Add a test case verifying KVM_SET_USER_MEMORY_REGION and
KVM_SET_USER_MEMORY_REGION2 cannot be executed on ucontrol VMs.

Executing this test case on not patched kernels will cause a null
pointer dereference in the host kernel.
This is fixed with commit:
commit 7816e58967d0 ("kvm: s390: Reject memory region operations for ucontrol 
VMs")

Signed-off-by: Christoph Schlameuss <schlame...@linux.ibm.com>
Reviewed-by: Janosch Frank <fran...@linux.ibm.com>
---
 .../selftests/kvm/s390x/ucontrol_test.c       | 22 +++++++++++++++++++
 1 file changed, 22 insertions(+)

diff --git a/tools/testing/selftests/kvm/s390x/ucontrol_test.c 
b/tools/testing/selftests/kvm/s390x/ucontrol_test.c
index 30160347a937..cce79e522711 100644
--- a/tools/testing/selftests/kvm/s390x/ucontrol_test.c
+++ b/tools/testing/selftests/kvm/s390x/ucontrol_test.c
@@ -571,4 +571,26 @@ TEST_F(uc_kvm, uc_gprs)
        ASSERT_EQ(1, sync_regs->gprs[0]);
 }
 
+TEST_F(uc_kvm, uc_no_user_region)
+{
+       struct kvm_userspace_memory_region region = {
+               .slot = 1,
+               .guest_phys_addr = self->code_gpa,
+               .memory_size = VM_MEM_EXT_SIZE,
+               .userspace_addr = (uintptr_t)self->code_hva,
+       };
+       struct kvm_userspace_memory_region2 region2 = {
+               .slot = 1,
+               .guest_phys_addr = self->code_gpa,
+               .memory_size = VM_MEM_EXT_SIZE,
+               .userspace_addr = (uintptr_t)self->code_hva,
+       };
+
+       ASSERT_EQ(-1, ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &region));
+       ASSERT_EQ(EINVAL, errno);
+
+       ASSERT_EQ(-1, ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION2, 
&region2));
+       ASSERT_EQ(EINVAL, errno);
+}
+
 TEST_HARNESS_MAIN
-- 
2.45.2


Reply via email to