291 lines
7.4 KiB
C
291 lines
7.4 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* psci_test - Tests relating to KVM's PSCI implementation.
|
|
*
|
|
* Copyright (c) 2021 Google LLC.
|
|
*
|
|
* This test includes:
|
|
* - A regression test for a race between KVM servicing the PSCI CPU_ON call
|
|
* and userspace reading the targeted vCPU's registers.
|
|
* - A test for KVM's handling of PSCI SYSTEM_SUSPEND and the associated
|
|
* KVM_SYSTEM_EVENT_SUSPEND UAPI.
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/psci.h>
|
|
#include <asm/cputype.h>
|
|
|
|
#include "kvm_util.h"
|
|
#include "processor.h"
|
|
#include "test_util.h"
|
|
|
|
#define CPU_ON_ENTRY_ADDR 0xfeedf00dul
|
|
#define CPU_ON_CONTEXT_ID 0xdeadc0deul
|
|
|
|
static uint64_t psci_cpu_on(uint64_t target_cpu, uint64_t entry_addr,
|
|
uint64_t context_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_0_2_FN64_CPU_ON, target_cpu, entry_addr, context_id,
|
|
0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_affinity_info(uint64_t target_affinity,
|
|
uint64_t lowest_affinity_level)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_0_2_FN64_AFFINITY_INFO, target_affinity, lowest_affinity_level,
|
|
0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_system_suspend(uint64_t entry_addr, uint64_t context_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_0_FN64_SYSTEM_SUSPEND, entry_addr, context_id,
|
|
0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_system_off2(uint64_t type, uint64_t cookie)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_3_FN64_SYSTEM_OFF2, type, cookie, 0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static uint64_t psci_features(uint32_t func_id)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
smccc_hvc(PSCI_1_0_FN_PSCI_FEATURES, func_id, 0, 0, 0, 0, 0, 0, &res);
|
|
|
|
return res.a0;
|
|
}
|
|
|
|
static void vcpu_power_off(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_mp_state mp_state = {
|
|
.mp_state = KVM_MP_STATE_STOPPED,
|
|
};
|
|
|
|
vcpu_mp_state_set(vcpu, &mp_state);
|
|
}
|
|
|
|
static struct kvm_vm *setup_vm(void *guest_code, struct kvm_vcpu **source,
|
|
struct kvm_vcpu **target)
|
|
{
|
|
struct kvm_vcpu_init init;
|
|
struct kvm_vm *vm;
|
|
|
|
vm = vm_create(2);
|
|
|
|
vm_ioctl(vm, KVM_ARM_PREFERRED_TARGET, &init);
|
|
init.features[0] |= (1 << KVM_ARM_VCPU_PSCI_0_2);
|
|
|
|
*source = aarch64_vcpu_add(vm, 0, &init, guest_code);
|
|
*target = aarch64_vcpu_add(vm, 1, &init, guest_code);
|
|
|
|
return vm;
|
|
}
|
|
|
|
static void enter_guest(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct ucall uc;
|
|
|
|
vcpu_run(vcpu);
|
|
if (get_ucall(vcpu, &uc) == UCALL_ABORT)
|
|
REPORT_GUEST_ASSERT(uc);
|
|
}
|
|
|
|
static void assert_vcpu_reset(struct kvm_vcpu *vcpu)
|
|
{
|
|
uint64_t obs_pc, obs_x0;
|
|
|
|
vcpu_get_reg(vcpu, ARM64_CORE_REG(regs.pc), &obs_pc);
|
|
vcpu_get_reg(vcpu, ARM64_CORE_REG(regs.regs[0]), &obs_x0);
|
|
|
|
TEST_ASSERT(obs_pc == CPU_ON_ENTRY_ADDR,
|
|
"unexpected target cpu pc: %lx (expected: %lx)",
|
|
obs_pc, CPU_ON_ENTRY_ADDR);
|
|
TEST_ASSERT(obs_x0 == CPU_ON_CONTEXT_ID,
|
|
"unexpected target context id: %lx (expected: %lx)",
|
|
obs_x0, CPU_ON_CONTEXT_ID);
|
|
}
|
|
|
|
static void guest_test_cpu_on(uint64_t target_cpu)
|
|
{
|
|
uint64_t target_state;
|
|
|
|
GUEST_ASSERT(!psci_cpu_on(target_cpu, CPU_ON_ENTRY_ADDR, CPU_ON_CONTEXT_ID));
|
|
|
|
do {
|
|
target_state = psci_affinity_info(target_cpu, 0);
|
|
|
|
GUEST_ASSERT((target_state == PSCI_0_2_AFFINITY_LEVEL_ON) ||
|
|
(target_state == PSCI_0_2_AFFINITY_LEVEL_OFF));
|
|
} while (target_state != PSCI_0_2_AFFINITY_LEVEL_ON);
|
|
|
|
GUEST_DONE();
|
|
}
|
|
|
|
static void host_test_cpu_on(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
uint64_t target_mpidr;
|
|
struct kvm_vm *vm;
|
|
struct ucall uc;
|
|
|
|
vm = setup_vm(guest_test_cpu_on, &source, &target);
|
|
|
|
/*
|
|
* make sure the target is already off when executing the test.
|
|
*/
|
|
vcpu_power_off(target);
|
|
|
|
vcpu_get_reg(target, KVM_ARM64_SYS_REG(SYS_MPIDR_EL1), &target_mpidr);
|
|
vcpu_args_set(source, 1, target_mpidr & MPIDR_HWID_BITMASK);
|
|
enter_guest(source);
|
|
|
|
if (get_ucall(source, &uc) != UCALL_DONE)
|
|
TEST_FAIL("Unhandled ucall: %lu", uc.cmd);
|
|
|
|
assert_vcpu_reset(target);
|
|
kvm_vm_free(vm);
|
|
}
|
|
|
|
static void guest_test_system_suspend(void)
|
|
{
|
|
uint64_t ret;
|
|
|
|
/* assert that SYSTEM_SUSPEND is discoverable */
|
|
GUEST_ASSERT(!psci_features(PSCI_1_0_FN_SYSTEM_SUSPEND));
|
|
GUEST_ASSERT(!psci_features(PSCI_1_0_FN64_SYSTEM_SUSPEND));
|
|
|
|
ret = psci_system_suspend(CPU_ON_ENTRY_ADDR, CPU_ON_CONTEXT_ID);
|
|
GUEST_SYNC(ret);
|
|
}
|
|
|
|
static void host_test_system_suspend(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
struct kvm_run *run;
|
|
struct kvm_vm *vm;
|
|
|
|
vm = setup_vm(guest_test_system_suspend, &source, &target);
|
|
vm_enable_cap(vm, KVM_CAP_ARM_SYSTEM_SUSPEND, 0);
|
|
|
|
vcpu_power_off(target);
|
|
run = source->run;
|
|
|
|
enter_guest(source);
|
|
|
|
TEST_ASSERT_KVM_EXIT_REASON(source, KVM_EXIT_SYSTEM_EVENT);
|
|
TEST_ASSERT(run->system_event.type == KVM_SYSTEM_EVENT_SUSPEND,
|
|
"Unhandled system event: %u (expected: %u)",
|
|
run->system_event.type, KVM_SYSTEM_EVENT_SUSPEND);
|
|
|
|
kvm_vm_free(vm);
|
|
}
|
|
|
|
static void guest_test_system_off2(void)
|
|
{
|
|
uint64_t ret;
|
|
|
|
/* assert that SYSTEM_OFF2 is discoverable */
|
|
GUEST_ASSERT(psci_features(PSCI_1_3_FN_SYSTEM_OFF2) &
|
|
PSCI_1_3_OFF_TYPE_HIBERNATE_OFF);
|
|
GUEST_ASSERT(psci_features(PSCI_1_3_FN64_SYSTEM_OFF2) &
|
|
PSCI_1_3_OFF_TYPE_HIBERNATE_OFF);
|
|
|
|
/* With non-zero 'cookie' field, it should fail */
|
|
ret = psci_system_off2(PSCI_1_3_OFF_TYPE_HIBERNATE_OFF, 1);
|
|
GUEST_ASSERT(ret == PSCI_RET_INVALID_PARAMS);
|
|
|
|
/*
|
|
* This would normally never return, so KVM sets the return value
|
|
* to PSCI_RET_INTERNAL_FAILURE. The test case *does* return, so
|
|
* that it can test both values for HIBERNATE_OFF.
|
|
*/
|
|
ret = psci_system_off2(PSCI_1_3_OFF_TYPE_HIBERNATE_OFF, 0);
|
|
GUEST_ASSERT(ret == PSCI_RET_INTERNAL_FAILURE);
|
|
|
|
/*
|
|
* Revision F.b of the PSCI v1.3 specification documents zero as an
|
|
* alias for HIBERNATE_OFF, since that's the value used in earlier
|
|
* revisions of the spec and some implementations in the field.
|
|
*/
|
|
ret = psci_system_off2(0, 1);
|
|
GUEST_ASSERT(ret == PSCI_RET_INVALID_PARAMS);
|
|
|
|
ret = psci_system_off2(0, 0);
|
|
GUEST_ASSERT(ret == PSCI_RET_INTERNAL_FAILURE);
|
|
|
|
GUEST_DONE();
|
|
}
|
|
|
|
static void host_test_system_off2(void)
|
|
{
|
|
struct kvm_vcpu *source, *target;
|
|
struct kvm_mp_state mps;
|
|
uint64_t psci_version = 0;
|
|
int nr_shutdowns = 0;
|
|
struct kvm_run *run;
|
|
struct ucall uc;
|
|
|
|
setup_vm(guest_test_system_off2, &source, &target);
|
|
|
|
vcpu_get_reg(target, KVM_REG_ARM_PSCI_VERSION, &psci_version);
|
|
|
|
TEST_ASSERT(psci_version >= PSCI_VERSION(1, 3),
|
|
"Unexpected PSCI version %lu.%lu",
|
|
PSCI_VERSION_MAJOR(psci_version),
|
|
PSCI_VERSION_MINOR(psci_version));
|
|
|
|
vcpu_power_off(target);
|
|
run = source->run;
|
|
|
|
enter_guest(source);
|
|
while (run->exit_reason == KVM_EXIT_SYSTEM_EVENT) {
|
|
TEST_ASSERT(run->system_event.type == KVM_SYSTEM_EVENT_SHUTDOWN,
|
|
"Unhandled system event: %u (expected: %u)",
|
|
run->system_event.type, KVM_SYSTEM_EVENT_SHUTDOWN);
|
|
TEST_ASSERT(run->system_event.ndata >= 1,
|
|
"Unexpected amount of system event data: %u (expected, >= 1)",
|
|
run->system_event.ndata);
|
|
TEST_ASSERT(run->system_event.data[0] & KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2,
|
|
"PSCI_OFF2 flag not set. Flags %llu (expected %llu)",
|
|
run->system_event.data[0], KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2);
|
|
|
|
nr_shutdowns++;
|
|
|
|
/* Restart the vCPU */
|
|
mps.mp_state = KVM_MP_STATE_RUNNABLE;
|
|
vcpu_mp_state_set(source, &mps);
|
|
|
|
enter_guest(source);
|
|
}
|
|
|
|
TEST_ASSERT(get_ucall(source, &uc) == UCALL_DONE, "Guest did not exit cleanly");
|
|
TEST_ASSERT(nr_shutdowns == 2, "Two shutdown events were expected, but saw %d", nr_shutdowns);
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
TEST_REQUIRE(kvm_has_cap(KVM_CAP_ARM_SYSTEM_SUSPEND));
|
|
|
|
host_test_cpu_on();
|
|
host_test_system_suspend();
|
|
host_test_system_off2();
|
|
return 0;
|
|
}
|