9f2e8ac090
In kernel commit 5d5b4e8c2d9ec ("arm64/sve: Report FEAT_SVE_B16B16 to userspace") Linux added ID_AA64ZFR0_el1.B16B16 to the set of ID register fields which it exposes to userspace. Update our exported_bits mask to include this. (This doesn't yet change any behaviour for us, because we don't yet have any CPUs that implement this feature, which is part of SVE2.) Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Message-id: 20240125134304.1470404-1-peter.maydell@linaro.org
188 lines
6.4 KiB
C
188 lines
6.4 KiB
C
/*
|
|
* Check emulated system register access for linux-user mode.
|
|
*
|
|
* See: https://www.kernel.org/doc/Documentation/arm64/cpu-feature-registers.txt
|
|
*
|
|
* Copyright (c) 2019 Linaro
|
|
*
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or later.
|
|
* See the COPYING file in the top-level directory.
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
#include <asm/hwcap.h>
|
|
#include <stdio.h>
|
|
#include <sys/auxv.h>
|
|
#include <signal.h>
|
|
#include <string.h>
|
|
#include <stdbool.h>
|
|
|
|
#ifndef HWCAP_CPUID
|
|
#define HWCAP_CPUID (1 << 11)
|
|
#endif
|
|
|
|
/*
|
|
* Older assemblers don't recognize newer system register names,
|
|
* but we can still access them by the Sn_n_Cn_Cn_n syntax.
|
|
* This also means we don't need to specifically request that the
|
|
* assembler enables whatever architectural features the ID registers
|
|
* syntax might be gated behind.
|
|
*/
|
|
#define SYS_ID_AA64ISAR2_EL1 S3_0_C0_C6_2
|
|
#define SYS_ID_AA64MMFR2_EL1 S3_0_C0_C7_2
|
|
#define SYS_ID_AA64ZFR0_EL1 S3_0_C0_C4_4
|
|
#define SYS_ID_AA64SMFR0_EL1 S3_0_C0_C4_5
|
|
|
|
int failed_bit_count;
|
|
|
|
/* Read and print system register `id' value */
|
|
#define get_cpu_reg(id) ({ \
|
|
unsigned long __val = 0xdeadbeef; \
|
|
asm("mrs %0, "#id : "=r" (__val)); \
|
|
printf("%-20s: 0x%016lx\n", #id, __val); \
|
|
__val; \
|
|
})
|
|
|
|
/* As above but also check no bits outside of `mask' are set*/
|
|
#define get_cpu_reg_check_mask(id, mask) ({ \
|
|
unsigned long __cval = get_cpu_reg(id); \
|
|
unsigned long __extra = __cval & ~mask; \
|
|
if (__extra) { \
|
|
printf("%-20s: 0x%016lx\n", " !!extra bits!!", __extra); \
|
|
failed_bit_count++; \
|
|
} \
|
|
})
|
|
|
|
/* As above but check RAZ */
|
|
#define get_cpu_reg_check_zero(id) ({ \
|
|
unsigned long __val = 0xdeadbeef; \
|
|
asm("mrs %0, "#id : "=r" (__val)); \
|
|
if (__val) { \
|
|
printf("%-20s: 0x%016lx (not RAZ!)\n", #id, __val); \
|
|
failed_bit_count++; \
|
|
} \
|
|
})
|
|
|
|
/* Chunk up mask into 63:48, 47:32, 31:16, 15:0 to ease counting */
|
|
#define _m(a, b, c, d) (0x ## a ## b ## c ## d ##ULL)
|
|
|
|
bool should_fail;
|
|
int should_fail_count;
|
|
int should_not_fail_count;
|
|
uintptr_t failed_pc[10];
|
|
|
|
void sigill_handler(int signo, siginfo_t *si, void *data)
|
|
{
|
|
ucontext_t *uc = (ucontext_t *)data;
|
|
|
|
if (should_fail) {
|
|
should_fail_count++;
|
|
} else {
|
|
uintptr_t pc = (uintptr_t) uc->uc_mcontext.pc;
|
|
failed_pc[should_not_fail_count++] = pc;
|
|
}
|
|
uc->uc_mcontext.pc += 4;
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
struct sigaction sa;
|
|
|
|
/* Hook in a SIGILL handler */
|
|
memset(&sa, 0, sizeof(struct sigaction));
|
|
sa.sa_flags = SA_SIGINFO;
|
|
sa.sa_sigaction = &sigill_handler;
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
if (sigaction(SIGILL, &sa, 0) != 0) {
|
|
perror("sigaction");
|
|
return 1;
|
|
}
|
|
|
|
/* Counter values have been exposed since Linux 4.12 */
|
|
printf("Checking Counter registers\n");
|
|
|
|
get_cpu_reg(ctr_el0);
|
|
get_cpu_reg(cntvct_el0);
|
|
get_cpu_reg(cntfrq_el0);
|
|
|
|
/* HWCAP_CPUID indicates we can read feature registers, since Linux 4.11 */
|
|
if (!(getauxval(AT_HWCAP) & HWCAP_CPUID)) {
|
|
printf("CPUID registers unavailable\n");
|
|
return 1;
|
|
} else {
|
|
printf("Checking CPUID registers\n");
|
|
}
|
|
|
|
/*
|
|
* Some registers only expose some bits to user-space. Anything
|
|
* that is IMPDEF is exported as 0 to user-space. The _mask checks
|
|
* assert no extra bits are set.
|
|
*
|
|
* This check is *not* comprehensive as some fields are set to
|
|
* minimum valid fields - for the purposes of this check allowed
|
|
* to have non-zero values.
|
|
*/
|
|
get_cpu_reg_check_mask(id_aa64isar0_el1, _m(f0ff,ffff,f0ff,fff0));
|
|
get_cpu_reg_check_mask(id_aa64isar1_el1, _m(00ff,f0ff,ffff,ffff));
|
|
get_cpu_reg_check_mask(SYS_ID_AA64ISAR2_EL1, _m(00ff,0000,00ff,ffff));
|
|
/* TGran4 & TGran64 as pegged to -1 */
|
|
get_cpu_reg_check_mask(id_aa64mmfr0_el1, _m(f000,0000,ff00,0000));
|
|
get_cpu_reg_check_mask(id_aa64mmfr1_el1, _m(0000,f000,0000,0000));
|
|
get_cpu_reg_check_mask(SYS_ID_AA64MMFR2_EL1, _m(0000,000f,0000,0000));
|
|
/* EL1/EL0 reported as AA64 only */
|
|
get_cpu_reg_check_mask(id_aa64pfr0_el1, _m(000f,000f,00ff,0011));
|
|
get_cpu_reg_check_mask(id_aa64pfr1_el1, _m(0000,0000,0f00,0fff));
|
|
/* all hidden, DebugVer fixed to 0x6 (ARMv8 debug architecture) */
|
|
get_cpu_reg_check_mask(id_aa64dfr0_el1, _m(0000,0000,0000,0006));
|
|
get_cpu_reg_check_zero(id_aa64dfr1_el1);
|
|
get_cpu_reg_check_mask(SYS_ID_AA64ZFR0_EL1, _m(0ff0,ff0f,0fff,00ff));
|
|
get_cpu_reg_check_mask(SYS_ID_AA64SMFR0_EL1, _m(8ff1,fcff,0000,0000));
|
|
|
|
get_cpu_reg_check_zero(id_aa64afr0_el1);
|
|
get_cpu_reg_check_zero(id_aa64afr1_el1);
|
|
|
|
get_cpu_reg_check_mask(midr_el1, _m(0000,0000,ffff,ffff));
|
|
/* mpidr sets bit 31, everything else hidden */
|
|
get_cpu_reg_check_mask(mpidr_el1, _m(0000,0000,8000,0000));
|
|
/* REVIDR is all IMPDEF so should be all zeros to user-space */
|
|
get_cpu_reg_check_zero(revidr_el1);
|
|
|
|
/*
|
|
* There are a block of more registers that are RAZ in the rest of
|
|
* the Op0=3, Op1=0, CRn=0, CRm=0,4,5,6,7 space. However for
|
|
* brevity we don't check stuff that is currently un-allocated
|
|
* here. Feel free to add them ;-)
|
|
*/
|
|
|
|
printf("Remaining registers should fail\n");
|
|
should_fail = true;
|
|
|
|
/* Unexposed register access causes SIGILL */
|
|
get_cpu_reg(id_mmfr0_el1);
|
|
get_cpu_reg(id_mmfr1_el1);
|
|
get_cpu_reg(id_mmfr2_el1);
|
|
get_cpu_reg(id_mmfr3_el1);
|
|
|
|
get_cpu_reg(mvfr0_el1);
|
|
get_cpu_reg(mvfr1_el1);
|
|
|
|
if (should_not_fail_count > 0) {
|
|
int i;
|
|
for (i = 0; i < should_not_fail_count; i++) {
|
|
uintptr_t pc = failed_pc[i];
|
|
uint32_t insn = *(uint32_t *) pc;
|
|
printf("insn %#x @ %#lx unexpected FAIL\n", insn, pc);
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
if (failed_bit_count > 0) {
|
|
printf("Extra information leaked to user-space!\n");
|
|
return 1;
|
|
}
|
|
|
|
return should_fail_count == 6 ? 0 : 1;
|
|
}
|