github.com/google/syzkaller@v0.0.0-20251211124644-a066d2bc4b02/sys/linux/test/arm64-syz_kvm_setup_syzos_vm-vgicv3-cpu1 (about)

     1  #
     2  # requires: arch=arm64 -threaded
     3  #
     4  r0 = openat$kvm(0, &AUTO='/dev/kvm\x00', 0x0, 0x0)
     5  r1 = ioctl$KVM_CREATE_VM(r0, AUTO, 0x0)
     6  r2 = syz_kvm_setup_syzos_vm$arm64(r1, &(0x7f0000c00000/0x400000)=nil)
     7  r3 = syz_kvm_add_vcpu$arm64(r2, &AUTO={0x0, &AUTO=[@irq_setup={AUTO, AUTO, {0x1, 0x20}}], AUTO}, 0x0, 0x0)
     8  r4 = syz_kvm_add_vcpu$arm64(r2, &AUTO={0x0, &AUTO=[@irq_setup={AUTO, AUTO, {0x1, 0x20}}], AUTO}, 0x0, 0x0)
     9  syz_kvm_vgic_v3_setup(r1, 0x2, 0x100)
    10  
    11  r5 = ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, AUTO)
    12  r6 = mmap$KVM_VCPU(&(0x7f0000009000/0x1000)=nil, r5, 0x3, 0x1, r3, 0x0)
    13  r7 = mmap$KVM_VCPU(&(0x7f000000a000/0x1000)=nil, r5, 0x3, 0x1, r4, 0x0)
    14  
    15  ioctl$KVM_RUN(r4, AUTO, 0x0)
    16  syz_kvm_assert_syzos_uexit$arm64(r7, 0xffffffffffffffff)
    17  #
    18  # Calling KVM_RUN here again would result in infinite loop.
    19  # Instead, signal SPI 32 on CPU 1 (0x1010020), so that the guest can execute another uexit in the IRQ handler.
    20  #
    21  ioctl$KVM_IRQ_LINE(r1, AUTO, &AUTO={0x1010020, 0x1})
    22  ioctl$KVM_RUN(r3, AUTO, 0x0)
    23  syz_kvm_assert_syzos_uexit$arm64(r6, 0xfffffffffffffffe)