mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Use the kernel's canonical $(ARCH) paths instead of the raw target triple for KVM selftests directories. KVM selftests are quite nearly the only place in the entire kernel that using the target triple for directories, tools/testing/selftests/drivers/s390x being the lone holdout. Using the kernel's preferred nomenclature eliminates the minor, but annoying, friction of having to translate to KVM's selftests directories, e.g. for pattern matching, opening files, running selftests, etc. Opportunsitically delete file comments that reference the full path of the file, as they are obviously prone to becoming stale, and serve no known purpose. Reviewed-by: Muhammad Usama Anjum <usama.anjum@collabora.com> Acked-by: Claudio Imbrenda <imbrenda@linux.ibm.com> Acked-by: Andrew Jones <ajones@ventanamicro.com> Link: https://lore.kernel.org/r/20241128005547.4077116-16-seanjc@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
290 lines
7.4 KiB
C
290 lines
7.4 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* psci_test - Tests relating to KVM's PSCI implementation.
|
|
*
|
|
* Copyright (c) 2021 Google LLC.
|
|
*
|
|
* This test includes:
|
|
* - A regression test for a race between KVM servicing the PSCI CPU_ON call
|
|
* and userspace reading the targeted vCPU's registers.
|
|
* - A test for KVM's handling of PSCI SYSTEM_SUSPEND and the associated
|
|
* KVM_SYSTEM_EVENT_SUSPEND UAPI.
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/psci.h>
|
|
#include <asm/cputype.h>
|
|
|
|
#include "kvm_util.h"
|
|
#include "processor.h"
|
|
#include "test_util.h"
|
|
|
|
#define CPU_ON_ENTRY_ADDR 0xfeedf00dul
|
|
#define CPU_ON_CONTEXT_ID 0xdeadc0deul
|
|
|
|
static uint64_t psci_cpu_on(uint64_t target_cpu, uint64_t entry_addr,
|
|
uint64_t context_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_0_2_FN64_CPU_ON, target_cpu, entry_addr, context_id,
|
|
0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_affinity_info(uint64_t target_affinity,
|
|
uint64_t lowest_affinity_level)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_0_2_FN64_AFFINITY_INFO, target_affinity, lowest_affinity_level,
|
|
0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_system_suspend(uint64_t entry_addr, uint64_t context_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_0_FN64_SYSTEM_SUSPEND, entry_addr, context_id,
|
|
0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_system_off2(uint64_t type, uint64_t cookie)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_3_FN64_SYSTEM_OFF2, type, cookie, 0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_features(uint32_t func_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_0_FN_PSCI_FEATURES, func_id, 0, 0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static void vcpu_power_off(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_mp_state mp_state = {
|
|
.mp_state = KVM_MP_STATE_STOPPED,
|
|
};
|
|
|
|
vcpu_mp_state_set(vcpu, &mp_state);
|
|
}
|
|
|
|
static struct kvm_vm *setup_vm(void *guest_code, struct kvm_vcpu **source,
|
|
struct kvm_vcpu **target)
|
|
{
|
|
struct kvm_vcpu_init init;
|
|
struct kvm_vm *vm;
|
|
|
|
vm = vm_create(2);
|
|
|
|
vm_ioctl(vm, KVM_ARM_PREFERRED_TARGET, &init);
|
|
init.features[0] |= (1 << KVM_ARM_VCPU_PSCI_0_2);
|
|
|
|
*source = aarch64_vcpu_add(vm, 0, &init, guest_code);
|
|
*target = aarch64_vcpu_add(vm, 1, &init, guest_code);
|
|
|
|
return vm;
|
|
}
|
|
|
|
static void enter_guest(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct ucall uc;
|
|
|
|
vcpu_run(vcpu);
|
|
if (get_ucall(vcpu, &uc) == UCALL_ABORT)
|
|
REPORT_GUEST_ASSERT(uc);
|
|
}
|
|
|
|
static void assert_vcpu_reset(struct kvm_vcpu *vcpu)
|
|
{
|
|
uint64_t obs_pc, obs_x0;
|
|
|
|
obs_pc = vcpu_get_reg(vcpu, ARM64_CORE_REG(regs.pc));
|
|
obs_x0 = vcpu_get_reg(vcpu, ARM64_CORE_REG(regs.regs[0]));
|
|
|
|
TEST_ASSERT(obs_pc == CPU_ON_ENTRY_ADDR,
|
|
"unexpected target cpu pc: %lx (expected: %lx)",
|
|
obs_pc, CPU_ON_ENTRY_ADDR);
|
|
TEST_ASSERT(obs_x0 == CPU_ON_CONTEXT_ID,
|
|
"unexpected target context id: %lx (expected: %lx)",
|
|
obs_x0, CPU_ON_CONTEXT_ID);
|
|
}
|
|
|
|
static void guest_test_cpu_on(uint64_t target_cpu)
|
|
{
|
|
uint64_t target_state;
|
|
|
|
GUEST_ASSERT(!psci_cpu_on(target_cpu, CPU_ON_ENTRY_ADDR, CPU_ON_CONTEXT_ID));
|
|
|
|
do {
|
|
target_state = psci_affinity_info(target_cpu, 0);
|
|
|
|
GUEST_ASSERT((target_state == PSCI_0_2_AFFINITY_LEVEL_ON) ||
|
|
(target_state == PSCI_0_2_AFFINITY_LEVEL_OFF));
|
|
} while (target_state != PSCI_0_2_AFFINITY_LEVEL_ON);
|
|
|
|
GUEST_DONE();
|
|
}
|
|
|
|
static void host_test_cpu_on(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
uint64_t target_mpidr;
|
|
struct kvm_vm *vm;
|
|
struct ucall uc;
|
|
|
|
vm = setup_vm(guest_test_cpu_on, &source, &target);
|
|
|
|
/*
|
|
* make sure the target is already off when executing the test.
|
|
*/
|
|
vcpu_power_off(target);
|
|
|
|
target_mpidr = vcpu_get_reg(target, KVM_ARM64_SYS_REG(SYS_MPIDR_EL1));
|
|
vcpu_args_set(source, 1, target_mpidr & MPIDR_HWID_BITMASK);
|
|
enter_guest(source);
|
|
|
|
if (get_ucall(source, &uc) != UCALL_DONE)
|
|
TEST_FAIL("Unhandled ucall: %lu", uc.cmd);
|
|
|
|
assert_vcpu_reset(target);
|
|
kvm_vm_free(vm);
|
|
}
|
|
|
|
static void guest_test_system_suspend(void)
|
|
{
|
|
uint64_t ret;
|
|
|
|
/* assert that SYSTEM_SUSPEND is discoverable */
|
|
GUEST_ASSERT(!psci_features(PSCI_1_0_FN_SYSTEM_SUSPEND));
|
|
GUEST_ASSERT(!psci_features(PSCI_1_0_FN64_SYSTEM_SUSPEND));
|
|
|
|
ret = psci_system_suspend(CPU_ON_ENTRY_ADDR, CPU_ON_CONTEXT_ID);
|
|
GUEST_SYNC(ret);
|
|
}
|
|
|
|
static void host_test_system_suspend(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
struct kvm_run *run;
|
|
struct kvm_vm *vm;
|
|
|
|
vm = setup_vm(guest_test_system_suspend, &source, &target);
|
|
vm_enable_cap(vm, KVM_CAP_ARM_SYSTEM_SUSPEND, 0);
|
|
|
|
vcpu_power_off(target);
|
|
run = source->run;
|
|
|
|
enter_guest(source);
|
|
|
|
TEST_ASSERT_KVM_EXIT_REASON(source, KVM_EXIT_SYSTEM_EVENT);
|
|
TEST_ASSERT(run->system_event.type == KVM_SYSTEM_EVENT_SUSPEND,
|
|
"Unhandled system event: %u (expected: %u)",
|
|
run->system_event.type, KVM_SYSTEM_EVENT_SUSPEND);
|
|
|
|
kvm_vm_free(vm);
|
|
}
|
|
|
|
static void guest_test_system_off2(void)
|
|
{
|
|
uint64_t ret;
|
|
|
|
/* assert that SYSTEM_OFF2 is discoverable */
|
|
GUEST_ASSERT(psci_features(PSCI_1_3_FN_SYSTEM_OFF2) &
|
|
PSCI_1_3_OFF_TYPE_HIBERNATE_OFF);
|
|
GUEST_ASSERT(psci_features(PSCI_1_3_FN64_SYSTEM_OFF2) &
|
|
PSCI_1_3_OFF_TYPE_HIBERNATE_OFF);
|
|
|
|
/* With non-zero 'cookie' field, it should fail */
|
|
ret = psci_system_off2(PSCI_1_3_OFF_TYPE_HIBERNATE_OFF, 1);
|
|
GUEST_ASSERT(ret == PSCI_RET_INVALID_PARAMS);
|
|
|
|
/*
|
|
* This would normally never return, so KVM sets the return value
|
|
* to PSCI_RET_INTERNAL_FAILURE. The test case *does* return, so
|
|
* that it can test both values for HIBERNATE_OFF.
|
|
*/
|
|
ret = psci_system_off2(PSCI_1_3_OFF_TYPE_HIBERNATE_OFF, 0);
|
|
GUEST_ASSERT(ret == PSCI_RET_INTERNAL_FAILURE);
|
|
|
|
/*
|
|
* Revision F.b of the PSCI v1.3 specification documents zero as an
|
|
* alias for HIBERNATE_OFF, since that's the value used in earlier
|
|
* revisions of the spec and some implementations in the field.
|
|
*/
|
|
ret = psci_system_off2(0, 1);
|
|
GUEST_ASSERT(ret == PSCI_RET_INVALID_PARAMS);
|
|
|
|
ret = psci_system_off2(0, 0);
|
|
GUEST_ASSERT(ret == PSCI_RET_INTERNAL_FAILURE);
|
|
|
|
GUEST_DONE();
|
|
}
|
|
|
|
static void host_test_system_off2(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
struct kvm_mp_state mps;
|
|
uint64_t psci_version = 0;
|
|
int nr_shutdowns = 0;
|
|
struct kvm_run *run;
|
|
struct ucall uc;
|
|
|
|
setup_vm(guest_test_system_off2, &source, &target);
|
|
|
|
psci_version = vcpu_get_reg(target, KVM_REG_ARM_PSCI_VERSION);
|
|
|
|
TEST_ASSERT(psci_version >= PSCI_VERSION(1, 3),
|
|
"Unexpected PSCI version %lu.%lu",
|
|
PSCI_VERSION_MAJOR(psci_version),
|
|
PSCI_VERSION_MINOR(psci_version));
|
|
|
|
vcpu_power_off(target);
|
|
run = source->run;
|
|
|
|
enter_guest(source);
|
|
while (run->exit_reason == KVM_EXIT_SYSTEM_EVENT) {
|
|
TEST_ASSERT(run->system_event.type == KVM_SYSTEM_EVENT_SHUTDOWN,
|
|
"Unhandled system event: %u (expected: %u)",
|
|
run->system_event.type, KVM_SYSTEM_EVENT_SHUTDOWN);
|
|
TEST_ASSERT(run->system_event.ndata >= 1,
|
|
"Unexpected amount of system event data: %u (expected, >= 1)",
|
|
run->system_event.ndata);
|
|
TEST_ASSERT(run->system_event.data[0] & KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2,
|
|
"PSCI_OFF2 flag not set. Flags %llu (expected %llu)",
|
|
run->system_event.data[0], KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2);
|
|
|
|
nr_shutdowns++;
|
|
|
|
/* Restart the vCPU */
|
|
mps.mp_state = KVM_MP_STATE_RUNNABLE;
|
|
vcpu_mp_state_set(source, &mps);
|
|
|
|
enter_guest(source);
|
|
}
|
|
|
|
TEST_ASSERT(get_ucall(source, &uc) == UCALL_DONE, "Guest did not exit cleanly");
|
|
TEST_ASSERT(nr_shutdowns == 2, "Two shutdown events were expected, but saw %d", nr_shutdowns);
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
TEST_REQUIRE(kvm_has_cap(KVM_CAP_ARM_SYSTEM_SUSPEND));
|
|
|
|
host_test_cpu_on();
|
|
host_test_system_suspend();
|
|
host_test_system_off2();
|
|
return 0;
|
|
}
|