[PATCH 8/8] tests: check KVM ioctl commands decoding
Masatake YAMATO
yamato at redhat.com
Fri Dec 1 05:45:58 UTC 2017
* tests/Makefile.am: Add ioctl_kvm.
* tests/ioctl_kvm.c: New test target file.
Taken from https://lwn.net/Articles/658512/.
* tests/ioctl_kvm.expected: New expected file.
* tests/ioctl_kvm.test: New test driver.
---
tests/Makefile.am | 1 +
tests/ioctl_kvm.c | 152 +++++++++++++++++++++++++++++++++++++++++++++++
tests/ioctl_kvm.expected | 11 ++++
tests/ioctl_kvm.test | 12 ++++
4 files changed, 176 insertions(+)
create mode 100644 tests/ioctl_kvm.c
create mode 100644 tests/ioctl_kvm.expected
create mode 100755 tests/ioctl_kvm.test
diff --git a/tests/Makefile.am b/tests/Makefile.am
index f2109fd4..6aa998e5 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -102,6 +102,7 @@ check_PROGRAMS = $(PURE_EXECUTABLES) \
int_0x80 \
ioctl_dm-v \
ioctl_evdev-v \
+ ioctl_kvm \
ioctl_loop-nv \
ioctl_loop-v \
ioctl_nsfs \
diff --git a/tests/ioctl_kvm.c b/tests/ioctl_kvm.c
new file mode 100644
index 00000000..95f4e589
--- /dev/null
+++ b/tests/ioctl_kvm.c
@@ -0,0 +1,152 @@
+/* Based on the program explained on the page, https://lwn.net/Articles/658512/ */
+
+/* Sample code for /dev/kvm API
+ *
+ * Copyright (c) 2015 Intel Corporation
+ * Author: Josh Triplett <josh at joshtriplett.org>
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
+ * of this software and associated documentation files (the "Software"), to
+ * deal in the Software without restriction, including without limitation the
+ * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
+ * sell copies of the Software, and to permit persons to whom the Software is
+ * furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in
+ * all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
+ * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
+ * IN THE SOFTWARE.
+ */
+#include <err.h>
+#include <fcntl.h>
+#include <linux/kvm.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/ioctl.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+
+int main(void)
+{
+ int kvm, vmfd, vcpufd, ret;
+ const uint8_t code[] = {
+ 0xba, 0xf8, 0x03, /* mov $0x3f8, %dx */
+ 0x00, 0xd8, /* add %bl, %al */
+ 0x04, '0', /* add $'0', %al */
+ 0xee, /* out %al, (%dx) */
+ 0xb0, '\n', /* mov $'\n', %al */
+ 0xee, /* out %al, (%dx) */
+ 0xf4, /* hlt */
+ };
+ uint8_t *mem;
+ struct kvm_sregs sregs;
+ size_t mmap_size;
+ struct kvm_run *run;
+
+ kvm = open("/dev/kvm", O_RDWR | O_CLOEXEC);
+ if (kvm == -1)
+ err(1, "/dev/kvm");
+
+ /* Make sure we have the stable version of the API */
+ ret = ioctl(kvm, KVM_GET_API_VERSION, NULL);
+ if (ret == -1)
+ err(1, "KVM_GET_API_VERSION");
+ if (ret != 12)
+ errx(1, "KVM_GET_API_VERSION %d, expected 12", ret);
+
+ vmfd = ioctl(kvm, KVM_CREATE_VM, (unsigned long)0);
+ if (vmfd == -1)
+ err(1, "KVM_CREATE_VM");
+
+ /* Allocate one aligned page of guest memory to hold the code. */
+ mem = mmap(NULL, 0x1000, PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0);
+ if (!mem)
+ err(1, "allocating guest memory");
+ memcpy(mem, code, sizeof(code));
+
+ /* Map it to the second page frame (to avoid the real-mode IDT at 0). */
+ struct kvm_userspace_memory_region region = {
+ .slot = 0,
+ .guest_phys_addr = 0x1000,
+ .memory_size = 0x1000,
+ .userspace_addr = (uint64_t)mem,
+ };
+ ret = ioctl(vmfd, KVM_SET_USER_MEMORY_REGION, ®ion);
+ if (ret == -1)
+ err(1, "KVM_SET_USER_MEMORY_REGION");
+
+ vcpufd = ioctl(vmfd, KVM_CREATE_VCPU, (unsigned long)0);
+ if (vcpufd == -1)
+ err(1, "KVM_CREATE_VCPU");
+
+ /* Map the shared kvm_run structure and following data. */
+ ret = ioctl(kvm, KVM_GET_VCPU_MMAP_SIZE, NULL);
+ if (ret == -1)
+ err(1, "KVM_GET_VCPU_MMAP_SIZE");
+ mmap_size = ret;
+ if (mmap_size < sizeof(*run))
+ errx(1, "KVM_GET_VCPU_MMAP_SIZE unexpectedly small");
+ run = mmap(NULL, mmap_size, PROT_READ | PROT_WRITE, MAP_SHARED, vcpufd, 0);
+ if (!run)
+ err(1, "mmap vcpu");
+
+ /* Initialize CS to point at 0, via a read-modify-write of sregs. */
+ ret = ioctl(vcpufd, KVM_GET_SREGS, &sregs);
+ if (ret == -1)
+ err(1, "KVM_GET_SREGS");
+ sregs.cs.base = 0;
+ sregs.cs.selector = 0;
+ ret = ioctl(vcpufd, KVM_SET_SREGS, &sregs);
+ if (ret == -1)
+ err(1, "KVM_SET_SREGS");
+
+ /* Initialize registers: instruction pointer for our code, addends, and
+ * initial flags required by x86 architecture. */
+ struct kvm_regs regs = {
+ .rip = 0x1000,
+ .rax = 2,
+ .rbx = 2,
+ .rflags = 0x2,
+ };
+ ret = ioctl(vcpufd, KVM_SET_REGS, ®s);
+ if (ret == -1)
+ err(1, "KVM_SET_REGS");
+
+ /* Repeatedly run code and handle VM exits. */
+ while (1) {
+ ret = ioctl(vcpufd, KVM_RUN, NULL);
+ if (ret == -1)
+ err(1, "KVM_RUN");
+ switch (run->exit_reason) {
+ case KVM_EXIT_HLT:
+ puts("KVM_EXIT_HLT");
+ return 0;
+ case KVM_EXIT_IO:
+ if (run->io.direction == KVM_EXIT_IO_OUT
+ && run->io.size == 1
+ && run->io.port == 0x3f8
+ && run->io.count == 1)
+ putchar(*(((char *)run) + run->io.data_offset));
+ else
+ errx(1, "unhandled KVM_EXIT_IO");
+ break;
+ case KVM_EXIT_FAIL_ENTRY:
+ errx(1, "KVM_EXIT_FAIL_ENTRY: hardware_entry_failure_reason = 0x%llx",
+ (unsigned long long)run->fail_entry.hardware_entry_failure_reason);
+ case KVM_EXIT_INTERNAL_ERROR:
+ errx(1, "KVM_EXIT_INTERNAL_ERROR: suberror = 0x%x",
+ run->internal.suberror);
+ default:
+ errx(1, "exit_reason = 0x%x", run->exit_reason);
+ }
+ }
+}
diff --git a/tests/ioctl_kvm.expected b/tests/ioctl_kvm.expected
new file mode 100644
index 00000000..ba59e684
--- /dev/null
+++ b/tests/ioctl_kvm.expected
@@ -0,0 +1,11 @@
+ioctl\([0-9]+</dev/kvm>, KVM_GET_API_VERSION, 0\) *= 12
+ioctl\([0-9]+</dev/kvm>, KVM_CREATE_VM\) *= [0-9]+<anon_inode:kvm-vm>
+ioctl\([0-9]+<anon_inode:kvm-vm>, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x[0-9a-f]+\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vm>, KVM_CREATE_VCPU, 0\) *= [0-9]+<anon_inode:kvm-vcpu>
+ioctl\([0-9]+</dev/kvm>, KVM_GET_VCPU_MMAP_SIZE, 0\) *= [0-9]+
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_GET_SREGS, {cs={base=0x[0-9a-f]+, limit=[0-9]+, selector=[0-9]+, type=[0-9]+, present=[0-9]+, dpl=[0-9]+, db=[0-9]+, s=[0-9]+, l=[0-9]+, g=[0-9]+, avl=[0-9]+}, ...}\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_SET_SREGS, {cs={base=0, limit=[0-9]+, selector=0, type=[0-9]+, present=[0-9]+, dpl=[0-9]+, db=[0-9]+, s=[0-9]+, l=[0-9]+, g=[0-9]+, avl=[0-9]+}, ...}\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_SET_REGS, {rax=0x2, ..., rsp=0, rbp=0, ..., rip=0x1000, rflags=0x2}\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_RUN, 0\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_RUN, 0\) *= 0
+ioctl\([0-9]+<anon_inode:kvm-vcpu>, KVM_RUN, 0\) *= 0
diff --git a/tests/ioctl_kvm.test b/tests/ioctl_kvm.test
new file mode 100755
index 00000000..32a40a99
--- /dev/null
+++ b/tests/ioctl_kvm.test
@@ -0,0 +1,12 @@
+#!/bin/sh
+
+# Check decoding of KVM* ioctls.
+
+. "${srcdir=.}/init.sh"
+
+check_prog grep
+run_prog > /dev/null
+run_strace -y -eioctl $args
+match_grep
+
+exit 0
--
2.13.6
More information about the Strace-devel
mailing list