From nobody Mon Apr 6 23:10:25 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B642337F8A8; Tue, 17 Mar 2026 20:10:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773778253; cv=none; b=dh1F/K4M3y+8zcM4RYRGBBZDy9aQRc7R/WNYL/eqzD+LTwdjzPxjiGpOvP4ItM9NdT9JhnKgqujohD6oJeD4bovA0VpTRQiTNhmRKjS9GYgtrRxcQiKU3b37gVGCQIRSa6S5liWJE29JbnVmEQaHGiyEi8XRpqZX0JiUvTXwcqM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773778253; c=relaxed/simple; bh=kFeKoFDmekxxcafvujeqVbvYB0xH3vg3F9QRQrkEoOE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=avy2ptsJIwVBv+li9Kbp9FNrWa93M7GcBvVLuwqykn4xl6E+df+NXsPfEfHtZpalFxESP4ER7LFjpQnVh1mBRnhwtWqUkW86RmQEDDQ+JJqmGI2MCLzHWaLA/oX/BBU05ljZ9KSpjY0gG7pFCXJERKLMu4ULKMAQWTeVEOKiTzA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=vEC5qbo6; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="vEC5qbo6" Received: by smtp.kernel.org (Postfix) with ESMTPSA id EF32DC4CEF7; Tue, 17 Mar 2026 20:10:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1773778253; bh=kFeKoFDmekxxcafvujeqVbvYB0xH3vg3F9QRQrkEoOE=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=vEC5qbo6U6FpH2KAtG9ztjEoqKsccUXFiwJQ5ufPj6QHIsvmD0Aw0f/31CIH2stGd VjgtaqM5HiAb3SZBTZlbuI85y1QdVIST6+Shv73n1owHIQSYSbmvNAoQgY9LMAj8Gt /WtwCHuSEjcWuN7dkk7eVnd4GF8t6dIumVOlcoy57eezyFVgu6thVv5QUEB0GpOQAf BFnVWL0ZFF0UKnEFh2zaODre/F2C48aBKiZqJZgwiCzw/fhWevZKGTc/ppCgn6ziH/ ed/moA+4ztWJke3fBaS7ATs9OfjB9dsIy71NYwguzGvHMj5Bf8451MCJ+/0NoswSZx nsRP8JQbjsCTg== From: Mark Brown Date: Tue, 17 Mar 2026 20:10:35 +0000 Subject: [PATCH v5 2/5] KVM: selftests: arm64: Report register reset tests individually Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260317-kvm-arm64-set-id-regs-aarch64-v5-2-a60f2b956e22@kernel.org> References: <20260317-kvm-arm64-set-id-regs-aarch64-v5-0-a60f2b956e22@kernel.org> In-Reply-To: <20260317-kvm-arm64-set-id-regs-aarch64-v5-0-a60f2b956e22@kernel.org> To: Marc Zyngier , Joey Gouly , Suzuki K Poulose , Paolo Bonzini , Shuah Khan , Oliver Upton Cc: Ben Horgan , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-e1b5b X-Developer-Signature: v=1; a=openpgp-sha256; l=2248; i=broonie@kernel.org; h=from:subject:message-id; bh=kFeKoFDmekxxcafvujeqVbvYB0xH3vg3F9QRQrkEoOE=; b=kA0DAAoBJNaLcl1Uh9AByyZiAGm5tUGgGcVX2IzCqGQdpFqqfPs4PTc8/c20iS58WDLQyFAC4 IkBMwQAAQoAHRYhBK3maKpnVxi1n+Kf6iTWi3JdVIfQBQJpubVBAAoJECTWi3JdVIfQJvYIAIKM Gwp4XdxPZ7J5pq7cW6MgthHq/HwyKfkJgBu/c6vGZVADnsf40qXyX1qM4httVOeCLZOTZppMQ8r PqrXWvttHaAdizNUlJR7HDQn0CSJkHvs2bYNPsdWjl1uW7/LPxlOhmxepTZX7b52qW5XUaPTxET Nmri8Ng8IoLtNMLYQhz1YjQ63gTs3uE7dYWsg3mvAYTmvMLcN91zW1LuVGFMdQoo0Q7+WOG6566 RVayZ8XtOgEZaCIJTO/nMVH/5RI8cgPTKu2Kqoq4gsvC5VFCYNLyXFTuwkTF4E0q122NSVmE3BK yfIC/EniKBF4nssSHEpOmdX0c1Mv8ZkIpmuNnPs= X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB set_id_regs tests that registers have their values preserved over reset. Currently it reports all registers in a single test with an instantly fatal assert which isn't great for diagnostics, it's hard to tell which register failed or if it's just one register. Change this to report each register as a separate test so that it's clear from the program output which registers have problems. Reviewed-by: Ben Horgan Signed-off-by: Mark Brown --- tools/testing/selftests/kvm/arm64/set_id_regs.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/kvm/arm64/set_id_regs.c b/tools/testin= g/selftests/kvm/arm64/set_id_regs.c index 75f23371d97d..1072ee125b05 100644 --- a/tools/testing/selftests/kvm/arm64/set_id_regs.c +++ b/tools/testing/selftests/kvm/arm64/set_id_regs.c @@ -778,11 +778,18 @@ static void test_assert_id_reg_unchanged(struct kvm_v= cpu *vcpu, uint32_t encodin { size_t idx =3D encoding_to_range_idx(encoding); uint64_t observed; + bool pass; =20 observed =3D vcpu_get_reg(vcpu, KVM_ARM64_SYS_REG(encoding)); - TEST_ASSERT_EQ(test_reg_vals[idx], observed); + pass =3D test_reg_vals[idx] =3D=3D observed; + if (!pass) + ksft_print_msg("%lx !=3D %lx\n", test_reg_vals[idx], observed); + ksft_test_result(pass, "%s unchanged by reset\n", + get_reg_name(encoding)); } =20 +#define ID_REG_RESET_UNCHANGED_TEST (ARRAY_SIZE(test_regs) + 6) + static void test_reset_preserves_id_regs(struct kvm_vcpu *vcpu) { /* @@ -800,8 +807,6 @@ static void test_reset_preserves_id_regs(struct kvm_vcp= u *vcpu) test_assert_id_reg_unchanged(vcpu, SYS_MIDR_EL1); test_assert_id_reg_unchanged(vcpu, SYS_REVIDR_EL1); test_assert_id_reg_unchanged(vcpu, SYS_AIDR_EL1); - - ksft_test_result_pass("%s\n", __func__); } =20 int main(void) @@ -829,7 +834,8 @@ int main(void) =20 ksft_print_header(); =20 - test_cnt =3D 3 + MPAM_IDREG_TEST + MTE_IDREG_TEST + GUEST_READ_TEST; + test_cnt =3D 2 + MPAM_IDREG_TEST + MTE_IDREG_TEST + GUEST_READ_TEST + + ID_REG_RESET_UNCHANGED_TEST; for (i =3D 0; i < ARRAY_SIZE(test_regs); i++) for (j =3D 0; test_regs[i].ftr_bits[j].type !=3D FTR_END; j++) test_cnt++; --=20 2.47.3