Hi Gleb, Paolo and Jan, There are indeed many checks that fail to check in vmentry, the result in my computer is here: Test suite : vmentry check PASS: No current VMCS vmenter PASS: VMLAUNCH with state not clear PASS: VMRESUME with state not launched PASS: Reserved bits in PIN_CONTROLS field PASS: Reserved bits in primary CPU CONTROLS field PASS: Reserved bits in secondary CPU CONTROLS field FAIL: CR3 target count greater than 4 FAIL: I/O bitmap address invalid (aligned) FAIL: I/O bitmap address invalid (exceed) PASS: MSR bitmap address invalid (aligned) FAIL: MSR bitmap address invalid (exceed) FAIL: Consistency of NMI exiting and virtual NMIs PASS: APIC-accesses address invalid (aligned) FAIL: APIC-accesses address invalid (exceed) FAIL: EPTP memory type FAIL: EPTP page walk length FAIL: EPTP page reserved bits (11:7) PASS: Reserved bits in EXI_CONTROLS field FAIL: Consistency of VMX-preemption timer (activate and save) PASS: Reserved bits in ENT_CONTROLS field PASS: Entry to SMM with processor not in SMM PASS: Deactivate dual-monitor treatment with processor not in SMM PASS: Invalid bits in host CR0 FAIL: Invalid bits in host CR4 FAIL: Invalid bits in host CR3 FAIL: Invalid host sysenter esp addr FAIL: Invalid host sysenter eip addr FAIL: Invalid CS selector field - TI flag FAIL: Invalid TR selector field - TI flag FAIL: Invalid CS selector field - 0000H FAIL: Invalid TR selector field - 0000H FAIL: Invalid base address of FS FAIL: Invalid base address of GS FAIL: Invalid base address of GDTR FAIL: Invalid base address of IDTR FAIL: Invalid base address of TR FAIL: Consistency of EXI_HOST_64 and CR4.PAE SUMMARY: 90 tests, 24 failures Besides, all commented cases also fail, they are: EPTP page reserved bits (63:N) Invalid host PAT Invalid host EFER - bits reserved Invalid host EFER - LMA & LME Invalid CS selector field - RPL Invalid TR selector field - RPL You can find detailed description of these cases in Intel SDM 26.1 and 26.2. Arthur On Fri, Sep 13, 2013 at 2:35 PM, Arthur Chunqi Li <yzt356@xxxxxxxxx> wrote: > This series implement a framework to capture early exit in vmenter, means vmenter > fails to next instruction instead of causing vmexit. Then all supported features > referred in Intel SDM 26.1 and 26.2 are tested. > > Some test cases are commented since they may cause fatal error of KVM, thus will > crash test environment and affect the following tests. They are hoped to uncomment > after related bugs are fixed. > > Arthur Chunqi Li (2): > kvm-unit-tests: VMX: Add vmentry failed handler to framework > kvm-unit-tests: VMX: Add test cases for vmentry checks > > lib/x86/vm.h | 3 + > x86/vmx.c | 34 +-- > x86/vmx.h | 37 ++- > x86/vmx_tests.c | 678 ++++++++++++++++++++++++++++++++++++++++++++++++++++++- > 4 files changed, 725 insertions(+), 27 deletions(-) > > -- > 1.7.9.5 > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html