Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp903766rwl; Thu, 5 Jan 2023 06:14:56 -0800 (PST) X-Google-Smtp-Source: AMrXdXs2dwoM8arj5F0ksfS10CwSyqjgCxsUwH0/L9pFBE1lfhQ8yFuwBCrqTiHNmRk/mFlCA5PV X-Received: by 2002:a17:902:d486:b0:186:60c0:9f9e with SMTP id c6-20020a170902d48600b0018660c09f9emr79503399plg.39.1672928095954; Thu, 05 Jan 2023 06:14:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672928095; cv=none; d=google.com; s=arc-20160816; b=jMIFk1nERVqtToff+EhCwJKSsQbvqzi51H4KdREeQCRBSE7G7UBkmRnGSG3b4VwK+k yIaVBa2ECD8L+x25JFil8Go5RklrWmVT2MOt8IXx0xeTXnfDWg91+bRQn6JHMC7LziL/ 9cqRUjbbd2ulKBL073au7qa+Pvvpc/SJEo4K3voFGXh45hlGv68kpm9kSI3TStuOFR79 pd1Os1mphT1zLvbCoxmxJZk/7eSnNI0bjEm15QmySEKdCV9JgbDKjGnn3dy0xdgk/NgK NHN/c6CdJOGUa8SmsqmHSW0UME98duPqdzv+TIgeZya0/YXbZWWRIF2h60/xEGcTWI5t 0Tcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=02BWyOL2TUep7gsYQ4484yudRH5Zbr8nA2ieE4KoqzQ=; b=OP+SRbv457x9+mJTYq9hZt3ozdwLWg8S/DmvCxTgKtNlCPETpaFVJRsMCBbfeAIYVa oC+B4jLIngR/S+yANlWwINWLg5GeEVWBlHZWJwtLYv+Kr+tCN04k7jwOCdvFY32xPGZ0 TLbnj1OUXA6NzdngpE8qaYbNqVEnJD6+HllEOxPlaz30KMYz+vhKsLDBi68fzDM2bRg7 rkb7336typBMLidWATifSduy5SswYfFr96yC31ll0ehg7It6RISibJw3HvJgCJj830VB l9U+7Hv/dcDigdvQS9Qb3S8lfeIj9qkWxi6AiVUDyaZFNa790Gd99B8O1enP98AhWXej i6fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fyMcZw0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n18-20020a170903111200b00186a394aed8si39065688plh.147.2023.01.05.06.14.43; Thu, 05 Jan 2023 06:14:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fyMcZw0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233571AbjAENms (ORCPT + 58 others); Thu, 5 Jan 2023 08:42:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58342 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231710AbjAENmp (ORCPT ); Thu, 5 Jan 2023 08:42:45 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CBEEB32E98; Thu, 5 Jan 2023 05:42:44 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 682B561A51; Thu, 5 Jan 2023 13:42:44 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4F8E7C433EF; Thu, 5 Jan 2023 13:42:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1672926163; bh=WCsf7zNWTsY5rzmNTg49RZ9NN7AfHsfscrxnvj1ve2c=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fyMcZw0N2f3qCyF37HHD+GWeKIYKOIy0KFGZJmK48Ssm5OfRvMHrAdh2JVOhi6JVz JVuK0Q92l/hidrl1dXZtBMD6mVVOjqSLhCEqngi1F03HvLkk7RrgXUvFLdjGnlQd+K MT+AZCaqJk48fpqHbCIM6w2QJhOt/VTzFLBuIo6k= Date: Thu, 5 Jan 2023 14:42:40 +0100 From: Greg KH To: Aaron Lu Cc: Dave Hansen , Pavel Boldin , Pavel Boldin , "Raphael S. Carvalho" , Moritz Lipp , Daniel Gruss , Michael Schwarz , linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] selftest/x86/meltdown: Add a selftest for meltdown Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 05, 2023 at 08:35:05PM +0800, Aaron Lu wrote: > To capture potential programming errors like mistakenly setting Global > bit on kernel page table entries, a selftest for meltdown is added. > > This selftest is based on Pavel Boldin's work at: > https://github.com/linux-test-project/ltp/blob/master/testcases/cve/meltdown.c > > In addition to the existing test of reading kernel variable > saved_command_line from user space, one more test of reading user local > variable through kernel direct map address is added. For the existing > test(reading saved_command_line) to report a failure, both the high kernel > mapping and low kernel mapping have to be in leaked state; For the added > test(read local var), only low kernel mapping leak is enough to trigger > a test fail, so both tests are useful. > > Test results of 10 runs: > > On v6.1-rc8 with nopti kernel cmdline option: > > host test_out_rate_1 test_out_rate_2 > lkp-bdw-de1 50% 100% > lkp-hsw-d01 70% 100% > lkp-hsw-d02 0% 80% > lkp-hsw-d03 60% 100% > lkp-hsw-d04 20% 100% > lkp-hsw-d05 60% 100% > lkp-ivb-d01 0% 70% > lkp-kbl-d01 100% 100% > lkp-skl-d02 100% 90% > lkp-skl-d03 90% 100% > lkp-skl-d05 60% 100% > kbl-vm 100% 80% > 2 other machines have 0% rate for both tests. > > bdw=broadwell, hsw=haswell, ivb=ivybridge, etc. > > test_out_rate_1: test reports fail rate for the test of reading > saved_command_line from user space; > test_out_rate_2: test reports fail rate for the test of reading user > local variable through kernel direct map address in user space. > > On v5.19 without nopti cmdline option: > host test_out_rate_2 > lkp-bdw-de1 80% > lkp-hsw-4ex1 50% > lkp-hsw-d01 30% > lkp-hsw-d03 10% > lkp-hsw-d04 10% > lkp-kbl-d01 10% > kbl-vm 80% > 7 other machines have 0% rate for test2. > > Also tested on an i386 VM with 512M memory and the test out rate is 100% > when adding nopti to kernel cmdline with v6.1-rc8. > > Main changes I made from Pavel Boldin's meltdown test are: > - Replace rdtscll() and clflush() with kernel's implementation; > - Reimplement find_symbol_in_file() to avoid bringing in LTP's library > functions; > - Coding style changes: placing the function return type in the same > line of the function. > > Signed-off-by: Aaron Lu > --- > Notable changes from RFC v3: > - Drop RFC tag; > - Change the base code from zlib licensed one to GPL licensed one. Sorry, but this still gets my NAK for the issues raised in previous reviews that are not addressed here for some reason :( greg k-h