Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp4350142pxb; Tue, 10 Nov 2020 14:17:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJyrqD16DDtFsNz/Crl20nrS3AIMvrepBZbB0vFpSR//LQWaUPdhBMVMIMGH/XNCK4cCS4fZ X-Received: by 2002:a50:c40d:: with SMTP id v13mr7437731edf.1.1605046677753; Tue, 10 Nov 2020 14:17:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605046677; cv=none; d=google.com; s=arc-20160816; b=SBYDNohxmQSDQdMvgN2ISUcrAWrGw2j+JTRmVXtEgZuqydxvTzkbbULiuZ1cFBELzc /o9SHq1wZII/8l1nQfmEv6fQN73L7OVbFXhSYLuzAVf3u2pUV3l5nsn0Xf83cOyM2/QR xzKqnoZvSsCdJ/m4hZCGcEtg03h2EYxcQqZnFKzND6iGLRPORRDkuFm4j1d+fcLdQz3S cxmQBmelVGCpXyWyWhC23U6SYRwOJ5g7+gIf6rVOorgRXkgDElDCck5Y6lT+sa+S6W1z srkvJZd6lOjIyO8rPYuHJO2M1FxgJ0k8OUs8EYy6NEmqndPZQcUnadnBDAn9fsGXLbpQ PkvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:sender:dkim-signature; bh=gElbIAirXSeZEu+ZxUvh6N5W/Nh8clkwQRgJHSlXRug=; b=n6OG3Du9KlOmoBDK0C7G8DmNDvGJvEf27XcENeNBLNWHCUvBynlCqsnLTJLLcxFyVI EqlmCf8XGLMyRixrIT4BEYYhnQA/S+5W2WWv/URxDqYrXspVvACaZkr/l9gAlEubVPYk 51sFT5VJFXHlT9AOkxdnKPjuS5y/ofNWHy9KEc+4NEycJ2Fr/XXomd1ZNKNxBQzq6Zty ZCh4Z9c1M7jMsAVHOu45g6m6qKN9K7h2ykIEfSXze/qUYwoHXBFq/S/JU2lsOzRJ0YIs +kJZC6HQdZQr6N1sN039yyFOFA3PNQeMYLyYJPpD4MOsrqjaGI0S7WU0SCqvtpeX9tKM 0N7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=sn0Rmbep; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i12si53552edr.244.2020.11.10.14.17.28; Tue, 10 Nov 2020 14:17:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=sn0Rmbep; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730894AbgKJWM5 (ORCPT + 99 others); Tue, 10 Nov 2020 17:12:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48636 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733051AbgKJWMz (ORCPT ); Tue, 10 Nov 2020 17:12:55 -0500 Received: from mail-wm1-x34a.google.com (mail-wm1-x34a.google.com [IPv6:2a00:1450:4864:20::34a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 93DF7C0613D1 for ; Tue, 10 Nov 2020 14:12:53 -0800 (PST) Received: by mail-wm1-x34a.google.com with SMTP id z62so1669213wmb.1 for ; Tue, 10 Nov 2020 14:12:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:in-reply-to:message-id:mime-version:references:subject :from:to:cc; bh=gElbIAirXSeZEu+ZxUvh6N5W/Nh8clkwQRgJHSlXRug=; b=sn0RmbepjOdoD/GNs2otWI2t/10RzM8DrRj2gzOwFn5x8lfx/VAc+H1IbcZuHEaGZM ffyPIShyj/5GlQOPi+ya+ePlMqfyRXXzlg0A/YhlVLw/Ba/GHL7ObCgvZeUOhyZawTH5 qkyj5NX674SxfgWBwaALTN7mEGgcji1qFXipNlaK4QbYlIereSjpfTjrpUfk3Ga7lV1L UraVWCDYykR337WyGkaYRWfTV1KS+Hnt6xP2LYnhYx5ygpRen5U7rCu1I5iDlmS5OLHh 5pvMYf+3MlAcw/IueDCCQ+JxD8gNvIx6lPggbmlhuqEvUNrkzKnQhLnRF3maMEkLRhpd KK3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=gElbIAirXSeZEu+ZxUvh6N5W/Nh8clkwQRgJHSlXRug=; b=XsrTZg8xZ8gp2o08BJbRvQKXMmd5R87wqPAB5QQc6kEM8oGDg8HNqYrGe3EPZMu/Ye YeXoOifDISfTO8bQ9rYS5BqXhspGWq/PHU7oeoR5YUWYPRwmuvpy7nC9rEM1/5V37l7M Nscx1Z1zm6h10RGCS20Q/F6tdLA2cWbmOoyOcJlW+BO29rxlO9REkvbcVHusici3kBvn jAS44OBlhHVpPzHxYgO9q/uaiY3vrpzifAIhFIqaq9rEJVpeeYJrpvgpFOzRl/OXhKCQ e94D0KoU1PaWpkgxzVYBEjSbdOoiZ3AnMyUZLE935WjCDYRfAUdavSMCwbH3/gMfBMg5 vmSw== X-Gm-Message-State: AOAM532/nBCEoIAuqDKdx99FUB6Mmb6L+i37f7zbJ8hGsu5qQpg7TF0U aSTg8BfwQFyGRm7EzhaJOqxpbWGnVVOP7jed Sender: "andreyknvl via sendgmr" X-Received: from andreyknvl3.muc.corp.google.com ([2a00:79e0:15:13:7220:84ff:fe09:7e9d]) (user=andreyknvl job=sendgmr) by 2002:a7b:c1d2:: with SMTP id a18mr251913wmj.41.1605046372211; Tue, 10 Nov 2020 14:12:52 -0800 (PST) Date: Tue, 10 Nov 2020 23:10:41 +0100 In-Reply-To: Message-Id: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.29.2.222.g5d2a92d10f8-goog Subject: [PATCH v9 44/44] kselftest/arm64: Check GCR_EL1 after context switch From: Andrey Konovalov To: Catalin Marinas Cc: Will Deacon , Vincenzo Frascino , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , Andrew Morton , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vincenzo Frascino This test is specific to MTE and verifies that the GCR_EL1 register is context switched correctly. It spawn 1024 processes and each process spawns 5 threads. Each thread writes a random setting of GCR_EL1 through the prctl() system call and reads it back verifying that it is the same. If the values are not the same it reports a failure. Note: The test has been extended to verify that even SYNC and ASYNC mode setting is preserved correctly over context switching. Signed-off-by: Vincenzo Frascino Signed-off-by: Andrey Konovalov --- Change-Id: Ia917684a2b8e5f29e705ca5cbf360b010df6f61e --- tools/testing/selftests/arm64/mte/Makefile | 2 +- .../arm64/mte/check_gcr_el1_cswitch.c | 152 ++++++++++++++++++ 2 files changed, 153 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/arm64/mte/check_gcr_el1_cswitch.c diff --git a/tools/testing/selftests/arm64/mte/Makefile b/tools/testing/selftests/arm64/mte/Makefile index 2480226dfe57..0b3af552632a 100644 --- a/tools/testing/selftests/arm64/mte/Makefile +++ b/tools/testing/selftests/arm64/mte/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 # Copyright (C) 2020 ARM Limited -CFLAGS += -std=gnu99 -I. +CFLAGS += -std=gnu99 -I. -lpthread SRCS := $(filter-out mte_common_util.c,$(wildcard *.c)) PROGS := $(patsubst %.c,%,$(SRCS)) diff --git a/tools/testing/selftests/arm64/mte/check_gcr_el1_cswitch.c b/tools/testing/selftests/arm64/mte/check_gcr_el1_cswitch.c new file mode 100644 index 000000000000..55e33d96794c --- /dev/null +++ b/tools/testing/selftests/arm64/mte/check_gcr_el1_cswitch.c @@ -0,0 +1,152 @@ +// SPDX-License-Identifier: GPL-2.0 +// Copyright (C) 2020 ARM Limited + +#define _GNU_SOURCE + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "kselftest.h" +#include "mte_common_util.h" + +#define PR_SET_TAGGED_ADDR_CTRL 55 +#define PR_GET_TAGGED_ADDR_CTRL 56 +# define PR_TAGGED_ADDR_ENABLE (1UL << 0) +# define PR_MTE_TCF_SHIFT 1 +# define PR_MTE_TCF_NONE (0UL << PR_MTE_TCF_SHIFT) +# define PR_MTE_TCF_SYNC (1UL << PR_MTE_TCF_SHIFT) +# define PR_MTE_TCF_ASYNC (2UL << PR_MTE_TCF_SHIFT) +# define PR_MTE_TCF_MASK (3UL << PR_MTE_TCF_SHIFT) +# define PR_MTE_TAG_SHIFT 3 +# define PR_MTE_TAG_MASK (0xffffUL << PR_MTE_TAG_SHIFT) + +#include "mte_def.h" + +#define NUM_ITERATIONS 1024 +#define MAX_THREADS 5 +#define THREAD_ITERATIONS 1000 + +void *execute_thread(void *x) +{ + pid_t pid = *((pid_t *)x); + pid_t tid = gettid(); + uint64_t prctl_tag_mask; + uint64_t prctl_set; + uint64_t prctl_get; + uint64_t prctl_tcf; + + srand(time(NULL) ^ (pid << 16) ^ (tid << 16)); + + prctl_tag_mask = rand() % 0xffff; + + if (prctl_tag_mask % 2) + prctl_tcf = PR_MTE_TCF_SYNC; + else + prctl_tcf = PR_MTE_TCF_ASYNC; + + prctl_set = PR_TAGGED_ADDR_ENABLE | prctl_tcf | (prctl_tag_mask << PR_MTE_TAG_SHIFT); + + for (int j = 0; j < THREAD_ITERATIONS; j++) { + if (prctl(PR_SET_TAGGED_ADDR_CTRL, prctl_set, 0, 0, 0)) { + perror("prctl() failed"); + goto fail; + } + + prctl_get = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); + + if (prctl_set != prctl_get) { + ksft_print_msg("Error: prctl_set: 0x%lx != prctl_get: 0x%lx\n", + prctl_set, prctl_get); + goto fail; + } + } + + return (void *)KSFT_PASS; + +fail: + return (void *)KSFT_FAIL; +} + +int execute_test(pid_t pid) +{ + pthread_t thread_id[MAX_THREADS]; + int thread_data[MAX_THREADS]; + + for (int i = 0; i < MAX_THREADS; i++) + pthread_create(&thread_id[i], NULL, + execute_thread, (void *)&pid); + + for (int i = 0; i < MAX_THREADS; i++) + pthread_join(thread_id[i], (void *)&thread_data[i]); + + for (int i = 0; i < MAX_THREADS; i++) + if (thread_data[i] == KSFT_FAIL) + return KSFT_FAIL; + + return KSFT_PASS; +} + +int mte_gcr_fork_test() +{ + pid_t pid[NUM_ITERATIONS]; + int results[NUM_ITERATIONS]; + pid_t cpid; + int res; + + for (int i = 0; i < NUM_ITERATIONS; i++) { + pid[i] = fork(); + + if (pid[i] == 0) { + cpid = getpid(); + + res = execute_test(cpid); + + exit(res); + } + } + + for (int i = 0; i < NUM_ITERATIONS; i++) { + wait(&res); + + if(WIFEXITED(res)) + results[i] = WEXITSTATUS(res); + else + --i; + } + + for (int i = 0; i < NUM_ITERATIONS; i++) + if (results[i] == KSFT_FAIL) + return KSFT_FAIL; + + return KSFT_PASS; +} + +int main(int argc, char *argv[]) +{ + int err; + + err = mte_default_setup(); + if (err) + return err; + + ksft_set_plan(1); + + evaluate_test(mte_gcr_fork_test(), + "Verify that GCR_EL1 is set correctly on context switch\n"); + + mte_restore_setup(); + ksft_print_cnts(); + + return ksft_get_fail_cnt() == 0 ? KSFT_PASS : KSFT_FAIL; +} + -- 2.29.2.222.g5d2a92d10f8-goog