1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright © 2020 Amazon.com, Inc. or its affiliates.
7 * Userspace hypercall testing
10 #include "test_util.h"
12 #include "processor.h"
15 #define HCALL_REGION_GPA 0xc0000000ULL
16 #define HCALL_REGION_SLOT 10
19 #define ARGVALUE(x) (0xdeadbeef5a5a0000UL + x)
20 #define RETVALUE 0xcafef00dfbfbffffUL
22 #define XEN_HYPERCALL_MSR 0x40000200
23 #define HV_GUEST_OS_ID_MSR 0x40000000
24 #define HV_HYPERCALL_MSR 0x40000001
26 #define HVCALL_SIGNAL_EVENT 0x005d
27 #define HV_STATUS_INVALID_ALIGNMENT 4
29 static void guest_code(void)
31 unsigned long rax
= INPUTVALUE
;
32 unsigned long rdi
= ARGVALUE(1);
33 unsigned long rsi
= ARGVALUE(2);
34 unsigned long rdx
= ARGVALUE(3);
36 register unsigned long r10
__asm__("r10") = ARGVALUE(4);
37 register unsigned long r8
__asm__("r8") = ARGVALUE(5);
38 register unsigned long r9
__asm__("r9") = ARGVALUE(6);
40 /* First a direct invocation of 'vmcall' */
41 __asm__
__volatile__("vmcall" :
43 "a"(rax
), "D"(rdi
), "S"(rsi
), "d"(rdx
),
44 "r"(r10
), "r"(r8
), "r"(r9
));
45 GUEST_ASSERT(rax
== RETVALUE
);
47 /* Fill in the Xen hypercall page */
48 __asm__
__volatile__("wrmsr" : : "c" (XEN_HYPERCALL_MSR
),
49 "a" (HCALL_REGION_GPA
& 0xffffffff),
50 "d" (HCALL_REGION_GPA
>> 32));
52 /* Set Hyper-V Guest OS ID */
53 __asm__
__volatile__("wrmsr" : : "c" (HV_GUEST_OS_ID_MSR
),
56 /* Hyper-V hypercall page */
57 u64 msrval
= HCALL_REGION_GPA
+ PAGE_SIZE
+ 1;
58 __asm__
__volatile__("wrmsr" : : "c" (HV_HYPERCALL_MSR
),
59 "a" (msrval
& 0xffffffff),
62 /* Invoke a Xen hypercall */
63 __asm__
__volatile__("call *%1" : "=a"(rax
) :
64 "r"(HCALL_REGION_GPA
+ INPUTVALUE
* 32),
65 "a"(rax
), "D"(rdi
), "S"(rsi
), "d"(rdx
),
66 "r"(r10
), "r"(r8
), "r"(r9
));
67 GUEST_ASSERT(rax
== RETVALUE
);
69 /* Invoke a Hyper-V hypercall */
71 rcx
= HVCALL_SIGNAL_EVENT
; /* code */
72 rdx
= 0x5a5a5a5a; /* ingpa (badly aligned) */
73 __asm__
__volatile__("call *%1" : "=a"(rax
) :
74 "r"(HCALL_REGION_GPA
+ PAGE_SIZE
),
75 "a"(rax
), "c"(rcx
), "d"(rdx
),
77 GUEST_ASSERT(rax
== HV_STATUS_INVALID_ALIGNMENT
);
82 int main(int argc
, char *argv
[])
84 unsigned int xen_caps
;
85 struct kvm_vcpu
*vcpu
;
88 xen_caps
= kvm_check_cap(KVM_CAP_XEN_HVM
);
89 TEST_REQUIRE(xen_caps
& KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL
);
91 vm
= vm_create_with_one_vcpu(&vcpu
, guest_code
);
92 vcpu_set_hv_cpuid(vcpu
);
94 struct kvm_xen_hvm_config hvmc
= {
95 .flags
= KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL
,
96 .msr
= XEN_HYPERCALL_MSR
,
98 vm_ioctl(vm
, KVM_XEN_HVM_CONFIG
, &hvmc
);
100 /* Map a region for the hypercall pages */
101 vm_userspace_mem_region_add(vm
, VM_MEM_SRC_ANONYMOUS
,
102 HCALL_REGION_GPA
, HCALL_REGION_SLOT
, 2, 0);
103 virt_map(vm
, HCALL_REGION_GPA
, HCALL_REGION_GPA
, 2);
106 volatile struct kvm_run
*run
= vcpu
->run
;
111 if (run
->exit_reason
== KVM_EXIT_XEN
) {
112 TEST_ASSERT_EQ(run
->xen
.type
, KVM_EXIT_XEN_HCALL
);
113 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.cpl
, 0);
114 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.longmode
, 1);
115 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.input
, INPUTVALUE
);
116 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[0], ARGVALUE(1));
117 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[1], ARGVALUE(2));
118 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[2], ARGVALUE(3));
119 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[3], ARGVALUE(4));
120 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[4], ARGVALUE(5));
121 TEST_ASSERT_EQ(run
->xen
.u
.hcall
.params
[5], ARGVALUE(6));
122 run
->xen
.u
.hcall
.result
= RETVALUE
;
126 TEST_ASSERT_KVM_EXIT_REASON(vcpu
, KVM_EXIT_IO
);
128 switch (get_ucall(vcpu
, &uc
)) {
130 REPORT_GUEST_ASSERT(uc
);
137 TEST_FAIL("Unknown ucall 0x%lx.", uc
.cmd
);