xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/security/flush_utils.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0+
2*4882a593Smuzhiyun 
3*4882a593Smuzhiyun /*
4*4882a593Smuzhiyun  * Copyright 2018 IBM Corporation.
5*4882a593Smuzhiyun  */
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun #define __SANE_USERSPACE_TYPES__
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun #include <sys/types.h>
10*4882a593Smuzhiyun #include <stdint.h>
11*4882a593Smuzhiyun #include <unistd.h>
12*4882a593Smuzhiyun #include <signal.h>
13*4882a593Smuzhiyun #include <stdlib.h>
14*4882a593Smuzhiyun #include <string.h>
15*4882a593Smuzhiyun #include <stdio.h>
16*4882a593Smuzhiyun #include "utils.h"
17*4882a593Smuzhiyun #include "flush_utils.h"
18*4882a593Smuzhiyun 
load(void * addr)19*4882a593Smuzhiyun static inline __u64 load(void *addr)
20*4882a593Smuzhiyun {
21*4882a593Smuzhiyun 	__u64 tmp;
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun 	asm volatile("ld %0,0(%1)" : "=r"(tmp) : "b"(addr));
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun 	return tmp;
26*4882a593Smuzhiyun }
27*4882a593Smuzhiyun 
syscall_loop(char * p,unsigned long iterations,unsigned long zero_size)28*4882a593Smuzhiyun void syscall_loop(char *p, unsigned long iterations,
29*4882a593Smuzhiyun 		  unsigned long zero_size)
30*4882a593Smuzhiyun {
31*4882a593Smuzhiyun 	for (unsigned long i = 0; i < iterations; i++) {
32*4882a593Smuzhiyun 		for (unsigned long j = 0; j < zero_size; j += CACHELINE_SIZE)
33*4882a593Smuzhiyun 			load(p + j);
34*4882a593Smuzhiyun 		getppid();
35*4882a593Smuzhiyun 	}
36*4882a593Smuzhiyun }
37*4882a593Smuzhiyun 
sigill_handler(int signr,siginfo_t * info,void * unused)38*4882a593Smuzhiyun static void sigill_handler(int signr, siginfo_t *info, void *unused)
39*4882a593Smuzhiyun {
40*4882a593Smuzhiyun 	static int warned;
41*4882a593Smuzhiyun 	ucontext_t *ctx = (ucontext_t *)unused;
42*4882a593Smuzhiyun 	unsigned long *pc = &UCONTEXT_NIA(ctx);
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun 	/* mtspr 3,RS to check for move to DSCR below */
45*4882a593Smuzhiyun 	if ((*((unsigned int *)*pc) & 0xfc1fffff) == 0x7c0303a6) {
46*4882a593Smuzhiyun 		if (!warned++)
47*4882a593Smuzhiyun 			printf("WARNING: Skipping over dscr setup. Consider running 'ppc64_cpu --dscr=1' manually.\n");
48*4882a593Smuzhiyun 		*pc += 4;
49*4882a593Smuzhiyun 	} else {
50*4882a593Smuzhiyun 		printf("SIGILL at %p\n", pc);
51*4882a593Smuzhiyun 		abort();
52*4882a593Smuzhiyun 	}
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun 
set_dscr(unsigned long val)55*4882a593Smuzhiyun void set_dscr(unsigned long val)
56*4882a593Smuzhiyun {
57*4882a593Smuzhiyun 	static int init;
58*4882a593Smuzhiyun 	struct sigaction sa;
59*4882a593Smuzhiyun 
60*4882a593Smuzhiyun 	if (!init) {
61*4882a593Smuzhiyun 		memset(&sa, 0, sizeof(sa));
62*4882a593Smuzhiyun 		sa.sa_sigaction = sigill_handler;
63*4882a593Smuzhiyun 		sa.sa_flags = SA_SIGINFO;
64*4882a593Smuzhiyun 		if (sigaction(SIGILL, &sa, NULL))
65*4882a593Smuzhiyun 			perror("sigill_handler");
66*4882a593Smuzhiyun 		init = 1;
67*4882a593Smuzhiyun 	}
68*4882a593Smuzhiyun 
69*4882a593Smuzhiyun 	asm volatile("mtspr %1,%0" : : "r" (val), "i" (SPRN_DSCR));
70*4882a593Smuzhiyun }
71