[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240820065623.1140399-3-hari55@linux.ibm.com>
Date: Tue, 20 Aug 2024 08:48:34 +0200
From: Hariharan Mari <hari55@...ux.ibm.com>
To: linux-kselftest@...r.kernel.org
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org, shuah@...nel.org,
frankja@...ux.ibm.com, borntraeger@...ux.ibm.com,
imbrenda@...ux.ibm.com, david@...hat.com, pbonzini@...hat.com,
schlameuss@...ux.ibm.com
Subject: [PATCH v2 2/5] KVM: s390: selftests: Add regression tests for PRNO, KDSA and KMA crypto subfunctions
Extend the existing regression test framework for s390x CPU subfunctions
to include tests for the PRNO (Perform Random Number Operation), KDSA
(Compute Digital Signature Authentication) and KMA (Cipher Message with
Authentication) crypto functions.
The test procedure follows the established pattern:
1. Obtain KVM_S390_VM_CPU_MACHINE_SUBFUNC attribute for the VM.
2. Execute PRNO, KDSA and KMA instructions.
3. Compare KVM-reported results with direct instruction execution results.
Suggested-by: Janosch Frank <frankja@...ux.ibm.com>
Signed-off-by: Hariharan Mari <hari55@...ux.ibm.com>
Reviewed-by: Janosch Frank <frankja@...ux.ibm.com>
---
.../kvm/s390x/cpumodel_subfuncs_test.c | 51 +++++++++++++++++++
1 file changed, 51 insertions(+)
diff --git a/tools/testing/selftests/kvm/s390x/cpumodel_subfuncs_test.c b/tools/testing/selftests/kvm/s390x/cpumodel_subfuncs_test.c
index ea03ce2010bb..2489e10d3cc2 100644
--- a/tools/testing/selftests/kvm/s390x/cpumodel_subfuncs_test.c
+++ b/tools/testing/selftests/kvm/s390x/cpumodel_subfuncs_test.c
@@ -37,6 +37,48 @@ static void get_cpu_machine_subfuntions(struct kvm_vm *vm,
TEST_ASSERT(!r, "Get cpu subfunctions failed r=%d errno=%d", r, errno);
}
+/*
+ * Testing Crypto Perform Random Number Operation (PRNO) CPU subfunction's
+ * ASM block
+ */
+static void test_prno_asm_block(u8 (*query)[16])
+{
+ asm volatile(" la %%r1,%[query]\n"
+ " xgr %%r0,%%r0\n"
+ " .insn rre,0xb93c0000,2,4\n"
+ : [query] "=R" (*query)
+ :
+ : "cc", "r0", "r1");
+}
+
+/*
+ * Testing Crypto Cipher Message with Authentication (KMA) CPU subfunction's
+ * ASM block
+ */
+static void test_kma_asm_block(u8 (*query)[16])
+{
+ asm volatile(" la %%r1,%[query]\n"
+ " xgr %%r0,%%r0\n"
+ " .insn rrf,0xb9290000,2,4,6,0\n"
+ : [query] "=R" (*query)
+ :
+ : "cc", "r0", "r1");
+}
+
+/*
+ * Testing Crypto Compute Digital Signature Authentication (KDSA) CPU
+ * subfunction's ASM block
+ */
+static void test_kdsa_asm_block(u8 (*query)[16])
+{
+ asm volatile(" la %%r1,%[query]\n"
+ " xgr %%r0,%%r0\n"
+ " .insn rre,0xb93a0000,0,2\n"
+ : [query] "=R" (*query)
+ :
+ : "cc", "r0", "r1");
+}
+
/*
* Testing Sort Lists (SORTL) CPU subfunction's ASM block
*/
@@ -72,6 +114,15 @@ struct testdef {
testfunc_t test;
int facility_bit;
} testlist[] = {
+ /* MSA5 - Facility bit 57 */
+ { "PPNO", cpu_subfunc.ppno, sizeof(cpu_subfunc.ppno),
+ test_prno_asm_block, 57 },
+ /* MSA8 - Facility bit 146 */
+ { "KMA", cpu_subfunc.kma, sizeof(cpu_subfunc.kma),
+ test_kma_asm_block, 146 },
+ /* MSA9 - Facility bit 155 */
+ { "KDSA", cpu_subfunc.kdsa, sizeof(cpu_subfunc.kdsa),
+ test_kdsa_asm_block, 155 },
/* SORTL - Facility bit 150 */
{ "SORTL", cpu_subfunc.sortl, sizeof(cpu_subfunc.sortl),
test_sortl_asm_block, 150 },
--
2.45.2
Powered by blists - more mailing lists