From patchwork Tue Apr 16 13:10:57 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Huth X-Patchwork-Id: 10902979 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id D16C817E1 for ; Tue, 16 Apr 2019 13:11:07 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B5AE228844 for ; Tue, 16 Apr 2019 13:11:07 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id A9F0B288DC; Tue, 16 Apr 2019 13:11:07 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 223D828844 for ; Tue, 16 Apr 2019 13:11:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727490AbfDPNLF (ORCPT ); Tue, 16 Apr 2019 09:11:05 -0400 Received: from mx1.redhat.com ([209.132.183.28]:38342 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726796AbfDPNLF (ORCPT ); Tue, 16 Apr 2019 09:11:05 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DE786306BB85; Tue, 16 Apr 2019 13:11:04 +0000 (UTC) Received: from thuth.com (ovpn-116-38.ams2.redhat.com [10.36.116.38]) by smtp.corp.redhat.com (Postfix) with ESMTP id D7F1619C71; Tue, 16 Apr 2019 13:11:01 +0000 (UTC) From: Thomas Huth To: kvm@vger.kernel.org, David Hildenbrand Cc: Janosch Frank Subject: [kvm-unit-tests v3 PATCH] s390x: Add a test for the diagnose 0x308 hypercall Date: Tue, 16 Apr 2019 15:10:57 +0200 Message-Id: <20190416131057.20315-1-thuth@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Tue, 16 Apr 2019 13:11:04 +0000 (UTC) Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP The original idea for this test is to have an easy way to check for a problem that has been fixed in QEMU recently: QEMU simply aborted if this diagnose call was called with an unsupported subcode (e.g. 2). The problem has been fixed in QEMU commit 37dbd1f4d4805edcd18d94eb202bb3461b3cd52d ("Return specification exception for unimplemented diag 308 subcodes"), and this test now should make sure that we do not regress here again. While we're at it, also check whether LOAD NORMAL via subcode 1 works correctly, whether the diagnose call is blocked correctly in problem state and whether subcodes 5 and 6 are generating specification exceptions for illegal parameters as expected. Acked-by: Christian Borntraeger Signed-off-by: Thomas Huth --- v3: Use "d" in assembler constraints instead of "a" s390x/Makefile | 1 + s390x/diag308.c | 130 ++++++++++++++++++++++++++++++++++++++++++++ s390x/unittests.cfg | 3 + 3 files changed, 134 insertions(+) create mode 100644 s390x/diag308.c diff --git a/s390x/Makefile b/s390x/Makefile index af40fd4..1f21ddb 100644 --- a/s390x/Makefile +++ b/s390x/Makefile @@ -5,6 +5,7 @@ tests += $(TEST_DIR)/sieve.elf tests += $(TEST_DIR)/sthyi.elf tests += $(TEST_DIR)/skey.elf tests += $(TEST_DIR)/diag10.elf +tests += $(TEST_DIR)/diag308.elf tests += $(TEST_DIR)/pfmf.elf tests += $(TEST_DIR)/cmm.elf tests += $(TEST_DIR)/vector.elf diff --git a/s390x/diag308.c b/s390x/diag308.c new file mode 100644 index 0000000..f085b1a --- /dev/null +++ b/s390x/diag308.c @@ -0,0 +1,130 @@ +/* + * Diagnose 0x308 hypercall tests + * + * Copyright (c) 2019 Thomas Huth, Red Hat Inc. + * + * This code is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2, or (at + * your option) any later version. + */ + +#include +#include +#include + +/* The diagnose calls should be blocked in problem state */ +static void test_priv(void) +{ + expect_pgm_int(); + enter_pstate(); + asm volatile ("diag %0,%1,0x308" :: "d"(0), "d"(3)); + check_pgm_int_code(PGM_INT_CODE_PRIVILEGED_OPERATION); +} + +/* + * Check that diag308 with subcode 1 loads the PSW at address 0, i.e. + * that we can put a pointer into address 4 which then gets executed. + */ +static void test_subcode1(void) +{ + uint64_t saved_psw = *(uint64_t *)0; + long subcode = 1; + long ret, tmp; + + asm volatile ( + " epsw %0,%1\n" + " st %0,0\n" + " larl %0,0f\n" + " oilh %0,0x8000\n" + " st %0,4\n" + " diag 0,%2,0x308\n" + " lghi %0,0\n" + " j 1f\n" + "0: lghi %0,1\n" + "1:" + : "=&d"(ret), "=&d"(tmp) : "d"(subcode) : "memory"); + + *(uint64_t *)0 = saved_psw; + + report("load normal reset done", ret == 1); +} + +/* Expect a specification exception when using an uneven register */ +static void test_uneven_reg(unsigned int subcode) +{ + register unsigned long sc asm("6") = subcode; + register unsigned long r3 asm("9") = 0x2000; + + report_prefix_push("uneven register"); + expect_pgm_int(); + asm volatile ("diag %0,%1,0x308" :: "d"(r3), "d"(sc)); + check_pgm_int_code(PGM_INT_CODE_SPECIFICATION); + report_prefix_pop(); +} + +/* Expect a specification exception when using an unaligned address */ +static void test_unaligned_address(unsigned int subcode) +{ + register unsigned long sc asm("6") = subcode; + register unsigned long addr asm("8") = 54321; + + report_prefix_push("unaligned address"); + expect_pgm_int(); + asm volatile ("diag %0,%1,0x308" :: "d"(addr), "d"(sc)); + check_pgm_int_code(PGM_INT_CODE_SPECIFICATION); + report_prefix_pop(); +} + +static void test_subcode5(void) +{ + test_uneven_reg(5); + test_unaligned_address(5); +} + +static void test_subcode6(void) +{ + test_uneven_reg(6); + test_unaligned_address(6); +} + +/* Unsupported subcodes should generate a specification exception */ +static void test_unsupported_subcode(void) +{ + int subcodes[] = { 2, 0x101, 0xffff, 0x10001, -1 }; + int idx; + + for (idx = 0; idx < ARRAY_SIZE(subcodes); idx++) { + report_prefix_pushf("0x%04x", subcodes[idx]); + expect_pgm_int(); + asm volatile ("diag %0,%1,0x308" :: "d"(0), "d"(subcodes[idx])); + check_pgm_int_code(PGM_INT_CODE_SPECIFICATION); + report_prefix_pop(); + } +} + +static struct { + const char *name; + void (*func)(void); +} tests[] = { + { "privileged", test_priv }, + { "subcode 1", test_subcode1 }, + { "subcode 5", test_subcode5 }, + { "subcode 6", test_subcode6 }, + { "unsupported", test_unsupported_subcode }, + { NULL, NULL } +}; + +int main(int argc, char**argv) +{ + int i; + + report_prefix_push("diag308"); + for (i = 0; tests[i].name; i++) { + report_prefix_push(tests[i].name); + tests[i].func(); + report_prefix_pop(); + } + report_prefix_pop(); + + return report_summary(); +} diff --git a/s390x/unittests.cfg b/s390x/unittests.cfg index e53c365..546b1f2 100644 --- a/s390x/unittests.cfg +++ b/s390x/unittests.cfg @@ -44,6 +44,9 @@ file = skey.elf [diag10] file = diag10.elf +[diag308] +file = diag308.elf + [pfmf] file = pfmf.elf