From patchwork Sun Mar 12 11:26:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Kirill A. Shutemov" X-Patchwork-Id: 68281 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:5915:0:0:0:0:0 with SMTP id v21csp677309wrd; Sun, 12 Mar 2023 04:36:40 -0700 (PDT) X-Google-Smtp-Source: AK7set89mHbxf7XlvTi/bLOmcrtWhcbOmgb8ApcHaK00i8SzQbycHcSDthtfqGppQeLtGpAgv4FP X-Received: by 2002:a17:90b:4d07:b0:237:ae98:a47f with SMTP id mw7-20020a17090b4d0700b00237ae98a47fmr7539135pjb.1.1678621000301; Sun, 12 Mar 2023 04:36:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1678621000; cv=none; d=google.com; s=arc-20160816; b=zZane/jIrgOHpS1AC19qtmqT/1lX11LaQI8Iu6e+43evwwHxbyRAVmBWFCpzmNn9hZ XYu16Irc4cqj/vGeykVuCOGmi5Bd7/+tgvK4WzlF7E6C8FLHBQM/+NiqrxOXzdLgMtHq R2gUIsXbGotv0p6oaczJ/PseLnGcE+X2y3Yo/LiezySZ6p093fu17PLJW6u1FQh7+BHO JIVlvYHpQo2Z7CdPAtOML+5rhPD2387DBueHXxIbznMY+3tP4ceTdc1/NXwWYcpv/xaH RAMLE44Ddb8b6W2kuQi1UJuSmgHPF9LGeG1HvcaLVvFTO2wb0DQCW3v0cx9qAPWqjzZd FPpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OZUQfYUiRxDD4yajdfiAuzpHqN59m/bqizk0pX5fkM8=; b=e9RHDCAKKN+IkMqYbbW6A6g7zsVVORyvWQsYpVSvTU2mNnFk37BOgDJynMk+SHOA/o RHK9yahFTLAmEbSIJT2auuxbjtFR/btm465tB+fsxl1IRviL3vmhhgkot5ZwFWJpQx1r JKUTpnwp3qzG0ilpz7lK0K5ixHEro/Iqs2faOrquTylEaf7+0tNpbUBVQWSGyD6HO/8K 09UzvVLiuzpvRxrVCspZEPAw6J9g1b4jzEdM8q1X/oUM3oEUmlwCwyiFC5ORAIrQYdQ4 4TSQuOLFOFlpXFfhls1xdnJOCbSECe1InEEAvq+u0kEzkPJetfKFH2b3Z54sNrZ3Z5ze zpkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mrUT0a6s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q10-20020a17090a9f4a00b00233ce098f21si4108165pjv.135.2023.03.12.04.36.28; Sun, 12 Mar 2023 04:36:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mrUT0a6s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229915AbjCLL2n (ORCPT + 99 others); Sun, 12 Mar 2023 07:28:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37592 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230443AbjCLL2H (ORCPT ); Sun, 12 Mar 2023 07:28:07 -0400 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73CC352F61 for ; Sun, 12 Mar 2023 04:27:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1678620456; x=1710156456; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=oTU4sxTXYKtAIVLwPW8AIWDYdktjaL52nQvpCjw3OeY=; b=mrUT0a6seE1VgRg1wfT2i0V+0C33nYPJn+MGiH1EZAtCAGc2bb4rFECi yzv5Cf567Y1PnChjK308EGUSm4tsCFvxyVmq9oXxLkeEVToAkl1MgtB9W fwNWpUBnYH++SMsmLRdarlZajOV0yAW27tyo0sHKPHsOUcQrCV0/HVnjF 7Bv8hrVgbwlFC5EcnMb7jRRLiJiqEAIXl2gvWraPpWCWmeTGLCG/tBvZH ySlycjyc+fvWaNjloKrIesRlkDS0TrLHX8Rr/bVW5MxnEXyBQaFiqoEkf qKR3bAbWcVbZArLjBSj7fuhRgNt6tCgGHthTsWRLXCx4BRqJTvlRG7hMe g==; X-IronPort-AV: E=McAfee;i="6500,9779,10646"; a="399577656" X-IronPort-AV: E=Sophos;i="5.98,254,1673942400"; d="scan'208";a="399577656" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Mar 2023 04:26:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10646"; a="671580755" X-IronPort-AV: E=Sophos;i="5.98,254,1673942400"; d="scan'208";a="671580755" Received: from nmoazzen-mobl1.amr.corp.intel.com (HELO box.shutemov.name) ([10.251.219.215]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Mar 2023 04:26:38 -0700 Received: by box.shutemov.name (Postfix, from userid 1000) id 0BE2910D7BF; Sun, 12 Mar 2023 14:26:20 +0300 (+03) From: "Kirill A. Shutemov" To: Dave Hansen , Andy Lutomirski , Peter Zijlstra Cc: x86@kernel.org, Kostya Serebryany , Andrey Ryabinin , Andrey Konovalov , Alexander Potapenko , Taras Madan , Dmitry Vyukov , "H . J . Lu" , Andi Kleen , Rick Edgecombe , Bharata B Rao , Jacob Pan , Ashok Raj , Linus Torvalds , linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCHv16 17/17] selftests/x86/lam: Add test cases for LAM vs thread creation Date: Sun, 12 Mar 2023 14:26:12 +0300 Message-Id: <20230312112612.31869-18-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230312112612.31869-1-kirill.shutemov@linux.intel.com> References: <20230312112612.31869-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1760161693985973828?= X-GMAIL-MSGID: =?utf-8?q?1760161693985973828?= LAM enabling is only allowed when the process has single thread. LAM mode is inherited into child thread. Trying to enable LAM after spawning a thread has to fail. Signed-off-by: Kirill A. Shutemov Acked-by: Peter Zijlstra (Intel) --- tools/testing/selftests/x86/lam.c | 92 +++++++++++++++++++++++++++++++ 1 file changed, 92 insertions(+) diff --git a/tools/testing/selftests/x86/lam.c b/tools/testing/selftests/x86/lam.c index a8c91829b616..eb0e46905bf9 100644 --- a/tools/testing/selftests/x86/lam.c +++ b/tools/testing/selftests/x86/lam.c @@ -1,4 +1,5 @@ // SPDX-License-Identifier: GPL-2.0 +#define _GNU_SOURCE #include #include #include @@ -12,6 +13,7 @@ #include #include #include +#include #include #include @@ -50,6 +52,8 @@ #define PAGE_SIZE (4 << 10) +#define STACK_SIZE 65536 + #define barrier() ({ \ __asm__ __volatile__("" : : : "memory"); \ }) @@ -731,6 +735,75 @@ static int handle_inheritance(struct testcases *test) return 0; } +static int thread_fn_get_lam(void *arg) +{ + return get_lam(); +} + +static int thread_fn_set_lam(void *arg) +{ + struct testcases *test = arg; + + return set_lam(test->lam); +} + +static int handle_thread(struct testcases *test) +{ + char stack[STACK_SIZE]; + int ret, child_ret; + int lam = 0; + pid_t pid; + + /* Set LAM mode in parent process */ + if (!test->later) { + lam = test->lam; + if (set_lam(lam) != 0) + return 1; + } + + pid = clone(thread_fn_get_lam, stack + STACK_SIZE, + SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, NULL); + if (pid < 0) { + perror("Clone failed."); + return 1; + } + + waitpid(pid, &child_ret, 0); + ret = WEXITSTATUS(child_ret); + + if (lam != ret) + return 1; + + if (test->later) { + if (set_lam(test->lam) != 0) + return 1; + } + + return 0; +} + +static int handle_thread_enable(struct testcases *test) +{ + char stack[STACK_SIZE]; + int ret, child_ret; + int lam = test->lam; + pid_t pid; + + pid = clone(thread_fn_set_lam, stack + STACK_SIZE, + SIGCHLD | CLONE_FILES | CLONE_FS | CLONE_VM, test); + if (pid < 0) { + perror("Clone failed."); + return 1; + } + + waitpid(pid, &child_ret, 0); + ret = WEXITSTATUS(child_ret); + + if (lam != ret) + return 1; + + return 0; +} static void run_test(struct testcases *test, int count) { int i, ret = 0; @@ -846,6 +919,25 @@ static struct testcases inheritance_cases[] = { .test_func = handle_inheritance, .msg = "FORK: LAM_U57, child process should get LAM mode same as parent\n", }, + { + .expected = 0, + .lam = LAM_U57_BITS, + .test_func = handle_thread, + .msg = "THREAD: LAM_U57, child thread should get LAM mode same as parent\n", + }, + { + .expected = 1, + .lam = LAM_U57_BITS, + .test_func = handle_thread_enable, + .msg = "THREAD: [NEGATIVE] Enable LAM in child.\n", + }, + { + .expected = 1, + .later = 1, + .lam = LAM_U57_BITS, + .test_func = handle_thread, + .msg = "THREAD: [NEGATIVE] Enable LAM in parent after thread created.\n", + }, { .expected = 0, .lam = LAM_U57_BITS,