From patchwork Tue Dec 27 03:08:29 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Kirill A. Shutemov" X-Patchwork-Id: 36759 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp1203843wrt; Mon, 26 Dec 2022 19:22:35 -0800 (PST) X-Google-Smtp-Source: AMrXdXuZX1A5Gpbe7yGIuhvujgLbZBAQ9ms6itujevRjUq0YCTU2ua6/Djv2RHpLFe17aUfVBFwk X-Received: by 2002:a17:907:c007:b0:7ad:f165:70c2 with SMTP id ss7-20020a170907c00700b007adf16570c2mr24515024ejc.27.1672111355364; Mon, 26 Dec 2022 19:22:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672111355; cv=none; d=google.com; s=arc-20160816; b=mNtf/9tIxs24Hr7UiCPfaiPvtVEBNDn34bHXVtfsRblxaiWtARcN6W9SqKcwP5avLc VjbX+wjNtGhxezGHrmOAGv/rMwlPNe7DgTa3Fojh2hW4JrNeUL75P0IzrHSsutU7OQit TZbsl71x9udSxHcpgt1f+s2rkdaJNfu3gWZMYlxatZTdu4WUzVumxpwV0UUU7uEzcEBZ EuoLo8lhAUC3BK1b0MmmTN306vMVCyBL38ENMHyFcyCQmQ1Pgf5a88luNv58+ty/Ypk/ GVcvNOKIokNqf4HDP6Zh8Xnm543trdvSKXjG4GSrm68SAekytMWFt8h7fEeX6y9rwQTe y1BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=T2ttVOyXwwAKLgSrL6vJ8hGSYqOJwHORhvEqiDZwz3E=; b=Szh4yIwnffkkVXkdfq/+fY+KBKaIdxwScmuPf2Vp4N0qbXPf4D69+dyhyDgA6Y/dAA sWieC/6uLqEWiWYYgarTLsjqScPOoggGRDSnyTsgYOQ4Jm99a52GaRA9m6iL+PdMvFXC 0PYwIbln5r2uQQ8WLkQ+S9FMhEdd8zuF1+U61vcHa6z/kQZCHnPYw/S4XPnRBC5sWs5C eQIzjXuWHLnZ2kwGUd3gC2t0scbikdUUHWNJaIrCENCb6mPkxQlVZpB6Z0XmcVav+BTy 3z1/PJYJhFklfHDkbT2f5wFwoAVTSyc3+tlQojMP6XFLGRhIqQyE4fxEKO+J6z1AKkFZ LCtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HOGWHEVx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g10-20020a056402320a00b004829afcb6eesi7790281eda.95.2022.12.26.19.22.11; Mon, 26 Dec 2022 19:22:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HOGWHEVx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231318AbiL0DJ5 (ORCPT + 99 others); Mon, 26 Dec 2022 22:09:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230090AbiL0DJI (ORCPT ); Mon, 26 Dec 2022 22:09:08 -0500 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 706EB60EA for ; Mon, 26 Dec 2022 19:08:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672110537; x=1703646537; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=W/1WmzpYknIw+qctuMHiI9dXZs4L/e/XIgoQK8Su5Ss=; b=HOGWHEVxQOTyrWUwzz1njDmCUAOPz/vPcNSyg/RkjdTzKAFf1qZf+L8h QSdMZ4OtaCcw+YAehr5f+OlSfGbdfJIelji67bwQQzxtPs6fwalwLeJ5M PYFPQT6TafwGEmhP0riyU2t2mJS/9Vi1fqtheJVo23+NsRQAVKGE5led/ i+AQL39StC2fSoXrOT/cTZ9dfpUakATwAtQDTeiREue6Q2nsRQGQ4Gw5P sAVXTzX8j/PNvRSWQ+kdGPjktuas8GOqqX4hXQ001Tn+cjI7pxFP1JTM+ AjOwWsuBsjOSANu3qSSDSBvOUFyJnOhF1Qiq44Ec1HosKKR1ph87G+MSV w==; X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="300994737" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="300994737" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 19:08:57 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="741605234" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="741605234" Received: from ppogotov-mobl.ger.corp.intel.com (HELO box.shutemov.name) ([10.252.62.152]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 19:08:52 -0800 Received: by box.shutemov.name (Postfix, from userid 1000) id 2DC6210BBBD; Tue, 27 Dec 2022 06:08:37 +0300 (+03) From: "Kirill A. Shutemov" To: Dave Hansen , Andy Lutomirski , Peter Zijlstra Cc: x86@kernel.org, Kostya Serebryany , Andrey Ryabinin , Andrey Konovalov , Alexander Potapenko , Taras Madan , Dmitry Vyukov , "H . J . Lu" , Andi Kleen , Rick Edgecombe , Bharata B Rao , Jacob Pan , Ashok Raj , Linus Torvalds , linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCHv13 16/16] selftests/x86/lam: Add test cases for LAM vs thread creation Date: Tue, 27 Dec 2022 06:08:29 +0300 Message-Id: <20221227030829.12508-17-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.38.2 In-Reply-To: <20221227030829.12508-1-kirill.shutemov@linux.intel.com> References: <20221227030829.12508-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1753335836414823685?= X-GMAIL-MSGID: =?utf-8?q?1753335836414823685?= LAM enabling is only allowed when the process has single thread. LAM mode is inherited into child thread. Trying to enable LAM after spawning a thread has to fail. Signed-off-by: Kirill A. Shutemov --- tools/testing/selftests/x86/lam.c | 92 +++++++++++++++++++++++++++++++ 1 file changed, 92 insertions(+) diff --git a/tools/testing/selftests/x86/lam.c b/tools/testing/selftests/x86/lam.c index 52a876a7ccb8..93e6089164b6 100644 --- a/tools/testing/selftests/x86/lam.c +++ b/tools/testing/selftests/x86/lam.c @@ -1,4 +1,5 @@ // SPDX-License-Identifier: GPL-2.0 +#define _GNU_SOURCE #include #include #include @@ -12,6 +13,7 @@ #include #include #include +#include #include #include @@ -50,6 +52,8 @@ #define PAGE_SIZE (4 << 10) +#define STACK_SIZE 65536 + #define barrier() ({ \ __asm__ __volatile__("" : : : "memory"); \ }) @@ -731,6 +735,75 @@ static int handle_inheritance(struct testcases *test) return 0; } +static int thread_fn_get_lam(void *arg) +{ + return get_lam(); +} + +static int thread_fn_set_lam(void *arg) +{ + struct testcases *test = arg; + + return set_lam(test->lam); +} + +static int handle_thread(struct testcases *test) +{ + char stack[STACK_SIZE]; + int ret, child_ret; + int lam = 0; + pid_t pid; + + /* Set LAM mode in parent process */ + if (!test->later) { + lam = test->lam; + if (set_lam(lam) != 0) + return 1; + } + + pid = clone(thread_fn_get_lam, stack + STACK_SIZE, + SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, NULL); + if (pid < 0) { + perror("Clone failed."); + return 1; + } + + waitpid(pid, &child_ret, 0); + ret = WEXITSTATUS(child_ret); + + if (lam != ret) + return 1; + + if (test->later) { + if (set_lam(test->lam) != 0) + return 1; + } + + return 0; +} + +static int handle_thread_enable(struct testcases *test) +{ + char stack[STACK_SIZE]; + int ret, child_ret; + int lam = test->lam; + pid_t pid; + + pid = clone(thread_fn_set_lam, stack + STACK_SIZE, + SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, test); + if (pid < 0) { + perror("Clone failed."); + return 1; + } + + waitpid(pid, &child_ret, 0); + ret = WEXITSTATUS(child_ret); + + if (lam != ret) + return 1; + + return 0; +} static void run_test(struct testcases *test, int count) { int i, ret = 0; @@ -846,6 +919,25 @@ static struct testcases inheritance_cases[] = { .test_func = handle_inheritance, .msg = "FORK: LAM_U57, child process should get LAM mode same as parent\n", }, + { + .expected = 0, + .lam = LAM_U57_BITS, + .test_func = handle_thread, + .msg = "THREAD: LAM_U57, child thread should get LAM mode same as parent\n", + }, + { + .expected = 1, + .lam = LAM_U57_BITS, + .test_func = handle_thread_enable, + .msg = "THREAD: [NEGATIVE] Enable LAM in child.\n", + }, + { + .expected = 1, + .later = 1, + .lam = LAM_U57_BITS, + .test_func = handle_thread, + .msg = "THREAD: [NEGATIVE] Enable LAM in parent after thread created.\n", + }, { .expected = 0, .lam = LAM_U57_BITS,