From patchwork Mon Jan 23 22:04:59 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Kirill A. Shutemov" X-Patchwork-Id: 13113085 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id CF577C25B50 for ; Mon, 23 Jan 2023 22:05:43 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id ABE296B0099; Mon, 23 Jan 2023 17:05:38 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A4E6E6B009C; Mon, 23 Jan 2023 17:05:38 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7DCA16B009A; Mon, 23 Jan 2023 17:05:38 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 5CE186B0099 for ; Mon, 23 Jan 2023 17:05:38 -0500 (EST) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 3087140624 for ; Mon, 23 Jan 2023 22:05:38 +0000 (UTC) X-FDA: 80387446356.09.ADBE341 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by imf28.hostedemail.com (Postfix) with ESMTP id E074DC0005 for ; Mon, 23 Jan 2023 22:05:35 +0000 (UTC) Authentication-Results: imf28.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=bAe0d4D9; spf=none (imf28.hostedemail.com: domain of kirill.shutemov@linux.intel.com has no SPF policy when checking 134.134.136.24) smtp.mailfrom=kirill.shutemov@linux.intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1674511536; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Z2Xbzao2Trzy/9esyr32LxfHyKql/ACddIcl2fmSKko=; b=erQBL8crm00OK+E0aM75lesoQgDN0tiaTkgD0jFHh7K82Ovvj3IxeAbTPRTWBptGCwmgq3 yfUdv4ziE+Y4WWGqAyr7rFxla1twxqFB8Y2U3EzPQZCX5uGIjhwJPwx7WZqqO5BAZvzW4h KEx2eMk0LnfPaaJxuaqcK90nsYl2L5U= ARC-Authentication-Results: i=1; imf28.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=bAe0d4D9; spf=none (imf28.hostedemail.com: domain of kirill.shutemov@linux.intel.com has no SPF policy when checking 134.134.136.24) smtp.mailfrom=kirill.shutemov@linux.intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1674511536; a=rsa-sha256; cv=none; b=t9M3Wr0Dktg+bKmKZmAu+E8gAjFQ2+gvRv6MwAjZexQHValNOaWItfcrpGSQJ8U4HHFSU3 9gbleNbXLJTnCeQxCEjn9YZNfOqfddNl7yVGkAkEdM6C6XgZ7vkJIkrxUU7o96pfgtkaEe hYLwdQKA3Qp0f/DMVO2f5KUhUufA/j8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1674511536; x=1706047536; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=k16PD+aFmTFf1DI58jd2raYmUcnyQu1o21tgV69ulz0=; b=bAe0d4D9I26skBDVuPPtsNsJxwh/uDRExYKJ3cPCJnHcvSxeJGax3eSD 5RExOLJVG6x4eN/brB/vvaCVRdhMC5U7PirRtIAD9ZvkpEMSDi+P0ipHE gsYwmDW2MVH798nd3dKlQX7paLq/qrvF0QMDUOq3jCOMkklDVLBPCHWib xfAD1/+ZQixt5svFQTNyJKY+WKVzMjVIh5Wjey5MorNaz8U5Ng8ZZeH2h 2YkJ7mNi9Fn3OzXUUWVxkvZoJQJvZh4WiX+/vD72vkjPlJlRNN+kwxylr /Mf7zSwBzeNrw9JuoC6Unao5dKZ+PSXDVZwQ3UNqIKV1p6hQXp7CIMvek g==; X-IronPort-AV: E=McAfee;i="6500,9779,10599"; a="327422017" X-IronPort-AV: E=Sophos;i="5.97,240,1669104000"; d="scan'208";a="327422017" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jan 2023 14:05:33 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10599"; a="661878128" X-IronPort-AV: E=Sophos;i="5.97,240,1669104000"; d="scan'208";a="661878128" Received: from ssauty-mobl1.ger.corp.intel.com (HELO box.shutemov.name) ([10.249.46.171]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jan 2023 14:05:26 -0800 Received: by box.shutemov.name (Postfix, from userid 1000) id C873D109B85; Tue, 24 Jan 2023 01:05:03 +0300 (+03) From: "Kirill A. Shutemov" To: Dave Hansen , Andy Lutomirski , Peter Zijlstra Cc: x86@kernel.org, Kostya Serebryany , Andrey Ryabinin , Andrey Konovalov , Alexander Potapenko , Taras Madan , Dmitry Vyukov , "H . J . Lu" , Andi Kleen , Rick Edgecombe , Bharata B Rao , Jacob Pan , Ashok Raj , Linus Torvalds , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Weihong Zhang , "Kirill A . Shutemov" Subject: [PATCHv15 16/17] selftests/x86/lam: Add ARCH_FORCE_TAGGED_SVA test cases for linear-address masking Date: Tue, 24 Jan 2023 01:04:59 +0300 Message-Id: <20230123220500.21077-17-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.39.1 In-Reply-To: <20230123220500.21077-1-kirill.shutemov@linux.intel.com> References: <20230123220500.21077-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: E074DC0005 X-Stat-Signature: zyig1o63tfgqreddpsuu7znbq1c341t3 X-HE-Tag: 1674511535-733985 X-HE-Meta: U2FsdGVkX19OgT8anNmnvi1nLZFykCb3JhYXrslxGYL+TE0cyLwMcrqr4NvU5xndlVl4PJ0D7oHX4UZSkHz/JQuW6QqoRvUzuLIrsz6fuhWtGCvpDh5/LB4uvFNlrWnO7/8WWC6YpPlEWFlV9j4J7NZlpRu1OSWAJP93ZTe+TiVLhKr1h+NO8x2+/XqNh+3HsvfkrttaTwc8JincTGKAHiEPa2wHff4Cjpyd9uZy4p7dGyQYN2sroiezuAWLZrvavtWi3DgV3C7xX3+h7ySy53YMnIizjKrRNmGd3TBUWRYV/hkLT2qb6dNF1keQoHfWesOrI1IJOBE+l3dF1s7g62szmGzPqeMo8aBnNt1F3g9r9qQFSlEjrxblVweEoOnfifSb31dttuxCTHO+PM60sahkFDxDgmXibThCamnruxwA+csfZRXMWv6Q9YuiPaQqP2+yPket9Rp3qULt2G4/IKaiKOKeE38BGZOdhOcvOHPwKaBu38jHv8t4WSR8w3ucgutX49cF8mQ9yJjSEP3fhnH1FaPm/Q7qnpVMe/sYch9NtrJMjHuafbo6bTejQM2MX3KGI9SGRRg+lCjUTbyOgOd6uEWl6b5rVljHz8SWzYxgNuC4qLSlqttKU/0BwQIOxMMUh4rLYefL5iFW87GcZOLFNbzQsLATyPj4wLQJ2qVwbza9SuuPut2wqyXT26IMQZIE1o5jjzVmfRvpiRsa4vHArtoa3VR7kudmFkx2vhzLto1YPo3npE6ISOPclnVaMfaUH7SPNNazAbfOdlJeUkDBem2C9AtlC24SGMVM6iqdMfbTIuY/vtGwGXMi5/gb12HzOUG2p2HOyFp1UgzHVGogQ8mv59WyyySHJiZs7zXlZw/CujF1nLg1cybnyHVD1redHqQf3E6AbrAbCSu0nfuSLYtCEmFoHnzqw9WsJkcDgYF8uksHm4WVFkJS8QHlwcqU5ORY7oU2Rfd/X3p f7JFfNnc gp9QuWZdWlXhe+rNqMqGqwsa1tIdjOTokMrgSzv8iUBJNyo+KtRZcb2Uq3EiLA33CMnludfLPp582v352v93lu8/94cusfAalXK2DcsjwN7JvCncpmBcA7uMOym/WDKY3C+XHEeSZVTuITJCGU7nUZhLjFhb+ZGzc8mQlqhWQg0+H48KSmU+rBSoeCxR/mCnFYNi5L3sL9CRCg0qNWXbDTMoJqoHJYZOLL5k/IQAqk7ZU5YEGT/NL1jsYmXGDO+pvO+J1XntrCmxoXhKlmNA/AfP2CmVifdnYHVQHYpRSHksI0Ny5sAMwl0KfKjUBooWjspUrFBiuB9fgeERXJLQlioTClg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Weihong Zhang By default do not allow to enable both LAM and use SVA in the same process. The new ARCH_FORCE_TAGGED_SVA arch_prctl() overrides the limitation. Add new test cases for the new arch_prctl: Before using ARCH_FORCE_TAGGED_SVA, should not allow to enable LAM/SVA coexisting. the test cases should be negative. The test depands on idxd driver and iommu. before test, need add "intel_iommu=on,sm_on" in kernel command line and insmod idxd driver. Signed-off-by: Weihong Zhang Signed-off-by: Kirill A. Shutemov Acked-by: Peter Zijlstra (Intel) --- tools/testing/selftests/x86/lam.c | 237 +++++++++++++++++++++++++++++- 1 file changed, 235 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/x86/lam.c b/tools/testing/selftests/x86/lam.c index ebabd4333b7d..a8c91829b616 100644 --- a/tools/testing/selftests/x86/lam.c +++ b/tools/testing/selftests/x86/lam.c @@ -30,6 +30,7 @@ #define ARCH_GET_UNTAG_MASK 0x4001 #define ARCH_ENABLE_TAGGED_ADDR 0x4002 #define ARCH_GET_MAX_TAG_BITS 0x4003 +#define ARCH_FORCE_TAGGED_SVA 0x4004 /* Specified test function bits */ #define FUNC_MALLOC 0x1 @@ -38,8 +39,9 @@ #define FUNC_SYSCALL 0x8 #define FUNC_URING 0x10 #define FUNC_INHERITE 0x20 +#define FUNC_PASID 0x40 -#define TEST_MASK 0x3f +#define TEST_MASK 0x7f #define LOW_ADDR (0x1UL << 30) #define HIGH_ADDR (0x3UL << 48) @@ -55,11 +57,19 @@ #define URING_QUEUE_SZ 1 #define URING_BLOCK_SZ 2048 +/* Pasid test define */ +#define LAM_CMD_BIT 0x1 +#define PAS_CMD_BIT 0x2 +#define SVA_CMD_BIT 0x4 + +#define PAS_CMD(cmd1, cmd2, cmd3) (((cmd3) << 8) | ((cmd2) << 4) | ((cmd1) << 0)) + struct testcases { unsigned int later; int expected; /* 2: SIGSEGV Error; 1: other errors */ unsigned long lam; uint64_t addr; + uint64_t cmd; int (*test_func)(struct testcases *test); const char *msg; }; @@ -556,7 +566,7 @@ int do_uring(unsigned long lam) struct file_io *fi; struct stat st; int ret = 1; - char path[PATH_MAX]; + char path[PATH_MAX] = {0}; /* get current process path */ if (readlink("/proc/self/exe", path, PATH_MAX) <= 0) @@ -852,6 +862,226 @@ static void cmd_help(void) printf("\t-h: help\n"); } +/* Check for file existence */ +uint8_t file_Exists(const char *fileName) +{ + struct stat buffer; + + uint8_t ret = (stat(fileName, &buffer) == 0); + + return ret; +} + +/* Sysfs idxd files */ +const char *dsa_configs[] = { + "echo 1 > /sys/bus/dsa/devices/dsa0/wq0.1/group_id", + "echo shared > /sys/bus/dsa/devices/dsa0/wq0.1/mode", + "echo 10 > /sys/bus/dsa/devices/dsa0/wq0.1/priority", + "echo 16 > /sys/bus/dsa/devices/dsa0/wq0.1/size", + "echo 15 > /sys/bus/dsa/devices/dsa0/wq0.1/threshold", + "echo user > /sys/bus/dsa/devices/dsa0/wq0.1/type", + "echo MyApp1 > /sys/bus/dsa/devices/dsa0/wq0.1/name", + "echo 1 > /sys/bus/dsa/devices/dsa0/engine0.1/group_id", + "echo dsa0 > /sys/bus/dsa/drivers/idxd/bind", + /* bind files and devices, generated a device file in /dev */ + "echo wq0.1 > /sys/bus/dsa/drivers/user/bind", +}; + +/* DSA device file */ +const char *dsaDeviceFile = "/dev/dsa/wq0.1"; +/* file for io*/ +const char *dsaPasidEnable = "/sys/bus/dsa/devices/dsa0/pasid_enabled"; + +/* + * DSA depends on kernel cmdline "intel_iommu=on,sm_on" + * return pasid_enabled (0: disable 1:enable) + */ +int Check_DSA_Kernel_Setting(void) +{ + char command[256] = ""; + char buf[256] = ""; + char *ptr; + int rv = -1; + + snprintf(command, sizeof(command) - 1, "cat %s", dsaPasidEnable); + + FILE *cmd = popen(command, "r"); + + if (cmd) { + while (fgets(buf, sizeof(buf) - 1, cmd) != NULL); + + pclose(cmd); + rv = strtol(buf, &ptr, 16); + } + + return rv; +} + +/* + * Config DSA's sysfs files as shared DSA's WQ. + * Generated a device file /dev/dsa/wq0.1 + * Return: 0 OK; 1 Failed; 3 Skip(SVA disabled). + */ +int Dsa_Init_Sysfs(void) +{ + uint len = ARRAY_SIZE(dsa_configs); + const char **p = dsa_configs; + + if (file_Exists(dsaDeviceFile) == 1) + return 0; + + /* check the idxd driver */ + if (file_Exists(dsaPasidEnable) != 1) { + printf("Please make sure idxd driver was loaded\n"); + return 3; + } + + /* Check SVA feature */ + if (Check_DSA_Kernel_Setting() != 1) { + printf("Please enable SVA.(Add intel_iommu=on,sm_on in kernel cmdline)\n"); + return 3; + } + + /* Check the idxd device file on /dev/dsa/ */ + for (int i = 0; i < len; i++) { + if (system(p[i])) + return 1; + } + + /* After config, /dev/dsa/wq0.1 should be generated */ + return (file_Exists(dsaDeviceFile) != 1); +} + +/* + * Open DSA device file, triger API: iommu_sva_alloc_pasid + */ +void *allocate_dsa_pasid(void) +{ + int fd; + void *wq; + + fd = open(dsaDeviceFile, O_RDWR); + if (fd < 0) { + perror("open"); + return MAP_FAILED; + } + + wq = mmap(NULL, 0x1000, PROT_WRITE, + MAP_SHARED | MAP_POPULATE, fd, 0); + if (wq == MAP_FAILED) + perror("mmap"); + + return wq; +} + +int set_force_svm(void) +{ + int ret = 0; + + ret = syscall(SYS_arch_prctl, ARCH_FORCE_TAGGED_SVA); + + return ret; +} + +int handle_pasid(struct testcases *test) +{ + uint tmp = test->cmd; + uint runed = 0x0; + int ret = 0; + void *wq = NULL; + + ret = Dsa_Init_Sysfs(); + if (ret != 0) + return ret; + + for (int i = 0; i < 3; i++) { + int err = 0; + + if (tmp & 0x1) { + /* run set lam mode*/ + if ((runed & 0x1) == 0) { + err = set_lam(LAM_U57_BITS); + runed = runed | 0x1; + } else + err = 1; + } else if (tmp & 0x4) { + /* run force svm */ + if ((runed & 0x4) == 0) { + err = set_force_svm(); + runed = runed | 0x4; + } else + err = 1; + } else if (tmp & 0x2) { + /* run allocate pasid */ + if ((runed & 0x2) == 0) { + runed = runed | 0x2; + wq = allocate_dsa_pasid(); + if (wq == MAP_FAILED) + err = 1; + } else + err = 1; + } + + ret = ret + err; + if (ret > 0) + break; + + tmp = tmp >> 4; + } + + if (wq != MAP_FAILED && wq != NULL) + if (munmap(wq, 0x1000)) + printf("munmap failed %d\n", errno); + + if (runed != 0x7) + ret = 1; + + return (ret != 0); +} + +/* + * Pasid test depends on idxd and SVA, kernel should enable iommu and sm. + * command line(intel_iommu=on,sm_on) + */ +static struct testcases pasid_cases[] = { + { + .expected = 1, + .cmd = PAS_CMD(LAM_CMD_BIT, PAS_CMD_BIT, SVA_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: [Negative] Execute LAM, PASID, SVA in sequence\n", + }, + { + .expected = 0, + .cmd = PAS_CMD(LAM_CMD_BIT, SVA_CMD_BIT, PAS_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: Execute LAM, SVA, PASID in sequence\n", + }, + { + .expected = 1, + .cmd = PAS_CMD(PAS_CMD_BIT, LAM_CMD_BIT, SVA_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: [Negative] Execute PASID, LAM, SVA in sequence\n", + }, + { + .expected = 0, + .cmd = PAS_CMD(PAS_CMD_BIT, SVA_CMD_BIT, LAM_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: Execute PASID, SVA, LAM in sequence\n", + }, + { + .expected = 0, + .cmd = PAS_CMD(SVA_CMD_BIT, LAM_CMD_BIT, PAS_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: Execute SVA, LAM, PASID in sequence\n", + }, + { + .expected = 0, + .cmd = PAS_CMD(SVA_CMD_BIT, PAS_CMD_BIT, LAM_CMD_BIT), + .test_func = handle_pasid, + .msg = "PASID: Execute SVA, PASID, LAM in sequence\n", + }, +}; + int main(int argc, char **argv) { int c = 0; @@ -910,6 +1140,9 @@ int main(int argc, char **argv) if (tests & FUNC_INHERITE) run_test(inheritance_cases, ARRAY_SIZE(inheritance_cases)); + if (tests & FUNC_PASID) + run_test(pasid_cases, ARRAY_SIZE(pasid_cases)); + ksft_set_plan(tests_cnt); return ksft_exit_pass();