Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp428995pxk; Thu, 17 Sep 2020 06:56:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVI7ENgKT8AmSMHvRKD6eteCSk8rpOuEyzP7vsNi16wxK/tZbD2uZxAedJvn8gca5+rz3S X-Received: by 2002:a17:906:c830:: with SMTP id dd16mr31545731ejb.196.1600351011130; Thu, 17 Sep 2020 06:56:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600351011; cv=none; d=google.com; s=arc-20160816; b=gZ84fDbi5hLTCsz43mu0fBaecK+H+JQ/YJdIblDcOpn8gHsbn9tebmYGwdQc3WEAoe uB3Y2hKvpSCve3buzpx3oe39R1hM3ykbyk9uO0SkthLXCNarpJCrGY+vku1djStV7ahd Rb87sm5NoWJYUztknl70+vBqeo0JP1z67hMNDt3f+OJduREp6re/rNj6jodwa7bLnY6p Q48q7DQaNtXskdsL21GAho9eRe9RmUaklWnBwZdmu/mvWtHLUXEfZTkt3ERl+zaLeMkI BfHFeJH5WnDnZOalERyV8eM2u3UKXvNNC6J9VaxAqJrJ487xOxxl6shTI6Jyg3emWgbb JoJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=k/IwXklM6qI1Lf5GnsaIa12/XO5uJLdiCa4JIJCuT9o=; b=agIpIX0eHMcT31BqonPGJ7u+js4KRUo3BA7lVJspwuE6Sog+Uq0QfAFq3cxyEYYolG JU8JL/ZPUqyPzxgTWfWO7jpI4uC13ypaa4YBTtPe/Ly3K+rRto+WrSS4WhfYsq/TtwU0 VcfhU4DH0oMAVkfsiWIGedWSobXJA/7kake8yLVOYhF6NvwzE+8kauksj6YIh//VrA8y iH90dv/wre7SzW4oXt+qeAImQ8C1dyXrWEsjEWNyWOMnnjq9eIEANoVnDJXReAcD+p4r 4RzU82VKI+3O50ea31iucUBNYEqEgiNQ2UXO2CMnOKmTCNgc5lVGUFS87daQ1vdGdicP VOCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=DcMf1WvE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lx3si14365585ejb.306.2020.09.17.06.56.25; Thu, 17 Sep 2020 06:56:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=DcMf1WvE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727132AbgIQNyq (ORCPT + 99 others); Thu, 17 Sep 2020 09:54:46 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:45488 "EHLO mx0b-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726827AbgIQNxz (ORCPT ); Thu, 17 Sep 2020 09:53:55 -0400 X-Greylist: delayed 1511 seconds by postgrey-1.27 at vger.kernel.org; Thu, 17 Sep 2020 09:53:54 EDT Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 08HD1MX2015919; Thu, 17 Sep 2020 09:26:27 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=k/IwXklM6qI1Lf5GnsaIa12/XO5uJLdiCa4JIJCuT9o=; b=DcMf1WvEUXDd70nG6DyN1IoAy1tWVPujzfOIUJCInoDtheewFg0Vou3+04c4cfjpDLJM g2CTcgFBHrNXhl3Mj1FWmQZrJbnFYXq+otmYFtgRNpthavslelBkmW8+9ePTauPlN4uc Jl76v/8Wcb1Ymj1FTMBmH26G8ef/UzHTGJ12QY1+SsleF+AFyH6GwUNA8mEjuDWcwheJ 5/YvGHRYl5sRyNWeV/1RGFSvsywfENYg7O+7duPyI3OnMNOvauSbLYAS4g9697A2qxG3 wYHjbtQGkHri9OzHIqsyJa3F9r6tY205WOY4mul5dWMOZV6BPi54GMqvwS2n5OtGSX/W 5g== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 33m850s8sj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Sep 2020 09:26:27 -0400 Received: from m0098421.ppops.net (m0098421.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 08HD1qqi017944; Thu, 17 Sep 2020 09:26:27 -0400 Received: from ppma02wdc.us.ibm.com (aa.5b.37a9.ip4.static.sl-reverse.com [169.55.91.170]) by mx0a-001b2d01.pphosted.com with ESMTP id 33m850s8rw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Sep 2020 09:26:26 -0400 Received: from pps.filterd (ppma02wdc.us.ibm.com [127.0.0.1]) by ppma02wdc.us.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 08HDMbXs008155; Thu, 17 Sep 2020 13:26:25 GMT Received: from b01cxnp22034.gho.pok.ibm.com (b01cxnp22034.gho.pok.ibm.com [9.57.198.24]) by ppma02wdc.us.ibm.com with ESMTP id 33k67c4j6p-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Sep 2020 13:26:25 +0000 Received: from b01ledav005.gho.pok.ibm.com (b01ledav005.gho.pok.ibm.com [9.57.199.110]) by b01cxnp22034.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 08HDQPvE49086738 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 17 Sep 2020 13:26:25 GMT Received: from b01ledav005.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 20B38AE05F; Thu, 17 Sep 2020 13:26:25 +0000 (GMT) Received: from b01ledav005.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B3932AE05C; Thu, 17 Sep 2020 13:26:21 +0000 (GMT) Received: from localhost.localdomain (unknown [9.211.95.89]) by b01ledav005.gho.pok.ibm.com (Postfix) with ESMTP; Thu, 17 Sep 2020 13:26:21 +0000 (GMT) Subject: Re: [PATCH v6 8/8] powerpc/watchpoint/selftests: Tests for kernel accessing user memory To: Ravi Bangoria , mpe@ellerman.id.au, christophe.leroy@c-s.fr Cc: mikey@neuling.org, jniethe5@gmail.com, pedromfc@linux.ibm.com, linux-kernel@vger.kernel.org, paulus@samba.org, rogealve@linux.ibm.com, naveen.n.rao@linux.vnet.ibm.com, linuxppc-dev@lists.ozlabs.org References: <20200902042945.129369-1-ravi.bangoria@linux.ibm.com> <20200902042945.129369-9-ravi.bangoria@linux.ibm.com> From: Rogerio Alves Message-ID: <05c1b4a3-a0e7-6fcb-171b-1a2e8a99f21d@linux.ibm.com> Date: Thu, 17 Sep 2020 10:26:20 -0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200902042945.129369-9-ravi.bangoria@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235,18.0.687 definitions=2020-09-17_09:2020-09-16,2020-09-17 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 adultscore=0 priorityscore=1501 phishscore=0 mlxlogscore=999 impostorscore=0 spamscore=0 mlxscore=0 suspectscore=0 malwarescore=0 bulkscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2009170098 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/2/20 1:29 AM, Ravi Bangoria wrote: > Introduce tests to cover simple scenarios where user is watching > memory which can be accessed by kernel as well. We also support > _MODE_EXACT with _SETHWDEBUG interface. Move those testcases out- > side of _BP_RANGE condition. This will help to test _MODE_EXACT > scenarios when CONFIG_HAVE_HW_BREAKPOINT is not set, eg: > > $ ./ptrace-hwbreak > ... > PTRACE_SET_DEBUGREG, Kernel Access Userspace, len: 8: Ok > PPC_PTRACE_SETHWDEBUG, MODE_EXACT, WO, len: 1: Ok > PPC_PTRACE_SETHWDEBUG, MODE_EXACT, RO, len: 1: Ok > PPC_PTRACE_SETHWDEBUG, MODE_EXACT, RW, len: 1: Ok > PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace, len: 1: Ok > success: ptrace-hwbreak > > Suggested-by: Pedro Miraglia Franco de Carvalho > Signed-off-by: Ravi Bangoria Tested-by: Rogerio Alves > --- > .../selftests/powerpc/ptrace/ptrace-hwbreak.c | 48 ++++++++++++++++++- > 1 file changed, 46 insertions(+), 2 deletions(-) > > diff --git a/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c b/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c > index fc477dfe86a2..2e0d86e0687e 100644 > --- a/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c > +++ b/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c > @@ -20,6 +20,8 @@ > #include > #include > #include > +#include > +#include > #include "ptrace.h" > > #define SPRN_PVR 0x11F > @@ -44,6 +46,7 @@ struct gstruct { > }; > static volatile struct gstruct gstruct __attribute__((aligned(512))); > > +static volatile char cwd[PATH_MAX] __attribute__((aligned(8))); > > static void get_dbginfo(pid_t child_pid, struct ppc_debug_info *dbginfo) > { > @@ -138,6 +141,9 @@ static void test_workload(void) > write_var(len); > } > > + /* PTRACE_SET_DEBUGREG, Kernel Access Userspace test */ > + syscall(__NR_getcwd, &cwd, PATH_MAX); > + > /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, WO test */ > write_var(1); > > @@ -150,6 +156,9 @@ static void test_workload(void) > else > read_var(1); > > + /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace test */ > + syscall(__NR_getcwd, &cwd, PATH_MAX); > + > /* PPC_PTRACE_SETHWDEBUG, MODE_RANGE, DW ALIGNED, WO test */ > gstruct.a[rand() % A_LEN] = 'a'; > > @@ -293,6 +302,24 @@ static int test_set_debugreg(pid_t child_pid) > return 0; > } > > +static int test_set_debugreg_kernel_userspace(pid_t child_pid) > +{ > + unsigned long wp_addr = (unsigned long)cwd; > + char *name = "PTRACE_SET_DEBUGREG"; > + > + /* PTRACE_SET_DEBUGREG, Kernel Access Userspace test */ > + wp_addr &= ~0x7UL; > + wp_addr |= (1Ul << DABR_READ_SHIFT); > + wp_addr |= (1UL << DABR_WRITE_SHIFT); > + wp_addr |= (1UL << DABR_TRANSLATION_SHIFT); > + ptrace_set_debugreg(child_pid, wp_addr); > + ptrace(PTRACE_CONT, child_pid, NULL, 0); > + check_success(child_pid, name, "Kernel Access Userspace", wp_addr, 8); > + > + ptrace_set_debugreg(child_pid, 0); > + return 0; > +} > + > static void get_ppc_hw_breakpoint(struct ppc_hw_breakpoint *info, int type, > unsigned long addr, int len) > { > @@ -338,6 +365,22 @@ static void test_sethwdebug_exact(pid_t child_pid) > ptrace_delhwdebug(child_pid, wh); > } > > +static void test_sethwdebug_exact_kernel_userspace(pid_t child_pid) > +{ > + struct ppc_hw_breakpoint info; > + unsigned long wp_addr = (unsigned long)&cwd; > + char *name = "PPC_PTRACE_SETHWDEBUG, MODE_EXACT"; > + int len = 1; /* hardcoded in kernel */ > + int wh; > + > + /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace test */ > + get_ppc_hw_breakpoint(&info, PPC_BREAKPOINT_TRIGGER_WRITE, wp_addr, 0); > + wh = ptrace_sethwdebug(child_pid, &info); > + ptrace(PTRACE_CONT, child_pid, NULL, 0); > + check_success(child_pid, name, "Kernel Access Userspace", wp_addr, len); > + ptrace_delhwdebug(child_pid, wh); > +} > + > static void test_sethwdebug_range_aligned(pid_t child_pid) > { > struct ppc_hw_breakpoint info; > @@ -452,9 +495,10 @@ static void > run_tests(pid_t child_pid, struct ppc_debug_info *dbginfo, bool dawr) > { > test_set_debugreg(child_pid); > + test_set_debugreg_kernel_userspace(child_pid); > + test_sethwdebug_exact(child_pid); > + test_sethwdebug_exact_kernel_userspace(child_pid); > if (dbginfo->features & PPC_DEBUG_FEATURE_DATA_BP_RANGE) { > - test_sethwdebug_exact(child_pid); > - > test_sethwdebug_range_aligned(child_pid); > if (dawr || is_8xx) { > test_sethwdebug_range_unaligned(child_pid); >