Path: blob/master/tools/testing/selftests/kvm/s390/ucontrol_test.c
38237 views
// SPDX-License-Identifier: GPL-2.0-only1/*2* Test code for the s390x kvm ucontrol interface3*4* Copyright IBM Corp. 20245*6* Authors:7* Christoph Schlameuss <[email protected]>8*/9#include "debug_print.h"10#include "kselftest_harness.h"11#include "kvm_util.h"12#include "processor.h"13#include "sie.h"1415#include <linux/capability.h>16#include <linux/sizes.h>1718#define PGM_SEGMENT_TRANSLATION 0x101920#define VM_MEM_SIZE (4 * SZ_1M)21#define VM_MEM_EXT_SIZE (2 * SZ_1M)22#define VM_MEM_MAX_M ((VM_MEM_SIZE + VM_MEM_EXT_SIZE) / SZ_1M)2324/* so directly declare capget to check caps without libcap */25int capget(cap_user_header_t header, cap_user_data_t data);2627/**28* In order to create user controlled virtual machines on S390,29* check KVM_CAP_S390_UCONTROL and use the flag KVM_VM_S390_UCONTROL30* as privileged user (SYS_ADMIN).31*/32void require_ucontrol_admin(void)33{34struct __user_cap_data_struct data[_LINUX_CAPABILITY_U32S_3];35struct __user_cap_header_struct hdr = {36.version = _LINUX_CAPABILITY_VERSION_3,37};38int rc;3940rc = capget(&hdr, data);41TEST_ASSERT_EQ(0, rc);42TEST_REQUIRE((data->effective & CAP_TO_MASK(CAP_SYS_ADMIN)) > 0);4344TEST_REQUIRE(kvm_has_cap(KVM_CAP_S390_UCONTROL));45}4647/* Test program setting some registers and looping */48extern char test_gprs_asm[];49asm("test_gprs_asm:\n"50"xgr %r0, %r0\n"51"lgfi %r1,1\n"52"lgfi %r2,2\n"53"lgfi %r3,3\n"54"lgfi %r4,4\n"55"lgfi %r5,5\n"56"lgfi %r6,6\n"57"lgfi %r7,7\n"58"0:\n"59" diag 0,0,0x44\n"60" ahi %r0,1\n"61" j 0b\n"62);6364/* Test program manipulating memory */65extern char test_mem_asm[];66asm("test_mem_asm:\n"67"xgr %r0, %r0\n"6869"0:\n"70" ahi %r0,1\n"71" st %r1,0(%r5,%r6)\n"7273" xgr %r1,%r1\n"74" l %r1,0(%r5,%r6)\n"75" ahi %r0,1\n"76" diag 0,0,0x44\n"7778" j 0b\n"79);8081/* Test program manipulating storage keys */82extern char test_skey_asm[];83asm("test_skey_asm:\n"84"xgr %r0, %r0\n"8586"0:\n"87" ahi %r0,1\n"88" st %r1,0(%r5,%r6)\n"8990" sske %r1,%r6\n"91" xgr %r1,%r1\n"92" iske %r1,%r6\n"93" ahi %r0,1\n"94" diag 0,0,0x44\n"9596" rrbe %r1,%r6\n"97" iske %r1,%r6\n"98" ahi %r0,1\n"99" diag 0,0,0x44\n"100101" j 0b\n"102);103104FIXTURE(uc_kvm)105{106struct kvm_s390_sie_block *sie_block;107struct kvm_run *run;108uintptr_t base_gpa;109uintptr_t code_gpa;110uintptr_t base_hva;111uintptr_t code_hva;112int kvm_run_size;113vm_paddr_t pgd;114void *vm_mem;115int vcpu_fd;116int kvm_fd;117int vm_fd;118};119120/**121* create VM with single vcpu, map kvm_run and SIE control block for easy access122*/123FIXTURE_SETUP(uc_kvm)124{125struct kvm_s390_vm_cpu_processor info;126int rc;127128require_ucontrol_admin();129130self->kvm_fd = open_kvm_dev_path_or_exit();131self->vm_fd = ioctl(self->kvm_fd, KVM_CREATE_VM, KVM_VM_S390_UCONTROL);132ASSERT_GE(self->vm_fd, 0);133134kvm_device_attr_get(self->vm_fd, KVM_S390_VM_CPU_MODEL,135KVM_S390_VM_CPU_PROCESSOR, &info);136TH_LOG("create VM 0x%llx", info.cpuid);137138self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);139ASSERT_GE(self->vcpu_fd, 0);140141self->kvm_run_size = ioctl(self->kvm_fd, KVM_GET_VCPU_MMAP_SIZE, NULL);142ASSERT_GE(self->kvm_run_size, sizeof(struct kvm_run))143TH_LOG(KVM_IOCTL_ERROR(KVM_GET_VCPU_MMAP_SIZE, self->kvm_run_size));144self->run = kvm_mmap(self->kvm_run_size, PROT_READ | PROT_WRITE,145MAP_SHARED, self->vcpu_fd);146/**147* For virtual cpus that have been created with S390 user controlled148* virtual machines, the resulting vcpu fd can be memory mapped at page149* offset KVM_S390_SIE_PAGE_OFFSET in order to obtain a memory map of150* the virtual cpu's hardware control block.151*/152self->sie_block = __kvm_mmap(PAGE_SIZE, PROT_READ | PROT_WRITE,153MAP_SHARED, self->vcpu_fd,154KVM_S390_SIE_PAGE_OFFSET << PAGE_SHIFT);155156TH_LOG("VM created %p %p", self->run, self->sie_block);157158self->base_gpa = 0;159self->code_gpa = self->base_gpa + (3 * SZ_1M);160161self->vm_mem = aligned_alloc(SZ_1M, VM_MEM_MAX_M * SZ_1M);162ASSERT_NE(NULL, self->vm_mem) TH_LOG("malloc failed %u", errno);163self->base_hva = (uintptr_t)self->vm_mem;164self->code_hva = self->base_hva - self->base_gpa + self->code_gpa;165struct kvm_s390_ucas_mapping map = {166.user_addr = self->base_hva,167.vcpu_addr = self->base_gpa,168.length = VM_MEM_SIZE,169};170TH_LOG("ucas map %p %p 0x%llx",171(void *)map.user_addr, (void *)map.vcpu_addr, map.length);172rc = ioctl(self->vcpu_fd, KVM_S390_UCAS_MAP, &map);173ASSERT_EQ(0, rc) TH_LOG("ucas map result %d not expected, %s",174rc, strerror(errno));175176TH_LOG("page in %p", (void *)self->base_gpa);177rc = ioctl(self->vcpu_fd, KVM_S390_VCPU_FAULT, self->base_gpa);178ASSERT_EQ(0, rc) TH_LOG("vcpu fault (%p) result %d not expected, %s",179(void *)self->base_hva, rc, strerror(errno));180181self->sie_block->cpuflags &= ~CPUSTAT_STOPPED;182}183184FIXTURE_TEARDOWN(uc_kvm)185{186kvm_munmap(self->sie_block, PAGE_SIZE);187kvm_munmap(self->run, self->kvm_run_size);188close(self->vcpu_fd);189close(self->vm_fd);190close(self->kvm_fd);191free(self->vm_mem);192}193194TEST_F(uc_kvm, uc_sie_assertions)195{196/* assert interception of Code 08 (Program Interruption) is set */197EXPECT_EQ(0, self->sie_block->ecb & ECB_SPECI);198}199200TEST_F(uc_kvm, uc_attr_mem_limit)201{202u64 limit;203struct kvm_device_attr attr = {204.group = KVM_S390_VM_MEM_CTRL,205.attr = KVM_S390_VM_MEM_LIMIT_SIZE,206.addr = (u64)&limit,207};208int rc;209210rc = ioctl(self->vm_fd, KVM_HAS_DEVICE_ATTR, &attr);211EXPECT_EQ(0, rc);212213rc = ioctl(self->vm_fd, KVM_GET_DEVICE_ATTR, &attr);214EXPECT_EQ(0, rc);215EXPECT_EQ(~0UL, limit);216217/* assert set not supported */218rc = ioctl(self->vm_fd, KVM_SET_DEVICE_ATTR, &attr);219EXPECT_EQ(-1, rc);220EXPECT_EQ(EINVAL, errno);221}222223TEST_F(uc_kvm, uc_no_dirty_log)224{225struct kvm_dirty_log dlog;226int rc;227228rc = ioctl(self->vm_fd, KVM_GET_DIRTY_LOG, &dlog);229EXPECT_EQ(-1, rc);230EXPECT_EQ(EINVAL, errno);231}232233/**234* Assert HPAGE CAP cannot be enabled on UCONTROL VM235*/236TEST(uc_cap_hpage)237{238int rc, kvm_fd, vm_fd, vcpu_fd;239struct kvm_enable_cap cap = {240.cap = KVM_CAP_S390_HPAGE_1M,241};242243require_ucontrol_admin();244245kvm_fd = open_kvm_dev_path_or_exit();246vm_fd = ioctl(kvm_fd, KVM_CREATE_VM, KVM_VM_S390_UCONTROL);247ASSERT_GE(vm_fd, 0);248249/* assert hpages are not supported on ucontrol vm */250rc = ioctl(vm_fd, KVM_CHECK_EXTENSION, KVM_CAP_S390_HPAGE_1M);251EXPECT_EQ(0, rc);252253/* Test that KVM_CAP_S390_HPAGE_1M can't be enabled for a ucontrol vm */254rc = ioctl(vm_fd, KVM_ENABLE_CAP, cap);255EXPECT_EQ(-1, rc);256EXPECT_EQ(EINVAL, errno);257258/* assert HPAGE CAP is rejected after vCPU creation */259vcpu_fd = ioctl(vm_fd, KVM_CREATE_VCPU, 0);260ASSERT_GE(vcpu_fd, 0);261rc = ioctl(vm_fd, KVM_ENABLE_CAP, cap);262EXPECT_EQ(-1, rc);263EXPECT_EQ(EBUSY, errno);264265close(vcpu_fd);266close(vm_fd);267close(kvm_fd);268}269270/* calculate host virtual addr from guest physical addr */271static void *gpa2hva(FIXTURE_DATA(uc_kvm) *self, u64 gpa)272{273return (void *)(self->base_hva - self->base_gpa + gpa);274}275276/* map / make additional memory available */277static int uc_map_ext(FIXTURE_DATA(uc_kvm) *self, u64 vcpu_addr, u64 length)278{279struct kvm_s390_ucas_mapping map = {280.user_addr = (u64)gpa2hva(self, vcpu_addr),281.vcpu_addr = vcpu_addr,282.length = length,283};284pr_info("ucas map %p %p 0x%llx",285(void *)map.user_addr, (void *)map.vcpu_addr, map.length);286return ioctl(self->vcpu_fd, KVM_S390_UCAS_MAP, &map);287}288289/* unmap previously mapped memory */290static int uc_unmap_ext(FIXTURE_DATA(uc_kvm) *self, u64 vcpu_addr, u64 length)291{292struct kvm_s390_ucas_mapping map = {293.user_addr = (u64)gpa2hva(self, vcpu_addr),294.vcpu_addr = vcpu_addr,295.length = length,296};297pr_info("ucas unmap %p %p 0x%llx",298(void *)map.user_addr, (void *)map.vcpu_addr, map.length);299return ioctl(self->vcpu_fd, KVM_S390_UCAS_UNMAP, &map);300}301302/* handle ucontrol exit by mapping the accessed segment */303static void uc_handle_exit_ucontrol(FIXTURE_DATA(uc_kvm) *self)304{305struct kvm_run *run = self->run;306u64 seg_addr;307int rc;308309TEST_ASSERT_EQ(KVM_EXIT_S390_UCONTROL, run->exit_reason);310switch (run->s390_ucontrol.pgm_code) {311case PGM_SEGMENT_TRANSLATION:312seg_addr = run->s390_ucontrol.trans_exc_code & ~(SZ_1M - 1);313pr_info("ucontrol pic segment translation 0x%llx, mapping segment 0x%lx\n",314run->s390_ucontrol.trans_exc_code, seg_addr);315/* map / make additional memory available */316rc = uc_map_ext(self, seg_addr, SZ_1M);317TEST_ASSERT_EQ(0, rc);318break;319default:320TEST_FAIL("UNEXPECTED PGM CODE %d", run->s390_ucontrol.pgm_code);321}322}323324/*325* Handle the SIEIC exit326* * fail on codes not expected in the test cases327* Returns if interception is handled / execution can be continued328*/329static void uc_skey_enable(FIXTURE_DATA(uc_kvm) *self)330{331struct kvm_s390_sie_block *sie_block = self->sie_block;332333/* disable KSS */334sie_block->cpuflags &= ~CPUSTAT_KSS;335/* disable skey inst interception */336sie_block->ictl &= ~(ICTL_ISKE | ICTL_SSKE | ICTL_RRBE);337}338339/*340* Handle the instruction intercept341* Returns if interception is handled / execution can be continued342*/343static bool uc_handle_insn_ic(FIXTURE_DATA(uc_kvm) *self)344{345struct kvm_s390_sie_block *sie_block = self->sie_block;346int ilen = insn_length(sie_block->ipa >> 8);347struct kvm_run *run = self->run;348349switch (run->s390_sieic.ipa) {350case 0xB229: /* ISKE */351case 0xB22b: /* SSKE */352case 0xB22a: /* RRBE */353uc_skey_enable(self);354355/* rewind to reexecute intercepted instruction */356run->psw_addr = run->psw_addr - ilen;357pr_info("rewind guest addr to 0x%.16llx\n", run->psw_addr);358return true;359default:360return false;361}362}363364/*365* Handle the SIEIC exit366* * fail on codes not expected in the test cases367* Returns if interception is handled / execution can be continued368*/369static bool uc_handle_sieic(FIXTURE_DATA(uc_kvm) *self)370{371struct kvm_s390_sie_block *sie_block = self->sie_block;372struct kvm_run *run = self->run;373374/* check SIE interception code */375pr_info("sieic: 0x%.2x 0x%.4x 0x%.8x\n",376run->s390_sieic.icptcode,377run->s390_sieic.ipa,378run->s390_sieic.ipb);379switch (run->s390_sieic.icptcode) {380case ICPT_INST:381/* end execution in caller on intercepted instruction */382pr_info("sie instruction interception\n");383return uc_handle_insn_ic(self);384case ICPT_KSS:385uc_skey_enable(self);386return true;387case ICPT_OPEREXC:388/* operation exception */389TEST_FAIL("sie exception on %.4x%.8x", sie_block->ipa, sie_block->ipb);390default:391TEST_FAIL("UNEXPECTED SIEIC CODE %d", run->s390_sieic.icptcode);392}393return true;394}395396/* verify VM state on exit */397static bool uc_handle_exit(FIXTURE_DATA(uc_kvm) *self)398{399struct kvm_run *run = self->run;400401switch (run->exit_reason) {402case KVM_EXIT_S390_UCONTROL:403/** check program interruption code404* handle page fault --> ucas map405*/406uc_handle_exit_ucontrol(self);407break;408case KVM_EXIT_S390_SIEIC:409return uc_handle_sieic(self);410default:411pr_info("exit_reason %2d not handled\n", run->exit_reason);412}413return true;414}415416/* run the VM until interrupted */417static int uc_run_once(FIXTURE_DATA(uc_kvm) *self)418{419int rc;420421rc = ioctl(self->vcpu_fd, KVM_RUN, NULL);422print_run(self->run, self->sie_block);423print_regs(self->run);424pr_debug("run %d / %d %s\n", rc, errno, strerror(errno));425return rc;426}427428static void uc_assert_diag44(FIXTURE_DATA(uc_kvm) *self)429{430struct kvm_s390_sie_block *sie_block = self->sie_block;431432/* assert vm was interrupted by diag 0x0044 */433TEST_ASSERT_EQ(KVM_EXIT_S390_SIEIC, self->run->exit_reason);434TEST_ASSERT_EQ(ICPT_INST, sie_block->icptcode);435TEST_ASSERT_EQ(0x8300, sie_block->ipa);436TEST_ASSERT_EQ(0x440000, sie_block->ipb);437}438439TEST_F(uc_kvm, uc_no_user_region)440{441struct kvm_userspace_memory_region region = {442.slot = 1,443.guest_phys_addr = self->code_gpa,444.memory_size = VM_MEM_EXT_SIZE,445.userspace_addr = (uintptr_t)self->code_hva,446};447struct kvm_userspace_memory_region2 region2 = {448.slot = 1,449.guest_phys_addr = self->code_gpa,450.memory_size = VM_MEM_EXT_SIZE,451.userspace_addr = (uintptr_t)self->code_hva,452};453454ASSERT_EQ(-1, ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, ®ion));455ASSERT_TRUE(errno == EEXIST || errno == EINVAL)456TH_LOG("errno %s (%i) not expected for ioctl KVM_SET_USER_MEMORY_REGION",457strerror(errno), errno);458459ASSERT_EQ(-1, ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION2, ®ion2));460ASSERT_TRUE(errno == EEXIST || errno == EINVAL)461TH_LOG("errno %s (%i) not expected for ioctl KVM_SET_USER_MEMORY_REGION2",462strerror(errno), errno);463}464465TEST_F(uc_kvm, uc_map_unmap)466{467struct kvm_sync_regs *sync_regs = &self->run->s.regs;468struct kvm_run *run = self->run;469const u64 disp = 1;470int rc;471472/* copy test_mem_asm to code_hva / code_gpa */473TH_LOG("copy code %p to vm mapped memory %p / %p",474&test_mem_asm, (void *)self->code_hva, (void *)self->code_gpa);475memcpy((void *)self->code_hva, &test_mem_asm, PAGE_SIZE);476477/* DAT disabled + 64 bit mode */478run->psw_mask = 0x0000000180000000ULL;479run->psw_addr = self->code_gpa;480481/* set register content for test_mem_asm to access not mapped memory*/482sync_regs->gprs[1] = 0x55;483sync_regs->gprs[5] = self->base_gpa;484sync_regs->gprs[6] = VM_MEM_SIZE + disp;485run->kvm_dirty_regs |= KVM_SYNC_GPRS;486487/* run and expect to fail with ucontrol pic segment translation */488ASSERT_EQ(0, uc_run_once(self));489ASSERT_EQ(1, sync_regs->gprs[0]);490ASSERT_EQ(KVM_EXIT_S390_UCONTROL, run->exit_reason);491492ASSERT_EQ(PGM_SEGMENT_TRANSLATION, run->s390_ucontrol.pgm_code);493ASSERT_EQ(self->base_gpa + VM_MEM_SIZE, run->s390_ucontrol.trans_exc_code);494495/* fail to map memory with not segment aligned address */496rc = uc_map_ext(self, self->base_gpa + VM_MEM_SIZE + disp, VM_MEM_EXT_SIZE);497ASSERT_GT(0, rc)498TH_LOG("ucas map for non segment address should fail but didn't; "499"result %d not expected, %s", rc, strerror(errno));500501/* map / make additional memory available */502rc = uc_map_ext(self, self->base_gpa + VM_MEM_SIZE, VM_MEM_EXT_SIZE);503ASSERT_EQ(0, rc)504TH_LOG("ucas map result %d not expected, %s", rc, strerror(errno));505ASSERT_EQ(0, uc_run_once(self));506ASSERT_EQ(false, uc_handle_exit(self));507uc_assert_diag44(self);508509/* assert registers and memory are in expected state */510ASSERT_EQ(2, sync_regs->gprs[0]);511ASSERT_EQ(0x55, sync_regs->gprs[1]);512ASSERT_EQ(0x55, *(u32 *)gpa2hva(self, self->base_gpa + VM_MEM_SIZE + disp));513514/* unmap and run loop again */515rc = uc_unmap_ext(self, self->base_gpa + VM_MEM_SIZE, VM_MEM_EXT_SIZE);516ASSERT_EQ(0, rc)517TH_LOG("ucas unmap result %d not expected, %s", rc, strerror(errno));518ASSERT_EQ(0, uc_run_once(self));519ASSERT_EQ(3, sync_regs->gprs[0]);520ASSERT_EQ(KVM_EXIT_S390_UCONTROL, run->exit_reason);521ASSERT_EQ(PGM_SEGMENT_TRANSLATION, run->s390_ucontrol.pgm_code);522/* handle ucontrol exit and remap memory after previous map and unmap */523ASSERT_EQ(true, uc_handle_exit(self));524}525526TEST_F(uc_kvm, uc_gprs)527{528struct kvm_sync_regs *sync_regs = &self->run->s.regs;529struct kvm_run *run = self->run;530struct kvm_regs regs = {};531532/* Set registers to values that are different from the ones that we expect below */533for (int i = 0; i < 8; i++)534sync_regs->gprs[i] = 8;535run->kvm_dirty_regs |= KVM_SYNC_GPRS;536537/* copy test_gprs_asm to code_hva / code_gpa */538TH_LOG("copy code %p to vm mapped memory %p / %p",539&test_gprs_asm, (void *)self->code_hva, (void *)self->code_gpa);540memcpy((void *)self->code_hva, &test_gprs_asm, PAGE_SIZE);541542/* DAT disabled + 64 bit mode */543run->psw_mask = 0x0000000180000000ULL;544run->psw_addr = self->code_gpa;545546/* run and expect interception of diag 44 */547ASSERT_EQ(0, uc_run_once(self));548ASSERT_EQ(false, uc_handle_exit(self));549uc_assert_diag44(self);550551/* Retrieve and check guest register values */552ASSERT_EQ(0, ioctl(self->vcpu_fd, KVM_GET_REGS, ®s));553for (int i = 0; i < 8; i++) {554ASSERT_EQ(i, regs.gprs[i]);555ASSERT_EQ(i, sync_regs->gprs[i]);556}557558/* run and expect interception of diag 44 again */559ASSERT_EQ(0, uc_run_once(self));560ASSERT_EQ(false, uc_handle_exit(self));561uc_assert_diag44(self);562563/* check continued increment of register 0 value */564ASSERT_EQ(0, ioctl(self->vcpu_fd, KVM_GET_REGS, ®s));565ASSERT_EQ(1, regs.gprs[0]);566ASSERT_EQ(1, sync_regs->gprs[0]);567}568569TEST_F(uc_kvm, uc_skey)570{571struct kvm_s390_sie_block *sie_block = self->sie_block;572struct kvm_sync_regs *sync_regs = &self->run->s.regs;573u64 test_vaddr = VM_MEM_SIZE - (SZ_1M / 2);574struct kvm_run *run = self->run;575const u8 skeyvalue = 0x34;576577/* copy test_skey_asm to code_hva / code_gpa */578TH_LOG("copy code %p to vm mapped memory %p / %p",579&test_skey_asm, (void *)self->code_hva, (void *)self->code_gpa);580memcpy((void *)self->code_hva, &test_skey_asm, PAGE_SIZE);581582/* set register content for test_skey_asm to access not mapped memory */583sync_regs->gprs[1] = skeyvalue;584sync_regs->gprs[5] = self->base_gpa;585sync_regs->gprs[6] = test_vaddr;586run->kvm_dirty_regs |= KVM_SYNC_GPRS;587588/* DAT disabled + 64 bit mode */589run->psw_mask = 0x0000000180000000ULL;590run->psw_addr = self->code_gpa;591592ASSERT_EQ(0, uc_run_once(self));593ASSERT_EQ(true, uc_handle_exit(self));594ASSERT_EQ(1, sync_regs->gprs[0]);595596/* SSKE + ISKE */597sync_regs->gprs[1] = skeyvalue;598run->kvm_dirty_regs |= KVM_SYNC_GPRS;599ASSERT_EQ(0, uc_run_once(self));600601/*602* Bail out and skip the test after uc_skey_enable was executed but iske603* is still intercepted. Instructions are not handled by the kernel.604* Thus there is no need to test this here.605*/606TEST_ASSERT_EQ(0, sie_block->cpuflags & CPUSTAT_KSS);607TEST_ASSERT_EQ(0, sie_block->ictl & (ICTL_ISKE | ICTL_SSKE | ICTL_RRBE));608TEST_ASSERT_EQ(KVM_EXIT_S390_SIEIC, self->run->exit_reason);609TEST_ASSERT_EQ(ICPT_INST, sie_block->icptcode);610TEST_REQUIRE(sie_block->ipa != 0xb22b);611612/* SSKE + ISKE contd. */613ASSERT_EQ(false, uc_handle_exit(self));614ASSERT_EQ(2, sync_regs->gprs[0]);615ASSERT_EQ(skeyvalue, sync_regs->gprs[1]);616uc_assert_diag44(self);617618/* RRBE + ISKE */619sync_regs->gprs[1] = skeyvalue;620run->kvm_dirty_regs |= KVM_SYNC_GPRS;621ASSERT_EQ(0, uc_run_once(self));622ASSERT_EQ(false, uc_handle_exit(self));623ASSERT_EQ(3, sync_regs->gprs[0]);624/* assert R reset but rest of skey unchanged */625ASSERT_EQ(skeyvalue & 0xfa, sync_regs->gprs[1]);626ASSERT_EQ(0, sync_regs->gprs[1] & 0x04);627uc_assert_diag44(self);628}629630static char uc_flic_b[PAGE_SIZE];631static struct kvm_s390_io_adapter uc_flic_ioa = { .id = 0 };632static struct kvm_s390_io_adapter_req uc_flic_ioam = { .id = 0 };633static struct kvm_s390_ais_req uc_flic_asim = { .isc = 0 };634static struct kvm_s390_ais_all uc_flic_asima = { .simm = 0 };635static struct uc_flic_attr_test {636char *name;637struct kvm_device_attr a;638int hasrc;639int geterrno;640int seterrno;641} uc_flic_attr_tests[] = {642{643.name = "KVM_DEV_FLIC_GET_ALL_IRQS",644.seterrno = EINVAL,645.a = {646.group = KVM_DEV_FLIC_GET_ALL_IRQS,647.addr = (u64)&uc_flic_b,648.attr = PAGE_SIZE,649},650},651{652.name = "KVM_DEV_FLIC_ENQUEUE",653.geterrno = EINVAL,654.a = { .group = KVM_DEV_FLIC_ENQUEUE, },655},656{657.name = "KVM_DEV_FLIC_CLEAR_IRQS",658.geterrno = EINVAL,659.a = { .group = KVM_DEV_FLIC_CLEAR_IRQS, },660},661{662.name = "KVM_DEV_FLIC_ADAPTER_REGISTER",663.geterrno = EINVAL,664.a = {665.group = KVM_DEV_FLIC_ADAPTER_REGISTER,666.addr = (u64)&uc_flic_ioa,667},668},669{670.name = "KVM_DEV_FLIC_ADAPTER_MODIFY",671.geterrno = EINVAL,672.seterrno = EINVAL,673.a = {674.group = KVM_DEV_FLIC_ADAPTER_MODIFY,675.addr = (u64)&uc_flic_ioam,676.attr = sizeof(uc_flic_ioam),677},678},679{680.name = "KVM_DEV_FLIC_CLEAR_IO_IRQ",681.geterrno = EINVAL,682.seterrno = EINVAL,683.a = {684.group = KVM_DEV_FLIC_CLEAR_IO_IRQ,685.attr = 32,686},687},688{689.name = "KVM_DEV_FLIC_AISM",690.geterrno = EINVAL,691.seterrno = ENOTSUP,692.a = {693.group = KVM_DEV_FLIC_AISM,694.addr = (u64)&uc_flic_asim,695},696},697{698.name = "KVM_DEV_FLIC_AIRQ_INJECT",699.geterrno = EINVAL,700.a = { .group = KVM_DEV_FLIC_AIRQ_INJECT, },701},702{703.name = "KVM_DEV_FLIC_AISM_ALL",704.geterrno = ENOTSUP,705.seterrno = ENOTSUP,706.a = {707.group = KVM_DEV_FLIC_AISM_ALL,708.addr = (u64)&uc_flic_asima,709.attr = sizeof(uc_flic_asima),710},711},712{713.name = "KVM_DEV_FLIC_APF_ENABLE",714.geterrno = EINVAL,715.seterrno = EINVAL,716.a = { .group = KVM_DEV_FLIC_APF_ENABLE, },717},718{719.name = "KVM_DEV_FLIC_APF_DISABLE_WAIT",720.geterrno = EINVAL,721.seterrno = EINVAL,722.a = { .group = KVM_DEV_FLIC_APF_DISABLE_WAIT, },723},724};725726TEST_F(uc_kvm, uc_flic_attrs)727{728struct kvm_create_device cd = { .type = KVM_DEV_TYPE_FLIC };729struct kvm_device_attr attr;730u64 value;731int rc, i;732733rc = ioctl(self->vm_fd, KVM_CREATE_DEVICE, &cd);734ASSERT_EQ(0, rc) TH_LOG("create device failed with err %s (%i)",735strerror(errno), errno);736737for (i = 0; i < ARRAY_SIZE(uc_flic_attr_tests); i++) {738TH_LOG("test %s", uc_flic_attr_tests[i].name);739attr = (struct kvm_device_attr) {740.group = uc_flic_attr_tests[i].a.group,741.attr = uc_flic_attr_tests[i].a.attr,742.addr = uc_flic_attr_tests[i].a.addr,743};744if (attr.addr == 0)745attr.addr = (u64)&value;746747rc = ioctl(cd.fd, KVM_HAS_DEVICE_ATTR, &attr);748EXPECT_EQ(uc_flic_attr_tests[i].hasrc, !!rc)749TH_LOG("expected dev attr missing %s",750uc_flic_attr_tests[i].name);751752rc = ioctl(cd.fd, KVM_GET_DEVICE_ATTR, &attr);753EXPECT_EQ(!!uc_flic_attr_tests[i].geterrno, !!rc)754TH_LOG("get dev attr rc not expected on %s %s (%i)",755uc_flic_attr_tests[i].name,756strerror(errno), errno);757if (uc_flic_attr_tests[i].geterrno)758EXPECT_EQ(uc_flic_attr_tests[i].geterrno, errno)759TH_LOG("get dev attr errno not expected on %s %s (%i)",760uc_flic_attr_tests[i].name,761strerror(errno), errno);762763rc = ioctl(cd.fd, KVM_SET_DEVICE_ATTR, &attr);764EXPECT_EQ(!!uc_flic_attr_tests[i].seterrno, !!rc)765TH_LOG("set sev attr rc not expected on %s %s (%i)",766uc_flic_attr_tests[i].name,767strerror(errno), errno);768if (uc_flic_attr_tests[i].seterrno)769EXPECT_EQ(uc_flic_attr_tests[i].seterrno, errno)770TH_LOG("set dev attr errno not expected on %s %s (%i)",771uc_flic_attr_tests[i].name,772strerror(errno), errno);773}774775close(cd.fd);776}777778TEST_F(uc_kvm, uc_set_gsi_routing)779{780struct kvm_irq_routing *routing = kvm_gsi_routing_create();781struct kvm_irq_routing_entry ue = {782.type = KVM_IRQ_ROUTING_S390_ADAPTER,783.gsi = 1,784.u.adapter = (struct kvm_irq_routing_s390_adapter) {785.ind_addr = 0,786},787};788int rc;789790routing->entries[0] = ue;791routing->nr = 1;792rc = ioctl(self->vm_fd, KVM_SET_GSI_ROUTING, routing);793ASSERT_EQ(-1, rc) TH_LOG("err %s (%i)", strerror(errno), errno);794ASSERT_EQ(EINVAL, errno) TH_LOG("err %s (%i)", strerror(errno), errno);795}796797TEST_HARNESS_MAIN798799800