Received: by 10.192.165.148 with SMTP id m20csp2376273imm; Thu, 26 Apr 2018 09:57:52 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrhtERF+qopOteoyBxyvmOkP95qiEBAt8kdT0xLGgYBiwZHSZuqy4NK2TrO3mYA/7rI9uos X-Received: by 10.101.99.73 with SMTP id p9mr7722875pgv.111.1524761872243; Thu, 26 Apr 2018 09:57:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524761872; cv=none; d=google.com; s=arc-20160816; b=s+rGgPhBJk9xZztIRUUrAAGvOJa6hrl3hx+Vt4JPxPCtPiL1PKRksUkkA5qqFGKjIZ LQ0Rsyko+RXQFpuLbXyZ5ngiZXJdNMhe9j8t62VRCph+DOP6KYAQxavBUuhTTtrKzd8n wOXGoE5CrLPWVKYkwTspKChemZZqHbrRA89qREE2MKUfitXfBH2zaei3duEKNoY5izNF NGnNQg4rP265sCb4Udm4U2pYvtmCCQ4ZEbTXtA8bnDjr3DQWnM+46A8hGUVYkkGui77e cgD4hqJ+Gj45U61QL6vYBnuHT/4CmN1YNd2h6zQjPczEooJIBiRfBZnxJEkm5X3ZUfct RDLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=iFnoAs35Tacxef3SMac1BwOOlKg7TVCRs0qMx7ISPl0=; b=XvLXEM/kNuw6JdaE33TimgzvS1dkk/9buzQxv42vg5L7yLkfOxbNg1FtPyD7vQg/Y7 5Uvhv82fOpxx+gMg8nIiMEPUtMZ+WLs5x47TPcoAue3g0DKeEcSgvEVg+r3jJy5RV+eJ Ji2PIHHi7uj9MDpy+B7RHU3VCf1EMYlIC1oYNu46PDSyrclP2GVDDOEZ36RRF4kOMob0 jU34I/0BRdkw/zpSA0pcMXmLxVUpoLH6Cz5lzs7sGICUEpvPL7a1x0sXFKnqaWMxuY5r uks4bIlNvQ+ui7H0kNYAfwNjCCPC625bYM/hGCL0+D7NneDAI8HpRwOBUWS0OQTFzCD2 qWxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=qMzpqEaA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m9si19173964pff.80.2018.04.26.09.57.38; Thu, 26 Apr 2018 09:57:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=qMzpqEaA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932213AbeDZQzz (ORCPT + 99 others); Thu, 26 Apr 2018 12:55:55 -0400 Received: from aserp2130.oracle.com ([141.146.126.79]:42568 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756944AbeDZQyU (ORCPT ); Thu, 26 Apr 2018 12:54:20 -0400 Received: from pps.filterd (aserp2130.oracle.com [127.0.0.1]) by aserp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w3QGpgZN082211; Thu, 26 Apr 2018 16:54:10 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2017-10-26; bh=iFnoAs35Tacxef3SMac1BwOOlKg7TVCRs0qMx7ISPl0=; b=qMzpqEaAVcqFSB4yaxQmv9K7G/K20KV/VFhFxq7xsBUmbhlrjCxcBZmcjWhcKMGwpBZV MwSSDFjbPHaOmL6+CX4e0vj6NPnsQUUp4QSx6dYp3TzOS622F60Lfmqgf/YYKjxo4j1A KJaTeHCkefNUONjx7CrooGBUENsxnlhVA2pavAQJp4D4pmqa8UsMxfevDTBk6x+E0Dux LcKw2CUm+A/QF96lRWZhdVt+N17pCSyYuxx+1uHSl2/SIp1J41vIyw20c8QQuUOmrrO0 TXqYUM9zkyyfD8tz3pdaFpPfd4bhrFh2R3Vtq1CbmwPpsqtrEVqevAcBMG+yUyhBfZwQ uA== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp2130.oracle.com with ESMTP id 2hfttycb5s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 26 Apr 2018 16:54:10 +0000 Received: from brm-t84-02.us.oracle.com (brm-t84-02.us.oracle.com [10.80.150.81]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w3QGs9TX016763; Thu, 26 Apr 2018 16:54:10 GMT From: Tom Hromatka To: davem@davemloft.net Cc: sparclinux@vger.kernel.org, arnd@arndb.de, gregkh@linuxfoundation.org, linux-kernel@vger.kernel.org, tom.hromatka@oracle.com, shuah@kernel.org, linux-kselftest@vger.kernel.org, allen.pais@oracle.com, khalid.aziz@oracle.com, shannon.nelson@oracle.com, anthony.yznaga@oracle.com Subject: [PATCH v6 0/2] sparc64: Add privileged ADI driver Date: Thu, 26 Apr 2018 10:54:07 -0600 Message-Id: <20180426165409.716764-1-tom.hromatka@oracle.com> X-Mailer: git-send-email 2.15.0 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8875 signatures=668698 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=700 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804260157 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ADI is a feature supported on SPARC M7 and newer processors to allow hardware to catch rogue accesses to memory. ADI is supported for data fetches only and not instruction fetches. An app can enable ADI on its data pages, set version tags on them and use versioned addresses to access the data pages. Upper bits of the address contain the version tag. On M7 processors, upper four bits (bits 63-60) contain the version tag. If a rogue app attempts to access ADI enabled data pages, its access is blocked and processor generates an exception. Please see Documentation/sparc/adi.txt for further details. This patchset implements a char driver to read/write ADI versions from privileged user space processes. Intended consumers are makedumpfile and crash. v6: * Addressed a few action items from greg k-h * Added Reviewed-by Greg Kroah-Hartman and Shuah Khan v5: * Fixed MODULE_LICENSE() for adi.c v4: * Fixed messed up subject lines. v3: * Really fixed the copyright headers to use SPDX GPL v2. Really. v2: * Simplified copyright headers * Completely reworked sparc64 selftests Makefiles. Used the android selftests Makefiles as an example * Added run.sh and drivers_test.sh to the sparc64 selftest directory. Used bpf/test_kmod.sh and the android selftests as examples * Minor cleanups in the selftest adi-test.c * Added calls to ksft_test_*() in the adi-test.c Tom Hromatka (2): char: sparc64: Add privileged ADI driver selftests: sparc64: char: Selftest for privileged ADI driver drivers/char/Kconfig | 12 + drivers/char/Makefile | 1 + drivers/char/adi.c | 239 +++++++ tools/testing/selftests/Makefile | 1 + tools/testing/selftests/sparc64/Makefile | 46 ++ tools/testing/selftests/sparc64/drivers/.gitignore | 1 + tools/testing/selftests/sparc64/drivers/Makefile | 15 + tools/testing/selftests/sparc64/drivers/adi-test.c | 721 +++++++++++++++++++++ .../selftests/sparc64/drivers/drivers_test.sh | 30 + tools/testing/selftests/sparc64/run.sh | 3 + 10 files changed, 1069 insertions(+) create mode 100644 drivers/char/adi.c create mode 100644 tools/testing/selftests/sparc64/Makefile create mode 100644 tools/testing/selftests/sparc64/drivers/.gitignore create mode 100644 tools/testing/selftests/sparc64/drivers/Makefile create mode 100644 tools/testing/selftests/sparc64/drivers/adi-test.c create mode 100755 tools/testing/selftests/sparc64/drivers/drivers_test.sh create mode 100755 tools/testing/selftests/sparc64/run.sh -- 2.15.0