This adds SDEI test case into selftests where the various hypercalls are issued to kvm private event (0x40200000) and then ensure that's completed without error. Note that two vCPUs are started up by default to run same consequence. Actually, it's simulating what SDEI client driver does and the following hypercalls are issued in sequence: SDEI_1_0_FN_SDEI_VERSION (probing SDEI capability) SDEI_1_0_FN_SDEI_PE_UNMASK (CPU online) SDEI_1_0_FN_SDEI_PRIVATE_RESET (restart SDEI) SDEI_1_0_FN_SDEI_SHARED_RESET SDEI_1_0_FN_SDEI_EVENT_GET_INFO (register event) SDEI_1_0_FN_SDEI_EVENT_GET_INFO SDEI_1_0_FN_SDEI_EVENT_GET_INFO SDEI_1_0_FN_SDEI_EVENT_REGISTER SDEI_1_0_FN_SDEI_EVENT_ENABLE (enable event) SDEI_1_0_FN_SDEI_EVENT_DISABLE (disable event) SDEI_1_0_FN_SDEI_EVENT_UNREGISTER (unregister event) SDEI_1_0_FN_SDEI_PE_MASK (CPU offline) Signed-off-by: Gavin Shan <gshan@xxxxxxxxxx> --- tools/testing/selftests/kvm/Makefile | 1 + tools/testing/selftests/kvm/aarch64/sdei.c | 172 +++++++++++++++++++++ 2 files changed, 173 insertions(+) create mode 100644 tools/testing/selftests/kvm/aarch64/sdei.c diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile index fe41c6a0fa67..482faa88520b 100644 --- a/tools/testing/selftests/kvm/Makefile +++ b/tools/testing/selftests/kvm/Makefile @@ -74,6 +74,7 @@ TEST_GEN_PROGS_aarch64 += dirty_log_perf_test TEST_GEN_PROGS_aarch64 += kvm_create_max_vcpus TEST_GEN_PROGS_aarch64 += set_memory_region_test TEST_GEN_PROGS_aarch64 += steal_time +TEST_GEN_PROGS_aarch64 += aarch64/sdei TEST_GEN_PROGS_s390x = s390x/memop TEST_GEN_PROGS_s390x += s390x/resets diff --git a/tools/testing/selftests/kvm/aarch64/sdei.c b/tools/testing/selftests/kvm/aarch64/sdei.c new file mode 100644 index 000000000000..1a4cdae84ad5 --- /dev/null +++ b/tools/testing/selftests/kvm/aarch64/sdei.c @@ -0,0 +1,172 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ARM SDEI test + * + * Copyright (C) 2021 Red Hat, Inc. + * + * Author(s): Gavin Shan <gshan@xxxxxxxxxx> + */ +#define _GNU_SOURCE +#include <stdio.h> + +#include "test_util.h" +#include "kvm_util.h" +#include "processor.h" +#include "asm/kvm_sdei.h" +#include "linux/arm_sdei.h" + +#define NR_VCPUS 2 +#define SDEI_GPA_BASE (1 << 30) + +struct sdei_event { + uint32_t cpu; + uint64_t version; + uint64_t num; + uint64_t type; + uint64_t priority; + uint64_t signaled; +}; + +static struct sdei_event sdei_events[NR_VCPUS]; + +static int64_t smccc(uint32_t func, uint64_t arg0, uint64_t arg1, + uint64_t arg2, uint64_t arg3, uint64_t arg4) +{ + int64_t ret; + + asm volatile( + "mov x0, %1\n" + "mov x1, %2\n" + "mov x2, %3\n" + "mov x3, %4\n" + "mov x4, %5\n" + "mov x5, %6\n" + "hvc #0\n" + "mov %0, x0\n" + : "=r" (ret) : "r" (func), "r" (arg0), "r" (arg1), + "r" (arg2), "r" (arg3), "r" (arg4) : + "x0", "x1", "x2", "x3", "x4", "x5"); + + return ret; +} + +static inline bool is_error(int64_t ret) +{ + if (ret == SDEI_NOT_SUPPORTED || + ret == SDEI_INVALID_PARAMETERS || + ret == SDEI_DENIED || + ret == SDEI_PENDING || + ret == SDEI_OUT_OF_RESOURCE) + return true; + + return false; +} + +static void guest_code(int cpu) +{ + struct sdei_event *event = &sdei_events[cpu]; + int64_t ret; + + /* CPU */ + event->cpu = cpu; + event->num = KVM_SDEI_DEFAULT_NUM; + GUEST_ASSERT(cpu < NR_VCPUS); + + /* Version */ + ret = smccc(SDEI_1_0_FN_SDEI_VERSION, 0, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + GUEST_ASSERT(SDEI_VERSION_MAJOR(ret) == 1); + GUEST_ASSERT(SDEI_VERSION_MINOR(ret) == 0); + event->version = ret; + + /* CPU unmasking */ + ret = smccc(SDEI_1_0_FN_SDEI_PE_UNMASK, 0, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + /* Reset */ + ret = smccc(SDEI_1_0_FN_SDEI_PRIVATE_RESET, 0, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + ret = smccc(SDEI_1_0_FN_SDEI_SHARED_RESET, 0, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + /* Event properties */ + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_GET_INFO, + event->num, SDEI_EVENT_INFO_EV_TYPE, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + event->type = ret; + + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_GET_INFO, + event->num, SDEI_EVENT_INFO_EV_PRIORITY, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + event->priority = ret; + + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_GET_INFO, + event->num, SDEI_EVENT_INFO_EV_SIGNALED, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + event->signaled = ret; + + /* Event registration */ + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_REGISTER, + event->num, 0, 0, SDEI_EVENT_REGISTER_RM_ANY, 0); + GUEST_ASSERT(!is_error(ret)); + + /* Event enablement */ + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_ENABLE, + event->num, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + /* Event disablement */ + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_DISABLE, + event->num, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + /* Event unregistration */ + ret = smccc(SDEI_1_0_FN_SDEI_EVENT_UNREGISTER, + event->num, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + /* CPU masking */ + ret = smccc(SDEI_1_0_FN_SDEI_PE_MASK, 0, 0, 0, 0, 0); + GUEST_ASSERT(!is_error(ret)); + + GUEST_DONE(); +} + +int main(int argc, char **argv) +{ + struct kvm_vm *vm; + int i; + + if (!kvm_check_cap(KVM_CAP_ARM_SDEI)) { + pr_info("SDEI not supported\n"); + return 0; + } + + vm = vm_create_default(0, 0, guest_code); + ucall_init(vm, NULL); + + for (i = 1; i < NR_VCPUS; i++) + vm_vcpu_add_default(vm, i, guest_code); + + for (i = 0; i < NR_VCPUS; i++) { + vcpu_args_set(vm, i, 1, i); + vcpu_run(vm, i); + + sync_global_from_guest(vm, sdei_events[i]); + pr_info("--------------------------------\n"); + pr_info("CPU: %d\n", + sdei_events[i].cpu); + pr_info("Version: %ld.%ld (0x%lx)\n", + SDEI_VERSION_MAJOR(sdei_events[i].version), + SDEI_VERSION_MINOR(sdei_events[i].version), + SDEI_VERSION_VENDOR(sdei_events[i].version)); + pr_info("Event: 0x%08lx\n", + sdei_events[i].num); + pr_info("Type: %s\n", + sdei_events[i].type ? "shared" : "private"); + pr_info("Signaled: %s\n", + sdei_events[i].signaled ? "yes" : "no"); + } + + return 0; +} -- 2.23.0 _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm