162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/* Copyright (c) 2021-2022, NVIDIA CORPORATION & AFFILIATES
362306a36Sopenharmony_ci *
462306a36Sopenharmony_ci * These tests are "kernel integrity" tests. They are looking for kernel
562306a36Sopenharmony_ci * WARN/OOPS/kasn/etc splats triggered by kernel sanitizers & debugging
662306a36Sopenharmony_ci * features. It does not attempt to verify that the system calls are doing what
762306a36Sopenharmony_ci * they are supposed to do.
862306a36Sopenharmony_ci *
962306a36Sopenharmony_ci * The basic philosophy is to run a sequence of calls that will succeed and then
1062306a36Sopenharmony_ci * sweep every failure injection point on that call chain to look for
1162306a36Sopenharmony_ci * interesting things in error handling.
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci * This test is best run with:
1462306a36Sopenharmony_ci *  echo 1 > /proc/sys/kernel/panic_on_warn
1562306a36Sopenharmony_ci * If something is actually going wrong.
1662306a36Sopenharmony_ci */
1762306a36Sopenharmony_ci#include <fcntl.h>
1862306a36Sopenharmony_ci#include <dirent.h>
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci#define __EXPORTED_HEADERS__
2162306a36Sopenharmony_ci#include <linux/vfio.h>
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci#include "iommufd_utils.h"
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_cistatic bool have_fault_injection;
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_cistatic int writeat(int dfd, const char *fn, const char *val)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	size_t val_len = strlen(val);
3062306a36Sopenharmony_ci	ssize_t res;
3162306a36Sopenharmony_ci	int fd;
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci	fd = openat(dfd, fn, O_WRONLY);
3462306a36Sopenharmony_ci	if (fd == -1)
3562306a36Sopenharmony_ci		return -1;
3662306a36Sopenharmony_ci	res = write(fd, val, val_len);
3762306a36Sopenharmony_ci	assert(res == val_len);
3862306a36Sopenharmony_ci	close(fd);
3962306a36Sopenharmony_ci	return 0;
4062306a36Sopenharmony_ci}
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic __attribute__((constructor)) void setup_buffer(void)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	PAGE_SIZE = sysconf(_SC_PAGE_SIZE);
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci	BUFFER_SIZE = 2*1024*1024;
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci	buffer = mmap(0, BUFFER_SIZE, PROT_READ | PROT_WRITE,
4962306a36Sopenharmony_ci		      MAP_SHARED | MAP_ANONYMOUS, -1, 0);
5062306a36Sopenharmony_ci}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci/*
5362306a36Sopenharmony_ci * This sets up fail_injection in a way that is useful for this test.
5462306a36Sopenharmony_ci * It does not attempt to restore things back to how they were.
5562306a36Sopenharmony_ci */
5662306a36Sopenharmony_cistatic __attribute__((constructor)) void setup_fault_injection(void)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	DIR *debugfs = opendir("/sys/kernel/debug/");
5962306a36Sopenharmony_ci	struct dirent *dent;
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	if (!debugfs)
6262306a36Sopenharmony_ci		return;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	/* Allow any allocation call to be fault injected */
6562306a36Sopenharmony_ci	if (writeat(dirfd(debugfs), "failslab/ignore-gfp-wait", "N"))
6662306a36Sopenharmony_ci		return;
6762306a36Sopenharmony_ci	writeat(dirfd(debugfs), "fail_page_alloc/ignore-gfp-wait", "N");
6862306a36Sopenharmony_ci	writeat(dirfd(debugfs), "fail_page_alloc/ignore-gfp-highmem", "N");
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	while ((dent = readdir(debugfs))) {
7162306a36Sopenharmony_ci		char fn[300];
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci		if (strncmp(dent->d_name, "fail", 4) != 0)
7462306a36Sopenharmony_ci			continue;
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci		/* We are looking for kernel splats, quiet down the log */
7762306a36Sopenharmony_ci		snprintf(fn, sizeof(fn), "%s/verbose", dent->d_name);
7862306a36Sopenharmony_ci		writeat(dirfd(debugfs), fn, "0");
7962306a36Sopenharmony_ci	}
8062306a36Sopenharmony_ci	closedir(debugfs);
8162306a36Sopenharmony_ci	have_fault_injection = true;
8262306a36Sopenharmony_ci}
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_cistruct fail_nth_state {
8562306a36Sopenharmony_ci	int proc_fd;
8662306a36Sopenharmony_ci	unsigned int iteration;
8762306a36Sopenharmony_ci};
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_cistatic void fail_nth_first(struct __test_metadata *_metadata,
9062306a36Sopenharmony_ci			   struct fail_nth_state *nth_state)
9162306a36Sopenharmony_ci{
9262306a36Sopenharmony_ci	char buf[300];
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ci	snprintf(buf, sizeof(buf), "/proc/self/task/%u/fail-nth", getpid());
9562306a36Sopenharmony_ci	nth_state->proc_fd = open(buf, O_RDWR);
9662306a36Sopenharmony_ci	ASSERT_NE(-1, nth_state->proc_fd);
9762306a36Sopenharmony_ci}
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_cistatic bool fail_nth_next(struct __test_metadata *_metadata,
10062306a36Sopenharmony_ci			  struct fail_nth_state *nth_state,
10162306a36Sopenharmony_ci			  int test_result)
10262306a36Sopenharmony_ci{
10362306a36Sopenharmony_ci	static const char disable_nth[] = "0";
10462306a36Sopenharmony_ci	char buf[300];
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci	/*
10762306a36Sopenharmony_ci	 * This is just an arbitrary limit based on the current kernel
10862306a36Sopenharmony_ci	 * situation. Changes in the kernel can dramtically change the number of
10962306a36Sopenharmony_ci	 * required fault injection sites, so if this hits it doesn't
11062306a36Sopenharmony_ci	 * necessarily mean a test failure, just that the limit has to be made
11162306a36Sopenharmony_ci	 * bigger.
11262306a36Sopenharmony_ci	 */
11362306a36Sopenharmony_ci	ASSERT_GT(400, nth_state->iteration);
11462306a36Sopenharmony_ci	if (nth_state->iteration != 0) {
11562306a36Sopenharmony_ci		ssize_t res;
11662306a36Sopenharmony_ci		ssize_t res2;
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci		buf[0] = 0;
11962306a36Sopenharmony_ci		/*
12062306a36Sopenharmony_ci		 * Annoyingly disabling the nth can also fail. This means
12162306a36Sopenharmony_ci		 * the test passed without triggering failure
12262306a36Sopenharmony_ci		 */
12362306a36Sopenharmony_ci		res = pread(nth_state->proc_fd, buf, sizeof(buf), 0);
12462306a36Sopenharmony_ci		if (res == -1 && errno == EFAULT) {
12562306a36Sopenharmony_ci			buf[0] = '1';
12662306a36Sopenharmony_ci			buf[1] = '\n';
12762306a36Sopenharmony_ci			res = 2;
12862306a36Sopenharmony_ci		}
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_ci		res2 = pwrite(nth_state->proc_fd, disable_nth,
13162306a36Sopenharmony_ci			      ARRAY_SIZE(disable_nth) - 1, 0);
13262306a36Sopenharmony_ci		if (res2 == -1 && errno == EFAULT) {
13362306a36Sopenharmony_ci			res2 = pwrite(nth_state->proc_fd, disable_nth,
13462306a36Sopenharmony_ci				      ARRAY_SIZE(disable_nth) - 1, 0);
13562306a36Sopenharmony_ci			buf[0] = '1';
13662306a36Sopenharmony_ci			buf[1] = '\n';
13762306a36Sopenharmony_ci		}
13862306a36Sopenharmony_ci		ASSERT_EQ(ARRAY_SIZE(disable_nth) - 1, res2);
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ci		/* printf("  nth %u result=%d nth=%u\n", nth_state->iteration,
14162306a36Sopenharmony_ci		       test_result, atoi(buf)); */
14262306a36Sopenharmony_ci		fflush(stdout);
14362306a36Sopenharmony_ci		ASSERT_LT(1, res);
14462306a36Sopenharmony_ci		if (res != 2 || buf[0] != '0' || buf[1] != '\n')
14562306a36Sopenharmony_ci			return false;
14662306a36Sopenharmony_ci	} else {
14762306a36Sopenharmony_ci		/* printf("  nth %u result=%d\n", nth_state->iteration,
14862306a36Sopenharmony_ci		       test_result); */
14962306a36Sopenharmony_ci	}
15062306a36Sopenharmony_ci	nth_state->iteration++;
15162306a36Sopenharmony_ci	return true;
15262306a36Sopenharmony_ci}
15362306a36Sopenharmony_ci
15462306a36Sopenharmony_ci/*
15562306a36Sopenharmony_ci * This is called during the test to start failure injection. It allows the test
15662306a36Sopenharmony_ci * to do some setup that has already been swept and thus reduce the required
15762306a36Sopenharmony_ci * iterations.
15862306a36Sopenharmony_ci */
15962306a36Sopenharmony_civoid __fail_nth_enable(struct __test_metadata *_metadata,
16062306a36Sopenharmony_ci		       struct fail_nth_state *nth_state)
16162306a36Sopenharmony_ci{
16262306a36Sopenharmony_ci	char buf[300];
16362306a36Sopenharmony_ci	size_t len;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	if (!nth_state->iteration)
16662306a36Sopenharmony_ci		return;
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci	len = snprintf(buf, sizeof(buf), "%u", nth_state->iteration);
16962306a36Sopenharmony_ci	ASSERT_EQ(len, pwrite(nth_state->proc_fd, buf, len, 0));
17062306a36Sopenharmony_ci}
17162306a36Sopenharmony_ci#define fail_nth_enable() __fail_nth_enable(_metadata, _nth_state)
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_ci#define TEST_FAIL_NTH(fixture_name, name)                                           \
17462306a36Sopenharmony_ci	static int test_nth_##name(struct __test_metadata *_metadata,               \
17562306a36Sopenharmony_ci				   FIXTURE_DATA(fixture_name) *self,                \
17662306a36Sopenharmony_ci				   const FIXTURE_VARIANT(fixture_name)              \
17762306a36Sopenharmony_ci					   *variant,                                \
17862306a36Sopenharmony_ci				   struct fail_nth_state *_nth_state);              \
17962306a36Sopenharmony_ci	TEST_F(fixture_name, name)                                                  \
18062306a36Sopenharmony_ci	{                                                                           \
18162306a36Sopenharmony_ci		struct fail_nth_state nth_state = {};                               \
18262306a36Sopenharmony_ci		int test_result = 0;                                                \
18362306a36Sopenharmony_ci										    \
18462306a36Sopenharmony_ci		if (!have_fault_injection)                                          \
18562306a36Sopenharmony_ci			SKIP(return,                                                \
18662306a36Sopenharmony_ci				   "fault injection is not enabled in the kernel"); \
18762306a36Sopenharmony_ci		fail_nth_first(_metadata, &nth_state);                              \
18862306a36Sopenharmony_ci		ASSERT_EQ(0, test_nth_##name(_metadata, self, variant,              \
18962306a36Sopenharmony_ci					     &nth_state));                          \
19062306a36Sopenharmony_ci		while (fail_nth_next(_metadata, &nth_state, test_result)) {         \
19162306a36Sopenharmony_ci			fixture_name##_teardown(_metadata, self, variant);          \
19262306a36Sopenharmony_ci			fixture_name##_setup(_metadata, self, variant);             \
19362306a36Sopenharmony_ci			test_result = test_nth_##name(_metadata, self,              \
19462306a36Sopenharmony_ci						      variant, &nth_state);         \
19562306a36Sopenharmony_ci		};                                                                  \
19662306a36Sopenharmony_ci		ASSERT_EQ(0, test_result);                                          \
19762306a36Sopenharmony_ci	}                                                                           \
19862306a36Sopenharmony_ci	static int test_nth_##name(                                                 \
19962306a36Sopenharmony_ci		struct __test_metadata __attribute__((unused)) *_metadata,          \
20062306a36Sopenharmony_ci		FIXTURE_DATA(fixture_name) __attribute__((unused)) *self,           \
20162306a36Sopenharmony_ci		const FIXTURE_VARIANT(fixture_name) __attribute__((unused))         \
20262306a36Sopenharmony_ci			*variant,                                                   \
20362306a36Sopenharmony_ci		struct fail_nth_state *_nth_state)
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ciFIXTURE(basic_fail_nth)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	int fd;
20862306a36Sopenharmony_ci	uint32_t access_id;
20962306a36Sopenharmony_ci};
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_ciFIXTURE_SETUP(basic_fail_nth)
21262306a36Sopenharmony_ci{
21362306a36Sopenharmony_ci	self->fd = -1;
21462306a36Sopenharmony_ci	self->access_id = 0;
21562306a36Sopenharmony_ci}
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_ciFIXTURE_TEARDOWN(basic_fail_nth)
21862306a36Sopenharmony_ci{
21962306a36Sopenharmony_ci	int rc;
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_ci	if (self->access_id) {
22262306a36Sopenharmony_ci		/* The access FD holds the iommufd open until it closes */
22362306a36Sopenharmony_ci		rc = _test_cmd_destroy_access(self->access_id);
22462306a36Sopenharmony_ci		assert(rc == 0);
22562306a36Sopenharmony_ci	}
22662306a36Sopenharmony_ci	teardown_iommufd(self->fd, _metadata);
22762306a36Sopenharmony_ci}
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci/* Cover ioas.c */
23062306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, basic)
23162306a36Sopenharmony_ci{
23262306a36Sopenharmony_ci	struct iommu_iova_range ranges[10];
23362306a36Sopenharmony_ci	uint32_t ioas_id;
23462306a36Sopenharmony_ci	__u64 iova;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	fail_nth_enable();
23762306a36Sopenharmony_ci
23862306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
23962306a36Sopenharmony_ci	if (self->fd == -1)
24062306a36Sopenharmony_ci		return -1;
24162306a36Sopenharmony_ci
24262306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
24362306a36Sopenharmony_ci		return -1;
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci	{
24662306a36Sopenharmony_ci		struct iommu_ioas_iova_ranges ranges_cmd = {
24762306a36Sopenharmony_ci			.size = sizeof(ranges_cmd),
24862306a36Sopenharmony_ci			.num_iovas = ARRAY_SIZE(ranges),
24962306a36Sopenharmony_ci			.ioas_id = ioas_id,
25062306a36Sopenharmony_ci			.allowed_iovas = (uintptr_t)ranges,
25162306a36Sopenharmony_ci		};
25262306a36Sopenharmony_ci		if (ioctl(self->fd, IOMMU_IOAS_IOVA_RANGES, &ranges_cmd))
25362306a36Sopenharmony_ci			return -1;
25462306a36Sopenharmony_ci	}
25562306a36Sopenharmony_ci
25662306a36Sopenharmony_ci	{
25762306a36Sopenharmony_ci		struct iommu_ioas_allow_iovas allow_cmd = {
25862306a36Sopenharmony_ci			.size = sizeof(allow_cmd),
25962306a36Sopenharmony_ci			.ioas_id = ioas_id,
26062306a36Sopenharmony_ci			.num_iovas = 1,
26162306a36Sopenharmony_ci			.allowed_iovas = (uintptr_t)ranges,
26262306a36Sopenharmony_ci		};
26362306a36Sopenharmony_ci
26462306a36Sopenharmony_ci		ranges[0].start = 16*1024;
26562306a36Sopenharmony_ci		ranges[0].last = BUFFER_SIZE + 16 * 1024 * 600 - 1;
26662306a36Sopenharmony_ci		if (ioctl(self->fd, IOMMU_IOAS_ALLOW_IOVAS, &allow_cmd))
26762306a36Sopenharmony_ci			return -1;
26862306a36Sopenharmony_ci	}
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, BUFFER_SIZE, &iova,
27162306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
27262306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
27362306a36Sopenharmony_ci		return -1;
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_ci	{
27662306a36Sopenharmony_ci		struct iommu_ioas_copy copy_cmd = {
27762306a36Sopenharmony_ci			.size = sizeof(copy_cmd),
27862306a36Sopenharmony_ci			.flags = IOMMU_IOAS_MAP_WRITEABLE |
27962306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_READABLE,
28062306a36Sopenharmony_ci			.dst_ioas_id = ioas_id,
28162306a36Sopenharmony_ci			.src_ioas_id = ioas_id,
28262306a36Sopenharmony_ci			.src_iova = iova,
28362306a36Sopenharmony_ci			.length = sizeof(ranges),
28462306a36Sopenharmony_ci		};
28562306a36Sopenharmony_ci
28662306a36Sopenharmony_ci		if (ioctl(self->fd, IOMMU_IOAS_COPY, &copy_cmd))
28762306a36Sopenharmony_ci			return -1;
28862306a36Sopenharmony_ci	}
28962306a36Sopenharmony_ci
29062306a36Sopenharmony_ci	if (_test_ioctl_ioas_unmap(self->fd, ioas_id, iova, BUFFER_SIZE,
29162306a36Sopenharmony_ci				   NULL))
29262306a36Sopenharmony_ci		return -1;
29362306a36Sopenharmony_ci	/* Failure path of no IOVA to unmap */
29462306a36Sopenharmony_ci	_test_ioctl_ioas_unmap(self->fd, ioas_id, iova, BUFFER_SIZE, NULL);
29562306a36Sopenharmony_ci	return 0;
29662306a36Sopenharmony_ci}
29762306a36Sopenharmony_ci
29862306a36Sopenharmony_ci/* iopt_area_fill_domains() and iopt_area_fill_domain() */
29962306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, map_domain)
30062306a36Sopenharmony_ci{
30162306a36Sopenharmony_ci	uint32_t ioas_id;
30262306a36Sopenharmony_ci	__u32 stdev_id;
30362306a36Sopenharmony_ci	__u32 hwpt_id;
30462306a36Sopenharmony_ci	__u64 iova;
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
30762306a36Sopenharmony_ci	if (self->fd == -1)
30862306a36Sopenharmony_ci		return -1;
30962306a36Sopenharmony_ci
31062306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
31162306a36Sopenharmony_ci		return -1;
31262306a36Sopenharmony_ci
31362306a36Sopenharmony_ci	if (_test_ioctl_set_temp_memory_limit(self->fd, 32))
31462306a36Sopenharmony_ci		return -1;
31562306a36Sopenharmony_ci
31662306a36Sopenharmony_ci	fail_nth_enable();
31762306a36Sopenharmony_ci
31862306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, &hwpt_id, NULL))
31962306a36Sopenharmony_ci		return -1;
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, 262144, &iova,
32262306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
32362306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
32462306a36Sopenharmony_ci		return -1;
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	if (_test_ioctl_destroy(self->fd, stdev_id))
32762306a36Sopenharmony_ci		return -1;
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, &hwpt_id, NULL))
33062306a36Sopenharmony_ci		return -1;
33162306a36Sopenharmony_ci	return 0;
33262306a36Sopenharmony_ci}
33362306a36Sopenharmony_ci
33462306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, map_two_domains)
33562306a36Sopenharmony_ci{
33662306a36Sopenharmony_ci	uint32_t ioas_id;
33762306a36Sopenharmony_ci	__u32 stdev_id2;
33862306a36Sopenharmony_ci	__u32 stdev_id;
33962306a36Sopenharmony_ci	__u32 hwpt_id2;
34062306a36Sopenharmony_ci	__u32 hwpt_id;
34162306a36Sopenharmony_ci	__u64 iova;
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
34462306a36Sopenharmony_ci	if (self->fd == -1)
34562306a36Sopenharmony_ci		return -1;
34662306a36Sopenharmony_ci
34762306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
34862306a36Sopenharmony_ci		return -1;
34962306a36Sopenharmony_ci
35062306a36Sopenharmony_ci	if (_test_ioctl_set_temp_memory_limit(self->fd, 32))
35162306a36Sopenharmony_ci		return -1;
35262306a36Sopenharmony_ci
35362306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, &hwpt_id, NULL))
35462306a36Sopenharmony_ci		return -1;
35562306a36Sopenharmony_ci
35662306a36Sopenharmony_ci	fail_nth_enable();
35762306a36Sopenharmony_ci
35862306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id2, &hwpt_id2,
35962306a36Sopenharmony_ci				  NULL))
36062306a36Sopenharmony_ci		return -1;
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, 262144, &iova,
36362306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
36462306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
36562306a36Sopenharmony_ci		return -1;
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci	if (_test_ioctl_destroy(self->fd, stdev_id))
36862306a36Sopenharmony_ci		return -1;
36962306a36Sopenharmony_ci
37062306a36Sopenharmony_ci	if (_test_ioctl_destroy(self->fd, stdev_id2))
37162306a36Sopenharmony_ci		return -1;
37262306a36Sopenharmony_ci
37362306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, &hwpt_id, NULL))
37462306a36Sopenharmony_ci		return -1;
37562306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id2, &hwpt_id2,
37662306a36Sopenharmony_ci				  NULL))
37762306a36Sopenharmony_ci		return -1;
37862306a36Sopenharmony_ci	return 0;
37962306a36Sopenharmony_ci}
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, access_rw)
38262306a36Sopenharmony_ci{
38362306a36Sopenharmony_ci	uint64_t tmp_big[4096];
38462306a36Sopenharmony_ci	uint32_t ioas_id;
38562306a36Sopenharmony_ci	uint16_t tmp[32];
38662306a36Sopenharmony_ci	__u64 iova;
38762306a36Sopenharmony_ci
38862306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
38962306a36Sopenharmony_ci	if (self->fd == -1)
39062306a36Sopenharmony_ci		return -1;
39162306a36Sopenharmony_ci
39262306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
39362306a36Sopenharmony_ci		return -1;
39462306a36Sopenharmony_ci
39562306a36Sopenharmony_ci	if (_test_ioctl_set_temp_memory_limit(self->fd, 32))
39662306a36Sopenharmony_ci		return -1;
39762306a36Sopenharmony_ci
39862306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, 262144, &iova,
39962306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
40062306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
40162306a36Sopenharmony_ci		return -1;
40262306a36Sopenharmony_ci
40362306a36Sopenharmony_ci	fail_nth_enable();
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_ci	if (_test_cmd_create_access(self->fd, ioas_id, &self->access_id, 0))
40662306a36Sopenharmony_ci		return -1;
40762306a36Sopenharmony_ci
40862306a36Sopenharmony_ci	{
40962306a36Sopenharmony_ci		struct iommu_test_cmd access_cmd = {
41062306a36Sopenharmony_ci			.size = sizeof(access_cmd),
41162306a36Sopenharmony_ci			.op = IOMMU_TEST_OP_ACCESS_RW,
41262306a36Sopenharmony_ci			.id = self->access_id,
41362306a36Sopenharmony_ci			.access_rw = { .iova = iova,
41462306a36Sopenharmony_ci				       .length = sizeof(tmp),
41562306a36Sopenharmony_ci				       .uptr = (uintptr_t)tmp },
41662306a36Sopenharmony_ci		};
41762306a36Sopenharmony_ci
41862306a36Sopenharmony_ci		// READ
41962306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
42062306a36Sopenharmony_ci			  &access_cmd))
42162306a36Sopenharmony_ci			return -1;
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_ci		access_cmd.access_rw.flags = MOCK_ACCESS_RW_WRITE;
42462306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
42562306a36Sopenharmony_ci			  &access_cmd))
42662306a36Sopenharmony_ci			return -1;
42762306a36Sopenharmony_ci
42862306a36Sopenharmony_ci		access_cmd.access_rw.flags = MOCK_ACCESS_RW_SLOW_PATH;
42962306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
43062306a36Sopenharmony_ci			  &access_cmd))
43162306a36Sopenharmony_ci			return -1;
43262306a36Sopenharmony_ci		access_cmd.access_rw.flags = MOCK_ACCESS_RW_SLOW_PATH |
43362306a36Sopenharmony_ci					     MOCK_ACCESS_RW_WRITE;
43462306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
43562306a36Sopenharmony_ci			  &access_cmd))
43662306a36Sopenharmony_ci			return -1;
43762306a36Sopenharmony_ci	}
43862306a36Sopenharmony_ci
43962306a36Sopenharmony_ci	{
44062306a36Sopenharmony_ci		struct iommu_test_cmd access_cmd = {
44162306a36Sopenharmony_ci			.size = sizeof(access_cmd),
44262306a36Sopenharmony_ci			.op = IOMMU_TEST_OP_ACCESS_RW,
44362306a36Sopenharmony_ci			.id = self->access_id,
44462306a36Sopenharmony_ci			.access_rw = { .iova = iova,
44562306a36Sopenharmony_ci				       .flags = MOCK_ACCESS_RW_SLOW_PATH,
44662306a36Sopenharmony_ci				       .length = sizeof(tmp_big),
44762306a36Sopenharmony_ci				       .uptr = (uintptr_t)tmp_big },
44862306a36Sopenharmony_ci		};
44962306a36Sopenharmony_ci
45062306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
45162306a36Sopenharmony_ci			  &access_cmd))
45262306a36Sopenharmony_ci			return -1;
45362306a36Sopenharmony_ci	}
45462306a36Sopenharmony_ci	if (_test_cmd_destroy_access(self->access_id))
45562306a36Sopenharmony_ci		return -1;
45662306a36Sopenharmony_ci	self->access_id = 0;
45762306a36Sopenharmony_ci	return 0;
45862306a36Sopenharmony_ci}
45962306a36Sopenharmony_ci
46062306a36Sopenharmony_ci/* pages.c access functions */
46162306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, access_pin)
46262306a36Sopenharmony_ci{
46362306a36Sopenharmony_ci	uint32_t access_pages_id;
46462306a36Sopenharmony_ci	uint32_t ioas_id;
46562306a36Sopenharmony_ci	__u64 iova;
46662306a36Sopenharmony_ci
46762306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
46862306a36Sopenharmony_ci	if (self->fd == -1)
46962306a36Sopenharmony_ci		return -1;
47062306a36Sopenharmony_ci
47162306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
47262306a36Sopenharmony_ci		return -1;
47362306a36Sopenharmony_ci
47462306a36Sopenharmony_ci	if (_test_ioctl_set_temp_memory_limit(self->fd, 32))
47562306a36Sopenharmony_ci		return -1;
47662306a36Sopenharmony_ci
47762306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, BUFFER_SIZE, &iova,
47862306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
47962306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
48062306a36Sopenharmony_ci		return -1;
48162306a36Sopenharmony_ci
48262306a36Sopenharmony_ci	if (_test_cmd_create_access(self->fd, ioas_id, &self->access_id,
48362306a36Sopenharmony_ci				    MOCK_FLAGS_ACCESS_CREATE_NEEDS_PIN_PAGES))
48462306a36Sopenharmony_ci		return -1;
48562306a36Sopenharmony_ci
48662306a36Sopenharmony_ci	fail_nth_enable();
48762306a36Sopenharmony_ci
48862306a36Sopenharmony_ci	{
48962306a36Sopenharmony_ci		struct iommu_test_cmd access_cmd = {
49062306a36Sopenharmony_ci			.size = sizeof(access_cmd),
49162306a36Sopenharmony_ci			.op = IOMMU_TEST_OP_ACCESS_PAGES,
49262306a36Sopenharmony_ci			.id = self->access_id,
49362306a36Sopenharmony_ci			.access_pages = { .iova = iova,
49462306a36Sopenharmony_ci					  .length = BUFFER_SIZE,
49562306a36Sopenharmony_ci					  .uptr = (uintptr_t)buffer },
49662306a36Sopenharmony_ci		};
49762306a36Sopenharmony_ci
49862306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
49962306a36Sopenharmony_ci			  &access_cmd))
50062306a36Sopenharmony_ci			return -1;
50162306a36Sopenharmony_ci		access_pages_id = access_cmd.access_pages.out_access_pages_id;
50262306a36Sopenharmony_ci	}
50362306a36Sopenharmony_ci
50462306a36Sopenharmony_ci	if (_test_cmd_destroy_access_pages(self->fd, self->access_id,
50562306a36Sopenharmony_ci					   access_pages_id))
50662306a36Sopenharmony_ci		return -1;
50762306a36Sopenharmony_ci
50862306a36Sopenharmony_ci	if (_test_cmd_destroy_access(self->access_id))
50962306a36Sopenharmony_ci		return -1;
51062306a36Sopenharmony_ci	self->access_id = 0;
51162306a36Sopenharmony_ci	return 0;
51262306a36Sopenharmony_ci}
51362306a36Sopenharmony_ci
51462306a36Sopenharmony_ci/* iopt_pages_fill_xarray() */
51562306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, access_pin_domain)
51662306a36Sopenharmony_ci{
51762306a36Sopenharmony_ci	uint32_t access_pages_id;
51862306a36Sopenharmony_ci	uint32_t ioas_id;
51962306a36Sopenharmony_ci	__u32 stdev_id;
52062306a36Sopenharmony_ci	__u32 hwpt_id;
52162306a36Sopenharmony_ci	__u64 iova;
52262306a36Sopenharmony_ci
52362306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
52462306a36Sopenharmony_ci	if (self->fd == -1)
52562306a36Sopenharmony_ci		return -1;
52662306a36Sopenharmony_ci
52762306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
52862306a36Sopenharmony_ci		return -1;
52962306a36Sopenharmony_ci
53062306a36Sopenharmony_ci	if (_test_ioctl_set_temp_memory_limit(self->fd, 32))
53162306a36Sopenharmony_ci		return -1;
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, &hwpt_id, NULL))
53462306a36Sopenharmony_ci		return -1;
53562306a36Sopenharmony_ci
53662306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, BUFFER_SIZE, &iova,
53762306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_WRITEABLE |
53862306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
53962306a36Sopenharmony_ci		return -1;
54062306a36Sopenharmony_ci
54162306a36Sopenharmony_ci	if (_test_cmd_create_access(self->fd, ioas_id, &self->access_id,
54262306a36Sopenharmony_ci				    MOCK_FLAGS_ACCESS_CREATE_NEEDS_PIN_PAGES))
54362306a36Sopenharmony_ci		return -1;
54462306a36Sopenharmony_ci
54562306a36Sopenharmony_ci	fail_nth_enable();
54662306a36Sopenharmony_ci
54762306a36Sopenharmony_ci	{
54862306a36Sopenharmony_ci		struct iommu_test_cmd access_cmd = {
54962306a36Sopenharmony_ci			.size = sizeof(access_cmd),
55062306a36Sopenharmony_ci			.op = IOMMU_TEST_OP_ACCESS_PAGES,
55162306a36Sopenharmony_ci			.id = self->access_id,
55262306a36Sopenharmony_ci			.access_pages = { .iova = iova,
55362306a36Sopenharmony_ci					  .length = BUFFER_SIZE,
55462306a36Sopenharmony_ci					  .uptr = (uintptr_t)buffer },
55562306a36Sopenharmony_ci		};
55662306a36Sopenharmony_ci
55762306a36Sopenharmony_ci		if (ioctl(self->fd, _IOMMU_TEST_CMD(IOMMU_TEST_OP_ACCESS_RW),
55862306a36Sopenharmony_ci			  &access_cmd))
55962306a36Sopenharmony_ci			return -1;
56062306a36Sopenharmony_ci		access_pages_id = access_cmd.access_pages.out_access_pages_id;
56162306a36Sopenharmony_ci	}
56262306a36Sopenharmony_ci
56362306a36Sopenharmony_ci	if (_test_cmd_destroy_access_pages(self->fd, self->access_id,
56462306a36Sopenharmony_ci					   access_pages_id))
56562306a36Sopenharmony_ci		return -1;
56662306a36Sopenharmony_ci
56762306a36Sopenharmony_ci	if (_test_cmd_destroy_access(self->access_id))
56862306a36Sopenharmony_ci		return -1;
56962306a36Sopenharmony_ci	self->access_id = 0;
57062306a36Sopenharmony_ci
57162306a36Sopenharmony_ci	if (_test_ioctl_destroy(self->fd, stdev_id))
57262306a36Sopenharmony_ci		return -1;
57362306a36Sopenharmony_ci	return 0;
57462306a36Sopenharmony_ci}
57562306a36Sopenharmony_ci
57662306a36Sopenharmony_ci/* device.c */
57762306a36Sopenharmony_ciTEST_FAIL_NTH(basic_fail_nth, device)
57862306a36Sopenharmony_ci{
57962306a36Sopenharmony_ci	struct iommu_test_hw_info info;
58062306a36Sopenharmony_ci	uint32_t ioas_id;
58162306a36Sopenharmony_ci	uint32_t ioas_id2;
58262306a36Sopenharmony_ci	uint32_t stdev_id;
58362306a36Sopenharmony_ci	uint32_t idev_id;
58462306a36Sopenharmony_ci	uint32_t hwpt_id;
58562306a36Sopenharmony_ci	__u64 iova;
58662306a36Sopenharmony_ci
58762306a36Sopenharmony_ci	self->fd = open("/dev/iommu", O_RDWR);
58862306a36Sopenharmony_ci	if (self->fd == -1)
58962306a36Sopenharmony_ci		return -1;
59062306a36Sopenharmony_ci
59162306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id))
59262306a36Sopenharmony_ci		return -1;
59362306a36Sopenharmony_ci
59462306a36Sopenharmony_ci	if (_test_ioctl_ioas_alloc(self->fd, &ioas_id2))
59562306a36Sopenharmony_ci		return -1;
59662306a36Sopenharmony_ci
59762306a36Sopenharmony_ci	iova = MOCK_APERTURE_START;
59862306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id, buffer, PAGE_SIZE, &iova,
59962306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_FIXED_IOVA |
60062306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_WRITEABLE |
60162306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
60262306a36Sopenharmony_ci		return -1;
60362306a36Sopenharmony_ci	if (_test_ioctl_ioas_map(self->fd, ioas_id2, buffer, PAGE_SIZE, &iova,
60462306a36Sopenharmony_ci				 IOMMU_IOAS_MAP_FIXED_IOVA |
60562306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_WRITEABLE |
60662306a36Sopenharmony_ci					 IOMMU_IOAS_MAP_READABLE))
60762306a36Sopenharmony_ci		return -1;
60862306a36Sopenharmony_ci
60962306a36Sopenharmony_ci	fail_nth_enable();
61062306a36Sopenharmony_ci
61162306a36Sopenharmony_ci	if (_test_cmd_mock_domain(self->fd, ioas_id, &stdev_id, NULL,
61262306a36Sopenharmony_ci				  &idev_id))
61362306a36Sopenharmony_ci		return -1;
61462306a36Sopenharmony_ci
61562306a36Sopenharmony_ci	if (_test_cmd_get_hw_info(self->fd, idev_id, &info, sizeof(info)))
61662306a36Sopenharmony_ci		return -1;
61762306a36Sopenharmony_ci
61862306a36Sopenharmony_ci	if (_test_cmd_hwpt_alloc(self->fd, idev_id, ioas_id, &hwpt_id))
61962306a36Sopenharmony_ci		return -1;
62062306a36Sopenharmony_ci
62162306a36Sopenharmony_ci	if (_test_cmd_mock_domain_replace(self->fd, stdev_id, ioas_id2, NULL))
62262306a36Sopenharmony_ci		return -1;
62362306a36Sopenharmony_ci
62462306a36Sopenharmony_ci	if (_test_cmd_mock_domain_replace(self->fd, stdev_id, hwpt_id, NULL))
62562306a36Sopenharmony_ci		return -1;
62662306a36Sopenharmony_ci	return 0;
62762306a36Sopenharmony_ci}
62862306a36Sopenharmony_ci
62962306a36Sopenharmony_ciTEST_HARNESS_MAIN
630