From patchwork Thu Feb 3 14:36:18 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Joey Gouly X-Patchwork-Id: 12734237 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 3ABE3C433F5 for ; Thu, 3 Feb 2022 14:39:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:CC:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=3nzzK9rb9O/yrseHtBJUWgCT2ORY3g2AuSuNMKcn4E4=; b=lDJQ3wC7HL1OB4 5inM8U7Y5Hu8aLt6lrkSXUKwYD+ifOJkWJvaguT94eKBr7YGrMOZUa7QfbRJ5LnfyPnOz8KZf9sBS RGowVfN2n83IK5JbCMo6DerIVDyLIqwhXh6rzKK2td58rx/QW781vzD7SQoTj37+rwd0ND6j1L4G+ Q4B/UL7SNhfFrQNKd2+1IuSu4S/kg8g38eDP9jVijEtfOInSo4lA5PT61wrlVEE1mDahFFmj6RDTw 9g3ZF4Ocmh7NYjEMFt4vNDdPeKYkqzucwlMYH8FfgHa6xuqstVAE/fzqxFdbgqs9ItEAyLvJuNg+e K3HOqQ8A+ZEM2JDR073w==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nFdEe-001e58-Bm; Thu, 03 Feb 2022 14:37:20 +0000 Received: from mail-db3eur04on0612.outbound.protection.outlook.com ([2a01:111:f400:fe0c::612] helo=EUR04-DB3-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nFdEB-001dwZ-4Y for linux-arm-kernel@lists.infradead.org; Thu, 03 Feb 2022 14:36:52 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QEbd6YbDY0c22G/n4D6CAxOgc6iW26+poXDHwjL0WnA=; b=dODTcwEPcNulgnQrno8dbNOXfkhyPB9bk2djxjyfbHQsQqSkBQ43MFmJEkgNrb/00VWm3Dr413IWClYSuN0MDh/S6i8CmM/utGiWUW96D1uIv86AvopWov4YpLuTvglAyGPALYijZAMGZ24ckE+NYmYnLhFptP7od2jhJh/RNmY= Received: from AS9PR05CA0021.eurprd05.prod.outlook.com (2603:10a6:20b:488::17) by AM6PR08MB3078.eurprd08.prod.outlook.com (2603:10a6:209:46::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.17; Thu, 3 Feb 2022 14:36:47 +0000 Received: from VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:488:cafe::47) by AS9PR05CA0021.outlook.office365.com (2603:10a6:20b:488::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.22 via Frontend Transport; Thu, 3 Feb 2022 14:36:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT033.mail.protection.outlook.com (10.152.18.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.12 via Frontend Transport; Thu, 3 Feb 2022 14:36:46 +0000 Received: ("Tessian outbound 1f399c739551:v113"); Thu, 03 Feb 2022 14:36:46 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 78266317df00b46e X-CR-MTA-TID: 64aa7808 Received: from 7633e837fe14.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id ADBEB308-5541-4378-A2AA-4E64C433E72F.1; Thu, 03 Feb 2022 14:36:39 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 7633e837fe14.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 03 Feb 2022 14:36:39 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KWTcomzZHJ8ATIWKVf2KUwEQk9I90neAtaS8oagxcGlJjV4wl6eqfxByaOvyLWZuP2LVduz07SkZLdAI4mJ4V8RO2YRUXLvjeI0cH9tJGtDMQUj78v2/ocXXoG/VixYDhi3VAIm9rL672ytApHftlEqOah+eXdhDvNvBCfvxoySZManwCZqNTDStPKwh3L0b/aYt9G3w+FSmuRktaMtBCs0sxh8d2dEeRRPgJiK21sC2vbIALgx/jlrfZoG6M0TP2A15Kxuv54TmDvfS2p3Z5wXxjcSj17yPUWcGtGdvjs443KCw366jOpapPs9Cop2z0OSL9HeXXDm5L6fGrclCbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=QEbd6YbDY0c22G/n4D6CAxOgc6iW26+poXDHwjL0WnA=; b=Yce0YkoOzUTRM/QC2XFydOuQsGGfoQDWWwsdryI7roII068XDku6mfyl2uLwJKPhto6pEenNWFWc5gNeHRY6v6F8F43H2gsFYqIvRXEQjMtrFZnBLm+DfjufNbNSqu+4Spqfomufk9UGIG8/AOa+26iJzmbS6BHqge/hK06vzB4JfS3wGOz3XbCYTSeDY2ssHOMi68XPippfnkqkG526hMbDKoH34NVOBPUMlJCFuOVhrLWakIHueyAr22r+d3yabtoBg6f5IuWiu65Y3CUmIpmaDO0lXK9EWo7oJTGJVVWv7WFYcYixHnTC3GykKOyCKloYjYaIac503fFTJgeCpA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=lists.infradead.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QEbd6YbDY0c22G/n4D6CAxOgc6iW26+poXDHwjL0WnA=; b=dODTcwEPcNulgnQrno8dbNOXfkhyPB9bk2djxjyfbHQsQqSkBQ43MFmJEkgNrb/00VWm3Dr413IWClYSuN0MDh/S6i8CmM/utGiWUW96D1uIv86AvopWov4YpLuTvglAyGPALYijZAMGZ24ckE+NYmYnLhFptP7od2jhJh/RNmY= Received: from AM6PR08CA0008.eurprd08.prod.outlook.com (2603:10a6:20b:b2::20) by PAXPR08MB6717.eurprd08.prod.outlook.com (2603:10a6:102:131::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.17; Thu, 3 Feb 2022 14:36:37 +0000 Received: from AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:b2:cafe::b3) by AM6PR08CA0008.outlook.office365.com (2603:10a6:20b:b2::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.12 via Frontend Transport; Thu, 3 Feb 2022 14:36:37 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT040.mail.protection.outlook.com (10.152.17.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4951.12 via Frontend Transport; Thu, 3 Feb 2022 14:36:37 +0000 Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.20; Thu, 3 Feb 2022 14:36:33 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.20; Thu, 3 Feb 2022 14:36:30 +0000 Received: from e124191.cambridge.arm.com (10.1.197.45) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2308.20 via Frontend Transport; Thu, 3 Feb 2022 14:36:32 +0000 From: Joey Gouly To: CC: , , , , , Subject: [PATCH v2 4/6] kselftest/arm64: mte: user_mem: add test type enum Date: Thu, 3 Feb 2022 14:36:18 +0000 Message-ID: <20220203143620.30629-5-joey.gouly@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220203143620.30629-1-joey.gouly@arm.com> References: <20220203143620.30629-1-joey.gouly@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-Correlation-Id: 8eb832d4-0bbf-4b9a-8544-08d9e7229b3d X-MS-TrafficTypeDiagnostic: PAXPR08MB6717:EE_|VE1EUR03FT033:EE_|AM6PR08MB3078:EE_ X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8882;OLM:8882; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(5660300002)(426003)(186003)(82310400004)(83380400001)(7696005)(36860700001)(336012)(26005)(44832011)(47076005)(2906002)(1076003)(2616005)(81166007)(6916009)(54906003)(86362001)(70586007)(70206006)(4326008)(356005)(508600001)(8936002)(316002)(6666004)(8676002)(40460700003)(36756003)(36900700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6717 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: dc50ec99-885b-4c9c-665b-08d9e722959c X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 0Z2n1bkU0di70GpIFIpiN0OvvJGO8rNpnITnbb65eUJFW4HwM3pE/bOqJFLDo620blPo/0SvZZzkaN3dLwndnHSMTnfgv13CAk5jSvHfIHkoRz5AmikXn9azUu+7vaOuWLQLFJZgh4BDqAzNw7+JPeI4UT5p9iB56CFI/4IOBzGpqgi+FIdtcnhhA3V2bNXFiXxBqkwG/8CyuV1riSHXEaqRpEAS/FG2WWTnK+/57wuagM2Lc9U5ukK0UY14JjZZpQG6talBVg3ca/3sGQsocjUwxSUZuzwOOpfr8hqS1Pe5w8uMdV0bDWTmKatkZbFeFNlSkk7rijz6Ey93zYik+6YZM7NVAzy4dRDKUyvx2+ueY1cvcb547XwN4qg8EFHSLNdiq22VurY/zttcX0BF0NuXjBH6TjsMes6vvnKYRzlhbo1kuoheaLYcasFuzOeAvFAmzowzYk16j6BcDl/n7w/ZXkhhUaMxaASnO5tTfvp50NXeas/tS/1abJoHNq3zuyMgCV2viO/0vvG+C+OBhI9YO1Ph2hw8bFf8ouf7iJO9oFlGpLA8tS4On5Nl4BEOdpQ+3+65sifwd7Nj/FbBdnLZ5Yt0Jcy/Jg9xaK7D/OdbZy9n8uGRb9FnsF2JTcAZmd64SK0k8YeP5kyEE0VsFdycdG0ik1ie1TQ91XMphmgk023sL5GB+EBp032ypNNx X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(81166007)(316002)(40460700003)(4326008)(86362001)(47076005)(36860700001)(83380400001)(82310400004)(2616005)(26005)(8936002)(508600001)(7696005)(6666004)(8676002)(36756003)(2906002)(1076003)(54906003)(426003)(336012)(107886003)(186003)(6916009)(5660300002)(70206006)(70586007)(44832011); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Feb 2022 14:36:46.7946 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8eb832d4-0bbf-4b9a-8544-08d9e7229b3d X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3078 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220203_063651_352613_DFE397CF X-CRM114-Status: GOOD ( 15.25 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This enum will be used to parameterise the test to perform other syscalls than 'read'. Signed-off-by: Joey Gouly Cc: Catalin Marinas Cc: Will Deacon Cc: Mark Brown Cc: Shuah Khan Reviewed-by: Shuah Khan --- .../selftests/arm64/mte/check_user_mem.c | 38 +++++++++++++------ 1 file changed, 26 insertions(+), 12 deletions(-) diff --git a/tools/testing/selftests/arm64/mte/check_user_mem.c b/tools/testing/selftests/arm64/mte/check_user_mem.c index 35061ae23ed5..6d4aeb14027b 100644 --- a/tools/testing/selftests/arm64/mte/check_user_mem.c +++ b/tools/testing/selftests/arm64/mte/check_user_mem.c @@ -19,12 +19,18 @@ static size_t page_sz; +enum test_type { + READ_TEST, + LAST_TEST, +}; + static int check_usermem_access_fault(int mem_type, int mode, int mapping, - int tag_offset, int tag_len) + int tag_offset, int tag_len, + enum test_type test_type) { int fd, i, err; char val = 'A'; - size_t len, read_len; + ssize_t len, syscall_len; void *ptr, *ptr_next; int fileoff, ptroff, size; int sizes[] = {1, 2, 3, 8, 16, 32, 4096, page_sz}; @@ -46,9 +52,9 @@ static int check_usermem_access_fault(int mem_type, int mode, int mapping, } mte_initialize_current_context(mode, (uintptr_t)ptr, len); /* Copy from file into buffer with valid tag */ - read_len = read(fd, ptr, len); + syscall_len = read(fd, ptr, len); mte_wait_after_trig(); - if (cur_mte_cxt.fault_valid || read_len < len) { + if (cur_mte_cxt.fault_valid || syscall_len < len) { err = KSFT_FAIL; goto usermem_acc_err; } @@ -73,8 +79,16 @@ static int check_usermem_access_fault(int mem_type, int mode, int mapping, for (i = 0; i < ARRAY_SIZE(sizes); i++) { size = sizes[i]; lseek(fd, 0, 0); - /* Copy from file into buffer with invalid tag */ - read_len = read(fd, ptr + ptroff, size); + + /* perform file operation on buffer with invalid tag */ + switch (test_type) { + case READ_TEST: + syscall_len = read(fd, ptr + ptroff, size); + break; + case LAST_TEST: + goto usermem_acc_err; + } + mte_wait_after_trig(); /* * Accessing user memory in kernel with invalid tag should fail in sync @@ -85,9 +99,9 @@ static int check_usermem_access_fault(int mem_type, int mode, int mapping, err = KSFT_FAIL; goto usermem_acc_err; } - if (mode == MTE_SYNC_ERR && read_len < len) { + if (mode == MTE_SYNC_ERR && syscall_len < len) { /* test passed */ - } else if (mode == MTE_ASYNC_ERR && read_len == size) { + } else if (mode == MTE_ASYNC_ERR && syscall_len == size) { /* test passed */ } else { err = KSFT_FAIL; @@ -121,14 +135,14 @@ int main(int argc, char *argv[]) /* Set test plan */ ksft_set_plan(4); - evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_SYNC_ERR, MAP_PRIVATE, page_sz, 0), + evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_SYNC_ERR, MAP_PRIVATE, page_sz, 0, READ_TEST), "Check memory access from kernel in sync mode, private mapping and mmap memory\n"); - evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_SYNC_ERR, MAP_SHARED, page_sz, 0), + evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_SYNC_ERR, MAP_SHARED, page_sz, 0, READ_TEST), "Check memory access from kernel in sync mode, shared mapping and mmap memory\n"); - evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_ASYNC_ERR, MAP_PRIVATE, page_sz, 0), + evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_ASYNC_ERR, MAP_PRIVATE, page_sz, 0, READ_TEST), "Check memory access from kernel in async mode, private mapping and mmap memory\n"); - evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_ASYNC_ERR, MAP_SHARED, page_sz, 0), + evaluate_test(check_usermem_access_fault(USE_MMAP, MTE_ASYNC_ERR, MAP_SHARED, page_sz, 0, READ_TEST), "Check memory access from kernel in async mode, shared mapping and mmap memory\n"); mte_restore_setup();