162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* Copyright (c) 2021-2022, NVIDIA CORPORATION & AFFILIATES. 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Kernel side components to support tools/testing/selftests/iommu 562306a36Sopenharmony_ci */ 662306a36Sopenharmony_ci#include <linux/slab.h> 762306a36Sopenharmony_ci#include <linux/iommu.h> 862306a36Sopenharmony_ci#include <linux/xarray.h> 962306a36Sopenharmony_ci#include <linux/file.h> 1062306a36Sopenharmony_ci#include <linux/anon_inodes.h> 1162306a36Sopenharmony_ci#include <linux/fault-inject.h> 1262306a36Sopenharmony_ci#include <linux/platform_device.h> 1362306a36Sopenharmony_ci#include <uapi/linux/iommufd.h> 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_ci#include "../iommu-priv.h" 1662306a36Sopenharmony_ci#include "io_pagetable.h" 1762306a36Sopenharmony_ci#include "iommufd_private.h" 1862306a36Sopenharmony_ci#include "iommufd_test.h" 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_cistatic DECLARE_FAULT_ATTR(fail_iommufd); 2162306a36Sopenharmony_cistatic struct dentry *dbgfs_root; 2262306a36Sopenharmony_cistatic struct platform_device *selftest_iommu_dev; 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_cisize_t iommufd_test_memory_limit = 65536; 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cienum { 2762306a36Sopenharmony_ci MOCK_IO_PAGE_SIZE = PAGE_SIZE / 2, 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci /* 3062306a36Sopenharmony_ci * Like a real page table alignment requires the low bits of the address 3162306a36Sopenharmony_ci * to be zero. xarray also requires the high bit to be zero, so we store 3262306a36Sopenharmony_ci * the pfns shifted. The upper bits are used for metadata. 3362306a36Sopenharmony_ci */ 3462306a36Sopenharmony_ci MOCK_PFN_MASK = ULONG_MAX / MOCK_IO_PAGE_SIZE, 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci _MOCK_PFN_START = MOCK_PFN_MASK + 1, 3762306a36Sopenharmony_ci MOCK_PFN_START_IOVA = _MOCK_PFN_START, 3862306a36Sopenharmony_ci MOCK_PFN_LAST_IOVA = _MOCK_PFN_START, 3962306a36Sopenharmony_ci}; 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_ci/* 4262306a36Sopenharmony_ci * Syzkaller has trouble randomizing the correct iova to use since it is linked 4362306a36Sopenharmony_ci * to the map ioctl's output, and it has no ide about that. So, simplify things. 4462306a36Sopenharmony_ci * In syzkaller mode the 64 bit IOVA is converted into an nth area and offset 4562306a36Sopenharmony_ci * value. This has a much smaller randomization space and syzkaller can hit it. 4662306a36Sopenharmony_ci */ 4762306a36Sopenharmony_cistatic unsigned long iommufd_test_syz_conv_iova(struct io_pagetable *iopt, 4862306a36Sopenharmony_ci u64 *iova) 4962306a36Sopenharmony_ci{ 5062306a36Sopenharmony_ci struct syz_layout { 5162306a36Sopenharmony_ci __u32 nth_area; 5262306a36Sopenharmony_ci __u32 offset; 5362306a36Sopenharmony_ci }; 5462306a36Sopenharmony_ci struct syz_layout *syz = (void *)iova; 5562306a36Sopenharmony_ci unsigned int nth = syz->nth_area; 5662306a36Sopenharmony_ci struct iopt_area *area; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci down_read(&iopt->iova_rwsem); 5962306a36Sopenharmony_ci for (area = iopt_area_iter_first(iopt, 0, ULONG_MAX); area; 6062306a36Sopenharmony_ci area = iopt_area_iter_next(area, 0, ULONG_MAX)) { 6162306a36Sopenharmony_ci if (nth == 0) { 6262306a36Sopenharmony_ci up_read(&iopt->iova_rwsem); 6362306a36Sopenharmony_ci return iopt_area_iova(area) + syz->offset; 6462306a36Sopenharmony_ci } 6562306a36Sopenharmony_ci nth--; 6662306a36Sopenharmony_ci } 6762306a36Sopenharmony_ci up_read(&iopt->iova_rwsem); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci return 0; 7062306a36Sopenharmony_ci} 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_civoid iommufd_test_syz_conv_iova_id(struct iommufd_ucmd *ucmd, 7362306a36Sopenharmony_ci unsigned int ioas_id, u64 *iova, u32 *flags) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci struct iommufd_ioas *ioas; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci if (!(*flags & MOCK_FLAGS_ACCESS_SYZ)) 7862306a36Sopenharmony_ci return; 7962306a36Sopenharmony_ci *flags &= ~(u32)MOCK_FLAGS_ACCESS_SYZ; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci ioas = iommufd_get_ioas(ucmd->ictx, ioas_id); 8262306a36Sopenharmony_ci if (IS_ERR(ioas)) 8362306a36Sopenharmony_ci return; 8462306a36Sopenharmony_ci *iova = iommufd_test_syz_conv_iova(&ioas->iopt, iova); 8562306a36Sopenharmony_ci iommufd_put_object(&ioas->obj); 8662306a36Sopenharmony_ci} 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_cistruct mock_iommu_domain { 8962306a36Sopenharmony_ci struct iommu_domain domain; 9062306a36Sopenharmony_ci struct xarray pfns; 9162306a36Sopenharmony_ci}; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_cienum selftest_obj_type { 9462306a36Sopenharmony_ci TYPE_IDEV, 9562306a36Sopenharmony_ci}; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_cistruct mock_dev { 9862306a36Sopenharmony_ci struct device dev; 9962306a36Sopenharmony_ci}; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_cistruct selftest_obj { 10262306a36Sopenharmony_ci struct iommufd_object obj; 10362306a36Sopenharmony_ci enum selftest_obj_type type; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci union { 10662306a36Sopenharmony_ci struct { 10762306a36Sopenharmony_ci struct iommufd_device *idev; 10862306a36Sopenharmony_ci struct iommufd_ctx *ictx; 10962306a36Sopenharmony_ci struct mock_dev *mock_dev; 11062306a36Sopenharmony_ci } idev; 11162306a36Sopenharmony_ci }; 11262306a36Sopenharmony_ci}; 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_cistatic void mock_domain_blocking_free(struct iommu_domain *domain) 11562306a36Sopenharmony_ci{ 11662306a36Sopenharmony_ci} 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_cistatic int mock_domain_nop_attach(struct iommu_domain *domain, 11962306a36Sopenharmony_ci struct device *dev) 12062306a36Sopenharmony_ci{ 12162306a36Sopenharmony_ci return 0; 12262306a36Sopenharmony_ci} 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_cistatic const struct iommu_domain_ops mock_blocking_ops = { 12562306a36Sopenharmony_ci .free = mock_domain_blocking_free, 12662306a36Sopenharmony_ci .attach_dev = mock_domain_nop_attach, 12762306a36Sopenharmony_ci}; 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_cistatic struct iommu_domain mock_blocking_domain = { 13062306a36Sopenharmony_ci .type = IOMMU_DOMAIN_BLOCKED, 13162306a36Sopenharmony_ci .ops = &mock_blocking_ops, 13262306a36Sopenharmony_ci}; 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_cistatic void *mock_domain_hw_info(struct device *dev, u32 *length, u32 *type) 13562306a36Sopenharmony_ci{ 13662306a36Sopenharmony_ci struct iommu_test_hw_info *info; 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci info = kzalloc(sizeof(*info), GFP_KERNEL); 13962306a36Sopenharmony_ci if (!info) 14062306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci info->test_reg = IOMMU_HW_INFO_SELFTEST_REGVAL; 14362306a36Sopenharmony_ci *length = sizeof(*info); 14462306a36Sopenharmony_ci *type = IOMMU_HW_INFO_TYPE_SELFTEST; 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci return info; 14762306a36Sopenharmony_ci} 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_cistatic struct iommu_domain *mock_domain_alloc(unsigned int iommu_domain_type) 15062306a36Sopenharmony_ci{ 15162306a36Sopenharmony_ci struct mock_iommu_domain *mock; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci if (iommu_domain_type == IOMMU_DOMAIN_BLOCKED) 15462306a36Sopenharmony_ci return &mock_blocking_domain; 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci if (iommu_domain_type != IOMMU_DOMAIN_UNMANAGED) 15762306a36Sopenharmony_ci return NULL; 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci mock = kzalloc(sizeof(*mock), GFP_KERNEL); 16062306a36Sopenharmony_ci if (!mock) 16162306a36Sopenharmony_ci return NULL; 16262306a36Sopenharmony_ci mock->domain.geometry.aperture_start = MOCK_APERTURE_START; 16362306a36Sopenharmony_ci mock->domain.geometry.aperture_end = MOCK_APERTURE_LAST; 16462306a36Sopenharmony_ci mock->domain.pgsize_bitmap = MOCK_IO_PAGE_SIZE; 16562306a36Sopenharmony_ci xa_init(&mock->pfns); 16662306a36Sopenharmony_ci return &mock->domain; 16762306a36Sopenharmony_ci} 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_cistatic void mock_domain_free(struct iommu_domain *domain) 17062306a36Sopenharmony_ci{ 17162306a36Sopenharmony_ci struct mock_iommu_domain *mock = 17262306a36Sopenharmony_ci container_of(domain, struct mock_iommu_domain, domain); 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci WARN_ON(!xa_empty(&mock->pfns)); 17562306a36Sopenharmony_ci kfree(mock); 17662306a36Sopenharmony_ci} 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_cistatic int mock_domain_map_pages(struct iommu_domain *domain, 17962306a36Sopenharmony_ci unsigned long iova, phys_addr_t paddr, 18062306a36Sopenharmony_ci size_t pgsize, size_t pgcount, int prot, 18162306a36Sopenharmony_ci gfp_t gfp, size_t *mapped) 18262306a36Sopenharmony_ci{ 18362306a36Sopenharmony_ci struct mock_iommu_domain *mock = 18462306a36Sopenharmony_ci container_of(domain, struct mock_iommu_domain, domain); 18562306a36Sopenharmony_ci unsigned long flags = MOCK_PFN_START_IOVA; 18662306a36Sopenharmony_ci unsigned long start_iova = iova; 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci /* 18962306a36Sopenharmony_ci * xarray does not reliably work with fault injection because it does a 19062306a36Sopenharmony_ci * retry allocation, so put our own failure point. 19162306a36Sopenharmony_ci */ 19262306a36Sopenharmony_ci if (iommufd_should_fail()) 19362306a36Sopenharmony_ci return -ENOENT; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci WARN_ON(iova % MOCK_IO_PAGE_SIZE); 19662306a36Sopenharmony_ci WARN_ON(pgsize % MOCK_IO_PAGE_SIZE); 19762306a36Sopenharmony_ci for (; pgcount; pgcount--) { 19862306a36Sopenharmony_ci size_t cur; 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ci for (cur = 0; cur != pgsize; cur += MOCK_IO_PAGE_SIZE) { 20162306a36Sopenharmony_ci void *old; 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci if (pgcount == 1 && cur + MOCK_IO_PAGE_SIZE == pgsize) 20462306a36Sopenharmony_ci flags = MOCK_PFN_LAST_IOVA; 20562306a36Sopenharmony_ci old = xa_store(&mock->pfns, iova / MOCK_IO_PAGE_SIZE, 20662306a36Sopenharmony_ci xa_mk_value((paddr / MOCK_IO_PAGE_SIZE) | 20762306a36Sopenharmony_ci flags), 20862306a36Sopenharmony_ci gfp); 20962306a36Sopenharmony_ci if (xa_is_err(old)) { 21062306a36Sopenharmony_ci for (; start_iova != iova; 21162306a36Sopenharmony_ci start_iova += MOCK_IO_PAGE_SIZE) 21262306a36Sopenharmony_ci xa_erase(&mock->pfns, 21362306a36Sopenharmony_ci start_iova / 21462306a36Sopenharmony_ci MOCK_IO_PAGE_SIZE); 21562306a36Sopenharmony_ci return xa_err(old); 21662306a36Sopenharmony_ci } 21762306a36Sopenharmony_ci WARN_ON(old); 21862306a36Sopenharmony_ci iova += MOCK_IO_PAGE_SIZE; 21962306a36Sopenharmony_ci paddr += MOCK_IO_PAGE_SIZE; 22062306a36Sopenharmony_ci *mapped += MOCK_IO_PAGE_SIZE; 22162306a36Sopenharmony_ci flags = 0; 22262306a36Sopenharmony_ci } 22362306a36Sopenharmony_ci } 22462306a36Sopenharmony_ci return 0; 22562306a36Sopenharmony_ci} 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_cistatic size_t mock_domain_unmap_pages(struct iommu_domain *domain, 22862306a36Sopenharmony_ci unsigned long iova, size_t pgsize, 22962306a36Sopenharmony_ci size_t pgcount, 23062306a36Sopenharmony_ci struct iommu_iotlb_gather *iotlb_gather) 23162306a36Sopenharmony_ci{ 23262306a36Sopenharmony_ci struct mock_iommu_domain *mock = 23362306a36Sopenharmony_ci container_of(domain, struct mock_iommu_domain, domain); 23462306a36Sopenharmony_ci bool first = true; 23562306a36Sopenharmony_ci size_t ret = 0; 23662306a36Sopenharmony_ci void *ent; 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci WARN_ON(iova % MOCK_IO_PAGE_SIZE); 23962306a36Sopenharmony_ci WARN_ON(pgsize % MOCK_IO_PAGE_SIZE); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci for (; pgcount; pgcount--) { 24262306a36Sopenharmony_ci size_t cur; 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_ci for (cur = 0; cur != pgsize; cur += MOCK_IO_PAGE_SIZE) { 24562306a36Sopenharmony_ci ent = xa_erase(&mock->pfns, iova / MOCK_IO_PAGE_SIZE); 24662306a36Sopenharmony_ci WARN_ON(!ent); 24762306a36Sopenharmony_ci /* 24862306a36Sopenharmony_ci * iommufd generates unmaps that must be a strict 24962306a36Sopenharmony_ci * superset of the map's performend So every starting 25062306a36Sopenharmony_ci * IOVA should have been an iova passed to map, and the 25162306a36Sopenharmony_ci * 25262306a36Sopenharmony_ci * First IOVA must be present and have been a first IOVA 25362306a36Sopenharmony_ci * passed to map_pages 25462306a36Sopenharmony_ci */ 25562306a36Sopenharmony_ci if (first) { 25662306a36Sopenharmony_ci WARN_ON(!(xa_to_value(ent) & 25762306a36Sopenharmony_ci MOCK_PFN_START_IOVA)); 25862306a36Sopenharmony_ci first = false; 25962306a36Sopenharmony_ci } 26062306a36Sopenharmony_ci if (pgcount == 1 && cur + MOCK_IO_PAGE_SIZE == pgsize) 26162306a36Sopenharmony_ci WARN_ON(!(xa_to_value(ent) & 26262306a36Sopenharmony_ci MOCK_PFN_LAST_IOVA)); 26362306a36Sopenharmony_ci 26462306a36Sopenharmony_ci iova += MOCK_IO_PAGE_SIZE; 26562306a36Sopenharmony_ci ret += MOCK_IO_PAGE_SIZE; 26662306a36Sopenharmony_ci } 26762306a36Sopenharmony_ci } 26862306a36Sopenharmony_ci return ret; 26962306a36Sopenharmony_ci} 27062306a36Sopenharmony_ci 27162306a36Sopenharmony_cistatic phys_addr_t mock_domain_iova_to_phys(struct iommu_domain *domain, 27262306a36Sopenharmony_ci dma_addr_t iova) 27362306a36Sopenharmony_ci{ 27462306a36Sopenharmony_ci struct mock_iommu_domain *mock = 27562306a36Sopenharmony_ci container_of(domain, struct mock_iommu_domain, domain); 27662306a36Sopenharmony_ci void *ent; 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_ci WARN_ON(iova % MOCK_IO_PAGE_SIZE); 27962306a36Sopenharmony_ci ent = xa_load(&mock->pfns, iova / MOCK_IO_PAGE_SIZE); 28062306a36Sopenharmony_ci WARN_ON(!ent); 28162306a36Sopenharmony_ci return (xa_to_value(ent) & MOCK_PFN_MASK) * MOCK_IO_PAGE_SIZE; 28262306a36Sopenharmony_ci} 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_cistatic bool mock_domain_capable(struct device *dev, enum iommu_cap cap) 28562306a36Sopenharmony_ci{ 28662306a36Sopenharmony_ci return cap == IOMMU_CAP_CACHE_COHERENCY; 28762306a36Sopenharmony_ci} 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_cistatic void mock_domain_set_plaform_dma_ops(struct device *dev) 29062306a36Sopenharmony_ci{ 29162306a36Sopenharmony_ci /* 29262306a36Sopenharmony_ci * mock doesn't setup default domains because we can't hook into the 29362306a36Sopenharmony_ci * normal probe path 29462306a36Sopenharmony_ci */ 29562306a36Sopenharmony_ci} 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_cistatic struct iommu_device mock_iommu_device = { 29862306a36Sopenharmony_ci}; 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_cistatic struct iommu_device *mock_probe_device(struct device *dev) 30162306a36Sopenharmony_ci{ 30262306a36Sopenharmony_ci return &mock_iommu_device; 30362306a36Sopenharmony_ci} 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_cistatic const struct iommu_ops mock_ops = { 30662306a36Sopenharmony_ci .owner = THIS_MODULE, 30762306a36Sopenharmony_ci .pgsize_bitmap = MOCK_IO_PAGE_SIZE, 30862306a36Sopenharmony_ci .hw_info = mock_domain_hw_info, 30962306a36Sopenharmony_ci .domain_alloc = mock_domain_alloc, 31062306a36Sopenharmony_ci .capable = mock_domain_capable, 31162306a36Sopenharmony_ci .set_platform_dma_ops = mock_domain_set_plaform_dma_ops, 31262306a36Sopenharmony_ci .device_group = generic_device_group, 31362306a36Sopenharmony_ci .probe_device = mock_probe_device, 31462306a36Sopenharmony_ci .default_domain_ops = 31562306a36Sopenharmony_ci &(struct iommu_domain_ops){ 31662306a36Sopenharmony_ci .free = mock_domain_free, 31762306a36Sopenharmony_ci .attach_dev = mock_domain_nop_attach, 31862306a36Sopenharmony_ci .map_pages = mock_domain_map_pages, 31962306a36Sopenharmony_ci .unmap_pages = mock_domain_unmap_pages, 32062306a36Sopenharmony_ci .iova_to_phys = mock_domain_iova_to_phys, 32162306a36Sopenharmony_ci }, 32262306a36Sopenharmony_ci}; 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_cistatic inline struct iommufd_hw_pagetable * 32562306a36Sopenharmony_ciget_md_pagetable(struct iommufd_ucmd *ucmd, u32 mockpt_id, 32662306a36Sopenharmony_ci struct mock_iommu_domain **mock) 32762306a36Sopenharmony_ci{ 32862306a36Sopenharmony_ci struct iommufd_hw_pagetable *hwpt; 32962306a36Sopenharmony_ci struct iommufd_object *obj; 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_ci obj = iommufd_get_object(ucmd->ictx, mockpt_id, 33262306a36Sopenharmony_ci IOMMUFD_OBJ_HW_PAGETABLE); 33362306a36Sopenharmony_ci if (IS_ERR(obj)) 33462306a36Sopenharmony_ci return ERR_CAST(obj); 33562306a36Sopenharmony_ci hwpt = container_of(obj, struct iommufd_hw_pagetable, obj); 33662306a36Sopenharmony_ci if (hwpt->domain->ops != mock_ops.default_domain_ops) { 33762306a36Sopenharmony_ci iommufd_put_object(&hwpt->obj); 33862306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 33962306a36Sopenharmony_ci } 34062306a36Sopenharmony_ci *mock = container_of(hwpt->domain, struct mock_iommu_domain, domain); 34162306a36Sopenharmony_ci return hwpt; 34262306a36Sopenharmony_ci} 34362306a36Sopenharmony_ci 34462306a36Sopenharmony_cistruct mock_bus_type { 34562306a36Sopenharmony_ci struct bus_type bus; 34662306a36Sopenharmony_ci struct notifier_block nb; 34762306a36Sopenharmony_ci}; 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_cistatic struct mock_bus_type iommufd_mock_bus_type = { 35062306a36Sopenharmony_ci .bus = { 35162306a36Sopenharmony_ci .name = "iommufd_mock", 35262306a36Sopenharmony_ci }, 35362306a36Sopenharmony_ci}; 35462306a36Sopenharmony_ci 35562306a36Sopenharmony_cistatic atomic_t mock_dev_num; 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_cistatic void mock_dev_release(struct device *dev) 35862306a36Sopenharmony_ci{ 35962306a36Sopenharmony_ci struct mock_dev *mdev = container_of(dev, struct mock_dev, dev); 36062306a36Sopenharmony_ci 36162306a36Sopenharmony_ci atomic_dec(&mock_dev_num); 36262306a36Sopenharmony_ci kfree(mdev); 36362306a36Sopenharmony_ci} 36462306a36Sopenharmony_ci 36562306a36Sopenharmony_cistatic struct mock_dev *mock_dev_create(void) 36662306a36Sopenharmony_ci{ 36762306a36Sopenharmony_ci struct mock_dev *mdev; 36862306a36Sopenharmony_ci int rc; 36962306a36Sopenharmony_ci 37062306a36Sopenharmony_ci mdev = kzalloc(sizeof(*mdev), GFP_KERNEL); 37162306a36Sopenharmony_ci if (!mdev) 37262306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_ci device_initialize(&mdev->dev); 37562306a36Sopenharmony_ci mdev->dev.release = mock_dev_release; 37662306a36Sopenharmony_ci mdev->dev.bus = &iommufd_mock_bus_type.bus; 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_ci rc = dev_set_name(&mdev->dev, "iommufd_mock%u", 37962306a36Sopenharmony_ci atomic_inc_return(&mock_dev_num)); 38062306a36Sopenharmony_ci if (rc) 38162306a36Sopenharmony_ci goto err_put; 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci rc = device_add(&mdev->dev); 38462306a36Sopenharmony_ci if (rc) 38562306a36Sopenharmony_ci goto err_put; 38662306a36Sopenharmony_ci return mdev; 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_cierr_put: 38962306a36Sopenharmony_ci put_device(&mdev->dev); 39062306a36Sopenharmony_ci return ERR_PTR(rc); 39162306a36Sopenharmony_ci} 39262306a36Sopenharmony_ci 39362306a36Sopenharmony_cistatic void mock_dev_destroy(struct mock_dev *mdev) 39462306a36Sopenharmony_ci{ 39562306a36Sopenharmony_ci device_unregister(&mdev->dev); 39662306a36Sopenharmony_ci} 39762306a36Sopenharmony_ci 39862306a36Sopenharmony_cibool iommufd_selftest_is_mock_dev(struct device *dev) 39962306a36Sopenharmony_ci{ 40062306a36Sopenharmony_ci return dev->release == mock_dev_release; 40162306a36Sopenharmony_ci} 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci/* Create an hw_pagetable with the mock domain so we can test the domain ops */ 40462306a36Sopenharmony_cistatic int iommufd_test_mock_domain(struct iommufd_ucmd *ucmd, 40562306a36Sopenharmony_ci struct iommu_test_cmd *cmd) 40662306a36Sopenharmony_ci{ 40762306a36Sopenharmony_ci struct iommufd_device *idev; 40862306a36Sopenharmony_ci struct selftest_obj *sobj; 40962306a36Sopenharmony_ci u32 pt_id = cmd->id; 41062306a36Sopenharmony_ci u32 idev_id; 41162306a36Sopenharmony_ci int rc; 41262306a36Sopenharmony_ci 41362306a36Sopenharmony_ci sobj = iommufd_object_alloc(ucmd->ictx, sobj, IOMMUFD_OBJ_SELFTEST); 41462306a36Sopenharmony_ci if (IS_ERR(sobj)) 41562306a36Sopenharmony_ci return PTR_ERR(sobj); 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci sobj->idev.ictx = ucmd->ictx; 41862306a36Sopenharmony_ci sobj->type = TYPE_IDEV; 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_ci sobj->idev.mock_dev = mock_dev_create(); 42162306a36Sopenharmony_ci if (IS_ERR(sobj->idev.mock_dev)) { 42262306a36Sopenharmony_ci rc = PTR_ERR(sobj->idev.mock_dev); 42362306a36Sopenharmony_ci goto out_sobj; 42462306a36Sopenharmony_ci } 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci idev = iommufd_device_bind(ucmd->ictx, &sobj->idev.mock_dev->dev, 42762306a36Sopenharmony_ci &idev_id); 42862306a36Sopenharmony_ci if (IS_ERR(idev)) { 42962306a36Sopenharmony_ci rc = PTR_ERR(idev); 43062306a36Sopenharmony_ci goto out_mdev; 43162306a36Sopenharmony_ci } 43262306a36Sopenharmony_ci sobj->idev.idev = idev; 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_ci rc = iommufd_device_attach(idev, &pt_id); 43562306a36Sopenharmony_ci if (rc) 43662306a36Sopenharmony_ci goto out_unbind; 43762306a36Sopenharmony_ci 43862306a36Sopenharmony_ci /* Userspace must destroy the device_id to destroy the object */ 43962306a36Sopenharmony_ci cmd->mock_domain.out_hwpt_id = pt_id; 44062306a36Sopenharmony_ci cmd->mock_domain.out_stdev_id = sobj->obj.id; 44162306a36Sopenharmony_ci cmd->mock_domain.out_idev_id = idev_id; 44262306a36Sopenharmony_ci rc = iommufd_ucmd_respond(ucmd, sizeof(*cmd)); 44362306a36Sopenharmony_ci if (rc) 44462306a36Sopenharmony_ci goto out_detach; 44562306a36Sopenharmony_ci iommufd_object_finalize(ucmd->ictx, &sobj->obj); 44662306a36Sopenharmony_ci return 0; 44762306a36Sopenharmony_ci 44862306a36Sopenharmony_ciout_detach: 44962306a36Sopenharmony_ci iommufd_device_detach(idev); 45062306a36Sopenharmony_ciout_unbind: 45162306a36Sopenharmony_ci iommufd_device_unbind(idev); 45262306a36Sopenharmony_ciout_mdev: 45362306a36Sopenharmony_ci mock_dev_destroy(sobj->idev.mock_dev); 45462306a36Sopenharmony_ciout_sobj: 45562306a36Sopenharmony_ci iommufd_object_abort(ucmd->ictx, &sobj->obj); 45662306a36Sopenharmony_ci return rc; 45762306a36Sopenharmony_ci} 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci/* Replace the mock domain with a manually allocated hw_pagetable */ 46062306a36Sopenharmony_cistatic int iommufd_test_mock_domain_replace(struct iommufd_ucmd *ucmd, 46162306a36Sopenharmony_ci unsigned int device_id, u32 pt_id, 46262306a36Sopenharmony_ci struct iommu_test_cmd *cmd) 46362306a36Sopenharmony_ci{ 46462306a36Sopenharmony_ci struct iommufd_object *dev_obj; 46562306a36Sopenharmony_ci struct selftest_obj *sobj; 46662306a36Sopenharmony_ci int rc; 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci /* 46962306a36Sopenharmony_ci * Prefer to use the OBJ_SELFTEST because the destroy_rwsem will ensure 47062306a36Sopenharmony_ci * it doesn't race with detach, which is not allowed. 47162306a36Sopenharmony_ci */ 47262306a36Sopenharmony_ci dev_obj = 47362306a36Sopenharmony_ci iommufd_get_object(ucmd->ictx, device_id, IOMMUFD_OBJ_SELFTEST); 47462306a36Sopenharmony_ci if (IS_ERR(dev_obj)) 47562306a36Sopenharmony_ci return PTR_ERR(dev_obj); 47662306a36Sopenharmony_ci 47762306a36Sopenharmony_ci sobj = container_of(dev_obj, struct selftest_obj, obj); 47862306a36Sopenharmony_ci if (sobj->type != TYPE_IDEV) { 47962306a36Sopenharmony_ci rc = -EINVAL; 48062306a36Sopenharmony_ci goto out_dev_obj; 48162306a36Sopenharmony_ci } 48262306a36Sopenharmony_ci 48362306a36Sopenharmony_ci rc = iommufd_device_replace(sobj->idev.idev, &pt_id); 48462306a36Sopenharmony_ci if (rc) 48562306a36Sopenharmony_ci goto out_dev_obj; 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci cmd->mock_domain_replace.pt_id = pt_id; 48862306a36Sopenharmony_ci rc = iommufd_ucmd_respond(ucmd, sizeof(*cmd)); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ciout_dev_obj: 49162306a36Sopenharmony_ci iommufd_put_object(dev_obj); 49262306a36Sopenharmony_ci return rc; 49362306a36Sopenharmony_ci} 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci/* Add an additional reserved IOVA to the IOAS */ 49662306a36Sopenharmony_cistatic int iommufd_test_add_reserved(struct iommufd_ucmd *ucmd, 49762306a36Sopenharmony_ci unsigned int mockpt_id, 49862306a36Sopenharmony_ci unsigned long start, size_t length) 49962306a36Sopenharmony_ci{ 50062306a36Sopenharmony_ci struct iommufd_ioas *ioas; 50162306a36Sopenharmony_ci int rc; 50262306a36Sopenharmony_ci 50362306a36Sopenharmony_ci ioas = iommufd_get_ioas(ucmd->ictx, mockpt_id); 50462306a36Sopenharmony_ci if (IS_ERR(ioas)) 50562306a36Sopenharmony_ci return PTR_ERR(ioas); 50662306a36Sopenharmony_ci down_write(&ioas->iopt.iova_rwsem); 50762306a36Sopenharmony_ci rc = iopt_reserve_iova(&ioas->iopt, start, start + length - 1, NULL); 50862306a36Sopenharmony_ci up_write(&ioas->iopt.iova_rwsem); 50962306a36Sopenharmony_ci iommufd_put_object(&ioas->obj); 51062306a36Sopenharmony_ci return rc; 51162306a36Sopenharmony_ci} 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci/* Check that every pfn under each iova matches the pfn under a user VA */ 51462306a36Sopenharmony_cistatic int iommufd_test_md_check_pa(struct iommufd_ucmd *ucmd, 51562306a36Sopenharmony_ci unsigned int mockpt_id, unsigned long iova, 51662306a36Sopenharmony_ci size_t length, void __user *uptr) 51762306a36Sopenharmony_ci{ 51862306a36Sopenharmony_ci struct iommufd_hw_pagetable *hwpt; 51962306a36Sopenharmony_ci struct mock_iommu_domain *mock; 52062306a36Sopenharmony_ci uintptr_t end; 52162306a36Sopenharmony_ci int rc; 52262306a36Sopenharmony_ci 52362306a36Sopenharmony_ci if (iova % MOCK_IO_PAGE_SIZE || length % MOCK_IO_PAGE_SIZE || 52462306a36Sopenharmony_ci (uintptr_t)uptr % MOCK_IO_PAGE_SIZE || 52562306a36Sopenharmony_ci check_add_overflow((uintptr_t)uptr, (uintptr_t)length, &end)) 52662306a36Sopenharmony_ci return -EINVAL; 52762306a36Sopenharmony_ci 52862306a36Sopenharmony_ci hwpt = get_md_pagetable(ucmd, mockpt_id, &mock); 52962306a36Sopenharmony_ci if (IS_ERR(hwpt)) 53062306a36Sopenharmony_ci return PTR_ERR(hwpt); 53162306a36Sopenharmony_ci 53262306a36Sopenharmony_ci for (; length; length -= MOCK_IO_PAGE_SIZE) { 53362306a36Sopenharmony_ci struct page *pages[1]; 53462306a36Sopenharmony_ci unsigned long pfn; 53562306a36Sopenharmony_ci long npages; 53662306a36Sopenharmony_ci void *ent; 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_ci npages = get_user_pages_fast((uintptr_t)uptr & PAGE_MASK, 1, 0, 53962306a36Sopenharmony_ci pages); 54062306a36Sopenharmony_ci if (npages < 0) { 54162306a36Sopenharmony_ci rc = npages; 54262306a36Sopenharmony_ci goto out_put; 54362306a36Sopenharmony_ci } 54462306a36Sopenharmony_ci if (WARN_ON(npages != 1)) { 54562306a36Sopenharmony_ci rc = -EFAULT; 54662306a36Sopenharmony_ci goto out_put; 54762306a36Sopenharmony_ci } 54862306a36Sopenharmony_ci pfn = page_to_pfn(pages[0]); 54962306a36Sopenharmony_ci put_page(pages[0]); 55062306a36Sopenharmony_ci 55162306a36Sopenharmony_ci ent = xa_load(&mock->pfns, iova / MOCK_IO_PAGE_SIZE); 55262306a36Sopenharmony_ci if (!ent || 55362306a36Sopenharmony_ci (xa_to_value(ent) & MOCK_PFN_MASK) * MOCK_IO_PAGE_SIZE != 55462306a36Sopenharmony_ci pfn * PAGE_SIZE + ((uintptr_t)uptr % PAGE_SIZE)) { 55562306a36Sopenharmony_ci rc = -EINVAL; 55662306a36Sopenharmony_ci goto out_put; 55762306a36Sopenharmony_ci } 55862306a36Sopenharmony_ci iova += MOCK_IO_PAGE_SIZE; 55962306a36Sopenharmony_ci uptr += MOCK_IO_PAGE_SIZE; 56062306a36Sopenharmony_ci } 56162306a36Sopenharmony_ci rc = 0; 56262306a36Sopenharmony_ci 56362306a36Sopenharmony_ciout_put: 56462306a36Sopenharmony_ci iommufd_put_object(&hwpt->obj); 56562306a36Sopenharmony_ci return rc; 56662306a36Sopenharmony_ci} 56762306a36Sopenharmony_ci 56862306a36Sopenharmony_ci/* Check that the page ref count matches, to look for missing pin/unpins */ 56962306a36Sopenharmony_cistatic int iommufd_test_md_check_refs(struct iommufd_ucmd *ucmd, 57062306a36Sopenharmony_ci void __user *uptr, size_t length, 57162306a36Sopenharmony_ci unsigned int refs) 57262306a36Sopenharmony_ci{ 57362306a36Sopenharmony_ci uintptr_t end; 57462306a36Sopenharmony_ci 57562306a36Sopenharmony_ci if (length % PAGE_SIZE || (uintptr_t)uptr % PAGE_SIZE || 57662306a36Sopenharmony_ci check_add_overflow((uintptr_t)uptr, (uintptr_t)length, &end)) 57762306a36Sopenharmony_ci return -EINVAL; 57862306a36Sopenharmony_ci 57962306a36Sopenharmony_ci for (; length; length -= PAGE_SIZE) { 58062306a36Sopenharmony_ci struct page *pages[1]; 58162306a36Sopenharmony_ci long npages; 58262306a36Sopenharmony_ci 58362306a36Sopenharmony_ci npages = get_user_pages_fast((uintptr_t)uptr, 1, 0, pages); 58462306a36Sopenharmony_ci if (npages < 0) 58562306a36Sopenharmony_ci return npages; 58662306a36Sopenharmony_ci if (WARN_ON(npages != 1)) 58762306a36Sopenharmony_ci return -EFAULT; 58862306a36Sopenharmony_ci if (!PageCompound(pages[0])) { 58962306a36Sopenharmony_ci unsigned int count; 59062306a36Sopenharmony_ci 59162306a36Sopenharmony_ci count = page_ref_count(pages[0]); 59262306a36Sopenharmony_ci if (count / GUP_PIN_COUNTING_BIAS != refs) { 59362306a36Sopenharmony_ci put_page(pages[0]); 59462306a36Sopenharmony_ci return -EIO; 59562306a36Sopenharmony_ci } 59662306a36Sopenharmony_ci } 59762306a36Sopenharmony_ci put_page(pages[0]); 59862306a36Sopenharmony_ci uptr += PAGE_SIZE; 59962306a36Sopenharmony_ci } 60062306a36Sopenharmony_ci return 0; 60162306a36Sopenharmony_ci} 60262306a36Sopenharmony_ci 60362306a36Sopenharmony_cistruct selftest_access { 60462306a36Sopenharmony_ci struct iommufd_access *access; 60562306a36Sopenharmony_ci struct file *file; 60662306a36Sopenharmony_ci struct mutex lock; 60762306a36Sopenharmony_ci struct list_head items; 60862306a36Sopenharmony_ci unsigned int next_id; 60962306a36Sopenharmony_ci bool destroying; 61062306a36Sopenharmony_ci}; 61162306a36Sopenharmony_ci 61262306a36Sopenharmony_cistruct selftest_access_item { 61362306a36Sopenharmony_ci struct list_head items_elm; 61462306a36Sopenharmony_ci unsigned long iova; 61562306a36Sopenharmony_ci size_t length; 61662306a36Sopenharmony_ci unsigned int id; 61762306a36Sopenharmony_ci}; 61862306a36Sopenharmony_ci 61962306a36Sopenharmony_cistatic const struct file_operations iommfd_test_staccess_fops; 62062306a36Sopenharmony_ci 62162306a36Sopenharmony_cistatic struct selftest_access *iommufd_access_get(int fd) 62262306a36Sopenharmony_ci{ 62362306a36Sopenharmony_ci struct file *file; 62462306a36Sopenharmony_ci 62562306a36Sopenharmony_ci file = fget(fd); 62662306a36Sopenharmony_ci if (!file) 62762306a36Sopenharmony_ci return ERR_PTR(-EBADFD); 62862306a36Sopenharmony_ci 62962306a36Sopenharmony_ci if (file->f_op != &iommfd_test_staccess_fops) { 63062306a36Sopenharmony_ci fput(file); 63162306a36Sopenharmony_ci return ERR_PTR(-EBADFD); 63262306a36Sopenharmony_ci } 63362306a36Sopenharmony_ci return file->private_data; 63462306a36Sopenharmony_ci} 63562306a36Sopenharmony_ci 63662306a36Sopenharmony_cistatic void iommufd_test_access_unmap(void *data, unsigned long iova, 63762306a36Sopenharmony_ci unsigned long length) 63862306a36Sopenharmony_ci{ 63962306a36Sopenharmony_ci unsigned long iova_last = iova + length - 1; 64062306a36Sopenharmony_ci struct selftest_access *staccess = data; 64162306a36Sopenharmony_ci struct selftest_access_item *item; 64262306a36Sopenharmony_ci struct selftest_access_item *tmp; 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci mutex_lock(&staccess->lock); 64562306a36Sopenharmony_ci list_for_each_entry_safe(item, tmp, &staccess->items, items_elm) { 64662306a36Sopenharmony_ci if (iova > item->iova + item->length - 1 || 64762306a36Sopenharmony_ci iova_last < item->iova) 64862306a36Sopenharmony_ci continue; 64962306a36Sopenharmony_ci list_del(&item->items_elm); 65062306a36Sopenharmony_ci iommufd_access_unpin_pages(staccess->access, item->iova, 65162306a36Sopenharmony_ci item->length); 65262306a36Sopenharmony_ci kfree(item); 65362306a36Sopenharmony_ci } 65462306a36Sopenharmony_ci mutex_unlock(&staccess->lock); 65562306a36Sopenharmony_ci} 65662306a36Sopenharmony_ci 65762306a36Sopenharmony_cistatic int iommufd_test_access_item_destroy(struct iommufd_ucmd *ucmd, 65862306a36Sopenharmony_ci unsigned int access_id, 65962306a36Sopenharmony_ci unsigned int item_id) 66062306a36Sopenharmony_ci{ 66162306a36Sopenharmony_ci struct selftest_access_item *item; 66262306a36Sopenharmony_ci struct selftest_access *staccess; 66362306a36Sopenharmony_ci 66462306a36Sopenharmony_ci staccess = iommufd_access_get(access_id); 66562306a36Sopenharmony_ci if (IS_ERR(staccess)) 66662306a36Sopenharmony_ci return PTR_ERR(staccess); 66762306a36Sopenharmony_ci 66862306a36Sopenharmony_ci mutex_lock(&staccess->lock); 66962306a36Sopenharmony_ci list_for_each_entry(item, &staccess->items, items_elm) { 67062306a36Sopenharmony_ci if (item->id == item_id) { 67162306a36Sopenharmony_ci list_del(&item->items_elm); 67262306a36Sopenharmony_ci iommufd_access_unpin_pages(staccess->access, item->iova, 67362306a36Sopenharmony_ci item->length); 67462306a36Sopenharmony_ci mutex_unlock(&staccess->lock); 67562306a36Sopenharmony_ci kfree(item); 67662306a36Sopenharmony_ci fput(staccess->file); 67762306a36Sopenharmony_ci return 0; 67862306a36Sopenharmony_ci } 67962306a36Sopenharmony_ci } 68062306a36Sopenharmony_ci mutex_unlock(&staccess->lock); 68162306a36Sopenharmony_ci fput(staccess->file); 68262306a36Sopenharmony_ci return -ENOENT; 68362306a36Sopenharmony_ci} 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_cistatic int iommufd_test_staccess_release(struct inode *inode, 68662306a36Sopenharmony_ci struct file *filep) 68762306a36Sopenharmony_ci{ 68862306a36Sopenharmony_ci struct selftest_access *staccess = filep->private_data; 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_ci if (staccess->access) { 69162306a36Sopenharmony_ci iommufd_test_access_unmap(staccess, 0, ULONG_MAX); 69262306a36Sopenharmony_ci iommufd_access_destroy(staccess->access); 69362306a36Sopenharmony_ci } 69462306a36Sopenharmony_ci mutex_destroy(&staccess->lock); 69562306a36Sopenharmony_ci kfree(staccess); 69662306a36Sopenharmony_ci return 0; 69762306a36Sopenharmony_ci} 69862306a36Sopenharmony_ci 69962306a36Sopenharmony_cistatic const struct iommufd_access_ops selftest_access_ops_pin = { 70062306a36Sopenharmony_ci .needs_pin_pages = 1, 70162306a36Sopenharmony_ci .unmap = iommufd_test_access_unmap, 70262306a36Sopenharmony_ci}; 70362306a36Sopenharmony_ci 70462306a36Sopenharmony_cistatic const struct iommufd_access_ops selftest_access_ops = { 70562306a36Sopenharmony_ci .unmap = iommufd_test_access_unmap, 70662306a36Sopenharmony_ci}; 70762306a36Sopenharmony_ci 70862306a36Sopenharmony_cistatic const struct file_operations iommfd_test_staccess_fops = { 70962306a36Sopenharmony_ci .release = iommufd_test_staccess_release, 71062306a36Sopenharmony_ci}; 71162306a36Sopenharmony_ci 71262306a36Sopenharmony_cistatic struct selftest_access *iommufd_test_alloc_access(void) 71362306a36Sopenharmony_ci{ 71462306a36Sopenharmony_ci struct selftest_access *staccess; 71562306a36Sopenharmony_ci struct file *filep; 71662306a36Sopenharmony_ci 71762306a36Sopenharmony_ci staccess = kzalloc(sizeof(*staccess), GFP_KERNEL_ACCOUNT); 71862306a36Sopenharmony_ci if (!staccess) 71962306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 72062306a36Sopenharmony_ci INIT_LIST_HEAD(&staccess->items); 72162306a36Sopenharmony_ci mutex_init(&staccess->lock); 72262306a36Sopenharmony_ci 72362306a36Sopenharmony_ci filep = anon_inode_getfile("[iommufd_test_staccess]", 72462306a36Sopenharmony_ci &iommfd_test_staccess_fops, staccess, 72562306a36Sopenharmony_ci O_RDWR); 72662306a36Sopenharmony_ci if (IS_ERR(filep)) { 72762306a36Sopenharmony_ci kfree(staccess); 72862306a36Sopenharmony_ci return ERR_CAST(filep); 72962306a36Sopenharmony_ci } 73062306a36Sopenharmony_ci staccess->file = filep; 73162306a36Sopenharmony_ci return staccess; 73262306a36Sopenharmony_ci} 73362306a36Sopenharmony_ci 73462306a36Sopenharmony_cistatic int iommufd_test_create_access(struct iommufd_ucmd *ucmd, 73562306a36Sopenharmony_ci unsigned int ioas_id, unsigned int flags) 73662306a36Sopenharmony_ci{ 73762306a36Sopenharmony_ci struct iommu_test_cmd *cmd = ucmd->cmd; 73862306a36Sopenharmony_ci struct selftest_access *staccess; 73962306a36Sopenharmony_ci struct iommufd_access *access; 74062306a36Sopenharmony_ci u32 id; 74162306a36Sopenharmony_ci int fdno; 74262306a36Sopenharmony_ci int rc; 74362306a36Sopenharmony_ci 74462306a36Sopenharmony_ci if (flags & ~MOCK_FLAGS_ACCESS_CREATE_NEEDS_PIN_PAGES) 74562306a36Sopenharmony_ci return -EOPNOTSUPP; 74662306a36Sopenharmony_ci 74762306a36Sopenharmony_ci staccess = iommufd_test_alloc_access(); 74862306a36Sopenharmony_ci if (IS_ERR(staccess)) 74962306a36Sopenharmony_ci return PTR_ERR(staccess); 75062306a36Sopenharmony_ci 75162306a36Sopenharmony_ci fdno = get_unused_fd_flags(O_CLOEXEC); 75262306a36Sopenharmony_ci if (fdno < 0) { 75362306a36Sopenharmony_ci rc = -ENOMEM; 75462306a36Sopenharmony_ci goto out_free_staccess; 75562306a36Sopenharmony_ci } 75662306a36Sopenharmony_ci 75762306a36Sopenharmony_ci access = iommufd_access_create( 75862306a36Sopenharmony_ci ucmd->ictx, 75962306a36Sopenharmony_ci (flags & MOCK_FLAGS_ACCESS_CREATE_NEEDS_PIN_PAGES) ? 76062306a36Sopenharmony_ci &selftest_access_ops_pin : 76162306a36Sopenharmony_ci &selftest_access_ops, 76262306a36Sopenharmony_ci staccess, &id); 76362306a36Sopenharmony_ci if (IS_ERR(access)) { 76462306a36Sopenharmony_ci rc = PTR_ERR(access); 76562306a36Sopenharmony_ci goto out_put_fdno; 76662306a36Sopenharmony_ci } 76762306a36Sopenharmony_ci rc = iommufd_access_attach(access, ioas_id); 76862306a36Sopenharmony_ci if (rc) 76962306a36Sopenharmony_ci goto out_destroy; 77062306a36Sopenharmony_ci cmd->create_access.out_access_fd = fdno; 77162306a36Sopenharmony_ci rc = iommufd_ucmd_respond(ucmd, sizeof(*cmd)); 77262306a36Sopenharmony_ci if (rc) 77362306a36Sopenharmony_ci goto out_destroy; 77462306a36Sopenharmony_ci 77562306a36Sopenharmony_ci staccess->access = access; 77662306a36Sopenharmony_ci fd_install(fdno, staccess->file); 77762306a36Sopenharmony_ci return 0; 77862306a36Sopenharmony_ci 77962306a36Sopenharmony_ciout_destroy: 78062306a36Sopenharmony_ci iommufd_access_destroy(access); 78162306a36Sopenharmony_ciout_put_fdno: 78262306a36Sopenharmony_ci put_unused_fd(fdno); 78362306a36Sopenharmony_ciout_free_staccess: 78462306a36Sopenharmony_ci fput(staccess->file); 78562306a36Sopenharmony_ci return rc; 78662306a36Sopenharmony_ci} 78762306a36Sopenharmony_ci 78862306a36Sopenharmony_cistatic int iommufd_test_access_replace_ioas(struct iommufd_ucmd *ucmd, 78962306a36Sopenharmony_ci unsigned int access_id, 79062306a36Sopenharmony_ci unsigned int ioas_id) 79162306a36Sopenharmony_ci{ 79262306a36Sopenharmony_ci struct selftest_access *staccess; 79362306a36Sopenharmony_ci int rc; 79462306a36Sopenharmony_ci 79562306a36Sopenharmony_ci staccess = iommufd_access_get(access_id); 79662306a36Sopenharmony_ci if (IS_ERR(staccess)) 79762306a36Sopenharmony_ci return PTR_ERR(staccess); 79862306a36Sopenharmony_ci 79962306a36Sopenharmony_ci rc = iommufd_access_replace(staccess->access, ioas_id); 80062306a36Sopenharmony_ci fput(staccess->file); 80162306a36Sopenharmony_ci return rc; 80262306a36Sopenharmony_ci} 80362306a36Sopenharmony_ci 80462306a36Sopenharmony_ci/* Check that the pages in a page array match the pages in the user VA */ 80562306a36Sopenharmony_cistatic int iommufd_test_check_pages(void __user *uptr, struct page **pages, 80662306a36Sopenharmony_ci size_t npages) 80762306a36Sopenharmony_ci{ 80862306a36Sopenharmony_ci for (; npages; npages--) { 80962306a36Sopenharmony_ci struct page *tmp_pages[1]; 81062306a36Sopenharmony_ci long rc; 81162306a36Sopenharmony_ci 81262306a36Sopenharmony_ci rc = get_user_pages_fast((uintptr_t)uptr, 1, 0, tmp_pages); 81362306a36Sopenharmony_ci if (rc < 0) 81462306a36Sopenharmony_ci return rc; 81562306a36Sopenharmony_ci if (WARN_ON(rc != 1)) 81662306a36Sopenharmony_ci return -EFAULT; 81762306a36Sopenharmony_ci put_page(tmp_pages[0]); 81862306a36Sopenharmony_ci if (tmp_pages[0] != *pages) 81962306a36Sopenharmony_ci return -EBADE; 82062306a36Sopenharmony_ci pages++; 82162306a36Sopenharmony_ci uptr += PAGE_SIZE; 82262306a36Sopenharmony_ci } 82362306a36Sopenharmony_ci return 0; 82462306a36Sopenharmony_ci} 82562306a36Sopenharmony_ci 82662306a36Sopenharmony_cistatic int iommufd_test_access_pages(struct iommufd_ucmd *ucmd, 82762306a36Sopenharmony_ci unsigned int access_id, unsigned long iova, 82862306a36Sopenharmony_ci size_t length, void __user *uptr, 82962306a36Sopenharmony_ci u32 flags) 83062306a36Sopenharmony_ci{ 83162306a36Sopenharmony_ci struct iommu_test_cmd *cmd = ucmd->cmd; 83262306a36Sopenharmony_ci struct selftest_access_item *item; 83362306a36Sopenharmony_ci struct selftest_access *staccess; 83462306a36Sopenharmony_ci struct page **pages; 83562306a36Sopenharmony_ci size_t npages; 83662306a36Sopenharmony_ci int rc; 83762306a36Sopenharmony_ci 83862306a36Sopenharmony_ci /* Prevent syzkaller from triggering a WARN_ON in kvzalloc() */ 83962306a36Sopenharmony_ci if (length > 16*1024*1024) 84062306a36Sopenharmony_ci return -ENOMEM; 84162306a36Sopenharmony_ci 84262306a36Sopenharmony_ci if (flags & ~(MOCK_FLAGS_ACCESS_WRITE | MOCK_FLAGS_ACCESS_SYZ)) 84362306a36Sopenharmony_ci return -EOPNOTSUPP; 84462306a36Sopenharmony_ci 84562306a36Sopenharmony_ci staccess = iommufd_access_get(access_id); 84662306a36Sopenharmony_ci if (IS_ERR(staccess)) 84762306a36Sopenharmony_ci return PTR_ERR(staccess); 84862306a36Sopenharmony_ci 84962306a36Sopenharmony_ci if (staccess->access->ops != &selftest_access_ops_pin) { 85062306a36Sopenharmony_ci rc = -EOPNOTSUPP; 85162306a36Sopenharmony_ci goto out_put; 85262306a36Sopenharmony_ci } 85362306a36Sopenharmony_ci 85462306a36Sopenharmony_ci if (flags & MOCK_FLAGS_ACCESS_SYZ) 85562306a36Sopenharmony_ci iova = iommufd_test_syz_conv_iova(&staccess->access->ioas->iopt, 85662306a36Sopenharmony_ci &cmd->access_pages.iova); 85762306a36Sopenharmony_ci 85862306a36Sopenharmony_ci npages = (ALIGN(iova + length, PAGE_SIZE) - 85962306a36Sopenharmony_ci ALIGN_DOWN(iova, PAGE_SIZE)) / 86062306a36Sopenharmony_ci PAGE_SIZE; 86162306a36Sopenharmony_ci pages = kvcalloc(npages, sizeof(*pages), GFP_KERNEL_ACCOUNT); 86262306a36Sopenharmony_ci if (!pages) { 86362306a36Sopenharmony_ci rc = -ENOMEM; 86462306a36Sopenharmony_ci goto out_put; 86562306a36Sopenharmony_ci } 86662306a36Sopenharmony_ci 86762306a36Sopenharmony_ci /* 86862306a36Sopenharmony_ci * Drivers will need to think very carefully about this locking. The 86962306a36Sopenharmony_ci * core code can do multiple unmaps instantaneously after 87062306a36Sopenharmony_ci * iommufd_access_pin_pages() and *all* the unmaps must not return until 87162306a36Sopenharmony_ci * the range is unpinned. This simple implementation puts a global lock 87262306a36Sopenharmony_ci * around the pin, which may not suit drivers that want this to be a 87362306a36Sopenharmony_ci * performance path. drivers that get this wrong will trigger WARN_ON 87462306a36Sopenharmony_ci * races and cause EDEADLOCK failures to userspace. 87562306a36Sopenharmony_ci */ 87662306a36Sopenharmony_ci mutex_lock(&staccess->lock); 87762306a36Sopenharmony_ci rc = iommufd_access_pin_pages(staccess->access, iova, length, pages, 87862306a36Sopenharmony_ci flags & MOCK_FLAGS_ACCESS_WRITE); 87962306a36Sopenharmony_ci if (rc) 88062306a36Sopenharmony_ci goto out_unlock; 88162306a36Sopenharmony_ci 88262306a36Sopenharmony_ci /* For syzkaller allow uptr to be NULL to skip this check */ 88362306a36Sopenharmony_ci if (uptr) { 88462306a36Sopenharmony_ci rc = iommufd_test_check_pages( 88562306a36Sopenharmony_ci uptr - (iova - ALIGN_DOWN(iova, PAGE_SIZE)), pages, 88662306a36Sopenharmony_ci npages); 88762306a36Sopenharmony_ci if (rc) 88862306a36Sopenharmony_ci goto out_unaccess; 88962306a36Sopenharmony_ci } 89062306a36Sopenharmony_ci 89162306a36Sopenharmony_ci item = kzalloc(sizeof(*item), GFP_KERNEL_ACCOUNT); 89262306a36Sopenharmony_ci if (!item) { 89362306a36Sopenharmony_ci rc = -ENOMEM; 89462306a36Sopenharmony_ci goto out_unaccess; 89562306a36Sopenharmony_ci } 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci item->iova = iova; 89862306a36Sopenharmony_ci item->length = length; 89962306a36Sopenharmony_ci item->id = staccess->next_id++; 90062306a36Sopenharmony_ci list_add_tail(&item->items_elm, &staccess->items); 90162306a36Sopenharmony_ci 90262306a36Sopenharmony_ci cmd->access_pages.out_access_pages_id = item->id; 90362306a36Sopenharmony_ci rc = iommufd_ucmd_respond(ucmd, sizeof(*cmd)); 90462306a36Sopenharmony_ci if (rc) 90562306a36Sopenharmony_ci goto out_free_item; 90662306a36Sopenharmony_ci goto out_unlock; 90762306a36Sopenharmony_ci 90862306a36Sopenharmony_ciout_free_item: 90962306a36Sopenharmony_ci list_del(&item->items_elm); 91062306a36Sopenharmony_ci kfree(item); 91162306a36Sopenharmony_ciout_unaccess: 91262306a36Sopenharmony_ci iommufd_access_unpin_pages(staccess->access, iova, length); 91362306a36Sopenharmony_ciout_unlock: 91462306a36Sopenharmony_ci mutex_unlock(&staccess->lock); 91562306a36Sopenharmony_ci kvfree(pages); 91662306a36Sopenharmony_ciout_put: 91762306a36Sopenharmony_ci fput(staccess->file); 91862306a36Sopenharmony_ci return rc; 91962306a36Sopenharmony_ci} 92062306a36Sopenharmony_ci 92162306a36Sopenharmony_cistatic int iommufd_test_access_rw(struct iommufd_ucmd *ucmd, 92262306a36Sopenharmony_ci unsigned int access_id, unsigned long iova, 92362306a36Sopenharmony_ci size_t length, void __user *ubuf, 92462306a36Sopenharmony_ci unsigned int flags) 92562306a36Sopenharmony_ci{ 92662306a36Sopenharmony_ci struct iommu_test_cmd *cmd = ucmd->cmd; 92762306a36Sopenharmony_ci struct selftest_access *staccess; 92862306a36Sopenharmony_ci void *tmp; 92962306a36Sopenharmony_ci int rc; 93062306a36Sopenharmony_ci 93162306a36Sopenharmony_ci /* Prevent syzkaller from triggering a WARN_ON in kvzalloc() */ 93262306a36Sopenharmony_ci if (length > 16*1024*1024) 93362306a36Sopenharmony_ci return -ENOMEM; 93462306a36Sopenharmony_ci 93562306a36Sopenharmony_ci if (flags & ~(MOCK_ACCESS_RW_WRITE | MOCK_ACCESS_RW_SLOW_PATH | 93662306a36Sopenharmony_ci MOCK_FLAGS_ACCESS_SYZ)) 93762306a36Sopenharmony_ci return -EOPNOTSUPP; 93862306a36Sopenharmony_ci 93962306a36Sopenharmony_ci staccess = iommufd_access_get(access_id); 94062306a36Sopenharmony_ci if (IS_ERR(staccess)) 94162306a36Sopenharmony_ci return PTR_ERR(staccess); 94262306a36Sopenharmony_ci 94362306a36Sopenharmony_ci tmp = kvzalloc(length, GFP_KERNEL_ACCOUNT); 94462306a36Sopenharmony_ci if (!tmp) { 94562306a36Sopenharmony_ci rc = -ENOMEM; 94662306a36Sopenharmony_ci goto out_put; 94762306a36Sopenharmony_ci } 94862306a36Sopenharmony_ci 94962306a36Sopenharmony_ci if (flags & MOCK_ACCESS_RW_WRITE) { 95062306a36Sopenharmony_ci if (copy_from_user(tmp, ubuf, length)) { 95162306a36Sopenharmony_ci rc = -EFAULT; 95262306a36Sopenharmony_ci goto out_free; 95362306a36Sopenharmony_ci } 95462306a36Sopenharmony_ci } 95562306a36Sopenharmony_ci 95662306a36Sopenharmony_ci if (flags & MOCK_FLAGS_ACCESS_SYZ) 95762306a36Sopenharmony_ci iova = iommufd_test_syz_conv_iova(&staccess->access->ioas->iopt, 95862306a36Sopenharmony_ci &cmd->access_rw.iova); 95962306a36Sopenharmony_ci 96062306a36Sopenharmony_ci rc = iommufd_access_rw(staccess->access, iova, tmp, length, flags); 96162306a36Sopenharmony_ci if (rc) 96262306a36Sopenharmony_ci goto out_free; 96362306a36Sopenharmony_ci if (!(flags & MOCK_ACCESS_RW_WRITE)) { 96462306a36Sopenharmony_ci if (copy_to_user(ubuf, tmp, length)) { 96562306a36Sopenharmony_ci rc = -EFAULT; 96662306a36Sopenharmony_ci goto out_free; 96762306a36Sopenharmony_ci } 96862306a36Sopenharmony_ci } 96962306a36Sopenharmony_ci 97062306a36Sopenharmony_ciout_free: 97162306a36Sopenharmony_ci kvfree(tmp); 97262306a36Sopenharmony_ciout_put: 97362306a36Sopenharmony_ci fput(staccess->file); 97462306a36Sopenharmony_ci return rc; 97562306a36Sopenharmony_ci} 97662306a36Sopenharmony_cistatic_assert((unsigned int)MOCK_ACCESS_RW_WRITE == IOMMUFD_ACCESS_RW_WRITE); 97762306a36Sopenharmony_cistatic_assert((unsigned int)MOCK_ACCESS_RW_SLOW_PATH == 97862306a36Sopenharmony_ci __IOMMUFD_ACCESS_RW_SLOW_PATH); 97962306a36Sopenharmony_ci 98062306a36Sopenharmony_civoid iommufd_selftest_destroy(struct iommufd_object *obj) 98162306a36Sopenharmony_ci{ 98262306a36Sopenharmony_ci struct selftest_obj *sobj = container_of(obj, struct selftest_obj, obj); 98362306a36Sopenharmony_ci 98462306a36Sopenharmony_ci switch (sobj->type) { 98562306a36Sopenharmony_ci case TYPE_IDEV: 98662306a36Sopenharmony_ci iommufd_device_detach(sobj->idev.idev); 98762306a36Sopenharmony_ci iommufd_device_unbind(sobj->idev.idev); 98862306a36Sopenharmony_ci mock_dev_destroy(sobj->idev.mock_dev); 98962306a36Sopenharmony_ci break; 99062306a36Sopenharmony_ci } 99162306a36Sopenharmony_ci} 99262306a36Sopenharmony_ci 99362306a36Sopenharmony_ciint iommufd_test(struct iommufd_ucmd *ucmd) 99462306a36Sopenharmony_ci{ 99562306a36Sopenharmony_ci struct iommu_test_cmd *cmd = ucmd->cmd; 99662306a36Sopenharmony_ci 99762306a36Sopenharmony_ci switch (cmd->op) { 99862306a36Sopenharmony_ci case IOMMU_TEST_OP_ADD_RESERVED: 99962306a36Sopenharmony_ci return iommufd_test_add_reserved(ucmd, cmd->id, 100062306a36Sopenharmony_ci cmd->add_reserved.start, 100162306a36Sopenharmony_ci cmd->add_reserved.length); 100262306a36Sopenharmony_ci case IOMMU_TEST_OP_MOCK_DOMAIN: 100362306a36Sopenharmony_ci return iommufd_test_mock_domain(ucmd, cmd); 100462306a36Sopenharmony_ci case IOMMU_TEST_OP_MOCK_DOMAIN_REPLACE: 100562306a36Sopenharmony_ci return iommufd_test_mock_domain_replace( 100662306a36Sopenharmony_ci ucmd, cmd->id, cmd->mock_domain_replace.pt_id, cmd); 100762306a36Sopenharmony_ci case IOMMU_TEST_OP_MD_CHECK_MAP: 100862306a36Sopenharmony_ci return iommufd_test_md_check_pa( 100962306a36Sopenharmony_ci ucmd, cmd->id, cmd->check_map.iova, 101062306a36Sopenharmony_ci cmd->check_map.length, 101162306a36Sopenharmony_ci u64_to_user_ptr(cmd->check_map.uptr)); 101262306a36Sopenharmony_ci case IOMMU_TEST_OP_MD_CHECK_REFS: 101362306a36Sopenharmony_ci return iommufd_test_md_check_refs( 101462306a36Sopenharmony_ci ucmd, u64_to_user_ptr(cmd->check_refs.uptr), 101562306a36Sopenharmony_ci cmd->check_refs.length, cmd->check_refs.refs); 101662306a36Sopenharmony_ci case IOMMU_TEST_OP_CREATE_ACCESS: 101762306a36Sopenharmony_ci return iommufd_test_create_access(ucmd, cmd->id, 101862306a36Sopenharmony_ci cmd->create_access.flags); 101962306a36Sopenharmony_ci case IOMMU_TEST_OP_ACCESS_REPLACE_IOAS: 102062306a36Sopenharmony_ci return iommufd_test_access_replace_ioas( 102162306a36Sopenharmony_ci ucmd, cmd->id, cmd->access_replace_ioas.ioas_id); 102262306a36Sopenharmony_ci case IOMMU_TEST_OP_ACCESS_PAGES: 102362306a36Sopenharmony_ci return iommufd_test_access_pages( 102462306a36Sopenharmony_ci ucmd, cmd->id, cmd->access_pages.iova, 102562306a36Sopenharmony_ci cmd->access_pages.length, 102662306a36Sopenharmony_ci u64_to_user_ptr(cmd->access_pages.uptr), 102762306a36Sopenharmony_ci cmd->access_pages.flags); 102862306a36Sopenharmony_ci case IOMMU_TEST_OP_ACCESS_RW: 102962306a36Sopenharmony_ci return iommufd_test_access_rw( 103062306a36Sopenharmony_ci ucmd, cmd->id, cmd->access_rw.iova, 103162306a36Sopenharmony_ci cmd->access_rw.length, 103262306a36Sopenharmony_ci u64_to_user_ptr(cmd->access_rw.uptr), 103362306a36Sopenharmony_ci cmd->access_rw.flags); 103462306a36Sopenharmony_ci case IOMMU_TEST_OP_DESTROY_ACCESS_PAGES: 103562306a36Sopenharmony_ci return iommufd_test_access_item_destroy( 103662306a36Sopenharmony_ci ucmd, cmd->id, cmd->destroy_access_pages.access_pages_id); 103762306a36Sopenharmony_ci case IOMMU_TEST_OP_SET_TEMP_MEMORY_LIMIT: 103862306a36Sopenharmony_ci /* Protect _batch_init(), can not be less than elmsz */ 103962306a36Sopenharmony_ci if (cmd->memory_limit.limit < 104062306a36Sopenharmony_ci sizeof(unsigned long) + sizeof(u32)) 104162306a36Sopenharmony_ci return -EINVAL; 104262306a36Sopenharmony_ci iommufd_test_memory_limit = cmd->memory_limit.limit; 104362306a36Sopenharmony_ci return 0; 104462306a36Sopenharmony_ci default: 104562306a36Sopenharmony_ci return -EOPNOTSUPP; 104662306a36Sopenharmony_ci } 104762306a36Sopenharmony_ci} 104862306a36Sopenharmony_ci 104962306a36Sopenharmony_cibool iommufd_should_fail(void) 105062306a36Sopenharmony_ci{ 105162306a36Sopenharmony_ci return should_fail(&fail_iommufd, 1); 105262306a36Sopenharmony_ci} 105362306a36Sopenharmony_ci 105462306a36Sopenharmony_ciint __init iommufd_test_init(void) 105562306a36Sopenharmony_ci{ 105662306a36Sopenharmony_ci struct platform_device_info pdevinfo = { 105762306a36Sopenharmony_ci .name = "iommufd_selftest_iommu", 105862306a36Sopenharmony_ci }; 105962306a36Sopenharmony_ci int rc; 106062306a36Sopenharmony_ci 106162306a36Sopenharmony_ci dbgfs_root = 106262306a36Sopenharmony_ci fault_create_debugfs_attr("fail_iommufd", NULL, &fail_iommufd); 106362306a36Sopenharmony_ci 106462306a36Sopenharmony_ci selftest_iommu_dev = platform_device_register_full(&pdevinfo); 106562306a36Sopenharmony_ci if (IS_ERR(selftest_iommu_dev)) { 106662306a36Sopenharmony_ci rc = PTR_ERR(selftest_iommu_dev); 106762306a36Sopenharmony_ci goto err_dbgfs; 106862306a36Sopenharmony_ci } 106962306a36Sopenharmony_ci 107062306a36Sopenharmony_ci rc = bus_register(&iommufd_mock_bus_type.bus); 107162306a36Sopenharmony_ci if (rc) 107262306a36Sopenharmony_ci goto err_platform; 107362306a36Sopenharmony_ci 107462306a36Sopenharmony_ci rc = iommu_device_sysfs_add(&mock_iommu_device, 107562306a36Sopenharmony_ci &selftest_iommu_dev->dev, NULL, "%s", 107662306a36Sopenharmony_ci dev_name(&selftest_iommu_dev->dev)); 107762306a36Sopenharmony_ci if (rc) 107862306a36Sopenharmony_ci goto err_bus; 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_ci rc = iommu_device_register_bus(&mock_iommu_device, &mock_ops, 108162306a36Sopenharmony_ci &iommufd_mock_bus_type.bus, 108262306a36Sopenharmony_ci &iommufd_mock_bus_type.nb); 108362306a36Sopenharmony_ci if (rc) 108462306a36Sopenharmony_ci goto err_sysfs; 108562306a36Sopenharmony_ci return 0; 108662306a36Sopenharmony_ci 108762306a36Sopenharmony_cierr_sysfs: 108862306a36Sopenharmony_ci iommu_device_sysfs_remove(&mock_iommu_device); 108962306a36Sopenharmony_cierr_bus: 109062306a36Sopenharmony_ci bus_unregister(&iommufd_mock_bus_type.bus); 109162306a36Sopenharmony_cierr_platform: 109262306a36Sopenharmony_ci platform_device_unregister(selftest_iommu_dev); 109362306a36Sopenharmony_cierr_dbgfs: 109462306a36Sopenharmony_ci debugfs_remove_recursive(dbgfs_root); 109562306a36Sopenharmony_ci return rc; 109662306a36Sopenharmony_ci} 109762306a36Sopenharmony_ci 109862306a36Sopenharmony_civoid iommufd_test_exit(void) 109962306a36Sopenharmony_ci{ 110062306a36Sopenharmony_ci iommu_device_sysfs_remove(&mock_iommu_device); 110162306a36Sopenharmony_ci iommu_device_unregister_bus(&mock_iommu_device, 110262306a36Sopenharmony_ci &iommufd_mock_bus_type.bus, 110362306a36Sopenharmony_ci &iommufd_mock_bus_type.nb); 110462306a36Sopenharmony_ci bus_unregister(&iommufd_mock_bus_type.bus); 110562306a36Sopenharmony_ci platform_device_unregister(selftest_iommu_dev); 110662306a36Sopenharmony_ci debugfs_remove_recursive(dbgfs_root); 110762306a36Sopenharmony_ci} 1108