xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/breakpoints/breakpoint_test_arm64.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright (C) 2016 Google, Inc.
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Original Code by Pavel Labath <labath@google.com>
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  * Code modified by Pratyush Anand <panand@redhat.com>
8*4882a593Smuzhiyun  * for testing different byte select for each access size.
9*4882a593Smuzhiyun  */
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #define _GNU_SOURCE
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun #include <asm/ptrace.h>
14*4882a593Smuzhiyun #include <sys/types.h>
15*4882a593Smuzhiyun #include <sys/wait.h>
16*4882a593Smuzhiyun #include <sys/ptrace.h>
17*4882a593Smuzhiyun #include <sys/param.h>
18*4882a593Smuzhiyun #include <sys/uio.h>
19*4882a593Smuzhiyun #include <stdint.h>
20*4882a593Smuzhiyun #include <stdbool.h>
21*4882a593Smuzhiyun #include <stddef.h>
22*4882a593Smuzhiyun #include <string.h>
23*4882a593Smuzhiyun #include <stdio.h>
24*4882a593Smuzhiyun #include <unistd.h>
25*4882a593Smuzhiyun #include <elf.h>
26*4882a593Smuzhiyun #include <errno.h>
27*4882a593Smuzhiyun #include <signal.h>
28*4882a593Smuzhiyun 
29*4882a593Smuzhiyun #include "../kselftest.h"
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun static volatile uint8_t var[96] __attribute__((__aligned__(32)));
32*4882a593Smuzhiyun 
child(int size,int wr)33*4882a593Smuzhiyun static void child(int size, int wr)
34*4882a593Smuzhiyun {
35*4882a593Smuzhiyun 	volatile uint8_t *addr = &var[32 + wr];
36*4882a593Smuzhiyun 
37*4882a593Smuzhiyun 	if (ptrace(PTRACE_TRACEME, 0, NULL, NULL) != 0) {
38*4882a593Smuzhiyun 		ksft_print_msg(
39*4882a593Smuzhiyun 			"ptrace(PTRACE_TRACEME) failed: %s\n",
40*4882a593Smuzhiyun 			strerror(errno));
41*4882a593Smuzhiyun 		_exit(1);
42*4882a593Smuzhiyun 	}
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun 	if (raise(SIGSTOP) != 0) {
45*4882a593Smuzhiyun 		ksft_print_msg(
46*4882a593Smuzhiyun 			"raise(SIGSTOP) failed: %s\n", strerror(errno));
47*4882a593Smuzhiyun 		_exit(1);
48*4882a593Smuzhiyun 	}
49*4882a593Smuzhiyun 
50*4882a593Smuzhiyun 	if ((uintptr_t) addr % size) {
51*4882a593Smuzhiyun 		ksft_print_msg(
52*4882a593Smuzhiyun 			 "Wrong address write for the given size: %s\n",
53*4882a593Smuzhiyun 			 strerror(errno));
54*4882a593Smuzhiyun 		_exit(1);
55*4882a593Smuzhiyun 	}
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun 	switch (size) {
58*4882a593Smuzhiyun 	case 1:
59*4882a593Smuzhiyun 		*addr = 47;
60*4882a593Smuzhiyun 		break;
61*4882a593Smuzhiyun 	case 2:
62*4882a593Smuzhiyun 		*(uint16_t *)addr = 47;
63*4882a593Smuzhiyun 		break;
64*4882a593Smuzhiyun 	case 4:
65*4882a593Smuzhiyun 		*(uint32_t *)addr = 47;
66*4882a593Smuzhiyun 		break;
67*4882a593Smuzhiyun 	case 8:
68*4882a593Smuzhiyun 		*(uint64_t *)addr = 47;
69*4882a593Smuzhiyun 		break;
70*4882a593Smuzhiyun 	case 16:
71*4882a593Smuzhiyun 		__asm__ volatile ("stp x29, x30, %0" : "=m" (addr[0]));
72*4882a593Smuzhiyun 		break;
73*4882a593Smuzhiyun 	case 32:
74*4882a593Smuzhiyun 		__asm__ volatile ("stp q29, q30, %0" : "=m" (addr[0]));
75*4882a593Smuzhiyun 		break;
76*4882a593Smuzhiyun 	}
77*4882a593Smuzhiyun 
78*4882a593Smuzhiyun 	_exit(0);
79*4882a593Smuzhiyun }
80*4882a593Smuzhiyun 
set_watchpoint(pid_t pid,int size,int wp)81*4882a593Smuzhiyun static bool set_watchpoint(pid_t pid, int size, int wp)
82*4882a593Smuzhiyun {
83*4882a593Smuzhiyun 	const volatile uint8_t *addr = &var[32 + wp];
84*4882a593Smuzhiyun 	const int offset = (uintptr_t)addr % 8;
85*4882a593Smuzhiyun 	const unsigned int byte_mask = ((1 << size) - 1) << offset;
86*4882a593Smuzhiyun 	const unsigned int type = 2; /* Write */
87*4882a593Smuzhiyun 	const unsigned int enable = 1;
88*4882a593Smuzhiyun 	const unsigned int control = byte_mask << 5 | type << 3 | enable;
89*4882a593Smuzhiyun 	struct user_hwdebug_state dreg_state;
90*4882a593Smuzhiyun 	struct iovec iov;
91*4882a593Smuzhiyun 
92*4882a593Smuzhiyun 	memset(&dreg_state, 0, sizeof(dreg_state));
93*4882a593Smuzhiyun 	dreg_state.dbg_regs[0].addr = (uintptr_t)(addr - offset);
94*4882a593Smuzhiyun 	dreg_state.dbg_regs[0].ctrl = control;
95*4882a593Smuzhiyun 	iov.iov_base = &dreg_state;
96*4882a593Smuzhiyun 	iov.iov_len = offsetof(struct user_hwdebug_state, dbg_regs) +
97*4882a593Smuzhiyun 				sizeof(dreg_state.dbg_regs[0]);
98*4882a593Smuzhiyun 	if (ptrace(PTRACE_SETREGSET, pid, NT_ARM_HW_WATCH, &iov) == 0)
99*4882a593Smuzhiyun 		return true;
100*4882a593Smuzhiyun 
101*4882a593Smuzhiyun 	if (errno == EIO)
102*4882a593Smuzhiyun 		ksft_print_msg(
103*4882a593Smuzhiyun 			"ptrace(PTRACE_SETREGSET, NT_ARM_HW_WATCH) not supported on this hardware: %s\n",
104*4882a593Smuzhiyun 			strerror(errno));
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun 	ksft_print_msg(
107*4882a593Smuzhiyun 		"ptrace(PTRACE_SETREGSET, NT_ARM_HW_WATCH) failed: %s\n",
108*4882a593Smuzhiyun 		strerror(errno));
109*4882a593Smuzhiyun 	return false;
110*4882a593Smuzhiyun }
111*4882a593Smuzhiyun 
run_test(int wr_size,int wp_size,int wr,int wp)112*4882a593Smuzhiyun static bool run_test(int wr_size, int wp_size, int wr, int wp)
113*4882a593Smuzhiyun {
114*4882a593Smuzhiyun 	int status;
115*4882a593Smuzhiyun 	siginfo_t siginfo;
116*4882a593Smuzhiyun 	pid_t pid = fork();
117*4882a593Smuzhiyun 	pid_t wpid;
118*4882a593Smuzhiyun 
119*4882a593Smuzhiyun 	if (pid < 0) {
120*4882a593Smuzhiyun 		ksft_test_result_fail(
121*4882a593Smuzhiyun 			"fork() failed: %s\n", strerror(errno));
122*4882a593Smuzhiyun 		return false;
123*4882a593Smuzhiyun 	}
124*4882a593Smuzhiyun 	if (pid == 0)
125*4882a593Smuzhiyun 		child(wr_size, wr);
126*4882a593Smuzhiyun 
127*4882a593Smuzhiyun 	wpid = waitpid(pid, &status, __WALL);
128*4882a593Smuzhiyun 	if (wpid != pid) {
129*4882a593Smuzhiyun 		ksft_print_msg(
130*4882a593Smuzhiyun 			"waitpid() failed: %s\n", strerror(errno));
131*4882a593Smuzhiyun 		return false;
132*4882a593Smuzhiyun 	}
133*4882a593Smuzhiyun 	if (!WIFSTOPPED(status)) {
134*4882a593Smuzhiyun 		ksft_print_msg(
135*4882a593Smuzhiyun 			"child did not stop: %s\n", strerror(errno));
136*4882a593Smuzhiyun 		return false;
137*4882a593Smuzhiyun 	}
138*4882a593Smuzhiyun 	if (WSTOPSIG(status) != SIGSTOP) {
139*4882a593Smuzhiyun 		ksft_print_msg("child did not stop with SIGSTOP\n");
140*4882a593Smuzhiyun 		return false;
141*4882a593Smuzhiyun 	}
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun 	if (!set_watchpoint(pid, wp_size, wp))
144*4882a593Smuzhiyun 		return false;
145*4882a593Smuzhiyun 
146*4882a593Smuzhiyun 	if (ptrace(PTRACE_CONT, pid, NULL, NULL) < 0) {
147*4882a593Smuzhiyun 		ksft_print_msg(
148*4882a593Smuzhiyun 			"ptrace(PTRACE_SINGLESTEP) failed: %s\n",
149*4882a593Smuzhiyun 			strerror(errno));
150*4882a593Smuzhiyun 		return false;
151*4882a593Smuzhiyun 	}
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun 	alarm(3);
154*4882a593Smuzhiyun 	wpid = waitpid(pid, &status, __WALL);
155*4882a593Smuzhiyun 	if (wpid != pid) {
156*4882a593Smuzhiyun 		ksft_print_msg(
157*4882a593Smuzhiyun 			"waitpid() failed: %s\n", strerror(errno));
158*4882a593Smuzhiyun 		return false;
159*4882a593Smuzhiyun 	}
160*4882a593Smuzhiyun 	alarm(0);
161*4882a593Smuzhiyun 	if (WIFEXITED(status)) {
162*4882a593Smuzhiyun 		ksft_print_msg("child did not single-step\n");
163*4882a593Smuzhiyun 		return false;
164*4882a593Smuzhiyun 	}
165*4882a593Smuzhiyun 	if (!WIFSTOPPED(status)) {
166*4882a593Smuzhiyun 		ksft_print_msg("child did not stop\n");
167*4882a593Smuzhiyun 		return false;
168*4882a593Smuzhiyun 	}
169*4882a593Smuzhiyun 	if (WSTOPSIG(status) != SIGTRAP) {
170*4882a593Smuzhiyun 		ksft_print_msg("child did not stop with SIGTRAP\n");
171*4882a593Smuzhiyun 		return false;
172*4882a593Smuzhiyun 	}
173*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETSIGINFO, pid, NULL, &siginfo) != 0) {
174*4882a593Smuzhiyun 		ksft_print_msg(
175*4882a593Smuzhiyun 			"ptrace(PTRACE_GETSIGINFO): %s\n",
176*4882a593Smuzhiyun 			strerror(errno));
177*4882a593Smuzhiyun 		return false;
178*4882a593Smuzhiyun 	}
179*4882a593Smuzhiyun 	if (siginfo.si_code != TRAP_HWBKPT) {
180*4882a593Smuzhiyun 		ksft_print_msg(
181*4882a593Smuzhiyun 			"Unexpected si_code %d\n", siginfo.si_code);
182*4882a593Smuzhiyun 		return false;
183*4882a593Smuzhiyun 	}
184*4882a593Smuzhiyun 
185*4882a593Smuzhiyun 	kill(pid, SIGKILL);
186*4882a593Smuzhiyun 	wpid = waitpid(pid, &status, 0);
187*4882a593Smuzhiyun 	if (wpid != pid) {
188*4882a593Smuzhiyun 		ksft_print_msg(
189*4882a593Smuzhiyun 			"waitpid() failed: %s\n", strerror(errno));
190*4882a593Smuzhiyun 		return false;
191*4882a593Smuzhiyun 	}
192*4882a593Smuzhiyun 	return true;
193*4882a593Smuzhiyun }
194*4882a593Smuzhiyun 
sigalrm(int sig)195*4882a593Smuzhiyun static void sigalrm(int sig)
196*4882a593Smuzhiyun {
197*4882a593Smuzhiyun }
198*4882a593Smuzhiyun 
main(int argc,char ** argv)199*4882a593Smuzhiyun int main(int argc, char **argv)
200*4882a593Smuzhiyun {
201*4882a593Smuzhiyun 	int opt;
202*4882a593Smuzhiyun 	bool succeeded = true;
203*4882a593Smuzhiyun 	struct sigaction act;
204*4882a593Smuzhiyun 	int wr, wp, size;
205*4882a593Smuzhiyun 	bool result;
206*4882a593Smuzhiyun 
207*4882a593Smuzhiyun 	ksft_print_header();
208*4882a593Smuzhiyun 	ksft_set_plan(213);
209*4882a593Smuzhiyun 
210*4882a593Smuzhiyun 	act.sa_handler = sigalrm;
211*4882a593Smuzhiyun 	sigemptyset(&act.sa_mask);
212*4882a593Smuzhiyun 	act.sa_flags = 0;
213*4882a593Smuzhiyun 	sigaction(SIGALRM, &act, NULL);
214*4882a593Smuzhiyun 	for (size = 1; size <= 32; size = size*2) {
215*4882a593Smuzhiyun 		for (wr = 0; wr <= 32; wr = wr + size) {
216*4882a593Smuzhiyun 			for (wp = wr - size; wp <= wr + size; wp = wp + size) {
217*4882a593Smuzhiyun 				result = run_test(size, MIN(size, 8), wr, wp);
218*4882a593Smuzhiyun 				if ((result && wr == wp) ||
219*4882a593Smuzhiyun 				    (!result && wr != wp))
220*4882a593Smuzhiyun 					ksft_test_result_pass(
221*4882a593Smuzhiyun 						"Test size = %d write offset = %d watchpoint offset = %d\n",
222*4882a593Smuzhiyun 						size, wr, wp);
223*4882a593Smuzhiyun 				else {
224*4882a593Smuzhiyun 					ksft_test_result_fail(
225*4882a593Smuzhiyun 						"Test size = %d write offset = %d watchpoint offset = %d\n",
226*4882a593Smuzhiyun 						size, wr, wp);
227*4882a593Smuzhiyun 					succeeded = false;
228*4882a593Smuzhiyun 				}
229*4882a593Smuzhiyun 			}
230*4882a593Smuzhiyun 		}
231*4882a593Smuzhiyun 	}
232*4882a593Smuzhiyun 
233*4882a593Smuzhiyun 	for (size = 1; size <= 32; size = size*2) {
234*4882a593Smuzhiyun 		if (run_test(size, 8, -size, -8))
235*4882a593Smuzhiyun 			ksft_test_result_pass(
236*4882a593Smuzhiyun 				"Test size = %d write offset = %d watchpoint offset = -8\n",
237*4882a593Smuzhiyun 				size, -size);
238*4882a593Smuzhiyun 		else {
239*4882a593Smuzhiyun 			ksft_test_result_fail(
240*4882a593Smuzhiyun 				"Test size = %d write offset = %d watchpoint offset = -8\n",
241*4882a593Smuzhiyun 				size, -size);
242*4882a593Smuzhiyun 			succeeded = false;
243*4882a593Smuzhiyun 		}
244*4882a593Smuzhiyun 	}
245*4882a593Smuzhiyun 
246*4882a593Smuzhiyun 	if (succeeded)
247*4882a593Smuzhiyun 		ksft_exit_pass();
248*4882a593Smuzhiyun 	else
249*4882a593Smuzhiyun 		ksft_exit_fail();
250*4882a593Smuzhiyun }
251