Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/tools/testing/selftests/kvm/s390/resets.c
38237 views
1
// SPDX-License-Identifier: GPL-2.0-or-later
2
/*
3
* Test for s390x CPU resets
4
*
5
* Copyright (C) 2020, IBM
6
*/
7
8
#include <stdio.h>
9
#include <stdlib.h>
10
#include <string.h>
11
#include <sys/ioctl.h>
12
13
#include "test_util.h"
14
#include "kvm_util.h"
15
#include "kselftest.h"
16
17
#define LOCAL_IRQS 32
18
19
#define ARBITRARY_NON_ZERO_VCPU_ID 3
20
21
struct kvm_s390_irq buf[ARBITRARY_NON_ZERO_VCPU_ID + LOCAL_IRQS];
22
23
static uint8_t regs_null[512];
24
25
static void guest_code_initial(void)
26
{
27
/* set several CRs to "safe" value */
28
unsigned long cr2_59 = 0x10; /* enable guarded storage */
29
unsigned long cr8_63 = 0x1; /* monitor mask = 1 */
30
unsigned long cr10 = 1; /* PER START */
31
unsigned long cr11 = -1; /* PER END */
32
33
34
/* Dirty registers */
35
asm volatile (
36
" lghi 2,0x11\n" /* Round toward 0 */
37
" sfpc 2\n" /* set fpc to !=0 */
38
" lctlg 2,2,%0\n"
39
" lctlg 8,8,%1\n"
40
" lctlg 10,10,%2\n"
41
" lctlg 11,11,%3\n"
42
/* now clobber some general purpose regs */
43
" llihh 0,0xffff\n"
44
" llihl 1,0x5555\n"
45
" llilh 2,0xaaaa\n"
46
" llill 3,0x0000\n"
47
/* now clobber a floating point reg */
48
" lghi 4,0x1\n"
49
" cdgbr 0,4\n"
50
/* now clobber an access reg */
51
" sar 9,4\n"
52
/* We embed diag 501 here to control register content */
53
" diag 0,0,0x501\n"
54
:
55
: "m" (cr2_59), "m" (cr8_63), "m" (cr10), "m" (cr11)
56
/* no clobber list as this should not return */
57
);
58
}
59
60
static void test_one_reg(struct kvm_vcpu *vcpu, uint64_t id, uint64_t value)
61
{
62
uint64_t eval_reg;
63
64
eval_reg = vcpu_get_reg(vcpu, id);
65
TEST_ASSERT(eval_reg == value, "value == 0x%lx", value);
66
}
67
68
static void assert_noirq(struct kvm_vcpu *vcpu)
69
{
70
struct kvm_s390_irq_state irq_state;
71
int irqs;
72
73
irq_state.len = sizeof(buf);
74
irq_state.buf = (unsigned long)buf;
75
irqs = __vcpu_ioctl(vcpu, KVM_S390_GET_IRQ_STATE, &irq_state);
76
/*
77
* irqs contains the number of retrieved interrupts. Any interrupt
78
* (notably, the emergency call interrupt we have injected) should
79
* be cleared by the resets, so this should be 0.
80
*/
81
TEST_ASSERT(irqs >= 0, "Could not fetch IRQs: errno %d", errno);
82
TEST_ASSERT(!irqs, "IRQ pending");
83
}
84
85
static void assert_clear(struct kvm_vcpu *vcpu)
86
{
87
struct kvm_sync_regs *sync_regs = &vcpu->run->s.regs;
88
struct kvm_sregs sregs;
89
struct kvm_regs regs;
90
struct kvm_fpu fpu;
91
92
vcpu_regs_get(vcpu, &regs);
93
TEST_ASSERT(!memcmp(&regs.gprs, regs_null, sizeof(regs.gprs)), "grs == 0");
94
95
vcpu_sregs_get(vcpu, &sregs);
96
TEST_ASSERT(!memcmp(&sregs.acrs, regs_null, sizeof(sregs.acrs)), "acrs == 0");
97
98
vcpu_fpu_get(vcpu, &fpu);
99
TEST_ASSERT(!memcmp(&fpu.fprs, regs_null, sizeof(fpu.fprs)), "fprs == 0");
100
101
/* sync regs */
102
TEST_ASSERT(!memcmp(sync_regs->gprs, regs_null, sizeof(sync_regs->gprs)),
103
"gprs0-15 == 0 (sync_regs)");
104
105
TEST_ASSERT(!memcmp(sync_regs->acrs, regs_null, sizeof(sync_regs->acrs)),
106
"acrs0-15 == 0 (sync_regs)");
107
108
TEST_ASSERT(!memcmp(sync_regs->vrs, regs_null, sizeof(sync_regs->vrs)),
109
"vrs0-15 == 0 (sync_regs)");
110
}
111
112
static void assert_initial_noclear(struct kvm_vcpu *vcpu)
113
{
114
struct kvm_sync_regs *sync_regs = &vcpu->run->s.regs;
115
116
TEST_ASSERT(sync_regs->gprs[0] == 0xffff000000000000UL,
117
"gpr0 == 0xffff000000000000 (sync_regs)");
118
TEST_ASSERT(sync_regs->gprs[1] == 0x0000555500000000UL,
119
"gpr1 == 0x0000555500000000 (sync_regs)");
120
TEST_ASSERT(sync_regs->gprs[2] == 0x00000000aaaa0000UL,
121
"gpr2 == 0x00000000aaaa0000 (sync_regs)");
122
TEST_ASSERT(sync_regs->gprs[3] == 0x0000000000000000UL,
123
"gpr3 == 0x0000000000000000 (sync_regs)");
124
TEST_ASSERT(sync_regs->fprs[0] == 0x3ff0000000000000UL,
125
"fpr0 == 0f1 (sync_regs)");
126
TEST_ASSERT(sync_regs->acrs[9] == 1, "ar9 == 1 (sync_regs)");
127
}
128
129
static void assert_initial(struct kvm_vcpu *vcpu)
130
{
131
struct kvm_sync_regs *sync_regs = &vcpu->run->s.regs;
132
struct kvm_sregs sregs;
133
struct kvm_fpu fpu;
134
135
/* KVM_GET_SREGS */
136
vcpu_sregs_get(vcpu, &sregs);
137
TEST_ASSERT(sregs.crs[0] == 0xE0UL, "cr0 == 0xE0 (KVM_GET_SREGS)");
138
TEST_ASSERT(sregs.crs[14] == 0xC2000000UL,
139
"cr14 == 0xC2000000 (KVM_GET_SREGS)");
140
TEST_ASSERT(!memcmp(&sregs.crs[1], regs_null, sizeof(sregs.crs[1]) * 12),
141
"cr1-13 == 0 (KVM_GET_SREGS)");
142
TEST_ASSERT(sregs.crs[15] == 0, "cr15 == 0 (KVM_GET_SREGS)");
143
144
/* sync regs */
145
TEST_ASSERT(sync_regs->crs[0] == 0xE0UL, "cr0 == 0xE0 (sync_regs)");
146
TEST_ASSERT(sync_regs->crs[14] == 0xC2000000UL,
147
"cr14 == 0xC2000000 (sync_regs)");
148
TEST_ASSERT(!memcmp(&sync_regs->crs[1], regs_null, 8 * 12),
149
"cr1-13 == 0 (sync_regs)");
150
TEST_ASSERT(sync_regs->crs[15] == 0, "cr15 == 0 (sync_regs)");
151
TEST_ASSERT(sync_regs->fpc == 0, "fpc == 0 (sync_regs)");
152
TEST_ASSERT(sync_regs->todpr == 0, "todpr == 0 (sync_regs)");
153
TEST_ASSERT(sync_regs->cputm == 0, "cputm == 0 (sync_regs)");
154
TEST_ASSERT(sync_regs->ckc == 0, "ckc == 0 (sync_regs)");
155
TEST_ASSERT(sync_regs->pp == 0, "pp == 0 (sync_regs)");
156
TEST_ASSERT(sync_regs->gbea == 1, "gbea == 1 (sync_regs)");
157
158
/* kvm_run */
159
TEST_ASSERT(vcpu->run->psw_addr == 0, "psw_addr == 0 (kvm_run)");
160
TEST_ASSERT(vcpu->run->psw_mask == 0, "psw_mask == 0 (kvm_run)");
161
162
vcpu_fpu_get(vcpu, &fpu);
163
TEST_ASSERT(!fpu.fpc, "fpc == 0");
164
165
test_one_reg(vcpu, KVM_REG_S390_GBEA, 1);
166
test_one_reg(vcpu, KVM_REG_S390_PP, 0);
167
test_one_reg(vcpu, KVM_REG_S390_TODPR, 0);
168
test_one_reg(vcpu, KVM_REG_S390_CPU_TIMER, 0);
169
test_one_reg(vcpu, KVM_REG_S390_CLOCK_COMP, 0);
170
}
171
172
static void assert_normal_noclear(struct kvm_vcpu *vcpu)
173
{
174
struct kvm_sync_regs *sync_regs = &vcpu->run->s.regs;
175
176
TEST_ASSERT(sync_regs->crs[2] == 0x10, "cr2 == 10 (sync_regs)");
177
TEST_ASSERT(sync_regs->crs[8] == 1, "cr10 == 1 (sync_regs)");
178
TEST_ASSERT(sync_regs->crs[10] == 1, "cr10 == 1 (sync_regs)");
179
TEST_ASSERT(sync_regs->crs[11] == -1, "cr11 == -1 (sync_regs)");
180
}
181
182
static void assert_normal(struct kvm_vcpu *vcpu)
183
{
184
test_one_reg(vcpu, KVM_REG_S390_PFTOKEN, KVM_S390_PFAULT_TOKEN_INVALID);
185
TEST_ASSERT(vcpu->run->s.regs.pft == KVM_S390_PFAULT_TOKEN_INVALID,
186
"pft == 0xff..... (sync_regs)");
187
assert_noirq(vcpu);
188
}
189
190
static void inject_irq(struct kvm_vcpu *vcpu)
191
{
192
struct kvm_s390_irq_state irq_state;
193
struct kvm_s390_irq *irq = &buf[0];
194
int irqs;
195
196
/* Inject IRQ */
197
irq_state.len = sizeof(struct kvm_s390_irq);
198
irq_state.buf = (unsigned long)buf;
199
irq->type = KVM_S390_INT_EMERGENCY;
200
irq->u.emerg.code = vcpu->id;
201
irqs = __vcpu_ioctl(vcpu, KVM_S390_SET_IRQ_STATE, &irq_state);
202
TEST_ASSERT(irqs >= 0, "Error injecting EMERGENCY IRQ errno %d", errno);
203
}
204
205
static struct kvm_vm *create_vm(struct kvm_vcpu **vcpu)
206
{
207
struct kvm_vm *vm;
208
209
vm = vm_create(1);
210
211
*vcpu = vm_vcpu_add(vm, ARBITRARY_NON_ZERO_VCPU_ID, guest_code_initial);
212
213
return vm;
214
}
215
216
static void test_normal(void)
217
{
218
struct kvm_vcpu *vcpu;
219
struct kvm_vm *vm;
220
221
ksft_print_msg("Testing normal reset\n");
222
vm = create_vm(&vcpu);
223
224
vcpu_run(vcpu);
225
226
inject_irq(vcpu);
227
228
vcpu_ioctl(vcpu, KVM_S390_NORMAL_RESET, NULL);
229
230
/* must clears */
231
assert_normal(vcpu);
232
/* must not clears */
233
assert_normal_noclear(vcpu);
234
assert_initial_noclear(vcpu);
235
236
kvm_vm_free(vm);
237
}
238
239
static void test_initial(void)
240
{
241
struct kvm_vcpu *vcpu;
242
struct kvm_vm *vm;
243
244
ksft_print_msg("Testing initial reset\n");
245
vm = create_vm(&vcpu);
246
247
vcpu_run(vcpu);
248
249
inject_irq(vcpu);
250
251
vcpu_ioctl(vcpu, KVM_S390_INITIAL_RESET, NULL);
252
253
/* must clears */
254
assert_normal(vcpu);
255
assert_initial(vcpu);
256
/* must not clears */
257
assert_initial_noclear(vcpu);
258
259
kvm_vm_free(vm);
260
}
261
262
static void test_clear(void)
263
{
264
struct kvm_vcpu *vcpu;
265
struct kvm_vm *vm;
266
267
ksft_print_msg("Testing clear reset\n");
268
vm = create_vm(&vcpu);
269
270
vcpu_run(vcpu);
271
272
inject_irq(vcpu);
273
274
vcpu_ioctl(vcpu, KVM_S390_CLEAR_RESET, NULL);
275
276
/* must clears */
277
assert_normal(vcpu);
278
assert_initial(vcpu);
279
assert_clear(vcpu);
280
281
kvm_vm_free(vm);
282
}
283
284
struct testdef {
285
const char *name;
286
void (*test)(void);
287
bool needs_cap;
288
} testlist[] = {
289
{ "initial", test_initial, false },
290
{ "normal", test_normal, true },
291
{ "clear", test_clear, true },
292
};
293
294
int main(int argc, char *argv[])
295
{
296
bool has_s390_vcpu_resets = kvm_check_cap(KVM_CAP_S390_VCPU_RESETS);
297
int idx;
298
299
ksft_print_header();
300
ksft_set_plan(ARRAY_SIZE(testlist));
301
302
for (idx = 0; idx < ARRAY_SIZE(testlist); idx++) {
303
if (!testlist[idx].needs_cap || has_s390_vcpu_resets) {
304
testlist[idx].test();
305
ksft_test_result_pass("%s\n", testlist[idx].name);
306
} else {
307
ksft_test_result_skip("%s - no VCPU_RESETS capability\n",
308
testlist[idx].name);
309
}
310
}
311
312
ksft_finished(); /* Print results and exit() accordingly */
313
}
314
315