github.com/google/syzkaller@v0.0.0-20251211124644-a066d2bc4b02/sys/linux/test/arm64-syz_kvm_setup_syzos_vm-vgicv3-cpu1 (about) 1 # 2 # requires: arch=arm64 -threaded 3 # 4 r0 = openat$kvm(0, &AUTO='/dev/kvm\x00', 0x0, 0x0) 5 r1 = ioctl$KVM_CREATE_VM(r0, AUTO, 0x0) 6 r2 = syz_kvm_setup_syzos_vm$arm64(r1, &(0x7f0000c00000/0x400000)=nil) 7 r3 = syz_kvm_add_vcpu$arm64(r2, &AUTO={0x0, &AUTO=[@irq_setup={AUTO, AUTO, {0x1, 0x20}}], AUTO}, 0x0, 0x0) 8 r4 = syz_kvm_add_vcpu$arm64(r2, &AUTO={0x0, &AUTO=[@irq_setup={AUTO, AUTO, {0x1, 0x20}}], AUTO}, 0x0, 0x0) 9 syz_kvm_vgic_v3_setup(r1, 0x2, 0x100) 10 11 r5 = ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, AUTO) 12 r6 = mmap$KVM_VCPU(&(0x7f0000009000/0x1000)=nil, r5, 0x3, 0x1, r3, 0x0) 13 r7 = mmap$KVM_VCPU(&(0x7f000000a000/0x1000)=nil, r5, 0x3, 0x1, r4, 0x0) 14 15 ioctl$KVM_RUN(r4, AUTO, 0x0) 16 syz_kvm_assert_syzos_uexit$arm64(r7, 0xffffffffffffffff) 17 # 18 # Calling KVM_RUN here again would result in infinite loop. 19 # Instead, signal SPI 32 on CPU 1 (0x1010020), so that the guest can execute another uexit in the IRQ handler. 20 # 21 ioctl$KVM_IRQ_LINE(r1, AUTO, &AUTO={0x1010020, 0x1}) 22 ioctl$KVM_RUN(r3, AUTO, 0x0) 23 syz_kvm_assert_syzos_uexit$arm64(r6, 0xfffffffffffffffe)