From nobody Sun Nov 24 08:50:05 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=linaro.org ARC-Seal: i=1; a=rsa-sha256; t=1726037290; cv=none; d=zohomail.com; s=zohoarc; b=Isqz7j2+TnjNSTThfQYL0LWIorYYivX+ZG50TSNhKtF8A+tXlU1CEUTOgAzCUOBAwSUAsjkBzSAAfu5qiJu26ObTeOWINwwmmCvPVjNzs4b7QNBxUDp/OQVPNeEHl1s9gQTivSbveIPcyiqQaJuQDSL8iEHSEBis8594bwHy/7E= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1726037290; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=xZeJwMfmwPhn6K+eX+cbow6SlfP8ZHC3JgNR1OvZmEk=; b=dA8wcpjMDBNIbNoE+fdHdIHFZWl5Ozpy+2ROgD2y65QfXu1KTnu58erGLsXKUwDCZTFzuOLEyiyOdKEIZ00ioBgKoOdFgL3wFyzBWchoLo12wQuFUUDn8o6iinwDRC3rS6/nvldZOcXa4kBFTe1iP73q0tY1B8YhOiLXSdOdhDg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1726037290196185.277144093806; Tue, 10 Sep 2024 23:48:10 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1soH83-00012Y-6p; Wed, 11 Sep 2024 02:47:03 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1soH7z-0000pF-VG for qemu-devel@nongnu.org; Wed, 11 Sep 2024 02:47:00 -0400 Received: from mail-ej1-x62f.google.com ([2a00:1450:4864:20::62f]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1soH7v-0004Qc-Oz for qemu-devel@nongnu.org; Wed, 11 Sep 2024 02:46:59 -0400 Received: by mail-ej1-x62f.google.com with SMTP id a640c23a62f3a-a8a7b1c2f2bso258175466b.0 for ; Tue, 10 Sep 2024 23:46:55 -0700 (PDT) Received: from draig.lan ([85.9.250.243]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-a8d25c72e7fsm574216166b.109.2024.09.10.23.46.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Sep 2024 23:46:50 -0700 (PDT) Received: from draig.lan (localhost [IPv6:::1]) by draig.lan (Postfix) with ESMTP id 071745FA6C; Wed, 11 Sep 2024 07:46:47 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1726037214; x=1726642014; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=xZeJwMfmwPhn6K+eX+cbow6SlfP8ZHC3JgNR1OvZmEk=; b=WhbFR9gYzHMeY6h4drMsOdw7KS4Xr9bUzIwgAmS8qxklifRnEJuFp6gDQdgEi3Is/G zzf2BA4XvpHc8UgLoeYqw8PfzuFofzhRztplarfpyTEyb3J2gawVe0q0y9wDX3Nhw8+X 6/D9rx8CCyqEV/ikV42JqcWOcRwcJgmWlcU63wVzRPqBcXHTUazMI1spQPRWTgXpeIjy hgGsB3+mmqd3EjFAFkhepU1hKRNGnnYQez5n7kJITYQuUM0balrcOgWCOGnehPcCNKIw GoH+7TCqmFB33F6ZZBW0f/NQqw0NSLC0GJJ16bh+GD+vSd5PVwRAZmxEVVtHXyf6XNe/ 57lg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1726037214; x=1726642014; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=xZeJwMfmwPhn6K+eX+cbow6SlfP8ZHC3JgNR1OvZmEk=; b=CU3qyLJM+UwxJrnb2lcAw14oBRPTK8h1wojPOge5WvjiC4cMmx81tA+SJQ9T2bPa+X 66pf+0hoRVODwdPvvXjUtsDl1bwvEb7SONfJql0AcDrQtS2UejSUUJZc8u13vKXU2PWh h7GzE7St8GhPZQfy/cj92u03W9TbeY+RPnWk9HKEAk2ylogMSPSy7en5086N7SaSwO3r m/knlF+sAMjbYVmPcYJZUr8xYYn8LZLOxZXH6EgCs+qR1VeqfKllqm0/Gdr6ujZdXsz8 PGK522j73wgh/DLhgL6q30tIPc7NbOjsBMSG0bztyHvdC67ZgQ1mUkBbkhY2+Mnq8ua5 fF0A== X-Gm-Message-State: AOJu0YzTGY9RHryal8QbTdVWYnhly+ZW9S6MaaBcF4R3L4LkEQILizph /ZjtNNMkzgVXzh1rU25+Hh5hfoOm+7y3Ga6NLmX12hEqSSSF6l9BDI2QW+qZ3ao= X-Google-Smtp-Source: AGHT+IFoSQqCm4pbznDCYw6MEpHDX/br2JKsEnyQWCV+XPPR4FQNJIPQiNuv3x+OB+j57XxC36BTQg== X-Received: by 2002:a17:907:1c09:b0:a8d:7b7d:8c47 with SMTP id a640c23a62f3a-a9004aba65dmr208943566b.59.1726037213736; Tue, 10 Sep 2024 23:46:53 -0700 (PDT) From: =?UTF-8?q?Alex=20Benn=C3=A9e?= To: qemu-devel@nongnu.org Cc: Gustavo Romero , =?UTF-8?q?Alex=20Benn=C3=A9e?= , Paolo Bonzini , Thomas Huth , Peter Maydell , qemu-arm@nongnu.org (open list:ARM TCG CPUs) Subject: [PULL 10/10] tests/tcg/aarch64: Extend MTE gdbstub tests to system mode Date: Wed, 11 Sep 2024 07:46:45 +0100 Message-Id: <20240911064645.357592-11-alex.bennee@linaro.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240911064645.357592-1-alex.bennee@linaro.org> References: <20240911064645.357592-1-alex.bennee@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::62f; envelope-from=alex.bennee@linaro.org; helo=mail-ej1-x62f.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @linaro.org) X-ZM-MESSAGEID: 1726037290900116600 From: Gustavo Romero Extend MTE gdbstub tests to also run in system mode (share tests between user mode and system mode). The tests will only run if a version of GDB that supports MTE on baremetal is available in the test environment and if available compiler supports the 'memtag' flag (-march=3Darmv8.5-a+memtag). For the tests running in system mode, a page that supports MTE ops. is necessary. Therefore, an MTE-enabled page is made available (mapped) in the third 2 MB chunk of the second 1 GB space in the flat mapping set in boot.S. A new binary, mte.S, is also introduced for the tests. It links against boot.S and is executed by QEMU in system mode. Signed-off-by: Gustavo Romero Message-Id: <20240906143316.657436-6-gustavo.romero@linaro.org> [AJB: fix stray _] Signed-off-by: Alex Benn=C3=A9e Message-Id: <20240910173900.4154726-11-alex.bennee@linaro.org> diff --git a/configure b/configure index 39a284ddfe..7f6eb6b331 100755 --- a/configure +++ b/configure @@ -1679,6 +1679,11 @@ for target in $target_list; do echo "GDB_HAS_MTE=3Dy" >> $config_target_mak fi =20 + if test "${gdb_arches#*aarch64}" !=3D "$gdb_arches" && version_ge $g= db_version 16.0; then + # GDB has to support MTE in baremetal to allow debugging MTE in = QEMU system mode + echo "GDB_SUPPORTS_MTE_IN_BAREMETAL=3Dy" >> $config_target_mak + fi + echo "run-tcg-tests-$target: $qemu\$(EXESUF)" >> Makefile.prereqs tcg_tests_targets=3D"$tcg_tests_targets $target" fi diff --git a/tests/tcg/aarch64/Makefile.softmmu-target b/tests/tcg/aarch64/= Makefile.softmmu-target index 139e04d15f..d08d9b01de 100644 --- a/tests/tcg/aarch64/Makefile.softmmu-target +++ b/tests/tcg/aarch64/Makefile.softmmu-target @@ -2,14 +2,22 @@ # Aarch64 system tests # =20 -AARCH64_SYSTEM_SRC=3D$(SRC_PATH)/tests/tcg/aarch64/system +AARCH64_SRC=3D$(SRC_PATH)/tests/tcg/aarch64 +AARCH64_SYSTEM_SRC=3D$(AARCH64_SRC)/system + VPATH+=3D$(AARCH64_SYSTEM_SRC) =20 # These objects provide the basic boot code and helper functions for all t= ests CRT_OBJS=3Dboot.o =20 -AARCH64_TEST_SRCS=3D$(wildcard $(AARCH64_SYSTEM_SRC)/*.c) -AARCH64_TESTS =3D $(patsubst $(AARCH64_SYSTEM_SRC)/%.c, %, $(AARCH64_TEST_= SRCS)) +AARCH64_TEST_C_SRCS=3D$(wildcard $(AARCH64_SYSTEM_SRC)/*.c) +AARCH64_TEST_S_SRCS=3D$(AARCH64_SYSTEM_SRC)/mte.S + +AARCH64_C_TESTS =3D $(patsubst $(AARCH64_SYSTEM_SRC)/%.c, %, $(AARCH64_TES= T_C_SRCS)) +AARCH64_S_TESTS =3D $(patsubst $(AARCH64_SYSTEM_SRC)/%.S, %, $(AARCH64_TES= T_S_SRCS)) + +AARCH64_TESTS =3D $(AARCH64_C_TESTS) +AARCH64_TESTS +=3D $(AARCH64_S_TESTS) =20 CRT_PATH=3D$(AARCH64_SYSTEM_SRC) LINK_SCRIPT=3D$(AARCH64_SYSTEM_SRC)/kernel.ld @@ -21,7 +29,8 @@ LDFLAGS+=3D-static -nostdlib $(CRT_OBJS) $(MINILIB_OBJS) = -lgcc =20 config-cc.mak: Makefile $(quiet-@)( \ - $(call cc-option,-march=3Darmv8.3-a, CROSS_CC_HAS_ARMV8_3)) 3> config= -cc.mak + $(call cc-option,-march=3Darmv8.3-a, CROSS_CC_HAS_ARMV8_3); \ + $(call cc-option,-march=3Darmv8.5-a+memtag, CROSS_CC_HAS_ARMV8_MTE)) = 3> config-cc.mak -include config-cc.mak =20 # building head blobs @@ -88,3 +97,35 @@ pauth-3: run-pauth-3: $(call skip-test, "RUN of pauth-3", "not built") endif + +ifneq ($(CROSS_CC_HAS_ARMV8_MTE),) +QEMU_MTE_ENABLED_MACHINE=3D-M virt,mte=3Don -cpu max -display none +QEMU_OPTS_WITH_MTE_ON =3D $(QEMU_MTE_ENABLED_MACHINE) $(QEMU_BASE_ARGS) -k= ernel +mte: CFLAGS+=3D-march=3Darmv8.5-a+memtag +mte: mte.S $(LINK_SCRIPT) $(CRT_OBJS) $(MINILIB_OBJS) + $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $< -o $@ $(LDFLAGS) + +run-mte: QEMU_OPTS=3D$(QEMU_OPTS_WITH_MTE_ON) +run-mte: mte + +ifeq ($(GDB_SUPPORTS_MTE_IN_BAREMETAL),y) +run-gdbstub-mte: QEMU_OPTS=3D$(QEMU_OPTS_WITH_MTE_ON) +run-gdbstub-mte: mte + $(call run-test, $@, $(GDB_SCRIPT) \ + --output run-gdbstub-mte.out \ + --gdb $(GDB) \ + --qemu $(QEMU) --qargs "-chardev null$(COMMA)id=3Doutput $(QEMU_OPTS)" \ + --bin $< --test $(AARCH64_SRC)/gdbstub/test-mte.py -- --mode=3Dsystem, \ + gdbstub MTE support) + +EXTRA_RUNS +=3D run-gdbstub-mte +else # !GDB_SUPPORTS_MTE_IN_BAREMETAL +run-gdbstub-mte: + $(call skip-test "RUN of gdbstub-mte", "GDB does not support MTE in barem= etal!") +endif +else # !CROSS_CC_HAS_ARMV8_MTE +mte: + $(call skip-test, "BUILD of $@", "missing compiler support") +run-mte: + $(call skip-test, "RUN of mte", "not build") +endif diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile= .target index 8cc62eb456..9efe2f81ad 100644 --- a/tests/tcg/aarch64/Makefile.target +++ b/tests/tcg/aarch64/Makefile.target @@ -138,7 +138,8 @@ run-gdbstub-mte: mte-8 $(call run-test, $@, $(GDB_SCRIPT) \ --gdb $(GDB) \ --qemu $(QEMU) --qargs "$(QEMU_OPTS)" \ - --bin $< --test $(AARCH64_SRC)/gdbstub/test-mte.py, \ + --bin $< --test $(AARCH64_SRC)/gdbstub/test-mte.py \ + -- --mode=3Duser, \ gdbstub MTE support) =20 EXTRA_RUNS +=3D run-gdbstub-mte diff --git a/tests/tcg/aarch64/gdbstub/test-mte.py b/tests/tcg/aarch64/gdbs= tub/test-mte.py index 66f9c25f8a..a4cae6caa0 100644 --- a/tests/tcg/aarch64/gdbstub/test-mte.py +++ b/tests/tcg/aarch64/gdbstub/test-mte.py @@ -1,21 +1,26 @@ from __future__ import print_function # # Test GDB memory-tag commands that exercise the stubs for the qIsAddressT= agged, -# qMemTag, and QMemTag packets. Logical tag-only commands rely on local -# operations, hence don't exercise any stub. +# qMemTag, and QMemTag packets, which are used for manipulating allocation= tags. +# Logical tags-related commands rely on local operations, hence don't exer= cise +# any stub and so are not used in this test. # -# The test consists in breaking just after a atag() call (which sets the -# allocation tag -- see mte-8.c for details) and setting/getting tags in -# different memory locations and ranges starting at the address of the arr= ay -# 'a'. +# The test consists in breaking just after a tag is set in a specific memo= ry +# chunk, and then using the GDB 'memory-tagging' subcommands to set/get ta= gs in +# different memory locations and ranges in the MTE-enabled memory chunk. # # This is launched via tests/guest-debug/run-test.py # =20 =20 -import gdb +try: + import gdb +except ModuleNotFoundError: + from sys import exit + exit("This script must be launched via tests/guest-debug/run-test.py!") import re -from test_gdbstub import main, report +from sys import argv +from test_gdbstub import arg_parser, main, report =20 =20 PATTERN_0 =3D "Memory tags for address 0x[0-9a-f]+ match \\(0x[0-9a-f]+\\)= ." @@ -23,12 +28,32 @@ =20 =20 def run_test(): - gdb.execute("break 95", False, True) + p =3D arg_parser(prog=3D"test-mte.py", description=3D"TCG MTE tests.") + p.add_argument("--mode", help=3D"Run test for QEMU system or user mode= .", + required=3DTrue, choices=3D['system','user']) + + args =3D p.parse_args(args=3Dargv) + + if args.mode =3D=3D "system": + # Break address: where to break before performing the tests + # See mte.S for details about this label. + ba =3D "main_end" + # Tagged address: the start of the MTE-enabled memory chunk to be = tested + # 'tagged_addr' (x1) is a pointer to the MTE-enabled page. See mte= .S. + ta =3D "$x1" + else: # mode=3D"user" + # Line 95 in mte-8.c + ba =3D "95" + # 'a' array. See mte-8.c + ta =3D "a" + + gdb.execute(f"break {ba}", False, True) gdb.execute("continue", False, True) + try: - # Test if we can check correctly that the allocation tag for - # array 'a' matches the logical tag after atag() is called. - co =3D gdb.execute("memory-tag check a", False, True) + # Test if we can check correctly that the allocation tag for the a= ddress + # in {ta} matches the logical tag in {ta}. + co =3D gdb.execute(f"memory-tag check {ta}", False, True) tags_match =3D re.findall(PATTERN_0, co, re.MULTILINE) if tags_match: report(True, f"{tags_match[0]}") @@ -39,20 +64,20 @@ def run_test(): # tags rely on local operation and so don't exercise any stub. =20 # Set the allocation tag for the first granule (16 bytes) of - # address starting at 'a' address to a known value, i.e. 0x04. - gdb.execute("memory-tag set-allocation-tag a 1 04", False, True) + # address starting at {ta} address to a known value, i.e. 0x04. + gdb.execute(f"memory-tag set-allocation-tag {ta} 1 04", False, Tru= e) =20 # Then set the allocation tag for the second granule to a known # value, i.e. 0x06. This tests that contiguous tag granules are - # set correct and don't run over each other. - gdb.execute("memory-tag set-allocation-tag a+16 1 06", False, True) + # set correctly and don't run over each other. + gdb.execute(f"memory-tag set-allocation-tag {ta}+16 1 06", False, = True) =20 # Read the known values back and check if they remain the same. =20 - co =3D gdb.execute("memory-tag print-allocation-tag a", False, Tru= e) + co =3D gdb.execute(f"memory-tag print-allocation-tag {ta}", False,= True) first_tag =3D re.match(PATTERN_1, co)[1] =20 - co =3D gdb.execute("memory-tag print-allocation-tag a+16", False, = True) + co =3D gdb.execute(f"memory-tag print-allocation-tag {ta}+16", Fal= se, True) second_tag =3D re.match(PATTERN_1, co)[1] =20 if first_tag =3D=3D "0x4" and second_tag =3D=3D "0x6": @@ -61,15 +86,15 @@ def run_test(): report(False, "Can't set/print allocation tags!") =20 # Now test fill pattern by setting a whole page with a pattern. - gdb.execute("memory-tag set-allocation-tag a 4096 0a0b", False, Tr= ue) + gdb.execute(f"memory-tag set-allocation-tag {ta} 4096 0a0b", False= , True) =20 # And read back the tags of the last two granules in page so # we also test if the pattern is set correctly up to the end of # the page. - co =3D gdb.execute("memory-tag print-allocation-tag a+4096-32", Fa= lse, True) + co =3D gdb.execute(f"memory-tag print-allocation-tag {ta}+4096-32"= , False, True) tag =3D re.match(PATTERN_1, co)[1] =20 - co =3D gdb.execute("memory-tag print-allocation-tag a+4096-16", Fa= lse, True) + co =3D gdb.execute(f"memory-tag print-allocation-tag {ta}+4096-16"= , False, True) last_tag =3D re.match(PATTERN_1, co)[1] =20 if tag =3D=3D "0xa" and last_tag =3D=3D "0xb": @@ -78,8 +103,8 @@ def run_test(): report(False, "Fill pattern failed!") =20 except gdb.error: - # This usually happens because a GDB version that does not - # support memory tagging was used to run the test. + # This usually happens because a GDB version that does not support + # memory tagging was used to run the test. report(False, "'memory-tag' command failed!") =20 =20 diff --git a/tests/tcg/aarch64/system/boot.S b/tests/tcg/aarch64/system/boo= t.S index 501685d0ec..4eb1b35b88 100644 --- a/tests/tcg/aarch64/system/boot.S +++ b/tests/tcg/aarch64/system/boot.S @@ -135,6 +135,17 @@ __start: orr x1, x1, x3 str x1, [x2] /* 2nd 2mb (.data & .bss)*/ =20 + /* Third block: at 'mte_page', set in kernel.ld */ + adrp x1, mte_page + add x1, x1, :lo12:mte_page + bic x1, x1, #(1 << 21) - 1 + and x4, x1, x5 + add x2, x0, x4, lsr #(21 - 3) + /* attr(AF, NX, block, AttrIndx=3DAttr1) */ + ldr x3, =3D(3 << 53) | 0x401 | (1 << 2) + orr x1, x1, x3 + str x1, [x2] + /* Setup/enable the MMU. */ =20 /* diff --git a/tests/tcg/aarch64/system/kernel.ld b/tests/tcg/aarch64/system/= kernel.ld index 5f39258d32..aef043e31d 100644 --- a/tests/tcg/aarch64/system/kernel.ld +++ b/tests/tcg/aarch64/system/kernel.ld @@ -7,6 +7,8 @@ MEMORY { TXT (rx) : ORIGIN =3D 1 << 30, LENGTH =3D 2M /* Align r/w data to the 2nd 2 MiB chunk. */ DAT (rw) : ORIGIN =3D (1 << 30) + 2M, LENGTH =3D 2M + /* Align the MTE-enabled page to the 3rd 2 MiB chunk. */ + TAG (rw) : ORIGIN =3D (1 << 30) + 4M, LENGTH =3D 2M } =20 SECTIONS { @@ -18,6 +20,13 @@ SECTIONS { *(.data) *(.bss) } >DAT + .tag : { + /* + * Symbol 'mte_page' is used in boot.S to setup the PTE and in the= mte.S + * test as the address that the MTE instructions operate on. + */ + mte_page =3D .; + } >TAG /DISCARD/ : { *(.ARM.attributes) } diff --git a/tests/tcg/aarch64/system/mte.S b/tests/tcg/aarch64/system/mte.S new file mode 100644 index 0000000000..b611240a95 --- /dev/null +++ b/tests/tcg/aarch64/system/mte.S @@ -0,0 +1,109 @@ +/* + * Code to help test the MTE gdbstubs in system mode. + * + * Copyright (c) 2024 Linaro Limited + * + * Author: Gustavo Romero + * + * SPDX-License-Identifier: LGPL-2.1-or-later + */ + +#define addr x0 /* Ptr to the start of the MTE-enabled page. */ +#define tagged_addr x1 /* 'addr' ptr with a random-generated tag added. */ +#define tmp0 x2 /* Scratch register. */ +#define tmp1 x3 /* Scratch register. */ +#define tmp2 x4 /* Scratch register. */ +#define tmp3 x5 /* Sctatch register. */ + + .file "mte.S" + + .text + .align 4 + + .globl main + .type main, @function + +main: + /* + * Set MAIR_EL1 (Memory Attribute Index Register). In boot.S, the + * attribute index for .mte_page is set to point to MAILR_EL field Attr1 + * (AttrIndx=3DAttr1), so set Attr1 as Tagged Normal (MTE) to enable MTE + * on this page. + * + * Attr1 =3D 0xF0 =3D> Tagged Normal (MTE) + */ + mrs tmp0, mair_el1 + orr tmp0, tmp0, (0xF0 << 8) + msr mair_el1, tmp0 + + /* + * Set TCR_EL1 (Translation Control Registers) to ignore the top byte + * in the translated addresses so it can be used to keep the tags. + * + * TBI0[37] =3D 0b1 =3D> Top Byte ignored and used for tagged addresses + */ + mrs tmp1, tcr_el1 + orr tmp1, tmp1, (1 << 37) + msr tcr_el1, tmp1 + + /* + * Set SCTLR_EL1 (System Control Register) to enable the use of MTE + * insns., like stg & friends, and to enable synchronous exception in + * case of a tag mismatch, i.e., when the logical tag in 'tagged_addr' + * is different from the allocation tag related to 'addr' address. + * + * ATA[43] =3D 0b1 =3D> Enable access to allocation tags at EL1 + * TCF[41:40] =3D 0b01 =3D> Tag Check Faults cause a synchronous exception + * + */ + mrs tmp2, sctlr_el1 + mov tmp3, (1 << 43) | (1 << 40) + orr tmp2, tmp2, tmp3 + msr sctlr_el1, tmp2 + + isb + + /* + * MTE-enabled page resides at the 3rd 2MB chunk in the second 1GB + * block, i.e., at 0x40400000 address. See .mte_page section in boot.S + * and kernel.ld (where the address is effectively computed). + * + * Load .mte_page address into 'addr' register. + */ + adrp addr, mte_page + add addr, addr, :lo12:mte_page + + /* + * Set GCR for random tag generation. 0xA5 is just a random value to set + * GCR !=3D 0 so the tag generated by 'irg' insn. is not zero, which is + * more interesting for the tests than when tag is zero. + */ + mov tmp0, 0xA5 + msr gcr_el1, tmp0 + + /* + * Generate a logical tag, add it to 'addr' address and put it into + * 'tagged_addr'. + */ + irg tagged_addr, addr + + /* + * Store the generated tag to memory region pointed to by 'addr', i.e. + * set the allocation tag for granule at 'addr'. The tag is extracted + * by stg from tagged_addr pointer. + */ + stg tagged_addr, [addr] + + /* + * Store a random value (0xdeadbeef) to tagged_addr address. This must + * not cause any Tag Check Fault since logical tag in tagged_addr and + * allocation tag associated with the memory pointed by tagged_addr are + * set the same, otherwise something is off and the test fails -- an + * exception is generated. + */ + ldr tmp1, =3D0xdeadbeef + str tmp1, [tagged_addr] + + /* This label is used by GDB Python script test-mte.py. */ +main_end: + ret --=20 2.39.2