]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
KVM: selftests: Extend state_test to check vGIF
authorYosry Ahmed <yosry@kernel.org>
Wed, 25 Feb 2026 00:59:45 +0000 (00:59 +0000)
committerSean Christopherson <seanjc@google.com>
Mon, 2 Mar 2026 23:58:22 +0000 (15:58 -0800)
V_GIF_MASK is one of the fields written by the CPU after VMRUN, and
sync'd by KVM from vmcb02 to cached vmcb12 after running L2. Part of the
reason is to make sure V_GIF_MASK is saved/restored correctly, as the
cached vmcb12 is the payload of nested state.

Verify that V_GIF_MASK is saved/restored correctly in state_test by
enabling vGIF in vmcb12, toggling GIF in L2 at different GUEST_SYNC()
points, and verifying that V_GIF_MASK is correctly propagated to the
nested state.

Signed-off-by: Yosry Ahmed <yosry@kernel.org>
Link: https://patch.msgid.link/20260225005950.3739782-4-yosry@kernel.org
Signed-off-by: Sean Christopherson <seanjc@google.com>
tools/testing/selftests/kvm/x86/state_test.c

index f2c7a1c297e374fc5a6abc18e3837c00fc5bd965..57c7546f3d7c55afd1be3108339b638bd91bed70 100644 (file)
@@ -26,7 +26,9 @@ void svm_l2_guest_code(void)
        GUEST_SYNC(4);
        /* Exit to L1 */
        vmcall();
+       clgi();
        GUEST_SYNC(6);
+       stgi();
        /* Done, exit to L1 and never come back.  */
        vmcall();
 }
@@ -41,6 +43,8 @@ static void svm_l1_guest_code(struct svm_test_data *svm)
        generic_svm_setup(svm, svm_l2_guest_code,
                          &l2_guest_stack[L2_GUEST_STACK_SIZE]);
 
+       vmcb->control.int_ctl |= (V_GIF_ENABLE_MASK | V_GIF_MASK);
+
        GUEST_SYNC(3);
        run_guest(vmcb, svm->vmcb_gpa);
        GUEST_ASSERT(vmcb->control.exit_code == SVM_EXIT_VMMCALL);
@@ -222,6 +226,24 @@ static void __attribute__((__flatten__)) guest_code(void *arg)
        GUEST_DONE();
 }
 
+void svm_check_nested_state(int stage, struct kvm_x86_state *state)
+{
+       struct vmcb *vmcb = (struct vmcb *)state->nested.data.svm;
+
+       if (kvm_cpu_has(X86_FEATURE_VGIF)) {
+               if (stage == 4)
+                       TEST_ASSERT_EQ(!!(vmcb->control.int_ctl & V_GIF_MASK), 1);
+               if (stage == 6)
+                       TEST_ASSERT_EQ(!!(vmcb->control.int_ctl & V_GIF_MASK), 0);
+       }
+}
+
+void check_nested_state(int stage, struct kvm_x86_state *state)
+{
+       if (kvm_has_cap(KVM_CAP_NESTED_STATE) && kvm_cpu_has(X86_FEATURE_SVM))
+               svm_check_nested_state(stage, state);
+}
+
 int main(int argc, char *argv[])
 {
        uint64_t *xstate_bv, saved_xstate_bv;
@@ -278,6 +300,8 @@ int main(int argc, char *argv[])
 
                kvm_vm_release(vm);
 
+               check_nested_state(stage, state);
+
                /* Restore state in a new VM.  */
                vcpu = vm_recreate_with_one_vcpu(vm);
                vcpu_load_state(vcpu, state);