1ad879127SKrish Sadhukhan #include "svm.h" 2ad879127SKrish Sadhukhan #include "libcflat.h" 3ad879127SKrish Sadhukhan #include "processor.h" 4ad879127SKrish Sadhukhan #include "desc.h" 5ad879127SKrish Sadhukhan #include "msr.h" 6ad879127SKrish Sadhukhan #include "vm.h" 7ad879127SKrish Sadhukhan #include "smp.h" 8ad879127SKrish Sadhukhan #include "types.h" 9ad879127SKrish Sadhukhan #include "alloc_page.h" 10ad879127SKrish Sadhukhan #include "isr.h" 11ad879127SKrish Sadhukhan #include "apic.h" 129da1f4d8SCathy Avery #include "delay.h" 13*712840d5SManali Shukla #include "vmalloc.h" 14ad879127SKrish Sadhukhan 15ad879127SKrish Sadhukhan #define SVM_EXIT_MAX_DR_INTERCEPT 0x3f 16ad879127SKrish Sadhukhan 17ad879127SKrish Sadhukhan static void *scratch_page; 18ad879127SKrish Sadhukhan 19ad879127SKrish Sadhukhan #define LATENCY_RUNS 1000000 20ad879127SKrish Sadhukhan 214770e9c8SCathy Avery extern u16 cpu_online_count; 224770e9c8SCathy Avery 23ad879127SKrish Sadhukhan u64 tsc_start; 24ad879127SKrish Sadhukhan u64 tsc_end; 25ad879127SKrish Sadhukhan 26ad879127SKrish Sadhukhan u64 vmrun_sum, vmexit_sum; 27ad879127SKrish Sadhukhan u64 vmsave_sum, vmload_sum; 28ad879127SKrish Sadhukhan u64 stgi_sum, clgi_sum; 29ad879127SKrish Sadhukhan u64 latvmrun_max; 30ad879127SKrish Sadhukhan u64 latvmrun_min; 31ad879127SKrish Sadhukhan u64 latvmexit_max; 32ad879127SKrish Sadhukhan u64 latvmexit_min; 33ad879127SKrish Sadhukhan u64 latvmload_max; 34ad879127SKrish Sadhukhan u64 latvmload_min; 35ad879127SKrish Sadhukhan u64 latvmsave_max; 36ad879127SKrish Sadhukhan u64 latvmsave_min; 37ad879127SKrish Sadhukhan u64 latstgi_max; 38ad879127SKrish Sadhukhan u64 latstgi_min; 39ad879127SKrish Sadhukhan u64 latclgi_max; 40ad879127SKrish Sadhukhan u64 latclgi_min; 41ad879127SKrish Sadhukhan u64 runs; 42ad879127SKrish Sadhukhan 43ad879127SKrish Sadhukhan static void null_test(struct svm_test *test) 44ad879127SKrish Sadhukhan { 45ad879127SKrish Sadhukhan } 46ad879127SKrish Sadhukhan 47ad879127SKrish Sadhukhan static bool null_check(struct svm_test *test) 48ad879127SKrish Sadhukhan { 49096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMMCALL; 50ad879127SKrish Sadhukhan } 51ad879127SKrish Sadhukhan 52ad879127SKrish Sadhukhan static void prepare_no_vmrun_int(struct svm_test *test) 53ad879127SKrish Sadhukhan { 54096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMRUN); 55ad879127SKrish Sadhukhan } 56ad879127SKrish Sadhukhan 57ad879127SKrish Sadhukhan static bool check_no_vmrun_int(struct svm_test *test) 58ad879127SKrish Sadhukhan { 59096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 60ad879127SKrish Sadhukhan } 61ad879127SKrish Sadhukhan 62ad879127SKrish Sadhukhan static void test_vmrun(struct svm_test *test) 63ad879127SKrish Sadhukhan { 64096cf7feSPaolo Bonzini asm volatile ("vmrun %0" : : "a"(virt_to_phys(vmcb))); 65ad879127SKrish Sadhukhan } 66ad879127SKrish Sadhukhan 67ad879127SKrish Sadhukhan static bool check_vmrun(struct svm_test *test) 68ad879127SKrish Sadhukhan { 69096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_VMRUN; 70ad879127SKrish Sadhukhan } 71ad879127SKrish Sadhukhan 72401299a5SPaolo Bonzini static void prepare_rsm_intercept(struct svm_test *test) 73401299a5SPaolo Bonzini { 74401299a5SPaolo Bonzini default_prepare(test); 75401299a5SPaolo Bonzini vmcb->control.intercept |= 1 << INTERCEPT_RSM; 76401299a5SPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << UD_VECTOR); 77401299a5SPaolo Bonzini } 78401299a5SPaolo Bonzini 79401299a5SPaolo Bonzini static void test_rsm_intercept(struct svm_test *test) 80401299a5SPaolo Bonzini { 81401299a5SPaolo Bonzini asm volatile ("rsm" : : : "memory"); 82401299a5SPaolo Bonzini } 83401299a5SPaolo Bonzini 84401299a5SPaolo Bonzini static bool check_rsm_intercept(struct svm_test *test) 85401299a5SPaolo Bonzini { 86401299a5SPaolo Bonzini return get_test_stage(test) == 2; 87401299a5SPaolo Bonzini } 88401299a5SPaolo Bonzini 89401299a5SPaolo Bonzini static bool finished_rsm_intercept(struct svm_test *test) 90401299a5SPaolo Bonzini { 91401299a5SPaolo Bonzini switch (get_test_stage(test)) { 92401299a5SPaolo Bonzini case 0: 93401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_RSM) { 94198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to rsm. Exit reason 0x%x", 95401299a5SPaolo Bonzini vmcb->control.exit_code); 96401299a5SPaolo Bonzini return true; 97401299a5SPaolo Bonzini } 98401299a5SPaolo Bonzini vmcb->control.intercept &= ~(1 << INTERCEPT_RSM); 99401299a5SPaolo Bonzini inc_test_stage(test); 100401299a5SPaolo Bonzini break; 101401299a5SPaolo Bonzini 102401299a5SPaolo Bonzini case 1: 103401299a5SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_EXCP_BASE + UD_VECTOR) { 104198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to #UD. Exit reason 0x%x", 105401299a5SPaolo Bonzini vmcb->control.exit_code); 106401299a5SPaolo Bonzini return true; 107401299a5SPaolo Bonzini } 108401299a5SPaolo Bonzini vmcb->save.rip += 2; 109401299a5SPaolo Bonzini inc_test_stage(test); 110401299a5SPaolo Bonzini break; 111401299a5SPaolo Bonzini 112401299a5SPaolo Bonzini default: 113401299a5SPaolo Bonzini return true; 114401299a5SPaolo Bonzini } 115401299a5SPaolo Bonzini return get_test_stage(test) == 2; 116401299a5SPaolo Bonzini } 117401299a5SPaolo Bonzini 118ad879127SKrish Sadhukhan static void prepare_cr3_intercept(struct svm_test *test) 119ad879127SKrish Sadhukhan { 120ad879127SKrish Sadhukhan default_prepare(test); 121096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 122ad879127SKrish Sadhukhan } 123ad879127SKrish Sadhukhan 124ad879127SKrish Sadhukhan static void test_cr3_intercept(struct svm_test *test) 125ad879127SKrish Sadhukhan { 126ad879127SKrish Sadhukhan asm volatile ("mov %%cr3, %0" : "=r"(test->scratch) : : "memory"); 127ad879127SKrish Sadhukhan } 128ad879127SKrish Sadhukhan 129ad879127SKrish Sadhukhan static bool check_cr3_intercept(struct svm_test *test) 130ad879127SKrish Sadhukhan { 131096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_READ_CR3; 132ad879127SKrish Sadhukhan } 133ad879127SKrish Sadhukhan 134ad879127SKrish Sadhukhan static bool check_cr3_nointercept(struct svm_test *test) 135ad879127SKrish Sadhukhan { 136ad879127SKrish Sadhukhan return null_check(test) && test->scratch == read_cr3(); 137ad879127SKrish Sadhukhan } 138ad879127SKrish Sadhukhan 139ad879127SKrish Sadhukhan static void corrupt_cr3_intercept_bypass(void *_test) 140ad879127SKrish Sadhukhan { 141ad879127SKrish Sadhukhan struct svm_test *test = _test; 142ad879127SKrish Sadhukhan extern volatile u32 mmio_insn; 143ad879127SKrish Sadhukhan 144ad879127SKrish Sadhukhan while (!__sync_bool_compare_and_swap(&test->scratch, 1, 2)) 145ad879127SKrish Sadhukhan pause(); 146ad879127SKrish Sadhukhan pause(); 147ad879127SKrish Sadhukhan pause(); 148ad879127SKrish Sadhukhan pause(); 149ad879127SKrish Sadhukhan mmio_insn = 0x90d8200f; // mov %cr3, %rax; nop 150ad879127SKrish Sadhukhan } 151ad879127SKrish Sadhukhan 152ad879127SKrish Sadhukhan static void prepare_cr3_intercept_bypass(struct svm_test *test) 153ad879127SKrish Sadhukhan { 154ad879127SKrish Sadhukhan default_prepare(test); 155096cf7feSPaolo Bonzini vmcb->control.intercept_cr_read |= 1 << 3; 156ad879127SKrish Sadhukhan on_cpu_async(1, corrupt_cr3_intercept_bypass, test); 157ad879127SKrish Sadhukhan } 158ad879127SKrish Sadhukhan 159ad879127SKrish Sadhukhan static void test_cr3_intercept_bypass(struct svm_test *test) 160ad879127SKrish Sadhukhan { 161ad879127SKrish Sadhukhan ulong a = 0xa0000; 162ad879127SKrish Sadhukhan 163ad879127SKrish Sadhukhan test->scratch = 1; 164ad879127SKrish Sadhukhan while (test->scratch != 2) 165ad879127SKrish Sadhukhan barrier(); 166ad879127SKrish Sadhukhan 167ad879127SKrish Sadhukhan asm volatile ("mmio_insn: mov %0, (%0); nop" 168ad879127SKrish Sadhukhan : "+a"(a) : : "memory"); 169ad879127SKrish Sadhukhan test->scratch = a; 170ad879127SKrish Sadhukhan } 171ad879127SKrish Sadhukhan 172ad879127SKrish Sadhukhan static void prepare_dr_intercept(struct svm_test *test) 173ad879127SKrish Sadhukhan { 174ad879127SKrish Sadhukhan default_prepare(test); 175096cf7feSPaolo Bonzini vmcb->control.intercept_dr_read = 0xff; 176096cf7feSPaolo Bonzini vmcb->control.intercept_dr_write = 0xff; 177ad879127SKrish Sadhukhan } 178ad879127SKrish Sadhukhan 179ad879127SKrish Sadhukhan static void test_dr_intercept(struct svm_test *test) 180ad879127SKrish Sadhukhan { 181ad879127SKrish Sadhukhan unsigned int i, failcnt = 0; 182ad879127SKrish Sadhukhan 183ad879127SKrish Sadhukhan /* Loop testing debug register reads */ 184ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 185ad879127SKrish Sadhukhan 186ad879127SKrish Sadhukhan switch (i) { 187ad879127SKrish Sadhukhan case 0: 188ad879127SKrish Sadhukhan asm volatile ("mov %%dr0, %0" : "=r"(test->scratch) : : "memory"); 189ad879127SKrish Sadhukhan break; 190ad879127SKrish Sadhukhan case 1: 191ad879127SKrish Sadhukhan asm volatile ("mov %%dr1, %0" : "=r"(test->scratch) : : "memory"); 192ad879127SKrish Sadhukhan break; 193ad879127SKrish Sadhukhan case 2: 194ad879127SKrish Sadhukhan asm volatile ("mov %%dr2, %0" : "=r"(test->scratch) : : "memory"); 195ad879127SKrish Sadhukhan break; 196ad879127SKrish Sadhukhan case 3: 197ad879127SKrish Sadhukhan asm volatile ("mov %%dr3, %0" : "=r"(test->scratch) : : "memory"); 198ad879127SKrish Sadhukhan break; 199ad879127SKrish Sadhukhan case 4: 200ad879127SKrish Sadhukhan asm volatile ("mov %%dr4, %0" : "=r"(test->scratch) : : "memory"); 201ad879127SKrish Sadhukhan break; 202ad879127SKrish Sadhukhan case 5: 203ad879127SKrish Sadhukhan asm volatile ("mov %%dr5, %0" : "=r"(test->scratch) : : "memory"); 204ad879127SKrish Sadhukhan break; 205ad879127SKrish Sadhukhan case 6: 206ad879127SKrish Sadhukhan asm volatile ("mov %%dr6, %0" : "=r"(test->scratch) : : "memory"); 207ad879127SKrish Sadhukhan break; 208ad879127SKrish Sadhukhan case 7: 209ad879127SKrish Sadhukhan asm volatile ("mov %%dr7, %0" : "=r"(test->scratch) : : "memory"); 210ad879127SKrish Sadhukhan break; 211ad879127SKrish Sadhukhan } 212ad879127SKrish Sadhukhan 213ad879127SKrish Sadhukhan if (test->scratch != i) { 214198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u read intercept", i); 215ad879127SKrish Sadhukhan failcnt++; 216ad879127SKrish Sadhukhan } 217ad879127SKrish Sadhukhan } 218ad879127SKrish Sadhukhan 219ad879127SKrish Sadhukhan /* Loop testing debug register writes */ 220ad879127SKrish Sadhukhan for (i = 0; i < 8; i++) { 221ad879127SKrish Sadhukhan 222ad879127SKrish Sadhukhan switch (i) { 223ad879127SKrish Sadhukhan case 0: 224ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr0" : : "r"(test->scratch) : "memory"); 225ad879127SKrish Sadhukhan break; 226ad879127SKrish Sadhukhan case 1: 227ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr1" : : "r"(test->scratch) : "memory"); 228ad879127SKrish Sadhukhan break; 229ad879127SKrish Sadhukhan case 2: 230ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr2" : : "r"(test->scratch) : "memory"); 231ad879127SKrish Sadhukhan break; 232ad879127SKrish Sadhukhan case 3: 233ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr3" : : "r"(test->scratch) : "memory"); 234ad879127SKrish Sadhukhan break; 235ad879127SKrish Sadhukhan case 4: 236ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr4" : : "r"(test->scratch) : "memory"); 237ad879127SKrish Sadhukhan break; 238ad879127SKrish Sadhukhan case 5: 239ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr5" : : "r"(test->scratch) : "memory"); 240ad879127SKrish Sadhukhan break; 241ad879127SKrish Sadhukhan case 6: 242ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr6" : : "r"(test->scratch) : "memory"); 243ad879127SKrish Sadhukhan break; 244ad879127SKrish Sadhukhan case 7: 245ad879127SKrish Sadhukhan asm volatile ("mov %0, %%dr7" : : "r"(test->scratch) : "memory"); 246ad879127SKrish Sadhukhan break; 247ad879127SKrish Sadhukhan } 248ad879127SKrish Sadhukhan 249ad879127SKrish Sadhukhan if (test->scratch != i) { 250198dfd0eSJanis Schoetterl-Glausch report_fail("dr%u write intercept", i); 251ad879127SKrish Sadhukhan failcnt++; 252ad879127SKrish Sadhukhan } 253ad879127SKrish Sadhukhan } 254ad879127SKrish Sadhukhan 255ad879127SKrish Sadhukhan test->scratch = failcnt; 256ad879127SKrish Sadhukhan } 257ad879127SKrish Sadhukhan 258ad879127SKrish Sadhukhan static bool dr_intercept_finished(struct svm_test *test) 259ad879127SKrish Sadhukhan { 260096cf7feSPaolo Bonzini ulong n = (vmcb->control.exit_code - SVM_EXIT_READ_DR0); 261ad879127SKrish Sadhukhan 262ad879127SKrish Sadhukhan /* Only expect DR intercepts */ 263ad879127SKrish Sadhukhan if (n > (SVM_EXIT_MAX_DR_INTERCEPT - SVM_EXIT_READ_DR0)) 264ad879127SKrish Sadhukhan return true; 265ad879127SKrish Sadhukhan 266ad879127SKrish Sadhukhan /* 267ad879127SKrish Sadhukhan * Compute debug register number. 268ad879127SKrish Sadhukhan * Per Appendix C "SVM Intercept Exit Codes" of AMD64 Architecture 269ad879127SKrish Sadhukhan * Programmer's Manual Volume 2 - System Programming: 270ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 271ad879127SKrish Sadhukhan * there are 16 VMEXIT codes each for DR read and write. 272ad879127SKrish Sadhukhan */ 273ad879127SKrish Sadhukhan test->scratch = (n % 16); 274ad879127SKrish Sadhukhan 275ad879127SKrish Sadhukhan /* Jump over MOV instruction */ 276096cf7feSPaolo Bonzini vmcb->save.rip += 3; 277ad879127SKrish Sadhukhan 278ad879127SKrish Sadhukhan return false; 279ad879127SKrish Sadhukhan } 280ad879127SKrish Sadhukhan 281ad879127SKrish Sadhukhan static bool check_dr_intercept(struct svm_test *test) 282ad879127SKrish Sadhukhan { 283ad879127SKrish Sadhukhan return !test->scratch; 284ad879127SKrish Sadhukhan } 285ad879127SKrish Sadhukhan 286ad879127SKrish Sadhukhan static bool next_rip_supported(void) 287ad879127SKrish Sadhukhan { 288ad879127SKrish Sadhukhan return this_cpu_has(X86_FEATURE_NRIPS); 289ad879127SKrish Sadhukhan } 290ad879127SKrish Sadhukhan 291ad879127SKrish Sadhukhan static void prepare_next_rip(struct svm_test *test) 292ad879127SKrish Sadhukhan { 293096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_RDTSC); 294ad879127SKrish Sadhukhan } 295ad879127SKrish Sadhukhan 296ad879127SKrish Sadhukhan 297ad879127SKrish Sadhukhan static void test_next_rip(struct svm_test *test) 298ad879127SKrish Sadhukhan { 299ad879127SKrish Sadhukhan asm volatile ("rdtsc\n\t" 300ad879127SKrish Sadhukhan ".globl exp_next_rip\n\t" 301ad879127SKrish Sadhukhan "exp_next_rip:\n\t" ::: "eax", "edx"); 302ad879127SKrish Sadhukhan } 303ad879127SKrish Sadhukhan 304ad879127SKrish Sadhukhan static bool check_next_rip(struct svm_test *test) 305ad879127SKrish Sadhukhan { 306ad879127SKrish Sadhukhan extern char exp_next_rip; 307ad879127SKrish Sadhukhan unsigned long address = (unsigned long)&exp_next_rip; 308ad879127SKrish Sadhukhan 309096cf7feSPaolo Bonzini return address == vmcb->control.next_rip; 310ad879127SKrish Sadhukhan } 311ad879127SKrish Sadhukhan 312ad879127SKrish Sadhukhan extern u8 *msr_bitmap; 313ad879127SKrish Sadhukhan 314ad879127SKrish Sadhukhan static void prepare_msr_intercept(struct svm_test *test) 315ad879127SKrish Sadhukhan { 316ad879127SKrish Sadhukhan default_prepare(test); 317096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_MSR_PROT); 318096cf7feSPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR); 319ad879127SKrish Sadhukhan memset(msr_bitmap, 0xff, MSR_BITMAP_SIZE); 320ad879127SKrish Sadhukhan } 321ad879127SKrish Sadhukhan 322ad879127SKrish Sadhukhan static void test_msr_intercept(struct svm_test *test) 323ad879127SKrish Sadhukhan { 324ad879127SKrish Sadhukhan unsigned long msr_value = 0xef8056791234abcd; /* Arbitrary value */ 325ad879127SKrish Sadhukhan unsigned long msr_index; 326ad879127SKrish Sadhukhan 327ad879127SKrish Sadhukhan for (msr_index = 0; msr_index <= 0xc0011fff; msr_index++) { 328ad879127SKrish Sadhukhan if (msr_index == 0xC0010131 /* MSR_SEV_STATUS */) { 329ad879127SKrish Sadhukhan /* 330ad879127SKrish Sadhukhan * Per section 15.34.10 "SEV_STATUS MSR" of AMD64 Architecture 331ad879127SKrish Sadhukhan * Programmer's Manual volume 2 - System Programming: 332ad879127SKrish Sadhukhan * http://support.amd.com/TechDocs/24593.pdf 333ad879127SKrish Sadhukhan * SEV_STATUS MSR (C001_0131) is a non-interceptable MSR. 334ad879127SKrish Sadhukhan */ 335ad879127SKrish Sadhukhan continue; 336ad879127SKrish Sadhukhan } 337ad879127SKrish Sadhukhan 338ad879127SKrish Sadhukhan /* Skips gaps between supported MSR ranges */ 339ad879127SKrish Sadhukhan if (msr_index == 0x2000) 340ad879127SKrish Sadhukhan msr_index = 0xc0000000; 341ad879127SKrish Sadhukhan else if (msr_index == 0xc0002000) 342ad879127SKrish Sadhukhan msr_index = 0xc0010000; 343ad879127SKrish Sadhukhan 344ad879127SKrish Sadhukhan test->scratch = -1; 345ad879127SKrish Sadhukhan 346ad879127SKrish Sadhukhan rdmsr(msr_index); 347ad879127SKrish Sadhukhan 348ad879127SKrish Sadhukhan /* Check that a read intercept occurred for MSR at msr_index */ 349ad879127SKrish Sadhukhan if (test->scratch != msr_index) 350198dfd0eSJanis Schoetterl-Glausch report_fail("MSR 0x%lx read intercept", msr_index); 351ad879127SKrish Sadhukhan 352ad879127SKrish Sadhukhan /* 353ad879127SKrish Sadhukhan * Poor man approach to generate a value that 354ad879127SKrish Sadhukhan * seems arbitrary each time around the loop. 355ad879127SKrish Sadhukhan */ 356ad879127SKrish Sadhukhan msr_value += (msr_value << 1); 357ad879127SKrish Sadhukhan 358ad879127SKrish Sadhukhan wrmsr(msr_index, msr_value); 359ad879127SKrish Sadhukhan 360ad879127SKrish Sadhukhan /* Check that a write intercept occurred for MSR with msr_value */ 361ad879127SKrish Sadhukhan if (test->scratch != msr_value) 362198dfd0eSJanis Schoetterl-Glausch report_fail("MSR 0x%lx write intercept", msr_index); 363ad879127SKrish Sadhukhan } 364ad879127SKrish Sadhukhan 365ad879127SKrish Sadhukhan test->scratch = -2; 366ad879127SKrish Sadhukhan } 367ad879127SKrish Sadhukhan 368ad879127SKrish Sadhukhan static bool msr_intercept_finished(struct svm_test *test) 369ad879127SKrish Sadhukhan { 370096cf7feSPaolo Bonzini u32 exit_code = vmcb->control.exit_code; 371ad879127SKrish Sadhukhan u64 exit_info_1; 372ad879127SKrish Sadhukhan u8 *opcode; 373ad879127SKrish Sadhukhan 374ad879127SKrish Sadhukhan if (exit_code == SVM_EXIT_MSR) { 375096cf7feSPaolo Bonzini exit_info_1 = vmcb->control.exit_info_1; 376ad879127SKrish Sadhukhan } else { 377ad879127SKrish Sadhukhan /* 378ad879127SKrish Sadhukhan * If #GP exception occurs instead, check that it was 379ad879127SKrish Sadhukhan * for RDMSR/WRMSR and set exit_info_1 accordingly. 380ad879127SKrish Sadhukhan */ 381ad879127SKrish Sadhukhan 382ad879127SKrish Sadhukhan if (exit_code != (SVM_EXIT_EXCP_BASE + GP_VECTOR)) 383ad879127SKrish Sadhukhan return true; 384ad879127SKrish Sadhukhan 385096cf7feSPaolo Bonzini opcode = (u8 *)vmcb->save.rip; 386ad879127SKrish Sadhukhan if (opcode[0] != 0x0f) 387ad879127SKrish Sadhukhan return true; 388ad879127SKrish Sadhukhan 389ad879127SKrish Sadhukhan switch (opcode[1]) { 390ad879127SKrish Sadhukhan case 0x30: /* WRMSR */ 391ad879127SKrish Sadhukhan exit_info_1 = 1; 392ad879127SKrish Sadhukhan break; 393ad879127SKrish Sadhukhan case 0x32: /* RDMSR */ 394ad879127SKrish Sadhukhan exit_info_1 = 0; 395ad879127SKrish Sadhukhan break; 396ad879127SKrish Sadhukhan default: 397ad879127SKrish Sadhukhan return true; 398ad879127SKrish Sadhukhan } 399ad879127SKrish Sadhukhan 400ad879127SKrish Sadhukhan /* 401912c0d72SThomas Huth * Warn that #GP exception occurred instead. 402ad879127SKrish Sadhukhan * RCX holds the MSR index. 403ad879127SKrish Sadhukhan */ 404ad879127SKrish Sadhukhan printf("%s 0x%lx #GP exception\n", 405ad879127SKrish Sadhukhan exit_info_1 ? "WRMSR" : "RDMSR", get_regs().rcx); 406ad879127SKrish Sadhukhan } 407ad879127SKrish Sadhukhan 408ad879127SKrish Sadhukhan /* Jump over RDMSR/WRMSR instruction */ 409096cf7feSPaolo Bonzini vmcb->save.rip += 2; 410ad879127SKrish Sadhukhan 411ad879127SKrish Sadhukhan /* 412ad879127SKrish Sadhukhan * Test whether the intercept was for RDMSR/WRMSR. 413ad879127SKrish Sadhukhan * For RDMSR, test->scratch is set to the MSR index; 414ad879127SKrish Sadhukhan * RCX holds the MSR index. 415ad879127SKrish Sadhukhan * For WRMSR, test->scratch is set to the MSR value; 416ad879127SKrish Sadhukhan * RDX holds the upper 32 bits of the MSR value, 417ad879127SKrish Sadhukhan * while RAX hold its lower 32 bits. 418ad879127SKrish Sadhukhan */ 419ad879127SKrish Sadhukhan if (exit_info_1) 420ad879127SKrish Sadhukhan test->scratch = 421096cf7feSPaolo Bonzini ((get_regs().rdx << 32) | (vmcb->save.rax & 0xffffffff)); 422ad879127SKrish Sadhukhan else 423ad879127SKrish Sadhukhan test->scratch = get_regs().rcx; 424ad879127SKrish Sadhukhan 425ad879127SKrish Sadhukhan return false; 426ad879127SKrish Sadhukhan } 427ad879127SKrish Sadhukhan 428ad879127SKrish Sadhukhan static bool check_msr_intercept(struct svm_test *test) 429ad879127SKrish Sadhukhan { 430ad879127SKrish Sadhukhan memset(msr_bitmap, 0, MSR_BITMAP_SIZE); 431ad879127SKrish Sadhukhan return (test->scratch == -2); 432ad879127SKrish Sadhukhan } 433ad879127SKrish Sadhukhan 434ad879127SKrish Sadhukhan static void prepare_mode_switch(struct svm_test *test) 435ad879127SKrish Sadhukhan { 436096cf7feSPaolo Bonzini vmcb->control.intercept_exceptions |= (1ULL << GP_VECTOR) 437ad879127SKrish Sadhukhan | (1ULL << UD_VECTOR) 438ad879127SKrish Sadhukhan | (1ULL << DF_VECTOR) 439ad879127SKrish Sadhukhan | (1ULL << PF_VECTOR); 440ad879127SKrish Sadhukhan test->scratch = 0; 441ad879127SKrish Sadhukhan } 442ad879127SKrish Sadhukhan 443ad879127SKrish Sadhukhan static void test_mode_switch(struct svm_test *test) 444ad879127SKrish Sadhukhan { 445ad879127SKrish Sadhukhan asm volatile(" cli\n" 446ad879127SKrish Sadhukhan " ljmp *1f\n" /* jump to 32-bit code segment */ 447ad879127SKrish Sadhukhan "1:\n" 448ad879127SKrish Sadhukhan " .long 2f\n" 449ad879127SKrish Sadhukhan " .long " xstr(KERNEL_CS32) "\n" 450ad879127SKrish Sadhukhan ".code32\n" 451ad879127SKrish Sadhukhan "2:\n" 452ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 453ad879127SKrish Sadhukhan " btcl $31, %%eax\n" /* clear PG */ 454ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 455ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 456ad879127SKrish Sadhukhan " rdmsr\n" 457ad879127SKrish Sadhukhan " btcl $8, %%eax\n" /* clear LME */ 458ad879127SKrish Sadhukhan " wrmsr\n" 459ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 460ad879127SKrish Sadhukhan " btcl $5, %%eax\n" /* clear PAE */ 461ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 462ad879127SKrish Sadhukhan " movw %[ds16], %%ax\n" 463ad879127SKrish Sadhukhan " movw %%ax, %%ds\n" 464ad879127SKrish Sadhukhan " ljmpl %[cs16], $3f\n" /* jump to 16 bit protected-mode */ 465ad879127SKrish Sadhukhan ".code16\n" 466ad879127SKrish Sadhukhan "3:\n" 467ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 468ad879127SKrish Sadhukhan " btcl $0, %%eax\n" /* clear PE */ 469ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 470ad879127SKrish Sadhukhan " ljmpl $0, $4f\n" /* jump to real-mode */ 471ad879127SKrish Sadhukhan "4:\n" 472ad879127SKrish Sadhukhan " vmmcall\n" 473ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 474ad879127SKrish Sadhukhan " btsl $0, %%eax\n" /* set PE */ 475ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 476ad879127SKrish Sadhukhan " ljmpl %[cs32], $5f\n" /* back to protected mode */ 477ad879127SKrish Sadhukhan ".code32\n" 478ad879127SKrish Sadhukhan "5:\n" 479ad879127SKrish Sadhukhan " movl %%cr4, %%eax\n" 480ad879127SKrish Sadhukhan " btsl $5, %%eax\n" /* set PAE */ 481ad879127SKrish Sadhukhan " movl %%eax, %%cr4\n" 482ad879127SKrish Sadhukhan " movl $0xc0000080, %%ecx\n" /* EFER */ 483ad879127SKrish Sadhukhan " rdmsr\n" 484ad879127SKrish Sadhukhan " btsl $8, %%eax\n" /* set LME */ 485ad879127SKrish Sadhukhan " wrmsr\n" 486ad879127SKrish Sadhukhan " movl %%cr0, %%eax\n" 487ad879127SKrish Sadhukhan " btsl $31, %%eax\n" /* set PG */ 488ad879127SKrish Sadhukhan " movl %%eax, %%cr0\n" 489ad879127SKrish Sadhukhan " ljmpl %[cs64], $6f\n" /* back to long mode */ 490ad879127SKrish Sadhukhan ".code64\n\t" 491ad879127SKrish Sadhukhan "6:\n" 492ad879127SKrish Sadhukhan " vmmcall\n" 493ad879127SKrish Sadhukhan :: [cs16] "i"(KERNEL_CS16), [ds16] "i"(KERNEL_DS16), 494ad879127SKrish Sadhukhan [cs32] "i"(KERNEL_CS32), [cs64] "i"(KERNEL_CS64) 495ad879127SKrish Sadhukhan : "rax", "rbx", "rcx", "rdx", "memory"); 496ad879127SKrish Sadhukhan } 497ad879127SKrish Sadhukhan 498ad879127SKrish Sadhukhan static bool mode_switch_finished(struct svm_test *test) 499ad879127SKrish Sadhukhan { 500ad879127SKrish Sadhukhan u64 cr0, cr4, efer; 501ad879127SKrish Sadhukhan 502096cf7feSPaolo Bonzini cr0 = vmcb->save.cr0; 503096cf7feSPaolo Bonzini cr4 = vmcb->save.cr4; 504096cf7feSPaolo Bonzini efer = vmcb->save.efer; 505ad879127SKrish Sadhukhan 506ad879127SKrish Sadhukhan /* Only expect VMMCALL intercepts */ 507096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) 508ad879127SKrish Sadhukhan return true; 509ad879127SKrish Sadhukhan 510ad879127SKrish Sadhukhan /* Jump over VMMCALL instruction */ 511096cf7feSPaolo Bonzini vmcb->save.rip += 3; 512ad879127SKrish Sadhukhan 513ad879127SKrish Sadhukhan /* Do sanity checks */ 514ad879127SKrish Sadhukhan switch (test->scratch) { 515ad879127SKrish Sadhukhan case 0: 516ad879127SKrish Sadhukhan /* Test should be in real mode now - check for this */ 517ad879127SKrish Sadhukhan if ((cr0 & 0x80000001) || /* CR0.PG, CR0.PE */ 518ad879127SKrish Sadhukhan (cr4 & 0x00000020) || /* CR4.PAE */ 519ad879127SKrish Sadhukhan (efer & 0x00000500)) /* EFER.LMA, EFER.LME */ 520ad879127SKrish Sadhukhan return true; 521ad879127SKrish Sadhukhan break; 522ad879127SKrish Sadhukhan case 2: 523ad879127SKrish Sadhukhan /* Test should be back in long-mode now - check for this */ 524ad879127SKrish Sadhukhan if (((cr0 & 0x80000001) != 0x80000001) || /* CR0.PG, CR0.PE */ 525ad879127SKrish Sadhukhan ((cr4 & 0x00000020) != 0x00000020) || /* CR4.PAE */ 526ad879127SKrish Sadhukhan ((efer & 0x00000500) != 0x00000500)) /* EFER.LMA, EFER.LME */ 527ad879127SKrish Sadhukhan return true; 528ad879127SKrish Sadhukhan break; 529ad879127SKrish Sadhukhan } 530ad879127SKrish Sadhukhan 531ad879127SKrish Sadhukhan /* one step forward */ 532ad879127SKrish Sadhukhan test->scratch += 1; 533ad879127SKrish Sadhukhan 534ad879127SKrish Sadhukhan return test->scratch == 2; 535ad879127SKrish Sadhukhan } 536ad879127SKrish Sadhukhan 537ad879127SKrish Sadhukhan static bool check_mode_switch(struct svm_test *test) 538ad879127SKrish Sadhukhan { 539ad879127SKrish Sadhukhan return test->scratch == 2; 540ad879127SKrish Sadhukhan } 541ad879127SKrish Sadhukhan 542ad879127SKrish Sadhukhan extern u8 *io_bitmap; 543ad879127SKrish Sadhukhan 544ad879127SKrish Sadhukhan static void prepare_ioio(struct svm_test *test) 545ad879127SKrish Sadhukhan { 546096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_IOIO_PROT); 547ad879127SKrish Sadhukhan test->scratch = 0; 548ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8192); 549ad879127SKrish Sadhukhan io_bitmap[8192] = 0xFF; 550ad879127SKrish Sadhukhan } 551ad879127SKrish Sadhukhan 552ad879127SKrish Sadhukhan static void test_ioio(struct svm_test *test) 553ad879127SKrish Sadhukhan { 554ad879127SKrish Sadhukhan // stage 0, test IO pass 555ad879127SKrish Sadhukhan inb(0x5000); 556ad879127SKrish Sadhukhan outb(0x0, 0x5000); 557ad879127SKrish Sadhukhan if (get_test_stage(test) != 0) 558ad879127SKrish Sadhukhan goto fail; 559ad879127SKrish Sadhukhan 560ad879127SKrish Sadhukhan // test IO width, in/out 561ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 562ad879127SKrish Sadhukhan inc_test_stage(test); 563ad879127SKrish Sadhukhan inb(0x0); 564ad879127SKrish Sadhukhan if (get_test_stage(test) != 2) 565ad879127SKrish Sadhukhan goto fail; 566ad879127SKrish Sadhukhan 567ad879127SKrish Sadhukhan outw(0x0, 0x0); 568ad879127SKrish Sadhukhan if (get_test_stage(test) != 3) 569ad879127SKrish Sadhukhan goto fail; 570ad879127SKrish Sadhukhan 571ad879127SKrish Sadhukhan inl(0x0); 572ad879127SKrish Sadhukhan if (get_test_stage(test) != 4) 573ad879127SKrish Sadhukhan goto fail; 574ad879127SKrish Sadhukhan 575ad879127SKrish Sadhukhan // test low/high IO port 576ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 577ad879127SKrish Sadhukhan inb(0x5000); 578ad879127SKrish Sadhukhan if (get_test_stage(test) != 5) 579ad879127SKrish Sadhukhan goto fail; 580ad879127SKrish Sadhukhan 581ad879127SKrish Sadhukhan io_bitmap[0x9000 / 8] = (1 << (0x9000 % 8)); 582ad879127SKrish Sadhukhan inw(0x9000); 583ad879127SKrish Sadhukhan if (get_test_stage(test) != 6) 584ad879127SKrish Sadhukhan goto fail; 585ad879127SKrish Sadhukhan 586ad879127SKrish Sadhukhan // test partial pass 587ad879127SKrish Sadhukhan io_bitmap[0x5000 / 8] = (1 << (0x5000 % 8)); 588ad879127SKrish Sadhukhan inl(0x4FFF); 589ad879127SKrish Sadhukhan if (get_test_stage(test) != 7) 590ad879127SKrish Sadhukhan goto fail; 591ad879127SKrish Sadhukhan 592ad879127SKrish Sadhukhan // test across pages 593ad879127SKrish Sadhukhan inc_test_stage(test); 594ad879127SKrish Sadhukhan inl(0x7FFF); 595ad879127SKrish Sadhukhan if (get_test_stage(test) != 8) 596ad879127SKrish Sadhukhan goto fail; 597ad879127SKrish Sadhukhan 598ad879127SKrish Sadhukhan inc_test_stage(test); 599ad879127SKrish Sadhukhan io_bitmap[0x8000 / 8] = 1 << (0x8000 % 8); 600ad879127SKrish Sadhukhan inl(0x7FFF); 601ad879127SKrish Sadhukhan if (get_test_stage(test) != 10) 602ad879127SKrish Sadhukhan goto fail; 603ad879127SKrish Sadhukhan 604ad879127SKrish Sadhukhan io_bitmap[0] = 0; 605ad879127SKrish Sadhukhan inl(0xFFFF); 606ad879127SKrish Sadhukhan if (get_test_stage(test) != 11) 607ad879127SKrish Sadhukhan goto fail; 608ad879127SKrish Sadhukhan 609ad879127SKrish Sadhukhan io_bitmap[0] = 0xFF; 610ad879127SKrish Sadhukhan io_bitmap[8192] = 0; 611ad879127SKrish Sadhukhan inl(0xFFFF); 612ad879127SKrish Sadhukhan inc_test_stage(test); 613ad879127SKrish Sadhukhan if (get_test_stage(test) != 12) 614ad879127SKrish Sadhukhan goto fail; 615ad879127SKrish Sadhukhan 616ad879127SKrish Sadhukhan return; 617ad879127SKrish Sadhukhan 618ad879127SKrish Sadhukhan fail: 619198dfd0eSJanis Schoetterl-Glausch report_fail("stage %d", get_test_stage(test)); 620ad879127SKrish Sadhukhan test->scratch = -1; 621ad879127SKrish Sadhukhan } 622ad879127SKrish Sadhukhan 623ad879127SKrish Sadhukhan static bool ioio_finished(struct svm_test *test) 624ad879127SKrish Sadhukhan { 625ad879127SKrish Sadhukhan unsigned port, size; 626ad879127SKrish Sadhukhan 627ad879127SKrish Sadhukhan /* Only expect IOIO intercepts */ 628096cf7feSPaolo Bonzini if (vmcb->control.exit_code == SVM_EXIT_VMMCALL) 629ad879127SKrish Sadhukhan return true; 630ad879127SKrish Sadhukhan 631096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_IOIO) 632ad879127SKrish Sadhukhan return true; 633ad879127SKrish Sadhukhan 634ad879127SKrish Sadhukhan /* one step forward */ 635ad879127SKrish Sadhukhan test->scratch += 1; 636ad879127SKrish Sadhukhan 637096cf7feSPaolo Bonzini port = vmcb->control.exit_info_1 >> 16; 638096cf7feSPaolo Bonzini size = (vmcb->control.exit_info_1 >> SVM_IOIO_SIZE_SHIFT) & 7; 639ad879127SKrish Sadhukhan 640ad879127SKrish Sadhukhan while (size--) { 641ad879127SKrish Sadhukhan io_bitmap[port / 8] &= ~(1 << (port & 7)); 642ad879127SKrish Sadhukhan port++; 643ad879127SKrish Sadhukhan } 644ad879127SKrish Sadhukhan 645ad879127SKrish Sadhukhan return false; 646ad879127SKrish Sadhukhan } 647ad879127SKrish Sadhukhan 648ad879127SKrish Sadhukhan static bool check_ioio(struct svm_test *test) 649ad879127SKrish Sadhukhan { 650ad879127SKrish Sadhukhan memset(io_bitmap, 0, 8193); 651ad879127SKrish Sadhukhan return test->scratch != -1; 652ad879127SKrish Sadhukhan } 653ad879127SKrish Sadhukhan 654ad879127SKrish Sadhukhan static void prepare_asid_zero(struct svm_test *test) 655ad879127SKrish Sadhukhan { 656096cf7feSPaolo Bonzini vmcb->control.asid = 0; 657ad879127SKrish Sadhukhan } 658ad879127SKrish Sadhukhan 659ad879127SKrish Sadhukhan static void test_asid_zero(struct svm_test *test) 660ad879127SKrish Sadhukhan { 661ad879127SKrish Sadhukhan asm volatile ("vmmcall\n\t"); 662ad879127SKrish Sadhukhan } 663ad879127SKrish Sadhukhan 664ad879127SKrish Sadhukhan static bool check_asid_zero(struct svm_test *test) 665ad879127SKrish Sadhukhan { 666096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_ERR; 667ad879127SKrish Sadhukhan } 668ad879127SKrish Sadhukhan 669ad879127SKrish Sadhukhan static void sel_cr0_bug_prepare(struct svm_test *test) 670ad879127SKrish Sadhukhan { 671096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_SELECTIVE_CR0); 672ad879127SKrish Sadhukhan } 673ad879127SKrish Sadhukhan 674ad879127SKrish Sadhukhan static bool sel_cr0_bug_finished(struct svm_test *test) 675ad879127SKrish Sadhukhan { 676ad879127SKrish Sadhukhan return true; 677ad879127SKrish Sadhukhan } 678ad879127SKrish Sadhukhan 679ad879127SKrish Sadhukhan static void sel_cr0_bug_test(struct svm_test *test) 680ad879127SKrish Sadhukhan { 681ad879127SKrish Sadhukhan unsigned long cr0; 682ad879127SKrish Sadhukhan 683ad879127SKrish Sadhukhan /* read cr0, clear CD, and write back */ 684ad879127SKrish Sadhukhan cr0 = read_cr0(); 685ad879127SKrish Sadhukhan cr0 |= (1UL << 30); 686ad879127SKrish Sadhukhan write_cr0(cr0); 687ad879127SKrish Sadhukhan 688ad879127SKrish Sadhukhan /* 689ad879127SKrish Sadhukhan * If we are here the test failed, not sure what to do now because we 690ad879127SKrish Sadhukhan * are not in guest-mode anymore so we can't trigger an intercept. 691ad879127SKrish Sadhukhan * Trigger a tripple-fault for now. 692ad879127SKrish Sadhukhan */ 693198dfd0eSJanis Schoetterl-Glausch report_fail("sel_cr0 test. Can not recover from this - exiting"); 694ad879127SKrish Sadhukhan exit(report_summary()); 695ad879127SKrish Sadhukhan } 696ad879127SKrish Sadhukhan 697ad879127SKrish Sadhukhan static bool sel_cr0_bug_check(struct svm_test *test) 698ad879127SKrish Sadhukhan { 699096cf7feSPaolo Bonzini return vmcb->control.exit_code == SVM_EXIT_CR0_SEL_WRITE; 700ad879127SKrish Sadhukhan } 701ad879127SKrish Sadhukhan 702ad879127SKrish Sadhukhan static void npt_nx_prepare(struct svm_test *test) 703ad879127SKrish Sadhukhan { 704ad879127SKrish Sadhukhan u64 *pte; 705ad879127SKrish Sadhukhan 7061a0bbf91SSean Christopherson test->scratch = rdmsr(MSR_EFER); 7071a0bbf91SSean Christopherson wrmsr(MSR_EFER, test->scratch | EFER_NX); 7081a0bbf91SSean Christopherson 7093fdf0e6eSSean Christopherson /* Clear the guest's EFER.NX, it should not affect NPT behavior. */ 7103fdf0e6eSSean Christopherson vmcb->save.efer &= ~EFER_NX; 7113fdf0e6eSSean Christopherson 712ad879127SKrish Sadhukhan pte = npt_get_pte((u64)null_test); 713ad879127SKrish Sadhukhan 7149bb2b6ebSSean Christopherson *pte |= PT64_NX_MASK; 715ad879127SKrish Sadhukhan } 716ad879127SKrish Sadhukhan 717ad879127SKrish Sadhukhan static bool npt_nx_check(struct svm_test *test) 718ad879127SKrish Sadhukhan { 719ad879127SKrish Sadhukhan u64 *pte = npt_get_pte((u64)null_test); 720ad879127SKrish Sadhukhan 7211a0bbf91SSean Christopherson wrmsr(MSR_EFER, test->scratch); 7221a0bbf91SSean Christopherson 7239bb2b6ebSSean Christopherson *pte &= ~PT64_NX_MASK; 724ad879127SKrish Sadhukhan 725096cf7feSPaolo Bonzini return (vmcb->control.exit_code == SVM_EXIT_NPF) 726096cf7feSPaolo Bonzini && (vmcb->control.exit_info_1 == 0x100000015ULL); 727ad879127SKrish Sadhukhan } 728ad879127SKrish Sadhukhan 7296faca2a5SKrish Sadhukhan static void npt_np_prepare(struct svm_test *test) 7306faca2a5SKrish Sadhukhan { 7316faca2a5SKrish Sadhukhan u64 *pte; 7326faca2a5SKrish Sadhukhan 7336faca2a5SKrish Sadhukhan scratch_page = alloc_page(); 7346faca2a5SKrish Sadhukhan pte = npt_get_pte((u64)scratch_page); 7356faca2a5SKrish Sadhukhan 7366faca2a5SKrish Sadhukhan *pte &= ~1ULL; 7376faca2a5SKrish Sadhukhan } 7386faca2a5SKrish Sadhukhan 7396faca2a5SKrish Sadhukhan static void npt_np_test(struct svm_test *test) 7406faca2a5SKrish Sadhukhan { 7416faca2a5SKrish Sadhukhan (void) *(volatile u64 *)scratch_page; 7426faca2a5SKrish Sadhukhan } 7436faca2a5SKrish Sadhukhan 7446faca2a5SKrish Sadhukhan static bool npt_np_check(struct svm_test *test) 7456faca2a5SKrish Sadhukhan { 7466faca2a5SKrish Sadhukhan u64 *pte = npt_get_pte((u64)scratch_page); 7476faca2a5SKrish Sadhukhan 7486faca2a5SKrish Sadhukhan *pte |= 1ULL; 7496faca2a5SKrish Sadhukhan 7506faca2a5SKrish Sadhukhan return (vmcb->control.exit_code == SVM_EXIT_NPF) 7516faca2a5SKrish Sadhukhan && (vmcb->control.exit_info_1 == 0x100000004ULL); 7526faca2a5SKrish Sadhukhan } 7536faca2a5SKrish Sadhukhan 754ad879127SKrish Sadhukhan static void npt_us_prepare(struct svm_test *test) 755ad879127SKrish Sadhukhan { 756ad879127SKrish Sadhukhan u64 *pte; 757ad879127SKrish Sadhukhan 758ad879127SKrish Sadhukhan scratch_page = alloc_page(); 759ad879127SKrish Sadhukhan pte = npt_get_pte((u64)scratch_page); 760ad879127SKrish Sadhukhan 761ad879127SKrish Sadhukhan *pte &= ~(1ULL << 2); 762ad879127SKrish Sadhukhan } 763ad879127SKrish Sadhukhan 764ad879127SKrish Sadhukhan static void npt_us_test(struct svm_test *test) 765ad879127SKrish Sadhukhan { 766ad879127SKrish Sadhukhan (void) *(volatile u64 *)scratch_page; 767ad879127SKrish Sadhukhan } 768ad879127SKrish Sadhukhan 769ad879127SKrish Sadhukhan static bool npt_us_check(struct svm_test *test) 770ad879127SKrish Sadhukhan { 771ad879127SKrish Sadhukhan u64 *pte = npt_get_pte((u64)scratch_page); 772ad879127SKrish Sadhukhan 773ad879127SKrish Sadhukhan *pte |= (1ULL << 2); 774ad879127SKrish Sadhukhan 775096cf7feSPaolo Bonzini return (vmcb->control.exit_code == SVM_EXIT_NPF) 776096cf7feSPaolo Bonzini && (vmcb->control.exit_info_1 == 0x100000005ULL); 777ad879127SKrish Sadhukhan } 778ad879127SKrish Sadhukhan 779ad879127SKrish Sadhukhan static void npt_rw_prepare(struct svm_test *test) 780ad879127SKrish Sadhukhan { 781ad879127SKrish Sadhukhan 782ad879127SKrish Sadhukhan u64 *pte; 783ad879127SKrish Sadhukhan 784ad879127SKrish Sadhukhan pte = npt_get_pte(0x80000); 785ad879127SKrish Sadhukhan 786ad879127SKrish Sadhukhan *pte &= ~(1ULL << 1); 787ad879127SKrish Sadhukhan } 788ad879127SKrish Sadhukhan 789ad879127SKrish Sadhukhan static void npt_rw_test(struct svm_test *test) 790ad879127SKrish Sadhukhan { 791ad879127SKrish Sadhukhan u64 *data = (void*)(0x80000); 792ad879127SKrish Sadhukhan 793ad879127SKrish Sadhukhan *data = 0; 794ad879127SKrish Sadhukhan } 795ad879127SKrish Sadhukhan 796ad879127SKrish Sadhukhan static bool npt_rw_check(struct svm_test *test) 797ad879127SKrish Sadhukhan { 798ad879127SKrish Sadhukhan u64 *pte = npt_get_pte(0x80000); 799ad879127SKrish Sadhukhan 800ad879127SKrish Sadhukhan *pte |= (1ULL << 1); 801ad879127SKrish Sadhukhan 802096cf7feSPaolo Bonzini return (vmcb->control.exit_code == SVM_EXIT_NPF) 803096cf7feSPaolo Bonzini && (vmcb->control.exit_info_1 == 0x100000007ULL); 804ad879127SKrish Sadhukhan } 805ad879127SKrish Sadhukhan 806ad879127SKrish Sadhukhan static void npt_rw_pfwalk_prepare(struct svm_test *test) 807ad879127SKrish Sadhukhan { 808ad879127SKrish Sadhukhan 809ad879127SKrish Sadhukhan u64 *pte; 810ad879127SKrish Sadhukhan 811ad879127SKrish Sadhukhan pte = npt_get_pte(read_cr3()); 812ad879127SKrish Sadhukhan 813ad879127SKrish Sadhukhan *pte &= ~(1ULL << 1); 814ad879127SKrish Sadhukhan } 815ad879127SKrish Sadhukhan 816ad879127SKrish Sadhukhan static bool npt_rw_pfwalk_check(struct svm_test *test) 817ad879127SKrish Sadhukhan { 818ad879127SKrish Sadhukhan u64 *pte = npt_get_pte(read_cr3()); 819ad879127SKrish Sadhukhan 820ad879127SKrish Sadhukhan *pte |= (1ULL << 1); 821ad879127SKrish Sadhukhan 822096cf7feSPaolo Bonzini return (vmcb->control.exit_code == SVM_EXIT_NPF) 823a6051f06SNadav Amit && (vmcb->control.exit_info_1 == 0x200000007ULL) 824096cf7feSPaolo Bonzini && (vmcb->control.exit_info_2 == read_cr3()); 825ad879127SKrish Sadhukhan } 826ad879127SKrish Sadhukhan 827ad879127SKrish Sadhukhan static void npt_l1mmio_prepare(struct svm_test *test) 828ad879127SKrish Sadhukhan { 829ad879127SKrish Sadhukhan } 830ad879127SKrish Sadhukhan 831ad879127SKrish Sadhukhan u32 nested_apic_version1; 832ad879127SKrish Sadhukhan u32 nested_apic_version2; 833ad879127SKrish Sadhukhan 834ad879127SKrish Sadhukhan static void npt_l1mmio_test(struct svm_test *test) 835ad879127SKrish Sadhukhan { 836ad879127SKrish Sadhukhan volatile u32 *data = (volatile void*)(0xfee00030UL); 837ad879127SKrish Sadhukhan 838ad879127SKrish Sadhukhan nested_apic_version1 = *data; 839ad879127SKrish Sadhukhan nested_apic_version2 = *data; 840ad879127SKrish Sadhukhan } 841ad879127SKrish Sadhukhan 842ad879127SKrish Sadhukhan static bool npt_l1mmio_check(struct svm_test *test) 843ad879127SKrish Sadhukhan { 844ad879127SKrish Sadhukhan volatile u32 *data = (volatile void*)(0xfee00030); 845ad879127SKrish Sadhukhan u32 lvr = *data; 846ad879127SKrish Sadhukhan 847ad879127SKrish Sadhukhan return nested_apic_version1 == lvr && nested_apic_version2 == lvr; 848ad879127SKrish Sadhukhan } 849ad879127SKrish Sadhukhan 850ad879127SKrish Sadhukhan static void npt_rw_l1mmio_prepare(struct svm_test *test) 851ad879127SKrish Sadhukhan { 852ad879127SKrish Sadhukhan 853ad879127SKrish Sadhukhan u64 *pte; 854ad879127SKrish Sadhukhan 855ad879127SKrish Sadhukhan pte = npt_get_pte(0xfee00080); 856ad879127SKrish Sadhukhan 857ad879127SKrish Sadhukhan *pte &= ~(1ULL << 1); 858ad879127SKrish Sadhukhan } 859ad879127SKrish Sadhukhan 860ad879127SKrish Sadhukhan static void npt_rw_l1mmio_test(struct svm_test *test) 861ad879127SKrish Sadhukhan { 862ad879127SKrish Sadhukhan volatile u32 *data = (volatile void*)(0xfee00080); 863ad879127SKrish Sadhukhan 864ad879127SKrish Sadhukhan *data = *data; 865ad879127SKrish Sadhukhan } 866ad879127SKrish Sadhukhan 867ad879127SKrish Sadhukhan static bool npt_rw_l1mmio_check(struct svm_test *test) 868ad879127SKrish Sadhukhan { 869ad879127SKrish Sadhukhan u64 *pte = npt_get_pte(0xfee00080); 870ad879127SKrish Sadhukhan 871ad879127SKrish Sadhukhan *pte |= (1ULL << 1); 872ad879127SKrish Sadhukhan 873096cf7feSPaolo Bonzini return (vmcb->control.exit_code == SVM_EXIT_NPF) 874096cf7feSPaolo Bonzini && (vmcb->control.exit_info_1 == 0x100000007ULL); 875ad879127SKrish Sadhukhan } 876ad879127SKrish Sadhukhan 877ad879127SKrish Sadhukhan #define TSC_ADJUST_VALUE (1ll << 32) 878f3154609SBill Wendling #define TSC_OFFSET_VALUE (~0ull << 48) 879ad879127SKrish Sadhukhan static bool ok; 880ad879127SKrish Sadhukhan 88110a65fc4SNadav Amit static bool tsc_adjust_supported(void) 88210a65fc4SNadav Amit { 88310a65fc4SNadav Amit return this_cpu_has(X86_FEATURE_TSC_ADJUST); 88410a65fc4SNadav Amit } 88510a65fc4SNadav Amit 886ad879127SKrish Sadhukhan static void tsc_adjust_prepare(struct svm_test *test) 887ad879127SKrish Sadhukhan { 888ad879127SKrish Sadhukhan default_prepare(test); 889096cf7feSPaolo Bonzini vmcb->control.tsc_offset = TSC_OFFSET_VALUE; 890ad879127SKrish Sadhukhan 891ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, -TSC_ADJUST_VALUE); 892ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 893ad879127SKrish Sadhukhan ok = adjust == -TSC_ADJUST_VALUE; 894ad879127SKrish Sadhukhan } 895ad879127SKrish Sadhukhan 896ad879127SKrish Sadhukhan static void tsc_adjust_test(struct svm_test *test) 897ad879127SKrish Sadhukhan { 898ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 899ad879127SKrish Sadhukhan ok &= adjust == -TSC_ADJUST_VALUE; 900ad879127SKrish Sadhukhan 901ad879127SKrish Sadhukhan uint64_t l1_tsc = rdtsc() - TSC_OFFSET_VALUE; 902ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC, l1_tsc - TSC_ADJUST_VALUE); 903ad879127SKrish Sadhukhan 904ad879127SKrish Sadhukhan adjust = rdmsr(MSR_IA32_TSC_ADJUST); 905ad879127SKrish Sadhukhan ok &= adjust <= -2 * TSC_ADJUST_VALUE; 906ad879127SKrish Sadhukhan 907ad879127SKrish Sadhukhan uint64_t l1_tsc_end = rdtsc() - TSC_OFFSET_VALUE; 908ad879127SKrish Sadhukhan ok &= (l1_tsc_end + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 909ad879127SKrish Sadhukhan 910ad879127SKrish Sadhukhan uint64_t l1_tsc_msr = rdmsr(MSR_IA32_TSC) - TSC_OFFSET_VALUE; 911ad879127SKrish Sadhukhan ok &= (l1_tsc_msr + TSC_ADJUST_VALUE - l1_tsc) < TSC_ADJUST_VALUE; 912ad879127SKrish Sadhukhan } 913ad879127SKrish Sadhukhan 914ad879127SKrish Sadhukhan static bool tsc_adjust_check(struct svm_test *test) 915ad879127SKrish Sadhukhan { 916ad879127SKrish Sadhukhan int64_t adjust = rdmsr(MSR_IA32_TSC_ADJUST); 917ad879127SKrish Sadhukhan 918ad879127SKrish Sadhukhan wrmsr(MSR_IA32_TSC_ADJUST, 0); 919ad879127SKrish Sadhukhan return ok && adjust <= -2 * TSC_ADJUST_VALUE; 920ad879127SKrish Sadhukhan } 921ad879127SKrish Sadhukhan 922a8503d50SMaxim Levitsky 923a8503d50SMaxim Levitsky static u64 guest_tsc_delay_value; 924a8503d50SMaxim Levitsky /* number of bits to shift tsc right for stable result */ 925a8503d50SMaxim Levitsky #define TSC_SHIFT 24 926a8503d50SMaxim Levitsky #define TSC_SCALE_ITERATIONS 10 927a8503d50SMaxim Levitsky 928a8503d50SMaxim Levitsky static void svm_tsc_scale_guest(struct svm_test *test) 929a8503d50SMaxim Levitsky { 930a8503d50SMaxim Levitsky u64 start_tsc = rdtsc(); 931a8503d50SMaxim Levitsky 932a8503d50SMaxim Levitsky while (rdtsc() - start_tsc < guest_tsc_delay_value) 933a8503d50SMaxim Levitsky cpu_relax(); 934a8503d50SMaxim Levitsky } 935a8503d50SMaxim Levitsky 936a8503d50SMaxim Levitsky static void svm_tsc_scale_run_testcase(u64 duration, 937a8503d50SMaxim Levitsky double tsc_scale, u64 tsc_offset) 938a8503d50SMaxim Levitsky { 939a8503d50SMaxim Levitsky u64 start_tsc, actual_duration; 940a8503d50SMaxim Levitsky 941a8503d50SMaxim Levitsky guest_tsc_delay_value = (duration << TSC_SHIFT) * tsc_scale; 942a8503d50SMaxim Levitsky 943a8503d50SMaxim Levitsky test_set_guest(svm_tsc_scale_guest); 944a8503d50SMaxim Levitsky vmcb->control.tsc_offset = tsc_offset; 945a8503d50SMaxim Levitsky wrmsr(MSR_AMD64_TSC_RATIO, (u64)(tsc_scale * (1ULL << 32))); 946a8503d50SMaxim Levitsky 947a8503d50SMaxim Levitsky start_tsc = rdtsc(); 948a8503d50SMaxim Levitsky 949a8503d50SMaxim Levitsky if (svm_vmrun() != SVM_EXIT_VMMCALL) 950a8503d50SMaxim Levitsky report_fail("unexpected vm exit code 0x%x", vmcb->control.exit_code); 951a8503d50SMaxim Levitsky 952a8503d50SMaxim Levitsky actual_duration = (rdtsc() - start_tsc) >> TSC_SHIFT; 953a8503d50SMaxim Levitsky 954a8503d50SMaxim Levitsky report(duration == actual_duration, "tsc delay (expected: %lu, actual: %lu)", 955a8503d50SMaxim Levitsky duration, actual_duration); 956a8503d50SMaxim Levitsky } 957a8503d50SMaxim Levitsky 958a8503d50SMaxim Levitsky static void svm_tsc_scale_test(void) 959a8503d50SMaxim Levitsky { 960a8503d50SMaxim Levitsky int i; 961a8503d50SMaxim Levitsky 962a8503d50SMaxim Levitsky if (!tsc_scale_supported()) { 963a8503d50SMaxim Levitsky report_skip("TSC scale not supported in the guest"); 964a8503d50SMaxim Levitsky return; 965a8503d50SMaxim Levitsky } 966a8503d50SMaxim Levitsky 967a8503d50SMaxim Levitsky report(rdmsr(MSR_AMD64_TSC_RATIO) == TSC_RATIO_DEFAULT, 968a8503d50SMaxim Levitsky "initial TSC scale ratio"); 969a8503d50SMaxim Levitsky 970a8503d50SMaxim Levitsky for (i = 0 ; i < TSC_SCALE_ITERATIONS; i++) { 971a8503d50SMaxim Levitsky 972a8503d50SMaxim Levitsky double tsc_scale = (double)(rdrand() % 100 + 1) / 10; 973a8503d50SMaxim Levitsky int duration = rdrand() % 50 + 1; 974a8503d50SMaxim Levitsky u64 tsc_offset = rdrand(); 975a8503d50SMaxim Levitsky 976a8503d50SMaxim Levitsky report_info("duration=%d, tsc_scale=%d, tsc_offset=%ld", 977a8503d50SMaxim Levitsky duration, (int)(tsc_scale * 100), tsc_offset); 978a8503d50SMaxim Levitsky 979a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(duration, tsc_scale, tsc_offset); 980a8503d50SMaxim Levitsky } 981a8503d50SMaxim Levitsky 982a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 255, rdrand()); 983a8503d50SMaxim Levitsky svm_tsc_scale_run_testcase(50, 0.0001, rdrand()); 984a8503d50SMaxim Levitsky } 985a8503d50SMaxim Levitsky 986ad879127SKrish Sadhukhan static void latency_prepare(struct svm_test *test) 987ad879127SKrish Sadhukhan { 988ad879127SKrish Sadhukhan default_prepare(test); 989ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 990ad879127SKrish Sadhukhan latvmrun_min = latvmexit_min = -1ULL; 991ad879127SKrish Sadhukhan latvmrun_max = latvmexit_max = 0; 992ad879127SKrish Sadhukhan vmrun_sum = vmexit_sum = 0; 993ad879127SKrish Sadhukhan tsc_start = rdtsc(); 994ad879127SKrish Sadhukhan } 995ad879127SKrish Sadhukhan 996ad879127SKrish Sadhukhan static void latency_test(struct svm_test *test) 997ad879127SKrish Sadhukhan { 998ad879127SKrish Sadhukhan u64 cycles; 999ad879127SKrish Sadhukhan 1000ad879127SKrish Sadhukhan start: 1001ad879127SKrish Sadhukhan tsc_end = rdtsc(); 1002ad879127SKrish Sadhukhan 1003ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 1004ad879127SKrish Sadhukhan 1005ad879127SKrish Sadhukhan if (cycles > latvmrun_max) 1006ad879127SKrish Sadhukhan latvmrun_max = cycles; 1007ad879127SKrish Sadhukhan 1008ad879127SKrish Sadhukhan if (cycles < latvmrun_min) 1009ad879127SKrish Sadhukhan latvmrun_min = cycles; 1010ad879127SKrish Sadhukhan 1011ad879127SKrish Sadhukhan vmrun_sum += cycles; 1012ad879127SKrish Sadhukhan 1013ad879127SKrish Sadhukhan tsc_start = rdtsc(); 1014ad879127SKrish Sadhukhan 1015ad879127SKrish Sadhukhan asm volatile ("vmmcall" : : : "memory"); 1016ad879127SKrish Sadhukhan goto start; 1017ad879127SKrish Sadhukhan } 1018ad879127SKrish Sadhukhan 1019ad879127SKrish Sadhukhan static bool latency_finished(struct svm_test *test) 1020ad879127SKrish Sadhukhan { 1021ad879127SKrish Sadhukhan u64 cycles; 1022ad879127SKrish Sadhukhan 1023ad879127SKrish Sadhukhan tsc_end = rdtsc(); 1024ad879127SKrish Sadhukhan 1025ad879127SKrish Sadhukhan cycles = tsc_end - tsc_start; 1026ad879127SKrish Sadhukhan 1027ad879127SKrish Sadhukhan if (cycles > latvmexit_max) 1028ad879127SKrish Sadhukhan latvmexit_max = cycles; 1029ad879127SKrish Sadhukhan 1030ad879127SKrish Sadhukhan if (cycles < latvmexit_min) 1031ad879127SKrish Sadhukhan latvmexit_min = cycles; 1032ad879127SKrish Sadhukhan 1033ad879127SKrish Sadhukhan vmexit_sum += cycles; 1034ad879127SKrish Sadhukhan 1035096cf7feSPaolo Bonzini vmcb->save.rip += 3; 1036ad879127SKrish Sadhukhan 1037ad879127SKrish Sadhukhan runs -= 1; 1038ad879127SKrish Sadhukhan 1039ad879127SKrish Sadhukhan tsc_end = rdtsc(); 1040ad879127SKrish Sadhukhan 1041ad879127SKrish Sadhukhan return runs == 0; 1042ad879127SKrish Sadhukhan } 1043ad879127SKrish Sadhukhan 1044f7fa53dcSPaolo Bonzini static bool latency_finished_clean(struct svm_test *test) 1045f7fa53dcSPaolo Bonzini { 1046f7fa53dcSPaolo Bonzini vmcb->control.clean = VMCB_CLEAN_ALL; 1047f7fa53dcSPaolo Bonzini return latency_finished(test); 1048f7fa53dcSPaolo Bonzini } 1049f7fa53dcSPaolo Bonzini 1050ad879127SKrish Sadhukhan static bool latency_check(struct svm_test *test) 1051ad879127SKrish Sadhukhan { 1052ad879127SKrish Sadhukhan printf(" Latency VMRUN : max: %ld min: %ld avg: %ld\n", latvmrun_max, 1053ad879127SKrish Sadhukhan latvmrun_min, vmrun_sum / LATENCY_RUNS); 1054ad879127SKrish Sadhukhan printf(" Latency VMEXIT: max: %ld min: %ld avg: %ld\n", latvmexit_max, 1055ad879127SKrish Sadhukhan latvmexit_min, vmexit_sum / LATENCY_RUNS); 1056ad879127SKrish Sadhukhan return true; 1057ad879127SKrish Sadhukhan } 1058ad879127SKrish Sadhukhan 1059ad879127SKrish Sadhukhan static void lat_svm_insn_prepare(struct svm_test *test) 1060ad879127SKrish Sadhukhan { 1061ad879127SKrish Sadhukhan default_prepare(test); 1062ad879127SKrish Sadhukhan runs = LATENCY_RUNS; 1063ad879127SKrish Sadhukhan latvmload_min = latvmsave_min = latstgi_min = latclgi_min = -1ULL; 1064ad879127SKrish Sadhukhan latvmload_max = latvmsave_max = latstgi_max = latclgi_max = 0; 1065ad879127SKrish Sadhukhan vmload_sum = vmsave_sum = stgi_sum = clgi_sum; 1066ad879127SKrish Sadhukhan } 1067ad879127SKrish Sadhukhan 1068ad879127SKrish Sadhukhan static bool lat_svm_insn_finished(struct svm_test *test) 1069ad879127SKrish Sadhukhan { 1070096cf7feSPaolo Bonzini u64 vmcb_phys = virt_to_phys(vmcb); 1071ad879127SKrish Sadhukhan u64 cycles; 1072ad879127SKrish Sadhukhan 1073ad879127SKrish Sadhukhan for ( ; runs != 0; runs--) { 1074ad879127SKrish Sadhukhan tsc_start = rdtsc(); 1075ad879127SKrish Sadhukhan asm volatile("vmload %0\n\t" : : "a"(vmcb_phys) : "memory"); 1076ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 1077ad879127SKrish Sadhukhan if (cycles > latvmload_max) 1078ad879127SKrish Sadhukhan latvmload_max = cycles; 1079ad879127SKrish Sadhukhan if (cycles < latvmload_min) 1080ad879127SKrish Sadhukhan latvmload_min = cycles; 1081ad879127SKrish Sadhukhan vmload_sum += cycles; 1082ad879127SKrish Sadhukhan 1083ad879127SKrish Sadhukhan tsc_start = rdtsc(); 1084ad879127SKrish Sadhukhan asm volatile("vmsave %0\n\t" : : "a"(vmcb_phys) : "memory"); 1085ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 1086ad879127SKrish Sadhukhan if (cycles > latvmsave_max) 1087ad879127SKrish Sadhukhan latvmsave_max = cycles; 1088ad879127SKrish Sadhukhan if (cycles < latvmsave_min) 1089ad879127SKrish Sadhukhan latvmsave_min = cycles; 1090ad879127SKrish Sadhukhan vmsave_sum += cycles; 1091ad879127SKrish Sadhukhan 1092ad879127SKrish Sadhukhan tsc_start = rdtsc(); 1093ad879127SKrish Sadhukhan asm volatile("stgi\n\t"); 1094ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 1095ad879127SKrish Sadhukhan if (cycles > latstgi_max) 1096ad879127SKrish Sadhukhan latstgi_max = cycles; 1097ad879127SKrish Sadhukhan if (cycles < latstgi_min) 1098ad879127SKrish Sadhukhan latstgi_min = cycles; 1099ad879127SKrish Sadhukhan stgi_sum += cycles; 1100ad879127SKrish Sadhukhan 1101ad879127SKrish Sadhukhan tsc_start = rdtsc(); 1102ad879127SKrish Sadhukhan asm volatile("clgi\n\t"); 1103ad879127SKrish Sadhukhan cycles = rdtsc() - tsc_start; 1104ad879127SKrish Sadhukhan if (cycles > latclgi_max) 1105ad879127SKrish Sadhukhan latclgi_max = cycles; 1106ad879127SKrish Sadhukhan if (cycles < latclgi_min) 1107ad879127SKrish Sadhukhan latclgi_min = cycles; 1108ad879127SKrish Sadhukhan clgi_sum += cycles; 1109ad879127SKrish Sadhukhan } 1110ad879127SKrish Sadhukhan 1111ad879127SKrish Sadhukhan tsc_end = rdtsc(); 1112ad879127SKrish Sadhukhan 1113ad879127SKrish Sadhukhan return true; 1114ad879127SKrish Sadhukhan } 1115ad879127SKrish Sadhukhan 1116ad879127SKrish Sadhukhan static bool lat_svm_insn_check(struct svm_test *test) 1117ad879127SKrish Sadhukhan { 1118ad879127SKrish Sadhukhan printf(" Latency VMLOAD: max: %ld min: %ld avg: %ld\n", latvmload_max, 1119ad879127SKrish Sadhukhan latvmload_min, vmload_sum / LATENCY_RUNS); 1120ad879127SKrish Sadhukhan printf(" Latency VMSAVE: max: %ld min: %ld avg: %ld\n", latvmsave_max, 1121ad879127SKrish Sadhukhan latvmsave_min, vmsave_sum / LATENCY_RUNS); 1122ad879127SKrish Sadhukhan printf(" Latency STGI: max: %ld min: %ld avg: %ld\n", latstgi_max, 1123ad879127SKrish Sadhukhan latstgi_min, stgi_sum / LATENCY_RUNS); 1124ad879127SKrish Sadhukhan printf(" Latency CLGI: max: %ld min: %ld avg: %ld\n", latclgi_max, 1125ad879127SKrish Sadhukhan latclgi_min, clgi_sum / LATENCY_RUNS); 1126ad879127SKrish Sadhukhan return true; 1127ad879127SKrish Sadhukhan } 1128ad879127SKrish Sadhukhan 1129ad879127SKrish Sadhukhan bool pending_event_ipi_fired; 1130ad879127SKrish Sadhukhan bool pending_event_guest_run; 1131ad879127SKrish Sadhukhan 1132ad879127SKrish Sadhukhan static void pending_event_ipi_isr(isr_regs_t *regs) 1133ad879127SKrish Sadhukhan { 1134ad879127SKrish Sadhukhan pending_event_ipi_fired = true; 1135ad879127SKrish Sadhukhan eoi(); 1136ad879127SKrish Sadhukhan } 1137ad879127SKrish Sadhukhan 1138ad879127SKrish Sadhukhan static void pending_event_prepare(struct svm_test *test) 1139ad879127SKrish Sadhukhan { 1140ad879127SKrish Sadhukhan int ipi_vector = 0xf1; 1141ad879127SKrish Sadhukhan 1142ad879127SKrish Sadhukhan default_prepare(test); 1143ad879127SKrish Sadhukhan 1144ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1145ad879127SKrish Sadhukhan 1146ad879127SKrish Sadhukhan handle_irq(ipi_vector, pending_event_ipi_isr); 1147ad879127SKrish Sadhukhan 1148ad879127SKrish Sadhukhan pending_event_guest_run = false; 1149ad879127SKrish Sadhukhan 1150096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1151096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 1152ad879127SKrish Sadhukhan 1153ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1154ad879127SKrish Sadhukhan APIC_DM_FIXED | ipi_vector, 0); 1155ad879127SKrish Sadhukhan 1156ad879127SKrish Sadhukhan set_test_stage(test, 0); 1157ad879127SKrish Sadhukhan } 1158ad879127SKrish Sadhukhan 1159ad879127SKrish Sadhukhan static void pending_event_test(struct svm_test *test) 1160ad879127SKrish Sadhukhan { 1161ad879127SKrish Sadhukhan pending_event_guest_run = true; 1162ad879127SKrish Sadhukhan } 1163ad879127SKrish Sadhukhan 1164ad879127SKrish Sadhukhan static bool pending_event_finished(struct svm_test *test) 1165ad879127SKrish Sadhukhan { 1166ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 1167ad879127SKrish Sadhukhan case 0: 1168096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 1169198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to pending interrupt. Exit reason 0x%x", 1170096cf7feSPaolo Bonzini vmcb->control.exit_code); 1171ad879127SKrish Sadhukhan return true; 1172ad879127SKrish Sadhukhan } 1173ad879127SKrish Sadhukhan 1174096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 1175096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 1176ad879127SKrish Sadhukhan 1177ad879127SKrish Sadhukhan if (pending_event_guest_run) { 1178198dfd0eSJanis Schoetterl-Glausch report_fail("Guest ran before host received IPI\n"); 1179ad879127SKrish Sadhukhan return true; 1180ad879127SKrish Sadhukhan } 1181ad879127SKrish Sadhukhan 1182ad879127SKrish Sadhukhan irq_enable(); 1183ad879127SKrish Sadhukhan asm volatile ("nop"); 1184ad879127SKrish Sadhukhan irq_disable(); 1185ad879127SKrish Sadhukhan 1186ad879127SKrish Sadhukhan if (!pending_event_ipi_fired) { 1187198dfd0eSJanis Schoetterl-Glausch report_fail("Pending interrupt not dispatched after IRQ enabled\n"); 1188ad879127SKrish Sadhukhan return true; 1189ad879127SKrish Sadhukhan } 1190ad879127SKrish Sadhukhan break; 1191ad879127SKrish Sadhukhan 1192ad879127SKrish Sadhukhan case 1: 1193ad879127SKrish Sadhukhan if (!pending_event_guest_run) { 1194198dfd0eSJanis Schoetterl-Glausch report_fail("Guest did not resume when no interrupt\n"); 1195ad879127SKrish Sadhukhan return true; 1196ad879127SKrish Sadhukhan } 1197ad879127SKrish Sadhukhan break; 1198ad879127SKrish Sadhukhan } 1199ad879127SKrish Sadhukhan 1200ad879127SKrish Sadhukhan inc_test_stage(test); 1201ad879127SKrish Sadhukhan 1202ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1203ad879127SKrish Sadhukhan } 1204ad879127SKrish Sadhukhan 1205ad879127SKrish Sadhukhan static bool pending_event_check(struct svm_test *test) 1206ad879127SKrish Sadhukhan { 1207ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1208ad879127SKrish Sadhukhan } 1209ad879127SKrish Sadhukhan 121085dc2aceSPaolo Bonzini static void pending_event_cli_prepare(struct svm_test *test) 1211ad879127SKrish Sadhukhan { 1212ad879127SKrish Sadhukhan default_prepare(test); 1213ad879127SKrish Sadhukhan 1214ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1215ad879127SKrish Sadhukhan 1216ad879127SKrish Sadhukhan handle_irq(0xf1, pending_event_ipi_isr); 1217ad879127SKrish Sadhukhan 1218ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1219ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1220ad879127SKrish Sadhukhan 1221ad879127SKrish Sadhukhan set_test_stage(test, 0); 1222ad879127SKrish Sadhukhan } 1223ad879127SKrish Sadhukhan 122485dc2aceSPaolo Bonzini static void pending_event_cli_prepare_gif_clear(struct svm_test *test) 1225ad879127SKrish Sadhukhan { 1226ad879127SKrish Sadhukhan asm("cli"); 1227ad879127SKrish Sadhukhan } 1228ad879127SKrish Sadhukhan 122985dc2aceSPaolo Bonzini static void pending_event_cli_test(struct svm_test *test) 1230ad879127SKrish Sadhukhan { 1231ad879127SKrish Sadhukhan if (pending_event_ipi_fired == true) { 1232ad879127SKrish Sadhukhan set_test_stage(test, -1); 1233198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt preceeded guest"); 1234ad879127SKrish Sadhukhan vmmcall(); 1235ad879127SKrish Sadhukhan } 1236ad879127SKrish Sadhukhan 123785dc2aceSPaolo Bonzini /* VINTR_MASKING is zero. This should cause the IPI to fire. */ 1238ad879127SKrish Sadhukhan irq_enable(); 1239ad879127SKrish Sadhukhan asm volatile ("nop"); 1240ad879127SKrish Sadhukhan irq_disable(); 1241ad879127SKrish Sadhukhan 1242ad879127SKrish Sadhukhan if (pending_event_ipi_fired != true) { 1243ad879127SKrish Sadhukhan set_test_stage(test, -1); 1244198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt not triggered by guest"); 1245ad879127SKrish Sadhukhan } 1246ad879127SKrish Sadhukhan 1247ad879127SKrish Sadhukhan vmmcall(); 1248ad879127SKrish Sadhukhan 124985dc2aceSPaolo Bonzini /* 125085dc2aceSPaolo Bonzini * Now VINTR_MASKING=1, but no interrupt is pending so 125185dc2aceSPaolo Bonzini * the VINTR interception should be clear in VMCB02. Check 125285dc2aceSPaolo Bonzini * that L0 did not leave a stale VINTR in the VMCB. 125385dc2aceSPaolo Bonzini */ 1254ad879127SKrish Sadhukhan irq_enable(); 1255ad879127SKrish Sadhukhan asm volatile ("nop"); 1256ad879127SKrish Sadhukhan irq_disable(); 1257ad879127SKrish Sadhukhan } 1258ad879127SKrish Sadhukhan 125985dc2aceSPaolo Bonzini static bool pending_event_cli_finished(struct svm_test *test) 1260ad879127SKrish Sadhukhan { 1261096cf7feSPaolo Bonzini if ( vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1262198dfd0eSJanis Schoetterl-Glausch report_fail("VM_EXIT return to host is not EXIT_VMMCALL exit reason 0x%x", 1263096cf7feSPaolo Bonzini vmcb->control.exit_code); 1264ad879127SKrish Sadhukhan return true; 1265ad879127SKrish Sadhukhan } 1266ad879127SKrish Sadhukhan 1267ad879127SKrish Sadhukhan switch (get_test_stage(test)) { 1268ad879127SKrish Sadhukhan case 0: 1269096cf7feSPaolo Bonzini vmcb->save.rip += 3; 1270ad879127SKrish Sadhukhan 1271ad879127SKrish Sadhukhan pending_event_ipi_fired = false; 1272ad879127SKrish Sadhukhan 1273096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 1274ad879127SKrish Sadhukhan 127585dc2aceSPaolo Bonzini /* Now entering again with VINTR_MASKING=1. */ 1276ad879127SKrish Sadhukhan apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | 1277ad879127SKrish Sadhukhan APIC_DM_FIXED | 0xf1, 0); 1278ad879127SKrish Sadhukhan 1279ad879127SKrish Sadhukhan break; 1280ad879127SKrish Sadhukhan 1281ad879127SKrish Sadhukhan case 1: 1282ad879127SKrish Sadhukhan if (pending_event_ipi_fired == true) { 1283198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt triggered by guest"); 1284ad879127SKrish Sadhukhan return true; 1285ad879127SKrish Sadhukhan } 1286ad879127SKrish Sadhukhan 1287ad879127SKrish Sadhukhan irq_enable(); 1288ad879127SKrish Sadhukhan asm volatile ("nop"); 1289ad879127SKrish Sadhukhan irq_disable(); 1290ad879127SKrish Sadhukhan 1291ad879127SKrish Sadhukhan if (pending_event_ipi_fired != true) { 1292198dfd0eSJanis Schoetterl-Glausch report_fail("Interrupt not triggered by host"); 1293ad879127SKrish Sadhukhan return true; 1294ad879127SKrish Sadhukhan } 1295ad879127SKrish Sadhukhan 1296ad879127SKrish Sadhukhan break; 1297ad879127SKrish Sadhukhan 1298ad879127SKrish Sadhukhan default: 1299ad879127SKrish Sadhukhan return true; 1300ad879127SKrish Sadhukhan } 1301ad879127SKrish Sadhukhan 1302ad879127SKrish Sadhukhan inc_test_stage(test); 1303ad879127SKrish Sadhukhan 1304ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1305ad879127SKrish Sadhukhan } 1306ad879127SKrish Sadhukhan 130785dc2aceSPaolo Bonzini static bool pending_event_cli_check(struct svm_test *test) 1308ad879127SKrish Sadhukhan { 1309ad879127SKrish Sadhukhan return get_test_stage(test) == 2; 1310ad879127SKrish Sadhukhan } 1311ad879127SKrish Sadhukhan 131285dc2aceSPaolo Bonzini #define TIMER_VECTOR 222 131385dc2aceSPaolo Bonzini 131485dc2aceSPaolo Bonzini static volatile bool timer_fired; 131585dc2aceSPaolo Bonzini 131685dc2aceSPaolo Bonzini static void timer_isr(isr_regs_t *regs) 131785dc2aceSPaolo Bonzini { 131885dc2aceSPaolo Bonzini timer_fired = true; 131985dc2aceSPaolo Bonzini apic_write(APIC_EOI, 0); 132085dc2aceSPaolo Bonzini } 132185dc2aceSPaolo Bonzini 132285dc2aceSPaolo Bonzini static void interrupt_prepare(struct svm_test *test) 132385dc2aceSPaolo Bonzini { 132485dc2aceSPaolo Bonzini default_prepare(test); 132585dc2aceSPaolo Bonzini handle_irq(TIMER_VECTOR, timer_isr); 132685dc2aceSPaolo Bonzini timer_fired = false; 132785dc2aceSPaolo Bonzini set_test_stage(test, 0); 132885dc2aceSPaolo Bonzini } 132985dc2aceSPaolo Bonzini 133085dc2aceSPaolo Bonzini static void interrupt_test(struct svm_test *test) 133185dc2aceSPaolo Bonzini { 133285dc2aceSPaolo Bonzini long long start, loops; 133385dc2aceSPaolo Bonzini 133485dc2aceSPaolo Bonzini apic_write(APIC_LVTT, TIMER_VECTOR); 133585dc2aceSPaolo Bonzini irq_enable(); 133685dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1); //Timer Initial Count Register 0x380 one-shot 133785dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 133885dc2aceSPaolo Bonzini asm volatile ("nop"); 133985dc2aceSPaolo Bonzini 134085dc2aceSPaolo Bonzini report(timer_fired, "direct interrupt while running guest"); 134185dc2aceSPaolo Bonzini 134285dc2aceSPaolo Bonzini if (!timer_fired) { 134385dc2aceSPaolo Bonzini set_test_stage(test, -1); 134485dc2aceSPaolo Bonzini vmmcall(); 134585dc2aceSPaolo Bonzini } 134685dc2aceSPaolo Bonzini 134785dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 134885dc2aceSPaolo Bonzini irq_disable(); 134985dc2aceSPaolo Bonzini vmmcall(); 135085dc2aceSPaolo Bonzini 135185dc2aceSPaolo Bonzini timer_fired = false; 135285dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1); 135385dc2aceSPaolo Bonzini for (loops = 0; loops < 10000000 && !timer_fired; loops++) 135485dc2aceSPaolo Bonzini asm volatile ("nop"); 135585dc2aceSPaolo Bonzini 135685dc2aceSPaolo Bonzini report(timer_fired, "intercepted interrupt while running guest"); 135785dc2aceSPaolo Bonzini 135885dc2aceSPaolo Bonzini if (!timer_fired) { 135985dc2aceSPaolo Bonzini set_test_stage(test, -1); 136085dc2aceSPaolo Bonzini vmmcall(); 136185dc2aceSPaolo Bonzini } 136285dc2aceSPaolo Bonzini 136385dc2aceSPaolo Bonzini irq_enable(); 136485dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 136585dc2aceSPaolo Bonzini irq_disable(); 136685dc2aceSPaolo Bonzini 136785dc2aceSPaolo Bonzini timer_fired = false; 136885dc2aceSPaolo Bonzini start = rdtsc(); 136985dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1000000); 1370a3001422SOliver Upton safe_halt(); 137185dc2aceSPaolo Bonzini 137285dc2aceSPaolo Bonzini report(rdtsc() - start > 10000 && timer_fired, 137385dc2aceSPaolo Bonzini "direct interrupt + hlt"); 137485dc2aceSPaolo Bonzini 137585dc2aceSPaolo Bonzini if (!timer_fired) { 137685dc2aceSPaolo Bonzini set_test_stage(test, -1); 137785dc2aceSPaolo Bonzini vmmcall(); 137885dc2aceSPaolo Bonzini } 137985dc2aceSPaolo Bonzini 138085dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 138185dc2aceSPaolo Bonzini irq_disable(); 138285dc2aceSPaolo Bonzini vmmcall(); 138385dc2aceSPaolo Bonzini 138485dc2aceSPaolo Bonzini timer_fired = false; 138585dc2aceSPaolo Bonzini start = rdtsc(); 138685dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 1000000); 138785dc2aceSPaolo Bonzini asm volatile ("hlt"); 138885dc2aceSPaolo Bonzini 138985dc2aceSPaolo Bonzini report(rdtsc() - start > 10000 && timer_fired, 139085dc2aceSPaolo Bonzini "intercepted interrupt + hlt"); 139185dc2aceSPaolo Bonzini 139285dc2aceSPaolo Bonzini if (!timer_fired) { 139385dc2aceSPaolo Bonzini set_test_stage(test, -1); 139485dc2aceSPaolo Bonzini vmmcall(); 139585dc2aceSPaolo Bonzini } 139685dc2aceSPaolo Bonzini 139785dc2aceSPaolo Bonzini apic_write(APIC_TMICT, 0); 139885dc2aceSPaolo Bonzini irq_disable(); 139985dc2aceSPaolo Bonzini } 140085dc2aceSPaolo Bonzini 140185dc2aceSPaolo Bonzini static bool interrupt_finished(struct svm_test *test) 140285dc2aceSPaolo Bonzini { 140385dc2aceSPaolo Bonzini switch (get_test_stage(test)) { 140485dc2aceSPaolo Bonzini case 0: 140585dc2aceSPaolo Bonzini case 2: 1406096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1407198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1408096cf7feSPaolo Bonzini vmcb->control.exit_code); 140985dc2aceSPaolo Bonzini return true; 141085dc2aceSPaolo Bonzini } 1411096cf7feSPaolo Bonzini vmcb->save.rip += 3; 141285dc2aceSPaolo Bonzini 1413096cf7feSPaolo Bonzini vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1414096cf7feSPaolo Bonzini vmcb->control.int_ctl |= V_INTR_MASKING_MASK; 141585dc2aceSPaolo Bonzini break; 141685dc2aceSPaolo Bonzini 141785dc2aceSPaolo Bonzini case 1: 141885dc2aceSPaolo Bonzini case 3: 1419096cf7feSPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_INTR) { 1420198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to intr intercept. Exit reason 0x%x", 1421096cf7feSPaolo Bonzini vmcb->control.exit_code); 142285dc2aceSPaolo Bonzini return true; 142385dc2aceSPaolo Bonzini } 142485dc2aceSPaolo Bonzini 142585dc2aceSPaolo Bonzini irq_enable(); 142685dc2aceSPaolo Bonzini asm volatile ("nop"); 142785dc2aceSPaolo Bonzini irq_disable(); 142885dc2aceSPaolo Bonzini 1429096cf7feSPaolo Bonzini vmcb->control.intercept &= ~(1ULL << INTERCEPT_INTR); 1430096cf7feSPaolo Bonzini vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 143185dc2aceSPaolo Bonzini break; 143285dc2aceSPaolo Bonzini 143385dc2aceSPaolo Bonzini case 4: 143485dc2aceSPaolo Bonzini break; 143585dc2aceSPaolo Bonzini 143685dc2aceSPaolo Bonzini default: 143785dc2aceSPaolo Bonzini return true; 143885dc2aceSPaolo Bonzini } 143985dc2aceSPaolo Bonzini 144085dc2aceSPaolo Bonzini inc_test_stage(test); 144185dc2aceSPaolo Bonzini 144285dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 144385dc2aceSPaolo Bonzini } 144485dc2aceSPaolo Bonzini 144585dc2aceSPaolo Bonzini static bool interrupt_check(struct svm_test *test) 144685dc2aceSPaolo Bonzini { 144785dc2aceSPaolo Bonzini return get_test_stage(test) == 5; 144885dc2aceSPaolo Bonzini } 144985dc2aceSPaolo Bonzini 1450d4db486bSCathy Avery static volatile bool nmi_fired; 1451d4db486bSCathy Avery 14524a1207f6SMaxim Levitsky static void nmi_handler(struct ex_regs *regs) 1453d4db486bSCathy Avery { 1454d4db486bSCathy Avery nmi_fired = true; 1455d4db486bSCathy Avery } 1456d4db486bSCathy Avery 1457d4db486bSCathy Avery static void nmi_prepare(struct svm_test *test) 1458d4db486bSCathy Avery { 1459d4db486bSCathy Avery default_prepare(test); 1460d4db486bSCathy Avery nmi_fired = false; 14614a1207f6SMaxim Levitsky handle_exception(NMI_VECTOR, nmi_handler); 1462d4db486bSCathy Avery set_test_stage(test, 0); 1463d4db486bSCathy Avery } 1464d4db486bSCathy Avery 1465d4db486bSCathy Avery static void nmi_test(struct svm_test *test) 1466d4db486bSCathy Avery { 1467d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1468d4db486bSCathy Avery 1469d4db486bSCathy Avery report(nmi_fired, "direct NMI while running guest"); 1470d4db486bSCathy Avery 1471d4db486bSCathy Avery if (!nmi_fired) 1472d4db486bSCathy Avery set_test_stage(test, -1); 1473d4db486bSCathy Avery 1474d4db486bSCathy Avery vmmcall(); 1475d4db486bSCathy Avery 1476d4db486bSCathy Avery nmi_fired = false; 1477d4db486bSCathy Avery 1478d4db486bSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, 0); 1479d4db486bSCathy Avery 1480d4db486bSCathy Avery if (!nmi_fired) { 1481d4db486bSCathy Avery report(nmi_fired, "intercepted pending NMI not dispatched"); 1482d4db486bSCathy Avery set_test_stage(test, -1); 1483d4db486bSCathy Avery } 1484d4db486bSCathy Avery 1485d4db486bSCathy Avery } 1486d4db486bSCathy Avery 1487d4db486bSCathy Avery static bool nmi_finished(struct svm_test *test) 1488d4db486bSCathy Avery { 1489d4db486bSCathy Avery switch (get_test_stage(test)) { 1490d4db486bSCathy Avery case 0: 1491d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1492198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 1493d4db486bSCathy Avery vmcb->control.exit_code); 1494d4db486bSCathy Avery return true; 1495d4db486bSCathy Avery } 1496d4db486bSCathy Avery vmcb->save.rip += 3; 1497d4db486bSCathy Avery 1498d4db486bSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 1499d4db486bSCathy Avery break; 1500d4db486bSCathy Avery 1501d4db486bSCathy Avery case 1: 1502d4db486bSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1503198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 1504d4db486bSCathy Avery vmcb->control.exit_code); 1505d4db486bSCathy Avery return true; 1506d4db486bSCathy Avery } 1507d4db486bSCathy Avery 15085c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 1509d4db486bSCathy Avery break; 1510d4db486bSCathy Avery 1511d4db486bSCathy Avery case 2: 1512d4db486bSCathy Avery break; 1513d4db486bSCathy Avery 1514d4db486bSCathy Avery default: 1515d4db486bSCathy Avery return true; 1516d4db486bSCathy Avery } 1517d4db486bSCathy Avery 1518d4db486bSCathy Avery inc_test_stage(test); 1519d4db486bSCathy Avery 1520d4db486bSCathy Avery return get_test_stage(test) == 3; 1521d4db486bSCathy Avery } 1522d4db486bSCathy Avery 1523d4db486bSCathy Avery static bool nmi_check(struct svm_test *test) 1524d4db486bSCathy Avery { 1525d4db486bSCathy Avery return get_test_stage(test) == 3; 1526d4db486bSCathy Avery } 1527d4db486bSCathy Avery 15289da1f4d8SCathy Avery #define NMI_DELAY 100000000ULL 15299da1f4d8SCathy Avery 15309da1f4d8SCathy Avery static void nmi_message_thread(void *_test) 15319da1f4d8SCathy Avery { 15329da1f4d8SCathy Avery struct svm_test *test = _test; 15339da1f4d8SCathy Avery 15349da1f4d8SCathy Avery while (get_test_stage(test) != 1) 15359da1f4d8SCathy Avery pause(); 15369da1f4d8SCathy Avery 15379da1f4d8SCathy Avery delay(NMI_DELAY); 15389da1f4d8SCathy Avery 15399da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 15409da1f4d8SCathy Avery 15419da1f4d8SCathy Avery while (get_test_stage(test) != 2) 15429da1f4d8SCathy Avery pause(); 15439da1f4d8SCathy Avery 15449da1f4d8SCathy Avery delay(NMI_DELAY); 15459da1f4d8SCathy Avery 15469da1f4d8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_NMI | APIC_INT_ASSERT, id_map[0]); 15479da1f4d8SCathy Avery } 15489da1f4d8SCathy Avery 15499da1f4d8SCathy Avery static void nmi_hlt_test(struct svm_test *test) 15509da1f4d8SCathy Avery { 15519da1f4d8SCathy Avery long long start; 15529da1f4d8SCathy Avery 15539da1f4d8SCathy Avery on_cpu_async(1, nmi_message_thread, test); 15549da1f4d8SCathy Avery 15559da1f4d8SCathy Avery start = rdtsc(); 15569da1f4d8SCathy Avery 15579da1f4d8SCathy Avery set_test_stage(test, 1); 15589da1f4d8SCathy Avery 15599da1f4d8SCathy Avery asm volatile ("hlt"); 15609da1f4d8SCathy Avery 15619da1f4d8SCathy Avery report((rdtsc() - start > NMI_DELAY) && nmi_fired, 15629da1f4d8SCathy Avery "direct NMI + hlt"); 15639da1f4d8SCathy Avery 15649da1f4d8SCathy Avery if (!nmi_fired) 15659da1f4d8SCathy Avery set_test_stage(test, -1); 15669da1f4d8SCathy Avery 15679da1f4d8SCathy Avery nmi_fired = false; 15689da1f4d8SCathy Avery 15699da1f4d8SCathy Avery vmmcall(); 15709da1f4d8SCathy Avery 15719da1f4d8SCathy Avery start = rdtsc(); 15729da1f4d8SCathy Avery 15739da1f4d8SCathy Avery set_test_stage(test, 2); 15749da1f4d8SCathy Avery 15759da1f4d8SCathy Avery asm volatile ("hlt"); 15769da1f4d8SCathy Avery 15779da1f4d8SCathy Avery report((rdtsc() - start > NMI_DELAY) && nmi_fired, 15789da1f4d8SCathy Avery "intercepted NMI + hlt"); 15799da1f4d8SCathy Avery 15809da1f4d8SCathy Avery if (!nmi_fired) { 15819da1f4d8SCathy Avery report(nmi_fired, "intercepted pending NMI not dispatched"); 15829da1f4d8SCathy Avery set_test_stage(test, -1); 15837e7d9357SCathy Avery vmmcall(); 15849da1f4d8SCathy Avery } 15859da1f4d8SCathy Avery 15869da1f4d8SCathy Avery set_test_stage(test, 3); 15879da1f4d8SCathy Avery } 15889da1f4d8SCathy Avery 15899da1f4d8SCathy Avery static bool nmi_hlt_finished(struct svm_test *test) 15909da1f4d8SCathy Avery { 15919da1f4d8SCathy Avery switch (get_test_stage(test)) { 15929da1f4d8SCathy Avery case 1: 15939da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1594198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 15959da1f4d8SCathy Avery vmcb->control.exit_code); 15969da1f4d8SCathy Avery return true; 15979da1f4d8SCathy Avery } 15989da1f4d8SCathy Avery vmcb->save.rip += 3; 15999da1f4d8SCathy Avery 16009da1f4d8SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_NMI); 16019da1f4d8SCathy Avery break; 16029da1f4d8SCathy Avery 16039da1f4d8SCathy Avery case 2: 16049da1f4d8SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_NMI) { 1605198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to NMI intercept. Exit reason 0x%x", 16069da1f4d8SCathy Avery vmcb->control.exit_code); 16079da1f4d8SCathy Avery return true; 16089da1f4d8SCathy Avery } 16099da1f4d8SCathy Avery 16105c3582f0SJanis Schoetterl-Glausch report_pass("NMI intercept while running guest"); 16119da1f4d8SCathy Avery break; 16129da1f4d8SCathy Avery 16139da1f4d8SCathy Avery case 3: 16149da1f4d8SCathy Avery break; 16159da1f4d8SCathy Avery 16169da1f4d8SCathy Avery default: 16179da1f4d8SCathy Avery return true; 16189da1f4d8SCathy Avery } 16199da1f4d8SCathy Avery 16209da1f4d8SCathy Avery return get_test_stage(test) == 3; 16219da1f4d8SCathy Avery } 16229da1f4d8SCathy Avery 16239da1f4d8SCathy Avery static bool nmi_hlt_check(struct svm_test *test) 16249da1f4d8SCathy Avery { 16259da1f4d8SCathy Avery return get_test_stage(test) == 3; 16269da1f4d8SCathy Avery } 16279da1f4d8SCathy Avery 16284b4fb247SPaolo Bonzini static volatile int count_exc = 0; 16294b4fb247SPaolo Bonzini 16304b4fb247SPaolo Bonzini static void my_isr(struct ex_regs *r) 16314b4fb247SPaolo Bonzini { 16324b4fb247SPaolo Bonzini count_exc++; 16334b4fb247SPaolo Bonzini } 16344b4fb247SPaolo Bonzini 16354b4fb247SPaolo Bonzini static void exc_inject_prepare(struct svm_test *test) 16364b4fb247SPaolo Bonzini { 16378634a266SPaolo Bonzini default_prepare(test); 16384b4fb247SPaolo Bonzini handle_exception(DE_VECTOR, my_isr); 16394b4fb247SPaolo Bonzini handle_exception(NMI_VECTOR, my_isr); 16404b4fb247SPaolo Bonzini } 16414b4fb247SPaolo Bonzini 16424b4fb247SPaolo Bonzini 16434b4fb247SPaolo Bonzini static void exc_inject_test(struct svm_test *test) 16444b4fb247SPaolo Bonzini { 16454b4fb247SPaolo Bonzini asm volatile ("vmmcall\n\tvmmcall\n\t"); 16464b4fb247SPaolo Bonzini } 16474b4fb247SPaolo Bonzini 16484b4fb247SPaolo Bonzini static bool exc_inject_finished(struct svm_test *test) 16494b4fb247SPaolo Bonzini { 16504b4fb247SPaolo Bonzini switch (get_test_stage(test)) { 16514b4fb247SPaolo Bonzini case 0: 16524b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1653198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16544b4fb247SPaolo Bonzini vmcb->control.exit_code); 16554b4fb247SPaolo Bonzini return true; 16564b4fb247SPaolo Bonzini } 16572c1ca866SNadav Amit vmcb->save.rip += 3; 16584b4fb247SPaolo Bonzini vmcb->control.event_inj = NMI_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 16594b4fb247SPaolo Bonzini break; 16604b4fb247SPaolo Bonzini 16614b4fb247SPaolo Bonzini case 1: 16624b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_ERR) { 1663198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to error. Exit reason 0x%x", 16644b4fb247SPaolo Bonzini vmcb->control.exit_code); 16654b4fb247SPaolo Bonzini return true; 16664b4fb247SPaolo Bonzini } 16674b4fb247SPaolo Bonzini report(count_exc == 0, "exception with vector 2 not injected"); 16684b4fb247SPaolo Bonzini vmcb->control.event_inj = DE_VECTOR | SVM_EVTINJ_TYPE_EXEPT | SVM_EVTINJ_VALID; 16694b4fb247SPaolo Bonzini break; 16704b4fb247SPaolo Bonzini 16714b4fb247SPaolo Bonzini case 2: 16724b4fb247SPaolo Bonzini if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1673198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 16744b4fb247SPaolo Bonzini vmcb->control.exit_code); 16754b4fb247SPaolo Bonzini return true; 16764b4fb247SPaolo Bonzini } 16772c1ca866SNadav Amit vmcb->save.rip += 3; 16784b4fb247SPaolo Bonzini report(count_exc == 1, "divide overflow exception injected"); 16794b4fb247SPaolo Bonzini report(!(vmcb->control.event_inj & SVM_EVTINJ_VALID), "eventinj.VALID cleared"); 16804b4fb247SPaolo Bonzini break; 16814b4fb247SPaolo Bonzini 16824b4fb247SPaolo Bonzini default: 16834b4fb247SPaolo Bonzini return true; 16844b4fb247SPaolo Bonzini } 16854b4fb247SPaolo Bonzini 16864b4fb247SPaolo Bonzini inc_test_stage(test); 16874b4fb247SPaolo Bonzini 16884b4fb247SPaolo Bonzini return get_test_stage(test) == 3; 16894b4fb247SPaolo Bonzini } 16904b4fb247SPaolo Bonzini 16914b4fb247SPaolo Bonzini static bool exc_inject_check(struct svm_test *test) 16924b4fb247SPaolo Bonzini { 16934b4fb247SPaolo Bonzini return count_exc == 1 && get_test_stage(test) == 3; 16944b4fb247SPaolo Bonzini } 16954b4fb247SPaolo Bonzini 16969c838954SCathy Avery static volatile bool virq_fired; 16979c838954SCathy Avery 16989c838954SCathy Avery static void virq_isr(isr_regs_t *regs) 16999c838954SCathy Avery { 17009c838954SCathy Avery virq_fired = true; 17019c838954SCathy Avery } 17029c838954SCathy Avery 17039c838954SCathy Avery static void virq_inject_prepare(struct svm_test *test) 17049c838954SCathy Avery { 17059c838954SCathy Avery handle_irq(0xf1, virq_isr); 17069c838954SCathy Avery default_prepare(test); 17079c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 17089c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); // Set to the highest priority 17099c838954SCathy Avery vmcb->control.int_vector = 0xf1; 17109c838954SCathy Avery virq_fired = false; 17119c838954SCathy Avery set_test_stage(test, 0); 17129c838954SCathy Avery } 17139c838954SCathy Avery 17149c838954SCathy Avery static void virq_inject_test(struct svm_test *test) 17159c838954SCathy Avery { 17169c838954SCathy Avery if (virq_fired) { 1717198dfd0eSJanis Schoetterl-Glausch report_fail("virtual interrupt fired before L2 sti"); 17189c838954SCathy Avery set_test_stage(test, -1); 17199c838954SCathy Avery vmmcall(); 17209c838954SCathy Avery } 17219c838954SCathy Avery 17229c838954SCathy Avery irq_enable(); 17239c838954SCathy Avery asm volatile ("nop"); 17249c838954SCathy Avery irq_disable(); 17259c838954SCathy Avery 17269c838954SCathy Avery if (!virq_fired) { 1727198dfd0eSJanis Schoetterl-Glausch report_fail("virtual interrupt not fired after L2 sti"); 17289c838954SCathy Avery set_test_stage(test, -1); 17299c838954SCathy Avery } 17309c838954SCathy Avery 17319c838954SCathy Avery vmmcall(); 17329c838954SCathy Avery 17339c838954SCathy Avery if (virq_fired) { 1734198dfd0eSJanis Schoetterl-Glausch report_fail("virtual interrupt fired before L2 sti after VINTR intercept"); 17359c838954SCathy Avery set_test_stage(test, -1); 17369c838954SCathy Avery vmmcall(); 17379c838954SCathy Avery } 17389c838954SCathy Avery 17399c838954SCathy Avery irq_enable(); 17409c838954SCathy Avery asm volatile ("nop"); 17419c838954SCathy Avery irq_disable(); 17429c838954SCathy Avery 17439c838954SCathy Avery if (!virq_fired) { 1744198dfd0eSJanis Schoetterl-Glausch report_fail("virtual interrupt not fired after return from VINTR intercept"); 17459c838954SCathy Avery set_test_stage(test, -1); 17469c838954SCathy Avery } 17479c838954SCathy Avery 17489c838954SCathy Avery vmmcall(); 17499c838954SCathy Avery 17509c838954SCathy Avery irq_enable(); 17519c838954SCathy Avery asm volatile ("nop"); 17529c838954SCathy Avery irq_disable(); 17539c838954SCathy Avery 17549c838954SCathy Avery if (virq_fired) { 1755198dfd0eSJanis Schoetterl-Glausch report_fail("virtual interrupt fired when V_IRQ_PRIO less than V_TPR"); 17569c838954SCathy Avery set_test_stage(test, -1); 17579c838954SCathy Avery } 17589c838954SCathy Avery 17599c838954SCathy Avery vmmcall(); 17609c838954SCathy Avery vmmcall(); 17619c838954SCathy Avery } 17629c838954SCathy Avery 17639c838954SCathy Avery static bool virq_inject_finished(struct svm_test *test) 17649c838954SCathy Avery { 17659c838954SCathy Avery vmcb->save.rip += 3; 17669c838954SCathy Avery 17679c838954SCathy Avery switch (get_test_stage(test)) { 17689c838954SCathy Avery case 0: 17699c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1770198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 17719c838954SCathy Avery vmcb->control.exit_code); 17729c838954SCathy Avery return true; 17739c838954SCathy Avery } 17749c838954SCathy Avery if (vmcb->control.int_ctl & V_IRQ_MASK) { 1775198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ not cleared on VMEXIT after firing"); 17769c838954SCathy Avery return true; 17779c838954SCathy Avery } 17789c838954SCathy Avery virq_fired = false; 17799c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 17809c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 17819c838954SCathy Avery (0x0f << V_INTR_PRIO_SHIFT); 17829c838954SCathy Avery break; 17839c838954SCathy Avery 17849c838954SCathy Avery case 1: 17859c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VINTR) { 1786198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vintr. Exit reason 0x%x", 17879c838954SCathy Avery vmcb->control.exit_code); 17889c838954SCathy Avery return true; 17899c838954SCathy Avery } 17909c838954SCathy Avery if (virq_fired) { 1791198dfd0eSJanis Schoetterl-Glausch report_fail("V_IRQ fired before SVM_EXIT_VINTR"); 17929c838954SCathy Avery return true; 17939c838954SCathy Avery } 17949c838954SCathy Avery vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR); 17959c838954SCathy Avery break; 17969c838954SCathy Avery 17979c838954SCathy Avery case 2: 17989c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1799198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 18009c838954SCathy Avery vmcb->control.exit_code); 18019c838954SCathy Avery return true; 18029c838954SCathy Avery } 18039c838954SCathy Avery virq_fired = false; 18049c838954SCathy Avery // Set irq to lower priority 18059c838954SCathy Avery vmcb->control.int_ctl = V_INTR_MASKING_MASK | V_IRQ_MASK | 18069c838954SCathy Avery (0x08 << V_INTR_PRIO_SHIFT); 18079c838954SCathy Avery // Raise guest TPR 18089c838954SCathy Avery vmcb->control.int_ctl |= 0x0a & V_TPR_MASK; 18099c838954SCathy Avery break; 18109c838954SCathy Avery 18119c838954SCathy Avery case 3: 18129c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1813198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 18149c838954SCathy Avery vmcb->control.exit_code); 18159c838954SCathy Avery return true; 18169c838954SCathy Avery } 18179c838954SCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_VINTR); 18189c838954SCathy Avery break; 18199c838954SCathy Avery 18209c838954SCathy Avery case 4: 18219c838954SCathy Avery // INTERCEPT_VINTR should be ignored because V_INTR_PRIO < V_TPR 18229c838954SCathy Avery if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 1823198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall. Exit reason 0x%x", 18249c838954SCathy Avery vmcb->control.exit_code); 18259c838954SCathy Avery return true; 18269c838954SCathy Avery } 18279c838954SCathy Avery break; 18289c838954SCathy Avery 18299c838954SCathy Avery default: 18309c838954SCathy Avery return true; 18319c838954SCathy Avery } 18329c838954SCathy Avery 18339c838954SCathy Avery inc_test_stage(test); 18349c838954SCathy Avery 18359c838954SCathy Avery return get_test_stage(test) == 5; 18369c838954SCathy Avery } 18379c838954SCathy Avery 18389c838954SCathy Avery static bool virq_inject_check(struct svm_test *test) 18399c838954SCathy Avery { 18409c838954SCathy Avery return get_test_stage(test) == 5; 18419c838954SCathy Avery } 18429c838954SCathy Avery 1843da338a31SMaxim Levitsky /* 1844da338a31SMaxim Levitsky * Detect nested guest RIP corruption as explained in kernel commit 1845da338a31SMaxim Levitsky * b6162e82aef19fee9c32cb3fe9ac30d9116a8c73 1846da338a31SMaxim Levitsky * 1847da338a31SMaxim Levitsky * In the assembly loop below 'ins' is executed while IO instructions 1848da338a31SMaxim Levitsky * are not intercepted; the instruction is emulated by L0. 1849da338a31SMaxim Levitsky * 1850da338a31SMaxim Levitsky * At the same time we are getting interrupts from the local APIC timer, 1851da338a31SMaxim Levitsky * and we do intercept them in L1 1852da338a31SMaxim Levitsky * 1853da338a31SMaxim Levitsky * If the interrupt happens on the insb instruction, L0 will VMexit, emulate 1854da338a31SMaxim Levitsky * the insb instruction and then it will inject the interrupt to L1 through 1855da338a31SMaxim Levitsky * a nested VMexit. Due to a bug, it would leave pre-emulation values of RIP, 1856da338a31SMaxim Levitsky * RAX and RSP in the VMCB. 1857da338a31SMaxim Levitsky * 1858da338a31SMaxim Levitsky * In our intercept handler we detect the bug by checking that RIP is that of 1859da338a31SMaxim Levitsky * the insb instruction, but its memory operand has already been written. 1860da338a31SMaxim Levitsky * This means that insb was already executed. 1861da338a31SMaxim Levitsky */ 1862da338a31SMaxim Levitsky 1863da338a31SMaxim Levitsky static volatile int isr_cnt = 0; 1864da338a31SMaxim Levitsky static volatile uint8_t io_port_var = 0xAA; 1865da338a31SMaxim Levitsky extern const char insb_instruction_label[]; 1866da338a31SMaxim Levitsky 1867da338a31SMaxim Levitsky static void reg_corruption_isr(isr_regs_t *regs) 1868da338a31SMaxim Levitsky { 1869da338a31SMaxim Levitsky isr_cnt++; 1870da338a31SMaxim Levitsky apic_write(APIC_EOI, 0); 1871da338a31SMaxim Levitsky } 1872da338a31SMaxim Levitsky 1873da338a31SMaxim Levitsky static void reg_corruption_prepare(struct svm_test *test) 1874da338a31SMaxim Levitsky { 1875da338a31SMaxim Levitsky default_prepare(test); 1876da338a31SMaxim Levitsky set_test_stage(test, 0); 1877da338a31SMaxim Levitsky 1878da338a31SMaxim Levitsky vmcb->control.int_ctl = V_INTR_MASKING_MASK; 1879da338a31SMaxim Levitsky vmcb->control.intercept |= (1ULL << INTERCEPT_INTR); 1880da338a31SMaxim Levitsky 1881da338a31SMaxim Levitsky handle_irq(TIMER_VECTOR, reg_corruption_isr); 1882da338a31SMaxim Levitsky 1883da338a31SMaxim Levitsky /* set local APIC to inject external interrupts */ 1884da338a31SMaxim Levitsky apic_write(APIC_TMICT, 0); 1885da338a31SMaxim Levitsky apic_write(APIC_TDCR, 0); 1886da338a31SMaxim Levitsky apic_write(APIC_LVTT, TIMER_VECTOR | APIC_LVT_TIMER_PERIODIC); 1887da338a31SMaxim Levitsky apic_write(APIC_TMICT, 1000); 1888da338a31SMaxim Levitsky } 1889da338a31SMaxim Levitsky 1890da338a31SMaxim Levitsky static void reg_corruption_test(struct svm_test *test) 1891da338a31SMaxim Levitsky { 1892da338a31SMaxim Levitsky /* this is endless loop, which is interrupted by the timer interrupt */ 1893da338a31SMaxim Levitsky asm volatile ( 1894da338a31SMaxim Levitsky "1:\n\t" 1895da338a31SMaxim Levitsky "movw $0x4d0, %%dx\n\t" // IO port 1896da338a31SMaxim Levitsky "lea %[io_port_var], %%rdi\n\t" 1897da338a31SMaxim Levitsky "movb $0xAA, %[io_port_var]\n\t" 1898da338a31SMaxim Levitsky "insb_instruction_label:\n\t" 1899da338a31SMaxim Levitsky "insb\n\t" 1900da338a31SMaxim Levitsky "jmp 1b\n\t" 1901da338a31SMaxim Levitsky 1902da338a31SMaxim Levitsky : [io_port_var] "=m" (io_port_var) 1903da338a31SMaxim Levitsky : /* no inputs*/ 1904da338a31SMaxim Levitsky : "rdx", "rdi" 1905da338a31SMaxim Levitsky ); 1906da338a31SMaxim Levitsky } 1907da338a31SMaxim Levitsky 1908da338a31SMaxim Levitsky static bool reg_corruption_finished(struct svm_test *test) 1909da338a31SMaxim Levitsky { 1910da338a31SMaxim Levitsky if (isr_cnt == 10000) { 19115c3582f0SJanis Schoetterl-Glausch report_pass("No RIP corruption detected after %d timer interrupts", 1912da338a31SMaxim Levitsky isr_cnt); 1913da338a31SMaxim Levitsky set_test_stage(test, 1); 1914491bbc64SMaxim Levitsky goto cleanup; 1915da338a31SMaxim Levitsky } 1916da338a31SMaxim Levitsky 1917da338a31SMaxim Levitsky if (vmcb->control.exit_code == SVM_EXIT_INTR) { 1918da338a31SMaxim Levitsky 1919da338a31SMaxim Levitsky void* guest_rip = (void*)vmcb->save.rip; 1920da338a31SMaxim Levitsky 1921da338a31SMaxim Levitsky irq_enable(); 1922da338a31SMaxim Levitsky asm volatile ("nop"); 1923da338a31SMaxim Levitsky irq_disable(); 1924da338a31SMaxim Levitsky 1925da338a31SMaxim Levitsky if (guest_rip == insb_instruction_label && io_port_var != 0xAA) { 1926198dfd0eSJanis Schoetterl-Glausch report_fail("RIP corruption detected after %d timer interrupts", 1927da338a31SMaxim Levitsky isr_cnt); 1928491bbc64SMaxim Levitsky goto cleanup; 1929da338a31SMaxim Levitsky } 1930da338a31SMaxim Levitsky 1931da338a31SMaxim Levitsky } 1932da338a31SMaxim Levitsky return false; 1933491bbc64SMaxim Levitsky cleanup: 1934491bbc64SMaxim Levitsky apic_write(APIC_LVTT, APIC_LVT_TIMER_MASK); 1935491bbc64SMaxim Levitsky apic_write(APIC_TMICT, 0); 1936491bbc64SMaxim Levitsky return true; 1937491bbc64SMaxim Levitsky 1938da338a31SMaxim Levitsky } 1939da338a31SMaxim Levitsky 1940da338a31SMaxim Levitsky static bool reg_corruption_check(struct svm_test *test) 1941da338a31SMaxim Levitsky { 1942da338a31SMaxim Levitsky return get_test_stage(test) == 1; 1943da338a31SMaxim Levitsky } 1944da338a31SMaxim Levitsky 19454770e9c8SCathy Avery static void get_tss_entry(void *data) 19464770e9c8SCathy Avery { 1947a7f32d87SPaolo Bonzini *((gdt_entry_t **)data) = get_tss_descr(); 19484770e9c8SCathy Avery } 19494770e9c8SCathy Avery 19504770e9c8SCathy Avery static int orig_cpu_count; 19514770e9c8SCathy Avery 19524770e9c8SCathy Avery static void init_startup_prepare(struct svm_test *test) 19534770e9c8SCathy Avery { 1954a7f32d87SPaolo Bonzini gdt_entry_t *tss_entry; 19554770e9c8SCathy Avery int i; 19564770e9c8SCathy Avery 19574770e9c8SCathy Avery on_cpu(1, get_tss_entry, &tss_entry); 19584770e9c8SCathy Avery 19594770e9c8SCathy Avery orig_cpu_count = cpu_online_count; 19604770e9c8SCathy Avery 19614770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 19624770e9c8SCathy Avery id_map[1]); 19634770e9c8SCathy Avery 19644770e9c8SCathy Avery delay(100000000ULL); 19654770e9c8SCathy Avery 19664770e9c8SCathy Avery --cpu_online_count; 19674770e9c8SCathy Avery 1968a7f32d87SPaolo Bonzini tss_entry->type &= ~DESC_BUSY; 19694770e9c8SCathy Avery 19704770e9c8SCathy Avery apic_icr_write(APIC_DEST_PHYSICAL | APIC_DM_STARTUP, id_map[1]); 19714770e9c8SCathy Avery 19724770e9c8SCathy Avery for (i = 0; i < 5 && cpu_online_count < orig_cpu_count; i++) 19734770e9c8SCathy Avery delay(100000000ULL); 19744770e9c8SCathy Avery } 19754770e9c8SCathy Avery 19764770e9c8SCathy Avery static bool init_startup_finished(struct svm_test *test) 19774770e9c8SCathy Avery { 19784770e9c8SCathy Avery return true; 19794770e9c8SCathy Avery } 19804770e9c8SCathy Avery 19814770e9c8SCathy Avery static bool init_startup_check(struct svm_test *test) 19824770e9c8SCathy Avery { 19834770e9c8SCathy Avery return cpu_online_count == orig_cpu_count; 19844770e9c8SCathy Avery } 19854770e9c8SCathy Avery 1986d5da6dfeSCathy Avery static volatile bool init_intercept; 1987d5da6dfeSCathy Avery 1988d5da6dfeSCathy Avery static void init_intercept_prepare(struct svm_test *test) 1989d5da6dfeSCathy Avery { 1990d5da6dfeSCathy Avery init_intercept = false; 1991d5da6dfeSCathy Avery vmcb->control.intercept |= (1ULL << INTERCEPT_INIT); 1992d5da6dfeSCathy Avery } 1993d5da6dfeSCathy Avery 1994d5da6dfeSCathy Avery static void init_intercept_test(struct svm_test *test) 1995d5da6dfeSCathy Avery { 1996d5da6dfeSCathy Avery apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0); 1997d5da6dfeSCathy Avery } 1998d5da6dfeSCathy Avery 1999d5da6dfeSCathy Avery static bool init_intercept_finished(struct svm_test *test) 2000d5da6dfeSCathy Avery { 2001d5da6dfeSCathy Avery vmcb->save.rip += 3; 2002d5da6dfeSCathy Avery 2003d5da6dfeSCathy Avery if (vmcb->control.exit_code != SVM_EXIT_INIT) { 2004198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to init intercept. Exit reason 0x%x", 2005d5da6dfeSCathy Avery vmcb->control.exit_code); 2006d5da6dfeSCathy Avery 2007d5da6dfeSCathy Avery return true; 2008d5da6dfeSCathy Avery } 2009d5da6dfeSCathy Avery 2010d5da6dfeSCathy Avery init_intercept = true; 2011d5da6dfeSCathy Avery 20125c3582f0SJanis Schoetterl-Glausch report_pass("INIT to vcpu intercepted"); 2013d5da6dfeSCathy Avery 2014d5da6dfeSCathy Avery return true; 2015d5da6dfeSCathy Avery } 2016d5da6dfeSCathy Avery 2017d5da6dfeSCathy Avery static bool init_intercept_check(struct svm_test *test) 2018d5da6dfeSCathy Avery { 2019d5da6dfeSCathy Avery return init_intercept; 2020d5da6dfeSCathy Avery } 2021d5da6dfeSCathy Avery 20227839b0ecSKrish Sadhukhan /* 20237839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF causes a #DB trap after the VMRUN completes on the 20247839b0ecSKrish Sadhukhan * host side (i.e., after the #VMEXIT from the guest). 20257839b0ecSKrish Sadhukhan * 20260689a980SKrish Sadhukhan * Setting host EFLAGS.RF suppresses any potential instruction breakpoint 20270689a980SKrish Sadhukhan * match on the VMRUN and completion of the VMRUN instruction clears the 20280689a980SKrish Sadhukhan * host EFLAGS.RF bit. 20290689a980SKrish Sadhukhan * 20307839b0ecSKrish Sadhukhan * [AMD APM] 20317839b0ecSKrish Sadhukhan */ 20327839b0ecSKrish Sadhukhan static volatile u8 host_rflags_guest_main_flag = 0; 20337839b0ecSKrish Sadhukhan static volatile u8 host_rflags_db_handler_flag = 0; 20347839b0ecSKrish Sadhukhan static volatile bool host_rflags_ss_on_vmrun = false; 20357839b0ecSKrish Sadhukhan static volatile bool host_rflags_vmrun_reached = false; 20367839b0ecSKrish Sadhukhan static volatile bool host_rflags_set_tf = false; 20370689a980SKrish Sadhukhan static volatile bool host_rflags_set_rf = false; 20380689a980SKrish Sadhukhan static u64 rip_detected; 20397839b0ecSKrish Sadhukhan 20407839b0ecSKrish Sadhukhan extern u64 *vmrun_rip; 20417839b0ecSKrish Sadhukhan 20427839b0ecSKrish Sadhukhan static void host_rflags_db_handler(struct ex_regs *r) 20437839b0ecSKrish Sadhukhan { 20447839b0ecSKrish Sadhukhan if (host_rflags_ss_on_vmrun) { 20457839b0ecSKrish Sadhukhan if (host_rflags_vmrun_reached) { 20460689a980SKrish Sadhukhan if (!host_rflags_set_rf) { 20477839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 20480689a980SKrish Sadhukhan rip_detected = r->rip; 20497839b0ecSKrish Sadhukhan } else { 20500689a980SKrish Sadhukhan r->rflags |= X86_EFLAGS_RF; 20510689a980SKrish Sadhukhan ++host_rflags_db_handler_flag; 20520689a980SKrish Sadhukhan } 20530689a980SKrish Sadhukhan } else { 20540689a980SKrish Sadhukhan if (r->rip == (u64)&vmrun_rip) { 20557839b0ecSKrish Sadhukhan host_rflags_vmrun_reached = true; 20560689a980SKrish Sadhukhan 20570689a980SKrish Sadhukhan if (host_rflags_set_rf) { 20580689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 20590689a980SKrish Sadhukhan rip_detected = r->rip; 20600689a980SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 20610689a980SKrish Sadhukhan 20620689a980SKrish Sadhukhan /* Trigger #DB via debug registers */ 20630689a980SKrish Sadhukhan write_dr0((void *)&vmrun_rip); 20640689a980SKrish Sadhukhan write_dr7(0x403); 20650689a980SKrish Sadhukhan } 20660689a980SKrish Sadhukhan } 20677839b0ecSKrish Sadhukhan } 20687839b0ecSKrish Sadhukhan } else { 20697839b0ecSKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 20707839b0ecSKrish Sadhukhan } 20717839b0ecSKrish Sadhukhan } 20727839b0ecSKrish Sadhukhan 20737839b0ecSKrish Sadhukhan static void host_rflags_prepare(struct svm_test *test) 20747839b0ecSKrish Sadhukhan { 20757839b0ecSKrish Sadhukhan default_prepare(test); 20767839b0ecSKrish Sadhukhan handle_exception(DB_VECTOR, host_rflags_db_handler); 20777839b0ecSKrish Sadhukhan set_test_stage(test, 0); 20787839b0ecSKrish Sadhukhan } 20797839b0ecSKrish Sadhukhan 20807839b0ecSKrish Sadhukhan static void host_rflags_prepare_gif_clear(struct svm_test *test) 20817839b0ecSKrish Sadhukhan { 20827839b0ecSKrish Sadhukhan if (host_rflags_set_tf) 20837839b0ecSKrish Sadhukhan write_rflags(read_rflags() | X86_EFLAGS_TF); 20847839b0ecSKrish Sadhukhan } 20857839b0ecSKrish Sadhukhan 20867839b0ecSKrish Sadhukhan static void host_rflags_test(struct svm_test *test) 20877839b0ecSKrish Sadhukhan { 20887839b0ecSKrish Sadhukhan while (1) { 20890689a980SKrish Sadhukhan if (get_test_stage(test) > 0) { 20900689a980SKrish Sadhukhan if ((host_rflags_set_tf && !host_rflags_ss_on_vmrun && !host_rflags_db_handler_flag) || 20910689a980SKrish Sadhukhan (host_rflags_set_rf && host_rflags_db_handler_flag == 1)) 20927839b0ecSKrish Sadhukhan host_rflags_guest_main_flag = 1; 20930689a980SKrish Sadhukhan } 20940689a980SKrish Sadhukhan 20950689a980SKrish Sadhukhan if (get_test_stage(test) == 4) 20967839b0ecSKrish Sadhukhan break; 20977839b0ecSKrish Sadhukhan vmmcall(); 20987839b0ecSKrish Sadhukhan } 20997839b0ecSKrish Sadhukhan } 21007839b0ecSKrish Sadhukhan 21017839b0ecSKrish Sadhukhan static bool host_rflags_finished(struct svm_test *test) 21027839b0ecSKrish Sadhukhan { 21037839b0ecSKrish Sadhukhan switch (get_test_stage(test)) { 21047839b0ecSKrish Sadhukhan case 0: 21057839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2106198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT. Exit reason 0x%x", 21077839b0ecSKrish Sadhukhan vmcb->control.exit_code); 21087839b0ecSKrish Sadhukhan return true; 21097839b0ecSKrish Sadhukhan } 21107839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 21117839b0ecSKrish Sadhukhan /* 21127839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF not immediately before VMRUN, causes 21137839b0ecSKrish Sadhukhan * #DB trap before first guest instruction is executed 21147839b0ecSKrish Sadhukhan */ 21157839b0ecSKrish Sadhukhan host_rflags_set_tf = true; 21167839b0ecSKrish Sadhukhan break; 21177839b0ecSKrish Sadhukhan case 1: 21187839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 21190689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1) { 2120198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or #DB handler" 21217839b0ecSKrish Sadhukhan " invoked before guest main. Exit reason 0x%x", 21227839b0ecSKrish Sadhukhan vmcb->control.exit_code); 21237839b0ecSKrish Sadhukhan return true; 21247839b0ecSKrish Sadhukhan } 21257839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 21267839b0ecSKrish Sadhukhan /* 21277839b0ecSKrish Sadhukhan * Setting host EFLAGS.TF immediately before VMRUN, causes #DB 21287839b0ecSKrish Sadhukhan * trap after VMRUN completes on the host side (i.e., after 21297839b0ecSKrish Sadhukhan * VMEXIT from guest). 21307839b0ecSKrish Sadhukhan */ 21317839b0ecSKrish Sadhukhan host_rflags_ss_on_vmrun = true; 21327839b0ecSKrish Sadhukhan break; 21337839b0ecSKrish Sadhukhan case 2: 21347839b0ecSKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 21350c22fd44SPaolo Bonzini rip_detected != (u64)&vmrun_rip + 3) { 2136198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch." 21370689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 21380689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 21390c22fd44SPaolo Bonzini (u64)&vmrun_rip + 3, rip_detected); 21400689a980SKrish Sadhukhan return true; 21410689a980SKrish Sadhukhan } 21420689a980SKrish Sadhukhan host_rflags_set_rf = true; 21430689a980SKrish Sadhukhan host_rflags_guest_main_flag = 0; 21440689a980SKrish Sadhukhan host_rflags_vmrun_reached = false; 21450689a980SKrish Sadhukhan vmcb->save.rip += 3; 21460689a980SKrish Sadhukhan break; 21470689a980SKrish Sadhukhan case 3: 21480689a980SKrish Sadhukhan if (vmcb->control.exit_code != SVM_EXIT_VMMCALL || 21490689a980SKrish Sadhukhan rip_detected != (u64)&vmrun_rip || 21500689a980SKrish Sadhukhan host_rflags_guest_main_flag != 1 || 21510689a980SKrish Sadhukhan host_rflags_db_handler_flag > 1 || 21520689a980SKrish Sadhukhan read_rflags() & X86_EFLAGS_RF) { 2153198dfd0eSJanis Schoetterl-Glausch report_fail("Unexpected VMEXIT or RIP mismatch or " 21540689a980SKrish Sadhukhan "EFLAGS.RF not cleared." 21550689a980SKrish Sadhukhan " Exit reason 0x%x, RIP actual: %lx, RIP expected: " 21560689a980SKrish Sadhukhan "%lx", vmcb->control.exit_code, 21570689a980SKrish Sadhukhan (u64)&vmrun_rip, rip_detected); 21587839b0ecSKrish Sadhukhan return true; 21597839b0ecSKrish Sadhukhan } 21607839b0ecSKrish Sadhukhan host_rflags_set_tf = false; 21610689a980SKrish Sadhukhan host_rflags_set_rf = false; 21627839b0ecSKrish Sadhukhan vmcb->save.rip += 3; 21637839b0ecSKrish Sadhukhan break; 21647839b0ecSKrish Sadhukhan default: 21657839b0ecSKrish Sadhukhan return true; 21667839b0ecSKrish Sadhukhan } 21677839b0ecSKrish Sadhukhan inc_test_stage(test); 21680689a980SKrish Sadhukhan return get_test_stage(test) == 5; 21697839b0ecSKrish Sadhukhan } 21707839b0ecSKrish Sadhukhan 21717839b0ecSKrish Sadhukhan static bool host_rflags_check(struct svm_test *test) 21727839b0ecSKrish Sadhukhan { 21730689a980SKrish Sadhukhan return get_test_stage(test) == 4; 21747839b0ecSKrish Sadhukhan } 21757839b0ecSKrish Sadhukhan 21768660d1b5SKrish Sadhukhan #define TEST(name) { #name, .v2 = name } 21778660d1b5SKrish Sadhukhan 2178ba29942cSKrish Sadhukhan /* 2179ba29942cSKrish Sadhukhan * v2 tests 2180ba29942cSKrish Sadhukhan */ 2181ba29942cSKrish Sadhukhan 2182f32183f5SJim Mattson /* 2183f32183f5SJim Mattson * Ensure that kvm recalculates the L1 guest's CPUID.01H:ECX.OSXSAVE 2184f32183f5SJim Mattson * after VM-exit from an L2 guest that sets CR4.OSXSAVE to a different 2185f32183f5SJim Mattson * value than in L1. 2186f32183f5SJim Mattson */ 2187f32183f5SJim Mattson 2188f32183f5SJim Mattson static void svm_cr4_osxsave_test_guest(struct svm_test *test) 2189f32183f5SJim Mattson { 2190f32183f5SJim Mattson write_cr4(read_cr4() & ~X86_CR4_OSXSAVE); 2191f32183f5SJim Mattson } 2192f32183f5SJim Mattson 2193f32183f5SJim Mattson static void svm_cr4_osxsave_test(void) 2194f32183f5SJim Mattson { 2195f32183f5SJim Mattson if (!this_cpu_has(X86_FEATURE_XSAVE)) { 2196f32183f5SJim Mattson report_skip("XSAVE not detected"); 2197f32183f5SJim Mattson return; 2198f32183f5SJim Mattson } 2199f32183f5SJim Mattson 2200f32183f5SJim Mattson if (!(read_cr4() & X86_CR4_OSXSAVE)) { 2201f32183f5SJim Mattson unsigned long cr4 = read_cr4() | X86_CR4_OSXSAVE; 2202f32183f5SJim Mattson 2203f32183f5SJim Mattson write_cr4(cr4); 2204f32183f5SJim Mattson vmcb->save.cr4 = cr4; 2205f32183f5SJim Mattson } 2206f32183f5SJim Mattson 2207f32183f5SJim Mattson report(cpuid_osxsave(), "CPUID.01H:ECX.XSAVE set before VMRUN"); 2208f32183f5SJim Mattson 2209f32183f5SJim Mattson test_set_guest(svm_cr4_osxsave_test_guest); 2210f32183f5SJim Mattson report(svm_vmrun() == SVM_EXIT_VMMCALL, 2211f32183f5SJim Mattson "svm_cr4_osxsave_test_guest finished with VMMCALL"); 2212f32183f5SJim Mattson 2213f32183f5SJim Mattson report(cpuid_osxsave(), "CPUID.01H:ECX.XSAVE set after VMRUN"); 2214f32183f5SJim Mattson } 2215f32183f5SJim Mattson 2216ba29942cSKrish Sadhukhan static void basic_guest_main(struct svm_test *test) 2217ba29942cSKrish Sadhukhan { 2218ba29942cSKrish Sadhukhan } 2219ba29942cSKrish Sadhukhan 2220eae10e8fSKrish Sadhukhan 2221eae10e8fSKrish Sadhukhan #define SVM_TEST_REG_RESERVED_BITS(start, end, inc, str_name, reg, val, \ 2222eae10e8fSKrish Sadhukhan resv_mask) \ 2223eae10e8fSKrish Sadhukhan { \ 2224eae10e8fSKrish Sadhukhan u64 tmp, mask; \ 2225eae10e8fSKrish Sadhukhan int i; \ 2226eae10e8fSKrish Sadhukhan \ 2227eae10e8fSKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2228eae10e8fSKrish Sadhukhan mask = 1ull << i; \ 2229eae10e8fSKrish Sadhukhan if (!(mask & resv_mask)) \ 2230eae10e8fSKrish Sadhukhan continue; \ 2231eae10e8fSKrish Sadhukhan tmp = val | mask; \ 2232eae10e8fSKrish Sadhukhan reg = tmp; \ 2233eae10e8fSKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "Test %s %d:%d: %lx",\ 2234eae10e8fSKrish Sadhukhan str_name, end, start, tmp); \ 2235eae10e8fSKrish Sadhukhan } \ 2236eae10e8fSKrish Sadhukhan } 2237eae10e8fSKrish Sadhukhan 22386d0ecbf6SKrish Sadhukhan #define SVM_TEST_CR_RESERVED_BITS(start, end, inc, cr, val, resv_mask, \ 2239cb6524f3SPaolo Bonzini exit_code, test_name) \ 2240a79c9495SKrish Sadhukhan { \ 2241a79c9495SKrish Sadhukhan u64 tmp, mask; \ 22428ae6d77fSSean Christopherson u32 r; \ 2243a79c9495SKrish Sadhukhan int i; \ 2244a79c9495SKrish Sadhukhan \ 2245a79c9495SKrish Sadhukhan for (i = start; i <= end; i = i + inc) { \ 2246a79c9495SKrish Sadhukhan mask = 1ull << i; \ 2247a79c9495SKrish Sadhukhan if (!(mask & resv_mask)) \ 2248a79c9495SKrish Sadhukhan continue; \ 2249a79c9495SKrish Sadhukhan tmp = val | mask; \ 2250a79c9495SKrish Sadhukhan switch (cr) { \ 2251a79c9495SKrish Sadhukhan case 0: \ 2252a79c9495SKrish Sadhukhan vmcb->save.cr0 = tmp; \ 2253a79c9495SKrish Sadhukhan break; \ 2254a79c9495SKrish Sadhukhan case 3: \ 2255a79c9495SKrish Sadhukhan vmcb->save.cr3 = tmp; \ 2256a79c9495SKrish Sadhukhan break; \ 2257a79c9495SKrish Sadhukhan case 4: \ 2258a79c9495SKrish Sadhukhan vmcb->save.cr4 = tmp; \ 2259a79c9495SKrish Sadhukhan } \ 22608ae6d77fSSean Christopherson r = svm_vmrun(); \ 22618ae6d77fSSean Christopherson report(r == exit_code, "Test CR%d %s%d:%d: %lx, wanted exit 0x%x, got 0x%x",\ 22628ae6d77fSSean Christopherson cr, test_name, end, start, tmp, exit_code, r); \ 2263a79c9495SKrish Sadhukhan } \ 2264a79c9495SKrish Sadhukhan } 2265e8d7a8f6SKrish Sadhukhan 2266a79c9495SKrish Sadhukhan static void test_efer(void) 2267a79c9495SKrish Sadhukhan { 2268e8d7a8f6SKrish Sadhukhan /* 2269e8d7a8f6SKrish Sadhukhan * Un-setting EFER.SVME is illegal 2270e8d7a8f6SKrish Sadhukhan */ 2271ba29942cSKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2272ba29942cSKrish Sadhukhan u64 efer = efer_saved; 2273ba29942cSKrish Sadhukhan 2274ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "EFER.SVME: %lx", efer); 2275ba29942cSKrish Sadhukhan efer &= ~EFER_SVME; 2276ba29942cSKrish Sadhukhan vmcb->save.efer = efer; 2277ba29942cSKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "EFER.SVME: %lx", efer); 2278ba29942cSKrish Sadhukhan vmcb->save.efer = efer_saved; 2279e8d7a8f6SKrish Sadhukhan 2280e8d7a8f6SKrish Sadhukhan /* 2281a79c9495SKrish Sadhukhan * EFER MBZ bits: 63:16, 9 2282a79c9495SKrish Sadhukhan */ 2283a79c9495SKrish Sadhukhan efer_saved = vmcb->save.efer; 2284a79c9495SKrish Sadhukhan 2285a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(8, 9, 1, "EFER", vmcb->save.efer, 2286a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2287a79c9495SKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(16, 63, 4, "EFER", vmcb->save.efer, 2288a79c9495SKrish Sadhukhan efer_saved, SVM_EFER_RESERVED_MASK); 2289a79c9495SKrish Sadhukhan 22901d7bde08SKrish Sadhukhan /* 22911d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR4.PAE is zero. 22921d7bde08SKrish Sadhukhan */ 22931d7bde08SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 22941d7bde08SKrish Sadhukhan u64 cr0; 22951d7bde08SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 22961d7bde08SKrish Sadhukhan u64 cr4; 22971d7bde08SKrish Sadhukhan 22981d7bde08SKrish Sadhukhan efer = efer_saved | EFER_LME; 22991d7bde08SKrish Sadhukhan vmcb->save.efer = efer; 23001d7bde08SKrish Sadhukhan cr0 = cr0_saved | X86_CR0_PG | X86_CR0_PE; 23011d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 23021d7bde08SKrish Sadhukhan cr4 = cr4_saved & ~X86_CR4_PAE; 23031d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4; 23041d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 23051d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx) and CR4.PAE=0 (%lx)", efer, cr0, cr4); 23061d7bde08SKrish Sadhukhan 23071d7bde08SKrish Sadhukhan /* 23081d7bde08SKrish Sadhukhan * EFER.LME and CR0.PG are both set and CR0.PE is zero. 2309fc050452SLara Lazier * CR4.PAE needs to be set as we otherwise cannot 2310fc050452SLara Lazier * determine if CR4.PAE=0 or CR0.PE=0 triggered the 2311fc050452SLara Lazier * SVM_EXIT_ERR. 23121d7bde08SKrish Sadhukhan */ 2313fc050452SLara Lazier cr4 = cr4_saved | X86_CR4_PAE; 2314fc050452SLara Lazier vmcb->save.cr4 = cr4; 23151d7bde08SKrish Sadhukhan cr0 &= ~X86_CR0_PE; 23161d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 23171d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 23181d7bde08SKrish Sadhukhan "CR0.PG=1 and CR0.PE=0 (%lx)", efer, cr0); 23191d7bde08SKrish Sadhukhan 23201d7bde08SKrish Sadhukhan /* 23211d7bde08SKrish Sadhukhan * EFER.LME, CR0.PG, CR4.PAE, CS.L, and CS.D are all non-zero. 23221d7bde08SKrish Sadhukhan */ 23231d7bde08SKrish Sadhukhan u32 cs_attrib_saved = vmcb->save.cs.attrib; 23241d7bde08SKrish Sadhukhan u32 cs_attrib; 23251d7bde08SKrish Sadhukhan 23261d7bde08SKrish Sadhukhan cr0 |= X86_CR0_PE; 23271d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0; 23281d7bde08SKrish Sadhukhan cs_attrib = cs_attrib_saved | SVM_SELECTOR_L_MASK | 23291d7bde08SKrish Sadhukhan SVM_SELECTOR_DB_MASK; 23301d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib; 23311d7bde08SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_ERR, "EFER.LME=1 (%lx), " 23321d7bde08SKrish Sadhukhan "CR0.PG=1 (%lx), CR4.PAE=1 (%lx), CS.L=1 and CS.D=1 (%x)", 23331d7bde08SKrish Sadhukhan efer, cr0, cr4, cs_attrib); 23341d7bde08SKrish Sadhukhan 23351d7bde08SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 23361d7bde08SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2337a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 23381d7bde08SKrish Sadhukhan vmcb->save.cs.attrib = cs_attrib_saved; 2339a79c9495SKrish Sadhukhan } 2340a79c9495SKrish Sadhukhan 2341a79c9495SKrish Sadhukhan static void test_cr0(void) 2342a79c9495SKrish Sadhukhan { 2343a79c9495SKrish Sadhukhan /* 2344e8d7a8f6SKrish Sadhukhan * Un-setting CR0.CD and setting CR0.NW is illegal combination 2345e8d7a8f6SKrish Sadhukhan */ 2346e8d7a8f6SKrish Sadhukhan u64 cr0_saved = vmcb->save.cr0; 2347e8d7a8f6SKrish Sadhukhan u64 cr0 = cr0_saved; 2348e8d7a8f6SKrish Sadhukhan 2349e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_CD; 2350e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2351e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2352a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=0: %lx", 2353a79c9495SKrish Sadhukhan cr0); 2354e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2355e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2356a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=1,NW=1: %lx", 2357a79c9495SKrish Sadhukhan cr0); 2358e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_NW; 2359e8d7a8f6SKrish Sadhukhan cr0 &= ~X86_CR0_CD; 2360e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2361a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR0 CD=0,NW=0: %lx", 2362a79c9495SKrish Sadhukhan cr0); 2363e8d7a8f6SKrish Sadhukhan cr0 |= X86_CR0_NW; 2364e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0; 2365a79c9495SKrish Sadhukhan report (svm_vmrun() == SVM_EXIT_ERR, "Test CR0 CD=0,NW=1: %lx", 2366a79c9495SKrish Sadhukhan cr0); 2367e8d7a8f6SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 23685c052c90SKrish Sadhukhan 23695c052c90SKrish Sadhukhan /* 23705c052c90SKrish Sadhukhan * CR0[63:32] are not zero 23715c052c90SKrish Sadhukhan */ 23725c052c90SKrish Sadhukhan cr0 = cr0_saved; 2373eae10e8fSKrish Sadhukhan 2374eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "CR0", vmcb->save.cr0, cr0_saved, 2375eae10e8fSKrish Sadhukhan SVM_CR0_RESERVED_MASK); 23765c052c90SKrish Sadhukhan vmcb->save.cr0 = cr0_saved; 2377a79c9495SKrish Sadhukhan } 2378eae10e8fSKrish Sadhukhan 2379a79c9495SKrish Sadhukhan static void test_cr3(void) 2380a79c9495SKrish Sadhukhan { 2381a79c9495SKrish Sadhukhan /* 2382a79c9495SKrish Sadhukhan * CR3 MBZ bits based on different modes: 238329a01803SNadav Amit * [63:52] - long mode 2384a79c9495SKrish Sadhukhan */ 2385a79c9495SKrish Sadhukhan u64 cr3_saved = vmcb->save.cr3; 2386a79c9495SKrish Sadhukhan 2387a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 63, 1, 3, cr3_saved, 2388cb6524f3SPaolo Bonzini SVM_CR3_LONG_MBZ_MASK, SVM_EXIT_ERR, ""); 23896d0ecbf6SKrish Sadhukhan 23906d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_MBZ_MASK; 23916d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 23926d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 23936d0ecbf6SKrish Sadhukhan 23946d0ecbf6SKrish Sadhukhan /* 23956d0ecbf6SKrish Sadhukhan * CR3 non-MBZ reserved bits based on different modes: 2396cb6524f3SPaolo Bonzini * [11:5] [2:0] - long mode (PCIDE=0) 23976d0ecbf6SKrish Sadhukhan * [2:0] - PAE legacy mode 23986d0ecbf6SKrish Sadhukhan */ 23996d0ecbf6SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 24006d0ecbf6SKrish Sadhukhan u64 *pdpe = npt_get_pml4e(); 24016d0ecbf6SKrish Sadhukhan 24026d0ecbf6SKrish Sadhukhan /* 24036d0ecbf6SKrish Sadhukhan * Long mode 24046d0ecbf6SKrish Sadhukhan */ 24056d0ecbf6SKrish Sadhukhan if (this_cpu_has(X86_FEATURE_PCID)) { 24066d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PCIDE; 24076d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2408cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_VMMCALL, "(PCIDE=1) "); 24096d0ecbf6SKrish Sadhukhan 24106d0ecbf6SKrish Sadhukhan vmcb->save.cr3 = cr3_saved & ~SVM_CR3_LONG_RESERVED_MASK; 24116d0ecbf6SKrish Sadhukhan report(svm_vmrun() == SVM_EXIT_VMMCALL, "Test CR3 63:0: %lx", 24126d0ecbf6SKrish Sadhukhan vmcb->save.cr3); 2413cb6524f3SPaolo Bonzini } 24146d0ecbf6SKrish Sadhukhan 24156d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved & ~X86_CR4_PCIDE; 24166d0ecbf6SKrish Sadhukhan 2417993749ffSSean Christopherson if (!npt_supported()) 2418993749ffSSean Christopherson goto skip_npt_only; 2419993749ffSSean Christopherson 24206d0ecbf6SKrish Sadhukhan /* Clear P (Present) bit in NPT in order to trigger #NPF */ 24216d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 24226d0ecbf6SKrish Sadhukhan 24236d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 11, 1, 3, cr3_saved, 2424cb6524f3SPaolo Bonzini SVM_CR3_LONG_RESERVED_MASK, SVM_EXIT_NPF, "(PCIDE=0) "); 24256d0ecbf6SKrish Sadhukhan 24266d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2427cb6524f3SPaolo Bonzini vmcb->save.cr3 = cr3_saved; 24286d0ecbf6SKrish Sadhukhan 24296d0ecbf6SKrish Sadhukhan /* 24306d0ecbf6SKrish Sadhukhan * PAE legacy 24316d0ecbf6SKrish Sadhukhan */ 24326d0ecbf6SKrish Sadhukhan pdpe[0] &= ~1ULL; 24336d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved | X86_CR4_PAE; 24346d0ecbf6SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(0, 2, 1, 3, cr3_saved, 2435cb6524f3SPaolo Bonzini SVM_CR3_PAE_LEGACY_RESERVED_MASK, SVM_EXIT_NPF, "(PAE) "); 24366d0ecbf6SKrish Sadhukhan 24376d0ecbf6SKrish Sadhukhan pdpe[0] |= 1ULL; 2438993749ffSSean Christopherson 2439993749ffSSean Christopherson skip_npt_only: 2440a79c9495SKrish Sadhukhan vmcb->save.cr3 = cr3_saved; 24416d0ecbf6SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2442a79c9495SKrish Sadhukhan } 2443a79c9495SKrish Sadhukhan 2444d30973c3SWei Huang /* Test CR4 MBZ bits based on legacy or long modes */ 2445a79c9495SKrish Sadhukhan static void test_cr4(void) 2446a79c9495SKrish Sadhukhan { 2447a79c9495SKrish Sadhukhan u64 cr4_saved = vmcb->save.cr4; 2448a79c9495SKrish Sadhukhan u64 efer_saved = vmcb->save.efer; 2449a79c9495SKrish Sadhukhan u64 efer = efer_saved; 2450a79c9495SKrish Sadhukhan 2451a79c9495SKrish Sadhukhan efer &= ~EFER_LME; 2452a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2453a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2454cb6524f3SPaolo Bonzini SVM_CR4_LEGACY_RESERVED_MASK, SVM_EXIT_ERR, ""); 2455a79c9495SKrish Sadhukhan 2456a79c9495SKrish Sadhukhan efer |= EFER_LME; 2457a79c9495SKrish Sadhukhan vmcb->save.efer = efer; 2458a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(12, 31, 1, 4, cr4_saved, 2459cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2460a79c9495SKrish Sadhukhan SVM_TEST_CR_RESERVED_BITS(32, 63, 4, 4, cr4_saved, 2461cb6524f3SPaolo Bonzini SVM_CR4_RESERVED_MASK, SVM_EXIT_ERR, ""); 2462a79c9495SKrish Sadhukhan 2463a79c9495SKrish Sadhukhan vmcb->save.cr4 = cr4_saved; 2464a79c9495SKrish Sadhukhan vmcb->save.efer = efer_saved; 2465a79c9495SKrish Sadhukhan } 2466a79c9495SKrish Sadhukhan 2467a79c9495SKrish Sadhukhan static void test_dr(void) 2468a79c9495SKrish Sadhukhan { 2469eae10e8fSKrish Sadhukhan /* 2470eae10e8fSKrish Sadhukhan * DR6[63:32] and DR7[63:32] are MBZ 2471eae10e8fSKrish Sadhukhan */ 2472eae10e8fSKrish Sadhukhan u64 dr_saved = vmcb->save.dr6; 2473eae10e8fSKrish Sadhukhan 2474eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR6", vmcb->save.dr6, dr_saved, 2475eae10e8fSKrish Sadhukhan SVM_DR6_RESERVED_MASK); 2476eae10e8fSKrish Sadhukhan vmcb->save.dr6 = dr_saved; 2477eae10e8fSKrish Sadhukhan 2478eae10e8fSKrish Sadhukhan dr_saved = vmcb->save.dr7; 2479eae10e8fSKrish Sadhukhan SVM_TEST_REG_RESERVED_BITS(32, 63, 4, "DR7", vmcb->save.dr7, dr_saved, 2480eae10e8fSKrish Sadhukhan SVM_DR7_RESERVED_MASK); 2481eae10e8fSKrish Sadhukhan 2482eae10e8fSKrish Sadhukhan vmcb->save.dr7 = dr_saved; 2483a79c9495SKrish Sadhukhan } 2484eae10e8fSKrish Sadhukhan 2485abe82380SKrish Sadhukhan /* TODO: verify if high 32-bits are sign- or zero-extended on bare metal */ 2486abe82380SKrish Sadhukhan #define TEST_BITMAP_ADDR(save_intercept, type, addr, exit_code, \ 2487abe82380SKrish Sadhukhan msg) { \ 2488abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept | 1ULL << type; \ 2489abe82380SKrish Sadhukhan if (type == INTERCEPT_MSR_PROT) \ 2490abe82380SKrish Sadhukhan vmcb->control.msrpm_base_pa = addr; \ 2491abe82380SKrish Sadhukhan else \ 2492abe82380SKrish Sadhukhan vmcb->control.iopm_base_pa = addr; \ 2493abe82380SKrish Sadhukhan report(svm_vmrun() == exit_code, \ 2494abe82380SKrish Sadhukhan "Test %s address: %lx", msg, addr); \ 2495abe82380SKrish Sadhukhan } 2496abe82380SKrish Sadhukhan 2497abe82380SKrish Sadhukhan /* 2498abe82380SKrish Sadhukhan * If the MSR or IOIO intercept table extends to a physical address that 2499abe82380SKrish Sadhukhan * is greater than or equal to the maximum supported physical address, the 2500abe82380SKrish Sadhukhan * guest state is illegal. 2501abe82380SKrish Sadhukhan * 2502abe82380SKrish Sadhukhan * The VMRUN instruction ignores the lower 12 bits of the address specified 2503abe82380SKrish Sadhukhan * in the VMCB. 2504abe82380SKrish Sadhukhan * 2505abe82380SKrish Sadhukhan * MSRPM spans 2 contiguous 4KB pages while IOPM spans 2 contiguous 4KB 2506abe82380SKrish Sadhukhan * pages + 1 byte. 2507abe82380SKrish Sadhukhan * 2508abe82380SKrish Sadhukhan * [APM vol 2] 2509abe82380SKrish Sadhukhan * 2510abe82380SKrish Sadhukhan * Note: Unallocated MSRPM addresses conforming to consistency checks, generate 2511abe82380SKrish Sadhukhan * #NPF. 2512abe82380SKrish Sadhukhan */ 2513abe82380SKrish Sadhukhan static void test_msrpm_iopm_bitmap_addrs(void) 2514abe82380SKrish Sadhukhan { 2515abe82380SKrish Sadhukhan u64 saved_intercept = vmcb->control.intercept; 2516abe82380SKrish Sadhukhan u64 addr_beyond_limit = 1ull << cpuid_maxphyaddr(); 2517abe82380SKrish Sadhukhan u64 addr = virt_to_phys(msr_bitmap) & (~((1ull << 12) - 1)); 2518abe82380SKrish Sadhukhan 2519abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2520abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2521abe82380SKrish Sadhukhan "MSRPM"); 2522abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2523abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE + 1, SVM_EXIT_ERR, 2524abe82380SKrish Sadhukhan "MSRPM"); 2525abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, 2526abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2527abe82380SKrish Sadhukhan "MSRPM"); 2528abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2529abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2530abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2531abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_MSR_PROT, addr, 2532abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "MSRPM"); 2533abe82380SKrish Sadhukhan 2534abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2535abe82380SKrish Sadhukhan addr_beyond_limit - 4 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2536abe82380SKrish Sadhukhan "IOPM"); 2537abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2538abe82380SKrish Sadhukhan addr_beyond_limit - 3 * PAGE_SIZE, SVM_EXIT_VMMCALL, 2539abe82380SKrish Sadhukhan "IOPM"); 2540abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2541abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE - 2, SVM_EXIT_VMMCALL, 2542abe82380SKrish Sadhukhan "IOPM"); 2543abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2544abe82380SKrish Sadhukhan addr_beyond_limit - 2 * PAGE_SIZE, SVM_EXIT_ERR, 2545abe82380SKrish Sadhukhan "IOPM"); 2546abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, 2547abe82380SKrish Sadhukhan addr_beyond_limit - PAGE_SIZE, SVM_EXIT_ERR, 2548abe82380SKrish Sadhukhan "IOPM"); 2549abe82380SKrish Sadhukhan addr = virt_to_phys(io_bitmap) & (~((1ull << 11) - 1)); 2550abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2551abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2552abe82380SKrish Sadhukhan addr |= (1ull << 12) - 1; 2553abe82380SKrish Sadhukhan TEST_BITMAP_ADDR(saved_intercept, INTERCEPT_IOIO_PROT, addr, 2554abe82380SKrish Sadhukhan SVM_EXIT_VMMCALL, "IOPM"); 2555abe82380SKrish Sadhukhan 2556abe82380SKrish Sadhukhan vmcb->control.intercept = saved_intercept; 2557abe82380SKrish Sadhukhan } 2558abe82380SKrish Sadhukhan 2559ba3c9773SLara Lazier /* 2560ba3c9773SLara Lazier * Unlike VMSAVE, VMRUN seems not to update the value of noncanonical 2561ba3c9773SLara Lazier * segment bases in the VMCB. However, VMENTRY succeeds as documented. 2562ba3c9773SLara Lazier */ 2563ba3c9773SLara Lazier #define TEST_CANONICAL_VMRUN(seg_base, msg) \ 2564a99070ebSKrish Sadhukhan saved_addr = seg_base; \ 2565a99070ebSKrish Sadhukhan seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2566ba3c9773SLara Lazier return_value = svm_vmrun(); \ 2567ba3c9773SLara Lazier report(return_value == SVM_EXIT_VMMCALL, \ 2568ba3c9773SLara Lazier "Successful VMRUN with noncanonical %s.base", msg); \ 2569a99070ebSKrish Sadhukhan seg_base = saved_addr; 2570a99070ebSKrish Sadhukhan 2571ba3c9773SLara Lazier 2572ba3c9773SLara Lazier #define TEST_CANONICAL_VMLOAD(seg_base, msg) \ 2573ba3c9773SLara Lazier saved_addr = seg_base; \ 2574ba3c9773SLara Lazier seg_base = (seg_base & ((1ul << addr_limit) - 1)) | noncanonical_mask; \ 2575ba3c9773SLara Lazier asm volatile ("vmload %0" : : "a"(vmcb_phys) : "memory"); \ 2576ba3c9773SLara Lazier asm volatile ("vmsave %0" : : "a"(vmcb_phys) : "memory"); \ 2577ba3c9773SLara Lazier report(is_canonical(seg_base), \ 2578ba3c9773SLara Lazier "Test %s.base for canonical form: %lx", msg, seg_base); \ 2579ba3c9773SLara Lazier seg_base = saved_addr; 2580ba3c9773SLara Lazier 2581ba3c9773SLara Lazier static void test_canonicalization(void) 2582a99070ebSKrish Sadhukhan { 2583a99070ebSKrish Sadhukhan u64 saved_addr; 2584ba3c9773SLara Lazier u64 return_value; 2585ba3c9773SLara Lazier u64 addr_limit; 2586ba3c9773SLara Lazier u64 vmcb_phys = virt_to_phys(vmcb); 2587ba3c9773SLara Lazier 2588ba3c9773SLara Lazier addr_limit = (this_cpu_has(X86_FEATURE_LA57)) ? 57 : 48; 2589a99070ebSKrish Sadhukhan u64 noncanonical_mask = NONCANONICAL & ~((1ul << addr_limit) - 1); 2590a99070ebSKrish Sadhukhan 2591ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.fs.base, "FS"); 2592ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.gs.base, "GS"); 2593ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.ldtr.base, "LDTR"); 2594ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.tr.base, "TR"); 2595ba3c9773SLara Lazier TEST_CANONICAL_VMLOAD(vmcb->save.kernel_gs_base, "KERNEL GS"); 2596ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.es.base, "ES"); 2597ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.cs.base, "CS"); 2598ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ss.base, "SS"); 2599ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.ds.base, "DS"); 2600ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.gdtr.base, "GDTR"); 2601ba3c9773SLara Lazier TEST_CANONICAL_VMRUN(vmcb->save.idtr.base, "IDTR"); 2602a99070ebSKrish Sadhukhan } 2603a99070ebSKrish Sadhukhan 2604665f5677SKrish Sadhukhan /* 2605665f5677SKrish Sadhukhan * When VMRUN loads a guest value of 1 in EFLAGS.TF, that value does not 2606665f5677SKrish Sadhukhan * cause a trace trap between the VMRUN and the first guest instruction, but 2607665f5677SKrish Sadhukhan * rather after completion of the first guest instruction. 2608665f5677SKrish Sadhukhan * 2609665f5677SKrish Sadhukhan * [APM vol 2] 2610665f5677SKrish Sadhukhan */ 2611665f5677SKrish Sadhukhan u64 guest_rflags_test_trap_rip; 2612665f5677SKrish Sadhukhan 2613665f5677SKrish Sadhukhan static void guest_rflags_test_db_handler(struct ex_regs *r) 2614665f5677SKrish Sadhukhan { 2615665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = r->rip; 2616665f5677SKrish Sadhukhan r->rflags &= ~X86_EFLAGS_TF; 2617665f5677SKrish Sadhukhan } 2618665f5677SKrish Sadhukhan 2619a79c9495SKrish Sadhukhan static void svm_guest_state_test(void) 2620a79c9495SKrish Sadhukhan { 2621a79c9495SKrish Sadhukhan test_set_guest(basic_guest_main); 2622a79c9495SKrish Sadhukhan test_efer(); 2623a79c9495SKrish Sadhukhan test_cr0(); 2624a79c9495SKrish Sadhukhan test_cr3(); 2625a79c9495SKrish Sadhukhan test_cr4(); 2626a79c9495SKrish Sadhukhan test_dr(); 2627abe82380SKrish Sadhukhan test_msrpm_iopm_bitmap_addrs(); 2628ba3c9773SLara Lazier test_canonicalization(); 2629ba29942cSKrish Sadhukhan } 2630ba29942cSKrish Sadhukhan 2631665f5677SKrish Sadhukhan extern void guest_rflags_test_guest(struct svm_test *test); 2632665f5677SKrish Sadhukhan extern u64 *insn2; 2633665f5677SKrish Sadhukhan extern u64 *guest_end; 2634665f5677SKrish Sadhukhan 2635665f5677SKrish Sadhukhan asm("guest_rflags_test_guest:\n\t" 2636665f5677SKrish Sadhukhan "push %rbp\n\t" 2637665f5677SKrish Sadhukhan ".global insn2\n\t" 2638665f5677SKrish Sadhukhan "insn2:\n\t" 2639665f5677SKrish Sadhukhan "mov %rsp,%rbp\n\t" 2640665f5677SKrish Sadhukhan "vmmcall\n\t" 2641665f5677SKrish Sadhukhan "vmmcall\n\t" 2642665f5677SKrish Sadhukhan ".global guest_end\n\t" 2643665f5677SKrish Sadhukhan "guest_end:\n\t" 2644665f5677SKrish Sadhukhan "vmmcall\n\t" 2645665f5677SKrish Sadhukhan "pop %rbp\n\t" 2646665f5677SKrish Sadhukhan "ret"); 2647665f5677SKrish Sadhukhan 2648665f5677SKrish Sadhukhan static void svm_test_singlestep(void) 2649665f5677SKrish Sadhukhan { 2650665f5677SKrish Sadhukhan handle_exception(DB_VECTOR, guest_rflags_test_db_handler); 2651665f5677SKrish Sadhukhan 2652665f5677SKrish Sadhukhan /* 2653665f5677SKrish Sadhukhan * Trap expected after completion of first guest instruction 2654665f5677SKrish Sadhukhan */ 2655665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2656665f5677SKrish Sadhukhan report (__svm_vmrun((u64)guest_rflags_test_guest) == SVM_EXIT_VMMCALL && 2657665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == (u64)&insn2, 2658665f5677SKrish Sadhukhan "Test EFLAGS.TF on VMRUN: trap expected after completion of first guest instruction"); 2659665f5677SKrish Sadhukhan /* 2660665f5677SKrish Sadhukhan * No trap expected 2661665f5677SKrish Sadhukhan */ 2662665f5677SKrish Sadhukhan guest_rflags_test_trap_rip = 0; 2663665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2664665f5677SKrish Sadhukhan vmcb->save.rflags |= X86_EFLAGS_TF; 2665665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2666665f5677SKrish Sadhukhan guest_rflags_test_trap_rip == 0, "Test EFLAGS.TF on VMRUN: trap not expected"); 2667665f5677SKrish Sadhukhan 2668665f5677SKrish Sadhukhan /* 2669665f5677SKrish Sadhukhan * Let guest finish execution 2670665f5677SKrish Sadhukhan */ 2671665f5677SKrish Sadhukhan vmcb->save.rip += 3; 2672665f5677SKrish Sadhukhan report (__svm_vmrun(vmcb->save.rip) == SVM_EXIT_VMMCALL && 2673665f5677SKrish Sadhukhan vmcb->save.rip == (u64)&guest_end, "Test EFLAGS.TF on VMRUN: guest execution completion"); 2674665f5677SKrish Sadhukhan } 2675665f5677SKrish Sadhukhan 2676916635a8SSean Christopherson static void __svm_npt_rsvd_bits_test(u64 *pxe, u64 rsvd_bits, u64 efer, 2677916635a8SSean Christopherson ulong cr4, u64 guest_efer, ulong guest_cr4) 2678916635a8SSean Christopherson { 2679916635a8SSean Christopherson u64 pxe_orig = *pxe; 2680916635a8SSean Christopherson int exit_reason; 2681916635a8SSean Christopherson u64 pfec; 2682916635a8SSean Christopherson 2683916635a8SSean Christopherson wrmsr(MSR_EFER, efer); 2684916635a8SSean Christopherson write_cr4(cr4); 2685916635a8SSean Christopherson 2686916635a8SSean Christopherson vmcb->save.efer = guest_efer; 2687916635a8SSean Christopherson vmcb->save.cr4 = guest_cr4; 2688916635a8SSean Christopherson 2689916635a8SSean Christopherson *pxe |= rsvd_bits; 2690916635a8SSean Christopherson 2691916635a8SSean Christopherson exit_reason = svm_vmrun(); 2692916635a8SSean Christopherson 2693916635a8SSean Christopherson report(exit_reason == SVM_EXIT_NPF, 2694916635a8SSean Christopherson "Wanted #NPF on rsvd bits = 0x%lx, got exit = 0x%x", rsvd_bits, exit_reason); 2695916635a8SSean Christopherson 2696916635a8SSean Christopherson if (pxe == npt_get_pdpe() || pxe == npt_get_pml4e()) { 2697916635a8SSean Christopherson /* 2698916635a8SSean Christopherson * The guest's page tables will blow up on a bad PDPE/PML4E, 2699916635a8SSean Christopherson * before starting the final walk of the guest page. 2700916635a8SSean Christopherson */ 2701916635a8SSean Christopherson pfec = 0x20000000full; 2702916635a8SSean Christopherson } else { 2703916635a8SSean Christopherson /* RSVD #NPF on final walk of guest page. */ 2704916635a8SSean Christopherson pfec = 0x10000000dULL; 2705916635a8SSean Christopherson 2706916635a8SSean Christopherson /* PFEC.FETCH=1 if NX=1 *or* SMEP=1. */ 2707916635a8SSean Christopherson if ((cr4 & X86_CR4_SMEP) || (efer & EFER_NX)) 2708916635a8SSean Christopherson pfec |= 0x10; 2709916635a8SSean Christopherson 2710916635a8SSean Christopherson } 2711916635a8SSean Christopherson 2712916635a8SSean Christopherson report(vmcb->control.exit_info_1 == pfec, 2713916635a8SSean Christopherson "Wanted PFEC = 0x%lx, got PFEC = %lx, PxE = 0x%lx. " 2714916635a8SSean Christopherson "host.NX = %u, host.SMEP = %u, guest.NX = %u, guest.SMEP = %u", 2715916635a8SSean Christopherson pfec, vmcb->control.exit_info_1, *pxe, 2716916635a8SSean Christopherson !!(efer & EFER_NX), !!(cr4 & X86_CR4_SMEP), 2717916635a8SSean Christopherson !!(guest_efer & EFER_NX), !!(guest_cr4 & X86_CR4_SMEP)); 2718916635a8SSean Christopherson 2719916635a8SSean Christopherson *pxe = pxe_orig; 2720916635a8SSean Christopherson } 2721916635a8SSean Christopherson 2722916635a8SSean Christopherson static void _svm_npt_rsvd_bits_test(u64 *pxe, u64 pxe_rsvd_bits, u64 efer, 2723916635a8SSean Christopherson ulong cr4, u64 guest_efer, ulong guest_cr4) 2724916635a8SSean Christopherson { 2725916635a8SSean Christopherson u64 rsvd_bits; 2726916635a8SSean Christopherson int i; 2727916635a8SSean Christopherson 2728916635a8SSean Christopherson /* 2729520e2789SBabu Moger * RDTSC or RDRAND can sometimes fail to generate a valid reserved bits 2730520e2789SBabu Moger */ 2731520e2789SBabu Moger if (!pxe_rsvd_bits) { 2732520e2789SBabu Moger report_skip("svm_npt_rsvd_bits_test: Reserved bits are not valid"); 2733520e2789SBabu Moger return; 2734520e2789SBabu Moger } 2735520e2789SBabu Moger 2736520e2789SBabu Moger /* 2737916635a8SSean Christopherson * Test all combinations of guest/host EFER.NX and CR4.SMEP. If host 2738916635a8SSean Christopherson * EFER.NX=0, use NX as the reserved bit, otherwise use the passed in 2739916635a8SSean Christopherson * @pxe_rsvd_bits. 2740916635a8SSean Christopherson */ 2741916635a8SSean Christopherson for (i = 0; i < 16; i++) { 2742916635a8SSean Christopherson if (i & 1) { 2743916635a8SSean Christopherson rsvd_bits = pxe_rsvd_bits; 2744916635a8SSean Christopherson efer |= EFER_NX; 2745916635a8SSean Christopherson } else { 2746916635a8SSean Christopherson rsvd_bits = PT64_NX_MASK; 2747916635a8SSean Christopherson efer &= ~EFER_NX; 2748916635a8SSean Christopherson } 2749916635a8SSean Christopherson if (i & 2) 2750916635a8SSean Christopherson cr4 |= X86_CR4_SMEP; 2751916635a8SSean Christopherson else 2752916635a8SSean Christopherson cr4 &= ~X86_CR4_SMEP; 2753916635a8SSean Christopherson if (i & 4) 2754916635a8SSean Christopherson guest_efer |= EFER_NX; 2755916635a8SSean Christopherson else 2756916635a8SSean Christopherson guest_efer &= ~EFER_NX; 2757916635a8SSean Christopherson if (i & 8) 2758916635a8SSean Christopherson guest_cr4 |= X86_CR4_SMEP; 2759916635a8SSean Christopherson else 2760916635a8SSean Christopherson guest_cr4 &= ~X86_CR4_SMEP; 2761916635a8SSean Christopherson 2762916635a8SSean Christopherson __svm_npt_rsvd_bits_test(pxe, rsvd_bits, efer, cr4, 2763916635a8SSean Christopherson guest_efer, guest_cr4); 2764916635a8SSean Christopherson } 2765916635a8SSean Christopherson } 2766916635a8SSean Christopherson 2767916635a8SSean Christopherson static u64 get_random_bits(u64 hi, u64 low) 2768916635a8SSean Christopherson { 2769520e2789SBabu Moger unsigned retry = 5; 2770520e2789SBabu Moger u64 rsvd_bits = 0; 2771916635a8SSean Christopherson 2772520e2789SBabu Moger if (this_cpu_has(X86_FEATURE_RDRAND)) { 2773520e2789SBabu Moger do { 2774520e2789SBabu Moger rsvd_bits = (rdrand() << low) & GENMASK_ULL(hi, low); 2775520e2789SBabu Moger retry--; 2776520e2789SBabu Moger } while (!rsvd_bits && retry); 2777520e2789SBabu Moger } 2778520e2789SBabu Moger 2779520e2789SBabu Moger if (!rsvd_bits) { 2780520e2789SBabu Moger retry = 5; 2781916635a8SSean Christopherson do { 2782916635a8SSean Christopherson rsvd_bits = (rdtsc() << low) & GENMASK_ULL(hi, low); 2783520e2789SBabu Moger retry--; 2784520e2789SBabu Moger } while (!rsvd_bits && retry); 2785520e2789SBabu Moger } 2786916635a8SSean Christopherson 2787916635a8SSean Christopherson return rsvd_bits; 2788916635a8SSean Christopherson } 2789916635a8SSean Christopherson 2790916635a8SSean Christopherson 2791916635a8SSean Christopherson static void svm_npt_rsvd_bits_test(void) 2792916635a8SSean Christopherson { 2793916635a8SSean Christopherson u64 saved_efer, host_efer, sg_efer, guest_efer; 2794916635a8SSean Christopherson ulong saved_cr4, host_cr4, sg_cr4, guest_cr4; 2795916635a8SSean Christopherson 2796916635a8SSean Christopherson if (!npt_supported()) { 2797916635a8SSean Christopherson report_skip("NPT not supported"); 2798916635a8SSean Christopherson return; 2799916635a8SSean Christopherson } 2800916635a8SSean Christopherson 2801916635a8SSean Christopherson saved_efer = host_efer = rdmsr(MSR_EFER); 2802916635a8SSean Christopherson saved_cr4 = host_cr4 = read_cr4(); 2803916635a8SSean Christopherson sg_efer = guest_efer = vmcb->save.efer; 2804916635a8SSean Christopherson sg_cr4 = guest_cr4 = vmcb->save.cr4; 2805916635a8SSean Christopherson 2806916635a8SSean Christopherson test_set_guest(basic_guest_main); 2807916635a8SSean Christopherson 2808916635a8SSean Christopherson /* 2809916635a8SSean Christopherson * 4k PTEs don't have reserved bits if MAXPHYADDR >= 52, just skip the 2810916635a8SSean Christopherson * sub-test. The NX test is still valid, but the extra bit of coverage 2811916635a8SSean Christopherson * isn't worth the extra complexity. 2812916635a8SSean Christopherson */ 2813916635a8SSean Christopherson if (cpuid_maxphyaddr() >= 52) 2814916635a8SSean Christopherson goto skip_pte_test; 2815916635a8SSean Christopherson 2816916635a8SSean Christopherson _svm_npt_rsvd_bits_test(npt_get_pte((u64)basic_guest_main), 2817916635a8SSean Christopherson get_random_bits(51, cpuid_maxphyaddr()), 2818916635a8SSean Christopherson host_efer, host_cr4, guest_efer, guest_cr4); 2819916635a8SSean Christopherson 2820916635a8SSean Christopherson skip_pte_test: 2821916635a8SSean Christopherson _svm_npt_rsvd_bits_test(npt_get_pde((u64)basic_guest_main), 2822916635a8SSean Christopherson get_random_bits(20, 13) | PT_PAGE_SIZE_MASK, 2823916635a8SSean Christopherson host_efer, host_cr4, guest_efer, guest_cr4); 2824916635a8SSean Christopherson 2825916635a8SSean Christopherson _svm_npt_rsvd_bits_test(npt_get_pdpe(), 2826916635a8SSean Christopherson PT_PAGE_SIZE_MASK | 2827916635a8SSean Christopherson (this_cpu_has(X86_FEATURE_GBPAGES) ? get_random_bits(29, 13) : 0), 2828916635a8SSean Christopherson host_efer, host_cr4, guest_efer, guest_cr4); 2829916635a8SSean Christopherson 2830916635a8SSean Christopherson _svm_npt_rsvd_bits_test(npt_get_pml4e(), BIT_ULL(8), 2831916635a8SSean Christopherson host_efer, host_cr4, guest_efer, guest_cr4); 2832916635a8SSean Christopherson 2833916635a8SSean Christopherson wrmsr(MSR_EFER, saved_efer); 2834916635a8SSean Christopherson write_cr4(saved_cr4); 2835916635a8SSean Christopherson vmcb->save.efer = sg_efer; 2836916635a8SSean Christopherson vmcb->save.cr4 = sg_cr4; 2837916635a8SSean Christopherson } 28387a57ef5dSMaxim Levitsky 28397a57ef5dSMaxim Levitsky static bool volatile svm_errata_reproduced = false; 28407a57ef5dSMaxim Levitsky static unsigned long volatile physical = 0; 28417a57ef5dSMaxim Levitsky 28427a57ef5dSMaxim Levitsky 28437a57ef5dSMaxim Levitsky /* 28447a57ef5dSMaxim Levitsky * 28457a57ef5dSMaxim Levitsky * Test the following errata: 28467a57ef5dSMaxim Levitsky * If the VMRUN/VMSAVE/VMLOAD are attempted by the nested guest, 28477a57ef5dSMaxim Levitsky * the CPU would first check the EAX against host reserved memory 28487a57ef5dSMaxim Levitsky * regions (so far only SMM_ADDR/SMM_MASK are known to cause it), 28497a57ef5dSMaxim Levitsky * and only then signal #VMexit 28507a57ef5dSMaxim Levitsky * 28517a57ef5dSMaxim Levitsky * Try to reproduce this by trying vmsave on each possible 4K aligned memory 28527a57ef5dSMaxim Levitsky * address in the low 4G where the SMM area has to reside. 28537a57ef5dSMaxim Levitsky */ 28547a57ef5dSMaxim Levitsky 28557a57ef5dSMaxim Levitsky static void gp_isr(struct ex_regs *r) 28567a57ef5dSMaxim Levitsky { 28577a57ef5dSMaxim Levitsky svm_errata_reproduced = true; 28587a57ef5dSMaxim Levitsky /* skip over the vmsave instruction*/ 28597a57ef5dSMaxim Levitsky r->rip += 3; 28607a57ef5dSMaxim Levitsky } 28617a57ef5dSMaxim Levitsky 28627a57ef5dSMaxim Levitsky static void svm_vmrun_errata_test(void) 28637a57ef5dSMaxim Levitsky { 28647a57ef5dSMaxim Levitsky unsigned long *last_page = NULL; 28657a57ef5dSMaxim Levitsky 28667a57ef5dSMaxim Levitsky handle_exception(GP_VECTOR, gp_isr); 28677a57ef5dSMaxim Levitsky 28687a57ef5dSMaxim Levitsky while (!svm_errata_reproduced) { 28697a57ef5dSMaxim Levitsky 28707a57ef5dSMaxim Levitsky unsigned long *page = alloc_pages(1); 28717a57ef5dSMaxim Levitsky 28727a57ef5dSMaxim Levitsky if (!page) { 28735c3582f0SJanis Schoetterl-Glausch report_pass("All guest memory tested, no bug found"); 28747a57ef5dSMaxim Levitsky break; 28757a57ef5dSMaxim Levitsky } 28767a57ef5dSMaxim Levitsky 28777a57ef5dSMaxim Levitsky physical = virt_to_phys(page); 28787a57ef5dSMaxim Levitsky 28797a57ef5dSMaxim Levitsky asm volatile ( 28807a57ef5dSMaxim Levitsky "mov %[_physical], %%rax\n\t" 28817a57ef5dSMaxim Levitsky "vmsave %%rax\n\t" 28827a57ef5dSMaxim Levitsky 28837a57ef5dSMaxim Levitsky : [_physical] "=m" (physical) 28847a57ef5dSMaxim Levitsky : /* no inputs*/ 28857a57ef5dSMaxim Levitsky : "rax" /*clobbers*/ 28867a57ef5dSMaxim Levitsky ); 28877a57ef5dSMaxim Levitsky 28887a57ef5dSMaxim Levitsky if (svm_errata_reproduced) { 2889198dfd0eSJanis Schoetterl-Glausch report_fail("Got #GP exception - svm errata reproduced at 0x%lx", 28907a57ef5dSMaxim Levitsky physical); 28917a57ef5dSMaxim Levitsky break; 28927a57ef5dSMaxim Levitsky } 28937a57ef5dSMaxim Levitsky 28947a57ef5dSMaxim Levitsky *page = (unsigned long)last_page; 28957a57ef5dSMaxim Levitsky last_page = page; 28967a57ef5dSMaxim Levitsky } 28977a57ef5dSMaxim Levitsky 28987a57ef5dSMaxim Levitsky while (last_page) { 28997a57ef5dSMaxim Levitsky unsigned long *page = last_page; 29007a57ef5dSMaxim Levitsky last_page = (unsigned long *)*last_page; 29017a57ef5dSMaxim Levitsky free_pages_by_order(page, 1); 29027a57ef5dSMaxim Levitsky } 29037a57ef5dSMaxim Levitsky } 29047a57ef5dSMaxim Levitsky 29050b6f6cedSKrish Sadhukhan static void vmload_vmsave_guest_main(struct svm_test *test) 29060b6f6cedSKrish Sadhukhan { 29070b6f6cedSKrish Sadhukhan u64 vmcb_phys = virt_to_phys(vmcb); 29080b6f6cedSKrish Sadhukhan 29090b6f6cedSKrish Sadhukhan asm volatile ("vmload %0" : : "a"(vmcb_phys)); 29100b6f6cedSKrish Sadhukhan asm volatile ("vmsave %0" : : "a"(vmcb_phys)); 29110b6f6cedSKrish Sadhukhan } 29120b6f6cedSKrish Sadhukhan 29130b6f6cedSKrish Sadhukhan static void svm_vmload_vmsave(void) 29140b6f6cedSKrish Sadhukhan { 29150b6f6cedSKrish Sadhukhan u32 intercept_saved = vmcb->control.intercept; 29160b6f6cedSKrish Sadhukhan 29170b6f6cedSKrish Sadhukhan test_set_guest(vmload_vmsave_guest_main); 29180b6f6cedSKrish Sadhukhan 29190b6f6cedSKrish Sadhukhan /* 29200b6f6cedSKrish Sadhukhan * Disabling intercept for VMLOAD and VMSAVE doesn't cause 29210b6f6cedSKrish Sadhukhan * respective #VMEXIT to host 29220b6f6cedSKrish Sadhukhan */ 29230b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 29240b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 29250b6f6cedSKrish Sadhukhan svm_vmrun(); 29260b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 29270b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 29280b6f6cedSKrish Sadhukhan 29290b6f6cedSKrish Sadhukhan /* 29300b6f6cedSKrish Sadhukhan * Enabling intercept for VMLOAD and VMSAVE causes respective 29310b6f6cedSKrish Sadhukhan * #VMEXIT to host 29320b6f6cedSKrish Sadhukhan */ 29330b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 29340b6f6cedSKrish Sadhukhan svm_vmrun(); 29350b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 29360b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 29370b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 29380b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 29390b6f6cedSKrish Sadhukhan svm_vmrun(); 29400b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 29410b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 29420b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 29430b6f6cedSKrish Sadhukhan svm_vmrun(); 29440b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 29450b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 29460b6f6cedSKrish Sadhukhan 29470b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMLOAD); 29480b6f6cedSKrish Sadhukhan svm_vmrun(); 29490b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMLOAD, "Test " 29500b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMLOAD #VMEXIT"); 29510b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMLOAD); 29520b6f6cedSKrish Sadhukhan svm_vmrun(); 29530b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 29540b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 29550b6f6cedSKrish Sadhukhan 29560b6f6cedSKrish Sadhukhan vmcb->control.intercept |= (1ULL << INTERCEPT_VMSAVE); 29570b6f6cedSKrish Sadhukhan svm_vmrun(); 29580b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMSAVE, "Test " 29590b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMSAVE #VMEXIT"); 29600b6f6cedSKrish Sadhukhan vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMSAVE); 29610b6f6cedSKrish Sadhukhan svm_vmrun(); 29620b6f6cedSKrish Sadhukhan report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "Test " 29630b6f6cedSKrish Sadhukhan "VMLOAD/VMSAVE intercept: Expected VMMCALL #VMEXIT"); 29640b6f6cedSKrish Sadhukhan 29650b6f6cedSKrish Sadhukhan vmcb->control.intercept = intercept_saved; 29660b6f6cedSKrish Sadhukhan } 29670b6f6cedSKrish Sadhukhan 2968f6972bd6SLara Lazier static void prepare_vgif_enabled(struct svm_test *test) 2969f6972bd6SLara Lazier { 2970f6972bd6SLara Lazier default_prepare(test); 2971f6972bd6SLara Lazier } 2972f6972bd6SLara Lazier 2973f6972bd6SLara Lazier static void test_vgif(struct svm_test *test) 2974f6972bd6SLara Lazier { 2975f6972bd6SLara Lazier asm volatile ("vmmcall\n\tstgi\n\tvmmcall\n\tclgi\n\tvmmcall\n\t"); 2976f6972bd6SLara Lazier 2977f6972bd6SLara Lazier } 2978f6972bd6SLara Lazier 2979f6972bd6SLara Lazier static bool vgif_finished(struct svm_test *test) 2980f6972bd6SLara Lazier { 2981f6972bd6SLara Lazier switch (get_test_stage(test)) 2982f6972bd6SLara Lazier { 2983f6972bd6SLara Lazier case 0: 2984f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2985198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2986f6972bd6SLara Lazier return true; 2987f6972bd6SLara Lazier } 2988f6972bd6SLara Lazier vmcb->control.int_ctl |= V_GIF_ENABLED_MASK; 2989f6972bd6SLara Lazier vmcb->save.rip += 3; 2990f6972bd6SLara Lazier inc_test_stage(test); 2991f6972bd6SLara Lazier break; 2992f6972bd6SLara Lazier case 1: 2993f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 2994198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 2995f6972bd6SLara Lazier return true; 2996f6972bd6SLara Lazier } 2997f6972bd6SLara Lazier if (!(vmcb->control.int_ctl & V_GIF_MASK)) { 2998198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to set VGIF when executing STGI."); 2999f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 3000f6972bd6SLara Lazier return true; 3001f6972bd6SLara Lazier } 30025c3582f0SJanis Schoetterl-Glausch report_pass("STGI set VGIF bit."); 3003f6972bd6SLara Lazier vmcb->save.rip += 3; 3004f6972bd6SLara Lazier inc_test_stage(test); 3005f6972bd6SLara Lazier break; 3006f6972bd6SLara Lazier case 2: 3007f6972bd6SLara Lazier if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 3008198dfd0eSJanis Schoetterl-Glausch report_fail("VMEXIT not due to vmmcall."); 3009f6972bd6SLara Lazier return true; 3010f6972bd6SLara Lazier } 3011f6972bd6SLara Lazier if (vmcb->control.int_ctl & V_GIF_MASK) { 3012198dfd0eSJanis Schoetterl-Glausch report_fail("Failed to clear VGIF when executing CLGI."); 3013f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 3014f6972bd6SLara Lazier return true; 3015f6972bd6SLara Lazier } 30165c3582f0SJanis Schoetterl-Glausch report_pass("CLGI cleared VGIF bit."); 3017f6972bd6SLara Lazier vmcb->save.rip += 3; 3018f6972bd6SLara Lazier inc_test_stage(test); 3019f6972bd6SLara Lazier vmcb->control.int_ctl &= ~V_GIF_ENABLED_MASK; 3020f6972bd6SLara Lazier break; 3021f6972bd6SLara Lazier default: 3022f6972bd6SLara Lazier return true; 3023f6972bd6SLara Lazier break; 3024f6972bd6SLara Lazier } 3025f6972bd6SLara Lazier 3026f6972bd6SLara Lazier return get_test_stage(test) == 3; 3027f6972bd6SLara Lazier } 3028f6972bd6SLara Lazier 3029f6972bd6SLara Lazier static bool vgif_check(struct svm_test *test) 3030f6972bd6SLara Lazier { 3031f6972bd6SLara Lazier return get_test_stage(test) == 3; 3032f6972bd6SLara Lazier } 3033f6972bd6SLara Lazier 30348650dffeSMaxim Levitsky 30358650dffeSMaxim Levitsky static int pause_test_counter; 30368650dffeSMaxim Levitsky static int wait_counter; 30378650dffeSMaxim Levitsky 30388650dffeSMaxim Levitsky static void pause_filter_test_guest_main(struct svm_test *test) 30398650dffeSMaxim Levitsky { 30408650dffeSMaxim Levitsky int i; 30418650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 30428650dffeSMaxim Levitsky pause(); 30438650dffeSMaxim Levitsky 30448650dffeSMaxim Levitsky if (!wait_counter) 30458650dffeSMaxim Levitsky return; 30468650dffeSMaxim Levitsky 30478650dffeSMaxim Levitsky for (i = 0; i < wait_counter; i++) 30488650dffeSMaxim Levitsky ; 30498650dffeSMaxim Levitsky 30508650dffeSMaxim Levitsky for (i = 0 ; i < pause_test_counter ; i++) 30518650dffeSMaxim Levitsky pause(); 30528650dffeSMaxim Levitsky 30538650dffeSMaxim Levitsky } 30548650dffeSMaxim Levitsky 30558650dffeSMaxim Levitsky static void pause_filter_run_test(int pause_iterations, int filter_value, int wait_iterations, int threshold) 30568650dffeSMaxim Levitsky { 30578650dffeSMaxim Levitsky test_set_guest(pause_filter_test_guest_main); 30588650dffeSMaxim Levitsky 30598650dffeSMaxim Levitsky pause_test_counter = pause_iterations; 30608650dffeSMaxim Levitsky wait_counter = wait_iterations; 30618650dffeSMaxim Levitsky 30628650dffeSMaxim Levitsky vmcb->control.pause_filter_count = filter_value; 30638650dffeSMaxim Levitsky vmcb->control.pause_filter_thresh = threshold; 30648650dffeSMaxim Levitsky svm_vmrun(); 30658650dffeSMaxim Levitsky 30668650dffeSMaxim Levitsky if (filter_value <= pause_iterations || wait_iterations < threshold) 30678650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_PAUSE, "expected PAUSE vmexit"); 30688650dffeSMaxim Levitsky else 30698650dffeSMaxim Levitsky report(vmcb->control.exit_code == SVM_EXIT_VMMCALL, "no expected PAUSE vmexit"); 30708650dffeSMaxim Levitsky } 30718650dffeSMaxim Levitsky 30728650dffeSMaxim Levitsky static void pause_filter_test(void) 30738650dffeSMaxim Levitsky { 30748650dffeSMaxim Levitsky if (!pause_filter_supported()) { 30758650dffeSMaxim Levitsky report_skip("PAUSE filter not supported in the guest"); 30768650dffeSMaxim Levitsky return; 30778650dffeSMaxim Levitsky } 30788650dffeSMaxim Levitsky 30798650dffeSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_PAUSE); 30808650dffeSMaxim Levitsky 30818650dffeSMaxim Levitsky // filter count more that pause count - no VMexit 30828650dffeSMaxim Levitsky pause_filter_run_test(10, 9, 0, 0); 30838650dffeSMaxim Levitsky 30848650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit 30858650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 0, 0); 30868650dffeSMaxim Levitsky 30878650dffeSMaxim Levitsky 30888650dffeSMaxim Levitsky if (pause_threshold_supported()) { 30898650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + large enough threshold 30908650dffeSMaxim Levitsky // so that filter counter resets 30918650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 1000, 10); 30928650dffeSMaxim Levitsky 30938650dffeSMaxim Levitsky // filter count smaller pause count - no VMexit + small threshold 30948650dffeSMaxim Levitsky // so that filter doesn't reset 30958650dffeSMaxim Levitsky pause_filter_run_test(20, 21, 10, 1000); 30968650dffeSMaxim Levitsky } else { 30978650dffeSMaxim Levitsky report_skip("PAUSE threshold not supported in the guest"); 30988650dffeSMaxim Levitsky return; 30998650dffeSMaxim Levitsky } 31008650dffeSMaxim Levitsky } 31018650dffeSMaxim Levitsky 31028650dffeSMaxim Levitsky 3103af13008dSManali Shukla static int of_test_counter; 3104af13008dSManali Shukla 3105af13008dSManali Shukla static void guest_test_of_handler(struct ex_regs *r) 3106af13008dSManali Shukla { 3107af13008dSManali Shukla of_test_counter++; 3108af13008dSManali Shukla } 3109af13008dSManali Shukla 3110af13008dSManali Shukla static void svm_of_test_guest(struct svm_test *test) 3111af13008dSManali Shukla { 3112af13008dSManali Shukla struct far_pointer32 fp = { 3113af13008dSManali Shukla .offset = (uintptr_t)&&into, 3114af13008dSManali Shukla .selector = KERNEL_CS32, 3115af13008dSManali Shukla }; 3116af13008dSManali Shukla uintptr_t rsp; 3117af13008dSManali Shukla 3118af13008dSManali Shukla asm volatile ("mov %%rsp, %0" : "=r"(rsp)); 3119af13008dSManali Shukla 3120af13008dSManali Shukla if (fp.offset != (uintptr_t)&&into) { 3121af13008dSManali Shukla printf("Codee address too high.\n"); 3122af13008dSManali Shukla return; 3123af13008dSManali Shukla } 3124af13008dSManali Shukla 3125af13008dSManali Shukla if ((u32)rsp != rsp) { 3126af13008dSManali Shukla printf("Stack address too high.\n"); 3127af13008dSManali Shukla } 3128af13008dSManali Shukla 3129af13008dSManali Shukla asm goto("lcall *%0" : : "m" (fp) : "rax" : into); 3130af13008dSManali Shukla return; 3131af13008dSManali Shukla into: 3132af13008dSManali Shukla 3133af13008dSManali Shukla asm volatile (".code32;" 3134af13008dSManali Shukla "movl $0x7fffffff, %eax;" 3135af13008dSManali Shukla "addl %eax, %eax;" 3136af13008dSManali Shukla "into;" 3137af13008dSManali Shukla "lret;" 3138af13008dSManali Shukla ".code64"); 3139af13008dSManali Shukla __builtin_unreachable(); 3140af13008dSManali Shukla } 3141af13008dSManali Shukla 3142af13008dSManali Shukla static void svm_into_test(void) 3143af13008dSManali Shukla { 3144af13008dSManali Shukla handle_exception(OF_VECTOR, guest_test_of_handler); 3145af13008dSManali Shukla test_set_guest(svm_of_test_guest); 3146af13008dSManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL && of_test_counter == 1, 3147af13008dSManali Shukla "#OF is generated in L2 exception handler0"); 3148af13008dSManali Shukla } 3149af13008dSManali Shukla 3150c8e16d20SManali Shukla static int bp_test_counter; 3151c8e16d20SManali Shukla 3152c8e16d20SManali Shukla static void guest_test_bp_handler(struct ex_regs *r) 3153c8e16d20SManali Shukla { 3154c8e16d20SManali Shukla bp_test_counter++; 3155c8e16d20SManali Shukla } 3156c8e16d20SManali Shukla 3157c8e16d20SManali Shukla static void svm_bp_test_guest(struct svm_test *test) 3158c8e16d20SManali Shukla { 3159c8e16d20SManali Shukla asm volatile("int3"); 3160c8e16d20SManali Shukla } 3161c8e16d20SManali Shukla 3162c8e16d20SManali Shukla static void svm_int3_test(void) 3163c8e16d20SManali Shukla { 3164c8e16d20SManali Shukla handle_exception(BP_VECTOR, guest_test_bp_handler); 3165c8e16d20SManali Shukla test_set_guest(svm_bp_test_guest); 3166c8e16d20SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL && bp_test_counter == 1, 3167c8e16d20SManali Shukla "#BP is handled in L2 exception handler"); 3168c8e16d20SManali Shukla } 3169c8e16d20SManali Shukla 31705c92f156SManali Shukla static int nm_test_counter; 31715c92f156SManali Shukla 31725c92f156SManali Shukla static void guest_test_nm_handler(struct ex_regs *r) 31735c92f156SManali Shukla { 31745c92f156SManali Shukla nm_test_counter++; 31755c92f156SManali Shukla write_cr0(read_cr0() & ~X86_CR0_TS); 31765c92f156SManali Shukla write_cr0(read_cr0() & ~X86_CR0_EM); 31775c92f156SManali Shukla } 31785c92f156SManali Shukla 31795c92f156SManali Shukla static void svm_nm_test_guest(struct svm_test *test) 31805c92f156SManali Shukla { 31815c92f156SManali Shukla asm volatile("fnop"); 31825c92f156SManali Shukla } 31835c92f156SManali Shukla 31845c92f156SManali Shukla /* This test checks that: 31855c92f156SManali Shukla * 31865c92f156SManali Shukla * (a) If CR0.TS is set in L2, #NM is handled by L2 when 31875c92f156SManali Shukla * just an L2 handler is registered. 31885c92f156SManali Shukla * 31895c92f156SManali Shukla * (b) If CR0.TS is cleared and CR0.EM is set, #NM is handled 31905c92f156SManali Shukla * by L2 when just an l2 handler is registered. 31915c92f156SManali Shukla * 31925c92f156SManali Shukla * (c) If CR0.TS and CR0.EM are cleared in L2, no exception 31935c92f156SManali Shukla * is generated. 31945c92f156SManali Shukla */ 31955c92f156SManali Shukla 31965c92f156SManali Shukla static void svm_nm_test(void) 31975c92f156SManali Shukla { 31985c92f156SManali Shukla handle_exception(NM_VECTOR, guest_test_nm_handler); 31995c92f156SManali Shukla write_cr0(read_cr0() & ~X86_CR0_TS); 32005c92f156SManali Shukla test_set_guest(svm_nm_test_guest); 32015c92f156SManali Shukla 32025c92f156SManali Shukla vmcb->save.cr0 = vmcb->save.cr0 | X86_CR0_TS; 32035c92f156SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 1, 32045c92f156SManali Shukla "fnop with CR0.TS set in L2, #NM is triggered"); 32055c92f156SManali Shukla 32065c92f156SManali Shukla vmcb->save.cr0 = (vmcb->save.cr0 & ~X86_CR0_TS) | X86_CR0_EM; 32075c92f156SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 2, 32085c92f156SManali Shukla "fnop with CR0.EM set in L2, #NM is triggered"); 32095c92f156SManali Shukla 32105c92f156SManali Shukla vmcb->save.cr0 = vmcb->save.cr0 & ~(X86_CR0_TS | X86_CR0_EM); 32115c92f156SManali Shukla report(svm_vmrun() == SVM_EXIT_VMMCALL && nm_test_counter == 2, 3212912c0d72SThomas Huth "fnop with CR0.TS and CR0.EM unset no #NM exception"); 32135c92f156SManali Shukla } 3214f6972bd6SLara Lazier 3215537d39dfSMaxim Levitsky 3216537d39dfSMaxim Levitsky static bool check_lbr(u64 *from_excepted, u64 *to_expected) 3217537d39dfSMaxim Levitsky { 3218537d39dfSMaxim Levitsky u64 from = rdmsr(MSR_IA32_LASTBRANCHFROMIP); 3219537d39dfSMaxim Levitsky u64 to = rdmsr(MSR_IA32_LASTBRANCHTOIP); 3220537d39dfSMaxim Levitsky 3221537d39dfSMaxim Levitsky if ((u64)from_excepted != from) { 3222537d39dfSMaxim Levitsky report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx", 3223537d39dfSMaxim Levitsky (u64)from_excepted, from); 3224537d39dfSMaxim Levitsky return false; 3225537d39dfSMaxim Levitsky } 3226537d39dfSMaxim Levitsky 3227537d39dfSMaxim Levitsky if ((u64)to_expected != to) { 3228537d39dfSMaxim Levitsky report(false, "MSR_IA32_LASTBRANCHFROMIP, expected=0x%lx, actual=0x%lx", 3229537d39dfSMaxim Levitsky (u64)from_excepted, from); 3230537d39dfSMaxim Levitsky return false; 3231537d39dfSMaxim Levitsky } 3232537d39dfSMaxim Levitsky 3233537d39dfSMaxim Levitsky return true; 3234537d39dfSMaxim Levitsky } 3235537d39dfSMaxim Levitsky 3236537d39dfSMaxim Levitsky static bool check_dbgctl(u64 dbgctl, u64 dbgctl_expected) 3237537d39dfSMaxim Levitsky { 3238537d39dfSMaxim Levitsky if (dbgctl != dbgctl_expected) { 3239537d39dfSMaxim Levitsky report(false, "Unexpected MSR_IA32_DEBUGCTLMSR value 0x%lx", dbgctl); 3240537d39dfSMaxim Levitsky return false; 3241537d39dfSMaxim Levitsky } 3242537d39dfSMaxim Levitsky return true; 3243537d39dfSMaxim Levitsky } 3244537d39dfSMaxim Levitsky 3245537d39dfSMaxim Levitsky 3246537d39dfSMaxim Levitsky #define DO_BRANCH(branch_name) \ 3247537d39dfSMaxim Levitsky asm volatile ( \ 3248537d39dfSMaxim Levitsky # branch_name "_from:" \ 3249537d39dfSMaxim Levitsky "jmp " # branch_name "_to\n" \ 3250537d39dfSMaxim Levitsky "nop\n" \ 3251537d39dfSMaxim Levitsky "nop\n" \ 3252537d39dfSMaxim Levitsky # branch_name "_to:" \ 3253537d39dfSMaxim Levitsky "nop\n" \ 3254537d39dfSMaxim Levitsky ) 3255537d39dfSMaxim Levitsky 3256537d39dfSMaxim Levitsky 3257537d39dfSMaxim Levitsky extern u64 guest_branch0_from, guest_branch0_to; 3258537d39dfSMaxim Levitsky extern u64 guest_branch2_from, guest_branch2_to; 3259537d39dfSMaxim Levitsky 3260537d39dfSMaxim Levitsky extern u64 host_branch0_from, host_branch0_to; 3261537d39dfSMaxim Levitsky extern u64 host_branch2_from, host_branch2_to; 3262537d39dfSMaxim Levitsky extern u64 host_branch3_from, host_branch3_to; 3263537d39dfSMaxim Levitsky extern u64 host_branch4_from, host_branch4_to; 3264537d39dfSMaxim Levitsky 3265537d39dfSMaxim Levitsky u64 dbgctl; 3266537d39dfSMaxim Levitsky 3267537d39dfSMaxim Levitsky static void svm_lbrv_test_guest1(void) 3268537d39dfSMaxim Levitsky { 3269537d39dfSMaxim Levitsky /* 3270537d39dfSMaxim Levitsky * This guest expects the LBR to be already enabled when it starts, 3271537d39dfSMaxim Levitsky * it does a branch, and then disables the LBR and then checks. 3272537d39dfSMaxim Levitsky */ 3273537d39dfSMaxim Levitsky 3274537d39dfSMaxim Levitsky DO_BRANCH(guest_branch0); 3275537d39dfSMaxim Levitsky 3276537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3277537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3278537d39dfSMaxim Levitsky 3279537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 3280537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3281537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_DEBUGCTLMSR) != 0) 3282537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3283537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch0_from) 3284537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3285537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch0_to) 3286537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3287537d39dfSMaxim Levitsky 3288537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 3289537d39dfSMaxim Levitsky } 3290537d39dfSMaxim Levitsky 3291537d39dfSMaxim Levitsky static void svm_lbrv_test_guest2(void) 3292537d39dfSMaxim Levitsky { 3293537d39dfSMaxim Levitsky /* 3294537d39dfSMaxim Levitsky * This guest expects the LBR to be disabled when it starts, 3295537d39dfSMaxim Levitsky * enables it, does a branch, disables it and then checks. 3296537d39dfSMaxim Levitsky */ 3297537d39dfSMaxim Levitsky 3298537d39dfSMaxim Levitsky DO_BRANCH(guest_branch1); 3299537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3300537d39dfSMaxim Levitsky 3301537d39dfSMaxim Levitsky if (dbgctl != 0) 3302537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3303537d39dfSMaxim Levitsky 3304537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&host_branch2_from) 3305537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3306537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&host_branch2_to) 3307537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3308537d39dfSMaxim Levitsky 3309537d39dfSMaxim Levitsky 3310537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3311537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3312537d39dfSMaxim Levitsky DO_BRANCH(guest_branch2); 3313537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3314537d39dfSMaxim Levitsky 3315537d39dfSMaxim Levitsky if (dbgctl != DEBUGCTLMSR_LBR) 3316537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3317537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHFROMIP) != (u64)&guest_branch2_from) 3318537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3319537d39dfSMaxim Levitsky if (rdmsr(MSR_IA32_LASTBRANCHTOIP) != (u64)&guest_branch2_to) 3320537d39dfSMaxim Levitsky asm volatile("ud2\n"); 3321537d39dfSMaxim Levitsky 3322537d39dfSMaxim Levitsky asm volatile ("vmmcall\n"); 3323537d39dfSMaxim Levitsky } 3324537d39dfSMaxim Levitsky 3325537d39dfSMaxim Levitsky static void svm_lbrv_test0(void) 3326537d39dfSMaxim Levitsky { 3327537d39dfSMaxim Levitsky report(true, "Basic LBR test"); 3328537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3329537d39dfSMaxim Levitsky DO_BRANCH(host_branch0); 3330537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3331537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3332537d39dfSMaxim Levitsky 3333537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 3334537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3335537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 3336537d39dfSMaxim Levitsky 3337537d39dfSMaxim Levitsky check_lbr(&host_branch0_from, &host_branch0_to); 3338537d39dfSMaxim Levitsky } 3339537d39dfSMaxim Levitsky 3340537d39dfSMaxim Levitsky static void svm_lbrv_test1(void) 3341537d39dfSMaxim Levitsky { 3342537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(1)"); 3343537d39dfSMaxim Levitsky 3344537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest1; 3345537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 3346537d39dfSMaxim Levitsky 3347537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3348537d39dfSMaxim Levitsky DO_BRANCH(host_branch1); 3349537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 3350537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3351537d39dfSMaxim Levitsky 3352537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 3353537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 3354537d39dfSMaxim Levitsky vmcb->control.exit_code); 3355537d39dfSMaxim Levitsky return; 3356537d39dfSMaxim Levitsky } 3357537d39dfSMaxim Levitsky 3358537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 3359537d39dfSMaxim Levitsky check_lbr(&guest_branch0_from, &guest_branch0_to); 3360537d39dfSMaxim Levitsky } 3361537d39dfSMaxim Levitsky 3362537d39dfSMaxim Levitsky static void svm_lbrv_test2(void) 3363537d39dfSMaxim Levitsky { 3364537d39dfSMaxim Levitsky report(true, "Test that without LBRV enabled, guest LBR state does 'leak' to the host(2)"); 3365537d39dfSMaxim Levitsky 3366537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest2; 3367537d39dfSMaxim Levitsky vmcb->control.virt_ext = 0; 3368537d39dfSMaxim Levitsky 3369537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3370537d39dfSMaxim Levitsky DO_BRANCH(host_branch2); 3371537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3372537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 3373537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3374537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3375537d39dfSMaxim Levitsky 3376537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 3377537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 3378537d39dfSMaxim Levitsky vmcb->control.exit_code); 3379537d39dfSMaxim Levitsky return; 3380537d39dfSMaxim Levitsky } 3381537d39dfSMaxim Levitsky 3382537d39dfSMaxim Levitsky check_dbgctl(dbgctl, 0); 3383537d39dfSMaxim Levitsky check_lbr(&guest_branch2_from, &guest_branch2_to); 3384537d39dfSMaxim Levitsky } 3385537d39dfSMaxim Levitsky 3386537d39dfSMaxim Levitsky static void svm_lbrv_nested_test1(void) 3387537d39dfSMaxim Levitsky { 3388537d39dfSMaxim Levitsky if (!lbrv_supported()) { 3389537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 3390537d39dfSMaxim Levitsky return; 3391537d39dfSMaxim Levitsky } 3392537d39dfSMaxim Levitsky 3393537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (1)"); 3394537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest1; 3395537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 3396537d39dfSMaxim Levitsky vmcb->save.dbgctl = DEBUGCTLMSR_LBR; 3397537d39dfSMaxim Levitsky 3398537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3399537d39dfSMaxim Levitsky DO_BRANCH(host_branch3); 3400537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 3401537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3402537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3403537d39dfSMaxim Levitsky 3404537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 3405537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 3406537d39dfSMaxim Levitsky vmcb->control.exit_code); 3407537d39dfSMaxim Levitsky return; 3408537d39dfSMaxim Levitsky } 3409537d39dfSMaxim Levitsky 3410537d39dfSMaxim Levitsky if (vmcb->save.dbgctl != 0) { 3411537d39dfSMaxim Levitsky report(false, "unexpected virtual guest MSR_IA32_DEBUGCTLMSR value 0x%lx", vmcb->save.dbgctl); 3412537d39dfSMaxim Levitsky return; 3413537d39dfSMaxim Levitsky } 3414537d39dfSMaxim Levitsky 3415537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 3416537d39dfSMaxim Levitsky check_lbr(&host_branch3_from, &host_branch3_to); 3417537d39dfSMaxim Levitsky } 3418537d39dfSMaxim Levitsky static void svm_lbrv_nested_test2(void) 3419537d39dfSMaxim Levitsky { 3420537d39dfSMaxim Levitsky if (!lbrv_supported()) { 3421537d39dfSMaxim Levitsky report_skip("LBRV not supported in the guest"); 3422537d39dfSMaxim Levitsky return; 3423537d39dfSMaxim Levitsky } 3424537d39dfSMaxim Levitsky 3425537d39dfSMaxim Levitsky report(true, "Test that with LBRV enabled, guest LBR state doesn't leak (2)"); 3426537d39dfSMaxim Levitsky vmcb->save.rip = (ulong)svm_lbrv_test_guest2; 3427537d39dfSMaxim Levitsky vmcb->control.virt_ext = LBR_CTL_ENABLE_MASK; 3428537d39dfSMaxim Levitsky 3429537d39dfSMaxim Levitsky vmcb->save.dbgctl = 0; 3430537d39dfSMaxim Levitsky vmcb->save.br_from = (u64)&host_branch2_from; 3431537d39dfSMaxim Levitsky vmcb->save.br_to = (u64)&host_branch2_to; 3432537d39dfSMaxim Levitsky 3433537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, DEBUGCTLMSR_LBR); 3434537d39dfSMaxim Levitsky DO_BRANCH(host_branch4); 3435537d39dfSMaxim Levitsky SVM_BARE_VMRUN; 3436537d39dfSMaxim Levitsky dbgctl = rdmsr(MSR_IA32_DEBUGCTLMSR); 3437537d39dfSMaxim Levitsky wrmsr(MSR_IA32_DEBUGCTLMSR, 0); 3438537d39dfSMaxim Levitsky 3439537d39dfSMaxim Levitsky if (vmcb->control.exit_code != SVM_EXIT_VMMCALL) { 3440537d39dfSMaxim Levitsky report(false, "VMEXIT not due to vmmcall. Exit reason 0x%x", 3441537d39dfSMaxim Levitsky vmcb->control.exit_code); 3442537d39dfSMaxim Levitsky return; 3443537d39dfSMaxim Levitsky } 3444537d39dfSMaxim Levitsky 3445537d39dfSMaxim Levitsky check_dbgctl(dbgctl, DEBUGCTLMSR_LBR); 3446537d39dfSMaxim Levitsky check_lbr(&host_branch4_from, &host_branch4_to); 3447537d39dfSMaxim Levitsky } 3448537d39dfSMaxim Levitsky 3449c45bccfcSMaxim Levitsky 3450c45bccfcSMaxim Levitsky // test that a nested guest which does enable INTR interception 3451c45bccfcSMaxim Levitsky // but doesn't enable virtual interrupt masking works 3452c45bccfcSMaxim Levitsky 3453c45bccfcSMaxim Levitsky static volatile int dummy_isr_recevied; 3454c45bccfcSMaxim Levitsky static void dummy_isr(isr_regs_t *regs) 3455c45bccfcSMaxim Levitsky { 3456c45bccfcSMaxim Levitsky dummy_isr_recevied++; 3457c45bccfcSMaxim Levitsky eoi(); 3458c45bccfcSMaxim Levitsky } 3459c45bccfcSMaxim Levitsky 3460c45bccfcSMaxim Levitsky 3461c45bccfcSMaxim Levitsky static volatile int nmi_recevied; 3462c45bccfcSMaxim Levitsky static void dummy_nmi_handler(struct ex_regs *regs) 3463c45bccfcSMaxim Levitsky { 3464c45bccfcSMaxim Levitsky nmi_recevied++; 3465c45bccfcSMaxim Levitsky } 3466c45bccfcSMaxim Levitsky 3467c45bccfcSMaxim Levitsky 3468c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_run_guest(volatile int *counter, int expected_vmexit) 3469c45bccfcSMaxim Levitsky { 3470c45bccfcSMaxim Levitsky if (counter) 3471c45bccfcSMaxim Levitsky *counter = 0; 3472c45bccfcSMaxim Levitsky 3473c45bccfcSMaxim Levitsky sti(); // host IF value should not matter 3474c45bccfcSMaxim Levitsky clgi(); // vmrun will set back GI to 1 3475c45bccfcSMaxim Levitsky 3476c45bccfcSMaxim Levitsky svm_vmrun(); 3477c45bccfcSMaxim Levitsky 3478c45bccfcSMaxim Levitsky if (counter) 3479c45bccfcSMaxim Levitsky report(!*counter, "No interrupt expected"); 3480c45bccfcSMaxim Levitsky 3481c45bccfcSMaxim Levitsky stgi(); 3482c45bccfcSMaxim Levitsky 3483c45bccfcSMaxim Levitsky if (counter) 3484c45bccfcSMaxim Levitsky report(*counter == 1, "Interrupt is expected"); 3485c45bccfcSMaxim Levitsky 3486c45bccfcSMaxim Levitsky report (vmcb->control.exit_code == expected_vmexit, "Test expected VM exit"); 3487c45bccfcSMaxim Levitsky report(vmcb->save.rflags & X86_EFLAGS_IF, "Guest should have EFLAGS.IF set now"); 3488c45bccfcSMaxim Levitsky cli(); 3489c45bccfcSMaxim Levitsky } 3490c45bccfcSMaxim Levitsky 3491c45bccfcSMaxim Levitsky 3492c45bccfcSMaxim Levitsky // subtest: test that enabling EFLAGS.IF is enought to trigger an interrupt 3493c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if_guest(struct svm_test *test) 3494c45bccfcSMaxim Levitsky { 3495c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3496c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3497c45bccfcSMaxim Levitsky sti(); 3498c45bccfcSMaxim Levitsky asm volatile("nop"); 3499c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3500c45bccfcSMaxim Levitsky } 3501c45bccfcSMaxim Levitsky 3502c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_if(void) 3503c45bccfcSMaxim Levitsky { 3504c45bccfcSMaxim Levitsky // make a physical interrupt to be pending 3505c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3506c45bccfcSMaxim Levitsky 3507c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3508c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3509c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3510c45bccfcSMaxim Levitsky 3511c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_if_guest); 3512c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3513c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3514c45bccfcSMaxim Levitsky } 3515c45bccfcSMaxim Levitsky 3516c45bccfcSMaxim Levitsky 3517c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3518c45bccfcSMaxim Levitsky // if GIF is not intercepted 3519c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest(struct svm_test *test) 3520c45bccfcSMaxim Levitsky { 3521c45bccfcSMaxim Levitsky 3522c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3523c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3524c45bccfcSMaxim Levitsky 3525c45bccfcSMaxim Levitsky // clear GIF and enable IF 3526c45bccfcSMaxim Levitsky // that should still not cause VM exit 3527c45bccfcSMaxim Levitsky clgi(); 3528c45bccfcSMaxim Levitsky sti(); 3529c45bccfcSMaxim Levitsky asm volatile("nop"); 3530c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3531c45bccfcSMaxim Levitsky 3532c45bccfcSMaxim Levitsky stgi(); 3533c45bccfcSMaxim Levitsky asm volatile("nop"); 3534c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3535c45bccfcSMaxim Levitsky } 3536c45bccfcSMaxim Levitsky 3537c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif(void) 3538c45bccfcSMaxim Levitsky { 3539c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3540c45bccfcSMaxim Levitsky 3541c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3542c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3543c45bccfcSMaxim Levitsky vmcb->save.rflags &= ~X86_EFLAGS_IF; 3544c45bccfcSMaxim Levitsky 3545c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest); 3546c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3547c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3548c45bccfcSMaxim Levitsky } 3549c45bccfcSMaxim Levitsky 3550c45bccfcSMaxim Levitsky 3551c45bccfcSMaxim Levitsky 3552c45bccfcSMaxim Levitsky // subtest: test that a clever guest can trigger an interrupt by setting GIF 3553c45bccfcSMaxim Levitsky // if GIF is not intercepted and interrupt comes after guest 3554c45bccfcSMaxim Levitsky // started running 3555c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif_guest2(struct svm_test *test) 3556c45bccfcSMaxim Levitsky { 3557c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3558c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3559c45bccfcSMaxim Levitsky 3560c45bccfcSMaxim Levitsky clgi(); 3561c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | 0x55, 0); 3562c45bccfcSMaxim Levitsky report(!dummy_isr_recevied, "No interrupt expected"); 3563c45bccfcSMaxim Levitsky 3564c45bccfcSMaxim Levitsky stgi(); 3565c45bccfcSMaxim Levitsky asm volatile("nop"); 3566c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3567c45bccfcSMaxim Levitsky } 3568c45bccfcSMaxim Levitsky 3569c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_gif2(void) 3570c45bccfcSMaxim Levitsky { 3571c45bccfcSMaxim Levitsky handle_irq(0x55, dummy_isr); 3572c45bccfcSMaxim Levitsky 3573c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_INTR); 3574c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3575c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3576c45bccfcSMaxim Levitsky 3577c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_gif_guest2); 3578c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&dummy_isr_recevied, SVM_EXIT_INTR); 3579c45bccfcSMaxim Levitsky } 3580c45bccfcSMaxim Levitsky 3581c45bccfcSMaxim Levitsky 3582c45bccfcSMaxim Levitsky // subtest: test that pending NMI will be handled when guest enables GIF 3583c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi_guest(struct svm_test *test) 3584c45bccfcSMaxim Levitsky { 3585c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3586c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3587c45bccfcSMaxim Levitsky cli(); // should have no effect 3588c45bccfcSMaxim Levitsky 3589c45bccfcSMaxim Levitsky clgi(); 3590c45bccfcSMaxim Levitsky asm volatile("nop"); 3591c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_NMI, 0); 3592c45bccfcSMaxim Levitsky sti(); // should have no effect 3593c45bccfcSMaxim Levitsky asm volatile("nop"); 3594c45bccfcSMaxim Levitsky report(!nmi_recevied, "No NMI expected"); 3595c45bccfcSMaxim Levitsky 3596c45bccfcSMaxim Levitsky stgi(); 3597c45bccfcSMaxim Levitsky asm volatile("nop"); 3598c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3599c45bccfcSMaxim Levitsky } 3600c45bccfcSMaxim Levitsky 3601c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_nmi(void) 3602c45bccfcSMaxim Levitsky { 3603c45bccfcSMaxim Levitsky handle_exception(2, dummy_nmi_handler); 3604c45bccfcSMaxim Levitsky 3605c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_NMI); 3606c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3607c45bccfcSMaxim Levitsky vmcb->save.rflags |= X86_EFLAGS_IF; 3608c45bccfcSMaxim Levitsky 3609c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_nmi_guest); 3610c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(&nmi_recevied, SVM_EXIT_NMI); 3611c45bccfcSMaxim Levitsky } 3612c45bccfcSMaxim Levitsky 3613c45bccfcSMaxim Levitsky // test that pending SMI will be handled when guest enables GIF 3614c45bccfcSMaxim Levitsky // TODO: can't really count #SMIs so just test that guest doesn't hang 3615c45bccfcSMaxim Levitsky // and VMexits on SMI 3616c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi_guest(struct svm_test *test) 3617c45bccfcSMaxim Levitsky { 3618c45bccfcSMaxim Levitsky asm volatile("nop;nop;nop;nop"); 3619c45bccfcSMaxim Levitsky 3620c45bccfcSMaxim Levitsky clgi(); 3621c45bccfcSMaxim Levitsky asm volatile("nop"); 3622c45bccfcSMaxim Levitsky apic_icr_write(APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0); 3623c45bccfcSMaxim Levitsky sti(); // should have no effect 3624c45bccfcSMaxim Levitsky asm volatile("nop"); 3625c45bccfcSMaxim Levitsky stgi(); 3626c45bccfcSMaxim Levitsky asm volatile("nop"); 3627c45bccfcSMaxim Levitsky report(0, "must not reach here"); 3628c45bccfcSMaxim Levitsky } 3629c45bccfcSMaxim Levitsky 3630c45bccfcSMaxim Levitsky static void svm_intr_intercept_mix_smi(void) 3631c45bccfcSMaxim Levitsky { 3632c45bccfcSMaxim Levitsky vmcb->control.intercept |= (1 << INTERCEPT_SMI); 3633c45bccfcSMaxim Levitsky vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; 3634c45bccfcSMaxim Levitsky test_set_guest(svm_intr_intercept_mix_smi_guest); 3635c45bccfcSMaxim Levitsky svm_intr_intercept_mix_run_guest(NULL, SVM_EXIT_SMI); 3636c45bccfcSMaxim Levitsky } 3637c45bccfcSMaxim Levitsky 3638*712840d5SManali Shukla static struct svm_test svm_tests[] = { 3639ad879127SKrish Sadhukhan { "null", default_supported, default_prepare, 3640ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3641ad879127SKrish Sadhukhan default_finished, null_check }, 3642ad879127SKrish Sadhukhan { "vmrun", default_supported, default_prepare, 3643ad879127SKrish Sadhukhan default_prepare_gif_clear, test_vmrun, 3644ad879127SKrish Sadhukhan default_finished, check_vmrun }, 3645ad879127SKrish Sadhukhan { "ioio", default_supported, prepare_ioio, 3646ad879127SKrish Sadhukhan default_prepare_gif_clear, test_ioio, 3647ad879127SKrish Sadhukhan ioio_finished, check_ioio }, 3648ad879127SKrish Sadhukhan { "vmrun intercept check", default_supported, prepare_no_vmrun_int, 3649ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, default_finished, 3650ad879127SKrish Sadhukhan check_no_vmrun_int }, 3651401299a5SPaolo Bonzini { "rsm", default_supported, 3652401299a5SPaolo Bonzini prepare_rsm_intercept, default_prepare_gif_clear, 3653401299a5SPaolo Bonzini test_rsm_intercept, finished_rsm_intercept, check_rsm_intercept }, 3654ad879127SKrish Sadhukhan { "cr3 read intercept", default_supported, 3655ad879127SKrish Sadhukhan prepare_cr3_intercept, default_prepare_gif_clear, 3656ad879127SKrish Sadhukhan test_cr3_intercept, default_finished, check_cr3_intercept }, 3657ad879127SKrish Sadhukhan { "cr3 read nointercept", default_supported, default_prepare, 3658ad879127SKrish Sadhukhan default_prepare_gif_clear, test_cr3_intercept, default_finished, 3659ad879127SKrish Sadhukhan check_cr3_nointercept }, 3660ad879127SKrish Sadhukhan { "cr3 read intercept emulate", smp_supported, 3661ad879127SKrish Sadhukhan prepare_cr3_intercept_bypass, default_prepare_gif_clear, 3662ad879127SKrish Sadhukhan test_cr3_intercept_bypass, default_finished, check_cr3_intercept }, 3663ad879127SKrish Sadhukhan { "dr intercept check", default_supported, prepare_dr_intercept, 3664ad879127SKrish Sadhukhan default_prepare_gif_clear, test_dr_intercept, dr_intercept_finished, 3665ad879127SKrish Sadhukhan check_dr_intercept }, 3666ad879127SKrish Sadhukhan { "next_rip", next_rip_supported, prepare_next_rip, 3667ad879127SKrish Sadhukhan default_prepare_gif_clear, test_next_rip, 3668ad879127SKrish Sadhukhan default_finished, check_next_rip }, 3669ad879127SKrish Sadhukhan { "msr intercept check", default_supported, prepare_msr_intercept, 3670ad879127SKrish Sadhukhan default_prepare_gif_clear, test_msr_intercept, 3671ad879127SKrish Sadhukhan msr_intercept_finished, check_msr_intercept }, 3672ad879127SKrish Sadhukhan { "mode_switch", default_supported, prepare_mode_switch, 3673ad879127SKrish Sadhukhan default_prepare_gif_clear, test_mode_switch, 3674ad879127SKrish Sadhukhan mode_switch_finished, check_mode_switch }, 3675ad879127SKrish Sadhukhan { "asid_zero", default_supported, prepare_asid_zero, 3676ad879127SKrish Sadhukhan default_prepare_gif_clear, test_asid_zero, 3677ad879127SKrish Sadhukhan default_finished, check_asid_zero }, 3678ad879127SKrish Sadhukhan { "sel_cr0_bug", default_supported, sel_cr0_bug_prepare, 3679ad879127SKrish Sadhukhan default_prepare_gif_clear, sel_cr0_bug_test, 3680ad879127SKrish Sadhukhan sel_cr0_bug_finished, sel_cr0_bug_check }, 3681ad879127SKrish Sadhukhan { "npt_nx", npt_supported, npt_nx_prepare, 3682ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3683ad879127SKrish Sadhukhan default_finished, npt_nx_check }, 36846faca2a5SKrish Sadhukhan { "npt_np", npt_supported, npt_np_prepare, 36856faca2a5SKrish Sadhukhan default_prepare_gif_clear, npt_np_test, 36866faca2a5SKrish Sadhukhan default_finished, npt_np_check }, 3687ad879127SKrish Sadhukhan { "npt_us", npt_supported, npt_us_prepare, 3688ad879127SKrish Sadhukhan default_prepare_gif_clear, npt_us_test, 3689ad879127SKrish Sadhukhan default_finished, npt_us_check }, 3690ad879127SKrish Sadhukhan { "npt_rw", npt_supported, npt_rw_prepare, 3691ad879127SKrish Sadhukhan default_prepare_gif_clear, npt_rw_test, 3692ad879127SKrish Sadhukhan default_finished, npt_rw_check }, 3693ad879127SKrish Sadhukhan { "npt_rw_pfwalk", npt_supported, npt_rw_pfwalk_prepare, 3694ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3695ad879127SKrish Sadhukhan default_finished, npt_rw_pfwalk_check }, 3696ad879127SKrish Sadhukhan { "npt_l1mmio", npt_supported, npt_l1mmio_prepare, 3697ad879127SKrish Sadhukhan default_prepare_gif_clear, npt_l1mmio_test, 3698ad879127SKrish Sadhukhan default_finished, npt_l1mmio_check }, 3699ad879127SKrish Sadhukhan { "npt_rw_l1mmio", npt_supported, npt_rw_l1mmio_prepare, 3700ad879127SKrish Sadhukhan default_prepare_gif_clear, npt_rw_l1mmio_test, 3701ad879127SKrish Sadhukhan default_finished, npt_rw_l1mmio_check }, 370210a65fc4SNadav Amit { "tsc_adjust", tsc_adjust_supported, tsc_adjust_prepare, 3703ad879127SKrish Sadhukhan default_prepare_gif_clear, tsc_adjust_test, 3704ad879127SKrish Sadhukhan default_finished, tsc_adjust_check }, 3705ad879127SKrish Sadhukhan { "latency_run_exit", default_supported, latency_prepare, 3706ad879127SKrish Sadhukhan default_prepare_gif_clear, latency_test, 3707ad879127SKrish Sadhukhan latency_finished, latency_check }, 3708f7fa53dcSPaolo Bonzini { "latency_run_exit_clean", default_supported, latency_prepare, 3709f7fa53dcSPaolo Bonzini default_prepare_gif_clear, latency_test, 3710f7fa53dcSPaolo Bonzini latency_finished_clean, latency_check }, 3711ad879127SKrish Sadhukhan { "latency_svm_insn", default_supported, lat_svm_insn_prepare, 3712ad879127SKrish Sadhukhan default_prepare_gif_clear, null_test, 3713ad879127SKrish Sadhukhan lat_svm_insn_finished, lat_svm_insn_check }, 37144b4fb247SPaolo Bonzini { "exc_inject", default_supported, exc_inject_prepare, 37154b4fb247SPaolo Bonzini default_prepare_gif_clear, exc_inject_test, 37164b4fb247SPaolo Bonzini exc_inject_finished, exc_inject_check }, 3717ad879127SKrish Sadhukhan { "pending_event", default_supported, pending_event_prepare, 3718ad879127SKrish Sadhukhan default_prepare_gif_clear, 3719ad879127SKrish Sadhukhan pending_event_test, pending_event_finished, pending_event_check }, 372085dc2aceSPaolo Bonzini { "pending_event_cli", default_supported, pending_event_cli_prepare, 372185dc2aceSPaolo Bonzini pending_event_cli_prepare_gif_clear, 372285dc2aceSPaolo Bonzini pending_event_cli_test, pending_event_cli_finished, 372385dc2aceSPaolo Bonzini pending_event_cli_check }, 372485dc2aceSPaolo Bonzini { "interrupt", default_supported, interrupt_prepare, 372585dc2aceSPaolo Bonzini default_prepare_gif_clear, interrupt_test, 372685dc2aceSPaolo Bonzini interrupt_finished, interrupt_check }, 3727d4db486bSCathy Avery { "nmi", default_supported, nmi_prepare, 3728d4db486bSCathy Avery default_prepare_gif_clear, nmi_test, 3729d4db486bSCathy Avery nmi_finished, nmi_check }, 37309da1f4d8SCathy Avery { "nmi_hlt", smp_supported, nmi_prepare, 37319da1f4d8SCathy Avery default_prepare_gif_clear, nmi_hlt_test, 37329da1f4d8SCathy Avery nmi_hlt_finished, nmi_hlt_check }, 37339c838954SCathy Avery { "virq_inject", default_supported, virq_inject_prepare, 37349c838954SCathy Avery default_prepare_gif_clear, virq_inject_test, 37359c838954SCathy Avery virq_inject_finished, virq_inject_check }, 3736da338a31SMaxim Levitsky { "reg_corruption", default_supported, reg_corruption_prepare, 3737da338a31SMaxim Levitsky default_prepare_gif_clear, reg_corruption_test, 3738da338a31SMaxim Levitsky reg_corruption_finished, reg_corruption_check }, 37394770e9c8SCathy Avery { "svm_init_startup_test", smp_supported, init_startup_prepare, 37404770e9c8SCathy Avery default_prepare_gif_clear, null_test, 37414770e9c8SCathy Avery init_startup_finished, init_startup_check }, 3742d5da6dfeSCathy Avery { "svm_init_intercept_test", smp_supported, init_intercept_prepare, 3743d5da6dfeSCathy Avery default_prepare_gif_clear, init_intercept_test, 3744d5da6dfeSCathy Avery init_intercept_finished, init_intercept_check, .on_vcpu = 2 }, 37457839b0ecSKrish Sadhukhan { "host_rflags", default_supported, host_rflags_prepare, 37467839b0ecSKrish Sadhukhan host_rflags_prepare_gif_clear, host_rflags_test, 37477839b0ecSKrish Sadhukhan host_rflags_finished, host_rflags_check }, 3748f6972bd6SLara Lazier { "vgif", vgif_supported, prepare_vgif_enabled, 3749f6972bd6SLara Lazier default_prepare_gif_clear, test_vgif, vgif_finished, 3750f6972bd6SLara Lazier vgif_check }, 3751f32183f5SJim Mattson TEST(svm_cr4_osxsave_test), 3752ba29942cSKrish Sadhukhan TEST(svm_guest_state_test), 3753916635a8SSean Christopherson TEST(svm_npt_rsvd_bits_test), 37547a57ef5dSMaxim Levitsky TEST(svm_vmrun_errata_test), 37550b6f6cedSKrish Sadhukhan TEST(svm_vmload_vmsave), 3756665f5677SKrish Sadhukhan TEST(svm_test_singlestep), 37575c92f156SManali Shukla TEST(svm_nm_test), 3758c8e16d20SManali Shukla TEST(svm_int3_test), 3759af13008dSManali Shukla TEST(svm_into_test), 3760537d39dfSMaxim Levitsky TEST(svm_lbrv_test0), 3761537d39dfSMaxim Levitsky TEST(svm_lbrv_test1), 3762537d39dfSMaxim Levitsky TEST(svm_lbrv_test2), 3763537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test1), 3764537d39dfSMaxim Levitsky TEST(svm_lbrv_nested_test2), 3765c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_if), 3766c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif), 3767c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_gif2), 3768c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_nmi), 3769c45bccfcSMaxim Levitsky TEST(svm_intr_intercept_mix_smi), 3770a8503d50SMaxim Levitsky TEST(svm_tsc_scale_test), 37718650dffeSMaxim Levitsky TEST(pause_filter_test), 3772ad879127SKrish Sadhukhan { NULL, NULL, NULL, NULL, NULL, NULL, NULL } 3773ad879127SKrish Sadhukhan }; 3774*712840d5SManali Shukla 3775*712840d5SManali Shukla int main(int ac, char **av) 3776*712840d5SManali Shukla { 3777*712840d5SManali Shukla pteval_t opt_mask = 0; 3778*712840d5SManali Shukla 3779*712840d5SManali Shukla __setup_vm(&opt_mask); 3780*712840d5SManali Shukla return run_svm_tests(ac, av, svm_tests); 3781*712840d5SManali Shukla } 3782