Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Weihong Zhang | 4855 | 93.65% | 5 | 71.43% |
Kirill A. Shutemov | 321 | 6.19% | 1 | 14.29% |
Binbin Wu | 8 | 0.15% | 1 | 14.29% |
Total | 5184 | 7 |
// SPDX-License-Identifier: GPL-2.0 #define _GNU_SOURCE #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/syscall.h> #include <time.h> #include <signal.h> #include <setjmp.h> #include <sys/mman.h> #include <sys/utsname.h> #include <sys/wait.h> #include <sys/stat.h> #include <fcntl.h> #include <inttypes.h> #include <sched.h> #include <sys/uio.h> #include <linux/io_uring.h> #include "../kselftest.h" #ifndef __x86_64__ # error This test is 64-bit only #endif /* LAM modes, these definitions were copied from kernel code */ #define LAM_NONE 0 #define LAM_U57_BITS 6 #define LAM_U57_MASK (0x3fULL << 57) /* arch prctl for LAM */ #define ARCH_GET_UNTAG_MASK 0x4001 #define ARCH_ENABLE_TAGGED_ADDR 0x4002 #define ARCH_GET_MAX_TAG_BITS 0x4003 #define ARCH_FORCE_TAGGED_SVA 0x4004 /* Specified test function bits */ #define FUNC_MALLOC 0x1 #define FUNC_BITS 0x2 #define FUNC_MMAP 0x4 #define FUNC_SYSCALL 0x8 #define FUNC_URING 0x10 #define FUNC_INHERITE 0x20 #define FUNC_PASID 0x40 #define TEST_MASK 0x7f #define LOW_ADDR (0x1UL << 30) #define HIGH_ADDR (0x3UL << 48) #define MALLOC_LEN 32 #define PAGE_SIZE (4 << 10) #define STACK_SIZE 65536 #define barrier() ({ \ __asm__ __volatile__("" : : : "memory"); \ }) #define URING_QUEUE_SZ 1 #define URING_BLOCK_SZ 2048 /* Pasid test define */ #define LAM_CMD_BIT 0x1 #define PAS_CMD_BIT 0x2 #define SVA_CMD_BIT 0x4 #define PAS_CMD(cmd1, cmd2, cmd3) (((cmd3) << 8) | ((cmd2) << 4) | ((cmd1) << 0)) struct testcases { unsigned int later; int expected; /* 2: SIGSEGV Error; 1: other errors */ unsigned long lam; uint64_t addr; uint64_t cmd; int (*test_func)(struct testcases *test); const char *msg; }; /* Used by CQ of uring, source file handler and file's size */ struct file_io { int file_fd; off_t file_sz; struct iovec iovecs[]; }; struct io_uring_queue { unsigned int *head; unsigned int *tail; unsigned int *ring_mask; unsigned int *ring_entries; unsigned int *flags; unsigned int *array; union { struct io_uring_cqe *cqes; struct io_uring_sqe *sqes; } queue; size_t ring_sz; }; struct io_ring { int ring_fd; struct io_uring_queue sq_ring; struct io_uring_queue cq_ring; }; int tests_cnt; jmp_buf segv_env; static void segv_handler(int sig) { ksft_print_msg("Get segmentation fault(%d).", sig); siglongjmp(segv_env, 1); } static inline int cpu_has_lam(void) { unsigned int cpuinfo[4]; __cpuid_count(0x7, 1, cpuinfo[0], cpuinfo[1], cpuinfo[2], cpuinfo[3]); return (cpuinfo[0] & (1 << 26)); } /* Check 5-level page table feature in CPUID.(EAX=07H, ECX=00H):ECX.[bit 16] */ static inline int cpu_has_la57(void) { unsigned int cpuinfo[4]; __cpuid_count(0x7, 0, cpuinfo[0], cpuinfo[1], cpuinfo[2], cpuinfo[3]); return (cpuinfo[2] & (1 << 16)); } /* * Set tagged address and read back untag mask. * check if the untagged mask is expected. * * @return: * 0: Set LAM mode successfully * others: failed to set LAM */ static int set_lam(unsigned long lam) { int ret = 0; uint64_t ptr = 0; if (lam != LAM_U57_BITS && lam != LAM_NONE) return -1; /* Skip check return */ syscall(SYS_arch_prctl, ARCH_ENABLE_TAGGED_ADDR, lam); /* Get untagged mask */ syscall(SYS_arch_prctl, ARCH_GET_UNTAG_MASK, &ptr); /* Check mask returned is expected */ if (lam == LAM_U57_BITS) ret = (ptr != ~(LAM_U57_MASK)); else if (lam == LAM_NONE) ret = (ptr != -1ULL); return ret; } static unsigned long get_default_tag_bits(void) { pid_t pid; int lam = LAM_NONE; int ret = 0; pid = fork(); if (pid < 0) { perror("Fork failed."); } else if (pid == 0) { /* Set LAM mode in child process */ if (set_lam(LAM_U57_BITS) == 0) lam = LAM_U57_BITS; else lam = LAM_NONE; exit(lam); } else { wait(&ret); lam = WEXITSTATUS(ret); } return lam; } /* * Set tagged address and read back untag mask. * check if the untag mask is expected. */ static int get_lam(void) { uint64_t ptr = 0; int ret = -1; /* Get untagged mask */ if (syscall(SYS_arch_prctl, ARCH_GET_UNTAG_MASK, &ptr) == -1) return -1; /* Check mask returned is expected */ if (ptr == ~(LAM_U57_MASK)) ret = LAM_U57_BITS; else if (ptr == -1ULL) ret = LAM_NONE; return ret; } /* According to LAM mode, set metadata in high bits */ static uint64_t set_metadata(uint64_t src, unsigned long lam) { uint64_t metadata; srand(time(NULL)); switch (lam) { case LAM_U57_BITS: /* Set metadata in bits 62:57 */ /* Get a random non-zero value as metadata */ metadata = (rand() % ((1UL << LAM_U57_BITS) - 1) + 1) << 57; metadata |= (src & ~(LAM_U57_MASK)); break; default: metadata = src; break; } return metadata; } /* * Set metadata in user pointer, compare new pointer with original pointer. * both pointers should point to the same address. * * @return: * 0: value on the pointer with metadate and value on original are same * 1: not same. */ static int handle_lam_test(void *src, unsigned int lam) { char *ptr; strcpy((char *)src, "USER POINTER"); ptr = (char *)set_metadata((uint64_t)src, lam); if (src == ptr) return 0; /* Copy a string into the pointer with metadata */ strcpy((char *)ptr, "METADATA POINTER"); return (!!strcmp((char *)src, (char *)ptr)); } int handle_max_bits(struct testcases *test) { unsigned long exp_bits = get_default_tag_bits(); unsigned long bits = 0; if (exp_bits != LAM_NONE) exp_bits = LAM_U57_BITS; /* Get LAM max tag bits */ if (syscall(SYS_arch_prctl, ARCH_GET_MAX_TAG_BITS, &bits) == -1) return 1; return (exp_bits != bits); } /* * Test lam feature through dereference pointer get from malloc. * @return 0: Pass test. 1: Get failure during test 2: Get SIGSEGV */ static int handle_malloc(struct testcases *test) { char *ptr = NULL; int ret = 0; if (test->later == 0 && test->lam != 0) if (set_lam(test->lam) == -1) return 1; ptr = (char *)malloc(MALLOC_LEN); if (ptr == NULL) { perror("malloc() failure\n"); return 1; } /* Set signal handler */ if (sigsetjmp(segv_env, 1) == 0) { signal(SIGSEGV, segv_handler); ret = handle_lam_test(ptr, test->lam); } else { ret = 2; } if (test->later != 0 && test->lam != 0) if (set_lam(test->lam) == -1 && ret == 0) ret = 1; free(ptr); return ret; } static int handle_mmap(struct testcases *test) { void *ptr; unsigned int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED; int ret = 0; if (test->later == 0 && test->lam != 0) if (set_lam(test->lam) != 0) return 1; ptr = mmap((void *)test->addr, PAGE_SIZE, PROT_READ | PROT_WRITE, flags, -1, 0); if (ptr == MAP_FAILED) { if (test->addr == HIGH_ADDR) if (!cpu_has_la57()) return 3; /* unsupport LA57 */ return 1; } if (test->later != 0 && test->lam != 0) if (set_lam(test->lam) != 0) ret = 1; if (ret == 0) { if (sigsetjmp(segv_env, 1) == 0) { signal(SIGSEGV, segv_handler); ret = handle_lam_test(ptr, test->lam); } else { ret = 2; } } munmap(ptr, PAGE_SIZE); return ret; } static int handle_syscall(struct testcases *test) { struct utsname unme, *pu; int ret = 0; if (test->later == 0 && test->lam != 0) if (set_lam(test->lam) != 0) return 1; if (sigsetjmp(segv_env, 1) == 0) { signal(SIGSEGV, segv_handler); pu = (struct utsname *)set_metadata((uint64_t)&unme, test->lam); ret = uname(pu); if (ret < 0) ret = 1; } else { ret = 2; } if (test->later != 0 && test->lam != 0) if (set_lam(test->lam) != -1 && ret == 0) ret = 1; return ret; } int sys_uring_setup(unsigned int entries, struct io_uring_params *p) { return (int)syscall(__NR_io_uring_setup, entries, p); } int sys_uring_enter(int fd, unsigned int to, unsigned int min, unsigned int flags) { return (int)syscall(__NR_io_uring_enter, fd, to, min, flags, NULL, 0); } /* Init submission queue and completion queue */ int mmap_io_uring(struct io_uring_params p, struct io_ring *s) { struct io_uring_queue *sring = &s->sq_ring; struct io_uring_queue *cring = &s->cq_ring; sring->ring_sz = p.sq_off.array + p.sq_entries * sizeof(unsigned int); cring->ring_sz = p.cq_off.cqes + p.cq_entries * sizeof(struct io_uring_cqe); if (p.features & IORING_FEAT_SINGLE_MMAP) { if (cring->ring_sz > sring->ring_sz) sring->ring_sz = cring->ring_sz; cring->ring_sz = sring->ring_sz; } void *sq_ptr = mmap(0, sring->ring_sz, PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, s->ring_fd, IORING_OFF_SQ_RING); if (sq_ptr == MAP_FAILED) { perror("sub-queue!"); return 1; } void *cq_ptr = sq_ptr; if (!(p.features & IORING_FEAT_SINGLE_MMAP)) { cq_ptr = mmap(0, cring->ring_sz, PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, s->ring_fd, IORING_OFF_CQ_RING); if (cq_ptr == MAP_FAILED) { perror("cpl-queue!"); munmap(sq_ptr, sring->ring_sz); return 1; } } sring->head = sq_ptr + p.sq_off.head; sring->tail = sq_ptr + p.sq_off.tail; sring->ring_mask = sq_ptr + p.sq_off.ring_mask; sring->ring_entries = sq_ptr + p.sq_off.ring_entries; sring->flags = sq_ptr + p.sq_off.flags; sring->array = sq_ptr + p.sq_off.array; /* Map a queue as mem map */ s->sq_ring.queue.sqes = mmap(0, p.sq_entries * sizeof(struct io_uring_sqe), PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, s->ring_fd, IORING_OFF_SQES); if (s->sq_ring.queue.sqes == MAP_FAILED) { munmap(sq_ptr, sring->ring_sz); if (sq_ptr != cq_ptr) { ksft_print_msg("failed to mmap uring queue!"); munmap(cq_ptr, cring->ring_sz); return 1; } } cring->head = cq_ptr + p.cq_off.head; cring->tail = cq_ptr + p.cq_off.tail; cring->ring_mask = cq_ptr + p.cq_off.ring_mask; cring->ring_entries = cq_ptr + p.cq_off.ring_entries; cring->queue.cqes = cq_ptr + p.cq_off.cqes; return 0; } /* Init io_uring queues */ int setup_io_uring(struct io_ring *s) { struct io_uring_params para; memset(¶, 0, sizeof(para)); s->ring_fd = sys_uring_setup(URING_QUEUE_SZ, ¶); if (s->ring_fd < 0) return 1; return mmap_io_uring(para, s); } /* * Get data from completion queue. the data buffer saved the file data * return 0: success; others: error; */ int handle_uring_cq(struct io_ring *s) { struct file_io *fi = NULL; struct io_uring_queue *cring = &s->cq_ring; struct io_uring_cqe *cqe; unsigned int head; off_t len = 0; head = *cring->head; do { barrier(); if (head == *cring->tail) break; /* Get the entry */ cqe = &cring->queue.cqes[head & *s->cq_ring.ring_mask]; fi = (struct file_io *)cqe->user_data; if (cqe->res < 0) break; int blocks = (int)(fi->file_sz + URING_BLOCK_SZ - 1) / URING_BLOCK_SZ; for (int i = 0; i < blocks; i++) len += fi->iovecs[i].iov_len; head++; } while (1); *cring->head = head; barrier(); return (len != fi->file_sz); } /* * Submit squeue. specify via IORING_OP_READV. * the buffer need to be set metadata according to LAM mode */ int handle_uring_sq(struct io_ring *ring, struct file_io *fi, unsigned long lam) { int file_fd = fi->file_fd; struct io_uring_queue *sring = &ring->sq_ring; unsigned int index = 0, cur_block = 0, tail = 0, next_tail = 0; struct io_uring_sqe *sqe; off_t remain = fi->file_sz; int blocks = (int)(remain + URING_BLOCK_SZ - 1) / URING_BLOCK_SZ; while (remain) { off_t bytes = remain; void *buf; if (bytes > URING_BLOCK_SZ) bytes = URING_BLOCK_SZ; fi->iovecs[cur_block].iov_len = bytes; if (posix_memalign(&buf, URING_BLOCK_SZ, URING_BLOCK_SZ)) return 1; fi->iovecs[cur_block].iov_base = (void *)set_metadata((uint64_t)buf, lam); remain -= bytes; cur_block++; } next_tail = *sring->tail; tail = next_tail; next_tail++; barrier(); index = tail & *ring->sq_ring.ring_mask; sqe = &ring->sq_ring.queue.sqes[index]; sqe->fd = file_fd; sqe->flags = 0; sqe->opcode = IORING_OP_READV; sqe->addr = (unsigned long)fi->iovecs; sqe->len = blocks; sqe->off = 0; sqe->user_data = (uint64_t)fi; sring->array[index] = index; tail = next_tail; if (*sring->tail != tail) { *sring->tail = tail; barrier(); } if (sys_uring_enter(ring->ring_fd, 1, 1, IORING_ENTER_GETEVENTS) < 0) return 1; return 0; } /* * Test LAM in async I/O and io_uring, read current binery through io_uring * Set metadata in pointers to iovecs buffer. */ int do_uring(unsigned long lam) { struct io_ring *ring; struct file_io *fi; struct stat st; int ret = 1; char path[PATH_MAX] = {0}; /* get current process path */ if (readlink("/proc/self/exe", path, PATH_MAX - 1) <= 0) return 1; int file_fd = open(path, O_RDONLY); if (file_fd < 0) return 1; if (fstat(file_fd, &st) < 0) return 1; off_t file_sz = st.st_size; int blocks = (int)(file_sz + URING_BLOCK_SZ - 1) / URING_BLOCK_SZ; fi = malloc(sizeof(*fi) + sizeof(struct iovec) * blocks); if (!fi) return 1; fi->file_sz = file_sz; fi->file_fd = file_fd; ring = malloc(sizeof(*ring)); if (!ring) return 1; memset(ring, 0, sizeof(struct io_ring)); if (setup_io_uring(ring)) goto out; if (handle_uring_sq(ring, fi, lam)) goto out; ret = handle_uring_cq(ring); out: free(ring); for (int i = 0; i < blocks; i++) { if (fi->iovecs[i].iov_base) { uint64_t addr = ((uint64_t)fi->iovecs[i].iov_base); switch (lam) { case LAM_U57_BITS: /* Clear bits 62:57 */ addr = (addr & ~(LAM_U57_MASK)); break; } free((void *)addr); fi->iovecs[i].iov_base = NULL; } } free(fi); return ret; } int handle_uring(struct testcases *test) { int ret = 0; if (test->later == 0 && test->lam != 0) if (set_lam(test->lam) != 0) return 1; if (sigsetjmp(segv_env, 1) == 0) { signal(SIGSEGV, segv_handler); ret = do_uring(test->lam); } else { ret = 2; } return ret; } static int fork_test(struct testcases *test) { int ret, child_ret; pid_t pid; pid = fork(); if (pid < 0) { perror("Fork failed."); ret = 1; } else if (pid == 0) { ret = test->test_func(test); exit(ret); } else { wait(&child_ret); ret = WEXITSTATUS(child_ret); } return ret; } static int handle_execve(struct testcases *test) { int ret, child_ret; int lam = test->lam; pid_t pid; pid = fork(); if (pid < 0) { perror("Fork failed."); ret = 1; } else if (pid == 0) { char path[PATH_MAX] = {0}; /* Set LAM mode in parent process */ if (set_lam(lam) != 0) return 1; /* Get current binary's path and the binary was run by execve */ if (readlink("/proc/self/exe", path, PATH_MAX - 1) <= 0) exit(-1); /* run binary to get LAM mode and return to parent process */ if (execlp(path, path, "-t 0x0", NULL) < 0) { perror("error on exec"); exit(-1); } } else { wait(&child_ret); ret = WEXITSTATUS(child_ret); if (ret != LAM_NONE) return 1; } return 0; } static int handle_inheritance(struct testcases *test) { int ret, child_ret; int lam = test->lam; pid_t pid; /* Set LAM mode in parent process */ if (set_lam(lam) != 0) return 1; pid = fork(); if (pid < 0) { perror("Fork failed."); return 1; } else if (pid == 0) { /* Set LAM mode in parent process */ int child_lam = get_lam(); exit(child_lam); } else { wait(&child_ret); ret = WEXITSTATUS(child_ret); if (lam != ret) return 1; } return 0; } static int thread_fn_get_lam(void *arg) { return get_lam(); } static int thread_fn_set_lam(void *arg) { struct testcases *test = arg; return set_lam(test->lam); } static int handle_thread(struct testcases *test) { char stack[STACK_SIZE]; int ret, child_ret; int lam = 0; pid_t pid; /* Set LAM mode in parent process */ if (!test->later) { lam = test->lam; if (set_lam(lam) != 0) return 1; } pid = clone(thread_fn_get_lam, stack + STACK_SIZE, SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, NULL); if (pid < 0) { perror("Clone failed."); return 1; } waitpid(pid, &child_ret, 0); ret = WEXITSTATUS(child_ret); if (lam != ret) return 1; if (test->later) { if (set_lam(test->lam) != 0) return 1; } return 0; } static int handle_thread_enable(struct testcases *test) { char stack[STACK_SIZE]; int ret, child_ret; int lam = test->lam; pid_t pid; pid = clone(thread_fn_set_lam, stack + STACK_SIZE, SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, test); if (pid < 0) { perror("Clone failed."); return 1; } waitpid(pid, &child_ret, 0); ret = WEXITSTATUS(child_ret); if (lam != ret) return 1; return 0; } static void run_test(struct testcases *test, int count) { int i, ret = 0; for (i = 0; i < count; i++) { struct testcases *t = test + i; /* fork a process to run test case */ tests_cnt++; ret = fork_test(t); /* return 3 is not support LA57, the case should be skipped */ if (ret == 3) { ksft_test_result_skip(t->msg); continue; } if (ret != 0) ret = (t->expected == ret); else ret = !(t->expected); ksft_test_result(ret, t->msg); } } static struct testcases uring_cases[] = { { .later = 0, .lam = LAM_U57_BITS, .test_func = handle_uring, .msg = "URING: LAM_U57. Dereferencing pointer with metadata\n", }, { .later = 1, .expected = 1, .lam = LAM_U57_BITS, .test_func = handle_uring, .msg = "URING:[Negative] Disable LAM. Dereferencing pointer with metadata.\n", }, }; static struct testcases malloc_cases[] = { { .later = 0, .lam = LAM_U57_BITS, .test_func = handle_malloc, .msg = "MALLOC: LAM_U57. Dereferencing pointer with metadata\n", }, { .later = 1, .expected = 2, .lam = LAM_U57_BITS, .test_func = handle_malloc, .msg = "MALLOC:[Negative] Disable LAM. Dereferencing pointer with metadata.\n", }, }; static struct testcases bits_cases[] = { { .test_func = handle_max_bits, .msg = "BITS: Check default tag bits\n", }, }; static struct testcases syscall_cases[] = { { .later = 0, .lam = LAM_U57_BITS, .test_func = handle_syscall, .msg = "SYSCALL: LAM_U57. syscall with metadata\n", }, { .later = 1, .expected = 1, .lam = LAM_U57_BITS, .test_func = handle_syscall, .msg = "SYSCALL:[Negative] Disable LAM. Dereferencing pointer with metadata.\n", }, }; static struct testcases mmap_cases[] = { { .later = 1, .expected = 0, .lam = LAM_U57_BITS, .addr = HIGH_ADDR, .test_func = handle_mmap, .msg = "MMAP: First mmap high address, then set LAM_U57.\n", }, { .later = 0, .expected = 0, .lam = LAM_U57_BITS, .addr = HIGH_ADDR, .test_func = handle_mmap, .msg = "MMAP: First LAM_U57, then High address.\n", }, { .later = 0, .expected = 0, .lam = LAM_U57_BITS, .addr = LOW_ADDR, .test_func = handle_mmap, .msg = "MMAP: First LAM_U57, then Low address.\n", }, }; static struct testcases inheritance_cases[] = { { .expected = 0, .lam = LAM_U57_BITS, .test_func = handle_inheritance, .msg = "FORK: LAM_U57, child process should get LAM mode same as parent\n", }, { .expected = 0, .lam = LAM_U57_BITS, .test_func = handle_thread, .msg = "THREAD: LAM_U57, child thread should get LAM mode same as parent\n", }, { .expected = 1, .lam = LAM_U57_BITS, .test_func = handle_thread_enable, .msg = "THREAD: [NEGATIVE] Enable LAM in child.\n", }, { .expected = 1, .later = 1, .lam = LAM_U57_BITS, .test_func = handle_thread, .msg = "THREAD: [NEGATIVE] Enable LAM in parent after thread created.\n", }, { .expected = 0, .lam = LAM_U57_BITS, .test_func = handle_execve, .msg = "EXECVE: LAM_U57, child process should get disabled LAM mode\n", }, }; static void cmd_help(void) { printf("usage: lam [-h] [-t test list]\n"); printf("\t-t test list: run tests specified in the test list, default:0x%x\n", TEST_MASK); printf("\t\t0x1:malloc; 0x2:max_bits; 0x4:mmap; 0x8:syscall; 0x10:io_uring; 0x20:inherit;\n"); printf("\t-h: help\n"); } /* Check for file existence */ uint8_t file_Exists(const char *fileName) { struct stat buffer; uint8_t ret = (stat(fileName, &buffer) == 0); return ret; } /* Sysfs idxd files */ const char *dsa_configs[] = { "echo 1 > /sys/bus/dsa/devices/dsa0/wq0.1/group_id", "echo shared > /sys/bus/dsa/devices/dsa0/wq0.1/mode", "echo 10 > /sys/bus/dsa/devices/dsa0/wq0.1/priority", "echo 16 > /sys/bus/dsa/devices/dsa0/wq0.1/size", "echo 15 > /sys/bus/dsa/devices/dsa0/wq0.1/threshold", "echo user > /sys/bus/dsa/devices/dsa0/wq0.1/type", "echo MyApp1 > /sys/bus/dsa/devices/dsa0/wq0.1/name", "echo 1 > /sys/bus/dsa/devices/dsa0/engine0.1/group_id", "echo dsa0 > /sys/bus/dsa/drivers/idxd/bind", /* bind files and devices, generated a device file in /dev */ "echo wq0.1 > /sys/bus/dsa/drivers/user/bind", }; /* DSA device file */ const char *dsaDeviceFile = "/dev/dsa/wq0.1"; /* file for io*/ const char *dsaPasidEnable = "/sys/bus/dsa/devices/dsa0/pasid_enabled"; /* * DSA depends on kernel cmdline "intel_iommu=on,sm_on" * return pasid_enabled (0: disable 1:enable) */ int Check_DSA_Kernel_Setting(void) { char command[256] = ""; char buf[256] = ""; char *ptr; int rv = -1; snprintf(command, sizeof(command) - 1, "cat %s", dsaPasidEnable); FILE *cmd = popen(command, "r"); if (cmd) { while (fgets(buf, sizeof(buf) - 1, cmd) != NULL); pclose(cmd); rv = strtol(buf, &ptr, 16); } return rv; } /* * Config DSA's sysfs files as shared DSA's WQ. * Generated a device file /dev/dsa/wq0.1 * Return: 0 OK; 1 Failed; 3 Skip(SVA disabled). */ int Dsa_Init_Sysfs(void) { uint len = ARRAY_SIZE(dsa_configs); const char **p = dsa_configs; if (file_Exists(dsaDeviceFile) == 1) return 0; /* check the idxd driver */ if (file_Exists(dsaPasidEnable) != 1) { printf("Please make sure idxd driver was loaded\n"); return 3; } /* Check SVA feature */ if (Check_DSA_Kernel_Setting() != 1) { printf("Please enable SVA.(Add intel_iommu=on,sm_on in kernel cmdline)\n"); return 3; } /* Check the idxd device file on /dev/dsa/ */ for (int i = 0; i < len; i++) { if (system(p[i])) return 1; } /* After config, /dev/dsa/wq0.1 should be generated */ return (file_Exists(dsaDeviceFile) != 1); } /* * Open DSA device file, triger API: iommu_sva_alloc_pasid */ void *allocate_dsa_pasid(void) { int fd; void *wq; fd = open(dsaDeviceFile, O_RDWR); if (fd < 0) { perror("open"); return MAP_FAILED; } wq = mmap(NULL, 0x1000, PROT_WRITE, MAP_SHARED | MAP_POPULATE, fd, 0); if (wq == MAP_FAILED) perror("mmap"); return wq; } int set_force_svm(void) { int ret = 0; ret = syscall(SYS_arch_prctl, ARCH_FORCE_TAGGED_SVA); return ret; } int handle_pasid(struct testcases *test) { uint tmp = test->cmd; uint runed = 0x0; int ret = 0; void *wq = NULL; ret = Dsa_Init_Sysfs(); if (ret != 0) return ret; for (int i = 0; i < 3; i++) { int err = 0; if (tmp & 0x1) { /* run set lam mode*/ if ((runed & 0x1) == 0) { err = set_lam(LAM_U57_BITS); runed = runed | 0x1; } else err = 1; } else if (tmp & 0x4) { /* run force svm */ if ((runed & 0x4) == 0) { err = set_force_svm(); runed = runed | 0x4; } else err = 1; } else if (tmp & 0x2) { /* run allocate pasid */ if ((runed & 0x2) == 0) { runed = runed | 0x2; wq = allocate_dsa_pasid(); if (wq == MAP_FAILED) err = 1; } else err = 1; } ret = ret + err; if (ret > 0) break; tmp = tmp >> 4; } if (wq != MAP_FAILED && wq != NULL) if (munmap(wq, 0x1000)) printf("munmap failed %d\n", errno); if (runed != 0x7) ret = 1; return (ret != 0); } /* * Pasid test depends on idxd and SVA, kernel should enable iommu and sm. * command line(intel_iommu=on,sm_on) */ static struct testcases pasid_cases[] = { { .expected = 1, .cmd = PAS_CMD(LAM_CMD_BIT, PAS_CMD_BIT, SVA_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: [Negative] Execute LAM, PASID, SVA in sequence\n", }, { .expected = 0, .cmd = PAS_CMD(LAM_CMD_BIT, SVA_CMD_BIT, PAS_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: Execute LAM, SVA, PASID in sequence\n", }, { .expected = 1, .cmd = PAS_CMD(PAS_CMD_BIT, LAM_CMD_BIT, SVA_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: [Negative] Execute PASID, LAM, SVA in sequence\n", }, { .expected = 0, .cmd = PAS_CMD(PAS_CMD_BIT, SVA_CMD_BIT, LAM_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: Execute PASID, SVA, LAM in sequence\n", }, { .expected = 0, .cmd = PAS_CMD(SVA_CMD_BIT, LAM_CMD_BIT, PAS_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: Execute SVA, LAM, PASID in sequence\n", }, { .expected = 0, .cmd = PAS_CMD(SVA_CMD_BIT, PAS_CMD_BIT, LAM_CMD_BIT), .test_func = handle_pasid, .msg = "PASID: Execute SVA, PASID, LAM in sequence\n", }, }; int main(int argc, char **argv) { int c = 0; unsigned int tests = TEST_MASK; tests_cnt = 0; if (!cpu_has_lam()) { ksft_print_msg("Unsupported LAM feature!\n"); return -1; } while ((c = getopt(argc, argv, "ht:")) != -1) { switch (c) { case 't': tests = strtoul(optarg, NULL, 16); if (tests && !(tests & TEST_MASK)) { ksft_print_msg("Invalid argument!\n"); return -1; } break; case 'h': cmd_help(); return 0; default: ksft_print_msg("Invalid argument\n"); return -1; } } /* * When tests is 0, it is not a real test case; * the option used by test case(execve) to check the lam mode in * process generated by execve, the process read back lam mode and * check with lam mode in parent process. */ if (!tests) return (get_lam()); /* Run test cases */ if (tests & FUNC_MALLOC) run_test(malloc_cases, ARRAY_SIZE(malloc_cases)); if (tests & FUNC_BITS) run_test(bits_cases, ARRAY_SIZE(bits_cases)); if (tests & FUNC_MMAP) run_test(mmap_cases, ARRAY_SIZE(mmap_cases)); if (tests & FUNC_SYSCALL) run_test(syscall_cases, ARRAY_SIZE(syscall_cases)); if (tests & FUNC_URING) run_test(uring_cases, ARRAY_SIZE(uring_cases)); if (tests & FUNC_INHERITE) run_test(inheritance_cases, ARRAY_SIZE(inheritance_cases)); if (tests & FUNC_PASID) run_test(pasid_cases, ARRAY_SIZE(pasid_cases)); ksft_set_plan(tests_cnt); return ksft_exit_pass(); }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1