From patchwork Wed Aug 28 23:27:46 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 13782192 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id DD4F9C71150 for ; Wed, 28 Aug 2024 23:32:16 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 592E46B009C; Wed, 28 Aug 2024 19:32:16 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 5404D6B00C9; Wed, 28 Aug 2024 19:32:16 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3BB236B00CA; Wed, 28 Aug 2024 19:32:16 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 1C3CB6B009C for ; Wed, 28 Aug 2024 19:32:16 -0400 (EDT) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id CCBD740258 for ; Wed, 28 Aug 2024 23:32:15 +0000 (UTC) X-FDA: 82503255030.16.748336F Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf13.hostedemail.com (Postfix) with ESMTP id 2122C2001D for ; Wed, 28 Aug 2024 23:32:13 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=KySzo6fE; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf13.hostedemail.com: domain of broonie@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1724887835; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=5eBWEluxA75mkTzkT1Wn6Xubbm059W8B8emCrmFOIYI=; b=eZoGZzu7DZoZvtUkHorVdTJb05g38M1204cIHgjvo7jHoHdirQH2FqJ0qG/GxccgwQITDz r+PjMM3jB8pjO0i1hf16DpCmVlZW/M0j+h3+bJLcok8Ev+CB4tzb5MH9EEypodjo/Ffs0F /qewoj6iwufa9Uz3VbHyccwtlsCADcA= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1724887835; a=rsa-sha256; cv=none; b=rcN85KuuR372ghidd8ij1h3GYQ0Qe7LxmKaZQoMC1FuL7PbxU75YCgH0jRLomR0w7FcIAP LDQ2a8+Z9n1C6Gk2+47GKHMaAyKcm56sFlmKDqVmRszb7MCtH2nPtFLu4JbLo9axUVNa9l +uFx1LyHLKMMbRaHMg7ycll0bdDXDxk= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=KySzo6fE; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf13.hostedemail.com: domain of broonie@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=broonie@kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 7A9FDA43764; Wed, 28 Aug 2024 23:32:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 62000C4CEC4; Wed, 28 Aug 2024 23:32:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724887933; bh=sPSz542BQgC8GDr8WCulUI2iE6roG4Js5HwD3OcoqCo=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=KySzo6fEyGp6BdY8PWhoAsZQF6vqUh7VSLnZwGJ1fwxLBxYSUE6Tisu/B7E3xs7+M ZFbDZ7V9wkzu7u5edVGxo7UjM8KMNdINV1mdfgmzwdJGXm5Z2m8QQDX5sZjvuH0HLk mNu+vjgjcZ9akS7fRBq+XNJAfx/0CT3udWjGSxizDFivqgELQ3HB6IXUdO2RWtA0Y4 QKxn6wQvzIpyJcOOOlBqnekMqXNj7YR+UPNHq4Ojrq6zVczenjxVSV01XK1KCmvr4c DHR0YMZyJkKx9AAw6bJoY+nG1YSyNBRfHPHv7N6zg7HwBB9KytgyBIfLeDxtlQmTCy CTOmxZ5qDjG1g== From: Mark Brown Date: Thu, 29 Aug 2024 00:27:46 +0100 Subject: [PATCH v12 30/39] kselftest/arm64: Add framework support for GCS to signal handling tests MIME-Version: 1.0 Message-Id: <20240829-arm64-gcs-v12-30-42fec947436a@kernel.org> References: <20240829-arm64-gcs-v12-0-42fec947436a@kernel.org> In-Reply-To: <20240829-arm64-gcs-v12-0-42fec947436a@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Andrew Morton , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Arnd Bergmann , Oleg Nesterov , Eric Biederman , Shuah Khan , "Rick P. Edgecombe" , Deepak Gupta , Ard Biesheuvel , Szabolcs Nagy , Kees Cook Cc: "H.J. Lu" , Paul Walmsley , Palmer Dabbelt , Albert Ou , Florian Weimer , Christian Brauner , Thiago Jung Bauermann , Ross Burton , Yury Khrustalev , Wilco Dijkstra , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown X-Mailer: b4 0.15-dev-37811 X-Developer-Signature: v=1; a=openpgp-sha256; l=1664; i=broonie@kernel.org; h=from:subject:message-id; bh=sPSz542BQgC8GDr8WCulUI2iE6roG4Js5HwD3OcoqCo=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBmz7KPFYLLdbvYJ36/sPVXE+bszL/qVS5cGfNf4rAP mM7MTASJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZs+yjwAKCRAk1otyXVSH0EbnB/ 4y0ip7sjbKvII3BGHj7WUTHeK1dYYsWhBq1j/1glr+DDWAso8t4RQzQrL1a/FPa8+grtUzHdfutX0e Fcui/LFoq17mWEoKRQgiCFYct9B3GRsBGnfQcN0UL8wTGsVEMnrufFzFh1HxFILItClusMV++GFZ7N QK7+IcAuriLa4+yVD+9+Aq0G00uUw1wA8KJPhNQfyIwi3S2EOfJIWZeniJwrmodcD83Q1ejYay9W/V OS+5GTWgUQnDIwxOQ5K6ABQwG0I8gmH8WLsS24uJ2Nk8jTz5/A3hDpUFhROo46g2hvNgunHICPFmum JFGtZAUdyJTkDlppOJpTHrjbRNWXUC X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 2122C2001D X-Stat-Signature: t6hbsrfeoihcq8smwetfiimus6ssan8g X-Rspam-User: X-HE-Tag: 1724887933-514672 X-HE-Meta: U2FsdGVkX188eBD7eonZGoInHQyMfcjD6qnXb689ZAbuoyQ4dW6pDnwbBf7/KypmWBL/jWOjpFqt04RwPGPsyZ6ZtoDECWylxfWRtXXC/0n6JQaup99XUsejL2zTIWTHL2j2TvLstwTg0ah4TYqqATZmNwqQQFAfZgUmx6ogAP+YptRCQBmr47xoejZuTdiaEPhiYSHR910GBgYiE1LfG85e3g/jIBIO+sV834tc2ddyEEvhFuHZkXlEJSgAgHmglMKciGA7bXZ9IDV25ftNNbTvPnjBFIbvPdt4JuKYAtaIeqplkH3mbv9BXkCbCgrj3DN8jcOKjiL+OClu1QxYMV7sgb+TpVujh83pDzp48pxMg8UANDVuzymwyQKspRgD7qRQuCjdSLuq7V4e66KxsUkETEUn67UmjPfJnsvj8Ts4xeewnn3ejMitejxDW4DMdGaFZKYABW44D7tM56Pximk6mbgBxqNGFHTEyd03bd6oKB8QkHLGlm1QayZkmRI8DIzAQYbdPzSlVMExMacVuIUbFghnB/r/KV8yu8HD7F6N0XCshZbBEoAVtZrWp5cjPkJnU/8XOJeXodN73TpdFTx+n9eX1teHT0MPVtY56bwvMhbU79O+IIankyShQonZH1Ah2WLOELhkfDA9SM3IpNZk1LYcWBCJ9KpjDbSsXZTpBVOx4/gZixXx9epfK3W92nWWzrocjY4EMzEFwEk1+RmukFC8RiOWn2Nzj2Kti7m3wPBD/gNV3zPsOXbdMx68SfbtemAR/1sCrATpoIjmjBo6kjdzQpvvQn9jcc8Kp0LcBnmkS9/YYKIHyr6eGNWjUnFbTuhIVNZ9CdHu3b3ZLsAp7ZiqGqM8VX2FJXqQ7U0AmkrOgxTNba7xMzVZHMOcuWffZIpvTfcy/Uu9ie54KcXfOlqO7yOAu1/vbcAuXGGwS2suVqulz5cBfu5nHhNZECd59Dpa98St0tEQ0fw 3lUPm/3q VlCAwrXUP5gRIWmaryoT/nV9Vw3dts52PNKzBhlUVaHpqVZj1H6ZstgJhZBeVdPVeYOXZAMG1iA+J9vxccTdnp0M7e18lp2FS16Fmr6sCo+Jw9HFAUUXRL49pRpripT/wNkhr13yDf+mXO4nv+rYr27+GR+R2hrxgHgh7bTsiTYURxGC6CusAbQ0enJPNaWySPi3h239mMQ20C58nFtFZgtV82Os62xMbN7ixYVFPmQNroIVDuk0oAFTQVU2hGeF/OzURZUvn47ZJW44oUTMw5x2hLLCpDR0khdwQsSZZzOiiiuFzP5j7isn0K48uVNjkAym4QnmYxbtMpobxrao5lrJfArwHhPg+zisWtaPBZb6fASIqLuvyZcV/6msX2N0AcY756peqnnRTXvHV0SrXdCb+viAw6QJyI2tD X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Teach the framework about the GCS signal context, avoiding warnings on the unknown context. Reviewed-by: Thiago Jung Bauermann Signed-off-by: Mark Brown --- tools/testing/selftests/arm64/signal/testcases/testcases.c | 7 +++++++ tools/testing/selftests/arm64/signal/testcases/testcases.h | 1 + 2 files changed, 8 insertions(+) diff --git a/tools/testing/selftests/arm64/signal/testcases/testcases.c b/tools/testing/selftests/arm64/signal/testcases/testcases.c index 674b88cc8c39..49d036e97996 100644 --- a/tools/testing/selftests/arm64/signal/testcases/testcases.c +++ b/tools/testing/selftests/arm64/signal/testcases/testcases.c @@ -217,6 +217,13 @@ bool validate_reserved(ucontext_t *uc, size_t resv_sz, char **err) *err = "Bad size for fpmr_context"; new_flags |= FPMR_CTX; break; + case GCS_MAGIC: + if (flags & GCS_CTX) + *err = "Multiple GCS_MAGIC"; + if (head->size != sizeof(struct gcs_context)) + *err = "Bad size for gcs_context"; + new_flags |= GCS_CTX; + break; case EXTRA_MAGIC: if (flags & EXTRA_CTX) *err = "Multiple EXTRA_MAGIC"; diff --git a/tools/testing/selftests/arm64/signal/testcases/testcases.h b/tools/testing/selftests/arm64/signal/testcases/testcases.h index 7727126347e0..dc3cf777dafe 100644 --- a/tools/testing/selftests/arm64/signal/testcases/testcases.h +++ b/tools/testing/selftests/arm64/signal/testcases/testcases.h @@ -20,6 +20,7 @@ #define EXTRA_CTX (1 << 3) #define ZT_CTX (1 << 4) #define FPMR_CTX (1 << 5) +#define GCS_CTX (1 << 6) #define KSFT_BAD_MAGIC 0xdeadbeef