(read_cr3());
812ad879127SKrish Sadhukhan 
813ad879127SKrish Sadhukhan     *pte &= ~(1ULL << 1);
814ad879127SKrish Sadhukhan }
815ad879127SKrish Sadhukhan 
816ad879127SKrish Sadhukhan static bool npt_rw_pfwalk_check(struct svm_test *test)
817ad879127SKrish Sadhukhan {
818ad879127SKrish Sadhukhan     u64 *pte = npt_get_pte(read_cr3());
819ad879127SKrish Sadhukhan 
820ad879127SKrish Sadhukhan     *pte |= (1ULL << 1);
821ad879127SKrish Sadhukhan 
822096cf7feSPaolo Bonzini     return (vmcb->control.exit_code == SVM_EXIT_NPF)
823a6051f06SNadav Amit            && (vmcb->control.exit_info_1 == 0x200000007ULL)
824096cf7feSPaolo Bonzini 	   && (vmcb->control.exit_info_2 == read_cr3());
825ad879127SKrish Sadhukhan }
826ad879127SKrish Sadhukhan 
827ad879127SKrish Sadhukhan static void npt_l1mmio_prepare(struct svm_test *test)
828ad879127SKrish Sadhukhan {
829ad879127SKrish Sadhukhan }
830ad879127SKrish Sadhukhan 
831ad879127SKrish Sadhukhan u32 nested_apic_version1;
832ad879127SKrish Sadhukhan u32 nested_apic_version2;
833ad879127SKrish Sadhukhan 
834ad879127SKrish Sadhukhan static void npt_l1mmio_test(struct svm_test *test)
835ad879127SKrish Sadhukhan {
836ad879127SKrish Sadhukhan     volatile u32 *data = (volatile void*)(0xfee00030UL);
837ad879127SKrish Sadhukhan 
838ad879127SKrish Sadhukhan     nested_apic_version1 = *data;
839ad879127SKrish Sadhukhan     nested_apic_version2 = *data;
840ad879127SKrish Sadhukhan }
841ad879127SKrish Sadhukhan 
842ad879127SKrish Sadhukhan static bool npt_l1mmio_check(struct svm_test *test)
843ad879127SKrish Sadhukhan {
844ad879127SKrish Sadhukhan     volatile u32 *data = (volatile void*)(0xfee00030);
845ad879127SKrish Sadhukhan     u32 lvr = *data;
846ad879127SKrish Sadhukhan 
847ad879127SKrish Sadhukhan     return nested_apic_version1 == lvr && nested_apic_version2 == lvr;
848ad879127SKrish Sadhukhan }
849ad879127SKrish Sadhukhan 
850ad879127SKrish Sadhukhan static void npt_rw_l1mmio_prepare(struct svm_test *test)
851ad879127SKrish Sadhukhan {
852ad879127SKrish Sadhukhan 
853ad879127SKrish Sadhukhan     u64 *pte;
854ad879127SKrish Sadhukhan 
855ad879127SKrish Sadhukhan     pte = npt_get_pte(0xfee00080);
856ad879127SKrish Sadhukhan 
857ad879127SKrish Sadhukhan     *pte &= ~(1ULL << 1);
858ad879127SKrish Sadhukhan }
859ad879127SKrish Sadhukhan 
860ad879127SKrish Sadhukhan static void npt_rw_l1mmio_test(struct svm_test *test)
861ad879127SKrish Sadhukhan {
862ad879127SKrish Sadhukhan     volatile u32 *data = (volatile void*)(0xfee00080);
863ad879127SKrish Sadhukhan 
864ad879127SKrish Sadhukhan     *data = *data;
865ad879127SKrish Sadhukhan }
866ad879127SKrish Sadhukhan 
867ad879127SKrish Sadhukhan static bool npt_rw_l1mmio_check(struct svm_test *test)
868ad879127SKrish Sadhukhan {
869ad879127SKrish Sadhukhan     u64 *pte = npt_get_pte(0xfee00080);
870ad879127SKrish Sadhukhan 
871ad879127SKrish Sadhukhan     *pte |= (1ULL << 1);
872ad879127SKrish Sadhukhan 
873096cf7feSPaolo Bonzini     return (vmcb->control.exit_code == SVM_EXIT_NPF)
874096cf7feSPaolo Bonzini            && (vmcb->control.exit_info_1 == 0x100000007ULL);
875ad879127SKrish Sadhukhan }
876ad879127SKrish Sadhukhan 
877ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE    (1ll << 32)
878f3154609SBill Wendling #define TSC_OFFSET_VALUE    (~0ull << 48)
879ad879127SKrish Sadhukhan static bool ok;
880ad879127SKrish Sadhukhan 
88110a65fc4SNadav Amit static bool tsc_adjust_supported(void)
88210a65fc4SNadav Amit {
88310a65fc4SNadav Amit     return this_cpu_has(X86_FEATURE_TSC_ADJUST);
88410a65fc4SNadav Amit }
88510a65fc4SNadav Amit 
886ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test)
887ad879127SKrish Sadhukhan {
888ad879127SKrish Sadhukhan     default_prepare(test);
889096cf7feSPaolo Bonzini     vmcb->control.tsc_offset = TSC_OFFSET_VALUE;
890ad879127SKrish Sadhukhan 
891ad879127SKrish Sadhukhan     wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE);
892ad879127SKrish Sadhukhan     int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
893ad879127SKrish Sadhukhan     ok = adjust == -TSC_ADJUST_VALUE;
894ad879127SKrish Sadhukhan }
895ad879127SKrish Sadhukhan 
896ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test)
897ad879127SKrish Sadhukhan {
898ad879127SKrish Sadhukhan     int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
899ad879127SKrish Sadhukhan     ok &= adjust == -TSC_ADJUST_VALUE;
900ad879127SKrish Sadhukhan 
901ad879127SKrish Sadhukhan     uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE;
902ad879127SKrish Sadhukhan     wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE);
903ad879127SKrish Sadhukhan 
904ad879127SKrish Sadhukhan     adjust = rdmsr(MSR_IA32_TSC_ADJUST);
905ad879127SKrish Sadhukhan     ok &= adjust <= -2 * TSC_ADJUST_VALUE;
906ad879127SKrish Sadhukhan 
907ad879127SKrish Sadhukhan     uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE;
908ad879127SKrish Sadhukhan     ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
909ad879127SKrish Sadhukhan 
910ad879127SKrish Sadhukhan     uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE;
911ad879127SKrish Sadhukhan     ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE;
912ad879127SKrish Sadhukhan }
913ad879127SKrish Sadhukhan 
914ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test)
915ad879127SKrish Sadhukhan {
916ad879127SKrish Sadhukhan     int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST);
917ad879127SKrish Sadhukhan 
918ad879127SKrish Sadhukhan     wrmsr(MSR_IA32_TSC_ADJUST, 0);
919ad879127SKrish Sadhukhan     return ok && adjust <= -2 * TSC_ADJUST_VALUE;
920ad879127SKrish Sadhukhan }
921ad879127SKrish Sadhukhan 
922a8503d50SMaxim Levitsky 
923a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value;
924a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */
925a8503d50SMaxim Levitsky #define TSC_SHIFT 24
926a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10
927a8503d50SMaxim Levitsky 
928a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test)
929a8503d50SMaxim Levitsky {
930a8503d50SMaxim Levitsky     u64 start_tsc = rdtsc();
931a8503d50SMaxim Levitsky 
932a8503d50SMaxim Levitsky     while (rdtsc() - start_tsc < guest_tsc_delay_value)
933a8503d50SMaxim Levitsky         cpu_relax();
934a8503d50SMaxim Levitsky }
935a8503d50SMaxim Levitsky 
936a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration,
937a8503d50SMaxim Levitsky         double tsc_scale, u64 tsc_offset)
938a8503d50SMaxim Levitsky {
939a8503d50SMaxim Levitsky     u64 start_tsc, actual_duration;
940a8503d50SMaxim Levitsky 
941a8503d50SMaxim Levitsky     guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale;
942a8503d50SMaxim Levitsky 
943a8503d50SMaxim Levitsky     test_set_guest(svm_tsc_scale_guest);
944a8503d50SMaxim Levitsky     vmcb->control.tsc_offset = tsc_offset;
945a8503d50SMaxim Levitsky     wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32)));
946a8503d50SMaxim Levitsky 
947a8503d50SMaxim Levitsky     start_tsc = rdtsc();
948a8503d50SMaxim Levitsky 
949a8503d50SMaxim Levitsky     if (svm_vmrun() != SVM_EXIT_VMMCALL)
950a8503d50SMaxim Levitsky         report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code);
951a8503d50SMaxim Levitsky 
952a8503d50SMaxim Levitsky     actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT;
953a8503d50SMaxim Levitsky 
954a8503d50SMaxim Levitsky     report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)",
955a8503d50SMaxim Levitsky             duration, actual_duration);
956a8503d50SMaxim Levitsky }
957a8503d50SMaxim Levitsky 
958a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void)
959a8503d50SMaxim Levitsky {
960a8503d50SMaxim Levitsky     int i;
961a8503d50SMaxim Levitsky 
962a8503d50SMaxim Levitsky     if (!tsc_scale_supported()) {
963a8503d50SMaxim Levitsky         report_skip("TSC scale not supported in the guest");
964a8503d50SMaxim Levitsky         return;
965a8503d50SMaxim Levitsky     }
966a8503d50SMaxim Levitsky 
967a8503d50SMaxim Levitsky     report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT,
968a8503d50SMaxim Levitsky            "initial TSC scale ratio");
969a8503d50SMaxim Levitsky 
970a8503d50SMaxim Levitsky     for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) {
971a8503d50SMaxim Levitsky 
972a8503d50SMaxim Levitsky         double tsc_scale = (double)(rdrand() % 100 + 1) / 10;
973a8503d50SMaxim Levitsky         int duration = rdrand() % 50 + 1;
974a8503d50SMaxim Levitsky         u64 tsc_offset = rdrand();
975a8503d50SMaxim Levitsky 
976a8503d50SMaxim Levitsky         report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld",
977a8503d50SMaxim Levitsky                     duration, (int)(tsc_scale * 100), tsc_offset);
978a8503d50SMaxim Levitsky 
979a8503d50SMaxim Levitsky         svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset);
980a8503d50SMaxim Levitsky     }
981a8503d50SMaxim Levitsky 
982a8503d50SMaxim Levitsky     svm_tsc_scale_run_testcase(50, 255, rdrand());
983a8503d50SMaxim Levitsky     svm_tsc_scale_run_testcase(50, 0.0001, rdrand());
984a8503d50SMaxim Levitsky }
985a8503d50SMaxim Levitsky 
986ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test)
987ad879127SKrish Sadhukhan {
988ad879127SKrish Sadhukhan     default_prepare(test);
989ad879127SKrish Sadhukhan     runs = LATENCY_RUNS;
990ad879127SKrish Sadhukhan     latvmrun_min = latvmexit_min = -1ULL;
991ad879127SKrish Sadhukhan     latvmrun_max = latvmexit_max = 0;
992ad879127SKrish Sadhukhan     vmrun_sum = vmexit_sum = 0;
993ad879127SKrish Sadhukhan     tsc_start = rdtsc();
994ad879127SKrish Sadhukhan }
995ad879127SKrish Sadhukhan 
996ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test)
997ad879127SKrish Sadhukhan {
998ad879127SKrish Sadhukhan     u64 cycles;
999ad879127SKrish Sadhukhan 
1000ad879127SKrish Sadhukhan start:
1001ad879127SKrish Sadhukhan     tsc_end = rdtsc();
1002ad879127SKrish Sadhukhan 
1003ad879127SKrish Sadhukhan     cycles = tsc_end - tsc_start;
1004ad879127SKrish Sadhukhan 
1005ad879127SKrish Sadhukhan     if (cycles > latvmrun_max)
1006ad879127SKrish Sadhukhan         latvmrun_max = cycles;
1007ad879127SKrish Sadhukhan 
1008ad879127SKrish Sadhukhan     if (cycles < latvmrun_min)
1009ad879127SKrish Sadhukhan         latvmrun_min = cycles;
1010ad879127SKrish Sadhukhan 
1011ad879127SKrish Sadhukhan     vmrun_sum += cycles;
1012ad879127SKrish Sadhukhan 
1013ad879127SKrish Sadhukhan     tsc_start = rdtsc();
1014ad879127SKrish Sadhukhan 
1015ad879127SKrish Sadhukhan     asm volatile ("vmmcall" : : : "memory");
1016ad879127SKrish Sadhukhan     goto start;
1017ad879127SKrish Sadhukhan }
1018ad879127SKrish Sadhukhan 
1019ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test)
1020ad879127SKrish Sadhukhan {
1021ad879127SKrish Sadhukhan     u64 cycles;
1022ad879127SKrish Sadhukhan 
1023ad879127SKrish Sadhukhan     tsc_end = rdtsc();
1024ad879127SKrish Sadhukhan 
1025ad879127SKrish Sadhukhan     cycles = tsc_end - tsc_start;
1026ad879127SKrish Sadhukhan 
1027ad879127SKrish Sadhukhan     if (cycles > latvmexit_max)
1028ad879127SKrish Sadhukhan         latvmexit_max = cycles;
1029ad879127SKrish Sadhukhan 
1030ad879127SKrish Sadhukhan     if (cycles < latvmexit_min)
1031ad879127SKrish Sadhukhan         latvmexit_min = cycles;
1032ad879127SKrish Sadhukhan 
1033ad879127SKrish Sadhukhan     vmexit_sum += cycles;
1034ad879127SKrish Sadhukhan 
1035096cf7feSPaolo Bonzini     vmcb->save.rip += 3;
1036ad879127SKrish Sadhukhan 
1037ad879127SKrish Sadhukhan     runs -= 1;
1038ad879127SKrish Sadhukhan 
1039ad879127SKrish Sadhukhan     tsc_end = rdtsc();
1040ad879127SKrish Sadhukhan 
1041ad879127SKrish Sadhukhan     return runs == 0;
1042ad879127SKrish Sadhukhan }
1043ad879127SKrish Sadhukhan 
1044f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test)
1045f7fa53dcSPaolo Bonzini {
1046f7fa53dcSPaolo Bonzini     vmcb->control.clean = VMCB_CLEAN_ALL;
1047f7fa53dcSPaolo Bonzini     return latency_finished(test);
1048f7fa53dcSPaolo Bonzini }
1049f7fa53dcSPaolo Bonzini 
1050ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test)
1051ad879127SKrish Sadhukhan {
1052ad879127SKrish Sadhukhan     printf("    Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max,
1053ad879127SKrish Sadhukhan             latvmrun_min, vmrun_sum / LATENCY_RUNS);
1054ad879127SKrish Sadhukhan     printf("    Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max,
1055ad879127SKrish Sadhukhan             latvmexit_min, vmexit_sum / LATENCY_RUNS);
1056ad879127SKrish Sadhukhan     return true;
1057ad879127SKrish Sadhukhan }
1058ad879127SKrish Sadhukhan 
1059ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test)
1060ad879127SKrish Sadhukhan {
1061ad879127SKrish Sadhukhan     default_prepare(test);
1062ad879127SKrish Sadhukhan     runs = LATENCY_RUNS;
1063ad879127SKrish Sadhukhan     latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL;
1064ad879127SKrish Sadhukhan     latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0;
1065ad879127SKrish Sadhukhan     vmload_sum = vmsave_sum = stgi_sum = clgi_sum;
1066ad879127SKrish Sadhukhan }
1067ad879127SKrish Sadhukhan 
1068ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test)
1069ad879127SKrish Sadhukhan {
1070096cf7feSPaolo Bonzini     u64 vmcb_phys = virt_to_phys(vmcb);
1071ad879127SKrish Sadhukhan     u64 cycles;
1072ad879127SKrish Sadhukhan 
1073ad879127SKrish Sadhukhan     for ( ; runs != 0; runs--) {
1074ad879127SKrish Sadhukhan         tsc_start = rdtsc();
1075ad879127SKrish Sadhukhan         asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory");
1076ad879127SKrish Sadhukhan         cycles = rdtsc() - tsc_start;
1077ad879127SKrish Sadhukhan         if (cycles > latvmload_max)
1078ad879127SKrish Sadhukhan             latvmload_max = cycles;
1079ad879127SKrish Sadhukhan         if (cycles < latvmload_min)
1080ad879127SKrish Sadhukhan             latvmload_min = cycles;
1081ad879127SKrish Sadhukhan         vmload_sum += cycles;
1082ad879127SKrish Sadhukhan 
1083ad879127SKrish Sadhukhan         tsc_start = rdtsc();
1084ad879127SKrish Sadhukhan         asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory");
1085ad879127SKrish Sadhukhan         cycles = rdtsc() - tsc_start;
1086ad879127SKrish Sadhukhan         if (cycles > latvmsave_max)
1087ad879127SKrish Sadhukhan             latvmsave_max = cycles;
1088ad879127SKrish Sadhukhan         if (cycles < latvmsave_min)
1089ad879127SKrish Sadhukhan             latvmsave_min = cycles;
1090ad879127SKrish Sadhukhan         vmsave_sum += cycles;
1091ad879127SKrish Sadhukhan 
1092ad879127SKrish Sadhukhan         tsc_start = rdtsc();
1093ad879127SKrish Sadhukhan         asm volatile("stgi\n\t");
1094ad879127SKrish Sadhukhan         cycles = rdtsc() - tsc_start;
1095ad879127SKrish Sadhukhan         if (cycles > latstgi_max)
1096ad879127SKrish Sadhukhan             latstgi_max = cycles;
1097ad879127SKrish Sadhukhan         if (cycles < latstgi_min)
1098ad879127SKrish Sadhukhan             latstgi_min = cycles;
1099ad879127SKrish Sadhukhan         stgi_sum += cycles;
1100ad879127SKrish Sadhukhan 
1101ad879127SKrish Sadhukhan         tsc_start = rdtsc();
1102ad879127SKrish Sadhukhan         asm volatile("clgi\n\t");
1103ad879127SKrish Sadhukhan         cycles = rdtsc() - tsc_start;
1104ad879127SKrish Sadhukhan         if (cycles > latclgi_max)
1105ad879127SKrish Sadhukhan             latclgi_max = cycles;
1106ad879127SKrish Sadhukhan         if (cycles < latclgi_min)
1107ad879127SKrish Sadhukhan             latclgi_min = cycles;
1108ad879127SKrish Sadhukhan         clgi_sum += cycles;
1109ad879127SKrish Sadhukhan     }
1110ad879127SKrish Sadhukhan 
1111ad879127SKrish Sadhukhan     tsc_end = rdtsc();
1112ad879127SKrish Sadhukhan 
1113ad879127SKrish Sadhukhan     return true;
1114ad879127SKrish Sadhukhan }
1115ad879127SKrish Sadhukhan 
1116ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test)
1117ad879127SKrish Sadhukhan {
1118ad879127SKrish Sadhukhan     printf("    Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max,
1119ad879127SKrish Sadhukhan             latvmload_min, vmload_sum / LATENCY_RUNS);
1120ad879127SKrish Sadhukhan     printf("    Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max,
1121ad879127SKrish Sadhukhan             latvmsave_min, vmsave_sum / LATENCY_RUNS);
1122ad879127SKrish Sadhukhan     printf("    Latency STGI:   max: %ld min: %ld avg: %ld\n", latstgi_max,
1123ad879127SKrish Sadhukhan             latstgi_min, stgi_sum / LATENCY_RUNS);
1124ad879127SKrish Sadhukhan     printf("    Latency CLGI:   max: %ld min: %ld avg: %ld\n", latclgi_max,
1125ad879127SKrish Sadhukhan             latclgi_min, clgi_sum / LATENCY_RUNS);
1126ad879127SKrish Sadhukhan     return true;
1127ad879127SKrish Sadhukhan }
1128ad879127SKrish Sadhukhan 
1129ad879127SKrish Sadhukhan bool pending_event_ipi_fired;
1130ad879127SKrish Sadhukhan bool pending_event_guest_run;
1131ad879127SKrish Sadhukhan 
1132ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs)
1133ad879127SKrish Sadhukhan {
1134ad879127SKrish Sadhukhan     pending_event_ipi_fired = true;
1135ad879127SKrish Sadhukhan     eoi();
1136ad879127SKrish Sadhukhan }
1137ad879127SKrish Sadhukhan 
1138ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test)
1139ad879127SKrish Sadhukhan {
1140ad879127SKrish Sadhukhan     int ipi_vector = 0xf1;
1141ad879127SKrish Sadhukhan 
1142ad879127SKrish Sadhukhan     default_prepare(test);
1143ad879127SKrish Sadhukhan 
1144ad879127SKrish Sadhukhan     pending_event_ipi_fired = false;
1145ad879127SKrish Sadhukhan 
1146ad879127SKrish Sadhukhan     handle_irq(ipi_vector, pending_event_ipi_isr);
1147ad879127SKrish Sadhukhan 
1148ad879127SKrish Sadhukhan     pending_event_guest_run = false;
1149ad879127SKrish Sadhukhan 
1150096cf7feSPaolo Bonzini     vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1151096cf7feSPaolo Bonzini     vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
1152ad879127SKrish Sadhukhan 
1153ad879127SKrish Sadhukhan     apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1154ad879127SKrish Sadhukhan                   APIC_DM_FIXED | ipi_vector, 0);
1155ad879127SKrish Sadhukhan 
1156ad879127SKrish Sadhukhan     set_test_stage(test, 0);
1157ad879127SKrish Sadhukhan }
1158ad879127SKrish Sadhukhan 
1159ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test)
1160ad879127SKrish Sadhukhan {
1161ad879127SKrish Sadhukhan     pending_event_guest_run = true;
1162ad879127SKrish Sadhukhan }
1163ad879127SKrish Sadhukhan 
1164ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test)
1165ad879127SKrish Sadhukhan {
1166ad879127SKrish Sadhukhan     switch (get_test_stage(test)) {
1167ad879127SKrish Sadhukhan     case 0:
1168096cf7feSPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_INTR) {
1169198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x",
1170096cf7feSPaolo Bonzini                         vmcb->control.exit_code);
1171ad879127SKrish Sadhukhan             return true;
1172ad879127SKrish Sadhukhan         }
1173ad879127SKrish Sadhukhan 
1174096cf7feSPaolo Bonzini         vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
1175096cf7feSPaolo Bonzini         vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
1176ad879127SKrish Sadhukhan 
1177ad879127SKrish Sadhukhan         if (pending_event_guest_run) {
1178198dfd0eSJanis Schoetterl-Glausch             report_fail("Guest ran before host received IPI\n");
1179ad879127SKrish Sadhukhan             return true;
1180ad879127SKrish Sadhukhan         }
1181ad879127SKrish Sadhukhan 
1182ad879127SKrish Sadhukhan         irq_enable();
1183ad879127SKrish Sadhukhan         asm volatile ("nop");
1184ad879127SKrish Sadhukhan         irq_disable();
1185ad879127SKrish Sadhukhan 
1186ad879127SKrish Sadhukhan         if (!pending_event_ipi_fired) {
1187198dfd0eSJanis Schoetterl-Glausch             report_fail("Pending interrupt not dispatched after IRQ enabled\n");
1188ad879127SKrish Sadhukhan             return true;
1189ad879127SKrish Sadhukhan         }
1190ad879127SKrish Sadhukhan         break;
1191ad879127SKrish Sadhukhan 
1192ad879127SKrish Sadhukhan     case 1:
1193ad879127SKrish Sadhukhan         if (!pending_event_guest_run) {
1194198dfd0eSJanis Schoetterl-Glausch             report_fail("Guest did not resume when no interrupt\n");
1195ad879127SKrish Sadhukhan             return true;
1196ad879127SKrish Sadhukhan         }
1197ad879127SKrish Sadhukhan         break;
1198ad879127SKrish Sadhukhan     }
1199ad879127SKrish Sadhukhan 
1200ad879127SKrish Sadhukhan     inc_test_stage(test);
1201ad879127SKrish Sadhukhan 
1202ad879127SKrish Sadhukhan     return get_test_stage(test) == 2;
1203ad879127SKrish Sadhukhan }
1204ad879127SKrish Sadhukhan 
1205ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test)
1206ad879127SKrish Sadhukhan {
1207ad879127SKrish Sadhukhan     return get_test_stage(test) == 2;
1208ad879127SKrish Sadhukhan }
1209ad879127SKrish Sadhukhan 
121085dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test)
1211ad879127SKrish Sadhukhan {
1212ad879127SKrish Sadhukhan     default_prepare(test);
1213ad879127SKrish Sadhukhan 
1214ad879127SKrish Sadhukhan     pending_event_ipi_fired = false;
1215ad879127SKrish Sadhukhan 
1216ad879127SKrish Sadhukhan     handle_irq(0xf1, pending_event_ipi_isr);
1217ad879127SKrish Sadhukhan 
1218ad879127SKrish Sadhukhan     apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1219ad879127SKrish Sadhukhan               APIC_DM_FIXED | 0xf1, 0);
1220ad879127SKrish Sadhukhan 
1221ad879127SKrish Sadhukhan     set_test_stage(test, 0);
1222ad879127SKrish Sadhukhan }
1223ad879127SKrish Sadhukhan 
122485dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test)
1225ad879127SKrish Sadhukhan {
1226ad879127SKrish Sadhukhan     asm("cli");
1227ad879127SKrish Sadhukhan }
1228ad879127SKrish Sadhukhan 
122985dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test)
1230ad879127SKrish Sadhukhan {
1231ad879127SKrish Sadhukhan     if (pending_event_ipi_fired == true) {
1232ad879127SKrish Sadhukhan         set_test_stage(test, -1);
1233198dfd0eSJanis Schoetterl-Glausch         report_fail("Interrupt preceeded guest");
1234ad879127SKrish Sadhukhan         vmmcall();
1235ad879127SKrish Sadhukhan     }
1236ad879127SKrish Sadhukhan 
123785dc2aceSPaolo Bonzini     /* VINTR_MASKING is zero.  This should cause the IPI to fire.  */
1238ad879127SKrish Sadhukhan     irq_enable();
1239ad879127SKrish Sadhukhan     asm volatile ("nop");
1240ad879127SKrish Sadhukhan     irq_disable();
1241ad879127SKrish Sadhukhan 
1242ad879127SKrish Sadhukhan     if (pending_event_ipi_fired != true) {
1243ad879127SKrish Sadhukhan         set_test_stage(test, -1);
1244198dfd0eSJanis Schoetterl-Glausch         report_fail("Interrupt not triggered by guest");
1245ad879127SKrish Sadhukhan     }
1246ad879127SKrish Sadhukhan 
1247ad879127SKrish Sadhukhan     vmmcall();
1248ad879127SKrish Sadhukhan 
124985dc2aceSPaolo Bonzini     /*
125085dc2aceSPaolo Bonzini      * Now VINTR_MASKING=1, but no interrupt is pending so
125185dc2aceSPaolo Bonzini      * the VINTR interception should be clear in VMCB02.  Check
125285dc2aceSPaolo Bonzini      * that L0 did not leave a stale VINTR in the VMCB.
125385dc2aceSPaolo Bonzini      */
1254ad879127SKrish Sadhukhan     irq_enable();
1255ad879127SKrish Sadhukhan     asm volatile ("nop");
1256ad879127SKrish Sadhukhan     irq_disable();
1257ad879127SKrish Sadhukhan }
1258ad879127SKrish Sadhukhan 
125985dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test)
1260ad879127SKrish Sadhukhan {
1261096cf7feSPaolo Bonzini     if ( vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1262198dfd0eSJanis Schoetterl-Glausch         report_fail("VM_EXIT return to host is not EXIT_VMMCALL exit reason 0x%x",
1263096cf7feSPaolo Bonzini                     vmcb->control.exit_code);
1264ad879127SKrish Sadhukhan         return true;
1265ad879127SKrish Sadhukhan     }
1266ad879127SKrish Sadhukhan 
1267ad879127SKrish Sadhukhan     switch (get_test_stage(test)) {
1268ad879127SKrish Sadhukhan     case 0:
1269096cf7feSPaolo Bonzini         vmcb->save.rip += 3;
1270ad879127SKrish Sadhukhan 
1271ad879127SKrish Sadhukhan         pending_event_ipi_fired = false;
1272ad879127SKrish Sadhukhan 
1273096cf7feSPaolo Bonzini         vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
1274ad879127SKrish Sadhukhan 
127585dc2aceSPaolo Bonzini 	/* Now entering again with VINTR_MASKING=1.  */
1276ad879127SKrish Sadhukhan         apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL |
1277ad879127SKrish Sadhukhan               APIC_DM_FIXED | 0xf1, 0);
1278ad879127SKrish Sadhukhan 
1279ad879127SKrish Sadhukhan         break;
1280ad879127SKrish Sadhukhan 
1281ad879127SKrish Sadhukhan     case 1:
1282ad879127SKrish Sadhukhan         if (pending_event_ipi_fired == true) {
1283198dfd0eSJanis Schoetterl-Glausch             report_fail("Interrupt triggered by guest");
1284ad879127SKrish Sadhukhan             return true;
1285ad879127SKrish Sadhukhan         }
1286ad879127SKrish Sadhukhan 
1287ad879127SKrish Sadhukhan         irq_enable();
1288ad879127SKrish Sadhukhan         asm volatile ("nop");
1289ad879127SKrish Sadhukhan         irq_disable();
1290ad879127SKrish Sadhukhan 
1291ad879127SKrish Sadhukhan         if (pending_event_ipi_fired != true) {
1292198dfd0eSJanis Schoetterl-Glausch             report_fail("Interrupt not triggered by host");
1293ad879127SKrish Sadhukhan             return true;
1294ad879127SKrish Sadhukhan         }
1295ad879127SKrish Sadhukhan 
1296ad879127SKrish Sadhukhan         break;
1297ad879127SKrish Sadhukhan 
1298ad879127SKrish Sadhukhan     default:
1299ad879127SKrish Sadhukhan         return true;
1300ad879127SKrish Sadhukhan     }
1301ad879127SKrish Sadhukhan 
1302ad879127SKrish Sadhukhan     inc_test_stage(test);
1303ad879127SKrish Sadhukhan 
1304ad879127SKrish Sadhukhan     return get_test_stage(test) == 2;
1305ad879127SKrish Sadhukhan }
1306ad879127SKrish Sadhukhan 
130785dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test)
1308ad879127SKrish Sadhukhan {
1309ad879127SKrish Sadhukhan     return get_test_stage(test) == 2;
1310ad879127SKrish Sadhukhan }
1311ad879127SKrish Sadhukhan 
131285dc2aceSPaolo Bonzini #define TIMER_VECTOR    222
131385dc2aceSPaolo Bonzini 
131485dc2aceSPaolo Bonzini static volatile bool timer_fired;
131585dc2aceSPaolo Bonzini 
131685dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs)
131785dc2aceSPaolo Bonzini {
131885dc2aceSPaolo Bonzini     timer_fired = true;
131985dc2aceSPaolo Bonzini     apic_write(APIC_EOI, 0);
132085dc2aceSPaolo Bonzini }
132185dc2aceSPaolo Bonzini 
132285dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test)
132385dc2aceSPaolo Bonzini {
132485dc2aceSPaolo Bonzini     default_prepare(test);
132585dc2aceSPaolo Bonzini     handle_irq(TIMER_VECTOR, timer_isr);
132685dc2aceSPaolo Bonzini     timer_fired = false;
132785dc2aceSPaolo Bonzini     set_test_stage(test, 0);
132885dc2aceSPaolo Bonzini }
132985dc2aceSPaolo Bonzini 
133085dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test)
133185dc2aceSPaolo Bonzini {
133285dc2aceSPaolo Bonzini     long long start, loops;
133385dc2aceSPaolo Bonzini 
133485dc2aceSPaolo Bonzini     apic_write(APIC_LVTT, TIMER_VECTOR);
133585dc2aceSPaolo Bonzini     irq_enable();
133685dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 1); //Timer Initial Count Register 0x380 one-shot
133785dc2aceSPaolo Bonzini     for (loops = 0; loops < 10000000 && !timer_fired; loops++)
133885dc2aceSPaolo Bonzini         asm volatile ("nop");
133985dc2aceSPaolo Bonzini 
134085dc2aceSPaolo Bonzini     report(timer_fired, "direct interrupt while running guest");
134185dc2aceSPaolo Bonzini 
134285dc2aceSPaolo Bonzini     if (!timer_fired) {
134385dc2aceSPaolo Bonzini         set_test_stage(test, -1);
134485dc2aceSPaolo Bonzini         vmmcall();
134585dc2aceSPaolo Bonzini     }
134685dc2aceSPaolo Bonzini 
134785dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 0);
134885dc2aceSPaolo Bonzini     irq_disable();
134985dc2aceSPaolo Bonzini     vmmcall();
135085dc2aceSPaolo Bonzini 
135185dc2aceSPaolo Bonzini     timer_fired = false;
135285dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 1);
135385dc2aceSPaolo Bonzini     for (loops = 0; loops < 10000000 && !timer_fired; loops++)
135485dc2aceSPaolo Bonzini         asm volatile ("nop");
135585dc2aceSPaolo Bonzini 
135685dc2aceSPaolo Bonzini     report(timer_fired, "intercepted interrupt while running guest");
135785dc2aceSPaolo Bonzini 
135885dc2aceSPaolo Bonzini     if (!timer_fired) {
135985dc2aceSPaolo Bonzini         set_test_stage(test, -1);
136085dc2aceSPaolo Bonzini         vmmcall();
136185dc2aceSPaolo Bonzini     }
136285dc2aceSPaolo Bonzini 
136385dc2aceSPaolo Bonzini     irq_enable();
136485dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 0);
136585dc2aceSPaolo Bonzini     irq_disable();
136685dc2aceSPaolo Bonzini 
136785dc2aceSPaolo Bonzini     timer_fired = false;
136885dc2aceSPaolo Bonzini     start = rdtsc();
136985dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 1000000);
1370a3001422SOliver Upton     safe_halt();
137185dc2aceSPaolo Bonzini 
137285dc2aceSPaolo Bonzini     report(rdtsc() - start > 10000 && timer_fired,
137385dc2aceSPaolo Bonzini           "direct interrupt + hlt");
137485dc2aceSPaolo Bonzini 
137585dc2aceSPaolo Bonzini     if (!timer_fired) {
137685dc2aceSPaolo Bonzini         set_test_stage(test, -1);
137785dc2aceSPaolo Bonzini         vmmcall();
137885dc2aceSPaolo Bonzini     }
137985dc2aceSPaolo Bonzini 
138085dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 0);
138185dc2aceSPaolo Bonzini     irq_disable();
138285dc2aceSPaolo Bonzini     vmmcall();
138385dc2aceSPaolo Bonzini 
138485dc2aceSPaolo Bonzini     timer_fired = false;
138585dc2aceSPaolo Bonzini     start = rdtsc();
138685dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 1000000);
138785dc2aceSPaolo Bonzini     asm volatile ("hlt");
138885dc2aceSPaolo Bonzini 
138985dc2aceSPaolo Bonzini     report(rdtsc() - start > 10000 && timer_fired,
139085dc2aceSPaolo Bonzini            "intercepted interrupt + hlt");
139185dc2aceSPaolo Bonzini 
139285dc2aceSPaolo Bonzini     if (!timer_fired) {
139385dc2aceSPaolo Bonzini         set_test_stage(test, -1);
139485dc2aceSPaolo Bonzini         vmmcall();
139585dc2aceSPaolo Bonzini     }
139685dc2aceSPaolo Bonzini 
139785dc2aceSPaolo Bonzini     apic_write(APIC_TMICT, 0);
139885dc2aceSPaolo Bonzini     irq_disable();
139985dc2aceSPaolo Bonzini }
140085dc2aceSPaolo Bonzini 
140185dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test)
140285dc2aceSPaolo Bonzini {
140385dc2aceSPaolo Bonzini     switch (get_test_stage(test)) {
140485dc2aceSPaolo Bonzini     case 0:
140585dc2aceSPaolo Bonzini     case 2:
1406096cf7feSPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1407198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1408096cf7feSPaolo Bonzini                         vmcb->control.exit_code);
140985dc2aceSPaolo Bonzini             return true;
141085dc2aceSPaolo Bonzini         }
1411096cf7feSPaolo Bonzini         vmcb->save.rip += 3;
141285dc2aceSPaolo Bonzini 
1413096cf7feSPaolo Bonzini         vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1414096cf7feSPaolo Bonzini         vmcb->control.int_ctl |= V_INTR_MASKING_MASK;
141585dc2aceSPaolo Bonzini         break;
141685dc2aceSPaolo Bonzini 
141785dc2aceSPaolo Bonzini     case 1:
141885dc2aceSPaolo Bonzini     case 3:
1419096cf7feSPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_INTR) {
1420198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x",
1421096cf7feSPaolo Bonzini                         vmcb->control.exit_code);
142285dc2aceSPaolo Bonzini             return true;
142385dc2aceSPaolo Bonzini         }
142485dc2aceSPaolo Bonzini 
142585dc2aceSPaolo Bonzini         irq_enable();
142685dc2aceSPaolo Bonzini         asm volatile ("nop");
142785dc2aceSPaolo Bonzini         irq_disable();
142885dc2aceSPaolo Bonzini 
1429096cf7feSPaolo Bonzini         vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR);
1430096cf7feSPaolo Bonzini         vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
143185dc2aceSPaolo Bonzini         break;
143285dc2aceSPaolo Bonzini 
143385dc2aceSPaolo Bonzini     case 4:
143485dc2aceSPaolo Bonzini         break;
143585dc2aceSPaolo Bonzini 
143685dc2aceSPaolo Bonzini     default:
143785dc2aceSPaolo Bonzini         return true;
143885dc2aceSPaolo Bonzini     }
143985dc2aceSPaolo Bonzini 
144085dc2aceSPaolo Bonzini     inc_test_stage(test);
144185dc2aceSPaolo Bonzini 
144285dc2aceSPaolo Bonzini     return get_test_stage(test) == 5;
144385dc2aceSPaolo Bonzini }
144485dc2aceSPaolo Bonzini 
144585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test)
144685dc2aceSPaolo Bonzini {
144785dc2aceSPaolo Bonzini     return get_test_stage(test) == 5;
144885dc2aceSPaolo Bonzini }
144985dc2aceSPaolo Bonzini 
1450d4db486bSCathy Avery static volatile bool nmi_fired;
1451d4db486bSCathy Avery 
14524a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs)
1453d4db486bSCathy Avery {
1454d4db486bSCathy Avery     nmi_fired = true;
1455d4db486bSCathy Avery }
1456d4db486bSCathy Avery 
1457d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test)
1458d4db486bSCathy Avery {
1459d4db486bSCathy Avery     default_prepare(test);
1460d4db486bSCathy Avery     nmi_fired = false;
14614a1207f6SMaxim Levitsky     handle_exception(NMI_VECTOR, nmi_handler);
1462d4db486bSCathy Avery     set_test_stage(test, 0);
1463d4db486bSCathy Avery }
1464d4db486bSCathy Avery 
1465d4db486bSCathy Avery static void nmi_test(struct svm_test *test)
1466d4db486bSCathy Avery {
1467d4db486bSCathy Avery     apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1468d4db486bSCathy Avery 
1469d4db486bSCathy Avery     report(nmi_fired, "direct NMI while running guest");
1470d4db486bSCathy Avery 
1471d4db486bSCathy Avery     if (!nmi_fired)
1472d4db486bSCathy Avery         set_test_stage(test, -1);
1473d4db486bSCathy Avery 
1474d4db486bSCathy Avery     vmmcall();
1475d4db486bSCathy Avery 
1476d4db486bSCathy Avery     nmi_fired = false;
1477d4db486bSCathy Avery 
1478d4db486bSCathy Avery     apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0);
1479d4db486bSCathy Avery 
1480d4db486bSCathy Avery     if (!nmi_fired) {
1481d4db486bSCathy Avery         report(nmi_fired, "intercepted pending NMI not dispatched");
1482d4db486bSCathy Avery         set_test_stage(test, -1);
1483d4db486bSCathy Avery     }
1484d4db486bSCathy Avery 
1485d4db486bSCathy Avery }
1486d4db486bSCathy Avery 
1487d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test)
1488d4db486bSCathy Avery {
1489d4db486bSCathy Avery     switch (get_test_stage(test)) {
1490d4db486bSCathy Avery     case 0:
1491d4db486bSCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1492198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
1493d4db486bSCathy Avery                         vmcb->control.exit_code);
1494d4db486bSCathy Avery             return true;
1495d4db486bSCathy Avery         }
1496d4db486bSCathy Avery         vmcb->save.rip += 3;
1497d4db486bSCathy Avery 
1498d4db486bSCathy Avery         vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
1499d4db486bSCathy Avery         break;
1500d4db486bSCathy Avery 
1501d4db486bSCathy Avery     case 1:
1502d4db486bSCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1503198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
1504d4db486bSCathy Avery                         vmcb->control.exit_code);
1505d4db486bSCathy Avery             return true;
1506d4db486bSCathy Avery         }
1507d4db486bSCathy Avery 
15085c3582f0SJanis Schoetterl-Glausch         report_pass("NMI intercept while running guest");
1509d4db486bSCathy Avery         break;
1510d4db486bSCathy Avery 
1511d4db486bSCathy Avery     case 2:
1512d4db486bSCathy Avery         break;
1513d4db486bSCathy Avery 
1514d4db486bSCathy Avery     default:
1515d4db486bSCathy Avery         return true;
1516d4db486bSCathy Avery     }
1517d4db486bSCathy Avery 
1518d4db486bSCathy Avery     inc_test_stage(test);
1519d4db486bSCathy Avery 
1520d4db486bSCathy Avery     return get_test_stage(test) == 3;
1521d4db486bSCathy Avery }
1522d4db486bSCathy Avery 
1523d4db486bSCathy Avery static bool nmi_check(struct svm_test *test)
1524d4db486bSCathy Avery {
1525d4db486bSCathy Avery     return get_test_stage(test) == 3;
1526d4db486bSCathy Avery }
1527d4db486bSCathy Avery 
15289da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL
15299da1f4d8SCathy Avery 
15309da1f4d8SCathy Avery static void nmi_message_thread(void *_test)
15319da1f4d8SCathy Avery {
15329da1f4d8SCathy Avery     struct svm_test *test = _test;
15339da1f4d8SCathy Avery 
15349da1f4d8SCathy Avery     while (get_test_stage(test) != 1)
15359da1f4d8SCathy Avery         pause();
15369da1f4d8SCathy Avery 
15379da1f4d8SCathy Avery     delay(NMI_DELAY);
15389da1f4d8SCathy Avery 
15399da1f4d8SCathy Avery     apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
15409da1f4d8SCathy Avery 
15419da1f4d8SCathy Avery     while (get_test_stage(test) != 2)
15429da1f4d8SCathy Avery         pause();
15439da1f4d8SCathy Avery 
15449da1f4d8SCathy Avery     delay(NMI_DELAY);
15459da1f4d8SCathy Avery 
15469da1f4d8SCathy Avery     apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]);
15479da1f4d8SCathy Avery }
15489da1f4d8SCathy Avery 
15499da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test)
15509da1f4d8SCathy Avery {
15519da1f4d8SCathy Avery     long long start;
15529da1f4d8SCathy Avery 
15539da1f4d8SCathy Avery     on_cpu_async(1, nmi_message_thread, test);
15549da1f4d8SCathy Avery 
15559da1f4d8SCathy Avery     start = rdtsc();
15569da1f4d8SCathy Avery 
15579da1f4d8SCathy Avery     set_test_stage(test, 1);
15589da1f4d8SCathy Avery 
15599da1f4d8SCathy Avery     asm volatile ("hlt");
15609da1f4d8SCathy Avery 
15619da1f4d8SCathy Avery     report((rdtsc() - start > NMI_DELAY) && nmi_fired,
15629da1f4d8SCathy Avery           "direct NMI + hlt");
15639da1f4d8SCathy Avery 
15649da1f4d8SCathy Avery     if (!nmi_fired)
15659da1f4d8SCathy Avery         set_test_stage(test, -1);
15669da1f4d8SCathy Avery 
15679da1f4d8SCathy Avery     nmi_fired = false;
15689da1f4d8SCathy Avery 
15699da1f4d8SCathy Avery     vmmcall();
15709da1f4d8SCathy Avery 
15719da1f4d8SCathy Avery     start = rdtsc();
15729da1f4d8SCathy Avery 
15739da1f4d8SCathy Avery     set_test_stage(test, 2);
15749da1f4d8SCathy Avery 
15759da1f4d8SCathy Avery     asm volatile ("hlt");
15769da1f4d8SCathy Avery 
15779da1f4d8SCathy Avery     report((rdtsc() - start > NMI_DELAY) && nmi_fired,
15789da1f4d8SCathy Avery            "intercepted NMI + hlt");
15799da1f4d8SCathy Avery 
15809da1f4d8SCathy Avery     if (!nmi_fired) {
15819da1f4d8SCathy Avery         report(nmi_fired, "intercepted pending NMI not dispatched");
15829da1f4d8SCathy Avery         set_test_stage(test, -1);
15837e7d9357SCathy Avery         vmmcall();
15849da1f4d8SCathy Avery     }
15859da1f4d8SCathy Avery 
15869da1f4d8SCathy Avery     set_test_stage(test, 3);
15879da1f4d8SCathy Avery }
15889da1f4d8SCathy Avery 
15899da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test)
15909da1f4d8SCathy Avery {
15919da1f4d8SCathy Avery     switch (get_test_stage(test)) {
15929da1f4d8SCathy Avery     case 1:
15939da1f4d8SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1594198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
15959da1f4d8SCathy Avery                         vmcb->control.exit_code);
15969da1f4d8SCathy Avery             return true;
15979da1f4d8SCathy Avery         }
15989da1f4d8SCathy Avery         vmcb->save.rip += 3;
15999da1f4d8SCathy Avery 
16009da1f4d8SCathy Avery         vmcb->control.intercept |= (1ULL << INTERCEPT_NMI);
16019da1f4d8SCathy Avery         break;
16029da1f4d8SCathy Avery 
16039da1f4d8SCathy Avery     case 2:
16049da1f4d8SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_NMI) {
1605198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x",
16069da1f4d8SCathy Avery                         vmcb->control.exit_code);
16079da1f4d8SCathy Avery             return true;
16089da1f4d8SCathy Avery         }
16099da1f4d8SCathy Avery 
16105c3582f0SJanis Schoetterl-Glausch         report_pass("NMI intercept while running guest");
16119da1f4d8SCathy Avery         break;
16129da1f4d8SCathy Avery 
16139da1f4d8SCathy Avery     case 3:
16149da1f4d8SCathy Avery         break;
16159da1f4d8SCathy Avery 
16169da1f4d8SCathy Avery     default:
16179da1f4d8SCathy Avery         return true;
16189da1f4d8SCathy Avery     }
16199da1f4d8SCathy Avery 
16209da1f4d8SCathy Avery     return get_test_stage(test) == 3;
16219da1f4d8SCathy Avery }
16229da1f4d8SCathy Avery 
16239da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test)
16249da1f4d8SCathy Avery {
16259da1f4d8SCathy Avery     return get_test_stage(test) == 3;
16269da1f4d8SCathy Avery }
16279da1f4d8SCathy Avery 
16284b4fb247SPaolo Bonzini static volatile int count_exc = 0;
16294b4fb247SPaolo Bonzini 
16304b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r)
16314b4fb247SPaolo Bonzini {
16324b4fb247SPaolo Bonzini         count_exc++;
16334b4fb247SPaolo Bonzini }
16344b4fb247SPaolo Bonzini 
16354b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test)
16364b4fb247SPaolo Bonzini {
16378634a266SPaolo Bonzini     default_prepare(test);
16384b4fb247SPaolo Bonzini     handle_exception(DE_VECTOR, my_isr);
16394b4fb247SPaolo Bonzini     handle_exception(NMI_VECTOR, my_isr);
16404b4fb247SPaolo Bonzini }
16414b4fb247SPaolo Bonzini 
16424b4fb247SPaolo Bonzini 
16434b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test)
16444b4fb247SPaolo Bonzini {
16454b4fb247SPaolo Bonzini     asm volatile ("vmmcall\n\tvmmcall\n\t");
16464b4fb247SPaolo Bonzini }
16474b4fb247SPaolo Bonzini 
16484b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test)
16494b4fb247SPaolo Bonzini {
16504b4fb247SPaolo Bonzini     switch (get_test_stage(test)) {
16514b4fb247SPaolo Bonzini     case 0:
16524b4fb247SPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1653198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16544b4fb247SPaolo Bonzini                         vmcb->control.exit_code);
16554b4fb247SPaolo Bonzini             return true;
16564b4fb247SPaolo Bonzini         }
16572c1ca866SNadav Amit         vmcb->save.rip += 3;
16584b4fb247SPaolo Bonzini         vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
16594b4fb247SPaolo Bonzini         break;
16604b4fb247SPaolo Bonzini 
16614b4fb247SPaolo Bonzini     case 1:
16624b4fb247SPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_ERR) {
1663198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to error. Exit reason 0x%x",
16644b4fb247SPaolo Bonzini                         vmcb->control.exit_code);
16654b4fb247SPaolo Bonzini             return true;
16664b4fb247SPaolo Bonzini         }
16674b4fb247SPaolo Bonzini         report(count_exc == 0, "exception with vector 2 not injected");
16684b4fb247SPaolo Bonzini         vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID;
16694b4fb247SPaolo Bonzini         break;
16704b4fb247SPaolo Bonzini 
16714b4fb247SPaolo Bonzini     case 2:
16724b4fb247SPaolo Bonzini         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1673198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
16744b4fb247SPaolo Bonzini                         vmcb->control.exit_code);
16754b4fb247SPaolo Bonzini             return true;
16764b4fb247SPaolo Bonzini         }
16772c1ca866SNadav Amit         vmcb->save.rip += 3;
16784b4fb247SPaolo Bonzini         report(count_exc == 1, "divide overflow exception injected");
16794b4fb247SPaolo Bonzini         report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared");
16804b4fb247SPaolo Bonzini         break;
16814b4fb247SPaolo Bonzini 
16824b4fb247SPaolo Bonzini     default:
16834b4fb247SPaolo Bonzini         return true;
16844b4fb247SPaolo Bonzini     }
16854b4fb247SPaolo Bonzini 
16864b4fb247SPaolo Bonzini     inc_test_stage(test);
16874b4fb247SPaolo Bonzini 
16884b4fb247SPaolo Bonzini     return get_test_stage(test) == 3;
16894b4fb247SPaolo Bonzini }
16904b4fb247SPaolo Bonzini 
16914b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test)
16924b4fb247SPaolo Bonzini {
16934b4fb247SPaolo Bonzini     return count_exc == 1 && get_test_stage(test) == 3;
16944b4fb247SPaolo Bonzini }
16954b4fb247SPaolo Bonzini 
16969c838954SCathy Avery static volatile bool virq_fired;
16979c838954SCathy Avery 
16989c838954SCathy Avery static void virq_isr(isr_regs_t *regs)
16999c838954SCathy Avery {
17009c838954SCathy Avery     virq_fired = true;
17019c838954SCathy Avery }
17029c838954SCathy Avery 
17039c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test)
17049c838954SCathy Avery {
17059c838954SCathy Avery     handle_irq(0xf1, virq_isr);
17069c838954SCathy Avery     default_prepare(test);
17079c838954SCathy Avery     vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
17089c838954SCathy Avery                             (0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority
17099c838954SCathy Avery     vmcb->control.int_vector = 0xf1;
17109c838954SCathy Avery     virq_fired = false;
17119c838954SCathy Avery     set_test_stage(test, 0);
17129c838954SCathy Avery }
17139c838954SCathy Avery 
17149c838954SCathy Avery static void virq_inject_test(struct svm_test *test)
17159c838954SCathy Avery {
17169c838954SCathy Avery     if (virq_fired) {
1717198dfd0eSJanis Schoetterl-Glausch         report_fail("virtual interrupt fired before L2 sti");
17189c838954SCathy Avery         set_test_stage(test, -1);
17199c838954SCathy Avery         vmmcall();
17209c838954SCathy Avery     }
17219c838954SCathy Avery 
17229c838954SCathy Avery     irq_enable();
17239c838954SCathy Avery     asm volatile ("nop");
17249c838954SCathy Avery     irq_disable();
17259c838954SCathy Avery 
17269c838954SCathy Avery     if (!virq_fired) {
1727198dfd0eSJanis Schoetterl-Glausch         report_fail("virtual interrupt not fired after L2 sti");
17289c838954SCathy Avery         set_test_stage(test, -1);
17299c838954SCathy Avery     }
17309c838954SCathy Avery 
17319c838954SCathy Avery     vmmcall();
17329c838954SCathy Avery 
17339c838954SCathy Avery     if (virq_fired) {
1734198dfd0eSJanis Schoetterl-Glausch         report_fail("virtual interrupt fired before L2 sti after VINTR intercept");
17359c838954SCathy Avery         set_test_stage(test, -1);
17369c838954SCathy Avery         vmmcall();
17379c838954SCathy Avery     }
17389c838954SCathy Avery 
17399c838954SCathy Avery     irq_enable();
17409c838954SCathy Avery     asm volatile ("nop");
17419c838954SCathy Avery     irq_disable();
17429c838954SCathy Avery 
17439c838954SCathy Avery     if (!virq_fired) {
1744198dfd0eSJanis Schoetterl-Glausch         report_fail("virtual interrupt not fired after return from VINTR intercept");
17459c838954SCathy Avery         set_test_stage(test, -1);
17469c838954SCathy Avery     }
17479c838954SCathy Avery 
17489c838954SCathy Avery     vmmcall();
17499c838954SCathy Avery 
17509c838954SCathy Avery     irq_enable();
17519c838954SCathy Avery     asm volatile ("nop");
17529c838954SCathy Avery     irq_disable();
17539c838954SCathy Avery 
17549c838954SCathy Avery     if (virq_fired) {
1755198dfd0eSJanis Schoetterl-Glausch         report_fail("virtual interrupt fired when V_IRQ_PRIO less than V_TPR");
17569c838954SCathy Avery         set_test_stage(test, -1);
17579c838954SCathy Avery     }
17589c838954SCathy Avery 
17599c838954SCathy Avery     vmmcall();
17609c838954SCathy Avery     vmmcall();
17619c838954SCathy Avery }
17629c838954SCathy Avery 
17639c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test)
17649c838954SCathy Avery {
17659c838954SCathy Avery     vmcb->save.rip += 3;
17669c838954SCathy Avery 
17679c838954SCathy Avery     switch (get_test_stage(test)) {
17689c838954SCathy Avery     case 0:
17699c838954SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1770198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
17719c838954SCathy Avery                         vmcb->control.exit_code);
17729c838954SCathy Avery             return true;
17739c838954SCathy Avery         }
17749c838954SCathy Avery         if (vmcb->control.int_ctl & V_IRQ_MASK) {
1775198dfd0eSJanis Schoetterl-Glausch             report_fail("V_IRQ not cleared on VMEXIT after firing");
17769c838954SCathy Avery             return true;
17779c838954SCathy Avery         }
17789c838954SCathy Avery         virq_fired = false;
17799c838954SCathy Avery         vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
17809c838954SCathy Avery         vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
17819c838954SCathy Avery                             (0x0f << V_INTR_PRIO_SHIFT);
17829c838954SCathy Avery         break;
17839c838954SCathy Avery 
17849c838954SCathy Avery     case 1:
17859c838954SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VINTR) {
1786198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vintr. Exit reason 0x%x",
17879c838954SCathy Avery                         vmcb->control.exit_code);
17889c838954SCathy Avery             return true;
17899c838954SCathy Avery         }
17909c838954SCathy Avery         if (virq_fired) {
1791198dfd0eSJanis Schoetterl-Glausch             report_fail("V_IRQ fired before SVM_EXIT_VINTR");
17929c838954SCathy Avery             return true;
17939c838954SCathy Avery         }
17949c838954SCathy Avery         vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR);
17959c838954SCathy Avery         break;
17969c838954SCathy Avery 
17979c838954SCathy Avery     case 2:
17989c838954SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1799198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
18009c838954SCathy Avery                         vmcb->control.exit_code);
18019c838954SCathy Avery             return true;
18029c838954SCathy Avery         }
18039c838954SCathy Avery         virq_fired = false;
18049c838954SCathy Avery         // Set irq to lower priority
18059c838954SCathy Avery         vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK |
18069c838954SCathy Avery                             (0x08 << V_INTR_PRIO_SHIFT);
18079c838954SCathy Avery         // Raise guest TPR
18089c838954SCathy Avery         vmcb->control.int_ctl |= 0x0a & V_TPR_MASK;
18099c838954SCathy Avery         break;
18109c838954SCathy Avery 
18119c838954SCathy Avery     case 3:
18129c838954SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1813198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
18149c838954SCathy Avery                         vmcb->control.exit_code);
18159c838954SCathy Avery             return true;
18169c838954SCathy Avery         }
18179c838954SCathy Avery         vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR);
18189c838954SCathy Avery         break;
18199c838954SCathy Avery 
18209c838954SCathy Avery     case 4:
18219c838954SCathy Avery         // INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR
18229c838954SCathy Avery         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
1823198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x",
18249c838954SCathy Avery                         vmcb->control.exit_code);
18259c838954SCathy Avery             return true;
18269c838954SCathy Avery         }
18279c838954SCathy Avery         break;
18289c838954SCathy Avery 
18299c838954SCathy Avery     default:
18309c838954SCathy Avery         return true;
18319c838954SCathy Avery     }
18329c838954SCathy Avery 
18339c838954SCathy Avery     inc_test_stage(test);
18349c838954SCathy Avery 
18359c838954SCathy Avery     return get_test_stage(test) == 5;
18369c838954SCathy Avery }
18379c838954SCathy Avery 
18389c838954SCathy Avery static bool virq_inject_check(struct svm_test *test)
18399c838954SCathy Avery {
18409c838954SCathy Avery     return get_test_stage(test) == 5;
18419c838954SCathy Avery }
18429c838954SCathy Avery 
1843da338a31SMaxim Levitsky /*
1844da338a31SMaxim Levitsky  * Detect nested guest RIP corruption as explained in kernel commit
1845da338a31SMaxim Levitsky  * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73
1846da338a31SMaxim Levitsky  *
1847da338a31SMaxim Levitsky  * In the assembly loop below 'ins' is executed while IO instructions
1848da338a31SMaxim Levitsky  * are not intercepted; the instruction is emulated by L0.
1849da338a31SMaxim Levitsky  *
1850da338a31SMaxim Levitsky  * At the same time we are getting interrupts from the local APIC timer,
1851da338a31SMaxim Levitsky  * and we do intercept them in L1
1852da338a31SMaxim Levitsky  *
1853da338a31SMaxim Levitsky  * If the interrupt happens on the insb instruction, L0 will VMexit, emulate
1854da338a31SMaxim Levitsky  * the insb instruction and then it will inject the interrupt to L1 through
1855da338a31SMaxim Levitsky  * a nested VMexit.  Due to a bug, it would leave pre-emulation values of RIP,
1856da338a31SMaxim Levitsky  * RAX and RSP in the VMCB.
1857da338a31SMaxim Levitsky  *
1858da338a31SMaxim Levitsky  * In our intercept handler we detect the bug by checking that RIP is that of
1859da338a31SMaxim Levitsky  * the insb instruction, but its memory operand has already been written.
1860da338a31SMaxim Levitsky  * This means that insb was already executed.
1861da338a31SMaxim Levitsky  */
1862da338a31SMaxim Levitsky 
1863da338a31SMaxim Levitsky static volatile int isr_cnt = 0;
1864da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA;
1865da338a31SMaxim Levitsky extern const char insb_instruction_label[];
1866da338a31SMaxim Levitsky 
1867da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs)
1868da338a31SMaxim Levitsky {
1869da338a31SMaxim Levitsky     isr_cnt++;
1870da338a31SMaxim Levitsky     apic_write(APIC_EOI, 0);
1871da338a31SMaxim Levitsky }
1872da338a31SMaxim Levitsky 
1873da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test)
1874da338a31SMaxim Levitsky {
1875da338a31SMaxim Levitsky     default_prepare(test);
1876da338a31SMaxim Levitsky     set_test_stage(test, 0);
1877da338a31SMaxim Levitsky 
1878da338a31SMaxim Levitsky     vmcb->control.int_ctl = V_INTR_MASKING_MASK;
1879da338a31SMaxim Levitsky     vmcb->control.intercept |= (1ULL << INTERCEPT_INTR);
1880da338a31SMaxim Levitsky 
1881da338a31SMaxim Levitsky     handle_irq(TIMER_VECTOR, reg_corruption_isr);
1882da338a31SMaxim Levitsky 
1883da338a31SMaxim Levitsky     /* set local APIC to inject external interrupts */
1884da338a31SMaxim Levitsky     apic_write(APIC_TMICT, 0);
1885da338a31SMaxim Levitsky     apic_write(APIC_TDCR, 0);
1886da338a31SMaxim Levitsky     apic_write(APIC_LVTT, TIMER_VECTOR | APIC_LVT_TIMER_PERIODIC);
1887da338a31SMaxim Levitsky     apic_write(APIC_TMICT, 1000);
1888da338a31SMaxim Levitsky }
1889da338a31SMaxim Levitsky 
1890da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test)
1891da338a31SMaxim Levitsky {
1892da338a31SMaxim Levitsky     /* this is endless loop, which is interrupted by the timer interrupt */
1893da338a31SMaxim Levitsky     asm volatile (
1894da338a31SMaxim Levitsky             "1:\n\t"
1895da338a31SMaxim Levitsky             "movw $0x4d0, %%dx\n\t" // IO port
1896da338a31SMaxim Levitsky             "lea %[io_port_var], %%rdi\n\t"
1897da338a31SMaxim Levitsky             "movb $0xAA, %[io_port_var]\n\t"
1898da338a31SMaxim Levitsky             "insb_instruction_label:\n\t"
1899da338a31SMaxim Levitsky             "insb\n\t"
1900da338a31SMaxim Levitsky             "jmp 1b\n\t"
1901da338a31SMaxim Levitsky 
1902da338a31SMaxim Levitsky             : [io_port_var] "=m" (io_port_var)
1903da338a31SMaxim Levitsky             : /* no inputs*/
1904da338a31SMaxim Levitsky             : "rdx", "rdi"
1905da338a31SMaxim Levitsky     );
1906da338a31SMaxim Levitsky }
1907da338a31SMaxim Levitsky 
1908da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test)
1909da338a31SMaxim Levitsky {
1910da338a31SMaxim Levitsky     if (isr_cnt == 10000) {
19115c3582f0SJanis Schoetterl-Glausch         report_pass("No RIP corruption detected after %d timer interrupts",
1912da338a31SMaxim Levitsky                     isr_cnt);
1913da338a31SMaxim Levitsky         set_test_stage(test, 1);
1914491bbc64SMaxim Levitsky         goto cleanup;
1915da338a31SMaxim Levitsky     }
1916da338a31SMaxim Levitsky 
1917da338a31SMaxim Levitsky     if (vmcb->control.exit_code == SVM_EXIT_INTR) {
1918da338a31SMaxim Levitsky 
1919da338a31SMaxim Levitsky         void* guest_rip = (void*)vmcb->save.rip;
1920da338a31SMaxim Levitsky 
1921da338a31SMaxim Levitsky         irq_enable();
1922da338a31SMaxim Levitsky         asm volatile ("nop");
1923da338a31SMaxim Levitsky         irq_disable();
1924da338a31SMaxim Levitsky 
1925da338a31SMaxim Levitsky         if (guest_rip == insb_instruction_label && io_port_var != 0xAA) {
1926198dfd0eSJanis Schoetterl-Glausch             report_fail("RIP corruption detected after %d timer interrupts",
1927da338a31SMaxim Levitsky                         isr_cnt);
1928491bbc64SMaxim Levitsky             goto cleanup;
1929da338a31SMaxim Levitsky         }
1930da338a31SMaxim Levitsky 
1931da338a31SMaxim Levitsky     }
1932da338a31SMaxim Levitsky     return false;
1933491bbc64SMaxim Levitsky cleanup:
1934491bbc64SMaxim Levitsky     apic_write(APIC_LVTT, APIC_LVT_TIMER_MASK);
1935491bbc64SMaxim Levitsky     apic_write(APIC_TMICT, 0);
1936491bbc64SMaxim Levitsky     return true;
1937491bbc64SMaxim Levitsky 
1938da338a31SMaxim Levitsky }
1939da338a31SMaxim Levitsky 
1940da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test)
1941da338a31SMaxim Levitsky {
1942da338a31SMaxim Levitsky     return get_test_stage(test) == 1;
1943da338a31SMaxim Levitsky }
1944da338a31SMaxim Levitsky 
19454770e9c8SCathy Avery static void get_tss_entry(void *data)
19464770e9c8SCathy Avery {
1947a7f32d87SPaolo Bonzini     *((gdt_entry_t **)data) = get_tss_descr();
19484770e9c8SCathy Avery }
19494770e9c8SCathy Avery 
19504770e9c8SCathy Avery static int orig_cpu_count;
19514770e9c8SCathy Avery 
19524770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test)
19534770e9c8SCathy Avery {
1954a7f32d87SPaolo Bonzini     gdt_entry_t *tss_entry;
19554770e9c8SCathy Avery     int i;
19564770e9c8SCathy Avery 
19574770e9c8SCathy Avery     on_cpu(1, get_tss_entry, &tss_entry);
19584770e9c8SCathy Avery 
19594770e9c8SCathy Avery     orig_cpu_count = cpu_online_count;
19604770e9c8SCathy Avery 
19614770e9c8SCathy Avery     apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT,
19624770e9c8SCathy Avery                    id_map[1]);
19634770e9c8SCathy Avery 
19644770e9c8SCathy Avery     delay(100000000ULL);
19654770e9c8SCathy Avery 
19664770e9c8SCathy Avery     --cpu_online_count;
19674770e9c8SCathy Avery 
1968a7f32d87SPaolo Bonzini     tss_entry->type &= ~DESC_BUSY;
19694770e9c8SCathy Avery 
19704770e9c8SCathy Avery     apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]);
19714770e9c8SCathy Avery 
19724770e9c8SCathy Avery     for (i = 0; i < 5 && cpu_online_count < orig_cpu_count; i++)
19734770e9c8SCathy Avery        delay(100000000ULL);
19744770e9c8SCathy Avery }
19754770e9c8SCathy Avery 
19764770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test)
19774770e9c8SCathy Avery {
19784770e9c8SCathy Avery     return true;
19794770e9c8SCathy Avery }
19804770e9c8SCathy Avery 
19814770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test)
19824770e9c8SCathy Avery {
19834770e9c8SCathy Avery     return cpu_online_count == orig_cpu_count;
19844770e9c8SCathy Avery }
19854770e9c8SCathy Avery 
1986d5da6dfeSCathy Avery static volatile bool init_intercept;
1987d5da6dfeSCathy Avery 
1988d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test)
1989d5da6dfeSCathy Avery {
1990d5da6dfeSCathy Avery     init_intercept = false;
1991d5da6dfeSCathy Avery     vmcb->control.intercept |= (1ULL << INTERCEPT_INIT);
1992d5da6dfeSCathy Avery }
1993d5da6dfeSCathy Avery 
1994d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test)
1995d5da6dfeSCathy Avery {
1996d5da6dfeSCathy Avery     apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0);
1997d5da6dfeSCathy Avery }
1998d5da6dfeSCathy Avery 
1999d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test)
2000d5da6dfeSCathy Avery {
2001d5da6dfeSCathy Avery     vmcb->save.rip += 3;
2002d5da6dfeSCathy Avery 
2003d5da6dfeSCathy Avery     if (vmcb->control.exit_code != SVM_EXIT_INIT) {
2004198dfd0eSJanis Schoetterl-Glausch         report_fail("VMEXIT not due to init intercept. Exit reason 0x%x",
2005d5da6dfeSCathy Avery                     vmcb->control.exit_code);
2006d5da6dfeSCathy Avery 
2007d5da6dfeSCathy Avery         return true;
2008d5da6dfeSCathy Avery         }
2009d5da6dfeSCathy Avery 
2010d5da6dfeSCathy Avery     init_intercept = true;
2011d5da6dfeSCathy Avery 
20125c3582f0SJanis Schoetterl-Glausch     report_pass("INIT to vcpu intercepted");
2013d5da6dfeSCathy Avery 
2014d5da6dfeSCathy Avery     return true;
2015d5da6dfeSCathy Avery }
2016d5da6dfeSCathy Avery 
2017d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test)
2018d5da6dfeSCathy Avery {
2019d5da6dfeSCathy Avery     return init_intercept;
2020d5da6dfeSCathy Avery }
2021d5da6dfeSCathy Avery 
20227839b0ecSKrish Sadhukhan /*
20237839b0ecSKrish Sadhukhan  * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the
20247839b0ecSKrish Sadhukhan  * host side (i.e., after the #VMEXIT from the guest).
20257839b0ecSKrish Sadhukhan  *
20260689a980SKrish Sadhukhan  * Setting host EFLAGS.RF suppresses any potential instruction breakpoint
20270689a980SKrish Sadhukhan  * match on the VMRUN and completion of the VMRUN instruction clears the
20280689a980SKrish Sadhukhan  * host EFLAGS.RF bit.
20290689a980SKrish Sadhukhan  *
20307839b0ecSKrish Sadhukhan  * [AMD APM]
20317839b0ecSKrish Sadhukhan  */
20327839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0;
20337839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0;
20347839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false;
20357839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false;
20367839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false;
20370689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false;
20380689a980SKrish Sadhukhan static u64 rip_detected;
20397839b0ecSKrish Sadhukhan 
20407839b0ecSKrish Sadhukhan extern u64 *vmrun_rip;
20417839b0ecSKrish Sadhukhan 
20427839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r)
20437839b0ecSKrish Sadhukhan {
20447839b0ecSKrish Sadhukhan 	if (host_rflags_ss_on_vmrun) {
20457839b0ecSKrish Sadhukhan 		if (host_rflags_vmrun_reached) {
20460689a980SKrish Sadhukhan 			if (!host_rflags_set_rf) {
20477839b0ecSKrish Sadhukhan 				r->rflags &= ~X86_EFLAGS_TF;
20480689a980SKrish Sadhukhan 				rip_detected = r->rip;
20497839b0ecSKrish Sadhukhan 			} else {
20500689a980SKrish Sadhukhan 				r->rflags |= X86_EFLAGS_RF;
20510689a980SKrish Sadhukhan 				++host_rflags_db_handler_flag;
20520689a980SKrish Sadhukhan 			}
20530689a980SKrish Sadhukhan 		} else {
20540689a980SKrish Sadhukhan 			if (r->rip == (u64)&vmrun_rip) {
20557839b0ecSKrish Sadhukhan 				host_rflags_vmrun_reached = true;
20560689a980SKrish Sadhukhan 
20570689a980SKrish Sadhukhan 				if (host_rflags_set_rf) {
20580689a980SKrish Sadhukhan 					host_rflags_guest_main_flag = 0;
20590689a980SKrish Sadhukhan 					rip_detected = r->rip;
20600689a980SKrish Sadhukhan 					r->rflags &= ~X86_EFLAGS_TF;
20610689a980SKrish Sadhukhan 
20620689a980SKrish Sadhukhan 					/* Trigger #DB via debug registers */
20630689a980SKrish Sadhukhan 					write_dr0((void *)&vmrun_rip);
20640689a980SKrish Sadhukhan 					write_dr7(0x403);
20650689a980SKrish Sadhukhan 				}
20660689a980SKrish Sadhukhan 			}
20677839b0ecSKrish Sadhukhan 		}
20687839b0ecSKrish Sadhukhan 	} else {
20697839b0ecSKrish Sadhukhan 		r->rflags &= ~X86_EFLAGS_TF;
20707839b0ecSKrish Sadhukhan 	}
20717839b0ecSKrish Sadhukhan }
20727839b0ecSKrish Sadhukhan 
20737839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test)
20747839b0ecSKrish Sadhukhan {
20757839b0ecSKrish Sadhukhan 	default_prepare(test);
20767839b0ecSKrish Sadhukhan 	handle_exception(DB_VECTOR, host_rflags_db_handler);
20777839b0ecSKrish Sadhukhan 	set_test_stage(test, 0);
20787839b0ecSKrish Sadhukhan }
20797839b0ecSKrish Sadhukhan 
20807839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test)
20817839b0ecSKrish Sadhukhan {
20827839b0ecSKrish Sadhukhan 	if (host_rflags_set_tf)
20837839b0ecSKrish Sadhukhan 		write_rflags(read_rflags() | X86_EFLAGS_TF);
20847839b0ecSKrish Sadhukhan }
20857839b0ecSKrish Sadhukhan 
20867839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test)
20877839b0ecSKrish Sadhukhan {
20887839b0ecSKrish Sadhukhan 	while (1) {
20890689a980SKrish Sadhukhan 		if (get_test_stage(test) > 0) {
20900689a980SKrish Sadhukhan 			if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) ||
20910689a980SKrish Sadhukhan 			    (host_rflags_set_rf && host_rflags_db_handler_flag == 1))
20927839b0ecSKrish Sadhukhan 				host_rflags_guest_main_flag = 1;
20930689a980SKrish Sadhukhan 		}
20940689a980SKrish Sadhukhan 
20950689a980SKrish Sadhukhan 		if (get_test_stage(test) == 4)
20967839b0ecSKrish Sadhukhan 			break;
20977839b0ecSKrish Sadhukhan 		vmmcall();
20987839b0ecSKrish Sadhukhan 	}
20997839b0ecSKrish Sadhukhan }
21007839b0ecSKrish Sadhukhan 
21017839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test)
21027839b0ecSKrish Sadhukhan {
21037839b0ecSKrish Sadhukhan 	switch (get_test_stage(test)) {
21047839b0ecSKrish Sadhukhan 	case 0:
21057839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2106198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT. Exit reason 0x%x",
21077839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
21087839b0ecSKrish Sadhukhan 			return true;
21097839b0ecSKrish Sadhukhan 		}
21107839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
21117839b0ecSKrish Sadhukhan 		/*
21127839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF not immediately before VMRUN, causes
21137839b0ecSKrish Sadhukhan 		 * #DB trap before first guest instruction is executed
21147839b0ecSKrish Sadhukhan 		 */
21157839b0ecSKrish Sadhukhan 		host_rflags_set_tf = true;
21167839b0ecSKrish Sadhukhan 		break;
21177839b0ecSKrish Sadhukhan 	case 1:
21187839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
21190689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1) {
2120198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or #DB handler"
21217839b0ecSKrish Sadhukhan 				    " invoked before guest main. Exit reason 0x%x",
21227839b0ecSKrish Sadhukhan 				    vmcb->control.exit_code);
21237839b0ecSKrish Sadhukhan 			return true;
21247839b0ecSKrish Sadhukhan 		}
21257839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
21267839b0ecSKrish Sadhukhan 		/*
21277839b0ecSKrish Sadhukhan 		 * Setting host EFLAGS.TF immediately before VMRUN, causes #DB
21287839b0ecSKrish Sadhukhan 		 * trap after VMRUN completes on the host side (i.e., after
21297839b0ecSKrish Sadhukhan 		 * VMEXIT from guest).
21307839b0ecSKrish Sadhukhan 		 */
21317839b0ecSKrish Sadhukhan 		host_rflags_ss_on_vmrun = true;
21327839b0ecSKrish Sadhukhan 		break;
21337839b0ecSKrish Sadhukhan 	case 2:
21347839b0ecSKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
21350c22fd44SPaolo Bonzini 		    rip_detected != (u64)&vmrun_rip + 3) {
2136198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch."
21370689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
21380689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
21390c22fd44SPaolo Bonzini 				    (u64)&vmrun_rip + 3, rip_detected);
21400689a980SKrish Sadhukhan 			return true;
21410689a980SKrish Sadhukhan 		}
21420689a980SKrish Sadhukhan 		host_rflags_set_rf = true;
21430689a980SKrish Sadhukhan 		host_rflags_guest_main_flag = 0;
21440689a980SKrish Sadhukhan 		host_rflags_vmrun_reached = false;
21450689a980SKrish Sadhukhan 		vmcb->save.rip += 3;
21460689a980SKrish Sadhukhan 		break;
21470689a980SKrish Sadhukhan 	case 3:
21480689a980SKrish Sadhukhan 		if (vmcb->control.exit_code != SVM_EXIT_VMMCALL ||
21490689a980SKrish Sadhukhan 		    rip_detected != (u64)&vmrun_rip ||
21500689a980SKrish Sadhukhan 		    host_rflags_guest_main_flag != 1 ||
21510689a980SKrish Sadhukhan 		    host_rflags_db_handler_flag > 1 ||
21520689a980SKrish Sadhukhan 		    read_rflags() & X86_EFLAGS_RF) {
2153198dfd0eSJanis Schoetterl-Glausch 			report_fail("Unexpected VMEXIT or RIP mismatch or "
21540689a980SKrish Sadhukhan 				    "EFLAGS.RF not cleared."
21550689a980SKrish Sadhukhan 				    " Exit reason 0x%x, RIP actual: %lx, RIP expected: "
21560689a980SKrish Sadhukhan 				    "%lx", vmcb->control.exit_code,
21570689a980SKrish Sadhukhan 				    (u64)&vmrun_rip, rip_detected);
21587839b0ecSKrish Sadhukhan 			return true;
21597839b0ecSKrish Sadhukhan 		}
21607839b0ecSKrish Sadhukhan 		host_rflags_set_tf = false;
21610689a980SKrish Sadhukhan 		host_rflags_set_rf = false;
21627839b0ecSKrish Sadhukhan 		vmcb->save.rip += 3;
21637839b0ecSKrish Sadhukhan 		break;
21647839b0ecSKrish Sadhukhan 	default:
21657839b0ecSKrish Sadhukhan 		return true;
21667839b0ecSKrish Sadhukhan 	}
21677839b0ecSKrish Sadhukhan 	inc_test_stage(test);
21680689a980SKrish Sadhukhan 	return get_test_stage(test) == 5;
21697839b0ecSKrish Sadhukhan }
21707839b0ecSKrish Sadhukhan 
21717839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test)
21727839b0ecSKrish Sadhukhan {
21730689a980SKrish Sadhukhan 	return get_test_stage(test) == 4;
21747839b0ecSKrish Sadhukhan }
21757839b0ecSKrish Sadhukhan 
21768660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name }
21778660d1b5SKrish Sadhukhan 
2178ba29942cSKrish Sadhukhan /*
2179ba29942cSKrish Sadhukhan  * v2 tests
2180ba29942cSKrish Sadhukhan  */
2181ba29942cSKrish Sadhukhan 
2182f32183f5SJim Mattson /*
2183f32183f5SJim Mattson  * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE
2184f32183f5SJim Mattson  * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different
2185f32183f5SJim Mattson  * value than in L1.
2186f32183f5SJim Mattson  */
2187f32183f5SJim Mattson 
2188f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test)
2189f32183f5SJim Mattson {
2190f32183f5SJim Mattson 	write_cr4(read_cr4() & ~X86_CR4_OSXSAVE);
2191f32183f5SJim Mattson }
2192f32183f5SJim Mattson 
2193f32183f5SJim Mattson static void svm_cr4_osxsave_test(void)
2194f32183f5SJim Mattson {
2195f32183f5SJim Mattson 	if (!this_cpu_has(X86_FEATURE_XSAVE)) {
2196f32183f5SJim Mattson 		report_skip("XSAVE not detected");
2197f32183f5SJim Mattson 		return;
2198f32183f5SJim Mattson 	}
2199f32183f5SJim Mattson 
2200f32183f5SJim Mattson 	if (!(read_cr4() & X86_CR4_OSXSAVE)) {
2201f32183f5SJim Mattson 		unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE;
2202f32183f5SJim Mattson 
2203f32183f5SJim Mattson 		write_cr4(cr4);
2204f32183f5SJim Mattson 		vmcb->save.cr4 = cr4;
2205f32183f5SJim Mattson 	}
2206f32183f5SJim Mattson 
2207f32183f5SJim Mattson 	report(cpuid_osxsave(), "CPUID.01H:ECX.XSAVE set before VMRUN");
2208f32183f5SJim Mattson 
2209f32183f5SJim Mattson 	test_set_guest(svm_cr4_osxsave_test_guest);
2210f32183f5SJim Mattson 	report(svm_vmrun() == SVM_EXIT_VMMCALL,
2211f32183f5SJim Mattson 	       "svm_cr4_osxsave_test_guest finished with VMMCALL");
2212f32183f5SJim Mattson 
2213f32183f5SJim Mattson 	report(cpuid_osxsave(), "CPUID.01H:ECX.XSAVE set after VMRUN");
2214f32183f5SJim Mattson }
2215f32183f5SJim Mattson 
2216ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test)
2217ba29942cSKrish Sadhukhan {
2218ba29942cSKrish Sadhukhan }
2219ba29942cSKrish Sadhukhan 
2220eae10e8fSKrish Sadhukhan 
2221eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val,	\
2222eae10e8fSKrish Sadhukhan 				   resv_mask)				\
2223eae10e8fSKrish Sadhukhan {									\
2224eae10e8fSKrish Sadhukhan         u64 tmp, mask;							\
2225eae10e8fSKrish Sadhukhan         int i;								\
2226eae10e8fSKrish Sadhukhan 									\
2227eae10e8fSKrish Sadhukhan         for (i = start; i <= end; i = i + inc) {			\
2228eae10e8fSKrish Sadhukhan                 mask = 1ull << i;					\
2229eae10e8fSKrish Sadhukhan                 if (!(mask & resv_mask))				\
2230eae10e8fSKrish Sadhukhan                         continue;					\
2231eae10e8fSKrish Sadhukhan                 tmp = val | mask;					\
2232eae10e8fSKrish Sadhukhan 		reg = tmp;						\
2233eae10e8fSKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx",\
2234eae10e8fSKrish Sadhukhan 		    str_name, end, start, tmp);				\
2235eae10e8fSKrish Sadhukhan         }								\
2236eae10e8fSKrish Sadhukhan }
2237eae10e8fSKrish Sadhukhan 
22386d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask,	\
2239cb6524f3SPaolo Bonzini 				  exit_code, test_name)			\
2240a79c9495SKrish Sadhukhan {									\
2241a79c9495SKrish Sadhukhan 	u64 tmp, mask;							\
22428ae6d77fSSean Christopherson 	u32 r;								\
2243a79c9495SKrish Sadhukhan 	int i;								\
2244a79c9495SKrish Sadhukhan 									\
2245a79c9495SKrish Sadhukhan 	for (i = start; i <= end; i = i + inc) {			\
2246a79c9495SKrish Sadhukhan 		mask = 1ull << i;					\
2247a79c9495SKrish Sadhukhan 		if (!(mask & resv_mask))				\
2248a79c9495SKrish Sadhukhan 			continue;					\
2249a79c9495SKrish Sadhukhan 		tmp = val | mask;					\
2250a79c9495SKrish Sadhukhan 		switch (cr) {						\
2251a79c9495SKrish Sadhukhan 		case 0:							\
2252a79c9495SKrish Sadhukhan 			vmcb->save.cr0 = tmp;				\
2253a79c9495SKrish Sadhukhan 			break;						\
2254a79c9495SKrish Sadhukhan 		case 3:							\
2255a79c9495SKrish Sadhukhan 			vmcb->save.cr3 = tmp;				\
2256a79c9495SKrish Sadhukhan 			break;						\
2257a79c9495SKrish Sadhukhan 		case 4:							\
2258a79c9495SKrish Sadhukhan 			vmcb->save.cr4 = tmp;				\
2259a79c9495SKrish Sadhukhan 		}							\
22608ae6d77fSSean Christopherson 		r = svm_vmrun();					\
22618ae6d77fSSean Christopherson 		report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x",\
22628ae6d77fSSean Christopherson 		       cr, test_name, end, start, tmp, exit_code, r);	\
2263a79c9495SKrish Sadhukhan 	}								\
2264a79c9495SKrish Sadhukhan }
2265e8d7a8f6SKrish Sadhukhan 
2266a79c9495SKrish Sadhukhan static void test_efer(void)
2267a79c9495SKrish Sadhukhan {
2268e8d7a8f6SKrish Sadhukhan 	/*
2269e8d7a8f6SKrish Sadhukhan 	 * Un-setting EFER.SVME is illegal
2270e8d7a8f6SKrish Sadhukhan 	 */
2271ba29942cSKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2272ba29942cSKrish Sadhukhan 	u64 efer = efer_saved;
2273ba29942cSKrish Sadhukhan 
2274ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer);
2275ba29942cSKrish Sadhukhan 	efer &= ~EFER_SVME;
2276ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer;
2277ba29942cSKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer);
2278ba29942cSKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2279e8d7a8f6SKrish Sadhukhan 
2280e8d7a8f6SKrish Sadhukhan 	/*
2281a79c9495SKrish Sadhukhan 	 * EFER MBZ bits: 63:16, 9
2282a79c9495SKrish Sadhukhan 	 */
2283a79c9495SKrish Sadhukhan 	efer_saved = vmcb->save.efer;
2284a79c9495SKrish Sadhukhan 
2285a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer,
2286a79c9495SKrish Sadhukhan 	    efer_saved, SVM_EFER_RESERVED_MASK);
2287a79c9495SKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer,
2288a79c9495SKrish Sadhukhan 	    efer_saved, SVM_EFER_RESERVED_MASK);
2289a79c9495SKrish Sadhukhan 
22901d7bde08SKrish Sadhukhan 	/*
22911d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR4.PAE is zero.
22921d7bde08SKrish Sadhukhan 	 */
22931d7bde08SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
22941d7bde08SKrish Sadhukhan 	u64 cr0;
22951d7bde08SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
22961d7bde08SKrish Sadhukhan 	u64 cr4;
22971d7bde08SKrish Sadhukhan 
22981d7bde08SKrish Sadhukhan 	efer = efer_saved | EFER_LME;
22991d7bde08SKrish Sadhukhan 	vmcb->save.efer = efer;
23001d7bde08SKrish Sadhukhan 	cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE;
23011d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
23021d7bde08SKrish Sadhukhan 	cr4 = cr4_saved & ~X86_CR4_PAE;
23031d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4;
23041d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
23051d7bde08SKrish Sadhukhan 	    "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4);
23061d7bde08SKrish Sadhukhan 
23071d7bde08SKrish Sadhukhan 	/*
23081d7bde08SKrish Sadhukhan 	 * EFER.LME and CR0.PG are both set and CR0.PE is zero.
2309fc050452SLara Lazier 	 * CR4.PAE needs to be set as we otherwise cannot
2310fc050452SLara Lazier 	 * determine if CR4.PAE=0 or CR0.PE=0 triggered the
2311fc050452SLara Lazier 	 * SVM_EXIT_ERR.
23121d7bde08SKrish Sadhukhan 	 */
2313fc050452SLara Lazier 	cr4 = cr4_saved | X86_CR4_PAE;
2314fc050452SLara Lazier 	vmcb->save.cr4 = cr4;
23151d7bde08SKrish Sadhukhan 	cr0 &= ~X86_CR0_PE;
23161d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
23171d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
23181d7bde08SKrish Sadhukhan 	    "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0);
23191d7bde08SKrish Sadhukhan 
23201d7bde08SKrish Sadhukhan 	/*
23211d7bde08SKrish Sadhukhan 	 * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero.
23221d7bde08SKrish Sadhukhan 	 */
23231d7bde08SKrish Sadhukhan 	u32 cs_attrib_saved = vmcb->save.cs.attrib;
23241d7bde08SKrish Sadhukhan 	u32 cs_attrib;
23251d7bde08SKrish Sadhukhan 
23261d7bde08SKrish Sadhukhan 	cr0 |= X86_CR0_PE;
23271d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
23281d7bde08SKrish Sadhukhan 	cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK |
23291d7bde08SKrish Sadhukhan 	    SVM_SELECTOR_DB_MASK;
23301d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib;
23311d7bde08SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), "
23321d7bde08SKrish Sadhukhan 	    "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)",
23331d7bde08SKrish Sadhukhan 	    efer, cr0, cr4, cs_attrib);
23341d7bde08SKrish Sadhukhan 
23351d7bde08SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
23361d7bde08SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2337a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
23381d7bde08SKrish Sadhukhan 	vmcb->save.cs.attrib = cs_attrib_saved;
2339a79c9495SKrish Sadhukhan }
2340a79c9495SKrish Sadhukhan 
2341a79c9495SKrish Sadhukhan static void test_cr0(void)
2342a79c9495SKrish Sadhukhan {
2343a79c9495SKrish Sadhukhan 	/*
2344e8d7a8f6SKrish Sadhukhan 	 * Un-setting CR0.CD and setting CR0.NW is illegal combination
2345e8d7a8f6SKrish Sadhukhan 	 */
2346e8d7a8f6SKrish Sadhukhan 	u64 cr0_saved = vmcb->save.cr0;
2347e8d7a8f6SKrish Sadhukhan 	u64 cr0 = cr0_saved;
2348e8d7a8f6SKrish Sadhukhan 
2349e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_CD;
2350e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2351e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2352a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx",
2353a79c9495SKrish Sadhukhan 	    cr0);
2354e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2355e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2356a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx",
2357a79c9495SKrish Sadhukhan 	    cr0);
2358e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_NW;
2359e8d7a8f6SKrish Sadhukhan 	cr0 &= ~X86_CR0_CD;
2360e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2361a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx",
2362a79c9495SKrish Sadhukhan 	    cr0);
2363e8d7a8f6SKrish Sadhukhan 	cr0 |= X86_CR0_NW;
2364e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0;
2365a79c9495SKrish Sadhukhan 	report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx",
2366a79c9495SKrish Sadhukhan 	    cr0);
2367e8d7a8f6SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
23685c052c90SKrish Sadhukhan 
23695c052c90SKrish Sadhukhan 	/*
23705c052c90SKrish Sadhukhan 	 * CR0[63:32] are not zero
23715c052c90SKrish Sadhukhan 	 */
23725c052c90SKrish Sadhukhan 	cr0 = cr0_saved;
2373eae10e8fSKrish Sadhukhan 
2374eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved,
2375eae10e8fSKrish Sadhukhan 	    SVM_CR0_RESERVED_MASK);
23765c052c90SKrish Sadhukhan 	vmcb->save.cr0 = cr0_saved;
2377a79c9495SKrish Sadhukhan }
2378eae10e8fSKrish Sadhukhan 
2379a79c9495SKrish Sadhukhan static void test_cr3(void)
2380a79c9495SKrish Sadhukhan {
2381a79c9495SKrish Sadhukhan 	/*
2382a79c9495SKrish Sadhukhan 	 * CR3 MBZ bits based on different modes:
238329a01803SNadav Amit 	 *   [63:52] - long mode
2384a79c9495SKrish Sadhukhan 	 */
2385a79c9495SKrish Sadhukhan 	u64 cr3_saved = vmcb->save.cr3;
2386a79c9495SKrish Sadhukhan 
2387a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved,
2388cb6524f3SPaolo Bonzini 	    SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, "");
23896d0ecbf6SKrish Sadhukhan 
23906d0ecbf6SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK;
23916d0ecbf6SKrish Sadhukhan 	report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
23926d0ecbf6SKrish Sadhukhan 	    vmcb->save.cr3);
23936d0ecbf6SKrish Sadhukhan 
23946d0ecbf6SKrish Sadhukhan 	/*
23956d0ecbf6SKrish Sadhukhan 	 * CR3 non-MBZ reserved bits based on different modes:
2396cb6524f3SPaolo Bonzini 	 *   [11:5] [2:0] - long mode (PCIDE=0)
23976d0ecbf6SKrish Sadhukhan 	 *          [2:0] - PAE legacy mode
23986d0ecbf6SKrish Sadhukhan 	 */
23996d0ecbf6SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
24006d0ecbf6SKrish Sadhukhan 	u64 *pdpe = npt_get_pml4e();
24016d0ecbf6SKrish Sadhukhan 
24026d0ecbf6SKrish Sadhukhan 	/*
24036d0ecbf6SKrish Sadhukhan 	 * Long mode
24046d0ecbf6SKrish Sadhukhan 	 */
24056d0ecbf6SKrish Sadhukhan 	if (this_cpu_has(X86_FEATURE_PCID)) {
24066d0ecbf6SKrish Sadhukhan 		vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE;
24076d0ecbf6SKrish Sadhukhan 		SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2408cb6524f3SPaolo Bonzini 		    SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) ");
24096d0ecbf6SKrish Sadhukhan 
24106d0ecbf6SKrish Sadhukhan 		vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK;
24116d0ecbf6SKrish Sadhukhan 		report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx",
24126d0ecbf6SKrish Sadhukhan 		    vmcb->save.cr3);
2413cb6524f3SPaolo Bonzini 	}
24146d0ecbf6SKrish Sadhukhan 
24156d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE;
24166d0ecbf6SKrish Sadhukhan 
2417993749ffSSean Christopherson 	if (!npt_supported())
2418993749ffSSean Christopherson 		goto skip_npt_only;
2419993749ffSSean Christopherson 
24206d0ecbf6SKrish Sadhukhan 	/* Clear P (Present) bit in NPT in order to trigger #NPF */
24216d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
24226d0ecbf6SKrish Sadhukhan 
24236d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved,
2424cb6524f3SPaolo Bonzini 	    SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) ");
24256d0ecbf6SKrish Sadhukhan 
24266d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2427cb6524f3SPaolo Bonzini 	vmcb->save.cr3 = cr3_saved;
24286d0ecbf6SKrish Sadhukhan 
24296d0ecbf6SKrish Sadhukhan 	/*
24306d0ecbf6SKrish Sadhukhan 	 * PAE legacy
24316d0ecbf6SKrish Sadhukhan 	 */
24326d0ecbf6SKrish Sadhukhan 	pdpe[0] &= ~1ULL;
24336d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved | X86_CR4_PAE;
24346d0ecbf6SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved,
2435cb6524f3SPaolo Bonzini 	    SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) ");
24366d0ecbf6SKrish Sadhukhan 
24376d0ecbf6SKrish Sadhukhan 	pdpe[0] |= 1ULL;
2438993749ffSSean Christopherson 
2439993749ffSSean Christopherson skip_npt_only:
2440a79c9495SKrish Sadhukhan 	vmcb->save.cr3 = cr3_saved;
24416d0ecbf6SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2442a79c9495SKrish Sadhukhan }
2443a79c9495SKrish Sadhukhan 
2444d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */
2445a79c9495SKrish Sadhukhan static void test_cr4(void)
2446a79c9495SKrish Sadhukhan {
2447a79c9495SKrish Sadhukhan 	u64 cr4_saved = vmcb->save.cr4;
2448a79c9495SKrish Sadhukhan 	u64 efer_saved = vmcb->save.efer;
2449a79c9495SKrish Sadhukhan 	u64 efer = efer_saved;
2450a79c9495SKrish Sadhukhan 
2451a79c9495SKrish Sadhukhan 	efer &= ~EFER_LME;
2452a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2453a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2454cb6524f3SPaolo Bonzini 	    SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, "");
2455a79c9495SKrish Sadhukhan 
2456a79c9495SKrish Sadhukhan 	efer |= EFER_LME;
2457a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer;
2458a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved,
2459cb6524f3SPaolo Bonzini 	    SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2460a79c9495SKrish Sadhukhan 	SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved,
2461cb6524f3SPaolo Bonzini 	    SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, "");
2462a79c9495SKrish Sadhukhan 
2463a79c9495SKrish Sadhukhan 	vmcb->save.cr4 = cr4_saved;
2464a79c9495SKrish Sadhukhan 	vmcb->save.efer = efer_saved;
2465a79c9495SKrish Sadhukhan }
2466a79c9495SKrish Sadhukhan 
2467a79c9495SKrish Sadhukhan static void test_dr(void)
2468a79c9495SKrish Sadhukhan {
2469eae10e8fSKrish Sadhukhan 	/*
2470eae10e8fSKrish Sadhukhan 	 * DR6[63:32] and DR7[63:32] are MBZ
2471eae10e8fSKrish Sadhukhan 	 */
2472eae10e8fSKrish Sadhukhan 	u64 dr_saved = vmcb->save.dr6;
2473eae10e8fSKrish Sadhukhan 
2474eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved,
2475eae10e8fSKrish Sadhukhan 	    SVM_DR6_RESERVED_MASK);
2476eae10e8fSKrish Sadhukhan 	vmcb->save.dr6 = dr_saved;
2477eae10e8fSKrish Sadhukhan 
2478eae10e8fSKrish Sadhukhan 	dr_saved = vmcb->save.dr7;
2479eae10e8fSKrish Sadhukhan 	SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved,
2480eae10e8fSKrish Sadhukhan 	    SVM_DR7_RESERVED_MASK);
2481eae10e8fSKrish Sadhukhan 
2482eae10e8fSKrish Sadhukhan 	vmcb->save.dr7 = dr_saved;
2483a79c9495SKrish Sadhukhan }
2484eae10e8fSKrish Sadhukhan 
2485abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */
2486abe82380SKrish Sadhukhan #define	TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code,		\
2487abe82380SKrish Sadhukhan 			 msg) {						\
2488abe82380SKrish Sadhukhan 	vmcb->control.intercept = saved_intercept | 1ULL << type;	\
2489abe82380SKrish Sadhukhan 	if (type == INTERCEPT_MSR_PROT)					\
2490abe82380SKrish Sadhukhan 		vmcb->control.msrpm_base_pa = addr;			\
2491abe82380SKrish Sadhukhan 	else								\
2492abe82380SKrish Sadhukhan 		vmcb->control.iopm_base_pa = addr;			\
2493abe82380SKrish Sadhukhan 	report(svm_vmrun() == exit_code,				\
2494abe82380SKrish Sadhukhan 	    "Test %s address: %lx", msg, addr);                         \
2495abe82380SKrish Sadhukhan }
2496abe82380SKrish Sadhukhan 
2497abe82380SKrish Sadhukhan /*
2498abe82380SKrish Sadhukhan  * If the MSR or IOIO intercept table extends to a physical address that
2499abe82380SKrish Sadhukhan  * is greater than or equal to the maximum supported physical address, the
2500abe82380SKrish Sadhukhan  * guest state is illegal.
2501abe82380SKrish Sadhukhan  *
2502abe82380SKrish Sadhukhan  * The VMRUN instruction ignores the lower 12 bits of the address specified
2503abe82380SKrish Sadhukhan  * in the VMCB.
2504abe82380SKrish Sadhukhan  *
2505abe82380SKrish Sadhukhan  * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB
2506abe82380SKrish Sadhukhan  * pages + 1 byte.
2507abe82380SKrish Sadhukhan  *
2508abe82380SKrish Sadhukhan  * [APM vol 2]
2509abe82380SKrish Sadhukhan  *
2510abe82380SKrish Sadhukhan  * Note: Unallocated MSRPM addresses conforming to consistency checks, generate
2511abe82380SKrish Sadhukhan  * #NPF.
2512abe82380SKrish Sadhukhan  */
2513abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void)
2514abe82380SKrish Sadhukhan {
2515abe82380SKrish Sadhukhan 	u64 saved_intercept = vmcb->control.intercept;
2516abe82380SKrish Sadhukhan 	u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr();
2517abe82380SKrish Sadhukhan 	u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1));
2518abe82380SKrish Sadhukhan 
2519abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2520abe82380SKrish Sadhukhan 			addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2521abe82380SKrish Sadhukhan 			"MSRPM");
2522abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2523abe82380SKrish Sadhukhan 			addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR,
2524abe82380SKrish Sadhukhan 			"MSRPM");
2525abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT,
2526abe82380SKrish Sadhukhan 			addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2527abe82380SKrish Sadhukhan 			"MSRPM");
2528abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2529abe82380SKrish Sadhukhan 			SVM_EXIT_VMMCALL, "MSRPM");
2530abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2531abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr,
2532abe82380SKrish Sadhukhan 			SVM_EXIT_VMMCALL, "MSRPM");
2533abe82380SKrish Sadhukhan 
2534abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2535abe82380SKrish Sadhukhan 			addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2536abe82380SKrish Sadhukhan 			"IOPM");
2537abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2538abe82380SKrish Sadhukhan 			addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL,
2539abe82380SKrish Sadhukhan 			"IOPM");
2540abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2541abe82380SKrish Sadhukhan 			addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL,
2542abe82380SKrish Sadhukhan 			"IOPM");
2543abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2544abe82380SKrish Sadhukhan 			addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR,
2545abe82380SKrish Sadhukhan 			"IOPM");
2546abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT,
2547abe82380SKrish Sadhukhan 			addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR,
2548abe82380SKrish Sadhukhan 			"IOPM");
2549abe82380SKrish Sadhukhan 	addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1));
2550abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2551abe82380SKrish Sadhukhan 			SVM_EXIT_VMMCALL, "IOPM");
2552abe82380SKrish Sadhukhan 	addr |= (1ull << 12) - 1;
2553abe82380SKrish Sadhukhan 	TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr,
2554abe82380SKrish Sadhukhan 			SVM_EXIT_VMMCALL, "IOPM");
2555abe82380SKrish Sadhukhan 
2556abe82380SKrish Sadhukhan 	vmcb->control.intercept = saved_intercept;
2557abe82380SKrish Sadhukhan }
2558abe82380SKrish Sadhukhan 
2559ba3c9773SLara Lazier /*
2560ba3c9773SLara Lazier  * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical
2561ba3c9773SLara Lazier  * segment bases in the VMCB.  However, VMENTRY succeeds as documented.
2562ba3c9773SLara Lazier  */
2563ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg)					\
2564a99070ebSKrish Sadhukhan 	saved_addr = seg_base;					\
2565a99070ebSKrish Sadhukhan 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2566ba3c9773SLara Lazier 	return_value = svm_vmrun(); \
2567ba3c9773SLara Lazier 	report(return_value == SVM_EXIT_VMMCALL, \
2568ba3c9773SLara Lazier 			"Successful VMRUN with noncanonical %s.base", msg); \
2569a99070ebSKrish Sadhukhan 	seg_base = saved_addr;
2570a99070ebSKrish Sadhukhan 
2571ba3c9773SLara Lazier 
2572ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg)					\
2573ba3c9773SLara Lazier 	saved_addr = seg_base;					\
2574ba3c9773SLara Lazier 	seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \
2575ba3c9773SLara Lazier 	asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory"); \
2576ba3c9773SLara Lazier 	asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory"); \
2577ba3c9773SLara Lazier 	report(is_canonical(seg_base), \
2578ba3c9773SLara Lazier 			"Test %s.base for canonical form: %lx", msg, seg_base); \
2579ba3c9773SLara Lazier 	seg_base = saved_addr;
2580ba3c9773SLara Lazier 
2581ba3c9773SLara Lazier static void test_canonicalization(void)
2582a99070ebSKrish Sadhukhan {
2583a99070ebSKrish Sadhukhan 	u64 saved_addr;
2584ba3c9773SLara Lazier 	u64 return_value;
2585ba3c9773SLara Lazier 	u64 addr_limit;
2586ba3c9773SLara Lazier 	u64 vmcb_phys = virt_to_phys(vmcb);
2587ba3c9773SLara Lazier 
2588ba3c9773SLara Lazier 	addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48;
2589a99070ebSKrish Sadhukhan 	u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1);
2590a99070ebSKrish Sadhukhan 
2591ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS");
2592ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS");
2593ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR");
2594ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR");
2595ba3c9773SLara Lazier 	TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS");
2596ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES");
2597ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS");
2598ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS");
2599ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS");
2600ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR");
2601ba3c9773SLara Lazier 	TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR");
2602a99070ebSKrish Sadhukhan }
2603a99070ebSKrish Sadhukhan 
2604665f5677SKrish Sadhukhan /*
2605665f5677SKrish Sadhukhan  * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not
2606665f5677SKrish Sadhukhan  * cause a trace trap between the VMRUN and the first guest instruction, but
2607665f5677SKrish Sadhukhan  * rather after completion of the first guest instruction.
2608665f5677SKrish Sadhukhan  *
2609665f5677SKrish Sadhukhan  * [APM vol 2]
2610665f5677SKrish Sadhukhan  */
2611665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip;
2612665f5677SKrish Sadhukhan 
2613665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r)
2614665f5677SKrish Sadhukhan {
2615665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = r->rip;
2616665f5677SKrish Sadhukhan 	r->rflags &= ~X86_EFLAGS_TF;
2617665f5677SKrish Sadhukhan }
2618665f5677SKrish Sadhukhan 
2619a79c9495SKrish Sadhukhan static void svm_guest_state_test(void)
2620a79c9495SKrish Sadhukhan {
2621a79c9495SKrish Sadhukhan 	test_set_guest(basic_guest_main);
2622a79c9495SKrish Sadhukhan 	test_efer();
2623a79c9495SKrish Sadhukhan 	test_cr0();
2624a79c9495SKrish Sadhukhan 	test_cr3();
2625a79c9495SKrish Sadhukhan 	test_cr4();
2626a79c9495SKrish Sadhukhan 	test_dr();
2627abe82380SKrish Sadhukhan 	test_msrpm_iopm_bitmap_addrs();
2628ba3c9773SLara Lazier 	test_canonicalization();
2629ba29942cSKrish Sadhukhan }
2630ba29942cSKrish Sadhukhan 
2631665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test);
2632665f5677SKrish Sadhukhan extern u64 *insn2;
2633665f5677SKrish Sadhukhan extern u64 *guest_end;
2634665f5677SKrish Sadhukhan 
2635665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t"
2636665f5677SKrish Sadhukhan     "push %rbp\n\t"
2637665f5677SKrish Sadhukhan     ".global insn2\n\t"
2638665f5677SKrish Sadhukhan     "insn2:\n\t"
2639665f5677SKrish Sadhukhan     "mov %rsp,%rbp\n\t"
2640665f5677SKrish Sadhukhan     "vmmcall\n\t"
2641665f5677SKrish Sadhukhan     "vmmcall\n\t"
2642665f5677SKrish Sadhukhan     ".global guest_end\n\t"
2643665f5677SKrish Sadhukhan     "guest_end:\n\t"
2644665f5677SKrish Sadhukhan     "vmmcall\n\t"
2645665f5677SKrish Sadhukhan     "pop %rbp\n\t"
2646665f5677SKrish Sadhukhan     "ret");
2647665f5677SKrish Sadhukhan 
2648665f5677SKrish Sadhukhan static void svm_test_singlestep(void)
2649665f5677SKrish Sadhukhan {
2650665f5677SKrish Sadhukhan 	handle_exception(DB_VECTOR, guest_rflags_test_db_handler);
2651665f5677SKrish Sadhukhan 
2652665f5677SKrish Sadhukhan 	/*
2653665f5677SKrish Sadhukhan 	 * Trap expected after completion of first guest instruction
2654665f5677SKrish Sadhukhan 	 */
2655665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2656665f5677SKrish Sadhukhan 	report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL &&
2657665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == (u64)&insn2,
2658665f5677SKrish Sadhukhan                "Test EFLAGS.TF on VMRUN: trap expected  after completion of first guest instruction");
2659665f5677SKrish Sadhukhan 	/*
2660665f5677SKrish Sadhukhan 	 * No trap expected
2661665f5677SKrish Sadhukhan 	 */
2662665f5677SKrish Sadhukhan 	guest_rflags_test_trap_rip = 0;
2663665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2664665f5677SKrish Sadhukhan 	vmcb->save.rflags |= X86_EFLAGS_TF;
2665665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2666665f5677SKrish Sadhukhan 		guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected");
2667665f5677SKrish Sadhukhan 
2668665f5677SKrish Sadhukhan 	/*
2669665f5677SKrish Sadhukhan 	 * Let guest finish execution
2670665f5677SKrish Sadhukhan 	 */
2671665f5677SKrish Sadhukhan 	vmcb->save.rip += 3;
2672665f5677SKrish Sadhukhan 	report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL &&
2673665f5677SKrish Sadhukhan 		vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion");
2674665f5677SKrish Sadhukhan }
2675665f5677SKrish Sadhukhan 
2676916635a8SSean Christopherson static void __svm_npt_rsvd_bits_test(u64 *pxe, u64 rsvd_bits, u64 efer,
2677916635a8SSean Christopherson 				     ulong cr4, u64 guest_efer, ulong guest_cr4)
2678916635a8SSean Christopherson {
2679916635a8SSean Christopherson 	u64 pxe_orig = *pxe;
2680916635a8SSean Christopherson 	int exit_reason;
2681916635a8SSean Christopherson 	u64 pfec;
2682916635a8SSean Christopherson 
2683916635a8SSean Christopherson 	wrmsr(MSR_EFER, efer);
2684916635a8SSean Christopherson 	write_cr4(cr4);
2685916635a8SSean Christopherson 
2686916635a8SSean Christopherson 	vmcb->save.efer = guest_efer;
2687916635a8SSean Christopherson 	vmcb->save.cr4  = guest_cr4;
2688916635a8SSean Christopherson 
2689916635a8SSean Christopherson 	*pxe |= rsvd_bits;
2690916635a8SSean Christopherson 
2691916635a8SSean Christopherson 	exit_reason = svm_vmrun();
2692916635a8SSean Christopherson 
2693916635a8SSean Christopherson 	report(exit_reason == SVM_EXIT_NPF,
2694916635a8SSean Christopherson 	       "Wanted #NPF on rsvd bits = 0x%lx, got exit = 0x%x", rsvd_bits, exit_reason);
2695916635a8SSean Christopherson 
2696916635a8SSean Christopherson 	if (pxe == npt_get_pdpe() || pxe == npt_get_pml4e()) {
2697916635a8SSean Christopherson 		/*
2698916635a8SSean Christopherson 		 * The guest's page tables will blow up on a bad PDPE/PML4E,
2699916635a8SSean Christopherson 		 * before starting the final walk of the guest page.
2700916635a8SSean Christopherson 		 */
2701916635a8SSean Christopherson 		pfec = 0x20000000full;
2702916635a8SSean Christopherson 	} else {
2703916635a8SSean Christopherson 		/* RSVD #NPF on final walk of guest page. */
2704916635a8SSean Christopherson 		pfec = 0x10000000dULL;
2705916635a8SSean Christopherson 
2706916635a8SSean Christopherson 		/* PFEC.FETCH=1 if NX=1 *or* SMEP=1. */
2707916635a8SSean Christopherson 		if ((cr4 & X86_CR4_SMEP) || (efer & EFER_NX))
2708916635a8SSean Christopherson 			pfec |= 0x10;
2709916635a8SSean Christopherson 
2710916635a8SSean Christopherson 	}
2711916635a8SSean Christopherson 
2712916635a8SSean Christopherson 	report(vmcb->control.exit_info_1 == pfec,
2713916635a8SSean Christopherson 	       "Wanted PFEC = 0x%lx, got PFEC = %lx, PxE = 0x%lx.  "
2714916635a8SSean Christopherson 	       "host.NX = %u, host.SMEP = %u, guest.NX = %u, guest.SMEP = %u",
2715916635a8SSean Christopherson 	       pfec, vmcb->control.exit_info_1, *pxe,
2716916635a8SSean Christopherson 	       !!(efer & EFER_NX), !!(cr4 & X86_CR4_SMEP),
2717916635a8SSean Christopherson 	       !!(guest_efer & EFER_NX), !!(guest_cr4 & X86_CR4_SMEP));
2718916635a8SSean Christopherson 
2719916635a8SSean Christopherson 	*pxe = pxe_orig;
2720916635a8SSean Christopherson }
2721916635a8SSean Christopherson 
2722916635a8SSean Christopherson static void _svm_npt_rsvd_bits_test(u64 *pxe, u64 pxe_rsvd_bits,  u64 efer,
2723916635a8SSean Christopherson 				    ulong cr4, u64 guest_efer, ulong guest_cr4)
2724916635a8SSean Christopherson {
2725916635a8SSean Christopherson 	u64 rsvd_bits;
2726916635a8SSean Christopherson 	int i;
2727916635a8SSean Christopherson 
2728916635a8SSean Christopherson 	/*
2729520e2789SBabu Moger 	 * RDTSC or RDRAND can sometimes fail to generate a valid reserved bits
2730520e2789SBabu Moger 	 */
2731520e2789SBabu Moger 	if (!pxe_rsvd_bits) {
2732520e2789SBabu Moger 		report_skip("svm_npt_rsvd_bits_test: Reserved bits are not valid");
2733520e2789SBabu Moger 		return;
2734520e2789SBabu Moger 	}
2735520e2789SBabu Moger 
2736520e2789SBabu Moger 	/*
2737916635a8SSean Christopherson 	 * Test all combinations of guest/host EFER.NX and CR4.SMEP.  If host
2738916635a8SSean Christopherson 	 * EFER.NX=0, use NX as the reserved bit, otherwise use the passed in
2739916635a8SSean Christopherson 	 * @pxe_rsvd_bits.
2740916635a8SSean Christopherson 	 */
2741916635a8SSean Christopherson 	for (i = 0; i < 16; i++) {
2742916635a8SSean Christopherson 		if (i & 1) {
2743916635a8SSean Christopherson 			rsvd_bits = pxe_rsvd_bits;
2744916635a8SSean Christopherson 			efer |= EFER_NX;
2745916635a8SSean Christopherson 		} else {
2746916635a8SSean Christopherson 			rsvd_bits = PT64_NX_MASK;
2747916635a8SSean Christopherson 			efer &= ~EFER_NX;
2748916635a8SSean Christopherson 		}
2749916635a8SSean Christopherson 		if (i & 2)
2750916635a8SSean Christopherson 			cr4 |= X86_CR4_SMEP;
2751916635a8SSean Christopherson 		else
2752916635a8SSean Christopherson 			cr4 &= ~X86_CR4_SMEP;
2753916635a8SSean Christopherson 		if (i & 4)
2754916635a8SSean Christopherson 			guest_efer |= EFER_NX;
2755916635a8SSean Christopherson 		else
2756916635a8SSean Christopherson 			guest_efer &= ~EFER_NX;
2757916635a8SSean Christopherson 		if (i & 8)
2758916635a8SSean Christopherson 			guest_cr4 |= X86_CR4_SMEP;
2759916635a8SSean Christopherson 		else
2760916635a8SSean Christopherson 			guest_cr4 &= ~X86_CR4_SMEP;
2761916635a8SSean Christopherson 
2762916635a8SSean Christopherson 		__svm_npt_rsvd_bits_test(pxe, rsvd_bits, efer, cr4,
2763916635a8SSean Christopherson 					 guest_efer, guest_cr4);
2764916635a8SSean Christopherson 	}
2765916635a8SSean Christopherson }
2766916635a8SSean Christopherson 
2767916635a8SSean Christopherson static u64 get_random_bits(u64 hi, u64 low)
2768916635a8SSean Christopherson {
2769520e2789SBabu Moger 	unsigned retry = 5;
2770520e2789SBabu Moger 	u64 rsvd_bits = 0;
2771916635a8SSean Christopherson 
2772520e2789SBabu Moger 	if (this_cpu_has(X86_FEATURE_RDRAND)) {
2773520e2789SBabu Moger 		do {
2774520e2789SBabu Moger 			rsvd_bits = (rdrand() << low) & GENMASK_ULL(hi, low);
2775520e2789SBabu Moger 			retry--;
2776520e2789SBabu Moger 		} while (!rsvd_bits && retry);
2777520e2789SBabu Moger 	}
2778520e2789SBabu Moger 
2779520e2789SBabu Moger 	if (!rsvd_bits) {
2780520e2789SBabu Moger 		retry = 5;
2781916635a8SSean Christopherson 		do {
2782916635a8SSean Christopherson 			rsvd_bits = (rdtsc() << low) & GENMASK_ULL(hi, low);
2783520e2789SBabu Moger 			retry--;
2784520e2789SBabu Moger 		} while (!rsvd_bits && retry);
2785520e2789SBabu Moger 	}
2786916635a8SSean Christopherson 
2787916635a8SSean Christopherson 	return rsvd_bits;
2788916635a8SSean Christopherson }
2789916635a8SSean Christopherson 
2790916635a8SSean Christopherson 
2791916635a8SSean Christopherson static void svm_npt_rsvd_bits_test(void)
2792916635a8SSean Christopherson {
2793916635a8SSean Christopherson 	u64   saved_efer, host_efer, sg_efer, guest_efer;
2794916635a8SSean Christopherson 	ulong saved_cr4,  host_cr4,  sg_cr4,  guest_cr4;
2795916635a8SSean Christopherson 
2796916635a8SSean Christopherson 	if (!npt_supported()) {
2797916635a8SSean Christopherson 		report_skip("NPT not supported");
2798916635a8SSean Christopherson 		return;
2799916635a8SSean Christopherson 	}
2800916635a8SSean Christopherson 
2801916635a8SSean Christopherson 	saved_efer = host_efer  = rdmsr(MSR_EFER);
2802916635a8SSean Christopherson 	saved_cr4  = host_cr4   = read_cr4();
2803916635a8SSean Christopherson 	sg_efer    = guest_efer = vmcb->save.efer;
2804916635a8SSean Christopherson 	sg_cr4     = guest_cr4  = vmcb->save.cr4;
2805916635a8SSean Christopherson 
2806916635a8SSean Christopherson 	test_set_guest(basic_guest_main);
2807916635a8SSean Christopherson 
2808916635a8SSean Christopherson 	/*
2809916635a8SSean Christopherson 	 * 4k PTEs don't have reserved bits if MAXPHYADDR >= 52, just skip the
2810916635a8SSean Christopherson 	 * sub-test.  The NX test is still valid, but the extra bit of coverage
2811916635a8SSean Christopherson 	 * isn't worth the extra complexity.
2812916635a8SSean Christopherson 	 */
2813916635a8SSean Christopherson 	if (cpuid_maxphyaddr() >= 52)
2814916635a8SSean Christopherson 		goto skip_pte_test;
2815916635a8SSean Christopherson 
2816916635a8SSean Christopherson 	_svm_npt_rsvd_bits_test(npt_get_pte((u64)basic_guest_main),
2817916635a8SSean Christopherson 				get_random_bits(51, cpuid_maxphyaddr()),
2818916635a8SSean Christopherson 				host_efer, host_cr4, guest_efer, guest_cr4);
2819916635a8SSean Christopherson 
2820916635a8SSean Christopherson skip_pte_test:
2821916635a8SSean Christopherson 	_svm_npt_rsvd_bits_test(npt_get_pde((u64)basic_guest_main),
2822916635a8SSean Christopherson 				get_random_bits(20, 13) | PT_PAGE_SIZE_MASK,
2823916635a8SSean Christopherson 				host_efer, host_cr4, guest_efer, guest_cr4);
2824916635a8SSean Christopherson 
2825916635a8SSean Christopherson 	_svm_npt_rsvd_bits_test(npt_get_pdpe(),
2826916635a8SSean Christopherson 				PT_PAGE_SIZE_MASK |
2827916635a8SSean Christopherson 					(this_cpu_has(X86_FEATURE_GBPAGES) ? get_random_bits(29, 13) : 0),
2828916635a8SSean Christopherson 				host_efer, host_cr4, guest_efer, guest_cr4);
2829916635a8SSean Christopherson 
2830916635a8SSean Christopherson 	_svm_npt_rsvd_bits_test(npt_get_pml4e(), BIT_ULL(8),
2831916635a8SSean Christopherson 				host_efer, host_cr4, guest_efer, guest_cr4);
2832916635a8SSean Christopherson 
2833916635a8SSean Christopherson 	wrmsr(MSR_EFER, saved_efer);
2834916635a8SSean Christopherson 	write_cr4(saved_cr4);
2835916635a8SSean Christopherson 	vmcb->save.efer = sg_efer;
2836916635a8SSean Christopherson 	vmcb->save.cr4  = sg_cr4;
2837916635a8SSean Christopherson }
28387a57ef5dSMaxim Levitsky 
28397a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false;
28407a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0;
28417a57ef5dSMaxim Levitsky 
28427a57ef5dSMaxim Levitsky 
28437a57ef5dSMaxim Levitsky /*
28447a57ef5dSMaxim Levitsky  *
28457a57ef5dSMaxim Levitsky  * Test the following errata:
28467a57ef5dSMaxim Levitsky  * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest,
28477a57ef5dSMaxim Levitsky  * the CPU would first check the EAX against host reserved memory
28487a57ef5dSMaxim Levitsky  * regions (so far only SMM_ADDR/SMM_MASK are known to cause it),
28497a57ef5dSMaxim Levitsky  * and only then signal #VMexit
28507a57ef5dSMaxim Levitsky  *
28517a57ef5dSMaxim Levitsky  * Try to reproduce this by trying vmsave on each possible 4K aligned memory
28527a57ef5dSMaxim Levitsky  * address in the low 4G where the SMM area has to reside.
28537a57ef5dSMaxim Levitsky  */
28547a57ef5dSMaxim Levitsky 
28557a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r)
28567a57ef5dSMaxim Levitsky {
28577a57ef5dSMaxim Levitsky     svm_errata_reproduced = true;
28587a57ef5dSMaxim Levitsky     /* skip over the vmsave instruction*/
28597a57ef5dSMaxim Levitsky     r->rip += 3;
28607a57ef5dSMaxim Levitsky }
28617a57ef5dSMaxim Levitsky 
28627a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void)
28637a57ef5dSMaxim Levitsky {
28647a57ef5dSMaxim Levitsky     unsigned long *last_page = NULL;
28657a57ef5dSMaxim Levitsky 
28667a57ef5dSMaxim Levitsky     handle_exception(GP_VECTOR, gp_isr);
28677a57ef5dSMaxim Levitsky 
28687a57ef5dSMaxim Levitsky     while (!svm_errata_reproduced) {
28697a57ef5dSMaxim Levitsky 
28707a57ef5dSMaxim Levitsky         unsigned long *page = alloc_pages(1);
28717a57ef5dSMaxim Levitsky 
28727a57ef5dSMaxim Levitsky         if (!page) {
28735c3582f0SJanis Schoetterl-Glausch             report_pass("All guest memory tested, no bug found");
28747a57ef5dSMaxim Levitsky             break;
28757a57ef5dSMaxim Levitsky         }
28767a57ef5dSMaxim Levitsky 
28777a57ef5dSMaxim Levitsky         physical = virt_to_phys(page);
28787a57ef5dSMaxim Levitsky 
28797a57ef5dSMaxim Levitsky         asm volatile (
28807a57ef5dSMaxim Levitsky             "mov %[_physical], %%rax\n\t"
28817a57ef5dSMaxim Levitsky             "vmsave %%rax\n\t"
28827a57ef5dSMaxim Levitsky 
28837a57ef5dSMaxim Levitsky             : [_physical] "=m" (physical)
28847a57ef5dSMaxim Levitsky             : /* no inputs*/
28857a57ef5dSMaxim Levitsky             : "rax" /*clobbers*/
28867a57ef5dSMaxim Levitsky         );
28877a57ef5dSMaxim Levitsky 
28887a57ef5dSMaxim Levitsky         if (svm_errata_reproduced) {
2889198dfd0eSJanis Schoetterl-Glausch             report_fail("Got #GP exception - svm errata reproduced at 0x%lx",
28907a57ef5dSMaxim Levitsky                         physical);
28917a57ef5dSMaxim Levitsky             break;
28927a57ef5dSMaxim Levitsky         }
28937a57ef5dSMaxim Levitsky 
28947a57ef5dSMaxim Levitsky         *page = (unsigned long)last_page;
28957a57ef5dSMaxim Levitsky         last_page = page;
28967a57ef5dSMaxim Levitsky     }
28977a57ef5dSMaxim Levitsky 
28987a57ef5dSMaxim Levitsky     while (last_page) {
28997a57ef5dSMaxim Levitsky         unsigned long *page = last_page;
29007a57ef5dSMaxim Levitsky         last_page = (unsigned long *)*last_page;
29017a57ef5dSMaxim Levitsky         free_pages_by_order(page, 1);
29027a57ef5dSMaxim Levitsky     }
29037a57ef5dSMaxim Levitsky }
29047a57ef5dSMaxim Levitsky 
29050b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test)
29060b6f6cedSKrish Sadhukhan {
29070b6f6cedSKrish Sadhukhan 	u64 vmcb_phys = virt_to_phys(vmcb);
29080b6f6cedSKrish Sadhukhan 
29090b6f6cedSKrish Sadhukhan 	asm volatile ("vmload %0" : : "a"(vmcb_phys));
29100b6f6cedSKrish Sadhukhan 	asm volatile ("vmsave %0" : : "a"(vmcb_phys));
29110b6f6cedSKrish Sadhukhan }
29120b6f6cedSKrish Sadhukhan 
29130b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void)
29140b6f6cedSKrish Sadhukhan {
29150b6f6cedSKrish Sadhukhan 	u32 intercept_saved = vmcb->control.intercept;
29160b6f6cedSKrish Sadhukhan 
29170b6f6cedSKrish Sadhukhan 	test_set_guest(vmload_vmsave_guest_main);
29180b6f6cedSKrish Sadhukhan 
29190b6f6cedSKrish Sadhukhan 	/*
29200b6f6cedSKrish Sadhukhan 	 * Disabling intercept for VMLOAD and VMSAVE doesn't cause
29210b6f6cedSKrish Sadhukhan 	 * respective #VMEXIT to host
29220b6f6cedSKrish Sadhukhan 	 */
29230b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
29240b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
29250b6f6cedSKrish Sadhukhan 	svm_vmrun();
29260b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
29270b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
29280b6f6cedSKrish Sadhukhan 
29290b6f6cedSKrish Sadhukhan 	/*
29300b6f6cedSKrish Sadhukhan 	 * Enabling intercept for VMLOAD and VMSAVE causes respective
29310b6f6cedSKrish Sadhukhan 	 * #VMEXIT to host
29320b6f6cedSKrish Sadhukhan 	 */
29330b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
29340b6f6cedSKrish Sadhukhan 	svm_vmrun();
29350b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
29360b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
29370b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
29380b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
29390b6f6cedSKrish Sadhukhan 	svm_vmrun();
29400b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
29410b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
29420b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
29430b6f6cedSKrish Sadhukhan 	svm_vmrun();
29440b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
29450b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
29460b6f6cedSKrish Sadhukhan 
29470b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD);
29480b6f6cedSKrish Sadhukhan 	svm_vmrun();
29490b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test "
29500b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT");
29510b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD);
29520b6f6cedSKrish Sadhukhan 	svm_vmrun();
29530b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
29540b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
29550b6f6cedSKrish Sadhukhan 
29560b6f6cedSKrish Sadhukhan 	vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE);
29570b6f6cedSKrish Sadhukhan 	svm_vmrun();
29580b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test "
29590b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT");
29600b6f6cedSKrish Sadhukhan 	vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE);
29610b6f6cedSKrish Sadhukhan 	svm_vmrun();
29620b6f6cedSKrish Sadhukhan 	report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test "
29630b6f6cedSKrish Sadhukhan 	    "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT");
29640b6f6cedSKrish Sadhukhan 
29650b6f6cedSKrish Sadhukhan 	vmcb->control.intercept = intercept_saved;
29660b6f6cedSKrish Sadhukhan }
29670b6f6cedSKrish Sadhukhan 
2968f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test)
2969f6972bd6SLara Lazier {
2970f6972bd6SLara Lazier     default_prepare(test);
2971f6972bd6SLara Lazier }
2972f6972bd6SLara Lazier 
2973f6972bd6SLara Lazier static void test_vgif(struct svm_test *test)
2974f6972bd6SLara Lazier {
2975f6972bd6SLara Lazier     asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t");
2976f6972bd6SLara Lazier 
2977f6972bd6SLara Lazier }
2978f6972bd6SLara Lazier 
2979f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test)
2980f6972bd6SLara Lazier {
2981f6972bd6SLara Lazier     switch (get_test_stage(test))
2982f6972bd6SLara Lazier     {
2983f6972bd6SLara Lazier     case 0:
2984f6972bd6SLara Lazier         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2985198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall.");
2986f6972bd6SLara Lazier             return true;
2987f6972bd6SLara Lazier         }
2988f6972bd6SLara Lazier         vmcb->control.int_ctl |= V_GIF_ENABLED_MASK;
2989f6972bd6SLara Lazier         vmcb->save.rip += 3;
2990f6972bd6SLara Lazier         inc_test_stage(test);
2991f6972bd6SLara Lazier         break;
2992f6972bd6SLara Lazier     case 1:
2993f6972bd6SLara Lazier         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
2994198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall.");
2995f6972bd6SLara Lazier             return true;
2996f6972bd6SLara Lazier         }
2997f6972bd6SLara Lazier         if (!(vmcb->control.int_ctl & V_GIF_MASK)) {
2998198dfd0eSJanis Schoetterl-Glausch             report_fail("Failed to set VGIF when executing STGI.");
2999f6972bd6SLara Lazier             vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
3000f6972bd6SLara Lazier             return true;
3001f6972bd6SLara Lazier         }
30025c3582f0SJanis Schoetterl-Glausch         report_pass("STGI set VGIF bit.");
3003f6972bd6SLara Lazier         vmcb->save.rip += 3;
3004f6972bd6SLara Lazier         inc_test_stage(test);
3005f6972bd6SLara Lazier         break;
3006f6972bd6SLara Lazier     case 2:
3007f6972bd6SLara Lazier         if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
3008198dfd0eSJanis Schoetterl-Glausch             report_fail("VMEXIT not due to vmmcall.");
3009f6972bd6SLara Lazier             return true;
3010f6972bd6SLara Lazier         }
3011f6972bd6SLara Lazier         if (vmcb->control.int_ctl & V_GIF_MASK) {
3012198dfd0eSJanis Schoetterl-Glausch             report_fail("Failed to clear VGIF when executing CLGI.");
3013f6972bd6SLara Lazier             vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
3014f6972bd6SLara Lazier             return true;
3015f6972bd6SLara Lazier         }
30165c3582f0SJanis Schoetterl-Glausch         report_pass("CLGI cleared VGIF bit.");
3017f6972bd6SLara Lazier         vmcb->save.rip += 3;
3018f6972bd6SLara Lazier         inc_test_stage(test);
3019f6972bd6SLara Lazier         vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK;
3020f6972bd6SLara Lazier         break;
3021f6972bd6SLara Lazier     default:
3022f6972bd6SLara Lazier         return true;
3023f6972bd6SLara Lazier         break;
3024f6972bd6SLara Lazier     }
3025f6972bd6SLara Lazier 
3026f6972bd6SLara Lazier     return get_test_stage(test) == 3;
3027f6972bd6SLara Lazier }
3028f6972bd6SLara Lazier 
3029f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test)
3030f6972bd6SLara Lazier {
3031f6972bd6SLara Lazier     return get_test_stage(test) == 3;
3032f6972bd6SLara Lazier }
3033f6972bd6SLara Lazier 
30348650dffeSMaxim Levitsky 
30358650dffeSMaxim Levitsky static int pause_test_counter;
30368650dffeSMaxim Levitsky static int wait_counter;
30378650dffeSMaxim Levitsky 
30388650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test)
30398650dffeSMaxim Levitsky {
30408650dffeSMaxim Levitsky     int i;
30418650dffeSMaxim Levitsky     for (i = 0 ; i < pause_test_counter ; i++)
30428650dffeSMaxim Levitsky         pause();
30438650dffeSMaxim Levitsky 
30448650dffeSMaxim Levitsky     if (!wait_counter)
30458650dffeSMaxim Levitsky         return;
30468650dffeSMaxim Levitsky 
30478650dffeSMaxim Levitsky     for (i = 0; i < wait_counter; i++)
30488650dffeSMaxim Levitsky         ;
30498650dffeSMaxim Levitsky 
30508650dffeSMaxim Levitsky     for (i = 0 ; i < pause_test_counter ; i++)
30518650dffeSMaxim Levitsky         pause();
30528650dffeSMaxim Levitsky 
30538650dffeSMaxim Levitsky }
30548650dffeSMaxim Levitsky 
30558650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold)
30568650dffeSMaxim Levitsky {
30578650dffeSMaxim Levitsky     test_set_guest(pause_filter_test_guest_main);
30588650dffeSMaxim Levitsky 
30598650dffeSMaxim Levitsky     pause_test_counter = pause_iterations;
30608650dffeSMaxim Levitsky     wait_counter = wait_iterations;
30618650dffeSMaxim Levitsky 
30628650dffeSMaxim Levitsky     vmcb->control.pause_filter_count = filter_value;
30638650dffeSMaxim Levitsky     vmcb->control.pause_filter_thresh = threshold;
30648650dffeSMaxim Levitsky     svm_vmrun();
30658650dffeSMaxim Levitsky 
30668650dffeSMaxim Levitsky     if (filter_value <= pause_iterations || wait_iterations < threshold)
30678650dffeSMaxim Levitsky         report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit");
30688650dffeSMaxim Levitsky     else
30698650dffeSMaxim Levitsky         report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit");
30708650dffeSMaxim Levitsky }
30718650dffeSMaxim Levitsky 
30728650dffeSMaxim Levitsky static void pause_filter_test(void)
30738650dffeSMaxim Levitsky {
30748650dffeSMaxim Levitsky     if (!pause_filter_supported()) {
30758650dffeSMaxim Levitsky             report_skip("PAUSE filter not supported in the guest");
30768650dffeSMaxim Levitsky             return;
30778650dffeSMaxim Levitsky     }
30788650dffeSMaxim Levitsky 
30798650dffeSMaxim Levitsky     vmcb->control.intercept |= (1 << INTERCEPT_PAUSE);
30808650dffeSMaxim Levitsky 
30818650dffeSMaxim Levitsky     // filter count more that pause count - no VMexit
30828650dffeSMaxim Levitsky     pause_filter_run_test(10, 9, 0, 0);
30838650dffeSMaxim Levitsky 
30848650dffeSMaxim Levitsky     // filter count smaller pause count - no VMexit
30858650dffeSMaxim Levitsky     pause_filter_run_test(20, 21, 0, 0);
30868650dffeSMaxim Levitsky 
30878650dffeSMaxim Levitsky 
30888650dffeSMaxim Levitsky     if (pause_threshold_supported()) {
30898650dffeSMaxim Levitsky         // filter count smaller pause count - no VMexit +  large enough threshold
30908650dffeSMaxim Levitsky         // so that filter counter resets
30918650dffeSMaxim Levitsky         pause_filter_run_test(20, 21, 1000, 10);
30928650dffeSMaxim Levitsky 
30938650dffeSMaxim Levitsky         // filter count smaller pause count - no VMexit +  small threshold
30948650dffeSMaxim Levitsky         // so that filter doesn't reset
30958650dffeSMaxim Levitsky         pause_filter_run_test(20, 21, 10, 1000);
30968650dffeSMaxim Levitsky     } else {
30978650dffeSMaxim Levitsky         report_skip("PAUSE threshold not supported in the guest");
30988650dffeSMaxim Levitsky         return;
30998650dffeSMaxim Levitsky     }
31008650dffeSMaxim Levitsky }
31018650dffeSMaxim Levitsky 
31028650dffeSMaxim Levitsky 
3103af13008dSManali Shukla static int of_test_counter;
3104af13008dSManali Shukla 
3105af13008dSManali Shukla static void guest_test_of_handler(struct ex_regs *r)
3106af13008dSManali Shukla {
3107af13008dSManali Shukla     of_test_counter++;
3108af13008dSManali Shukla }
3109af13008dSManali Shukla 
3110af13008dSManali Shukla static void svm_of_test_guest(struct svm_test *test)
3111af13008dSManali Shukla {
3112af13008dSManali Shukla     struct far_pointer32 fp = {
3113af13008dSManali Shukla         .offset = (uintptr_t)&&into,
3114af13008dSManali Shukla         .selector = KERNEL_CS32,
3115af13008dSManali Shukla     };
3116af13008dSManali Shukla     uintptr_t rsp;
3117af13008dSManali Shukla 
3118af13008dSManali Shukla     asm volatile ("mov %%rsp, %0" : "=r"(rsp));
3119af13008dSManali Shukla 
3120af13008dSManali Shukla     if (fp.offset != (uintptr_t)&&into) {
3121af13008dSManali Shukla         printf("Codee address too high.\n");
3122af13008dSManali Shukla         return;
3123af13008dSManali Shukla     }
3124af13008dSManali Shukla 
3125af13008dSManali Shukla     if ((u32)rsp != rsp) {
3126af13008dSManali Shukla         printf("Stack address too high.\n");
3127af13008dSManali Shukla     }
3128af13008dSManali Shukla 
3129af13008dSManali Shukla     asm goto("lcall *%0" : : "m" (fp) : "rax" : into);
3130af13008dSManali Shukla     return;
3131af13008dSManali Shukla into:
3132af13008dSManali Shukla 
3133af13008dSManali Shukla     asm volatile (".code32;"
3134af13008dSManali Shukla             "movl $0x7fffffff, %eax;"
3135af13008dSManali Shukla             "addl %eax, %eax;"
3136af13008dSManali Shukla             "into;"
3137af13008dSManali Shukla             "lret;"
3138af13008dSManali Shukla             ".code64");
3139af13008dSManali Shukla     __builtin_unreachable();
3140af13008dSManali Shukla }
3141af13008dSManali Shukla 
3142af13008dSManali Shukla static void svm_into_test(void)
3143af13008dSManali Shukla {
3144af13008dSManali Shukla     handle_exception(OF_VECTOR, guest_test_of_handler);
3145af13008dSManali Shukla     test_set_guest(svm_of_test_guest);
3146af13008dSManali Shukla     report(svm_vmrun() == SVM_EXIT_VMMCALL && of_test_counter == 1,
3147af13008dSManali Shukla         "#OF is generated in L2 exception handler0");
3148af13008dSManali Shukla }
3149af13008dSManali Shukla 
3150c8e16d20SManali Shukla static int bp_test_counter;
3151c8e16d20SManali Shukla 
3152c8e16d20SManali Shukla static void guest_test_bp_handler(struct ex_regs *r)
3153c8e16d20SManali Shukla {
3154c8e16d20SManali Shukla     bp_test_counter++;
3155c8e16d20SManali Shukla }
3156c8e16d20SManali Shukla 
3157c8e16d20SManali Shukla static void svm_bp_test_guest(struct svm_test *test)
3158c8e16d20SManali Shukla {
3159c8e16d20SManali Shukla     asm volatile("int3");
3160c8e16d20SManali Shukla }
3161c8e16d20SManali Shukla 
3162c8e16d20SManali Shukla static void svm_int3_test(void)
3163c8e16d20SManali Shukla {
3164c8e16d20SManali Shukla     handle_exception(BP_VECTOR, guest_test_bp_handler);
3165c8e16d20SManali Shukla     test_set_guest(svm_bp_test_guest);
3166c8e16d20SManali Shukla     report(svm_vmrun() == SVM_EXIT_VMMCALL && bp_test_counter == 1,
3167c8e16d20SManali Shukla         "#BP is handled in L2 exception handler");
3168c8e16d20SManali Shukla }
3169c8e16d20SManali Shukla 
31705c92f156SManali Shukla static int nm_test_counter;
31715c92f156SManali Shukla 
31725c92f156SManali Shukla static void guest_test_nm_handler(struct ex_regs *r)
31735c92f156SManali Shukla {
31745c92f156SManali Shukla     nm_test_counter++;
31755c92f156SManali Shukla     write_cr0(read_cr0() & ~X86_CR0_TS);
31765c92f156SManali Shukla     write_cr0(read_cr0() & ~X86_CR0_EM);
31775c92f156SManali Shukla }
31785c92f156SManali Shukla 
31795c92f156SManali Shukla static void svm_nm_test_guest(struct svm_test *test)
31805c92f156SManali Shukla {
31815c92f156SManali Shukla     asm volatile("fnop");
31825c92f156SManali Shukla }
31835c92f156SManali Shukla 
31845c92f156SManali Shukla /* This test checks that:
31855c92f156SManali Shukla  *
31865c92f156SManali Shukla  * (a) If CR0.TS is set in L2, #NM is handled by L2 when
31875c92f156SManali Shukla  *     just an L2 handler is registered.
31885c92f156SManali Shukla  *
31895c92f156SManali Shukla  * (b) If CR0.TS is cleared and CR0.EM is set, #NM is handled
31905c92f156SManali Shukla  *     by L2 when just an l2 handler is registered.
31915c92f156SManali Shukla  *
31925c92f156SManali Shukla  * (c) If CR0.TS and CR0.EM are cleared in L2, no exception
31935c92f156SManali Shukla  *     is generated.
31945c92f156SManali Shukla  */
31955c92f156SManali Shukla 
31965c92f156SManali Shukla static void svm_nm_test(void)
31975c92f156SManali Shukla {
31985c92f156SManali Shukla     handle_exception(NM_VECTOR, guest_test_nm_handler);
31995c92f156SManali Shukla     write_cr0(read_cr0() & ~X86_CR0_TS);
32005c92f156SManali Shukla     test_set_guest(svm_nm_test_guest);
32015c92f156SManali Shukla 
32025c92f156SManali Shukla     vmcb->save.cr0 = vmcb->save.cr0 | X86_CR0_TS;
32035c92f156SManali Shukla     report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 1,
32045c92f156SManali Shukla         "fnop with CR0.TS set in L2, #NM is triggered");
32055c92f156SManali Shukla 
32065c92f156SManali Shukla     vmcb->save.cr0 = (vmcb->save.cr0 & ~X86_CR0_TS) | X86_CR0_EM;
32075c92f156SManali Shukla     report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 2,
32085c92f156SManali Shukla         "fnop with CR0.EM set in L2, #NM is triggered");
32095c92f156SManali Shukla 
32105c92f156SManali Shukla     vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM);
32115c92f156SManali Shukla     report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 2,
3212912c0d72SThomas Huth         "fnop with CR0.TS and CR0.EM unset no #NM exception");
32135c92f156SManali Shukla }
3214f6972bd6SLara Lazier 
3215537d39dfSMaxim Levitsky 
3216537d39dfSMaxim Levitsky static bool check_lbr(u64 *from_excepted, u64 *to_expected)
3217537d39dfSMaxim Levitsky {
3218537d39dfSMaxim Levitsky 	u64 from = rdmsr(MSR_IA32_LASTBRANCHFROMIP);
3219537d39dfSMaxim Levitsky 	u64 to = rdmsr(MSR_IA32_LASTBRANCHTOIP);
3220537d39dfSMaxim Levitsky 
3221537d39dfSMaxim Levitsky 	if ((u64)from_excepted != from) {
3222537d39dfSMaxim Levitsky 		report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx",
3223537d39dfSMaxim Levitsky 			(u64)from_excepted, from);
3224537d39dfSMaxim Levitsky 		return false;
3225537d39dfSMaxim Levitsky 	}
3226537d39dfSMaxim Levitsky 
3227537d39dfSMaxim Levitsky 	if ((u64)to_expected != to) {
3228537d39dfSMaxim Levitsky 		report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx",
3229537d39dfSMaxim Levitsky 			(u64)from_excepted, from);
3230537d39dfSMaxim Levitsky 		return false;
3231537d39dfSMaxim Levitsky 	}
3232537d39dfSMaxim Levitsky 
3233537d39dfSMaxim Levitsky 	return true;
3234537d39dfSMaxim Levitsky }
3235537d39dfSMaxim Levitsky 
3236537d39dfSMaxim Levitsky static bool check_dbgctl(u64 dbgctl, u64 dbgctl_expected)
3237537d39dfSMaxim Levitsky {
3238537d39dfSMaxim Levitsky 	if (dbgctl != dbgctl_expected) {
3239537d39dfSMaxim Levitsky 		report(false, "Unexpected MSR_IA32_DEBUGCTLMSR value 0x%lx", dbgctl);
3240537d39dfSMaxim Levitsky 		return false;
3241537d39dfSMaxim Levitsky 	}
3242537d39dfSMaxim Levitsky 	return true;
3243537d39dfSMaxim Levitsky }
3244537d39dfSMaxim Levitsky 
3245537d39dfSMaxim Levitsky 
3246537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name) \
3247537d39dfSMaxim Levitsky 	asm volatile ( \
3248537d39dfSMaxim Levitsky 		# branch_name "_from:" \
3249537d39dfSMaxim Levitsky 		"jmp " # branch_name  "_to\n" \
3250537d39dfSMaxim Levitsky 		"nop\n" \
3251537d39dfSMaxim Levitsky 		"nop\n" \
3252537d39dfSMaxim Levitsky 		# branch_name  "_to:" \
3253537d39dfSMaxim Levitsky 		"nop\n" \
3254537d39dfSMaxim Levitsky 	)
3255537d39dfSMaxim Levitsky 
3256537d39dfSMaxim Levitsky 
3257537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to;
3258537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to;
3259537d39dfSMaxim Levitsky 
3260537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to;
3261537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to;
3262537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to;
3263537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to;
3264537d39dfSMaxim Levitsky 
3265537d39dfSMaxim Levitsky u64 dbgctl;
3266537d39dfSMaxim Levitsky 
3267537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void)
3268537d39dfSMaxim Levitsky {
3269537d39dfSMaxim Levitsky 	/*
3270537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be already enabled when it starts,
3271537d39dfSMaxim Levitsky 	 * it does a branch, and then disables the LBR and then checks.
3272537d39dfSMaxim Levitsky 	 */
3273537d39dfSMaxim Levitsky 
3274537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch0);
3275537d39dfSMaxim Levitsky 
3276537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3277537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3278537d39dfSMaxim Levitsky 
3279537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
3280537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3281537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0)
3282537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3283537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch0_from)
3284537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3285537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch0_to)
3286537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3287537d39dfSMaxim Levitsky 
3288537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
3289537d39dfSMaxim Levitsky }
3290537d39dfSMaxim Levitsky 
3291537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void)
3292537d39dfSMaxim Levitsky {
3293537d39dfSMaxim Levitsky 	/*
3294537d39dfSMaxim Levitsky 	 * This guest expects the LBR to be disabled when it starts,
3295537d39dfSMaxim Levitsky 	 * enables it, does a branch, disables it and then checks.
3296537d39dfSMaxim Levitsky 	 */
3297537d39dfSMaxim Levitsky 
3298537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch1);
3299537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3300537d39dfSMaxim Levitsky 
3301537d39dfSMaxim Levitsky 	if (dbgctl != 0)
3302537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3303537d39dfSMaxim Levitsky 
3304537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&host_branch2_from)
3305537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3306537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&host_branch2_to)
3307537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3308537d39dfSMaxim Levitsky 
3309537d39dfSMaxim Levitsky 
3310537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3311537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3312537d39dfSMaxim Levitsky 	DO_BRANCH(guest_branch2);
3313537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3314537d39dfSMaxim Levitsky 
3315537d39dfSMaxim Levitsky 	if (dbgctl != DEBUGCTLMSR_LBR)
3316537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3317537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch2_from)
3318537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3319537d39dfSMaxim Levitsky 	if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch2_to)
3320537d39dfSMaxim Levitsky 		asm volatile("ud2\n");
3321537d39dfSMaxim Levitsky 
3322537d39dfSMaxim Levitsky 	asm volatile ("vmmcall\n");
3323537d39dfSMaxim Levitsky }
3324537d39dfSMaxim Levitsky 
3325537d39dfSMaxim Levitsky static void svm_lbrv_test0(void)
3326537d39dfSMaxim Levitsky {
3327537d39dfSMaxim Levitsky 	report(true, "Basic LBR test");
3328537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3329537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch0);
3330537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3331537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3332537d39dfSMaxim Levitsky 
3333537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
3334537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3335537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
3336537d39dfSMaxim Levitsky 
3337537d39dfSMaxim Levitsky 	check_lbr(&host_branch0_from, &host_branch0_to);
3338537d39dfSMaxim Levitsky }
3339537d39dfSMaxim Levitsky 
3340537d39dfSMaxim Levitsky static void svm_lbrv_test1(void)
3341537d39dfSMaxim Levitsky {
3342537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)");
3343537d39dfSMaxim Levitsky 
3344537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest1;
3345537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
3346537d39dfSMaxim Levitsky 
3347537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3348537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch1);
3349537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
3350537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3351537d39dfSMaxim Levitsky 
3352537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
3353537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
3354537d39dfSMaxim Levitsky 		vmcb->control.exit_code);
3355537d39dfSMaxim Levitsky 		return;
3356537d39dfSMaxim Levitsky 	}
3357537d39dfSMaxim Levitsky 
3358537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
3359537d39dfSMaxim Levitsky 	check_lbr(&guest_branch0_from, &guest_branch0_to);
3360537d39dfSMaxim Levitsky }
3361537d39dfSMaxim Levitsky 
3362537d39dfSMaxim Levitsky static void svm_lbrv_test2(void)
3363537d39dfSMaxim Levitsky {
3364537d39dfSMaxim Levitsky 	report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)");
3365537d39dfSMaxim Levitsky 
3366537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest2;
3367537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = 0;
3368537d39dfSMaxim Levitsky 
3369537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3370537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch2);
3371537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3372537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
3373537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3374537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3375537d39dfSMaxim Levitsky 
3376537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
3377537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
3378537d39dfSMaxim Levitsky 		vmcb->control.exit_code);
3379537d39dfSMaxim Levitsky 		return;
3380537d39dfSMaxim Levitsky 	}
3381537d39dfSMaxim Levitsky 
3382537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, 0);
3383537d39dfSMaxim Levitsky 	check_lbr(&guest_branch2_from, &guest_branch2_to);
3384537d39dfSMaxim Levitsky }
3385537d39dfSMaxim Levitsky 
3386537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void)
3387537d39dfSMaxim Levitsky {
3388537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
3389537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
3390537d39dfSMaxim Levitsky 		return;
3391537d39dfSMaxim Levitsky 	}
3392537d39dfSMaxim Levitsky 
3393537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)");
3394537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest1;
3395537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
3396537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = DEBUGCTLMSR_LBR;
3397537d39dfSMaxim Levitsky 
3398537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3399537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch3);
3400537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
3401537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3402537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3403537d39dfSMaxim Levitsky 
3404537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
3405537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
3406537d39dfSMaxim Levitsky 		vmcb->control.exit_code);
3407537d39dfSMaxim Levitsky 		return;
3408537d39dfSMaxim Levitsky 	}
3409537d39dfSMaxim Levitsky 
3410537d39dfSMaxim Levitsky 	if (vmcb->save.dbgctl != 0) {
3411537d39dfSMaxim Levitsky 		report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl);
3412537d39dfSMaxim Levitsky 		return;
3413537d39dfSMaxim Levitsky 	}
3414537d39dfSMaxim Levitsky 
3415537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
3416537d39dfSMaxim Levitsky 	check_lbr(&host_branch3_from, &host_branch3_to);
3417537d39dfSMaxim Levitsky }
3418537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void)
3419537d39dfSMaxim Levitsky {
3420537d39dfSMaxim Levitsky 	if (!lbrv_supported()) {
3421537d39dfSMaxim Levitsky 		report_skip("LBRV not supported in the guest");
3422537d39dfSMaxim Levitsky 		return;
3423537d39dfSMaxim Levitsky 	}
3424537d39dfSMaxim Levitsky 
3425537d39dfSMaxim Levitsky 	report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)");
3426537d39dfSMaxim Levitsky 	vmcb->save.rip = (ulong)svm_lbrv_test_guest2;
3427537d39dfSMaxim Levitsky 	vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK;
3428537d39dfSMaxim Levitsky 
3429537d39dfSMaxim Levitsky 	vmcb->save.dbgctl = 0;
3430537d39dfSMaxim Levitsky 	vmcb->save.br_from = (u64)&host_branch2_from;
3431537d39dfSMaxim Levitsky 	vmcb->save.br_to = (u64)&host_branch2_to;
3432537d39dfSMaxim Levitsky 
3433537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR);
3434537d39dfSMaxim Levitsky 	DO_BRANCH(host_branch4);
3435537d39dfSMaxim Levitsky 	SVM_BARE_VMRUN;
3436537d39dfSMaxim Levitsky 	dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR);
3437537d39dfSMaxim Levitsky 	wrmsr(MSR_IA32_DEBUGCTLMSR, 0);
3438537d39dfSMaxim Levitsky 
3439537d39dfSMaxim Levitsky 	if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) {
3440537d39dfSMaxim Levitsky 		report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x",
3441537d39dfSMaxim Levitsky 		vmcb->control.exit_code);
3442537d39dfSMaxim Levitsky 		return;
3443537d39dfSMaxim Levitsky 	}
3444537d39dfSMaxim Levitsky 
3445537d39dfSMaxim Levitsky 	check_dbgctl(dbgctl, DEBUGCTLMSR_LBR);
3446537d39dfSMaxim Levitsky 	check_lbr(&host_branch4_from, &host_branch4_to);
3447537d39dfSMaxim Levitsky }
3448537d39dfSMaxim Levitsky 
3449c45bccfcSMaxim Levitsky 
3450c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception
3451c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works
3452c45bccfcSMaxim Levitsky 
3453c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied;
3454c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs)
3455c45bccfcSMaxim Levitsky {
3456c45bccfcSMaxim Levitsky 	dummy_isr_recevied++;
3457c45bccfcSMaxim Levitsky 	eoi();
3458c45bccfcSMaxim Levitsky }
3459c45bccfcSMaxim Levitsky 
3460c45bccfcSMaxim Levitsky 
3461c45bccfcSMaxim Levitsky static volatile int nmi_recevied;
3462c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs)
3463c45bccfcSMaxim Levitsky {
3464c45bccfcSMaxim Levitsky 	nmi_recevied++;
3465c45bccfcSMaxim Levitsky }
3466c45bccfcSMaxim Levitsky 
3467c45bccfcSMaxim Levitsky 
3468c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit)
3469c45bccfcSMaxim Levitsky {
3470c45bccfcSMaxim Levitsky 	if (counter)
3471c45bccfcSMaxim Levitsky 		*counter = 0;
3472c45bccfcSMaxim Levitsky 
3473c45bccfcSMaxim Levitsky 	sti();  // host IF value should not matter
3474c45bccfcSMaxim Levitsky 	clgi(); // vmrun will set back GI to 1
3475c45bccfcSMaxim Levitsky 
3476c45bccfcSMaxim Levitsky 	svm_vmrun();
3477c45bccfcSMaxim Levitsky 
3478c45bccfcSMaxim Levitsky 	if (counter)
3479c45bccfcSMaxim Levitsky 		report(!*counter, "No interrupt expected");
3480c45bccfcSMaxim Levitsky 
3481c45bccfcSMaxim Levitsky 	stgi();
3482c45bccfcSMaxim Levitsky 
3483c45bccfcSMaxim Levitsky 	if (counter)
3484c45bccfcSMaxim Levitsky 		report(*counter == 1, "Interrupt is expected");
3485c45bccfcSMaxim Levitsky 
3486c45bccfcSMaxim Levitsky 	report (vmcb->control.exit_code == expected_vmexit, "Test expected VM exit");
3487c45bccfcSMaxim Levitsky 	report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now");
3488c45bccfcSMaxim Levitsky 	cli();
3489c45bccfcSMaxim Levitsky }
3490c45bccfcSMaxim Levitsky 
3491c45bccfcSMaxim Levitsky 
3492c45bccfcSMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enought to trigger an interrupt
3493c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test)
3494c45bccfcSMaxim Levitsky {
3495c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3496c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3497c45bccfcSMaxim Levitsky 	sti();
3498c45bccfcSMaxim Levitsky 	asm volatile("nop");
3499c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3500c45bccfcSMaxim Levitsky }
3501c45bccfcSMaxim Levitsky 
3502c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void)
3503c45bccfcSMaxim Levitsky {
3504c45bccfcSMaxim Levitsky 	// make a physical interrupt to be pending
3505c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3506c45bccfcSMaxim Levitsky 
3507c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3508c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3509c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3510c45bccfcSMaxim Levitsky 
3511c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_if_guest);
3512c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3513c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3514c45bccfcSMaxim Levitsky }
3515c45bccfcSMaxim Levitsky 
3516c45bccfcSMaxim Levitsky 
3517c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3518c45bccfcSMaxim Levitsky // if GIF is not intercepted
3519c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test)
3520c45bccfcSMaxim Levitsky {
3521c45bccfcSMaxim Levitsky 
3522c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3523c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3524c45bccfcSMaxim Levitsky 
3525c45bccfcSMaxim Levitsky 	// clear GIF and enable IF
3526c45bccfcSMaxim Levitsky 	// that should still not cause VM exit
3527c45bccfcSMaxim Levitsky 	clgi();
3528c45bccfcSMaxim Levitsky 	sti();
3529c45bccfcSMaxim Levitsky 	asm volatile("nop");
3530c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3531c45bccfcSMaxim Levitsky 
3532c45bccfcSMaxim Levitsky 	stgi();
3533c45bccfcSMaxim Levitsky 	asm volatile("nop");
3534c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3535c45bccfcSMaxim Levitsky }
3536c45bccfcSMaxim Levitsky 
3537c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void)
3538c45bccfcSMaxim Levitsky {
3539c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3540c45bccfcSMaxim Levitsky 
3541c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3542c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3543c45bccfcSMaxim Levitsky 	vmcb->save.rflags &= ~X86_EFLAGS_IF;
3544c45bccfcSMaxim Levitsky 
3545c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest);
3546c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3547c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3548c45bccfcSMaxim Levitsky }
3549c45bccfcSMaxim Levitsky 
3550c45bccfcSMaxim Levitsky 
3551c45bccfcSMaxim Levitsky 
3552c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF
3553c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest
3554c45bccfcSMaxim Levitsky // started running
3555c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test)
3556c45bccfcSMaxim Levitsky {
3557c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3558c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3559c45bccfcSMaxim Levitsky 
3560c45bccfcSMaxim Levitsky 	clgi();
3561c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0);
3562c45bccfcSMaxim Levitsky 	report(!dummy_isr_recevied, "No interrupt expected");
3563c45bccfcSMaxim Levitsky 
3564c45bccfcSMaxim Levitsky 	stgi();
3565c45bccfcSMaxim Levitsky 	asm volatile("nop");
3566c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3567c45bccfcSMaxim Levitsky }
3568c45bccfcSMaxim Levitsky 
3569c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void)
3570c45bccfcSMaxim Levitsky {
3571c45bccfcSMaxim Levitsky 	handle_irq(0x55, dummy_isr);
3572c45bccfcSMaxim Levitsky 
3573c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_INTR);
3574c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3575c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3576c45bccfcSMaxim Levitsky 
3577c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_gif_guest2);
3578c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR);
3579c45bccfcSMaxim Levitsky }
3580c45bccfcSMaxim Levitsky 
3581c45bccfcSMaxim Levitsky 
3582c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF
3583c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test)
3584c45bccfcSMaxim Levitsky {
3585c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3586c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3587c45bccfcSMaxim Levitsky 	cli(); // should have no effect
3588c45bccfcSMaxim Levitsky 
3589c45bccfcSMaxim Levitsky 	clgi();
3590c45bccfcSMaxim Levitsky 	asm volatile("nop");
3591c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0);
3592c45bccfcSMaxim Levitsky 	sti(); // should have no effect
3593c45bccfcSMaxim Levitsky 	asm volatile("nop");
3594c45bccfcSMaxim Levitsky 	report(!nmi_recevied, "No NMI expected");
3595c45bccfcSMaxim Levitsky 
3596c45bccfcSMaxim Levitsky 	stgi();
3597c45bccfcSMaxim Levitsky 	asm volatile("nop");
3598c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3599c45bccfcSMaxim Levitsky }
3600c45bccfcSMaxim Levitsky 
3601c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void)
3602c45bccfcSMaxim Levitsky {
3603c45bccfcSMaxim Levitsky 	handle_exception(2, dummy_nmi_handler);
3604c45bccfcSMaxim Levitsky 
3605c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_NMI);
3606c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3607c45bccfcSMaxim Levitsky 	vmcb->save.rflags |= X86_EFLAGS_IF;
3608c45bccfcSMaxim Levitsky 
3609c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_nmi_guest);
3610c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI);
3611c45bccfcSMaxim Levitsky }
3612c45bccfcSMaxim Levitsky 
3613c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF
3614c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang
3615c45bccfcSMaxim Levitsky // and VMexits on SMI
3616c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test)
3617c45bccfcSMaxim Levitsky {
3618c45bccfcSMaxim Levitsky 	asm volatile("nop;nop;nop;nop");
3619c45bccfcSMaxim Levitsky 
3620c45bccfcSMaxim Levitsky 	clgi();
3621c45bccfcSMaxim Levitsky 	asm volatile("nop");
3622c45bccfcSMaxim Levitsky 	apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0);
3623c45bccfcSMaxim Levitsky 	sti(); // should have no effect
3624c45bccfcSMaxim Levitsky 	asm volatile("nop");
3625c45bccfcSMaxim Levitsky 	stgi();
3626c45bccfcSMaxim Levitsky 	asm volatile("nop");
3627c45bccfcSMaxim Levitsky 	report(0, "must not reach here");
3628c45bccfcSMaxim Levitsky }
3629c45bccfcSMaxim Levitsky 
3630c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void)
3631c45bccfcSMaxim Levitsky {
3632c45bccfcSMaxim Levitsky 	vmcb->control.intercept |= (1 << INTERCEPT_SMI);
3633c45bccfcSMaxim Levitsky 	vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
3634c45bccfcSMaxim Levitsky 	test_set_guest(svm_intr_intercept_mix_smi_guest);
3635c45bccfcSMaxim Levitsky 	svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI);
3636c45bccfcSMaxim Levitsky }
3637c45bccfcSMaxim Levitsky 
3638*712840d5SManali Shukla static struct svm_test svm_tests[] = {
3639ad879127SKrish Sadhukhan     { "null", default_supported, default_prepare,
3640ad879127SKrish Sadhukhan       default_prepare_gif_clear, null_test,
3641ad879127SKrish Sadhukhan       default_finished, null_check },
3642ad879127SKrish Sadhukhan     { "vmrun", default_supported, default_prepare,
3643ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_vmrun,
3644ad879127SKrish Sadhukhan        default_finished, check_vmrun },
3645ad879127SKrish Sadhukhan     { "ioio", default_supported, prepare_ioio,
3646ad879127SKrish Sadhukhan        default_prepare_gif_clear, test_ioio,
3647ad879127SKrish Sadhukhan        ioio_finished, check_ioio },
3648ad879127SKrish Sadhukhan     { "vmrun intercept check", default_supported, prepare_no_vmrun_int,
3649ad879127SKrish Sadhukhan       default_prepare_gif_clear, null_test, default_finished,
3650ad879127SKrish Sadhukhan       check_no_vmrun_int },
3651401299a5SPaolo Bonzini     { "rsm", default_supported,
3652401299a5SPaolo Bonzini       prepare_rsm_intercept, default_prepare_gif_clear,
3653401299a5SPaolo Bonzini       test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept },
3654ad879127SKrish Sadhukhan     { "cr3 read intercept", default_supported,
3655ad879127SKrish Sadhukhan       prepare_cr3_intercept, default_prepare_gif_clear,
3656ad879127SKrish Sadhukhan       test_cr3_intercept, default_finished, check_cr3_intercept },
3657ad879127SKrish Sadhukhan     { "cr3 read nointercept", default_supported, default_prepare,
3658ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_cr3_intercept, default_finished,
3659ad879127SKrish Sadhukhan       check_cr3_nointercept },
3660ad879127SKrish Sadhukhan     { "cr3 read intercept emulate", smp_supported,
3661ad879127SKrish Sadhukhan       prepare_cr3_intercept_bypass, default_prepare_gif_clear,
3662ad879127SKrish Sadhukhan       test_cr3_intercept_bypass, default_finished, check_cr3_intercept },
3663ad879127SKrish Sadhukhan     { "dr intercept check", default_supported, prepare_dr_intercept,
3664ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished,
3665ad879127SKrish Sadhukhan       check_dr_intercept },
3666ad879127SKrish Sadhukhan     { "next_rip", next_rip_supported, prepare_next_rip,
3667ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_next_rip,
3668ad879127SKrish Sadhukhan       default_finished, check_next_rip },
3669ad879127SKrish Sadhukhan     { "msr intercept check", default_supported, prepare_msr_intercept,
3670ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_msr_intercept,
3671ad879127SKrish Sadhukhan       msr_intercept_finished, check_msr_intercept },
3672ad879127SKrish Sadhukhan     { "mode_switch", default_supported, prepare_mode_switch,
3673ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_mode_switch,
3674ad879127SKrish Sadhukhan        mode_switch_finished, check_mode_switch },
3675ad879127SKrish Sadhukhan     { "asid_zero", default_supported, prepare_asid_zero,
3676ad879127SKrish Sadhukhan       default_prepare_gif_clear, test_asid_zero,
3677ad879127SKrish Sadhukhan        default_finished, check_asid_zero },
3678ad879127SKrish Sadhukhan     { "sel_cr0_bug", default_supported, sel_cr0_bug_prepare,
3679ad879127SKrish Sadhukhan       default_prepare_gif_clear, sel_cr0_bug_test,
3680ad879127SKrish Sadhukhan        sel_cr0_bug_finished, sel_cr0_bug_check },
3681ad879127SKrish Sadhukhan     { "npt_nx", npt_supported, npt_nx_prepare,
3682ad879127SKrish Sadhukhan       default_prepare_gif_clear, null_test,
3683ad879127SKrish Sadhukhan       default_finished, npt_nx_check },
36846faca2a5SKrish Sadhukhan     { "npt_np", npt_supported, npt_np_prepare,
36856faca2a5SKrish Sadhukhan       default_prepare_gif_clear, npt_np_test,
36866faca2a5SKrish Sadhukhan       default_finished, npt_np_check },
3687ad879127SKrish Sadhukhan     { "npt_us", npt_supported, npt_us_prepare,
3688ad879127SKrish Sadhukhan       default_prepare_gif_clear, npt_us_test,
3689ad879127SKrish Sadhukhan       default_finished, npt_us_check },
3690ad879127SKrish Sadhukhan     { "npt_rw", npt_supported, npt_rw_prepare,
3691ad879127SKrish Sadhukhan       default_prepare_gif_clear, npt_rw_test,
3692ad879127SKrish Sadhukhan       default_finished, npt_rw_check },
3693ad879127SKrish Sadhukhan     { "npt_rw_pfwalk", npt_supported, npt_rw_pfwalk_prepare,
3694ad879127SKrish Sadhukhan       default_prepare_gif_clear, null_test,
3695ad879127SKrish Sadhukhan       default_finished, npt_rw_pfwalk_check },
3696ad879127SKrish Sadhukhan     { "npt_l1mmio", npt_supported, npt_l1mmio_prepare,
3697ad879127SKrish Sadhukhan       default_prepare_gif_clear, npt_l1mmio_test,
3698ad879127SKrish Sadhukhan       default_finished, npt_l1mmio_check },
3699ad879127SKrish Sadhukhan     { "npt_rw_l1mmio", npt_supported, npt_rw_l1mmio_prepare,
3700ad879127SKrish Sadhukhan       default_prepare_gif_clear, npt_rw_l1mmio_test,
3701ad879127SKrish Sadhukhan       default_finished, npt_rw_l1mmio_check },
370210a65fc4SNadav Amit     { "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare,
3703ad879127SKrish Sadhukhan       default_prepare_gif_clear, tsc_adjust_test,
3704ad879127SKrish Sadhukhan       default_finished, tsc_adjust_check },
3705ad879127SKrish Sadhukhan     { "latency_run_exit", default_supported, latency_prepare,
3706ad879127SKrish Sadhukhan       default_prepare_gif_clear, latency_test,
3707ad879127SKrish Sadhukhan       latency_finished, latency_check },
3708f7fa53dcSPaolo Bonzini     { "latency_run_exit_clean", default_supported, latency_prepare,
3709f7fa53dcSPaolo Bonzini       default_prepare_gif_clear, latency_test,
3710f7fa53dcSPaolo Bonzini       latency_finished_clean, latency_check },
3711ad879127SKrish Sadhukhan     { "latency_svm_insn", default_supported, lat_svm_insn_prepare,
3712ad879127SKrish Sadhukhan       default_prepare_gif_clear, null_test,
3713ad879127SKrish Sadhukhan       lat_svm_insn_finished, lat_svm_insn_check },
37144b4fb247SPaolo Bonzini     { "exc_inject", default_supported, exc_inject_prepare,
37154b4fb247SPaolo Bonzini       default_prepare_gif_clear, exc_inject_test,
37164b4fb247SPaolo Bonzini       exc_inject_finished, exc_inject_check },
3717ad879127SKrish Sadhukhan     { "pending_event", default_supported, pending_event_prepare,
3718ad879127SKrish Sadhukhan       default_prepare_gif_clear,
3719ad879127SKrish Sadhukhan       pending_event_test, pending_event_finished, pending_event_check },
372085dc2aceSPaolo Bonzini     { "pending_event_cli", default_supported, pending_event_cli_prepare,
372185dc2aceSPaolo Bonzini       pending_event_cli_prepare_gif_clear,
372285dc2aceSPaolo Bonzini       pending_event_cli_test, pending_event_cli_finished,
372385dc2aceSPaolo Bonzini       pending_event_cli_check },
372485dc2aceSPaolo Bonzini     { "interrupt", default_supported, interrupt_prepare,
372585dc2aceSPaolo Bonzini       default_prepare_gif_clear, interrupt_test,
372685dc2aceSPaolo Bonzini       interrupt_finished, interrupt_check },
3727d4db486bSCathy Avery     { "nmi", default_supported, nmi_prepare,
3728d4db486bSCathy Avery       default_prepare_gif_clear, nmi_test,
3729d4db486bSCathy Avery       nmi_finished, nmi_check },
37309da1f4d8SCathy Avery     { "nmi_hlt", smp_supported, nmi_prepare,
37319da1f4d8SCathy Avery       default_prepare_gif_clear, nmi_hlt_test,
37329da1f4d8SCathy Avery       nmi_hlt_finished, nmi_hlt_check },
37339c838954SCathy Avery     { "virq_inject", default_supported, virq_inject_prepare,
37349c838954SCathy Avery       default_prepare_gif_clear, virq_inject_test,
37359c838954SCathy Avery       virq_inject_finished, virq_inject_check },
3736da338a31SMaxim Levitsky     { "reg_corruption", default_supported, reg_corruption_prepare,
3737da338a31SMaxim Levitsky       default_prepare_gif_clear, reg_corruption_test,
3738da338a31SMaxim Levitsky       reg_corruption_finished, reg_corruption_check },
37394770e9c8SCathy Avery     { "svm_init_startup_test", smp_supported, init_startup_prepare,
37404770e9c8SCathy Avery       default_prepare_gif_clear, null_test,
37414770e9c8SCathy Avery       init_startup_finished, init_startup_check },
3742d5da6dfeSCathy Avery     { "svm_init_intercept_test", smp_supported, init_intercept_prepare,
3743d5da6dfeSCathy Avery       default_prepare_gif_clear, init_intercept_test,
3744d5da6dfeSCathy Avery       init_intercept_finished, init_intercept_check, .on_vcpu = 2 },
37457839b0ecSKrish Sadhukhan     { "host_rflags", default_supported, host_rflags_prepare,
37467839b0ecSKrish Sadhukhan       host_rflags_prepare_gif_clear, host_rflags_test,
37477839b0ecSKrish Sadhukhan       host_rflags_finished, host_rflags_check },
3748f6972bd6SLara Lazier     { "vgif", vgif_supported, prepare_vgif_enabled,
3749f6972bd6SLara Lazier       default_prepare_gif_clear, test_vgif, vgif_finished,
3750f6972bd6SLara Lazier       vgif_check },
3751f32183f5SJim Mattson     TEST(svm_cr4_osxsave_test),
3752ba29942cSKrish Sadhukhan     TEST(svm_guest_state_test),
3753916635a8SSean Christopherson     TEST(svm_npt_rsvd_bits_test),
37547a57ef5dSMaxim Levitsky     TEST(svm_vmrun_errata_test),
37550b6f6cedSKrish Sadhukhan     TEST(svm_vmload_vmsave),
3756665f5677SKrish Sadhukhan     TEST(svm_test_singlestep),
37575c92f156SManali Shukla     TEST(svm_nm_test),
3758c8e16d20SManali Shukla     TEST(svm_int3_test),
3759af13008dSManali Shukla     TEST(svm_into_test),
3760537d39dfSMaxim Levitsky     TEST(svm_lbrv_test0),
3761537d39dfSMaxim Levitsky     TEST(svm_lbrv_test1),
3762537d39dfSMaxim Levitsky     TEST(svm_lbrv_test2),
3763537d39dfSMaxim Levitsky     TEST(svm_lbrv_nested_test1),
3764537d39dfSMaxim Levitsky     TEST(svm_lbrv_nested_test2),
3765c45bccfcSMaxim Levitsky     TEST(svm_intr_intercept_mix_if),
3766c45bccfcSMaxim Levitsky     TEST(svm_intr_intercept_mix_gif),
3767c45bccfcSMaxim Levitsky     TEST(svm_intr_intercept_mix_gif2),
3768c45bccfcSMaxim Levitsky     TEST(svm_intr_intercept_mix_nmi),
3769c45bccfcSMaxim Levitsky     TEST(svm_intr_intercept_mix_smi),
3770a8503d50SMaxim Levitsky     TEST(svm_tsc_scale_test),
37718650dffeSMaxim Levitsky     TEST(pause_filter_test),
3772ad879127SKrish Sadhukhan     { NULL, NULL, NULL, NULL, NULL, NULL, NULL }
3773ad879127SKrish Sadhukhan };
3774*712840d5SManali Shukla 
3775*712840d5SManali Shukla int main(int ac, char **av)
3776*712840d5SManali Shukla {
3777*712840d5SManali Shukla 	pteval_t opt_mask = 0;
3778*712840d5SManali Shukla 
3779*712840d5SManali Shukla 	__setup_vm(&opt_mask);
3780*712840d5SManali Shukla 	return run_svm_tests(ac, av, svm_tests);
3781*712840d5SManali Shukla }
3782