From: Rogerio Alves <rcardoso@linux.ibm.com>
To: Ravi Bangoria <ravi.bangoria@linux.ibm.com>,
mpe@ellerman.id.au, christophe.leroy@c-s.fr
Cc: mikey@neuling.org, jniethe5@gmail.com, pedromfc@linux.ibm.com,
linux-kernel@vger.kernel.org, paulus@samba.org,
rogealve@linux.ibm.com, naveen.n.rao@linux.vnet.ibm.com,
linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH v6 8/8] powerpc/watchpoint/selftests: Tests for kernel accessing user memory
Date: Thu, 17 Sep 2020 10:26:20 -0300 [thread overview]
Message-ID: <05c1b4a3-a0e7-6fcb-171b-1a2e8a99f21d@linux.ibm.com> (raw)
In-Reply-To: <20200902042945.129369-9-ravi.bangoria@linux.ibm.com>
On 9/2/20 1:29 AM, Ravi Bangoria wrote:
> Introduce tests to cover simple scenarios where user is watching
> memory which can be accessed by kernel as well. We also support
> _MODE_EXACT with _SETHWDEBUG interface. Move those testcases out-
> side of _BP_RANGE condition. This will help to test _MODE_EXACT
> scenarios when CONFIG_HAVE_HW_BREAKPOINT is not set, eg:
>
> $ ./ptrace-hwbreak
> ...
> PTRACE_SET_DEBUGREG, Kernel Access Userspace, len: 8: Ok
> PPC_PTRACE_SETHWDEBUG, MODE_EXACT, WO, len: 1: Ok
> PPC_PTRACE_SETHWDEBUG, MODE_EXACT, RO, len: 1: Ok
> PPC_PTRACE_SETHWDEBUG, MODE_EXACT, RW, len: 1: Ok
> PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace, len: 1: Ok
> success: ptrace-hwbreak
>
> Suggested-by: Pedro Miraglia Franco de Carvalho <pedromfc@linux.ibm.com>
> Signed-off-by: Ravi Bangoria <ravi.bangoria@linux.ibm.com>
Tested-by: Rogerio Alves <rcardoso@linux.ibm.com>
> ---
> .../selftests/powerpc/ptrace/ptrace-hwbreak.c | 48 ++++++++++++++++++-
> 1 file changed, 46 insertions(+), 2 deletions(-)
>
> diff --git a/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c b/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c
> index fc477dfe86a2..2e0d86e0687e 100644
> --- a/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c
> +++ b/tools/testing/selftests/powerpc/ptrace/ptrace-hwbreak.c
> @@ -20,6 +20,8 @@
> #include <signal.h>
> #include <sys/types.h>
> #include <sys/wait.h>
> +#include <sys/syscall.h>
> +#include <linux/limits.h>
> #include "ptrace.h"
>
> #define SPRN_PVR 0x11F
> @@ -44,6 +46,7 @@ struct gstruct {
> };
> static volatile struct gstruct gstruct __attribute__((aligned(512)));
>
> +static volatile char cwd[PATH_MAX] __attribute__((aligned(8)));
>
> static void get_dbginfo(pid_t child_pid, struct ppc_debug_info *dbginfo)
> {
> @@ -138,6 +141,9 @@ static void test_workload(void)
> write_var(len);
> }
>
> + /* PTRACE_SET_DEBUGREG, Kernel Access Userspace test */
> + syscall(__NR_getcwd, &cwd, PATH_MAX);
> +
> /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, WO test */
> write_var(1);
>
> @@ -150,6 +156,9 @@ static void test_workload(void)
> else
> read_var(1);
>
> + /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace test */
> + syscall(__NR_getcwd, &cwd, PATH_MAX);
> +
> /* PPC_PTRACE_SETHWDEBUG, MODE_RANGE, DW ALIGNED, WO test */
> gstruct.a[rand() % A_LEN] = 'a';
>
> @@ -293,6 +302,24 @@ static int test_set_debugreg(pid_t child_pid)
> return 0;
> }
>
> +static int test_set_debugreg_kernel_userspace(pid_t child_pid)
> +{
> + unsigned long wp_addr = (unsigned long)cwd;
> + char *name = "PTRACE_SET_DEBUGREG";
> +
> + /* PTRACE_SET_DEBUGREG, Kernel Access Userspace test */
> + wp_addr &= ~0x7UL;
> + wp_addr |= (1Ul << DABR_READ_SHIFT);
> + wp_addr |= (1UL << DABR_WRITE_SHIFT);
> + wp_addr |= (1UL << DABR_TRANSLATION_SHIFT);
> + ptrace_set_debugreg(child_pid, wp_addr);
> + ptrace(PTRACE_CONT, child_pid, NULL, 0);
> + check_success(child_pid, name, "Kernel Access Userspace", wp_addr, 8);
> +
> + ptrace_set_debugreg(child_pid, 0);
> + return 0;
> +}
> +
> static void get_ppc_hw_breakpoint(struct ppc_hw_breakpoint *info, int type,
> unsigned long addr, int len)
> {
> @@ -338,6 +365,22 @@ static void test_sethwdebug_exact(pid_t child_pid)
> ptrace_delhwdebug(child_pid, wh);
> }
>
> +static void test_sethwdebug_exact_kernel_userspace(pid_t child_pid)
> +{
> + struct ppc_hw_breakpoint info;
> + unsigned long wp_addr = (unsigned long)&cwd;
> + char *name = "PPC_PTRACE_SETHWDEBUG, MODE_EXACT";
> + int len = 1; /* hardcoded in kernel */
> + int wh;
> +
> + /* PPC_PTRACE_SETHWDEBUG, MODE_EXACT, Kernel Access Userspace test */
> + get_ppc_hw_breakpoint(&info, PPC_BREAKPOINT_TRIGGER_WRITE, wp_addr, 0);
> + wh = ptrace_sethwdebug(child_pid, &info);
> + ptrace(PTRACE_CONT, child_pid, NULL, 0);
> + check_success(child_pid, name, "Kernel Access Userspace", wp_addr, len);
> + ptrace_delhwdebug(child_pid, wh);
> +}
> +
> static void test_sethwdebug_range_aligned(pid_t child_pid)
> {
> struct ppc_hw_breakpoint info;
> @@ -452,9 +495,10 @@ static void
> run_tests(pid_t child_pid, struct ppc_debug_info *dbginfo, bool dawr)
> {
> test_set_debugreg(child_pid);
> + test_set_debugreg_kernel_userspace(child_pid);
> + test_sethwdebug_exact(child_pid);
> + test_sethwdebug_exact_kernel_userspace(child_pid);
> if (dbginfo->features & PPC_DEBUG_FEATURE_DATA_BP_RANGE) {
> - test_sethwdebug_exact(child_pid);
> -
> test_sethwdebug_range_aligned(child_pid);
> if (dawr || is_8xx) {
> test_sethwdebug_range_unaligned(child_pid);
>
next prev parent reply other threads:[~2020-09-17 13:48 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-02 4:29 [PATCH v6 0/8] powerpc/watchpoint: Bug fixes plus new feature flag Ravi Bangoria
2020-09-02 4:29 ` [PATCH v6 1/8] powerpc/watchpoint: Fix quarword instruction handling on p10 predecessors Ravi Bangoria
2020-09-17 13:25 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 2/8] powerpc/watchpoint: Fix handling of vector instructions Ravi Bangoria
2020-09-17 13:25 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 3/8] powerpc/watchpoint/ptrace: Fix SETHWDEBUG when CONFIG_HAVE_HW_BREAKPOINT=N Ravi Bangoria
2020-09-17 13:25 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 4/8] powerpc/watchpoint: Move DAWR detection logic outside of hw_breakpoint.c Ravi Bangoria
2020-09-17 13:25 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 5/8] powerpc/watchpoint: Fix exception handling for CONFIG_HAVE_HW_BREAKPOINT=N Ravi Bangoria
2020-09-17 13:25 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 6/8] powerpc/watchpoint: Add hw_len wherever missing Ravi Bangoria
2020-09-17 13:26 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 7/8] powerpc/watchpoint/ptrace: Introduce PPC_DEBUG_FEATURE_DATA_BP_ARCH_31 Ravi Bangoria
2020-09-17 13:26 ` Rogerio Alves
2020-09-02 4:29 ` [PATCH v6 8/8] powerpc/watchpoint/selftests: Tests for kernel accessing user memory Ravi Bangoria
2020-09-17 13:26 ` Rogerio Alves [this message]
2020-09-17 11:27 ` [PATCH v6 0/8] powerpc/watchpoint: Bug fixes plus new feature flag Michael Ellerman
2020-09-17 13:24 ` Rogerio Alves
2020-09-18 8:31 ` Ravi Bangoria
2020-09-18 10:50 ` Michael Ellerman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=05c1b4a3-a0e7-6fcb-171b-1a2e8a99f21d@linux.ibm.com \
--to=rcardoso@linux.ibm.com \
--cc=christophe.leroy@c-s.fr \
--cc=jniethe5@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=mikey@neuling.org \
--cc=mpe@ellerman.id.au \
--cc=naveen.n.rao@linux.vnet.ibm.com \
--cc=paulus@samba.org \
--cc=pedromfc@linux.ibm.com \
--cc=ravi.bangoria@linux.ibm.com \
--cc=rogealve@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).