@@ -85,7 +85,8 @@ tests-common = $(TEST_DIR)/vmexit.$(exe) $(TEST_DIR)/tsc.$(exe) \
$(TEST_DIR)/tsx-ctrl.$(exe) \
$(TEST_DIR)/eventinj.$(exe) \
$(TEST_DIR)/smap.$(exe) \
- $(TEST_DIR)/umip.$(exe)
+ $(TEST_DIR)/umip.$(exe) \
+ $(TEST_DIR)/smm_int_window.$(exe)
# The following test cases are disabled when building EFI tests because they
# use absolute addresses in their inline assembly code, which cannot compile
@@ -34,6 +34,7 @@ tests += $(TEST_DIR)/rdpru.$(exe)
tests += $(TEST_DIR)/pks.$(exe)
tests += $(TEST_DIR)/pmu_lbr.$(exe)
+
ifeq ($(CONFIG_EFI),y)
tests += $(TEST_DIR)/amd_sev.$(exe)
endif
new file mode 100644
@@ -0,0 +1,125 @@
+#include "libcflat.h"
+#include "apic.h"
+#include "processor.h"
+#include "smp.h"
+#include "isr.h"
+#include "delay.h"
+#include "asm/barrier.h"
+#include "alloc_page.h"
+
+volatile int bad_int_received;
+
+extern u64 shadow_label;
+
+static void dummy_ipi_isr(isr_regs_t *regs)
+{
+ /* should never reach here */
+ if (regs->rip == (u64)&shadow_label) {
+ bad_int_received++;
+ }
+ eoi();
+}
+
+
+#define SELF_INT_VECTOR 0xBB
+
+volatile bool test_ended;
+volatile bool send_smi;
+
+static void vcpu1_code(void *data)
+{
+ /*
+ * Flood vCPU0 with #SMIs
+ *
+ * Note that kvm unit tests run with seabios and its #SMI handler
+ * is only installed on vCPU0 (BSP).
+ * Sending #SMI to any other CPU will crash the guest
+
+ * */
+ setup_vm();
+
+ while (!test_ended) {
+
+ if (send_smi) {
+ apic_icr_write(APIC_INT_ASSERT | APIC_DEST_PHYSICAL | APIC_DM_SMI, 0);
+ send_smi = false;
+ }
+ cpu_relax();
+ }
+}
+
+#define MEM_ALLOC_ORDER 16
+
+int main(void)
+{
+ int i;
+ unsigned volatile char *mem;
+
+ setup_vm();
+ cli();
+
+ mem = alloc_pages_flags(MEM_ALLOC_ORDER, AREA_ANY | FLAG_DONTZERO);
+ assert(mem);
+
+ handle_irq(SELF_INT_VECTOR, dummy_ipi_isr);
+ on_cpu_async(1, vcpu1_code, NULL);
+
+ for (i = 0 ; i < (1 << MEM_ALLOC_ORDER) ; i++) {
+
+ apic_icr_write(APIC_INT_ASSERT | APIC_DEST_PHYSICAL | APIC_DM_FIXED | SELF_INT_VECTOR, 0);
+
+ /* in case the sender is still sending #SMI, wait for it*/
+ while (send_smi)
+ ;
+
+ /* ask the peer vCPU to send SMI to us */
+ send_smi = true;
+
+ asm volatile("sti");
+ asm volatile("shadow_label:\n");
+
+ /*
+ * The below memory access should never get an interrupt because
+ * it is in an interrupt shadow from the STI.
+ *
+ * Note that seems that even if a real interrupt happens, it will
+ * still not interrupt this instruction, thus vCPU kick from
+ * vCPU1, when it attempts to send #SMI to us is not enough itself,
+ * to trigger the switch to SMM mode at this point.
+ * Therefore STI;CLI sequence itself doesn't lead to #SMI happening
+ * in between these instructions.
+ *
+ * So make the an instruction that accesses a fresh memory, which will
+ * force the CPU to #VMEXIT and just before resuming the guest,
+ * KVM might notice incoming #SMI, and enter the SMM
+ * with a still pending interrupt shadow.
+ *
+ * Also note that, just an #VMEXITing instruction like CPUID
+ * can't be used here, because KVM itself will emulate it,
+ * and clear the interrupt shadow, prior to entering the SMM.
+ *
+ * Test that in this case, the interrupt shadow is preserved,
+ * which means that upon exit from #SMI handler, the instruction
+ * should still not get the pending interrupt
+ */
+
+ *(mem+(i<<12)) = 1;
+
+ asm volatile("cli");
+
+ if (bad_int_received)
+ break;
+ }
+
+ test_ended = 1;
+
+ while (cpus_active() > 1)
+ cpu_relax();
+
+ if (bad_int_received)
+ report (0, "Unexpected interrupt received during interrupt shadow");
+ else
+ report(1, "Test passed");
+
+ return report_summary();
+}
@@ -455,3 +455,8 @@ file = cet.flat
arch = x86_64
smp = 2
extra_params = -enable-kvm -m 2048 -cpu host
+
+[smm_int_window]
+file = smm_int_window.flat
+smp = 2
+extra_params = -machine smm=on -machine kernel-irqchip=on -m 2g
This test tests a corner case in which KVM doesn't preserve STI interrupt shadow when #SMI arrives during it. Due to apparent fact that STI interrupt shadow blocks real interrupts as well, and thus prevents a vCPU kick to make the CPU enter SMM, during the interrupt shadow, a workaround was used: An instruction which gets VMexit anyway, but retried by KVM is used in the interrupt shadow. While emulating such instruction KVM doesn't reset the interrupt shadow (because it retries it), but it can notice the pending #SMI and enter SMM, thus the test tests that interrupt shadow in this case is preserved. Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> --- x86/Makefile.common | 3 +- x86/Makefile.x86_64 | 1 + x86/smm_int_window.c | 125 +++++++++++++++++++++++++++++++++++++++++++ x86/unittests.cfg | 5 ++ 4 files changed, 133 insertions(+), 1 deletion(-) create mode 100644 x86/smm_int_window.c