Introduce a new test for Hyper-V nSVM extensions (Hyper-V on KVM) and add a test for enlightened MSR-Bitmap feature: - Intercept access to MSR_FS_BASE in L1 and check that this works with enlightened MSR-Bitmap disabled. - Enabled enlightened MSR-Bitmap and check that the intercept still works as expected. - Intercept access to MSR_GS_BASE but don't clear the corresponding bit from clean fields mask, KVM is supposed to skip updating MSR-Bitmap02 and thus the consequent access to the MSR from L2 will not get intercepted. - Finally, clear the corresponding bit from clean fields mask and check that access to MSR_GS_BASE is now intercepted. The test works with the assumption, that access to MSR_FS_BASE/MSR_GS_BASE is not intercepted for L1. If this ever becomes not true the test will fail as nested_svm_exit_handled_msr() always checks L1's MSR-Bitmap for L2 irrespective of clean fields. The behavior is correct as enlightened MSR-Bitmap feature is just an optimization, KVM is not obliged to ignore updates when the corresponding bit in clean fields stays clear. Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Message-Id: <20220203104620.277031-7-vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
58 lines
1.2 KiB
C
58 lines
1.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* tools/testing/selftests/kvm/include/x86_64/svm_utils.h
|
|
* Header for nested SVM testing
|
|
*
|
|
* Copyright (C) 2020, Red Hat, Inc.
|
|
*/
|
|
|
|
#ifndef SELFTEST_KVM_SVM_UTILS_H
|
|
#define SELFTEST_KVM_SVM_UTILS_H
|
|
|
|
#include <stdint.h>
|
|
#include "svm.h"
|
|
#include "processor.h"
|
|
|
|
#define CPUID_SVM_BIT 2
|
|
#define CPUID_SVM BIT_ULL(CPUID_SVM_BIT)
|
|
|
|
#define SVM_EXIT_MSR 0x07c
|
|
#define SVM_EXIT_VMMCALL 0x081
|
|
|
|
struct svm_test_data {
|
|
/* VMCB */
|
|
struct vmcb *vmcb; /* gva */
|
|
void *vmcb_hva;
|
|
uint64_t vmcb_gpa;
|
|
|
|
/* host state-save area */
|
|
struct vmcb_save_area *save_area; /* gva */
|
|
void *save_area_hva;
|
|
uint64_t save_area_gpa;
|
|
|
|
/* MSR-Bitmap */
|
|
void *msr; /* gva */
|
|
void *msr_hva;
|
|
uint64_t msr_gpa;
|
|
};
|
|
|
|
struct svm_test_data *vcpu_alloc_svm(struct kvm_vm *vm, vm_vaddr_t *p_svm_gva);
|
|
void generic_svm_setup(struct svm_test_data *svm, void *guest_rip, void *guest_rsp);
|
|
void run_guest(struct vmcb *vmcb, uint64_t vmcb_gpa);
|
|
bool nested_svm_supported(void);
|
|
void nested_svm_check_supported(void);
|
|
|
|
static inline bool cpu_has_svm(void)
|
|
{
|
|
u32 eax = 0x80000001, ecx;
|
|
|
|
asm("cpuid" :
|
|
"=a" (eax), "=c" (ecx) : "0" (eax) : "ebx", "edx");
|
|
|
|
return ecx & CPUID_SVM;
|
|
}
|
|
|
|
int open_sev_dev_path_or_exit(void);
|
|
|
|
#endif /* SELFTEST_KVM_SVM_UTILS_H */
|