xref: /linux/tools/testing/selftests/liveupdate/luo_kexec_simple.c (revision b61104e7a6349bd2c2b3e2fb3260d87f15eda8f4)
1 // SPDX-License-Identifier: GPL-2.0-only
2 
3 /*
4  * Copyright (c) 2025, Google LLC.
5  * Pasha Tatashin <pasha.tatashin@soleen.com>
6  *
7  * A simple selftest to validate the end-to-end lifecycle of a LUO session
8  * across a single kexec reboot.
9  */
10 
11 #include "luo_test_utils.h"
12 
13 #define TEST_SESSION_NAME "test-session"
14 #define TEST_MEMFD_TOKEN 0x1A
15 #define TEST_MEMFD_DATA "hello kexec world"
16 
17 /* Constants for the state-tracking mechanism, specific to this test file. */
18 #define STATE_SESSION_NAME "kexec_simple_state"
19 #define STATE_MEMFD_TOKEN 999
20 
21 /* Stage 1: Executed before the kexec reboot. */
22 static void run_stage_1(int luo_fd)
23 {
24 	int session_fd;
25 
26 	ksft_print_msg("[STAGE 1] Starting pre-kexec setup...\n");
27 
28 	ksft_print_msg("[STAGE 1] Creating state file for next stage (2)...\n");
29 	create_state_file(luo_fd, STATE_SESSION_NAME, STATE_MEMFD_TOKEN, 2);
30 
31 	ksft_print_msg("[STAGE 1] Creating session '%s' and preserving memfd...\n",
32 		       TEST_SESSION_NAME);
33 	session_fd = luo_create_session(luo_fd, TEST_SESSION_NAME);
34 	if (session_fd < 0)
35 		fail_exit("luo_create_session for '%s'", TEST_SESSION_NAME);
36 
37 	if (create_and_preserve_memfd(session_fd, TEST_MEMFD_TOKEN,
38 				      TEST_MEMFD_DATA) < 0) {
39 		fail_exit("create_and_preserve_memfd for token %#x",
40 			  TEST_MEMFD_TOKEN);
41 	}
42 
43 	close(luo_fd);
44 	daemonize_and_wait();
45 }
46 
47 /* Stage 2: Executed after the kexec reboot. */
48 static void run_stage_2(int luo_fd, int state_session_fd)
49 {
50 	int session_fd, mfd, stage;
51 
52 	ksft_print_msg("[STAGE 2] Starting post-kexec verification...\n");
53 
54 	restore_and_read_stage(state_session_fd, STATE_MEMFD_TOKEN, &stage);
55 	if (stage != 2)
56 		fail_exit("Expected stage 2, but state file contains %d", stage);
57 
58 	ksft_print_msg("[STAGE 2] Retrieving session '%s'...\n", TEST_SESSION_NAME);
59 	session_fd = luo_retrieve_session(luo_fd, TEST_SESSION_NAME);
60 	if (session_fd < 0)
61 		fail_exit("luo_retrieve_session for '%s'", TEST_SESSION_NAME);
62 
63 	ksft_print_msg("[STAGE 2] Restoring and verifying memfd (token %#x)...\n",
64 		       TEST_MEMFD_TOKEN);
65 	mfd = restore_and_verify_memfd(session_fd, TEST_MEMFD_TOKEN,
66 				       TEST_MEMFD_DATA);
67 	if (mfd < 0)
68 		fail_exit("restore_and_verify_memfd for token %#x", TEST_MEMFD_TOKEN);
69 	close(mfd);
70 
71 	ksft_print_msg("[STAGE 2] Test data verified successfully.\n");
72 	ksft_print_msg("[STAGE 2] Finalizing test session...\n");
73 	if (luo_session_finish(session_fd) < 0)
74 		fail_exit("luo_session_finish for test session");
75 	close(session_fd);
76 
77 	ksft_print_msg("[STAGE 2] Finalizing state session...\n");
78 	if (luo_session_finish(state_session_fd) < 0)
79 		fail_exit("luo_session_finish for state session");
80 	close(state_session_fd);
81 
82 	ksft_print_msg("\n--- SIMPLE KEXEC TEST PASSED ---\n");
83 }
84 
85 int main(int argc, char *argv[])
86 {
87 	return luo_test(argc, argv, STATE_SESSION_NAME,
88 			run_stage_1, run_stage_2);
89 }
90