| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * svm_int_ctl_test |
| * |
| * Copyright (C) 2021, Red Hat, Inc. |
| * |
| * Nested SVM testing: test simultaneous use of V_IRQ from L1 and L0. |
| */ |
| |
| #include "test_util.h" |
| #include "kvm_util.h" |
| #include "processor.h" |
| #include "svm_util.h" |
| #include "apic.h" |
| |
| bool vintr_irq_called; |
| bool intr_irq_called; |
| |
| #define VINTR_IRQ_NUMBER 0x20 |
| #define INTR_IRQ_NUMBER 0x30 |
| |
| static void vintr_irq_handler(struct ex_regs *regs) |
| { |
| vintr_irq_called = true; |
| } |
| |
| static void intr_irq_handler(struct ex_regs *regs) |
| { |
| x2apic_write_reg(APIC_EOI, 0x00); |
| intr_irq_called = true; |
| } |
| |
| static void l2_guest_code(struct svm_test_data *svm) |
| { |
| /* This code raises interrupt INTR_IRQ_NUMBER in the L1's LAPIC, |
| * and since L1 didn't enable virtual interrupt masking, |
| * L2 should receive it and not L1. |
| * |
| * L2 also has virtual interrupt 'VINTR_IRQ_NUMBER' pending in V_IRQ |
| * so it should also receive it after the following 'sti'. |
| */ |
| x2apic_write_reg(APIC_ICR, |
| APIC_DEST_SELF | APIC_INT_ASSERT | INTR_IRQ_NUMBER); |
| |
| __asm__ __volatile__( |
| "sti\n" |
| "nop\n" |
| ); |
| |
| GUEST_ASSERT(vintr_irq_called); |
| GUEST_ASSERT(intr_irq_called); |
| |
| __asm__ __volatile__( |
| "vmcall\n" |
| ); |
| } |
| |
| static void l1_guest_code(struct svm_test_data *svm) |
| { |
| #define L2_GUEST_STACK_SIZE 64 |
| unsigned long l2_guest_stack[L2_GUEST_STACK_SIZE]; |
| struct vmcb *vmcb = svm->vmcb; |
| |
| x2apic_enable(); |
| |
| /* Prepare for L2 execution. */ |
| generic_svm_setup(svm, l2_guest_code, |
| &l2_guest_stack[L2_GUEST_STACK_SIZE]); |
| |
| /* No virtual interrupt masking */ |
| vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK; |
| |
| /* No intercepts for real and virtual interrupts */ |
| vmcb->control.intercept &= ~(BIT(INTERCEPT_INTR) | BIT(INTERCEPT_VINTR)); |
| |
| /* Make a virtual interrupt VINTR_IRQ_NUMBER pending */ |
| vmcb->control.int_ctl |= V_IRQ_MASK | (0x1 << V_INTR_PRIO_SHIFT); |
| vmcb->control.int_vector = VINTR_IRQ_NUMBER; |
| |
| run_guest(vmcb, svm->vmcb_gpa); |
| GUEST_ASSERT(vmcb->control.exit_code == SVM_EXIT_VMMCALL); |
| GUEST_DONE(); |
| } |
| |
| int main(int argc, char *argv[]) |
| { |
| struct kvm_vcpu *vcpu; |
| vm_vaddr_t svm_gva; |
| struct kvm_vm *vm; |
| struct ucall uc; |
| |
| TEST_REQUIRE(kvm_cpu_has(X86_FEATURE_SVM)); |
| |
| vm = vm_create_with_one_vcpu(&vcpu, l1_guest_code); |
| |
| vm_init_descriptor_tables(vm); |
| vcpu_init_descriptor_tables(vcpu); |
| |
| vm_install_exception_handler(vm, VINTR_IRQ_NUMBER, vintr_irq_handler); |
| vm_install_exception_handler(vm, INTR_IRQ_NUMBER, intr_irq_handler); |
| |
| vcpu_alloc_svm(vm, &svm_gva); |
| vcpu_args_set(vcpu, 1, svm_gva); |
| |
| vcpu_run(vcpu); |
| TEST_ASSERT_KVM_EXIT_REASON(vcpu, KVM_EXIT_IO); |
| |
| switch (get_ucall(vcpu, &uc)) { |
| case UCALL_ABORT: |
| REPORT_GUEST_ASSERT(uc); |
| break; |
| /* NOT REACHED */ |
| case UCALL_DONE: |
| goto done; |
| default: |
| TEST_FAIL("Unknown ucall 0x%lx.", uc.cmd); |
| } |
| done: |
| kvm_vm_free(vm); |
| return 0; |
| } |