xref: /linux/tools/testing/selftests/kvm/arm64/no-vgic.c (revision 06bc7ff0a1e0f2b0102e1314e3527a7ec0997851)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 // Check that, on a GICv3-capable system (GICv3 native, or GICv5 with
4 // FEAT_GCIE_LEGACY), not configuring GICv3 correctly results in all
5 // of the sysregs generating an UNDEF exception. Do the same for GICv5
6 // on a GICv5 host.
7 
8 #include <test_util.h>
9 #include <kvm_util.h>
10 #include <processor.h>
11 
12 #include <arm64/gic_v5.h>
13 
14 static volatile bool handled;
15 
16 #define __check_sr_read(r)					\
17 	({							\
18 		u64 val;					\
19 								\
20 		handled = false;				\
21 		dsb(sy);					\
22 		val = read_sysreg_s(SYS_ ## r);			\
23 		val;						\
24 	})
25 
26 #define __check_sr_write(r)					\
27 	do {							\
28 		handled = false;				\
29 		dsb(sy);					\
30 		write_sysreg_s(0, SYS_ ## r);			\
31 		isb();						\
32 	} while (0)
33 
34 #define __check_gicv5_gicr_op(r)				\
35 	({							\
36 		u64 val;					\
37 								\
38 		handled = false;				\
39 		dsb(sy);					\
40 		val = read_sysreg_s(GICV5_OP_GICR_ ## r);	\
41 		val;						\
42 	})
43 
44 #define __check_gicv5_gic_op(r)					\
45 	do {							\
46 		handled = false;				\
47 		dsb(sy);					\
48 		write_sysreg_s(0, GICV5_OP_GIC_ ## r);		\
49 		isb();						\
50 	} while (0)
51 
52 /* Fatal checks */
53 #define check_sr_read(r)					\
54 	do {							\
55 		__check_sr_read(r);				\
56 		__GUEST_ASSERT(handled, #r " no read trap");	\
57 	} while (0)
58 
59 #define check_sr_write(r)					\
60 	do {							\
61 		__check_sr_write(r);				\
62 		__GUEST_ASSERT(handled, #r " no write trap");	\
63 	} while (0)
64 
65 #define check_sr_rw(r)				\
66 	do {					\
67 		check_sr_read(r);		\
68 		check_sr_write(r);		\
69 	} while (0)
70 
71 #define check_gicv5_gicr_op(r)					\
72 	do {							\
73 		__check_gicv5_gicr_op(r);			\
74 		__GUEST_ASSERT(handled, #r " no read trap");	\
75 	} while (0)
76 
77 #define check_gicv5_gic_op(r)					\
78 	do {							\
79 		__check_gicv5_gic_op(r);			\
80 		__GUEST_ASSERT(handled, #r " no write trap");	\
81 	} while (0)
82 
guest_code_gicv3(void)83 static void guest_code_gicv3(void)
84 {
85 	u64 val;
86 
87 	/*
88 	 * Check that we advertise that ID_AA64PFR0_EL1.GIC == 0, having
89 	 * hidden the feature at runtime without any other userspace action.
90 	 */
91 	__GUEST_ASSERT(FIELD_GET(ID_AA64PFR0_EL1_GIC,
92 				 read_sysreg(id_aa64pfr0_el1)) == 0,
93 		       "GICv3 wrongly advertised");
94 
95 	/*
96 	 * Access all GICv3 registers, and fail if we don't get an UNDEF.
97 	 * Note that we happily access all the APxRn registers without
98 	 * checking their existence, as all we want to see is a failure.
99 	 */
100 	check_sr_rw(ICC_PMR_EL1);
101 	check_sr_read(ICC_IAR0_EL1);
102 	check_sr_write(ICC_EOIR0_EL1);
103 	check_sr_rw(ICC_HPPIR0_EL1);
104 	check_sr_rw(ICC_BPR0_EL1);
105 	check_sr_rw(ICC_AP0R0_EL1);
106 	check_sr_rw(ICC_AP0R1_EL1);
107 	check_sr_rw(ICC_AP0R2_EL1);
108 	check_sr_rw(ICC_AP0R3_EL1);
109 	check_sr_rw(ICC_AP1R0_EL1);
110 	check_sr_rw(ICC_AP1R1_EL1);
111 	check_sr_rw(ICC_AP1R2_EL1);
112 	check_sr_rw(ICC_AP1R3_EL1);
113 	check_sr_write(ICC_DIR_EL1);
114 	check_sr_read(ICC_RPR_EL1);
115 	check_sr_write(ICC_SGI1R_EL1);
116 	check_sr_write(ICC_ASGI1R_EL1);
117 	check_sr_write(ICC_SGI0R_EL1);
118 	check_sr_read(ICC_IAR1_EL1);
119 	check_sr_write(ICC_EOIR1_EL1);
120 	check_sr_rw(ICC_HPPIR1_EL1);
121 	check_sr_rw(ICC_BPR1_EL1);
122 	check_sr_rw(ICC_CTLR_EL1);
123 	check_sr_rw(ICC_IGRPEN0_EL1);
124 	check_sr_rw(ICC_IGRPEN1_EL1);
125 
126 	/*
127 	 * ICC_SRE_EL1 may not be trappable, as ICC_SRE_EL2.Enable can
128 	 * be RAO/WI. Engage in non-fatal accesses, starting with a
129 	 * write of 0 to try and disable SRE, and let's see if it
130 	 * sticks.
131 	 */
132 	__check_sr_write(ICC_SRE_EL1);
133 	if (!handled)
134 		GUEST_PRINTF("ICC_SRE_EL1 write not trapping (OK)\n");
135 
136 	val = __check_sr_read(ICC_SRE_EL1);
137 	if (!handled) {
138 		__GUEST_ASSERT((val & BIT(0)),
139 			       "ICC_SRE_EL1 not trapped but ICC_SRE_EL1.SRE not set\n");
140 		GUEST_PRINTF("ICC_SRE_EL1 read not trapping (OK)\n");
141 	}
142 
143 	GUEST_DONE();
144 }
145 
guest_code_gicv5(void)146 static void guest_code_gicv5(void)
147 {
148 	/*
149 	 * Check that we advertise that ID_AA64PFR2_EL1.GCIE == 0, having
150 	 * hidden the feature at runtime without any other userspace action.
151 	 */
152 	__GUEST_ASSERT(FIELD_GET(ID_AA64PFR2_EL1_GCIE,
153 				 read_sysreg_s(SYS_ID_AA64PFR2_EL1)) == 0,
154 		       "GICv5 wrongly advertised");
155 
156 	/*
157 	 * Try all GICv5 instructions, and fail if we don't get an UNDEF.
158 	 */
159 	check_gicv5_gic_op(CDAFF);
160 	check_gicv5_gic_op(CDDI);
161 	check_gicv5_gic_op(CDDIS);
162 	check_gicv5_gic_op(CDEOI);
163 	check_gicv5_gic_op(CDHM);
164 	check_gicv5_gic_op(CDPEND);
165 	check_gicv5_gic_op(CDPRI);
166 	check_gicv5_gic_op(CDRCFG);
167 	check_gicv5_gicr_op(CDIA);
168 	check_gicv5_gicr_op(CDNMIA);
169 
170 	/* Check General System Register acccesses */
171 	check_sr_rw(ICC_APR_EL1);
172 	check_sr_rw(ICC_CR0_EL1);
173 	check_sr_read(ICC_HPPIR_EL1);
174 	check_sr_read(ICC_IAFFIDR_EL1);
175 	check_sr_rw(ICC_ICSR_EL1);
176 	check_sr_read(ICC_IDR0_EL1);
177 	check_sr_rw(ICC_PCR_EL1);
178 
179 	/* Check PPI System Register accessess */
180 	check_sr_rw(ICC_PPI_CACTIVER0_EL1);
181 	check_sr_rw(ICC_PPI_CACTIVER1_EL1);
182 	check_sr_rw(ICC_PPI_SACTIVER0_EL1);
183 	check_sr_rw(ICC_PPI_SACTIVER1_EL1);
184 	check_sr_rw(ICC_PPI_CPENDR0_EL1);
185 	check_sr_rw(ICC_PPI_CPENDR1_EL1);
186 	check_sr_rw(ICC_PPI_SPENDR0_EL1);
187 	check_sr_rw(ICC_PPI_SPENDR1_EL1);
188 	check_sr_rw(ICC_PPI_ENABLER0_EL1);
189 	check_sr_rw(ICC_PPI_ENABLER1_EL1);
190 	check_sr_read(ICC_PPI_HMR0_EL1);
191 	check_sr_read(ICC_PPI_HMR1_EL1);
192 	check_sr_rw(ICC_PPI_PRIORITYR0_EL1);
193 	check_sr_rw(ICC_PPI_PRIORITYR1_EL1);
194 	check_sr_rw(ICC_PPI_PRIORITYR2_EL1);
195 	check_sr_rw(ICC_PPI_PRIORITYR3_EL1);
196 	check_sr_rw(ICC_PPI_PRIORITYR4_EL1);
197 	check_sr_rw(ICC_PPI_PRIORITYR5_EL1);
198 	check_sr_rw(ICC_PPI_PRIORITYR6_EL1);
199 	check_sr_rw(ICC_PPI_PRIORITYR7_EL1);
200 	check_sr_rw(ICC_PPI_PRIORITYR8_EL1);
201 	check_sr_rw(ICC_PPI_PRIORITYR9_EL1);
202 	check_sr_rw(ICC_PPI_PRIORITYR10_EL1);
203 	check_sr_rw(ICC_PPI_PRIORITYR11_EL1);
204 	check_sr_rw(ICC_PPI_PRIORITYR12_EL1);
205 	check_sr_rw(ICC_PPI_PRIORITYR13_EL1);
206 	check_sr_rw(ICC_PPI_PRIORITYR14_EL1);
207 	check_sr_rw(ICC_PPI_PRIORITYR15_EL1);
208 
209 	GUEST_DONE();
210 }
211 
guest_undef_handler(struct ex_regs * regs)212 static void guest_undef_handler(struct ex_regs *regs)
213 {
214 	/* Success, we've gracefully exploded! */
215 	handled = true;
216 	regs->pc += 4;
217 }
218 
test_run_vcpu(struct kvm_vcpu * vcpu)219 static void test_run_vcpu(struct kvm_vcpu *vcpu)
220 {
221 	struct ucall uc;
222 
223 	do {
224 		vcpu_run(vcpu);
225 
226 		switch (get_ucall(vcpu, &uc)) {
227 		case UCALL_ABORT:
228 			REPORT_GUEST_ASSERT(uc);
229 			break;
230 		case UCALL_PRINTF:
231 			printf("%s", uc.buffer);
232 			break;
233 		case UCALL_DONE:
234 			break;
235 		default:
236 			TEST_FAIL("Unknown ucall %lu", uc.cmd);
237 		}
238 	} while (uc.cmd != UCALL_DONE);
239 }
240 
test_guest_no_vgic(void * guest_code)241 static void test_guest_no_vgic(void *guest_code)
242 {
243 	struct kvm_vcpu *vcpu;
244 	struct kvm_vm *vm;
245 
246 	/* Create a VM without a GIC */
247 	vm = vm_create_with_one_vcpu(&vcpu, guest_code);
248 
249 	vm_init_descriptor_tables(vm);
250 	vcpu_init_descriptor_tables(vcpu);
251 
252 	vm_install_sync_handler(vm, VECTOR_SYNC_CURRENT,
253 				ESR_ELx_EC_UNKNOWN, guest_undef_handler);
254 
255 	test_run_vcpu(vcpu);
256 
257 	kvm_vm_free(vm);
258 }
259 
main(int argc,char * argv[])260 int main(int argc, char *argv[])
261 {
262 	struct kvm_vcpu *vcpu;
263 	struct kvm_vm *vm;
264 	bool has_v3, has_v5;
265 	u64 pfr;
266 
267 	test_disable_default_vgic();
268 
269 	vm = vm_create_with_one_vcpu(&vcpu, NULL);
270 
271 	pfr = vcpu_get_reg(vcpu, KVM_ARM64_SYS_REG(SYS_ID_AA64PFR0_EL1));
272 	has_v3 = !!FIELD_GET(ID_AA64PFR0_EL1_GIC, pfr);
273 
274 	pfr = vcpu_get_reg(vcpu, KVM_ARM64_SYS_REG(SYS_ID_AA64PFR2_EL1));
275 	has_v5 = !!FIELD_GET(ID_AA64PFR2_EL1_GCIE, pfr);
276 
277 	kvm_vm_free(vm);
278 
279 	__TEST_REQUIRE(has_v3 || has_v5,
280 		       "Neither GICv3 nor GICv5 supported.");
281 
282 	if (has_v3) {
283 		pr_info("Testing no-vgic-v3\n");
284 		test_guest_no_vgic(guest_code_gicv3);
285 	} else {
286 		pr_info("No GICv3 support: skipping no-vgic-v3 test\n");
287 	}
288 
289 	if (has_v5) {
290 		pr_info("Testing no-vgic-v5\n");
291 		test_guest_no_vgic(guest_code_gicv5);
292 	} else {
293 		pr_info("No GICv5 support: skipping no-vgic-v5 test\n");
294 	}
295 
296 	return 0;
297 }
298