1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2020, Google LLC.
5 * Tests for KVM paravirtual feature disablement
7 #include <asm/kvm_para.h>
8 #include <linux/kvm_para.h>
9 #include <linux/stringify.h>
12 #include "kvm_test_harness.h"
14 #include "test_util.h"
16 #include "processor.h"
18 /* VMCALL and VMMCALL are both 3-byte opcodes. */
19 #define HYPERCALL_INSN_SIZE 3
21 static bool quirk_disabled
;
23 static void guest_ud_handler(struct ex_regs
*regs
)
26 regs
->rip
+= HYPERCALL_INSN_SIZE
;
29 static const uint8_t vmx_vmcall
[HYPERCALL_INSN_SIZE
] = { 0x0f, 0x01, 0xc1 };
30 static const uint8_t svm_vmmcall
[HYPERCALL_INSN_SIZE
] = { 0x0f, 0x01, 0xd9 };
32 extern uint8_t hypercall_insn
[HYPERCALL_INSN_SIZE
];
33 static uint64_t do_sched_yield(uint8_t apic_id
)
37 asm volatile("hypercall_insn:\n\t"
38 ".byte 0xcc,0xcc,0xcc\n\t"
40 : "a"((uint64_t)KVM_HC_SCHED_YIELD
), "b"((uint64_t)apic_id
)
46 static void guest_main(void)
48 const uint8_t *native_hypercall_insn
;
49 const uint8_t *other_hypercall_insn
;
52 if (host_cpu_is_intel
) {
53 native_hypercall_insn
= vmx_vmcall
;
54 other_hypercall_insn
= svm_vmmcall
;
55 } else if (host_cpu_is_amd
) {
56 native_hypercall_insn
= svm_vmmcall
;
57 other_hypercall_insn
= vmx_vmcall
;
64 memcpy(hypercall_insn
, other_hypercall_insn
, HYPERCALL_INSN_SIZE
);
66 ret
= do_sched_yield(GET_APIC_ID_FIELD(xapic_read_reg(APIC_ID
)));
69 * If the quirk is disabled, verify that guest_ud_handler() "returned"
70 * -EFAULT and that KVM did NOT patch the hypercall. If the quirk is
71 * enabled, verify that the hypercall succeeded and that KVM patched in
72 * the "right" hypercall.
75 GUEST_ASSERT(ret
== (uint64_t)-EFAULT
);
76 GUEST_ASSERT(!memcmp(other_hypercall_insn
, hypercall_insn
,
77 HYPERCALL_INSN_SIZE
));
80 GUEST_ASSERT(!memcmp(native_hypercall_insn
, hypercall_insn
,
81 HYPERCALL_INSN_SIZE
));
87 KVM_ONE_VCPU_TEST_SUITE(fix_hypercall
);
89 static void enter_guest(struct kvm_vcpu
*vcpu
)
91 struct kvm_run
*run
= vcpu
->run
;
95 switch (get_ucall(vcpu
, &uc
)) {
97 pr_info("%s: %016lx\n", (const char *)uc
.args
[2], uc
.args
[3]);
102 REPORT_GUEST_ASSERT(uc
);
104 TEST_FAIL("Unhandled ucall: %ld\nexit_reason: %u (%s)",
105 uc
.cmd
, run
->exit_reason
, exit_reason_str(run
->exit_reason
));
109 static void test_fix_hypercall(struct kvm_vcpu
*vcpu
, bool disable_quirk
)
111 struct kvm_vm
*vm
= vcpu
->vm
;
113 vm_install_exception_handler(vcpu
->vm
, UD_VECTOR
, guest_ud_handler
);
116 vm_enable_cap(vm
, KVM_CAP_DISABLE_QUIRKS2
,
117 KVM_X86_QUIRK_FIX_HYPERCALL_INSN
);
119 quirk_disabled
= disable_quirk
;
120 sync_global_to_guest(vm
, quirk_disabled
);
122 virt_pg_map(vm
, APIC_DEFAULT_GPA
, APIC_DEFAULT_GPA
);
127 KVM_ONE_VCPU_TEST(fix_hypercall
, enable_quirk
, guest_main
)
129 test_fix_hypercall(vcpu
, false);
132 KVM_ONE_VCPU_TEST(fix_hypercall
, disable_quirk
, guest_main
)
134 test_fix_hypercall(vcpu
, true);
137 int main(int argc
, char *argv
[])
139 TEST_REQUIRE(kvm_check_cap(KVM_CAP_DISABLE_QUIRKS2
) & KVM_X86_QUIRK_FIX_HYPERCALL_INSN
);
141 return test_harness_run(argc
, argv
);