Received: by 10.192.165.148 with SMTP id m20csp640006imm; Fri, 20 Apr 2018 12:44:09 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/xO6rS1Df41Zgx5ehZF0DWgKv+0eaDL3/Y3MEdgptasL+qSW7KvtfSYY2v0pPlt7fCqrU5 X-Received: by 10.101.82.133 with SMTP id y5mr9450555pgp.27.1524253449013; Fri, 20 Apr 2018 12:44:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524253448; cv=none; d=google.com; s=arc-20160816; b=XX0rRH8jghoK34VC2Pm1HIfnTFCke0LXONnL36ttNeEA42beBeVZ3pR76SYGV0UYaO wWeziQMfF/xOC2EcPP5TF+gHPQq+0/BnFB+mEex5Sp8Vv7+wgi/a7QuBOJarSZv+JtWn 1YzUGzTFoWvFIlVdJGZpCx7f5++WPK9jLQbYpJ4uqhwXDiy9Lik22CklGQROzBmrzbRB i+74LMeuW5ELtrTWtt0iY+qYv1wuIwLRx1BRGrl6dnLrjacKbQcC6AZbjFkjzqWtqSqq NBu24xL1mo2ly9Nks8BG+M9taXOxWgttYSdivQnnQgkTB3lXZ5JdYpBQW9OeWq5XVtNl 7zeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=erfA20x/KzUluKzc+olIfYzUFNuI7oxsPA65WNN5Ngs=; b=DSjCW/RwOfBopxJL33zuZRpTzGs6ozNaROycqolwAV4GYP9EbmLCJ12RH5aksRgi8n qMYK8VWJso1c0ytW0K3IA41Exrex5qcoEPTReX/ahJ3wOsog+Aj5UhRUflksREXtH7Rv Lxa4gQRIytq/Wlkh12abR6FzxHlukyriea/ueVulwlcFREQv3c5yo++DosksYAq6PhYz VpYV7eI2DaD1H8BXJ56YVUpcSnrO/LfC9jnVwS676biNfnIQbJCnRAqmUC/7Hd1BWop7 KoF1ODvHKHV9ZdJ4xvrtTQZ8vLP1wagbg2Hhl4r4UtJbu0SJg0y+2ZTdp1Y52EycoWBK OVMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=YeLM9Efr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h188si2342060pgc.53.2018.04.20.12.43.30; Fri, 20 Apr 2018 12:44:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=YeLM9Efr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752590AbeDTTkQ (ORCPT + 99 others); Fri, 20 Apr 2018 15:40:16 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:55744 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751836AbeDTTjt (ORCPT ); Fri, 20 Apr 2018 15:39:49 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w3KJaOpo044585; Fri, 20 Apr 2018 19:39:41 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2017-10-26; bh=erfA20x/KzUluKzc+olIfYzUFNuI7oxsPA65WNN5Ngs=; b=YeLM9Efrpp9HzGv3bqr9YIGTQSHpJb2xCr9iWO4F6fzFO97sOtyF8tEYYMD2AuC+7Ek9 7ngngoTWjfkzHyBmIZV45Bx4i5eOFJzN/hrmmutoX3IZ8G8sChRIpHjmci7R3ZxGiAJM z2wobVF19OjL8myzlsXgM24aVuhlfRXo3xiRFSqxUvhPQQLjWcMMMs5LGIa9T3erz3Vb neyFoVvxA5ncl2hvSPZJj9Pb85d3k2osQ5JFFZqWZfCwv3TNJtk+jbR0ZzOpLFDnDB/1 qa7+HO+CsYISjh7FjQ0lrKFMBzgAMvoSGtOzbTo3FVXK0JdE+f+jRy8ANr+S3UQHrM9U vw== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2hdrxpe4hw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Apr 2018 19:39:41 +0000 Received: from brm-t84-02.us.oracle.com (brm-t84-02.us.oracle.com [10.80.150.81]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w3KJdd48006380; Fri, 20 Apr 2018 19:39:39 GMT From: Tom Hromatka To: davem@davemloft.net Cc: sparclinux@vger.kernel.org, arnd@arndb.de, gregkh@linuxfoundation.org, linux-kernel@vger.kernel.org, tom.hromatka@oracle.com, shuah@kernel.org, linux-kselftest@vger.kernel.org, allen.pais@oracle.com, khalid.aziz@oracle.com, shannon.nelson@oracle.com, anthony.yznaga@oracle.com Subject: [PATCH v3 0/2] sparc64: Add privileged ADI driver Date: Fri, 20 Apr 2018 13:39:37 -0600 Message-Id: <20180420193939.487546-1-tom.hromatka@oracle.com> X-Mailer: git-send-email 2.15.0 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8869 signatures=668698 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=703 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804200197 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ADI is a feature supported on SPARC M7 and newer processors to allow hardware to catch rogue accesses to memory. ADI is supported for data fetches only and not instruction fetches. An app can enable ADI on its data pages, set version tags on them and use versioned addresses to access the data pages. Upper bits of the address contain the version tag. On M7 processors, upper four bits (bits 63-60) contain the version tag. If a rogue app attempts to access ADI enabled data pages, its access is blocked and processor generates an exception. Please see Documentation/sparc/adi.txt for further details. This patchset implements a char driver to read/write ADI versions from privileged user space processes. Intended consumers are makedumpfile and crash. v3: * Really fixed the copyright headers to use SPDX GPL v2. Really. v2: * Simplified copyright headers * Completely reworked sparc64 selftests Makefiles. Used the android selftests Makefiles as an example * Added run.sh and drivers_test.sh to the sparc64 selftest directory. Used bpf/test_kmod.sh and the android selftests as examples * Minor cleanups in the selftest adi-test.c * Added calls to ksft_test_*() in the adi-test.c Tom Hromatka (2): SPARC M7 and newer processors utilize ADI to version and protect memory. This driver is capable of reading/writing ADI/MCD versions from privileged user space processes. Addresses in the adi file are mapped linearly to physical memory at a ratio of 1:adi_blksz. Thus, a read (or write) of offset K in the file operates upon the ADI version at physical address K * adi_blksz. The version information is encoded as one version per byte. Intended consumers are makedumpfile and crash. Add a selftest for the sparc64 privileged ADI driver. These tests verify the read(), pread(), write(), pwrite(), and seek() functionality of the driver. The tests also report simple performance statistics: drivers/char/Kconfig | 12 + drivers/char/Makefile | 1 + drivers/char/adi.c | 240 +++++++ tools/testing/selftests/Makefile | 1 + tools/testing/selftests/sparc64/Makefile | 46 ++ tools/testing/selftests/sparc64/drivers/.gitignore | 1 + tools/testing/selftests/sparc64/drivers/Makefile | 15 + tools/testing/selftests/sparc64/drivers/adi-test.c | 721 +++++++++++++++++++++ .../selftests/sparc64/drivers/drivers_test.sh | 30 + tools/testing/selftests/sparc64/run.sh | 3 + 10 files changed, 1070 insertions(+) create mode 100644 drivers/char/adi.c create mode 100644 tools/testing/selftests/sparc64/Makefile create mode 100644 tools/testing/selftests/sparc64/drivers/.gitignore create mode 100644 tools/testing/selftests/sparc64/drivers/Makefile create mode 100644 tools/testing/selftests/sparc64/drivers/adi-test.c create mode 100755 tools/testing/selftests/sparc64/drivers/drivers_test.sh create mode 100755 tools/testing/selftests/sparc64/run.sh -- 2.15.0