| /* |
| * Test for x86 KVM_CAP_SYNC_REGS |
| * |
| * Copyright (C) 2018, Google LLC. |
| * |
| * This work is licensed under the terms of the GNU GPL, version 2. |
| * |
| * Verifies expected behavior of x86 KVM_CAP_SYNC_REGS functionality, |
| * including requesting an invalid register set, updates to/from values |
| * in kvm_run.s.regs when kvm_valid_regs and kvm_dirty_regs are toggled. |
| */ |
| |
| #define _GNU_SOURCE /* for program_invocation_short_name */ |
| #include <fcntl.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/ioctl.h> |
| |
| #include "test_util.h" |
| #include "kvm_util.h" |
| #include "x86.h" |
| |
| #define VCPU_ID 5 |
| #define PORT_HOST_SYNC 0x1000 |
| |
| static void __exit_to_l0(uint16_t port, uint64_t arg0, uint64_t arg1) |
| { |
| __asm__ __volatile__("in %[port], %%al" |
| : |
| : [port]"d"(port), "D"(arg0), "S"(arg1) |
| : "rax"); |
| } |
| |
| #define exit_to_l0(_port, _arg0, _arg1) \ |
| __exit_to_l0(_port, (uint64_t) (_arg0), (uint64_t) (_arg1)) |
| |
| #define GUEST_ASSERT(_condition) do { \ |
| if (!(_condition)) \ |
| exit_to_l0(PORT_ABORT, "Failed guest assert: " #_condition, 0);\ |
| } while (0) |
| |
| void guest_code(void) |
| { |
| for (;;) { |
| exit_to_l0(PORT_HOST_SYNC, "hello", 0); |
| asm volatile ("inc %r11"); |
| } |
| } |
| |
| static void compare_regs(struct kvm_regs *left, struct kvm_regs *right) |
| { |
| #define REG_COMPARE(reg) \ |
| TEST_ASSERT(left->reg == right->reg, \ |
| "Register " #reg \ |
| " values did not match: 0x%llx, 0x%llx\n", \ |
| left->reg, right->reg) |
| REG_COMPARE(rax); |
| REG_COMPARE(rbx); |
| REG_COMPARE(rcx); |
| REG_COMPARE(rdx); |
| REG_COMPARE(rsi); |
| REG_COMPARE(rdi); |
| REG_COMPARE(rsp); |
| REG_COMPARE(rbp); |
| REG_COMPARE(r8); |
| REG_COMPARE(r9); |
| REG_COMPARE(r10); |
| REG_COMPARE(r11); |
| REG_COMPARE(r12); |
| REG_COMPARE(r13); |
| REG_COMPARE(r14); |
| REG_COMPARE(r15); |
| REG_COMPARE(rip); |
| REG_COMPARE(rflags); |
| #undef REG_COMPARE |
| } |
| |
| static void compare_sregs(struct kvm_sregs *left, struct kvm_sregs *right) |
| { |
| } |
| |
| static void compare_vcpu_events(struct kvm_vcpu_events *left, |
| struct kvm_vcpu_events *right) |
| { |
| } |
| |
| int main(int argc, char *argv[]) |
| { |
| struct kvm_vm *vm; |
| struct kvm_run *run; |
| struct kvm_regs regs; |
| struct kvm_sregs sregs; |
| struct kvm_vcpu_events events; |
| int rv, cap; |
| |
| /* Tell stdout not to buffer its content */ |
| setbuf(stdout, NULL); |
| |
| cap = kvm_check_cap(KVM_CAP_SYNC_REGS); |
| TEST_ASSERT((unsigned long)cap == KVM_SYNC_X86_VALID_FIELDS, |
| "KVM_CAP_SYNC_REGS (0x%x) != KVM_SYNC_X86_VALID_FIELDS (0x%lx)\n", |
| cap, KVM_SYNC_X86_VALID_FIELDS); |
| |
| /* Create VM */ |
| vm = vm_create_default(VCPU_ID, guest_code); |
| |
| run = vcpu_state(vm, VCPU_ID); |
| |
| /* Request reading invalid register set from VCPU. */ |
| run->kvm_valid_regs = KVM_SYNC_X86_VALID_FIELDS << 1; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(rv < 0 && errno == EINVAL, |
| "Invalid kvm_valid_regs did not cause expected KVM_RUN error: %d\n", |
| rv); |
| vcpu_state(vm, VCPU_ID)->kvm_valid_regs = 0; |
| |
| /* Request setting invalid register set into VCPU. */ |
| run->kvm_dirty_regs = KVM_SYNC_X86_VALID_FIELDS << 1; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(rv < 0 && errno == EINVAL, |
| "Invalid kvm_dirty_regs did not cause expected KVM_RUN error: %d\n", |
| rv); |
| vcpu_state(vm, VCPU_ID)->kvm_dirty_regs = 0; |
| |
| /* Request and verify all valid register sets. */ |
| /* TODO: BUILD TIME CHECK: TEST_ASSERT(KVM_SYNC_X86_NUM_FIELDS != 3); */ |
| run->kvm_valid_regs = KVM_SYNC_X86_VALID_FIELDS; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, |
| "Unexpected exit reason: %u (%s),\n", |
| run->exit_reason, |
| exit_reason_str(run->exit_reason)); |
| |
| vcpu_regs_get(vm, VCPU_ID, ®s); |
| compare_regs(®s, &run->s.regs.regs); |
| |
| vcpu_sregs_get(vm, VCPU_ID, &sregs); |
| compare_sregs(&sregs, &run->s.regs.sregs); |
| |
| vcpu_events_get(vm, VCPU_ID, &events); |
| compare_vcpu_events(&events, &run->s.regs.events); |
| |
| /* Set and verify various register values. */ |
| run->s.regs.regs.r11 = 0xBAD1DEA; |
| run->s.regs.sregs.apic_base = 1 << 11; |
| /* TODO run->s.regs.events.XYZ = ABC; */ |
| |
| run->kvm_valid_regs = KVM_SYNC_X86_VALID_FIELDS; |
| run->kvm_dirty_regs = KVM_SYNC_X86_REGS | KVM_SYNC_X86_SREGS; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, |
| "Unexpected exit reason: %u (%s),\n", |
| run->exit_reason, |
| exit_reason_str(run->exit_reason)); |
| TEST_ASSERT(run->s.regs.regs.r11 == 0xBAD1DEA + 1, |
| "r11 sync regs value incorrect 0x%llx.", |
| run->s.regs.regs.r11); |
| TEST_ASSERT(run->s.regs.sregs.apic_base == 1 << 11, |
| "apic_base sync regs value incorrect 0x%llx.", |
| run->s.regs.sregs.apic_base); |
| |
| vcpu_regs_get(vm, VCPU_ID, ®s); |
| compare_regs(®s, &run->s.regs.regs); |
| |
| vcpu_sregs_get(vm, VCPU_ID, &sregs); |
| compare_sregs(&sregs, &run->s.regs.sregs); |
| |
| vcpu_events_get(vm, VCPU_ID, &events); |
| compare_vcpu_events(&events, &run->s.regs.events); |
| |
| /* Clear kvm_dirty_regs bits, verify new s.regs values are |
| * overwritten with existing guest values. |
| */ |
| run->kvm_valid_regs = KVM_SYNC_X86_VALID_FIELDS; |
| run->kvm_dirty_regs = 0; |
| run->s.regs.regs.r11 = 0xDEADBEEF; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, |
| "Unexpected exit reason: %u (%s),\n", |
| run->exit_reason, |
| exit_reason_str(run->exit_reason)); |
| TEST_ASSERT(run->s.regs.regs.r11 != 0xDEADBEEF, |
| "r11 sync regs value incorrect 0x%llx.", |
| run->s.regs.regs.r11); |
| |
| /* Clear kvm_valid_regs bits and kvm_dirty_bits. |
| * Verify s.regs values are not overwritten with existing guest values |
| * and that guest values are not overwritten with kvm_sync_regs values. |
| */ |
| run->kvm_valid_regs = 0; |
| run->kvm_dirty_regs = 0; |
| run->s.regs.regs.r11 = 0xAAAA; |
| regs.r11 = 0xBAC0; |
| vcpu_regs_set(vm, VCPU_ID, ®s); |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, |
| "Unexpected exit reason: %u (%s),\n", |
| run->exit_reason, |
| exit_reason_str(run->exit_reason)); |
| TEST_ASSERT(run->s.regs.regs.r11 == 0xAAAA, |
| "r11 sync regs value incorrect 0x%llx.", |
| run->s.regs.regs.r11); |
| vcpu_regs_get(vm, VCPU_ID, ®s); |
| TEST_ASSERT(regs.r11 == 0xBAC0 + 1, |
| "r11 guest value incorrect 0x%llx.", |
| regs.r11); |
| |
| /* Clear kvm_valid_regs bits. Verify s.regs values are not overwritten |
| * with existing guest values but that guest values are overwritten |
| * with kvm_sync_regs values. |
| */ |
| run->kvm_valid_regs = 0; |
| run->kvm_dirty_regs = KVM_SYNC_X86_VALID_FIELDS; |
| run->s.regs.regs.r11 = 0xBBBB; |
| rv = _vcpu_run(vm, VCPU_ID); |
| TEST_ASSERT(run->exit_reason == KVM_EXIT_IO, |
| "Unexpected exit reason: %u (%s),\n", |
| run->exit_reason, |
| exit_reason_str(run->exit_reason)); |
| TEST_ASSERT(run->s.regs.regs.r11 == 0xBBBB, |
| "r11 sync regs value incorrect 0x%llx.", |
| run->s.regs.regs.r11); |
| vcpu_regs_get(vm, VCPU_ID, ®s); |
| TEST_ASSERT(regs.r11 == 0xBBBB + 1, |
| "r11 guest value incorrect 0x%llx.", |
| regs.r11); |
| |
| kvm_vm_free(vm); |
| |
| return 0; |
| } |