From patchwork Thu Jul 29 17:37:10 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 488737 Delivered-To: patch@linaro.org Received: by 2002:a05:6638:1185:0:0:0:0 with SMTP id f5csp2371703jas; Thu, 29 Jul 2021 10:37:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJVPcJA/LhXBWdaNKHwu3Ak2Ju6Fmi/skGYu8q8S5sEDwsdJ1L1YdpYwJh/WXNSJ8SOTUF X-Received: by 2002:a05:6402:2283:: with SMTP id cw3mr7427947edb.87.1627580253038; Thu, 29 Jul 2021 10:37:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627580253; cv=none; d=google.com; s=arc-20160816; b=g6eSdr+oi6IoXYY+V2EBIqRQslFZvMI4sloQlElrqXMoQcTJCASS/2ISyIhCz8X1fo c0bU0EN+chTA6Vck6h/kv9ta1ba1sAKduqo+FA4mPpa4sQEFOKrZe6TZ95ddWnLamgmO dnfsO4xoo0gvYzIQiLczPeCquMTVeV/YcjcHHFC6cxIQrB3Haco9rbxLWOWwbxu6QQkT abVgXEwHhS4pe2D9MleoZtgnb9JMtEpT0wDxfBgGEXth2aqRW8Gq4ecp/AEw9vrgSZFB QAdKKJKOBE5S/Phb05E9wQjbFLcOV3pIXnmjTIG6XUH27pTuyAjXHfrZRjCJucV975x1 6tjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aAwiAhnl5sNcP5r4yCWW7lNLnNpatRgnrVKwHiQSnZI=; b=ZZMr59fPfXCI3R7fRAKnzGdBzgi4537FMdk/FPbSuQZUwk6UCPF1fUqrwqCspSipDf 1tCMXNsSsbiahhSOaSWflRjkGhcx2Gyq4Zuo2irvGdZ/s/jF5q5EYFbWbD1t99RUMZeD FkyQP4fNNHq6zPqxId+7m3ns0RFB6eZW+uMJ+Kj5oSG9kamaZVyD7mkRXMQUCUn1RVGH rRIN6T7mgt6/RRM88EvnY+6ry/tTmzcJyCH/VRavjFptMuCqSQ6LDpe5hgMr+9dcmcS5 74ZythVlfw30kThI+ORdFxl/jjP71C/x+sRyGCIgC+hwDR7oUa7n+LYtCemROqsSLnlo XIlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HECYJbEv; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si3465803eds.488.2021.07.29.10.37.32; Thu, 29 Jul 2021 10:37:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HECYJbEv; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229739AbhG2Rhc (ORCPT + 5 others); Thu, 29 Jul 2021 13:37:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:49278 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229657AbhG2Rhb (ORCPT ); Thu, 29 Jul 2021 13:37:31 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7870460F46; Thu, 29 Jul 2021 17:37:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627580248; bh=CdGB4OG/NflCYBfXLsaKyb4ZgSAIM7cHqA6soZ5TczM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HECYJbEvLqRrnEgcWlTjesPjKXNC4PrUgjDuJEAdVBrxynwR+POSkw6I9ld0Hb2Ay JyK7ORlhe837TmBpLR8YAs7Vg8Xl66m22RQQpdTH+BOQteFYillAaC4Fgxr1JdYhy8 O7hwTGrrlrfTYUEpUISTfGVkobniYZkFss21hQQpOBZxkTdisBTB/ToBM6tiXxsxBd H2SBhFddgnlABzTkpZP3sGPkA2NkCmzIC+3JD3koBfrtiIqn8hsdv4pubIP3Viu9Om J19zHZkdI3UUwNROJjh9et7A3u9CNXYgM0dwI93NiJ/CBMkeHE2f6f3hcQhPWSR46e 7g4JsKufTJvgA== From: Mark Brown To: Catalin Marinas , Will Deacon , Shuah Khan Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, Mark Brown Subject: [PATCH v4 1/4] kselftest/arm64: Provide a helper binary and "library" for SVE RDVL Date: Thu, 29 Jul 2021 18:37:10 +0100 Message-Id: <20210729173713.4534-2-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210729173713.4534-1-broonie@kernel.org> References: <20210729173713.4534-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=3762; h=from:subject; bh=CdGB4OG/NflCYBfXLsaKyb4ZgSAIM7cHqA6soZ5TczM=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBhAudFoc07YHrsOh1K2NDPohsDGoEt9Zt9fNhL16wI 3/ocqPOJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYQLnRQAKCRAk1otyXVSH0IjWB/ 4wPgAJAF3S5e5AUtVyklYBjA95dzxcSXrxIIS/AZPB3iMi/HuoHGlZnOIkesYJttFN0gJTsLXXScIJ xRXz7qzLsGMOH70ct8M1iCKjGA0udtjNQdsKqoV8V3xzlSRNTWOsYD1VH9jQ3/u/Iy/qFJSNzT963c WgeX8hEDK3jlZjX21tiMn4iaGZPPrOolB0ea3t6qRSlmlZfyKcwtFNdzxuYQIZaqsTBrP3EEFM34Q7 nWaxXnJVIJCEc1KUPzNjf6ov83lABYNL/P7dWxosbGogUhhitB461GKCY6XfLhfyn9VTJaGstF8+os j53qK5cHZzqh3NCkv/QS6ueAYMJHNy X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org SVE provides an instruction RDVL which reports the currently configured vector length. In order to validate that our vector length configuration interfaces are working correctly without having to build the C code for our test programs with SVE enabled provide a trivial assembly library with a C callable function that executes RDVL. Since these interfaces also control behaviour on exec*() provide a trivial wrapper program which reports the currently configured vector length on stdout, tests can use this to verify that behaviour on exec*() is as expected. In preparation for providing similar helper functionality for SME, the Scalable Matrix Extension, which allows separately configured vector lengths to be read back both the assembler function and wrapper binary have SVE included in their name. Signed-off-by: Mark Brown Reviewed-by: Dave Martin --- tools/testing/selftests/arm64/fp/.gitignore | 1 + tools/testing/selftests/arm64/fp/Makefile | 6 +++++- tools/testing/selftests/arm64/fp/rdvl-sve.c | 14 ++++++++++++++ tools/testing/selftests/arm64/fp/rdvl.S | 10 ++++++++++ tools/testing/selftests/arm64/fp/rdvl.h | 8 ++++++++ 5 files changed, 38 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/arm64/fp/rdvl-sve.c create mode 100644 tools/testing/selftests/arm64/fp/rdvl.S create mode 100644 tools/testing/selftests/arm64/fp/rdvl.h -- 2.20.1 diff --git a/tools/testing/selftests/arm64/fp/.gitignore b/tools/testing/selftests/arm64/fp/.gitignore index d66f76d2a650..6b53a7b60fee 100644 --- a/tools/testing/selftests/arm64/fp/.gitignore +++ b/tools/testing/selftests/arm64/fp/.gitignore @@ -1,4 +1,5 @@ fpsimd-test +rdvl-sve sve-probe-vls sve-ptrace sve-test diff --git a/tools/testing/selftests/arm64/fp/Makefile b/tools/testing/selftests/arm64/fp/Makefile index a57009d3a0dc..ed62e7003b96 100644 --- a/tools/testing/selftests/arm64/fp/Makefile +++ b/tools/testing/selftests/arm64/fp/Makefile @@ -2,12 +2,16 @@ CFLAGS += -I../../../../../usr/include/ TEST_GEN_PROGS := sve-ptrace sve-probe-vls -TEST_PROGS_EXTENDED := fpsimd-test fpsimd-stress sve-test sve-stress vlset +TEST_PROGS_EXTENDED := fpsimd-test fpsimd-stress \ + rdvl-sve \ + sve-test sve-stress \ + vlset all: $(TEST_GEN_PROGS) $(TEST_PROGS_EXTENDED) fpsimd-test: fpsimd-test.o $(CC) -nostdlib $^ -o $@ +rdvl-sve: rdvl-sve.o rdvl.o sve-ptrace: sve-ptrace.o sve-ptrace-asm.o sve-probe-vls: sve-probe-vls.o sve-test: sve-test.o diff --git a/tools/testing/selftests/arm64/fp/rdvl-sve.c b/tools/testing/selftests/arm64/fp/rdvl-sve.c new file mode 100644 index 000000000000..7f8a13a18f5d --- /dev/null +++ b/tools/testing/selftests/arm64/fp/rdvl-sve.c @@ -0,0 +1,14 @@ +// SPDX-License-Identifier: GPL-2.0-only + +#include + +#include "rdvl.h" + +int main(void) +{ + int vl = rdvl_sve(); + + printf("%d\n", vl); + + return 0; +} diff --git a/tools/testing/selftests/arm64/fp/rdvl.S b/tools/testing/selftests/arm64/fp/rdvl.S new file mode 100644 index 000000000000..c916c1c9defd --- /dev/null +++ b/tools/testing/selftests/arm64/fp/rdvl.S @@ -0,0 +1,10 @@ +// SPDX-License-Identifier: GPL-2.0-only +// Copyright (C) 2021 ARM Limited. + +.arch_extension sve + +.globl rdvl_sve +rdvl_sve: + hint 34 // BTI C + rdvl x0, #1 + ret diff --git a/tools/testing/selftests/arm64/fp/rdvl.h b/tools/testing/selftests/arm64/fp/rdvl.h new file mode 100644 index 000000000000..7c9d953fc9e7 --- /dev/null +++ b/tools/testing/selftests/arm64/fp/rdvl.h @@ -0,0 +1,8 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ + +#ifndef RDVL_H +#define RDVL_H + +int rdvl_sve(void); + +#endif From patchwork Thu Jul 29 17:37:11 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 488738 Delivered-To: patch@linaro.org Received: by 2002:a05:6638:1185:0:0:0:0 with SMTP id f5csp2371714jas; Thu, 29 Jul 2021 10:37:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy90pSBiUpoPsL1hjD95IXE8X0xasblT4wCwomG5k45Zbt6JyxZDX43zN+4K4oR8B3MDYeg X-Received: by 2002:a05:6402:270d:: with SMTP id y13mr7420999edd.66.1627580253968; Thu, 29 Jul 2021 10:37:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627580253; cv=none; d=google.com; s=arc-20160816; b=o242m5hd7BmOlcYwjozVxEDptSwsjcUVUXSoOGhuN8jqkOTWcstlPQb4G2EPkQ3vh3 mmhvCHvBJYWDqujf1xNQbSwXQVMQlZtrOwfY33/qNzbPNCjY312BjcQxfb0jDGSv4As9 feE5s/Fisw1/NHpkfXME80jZnW4tP5DuCbtjsH52t1SnzrlzoxO81yrJO0KVkKZ/dChJ bq0UmdhBtcuw+QJLQ7X93Nm3i+WGmFsNZWYwZ2HpYLzQNeW5s5tmR+p/3Wtmj+9+7RYf TMFpl76Tx1Y5f/yWnPZWnvSWxfgm3trH+puhIhQYFeXBV/JgAUCfH5MjnRvoO0SAEBDj BSfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7wVVt4os4wjwmrU1DlPSwI9dRzX7dbJ+CxbTwSVvCJw=; b=KGADXnJ3GTgj2U1qeGYGK3+jn2BbXicCmDU0lNOrwgk5YficoxOiJkPKtJWOZ8WjTU hWd0fPLmpkIfFZ+kUAd33rlNz9TjPsjH4O5vLtpCGZjx3fZ5o/HZTcfb6TeZ8MCb2/fm knavHv70ihuqmPglHufMHaVIS5vpRYuShIo509ImTpaov987448o/niY5if2uM7Z1I53 iM5kqvQ1IsKXsSV868yNbLipb5lYeVQvFhuRISXHETSHYQS3cFC8TWnWg1lQPvIAR22P bCPXR5W9bso5LhqJ+mLbz1sQhpOI/V0qOIkna4o17s2SIaQh0ECIBTYwIw169fErAkEI DbzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YHMCVlwO; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si3465803eds.488.2021.07.29.10.37.33; Thu, 29 Jul 2021 10:37:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YHMCVlwO; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229556AbhG2Rhe (ORCPT + 5 others); Thu, 29 Jul 2021 13:37:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:49354 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229657AbhG2Rhe (ORCPT ); Thu, 29 Jul 2021 13:37:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3053D60E9B; Thu, 29 Jul 2021 17:37:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627580250; bh=EKvkyVbCFIkHGIl1Aft6XfS6vxY/FRzv+NjTpqSFwTM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YHMCVlwOOi6ic4rDNNGx9Oij9pzaBizxzHf56Ne3u7QSlJpSpfDx9spyLrqYUmrmE uGJR6UqYWh5uAPLLcW0thvDsdYOdEvmYXXKOomsUpCxvWb8qKgq5XxbXAcOpUu//4j 7In/Di1I54pXxppBW7bTzCMb/IqL8hUVuaO5L0cx9TX/3Xy1VeevGzF07bucJRTWda 3c4QlAiHxwb4VpT54tuKRvCngrYPrA2IPq0XbKrDnNpAhEWWP4GfGW5HP7esPveeSd H3+u1WmVonOTjNzVkdja407Y7DmU1g4ZVReSL2DIolJ64YNTTyKrGu3I0KVEdSnips qhoodCh67jCJA== From: Mark Brown To: Catalin Marinas , Will Deacon , Shuah Khan Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, Mark Brown Subject: [PATCH v4 2/4] kselftest/arm64: Validate vector lengths are set in sve-probe-vls Date: Thu, 29 Jul 2021 18:37:11 +0100 Message-Id: <20210729173713.4534-3-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210729173713.4534-1-broonie@kernel.org> References: <20210729173713.4534-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=1733; h=from:subject; bh=EKvkyVbCFIkHGIl1Aft6XfS6vxY/FRzv+NjTpqSFwTM=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBhAudGyb4Ch9ouisizN+OUT44lVwHjZYwPWcERArhr KSPtigSJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYQLnRgAKCRAk1otyXVSH0AjQB/ 9cy3Dhe8jQsatZLZOyh0podbS2Wvdb8brmBcdNtJuW/r4Jf+fSV2bZwrxK5JAt5U/f4HOGbrYOshRG nDaV5pY+pAW8vvsOzOGedeWF9YVTPnEbcvO7oUIO3Gd7EzBd6bgK2W595YV39V5wJ0fe7MFF9/a+B1 wS0ikGQl3Pa8CNTabL/O7KU9kijEShZ/9+pg0brFsklTEbcbJRxVDs1e3rorbxReZbHGe64AwgwomK t4Gm2nh71b7lxPuEQlGqpu/KdRKhYqIQcS3KnThHuTIxKLQ8ITkG7ku76rJcEhZlbFEZzUERfVLP4D s4VpWFHS5p5CtrTG1j9syExc+bbQCV X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org Currently sve-probe-vls does not verify that the vector lengths reported by the prctl() interface are actually what is reported by the architecture, use the rdvl_sve() helper to validate this. Signed-off-by: Mark Brown Reviewed-by: Dave Martin --- tools/testing/selftests/arm64/fp/Makefile | 2 +- tools/testing/selftests/arm64/fp/sve-probe-vls.c | 5 +++++ 2 files changed, 6 insertions(+), 1 deletion(-) -- 2.20.1 diff --git a/tools/testing/selftests/arm64/fp/Makefile b/tools/testing/selftests/arm64/fp/Makefile index ed62e7003b96..fa3a0167db2d 100644 --- a/tools/testing/selftests/arm64/fp/Makefile +++ b/tools/testing/selftests/arm64/fp/Makefile @@ -13,7 +13,7 @@ fpsimd-test: fpsimd-test.o $(CC) -nostdlib $^ -o $@ rdvl-sve: rdvl-sve.o rdvl.o sve-ptrace: sve-ptrace.o sve-ptrace-asm.o -sve-probe-vls: sve-probe-vls.o +sve-probe-vls: sve-probe-vls.o rdvl.o sve-test: sve-test.o $(CC) -nostdlib $^ -o $@ vlset: vlset.o diff --git a/tools/testing/selftests/arm64/fp/sve-probe-vls.c b/tools/testing/selftests/arm64/fp/sve-probe-vls.c index 76e138525d55..a24eca7a4ecb 100644 --- a/tools/testing/selftests/arm64/fp/sve-probe-vls.c +++ b/tools/testing/selftests/arm64/fp/sve-probe-vls.c @@ -13,6 +13,7 @@ #include #include "../../kselftest.h" +#include "rdvl.h" int main(int argc, char **argv) { @@ -38,6 +39,10 @@ int main(int argc, char **argv) vl &= PR_SVE_VL_LEN_MASK; + if (rdvl_sve() != vl) + ksft_exit_fail_msg("PR_SVE_SET_VL reports %d, RDVL %d\n", + vl, rdvl_sve()); + if (!sve_vl_valid(vl)) ksft_exit_fail_msg("VL %d invalid\n", vl); vq = sve_vq_from_vl(vl); From patchwork Thu Jul 29 17:37:12 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 488739 Delivered-To: patch@linaro.org Received: by 2002:a05:6638:1185:0:0:0:0 with SMTP id f5csp2371719jas; Thu, 29 Jul 2021 10:37:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyge/jkysVTRQtfYqZv6ANW0hTnsm1RNDYrMVnCy3TgjyRf0kkrlNf9wFnpXxNrExwJyHAK X-Received: by 2002:aa7:c2c4:: with SMTP id m4mr7381234edp.173.1627580254606; Thu, 29 Jul 2021 10:37:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627580254; cv=none; d=google.com; s=arc-20160816; b=AWBWAix1phJN7UoS9Yx40ukVivjFzQTfCK5UvJnQJ045Z0rZ3LZm2VgPA9qTNhJ+D0 z3Ev+U7F0IsDbuovoDY79cbTjVYuHCj4CTc5ZnIZUO8pO/Lo1dtccpIgh3sfyIhR+DGc JMz/uJYEoZC/i2+6Ft6ir6nDqcEm+db1TrK+7Z0vDLEGZGM2LRq2N7jqoTmXQmigHWhM p33/XUGcbmU85pCQVhkekq4DRNyDWXUQF+wxucwPBbrIFHEif2nNCg6pkedEgd36miR8 KEsBScOOz+pVOMc8xpQdvXFfDizv9pU1YFIyqGDne6GBKJAlxcPx8GQyN6Ejt2RK9PbE bgtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FyziTh8kur8EF6Ca+j3uWL0wD517L8aKh92LChi0ZJY=; b=G3AO0/7uvwPxObsVnlNyeSHt4BCNuQF8YRc7cSx2mUadEXgjsm/nmczSOdDfGmcXt5 n8st8HcG3rh35P+6hNcxDq2Y+3YxaM4MhVTdpFBAudg0IfoRb35QWATBpJ/qDDkvYK7D xDL8PI5QmLFrAK939y8pUQ5PlP4vtiayR6MclVm/oO/pxSpPnp5mxp+nRx8RUYvossQ0 qCNHni/CNYqnbNUeQRbwmawgQB4pA49fyOzVYxu/Bm2kfBIzWjAVZENO7PTHcRdGYtxZ dLDPmrJ4G/Zi3wKwbTzXqkaWyN98ygp2J9yWAqT+PVhWLkiE0hOgiR3RzZZW/wQqWopk d78A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IuBXyBB4; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si3465803eds.488.2021.07.29.10.37.34; Thu, 29 Jul 2021 10:37:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IuBXyBB4; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229941AbhG2Rhh (ORCPT + 5 others); Thu, 29 Jul 2021 13:37:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:49386 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229657AbhG2Rhg (ORCPT ); Thu, 29 Jul 2021 13:37:36 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E848960E9B; Thu, 29 Jul 2021 17:37:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627580253; bh=0HjQwKZsx54xL+E40+RzOMxUmXmNy3pnvwiouuImueY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IuBXyBB4bDbMgicPzbgbLK72bF87IiSA73WLdAhnHBVaNYu14zK1s+9iWhIE2dIjJ 0rrMvE0pmpoXnZgpO3NXYLYv/NIJhvlx4qa7NO30Vf3fVC7aHF1waJnW6T2bytpnhw joEFu25+XghgtnGofwofYeAF9Ji7LSIJmSBh08pw1Vp0MQ23UgA3vMK98phD0cxHyy 3W23rWsZPtYEzGuI3YOcZUjxLj5uZJ2Km/UgwFsAt8Pk4C1BO3juoOcqWGfVcPBwsV 5Nf6z1CjsO7JkGz3/0u/ryWYmKDgvIfRIOUVQPFXpGCps0+Mvi5Hv4akVH8gJq5y6R Nt3koQerOGxiA== From: Mark Brown To: Catalin Marinas , Will Deacon , Shuah Khan Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, Mark Brown Subject: [PATCH v4 3/4] kselftest/arm64: Add tests for SVE vector configuration Date: Thu, 29 Jul 2021 18:37:12 +0100 Message-Id: <20210729173713.4534-4-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210729173713.4534-1-broonie@kernel.org> References: <20210729173713.4534-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=17636; h=from:subject; bh=0HjQwKZsx54xL+E40+RzOMxUmXmNy3pnvwiouuImueY=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBhAudHC/lLI5Bbg8CELbAesk65c3lvq0WcBchB2+Nm cyg0NvKJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYQLnRwAKCRAk1otyXVSH0A3pB/ 4pxaMs0cXHh0A2HsTu9+F6ORRNrPz926O8sOCS5tHhHPmZqIJlzBap3zoNHWxdeyvQGBaJ6x4x1NRh y6x+kXoz2OW0PwK/JmtFYs7DCgNj4tQTjQxjQICQhD1rbIiqM5nGrXR0gmZWyPZ6XsZUmePoUP0Qgq apPeAIwgdvgX+aKb/eFN1r8ynZe2wB+6t88drp/OgtZRg/o+aaRuf0ahSIfPJyChRAjYjNmUT5Qcg8 OptYIQ/QKz8E/HXKikPzw0oX6xV/7vqPCLlN4IwexFwH5tcKEJBbSAz57bhh/VZtX5cclxMzFIonAN 3Ha1gxHjT3ueSB6a0wErz/pXEvFoO0 X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org We provide interfaces for configuring the SVE vector length seen by processes using prctl and also via /proc for configuring the default values. Provide tests that exercise all these interfaces and verify that they take effect as expected, though at present no test fully enumerates all the possible vector lengths. A subset of this is already tested via sve-probe-vls but the /proc interfaces are not currently covered at all. In preparation for the forthcoming support for SME, the Scalable Matrix Extension, which has separately but similarly configured vector lengths which we expect to offer similar userspace interfaces for, all the actual files and prctls used are parameterised and we don't validate that the architectural minimum vector length is the minimum we see. Signed-off-by: Mark Brown --- tools/testing/selftests/arm64/fp/.gitignore | 1 + tools/testing/selftests/arm64/fp/Makefile | 3 +- tools/testing/selftests/arm64/fp/vec-syscfg.c | 594 ++++++++++++++++++ 3 files changed, 597 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/arm64/fp/vec-syscfg.c -- 2.20.1 Reviewed-by: Dave Martin diff --git a/tools/testing/selftests/arm64/fp/.gitignore b/tools/testing/selftests/arm64/fp/.gitignore index 6b53a7b60fee..b67395903b9b 100644 --- a/tools/testing/selftests/arm64/fp/.gitignore +++ b/tools/testing/selftests/arm64/fp/.gitignore @@ -3,4 +3,5 @@ rdvl-sve sve-probe-vls sve-ptrace sve-test +vec-syscfg vlset diff --git a/tools/testing/selftests/arm64/fp/Makefile b/tools/testing/selftests/arm64/fp/Makefile index fa3a0167db2d..f2abdd6ba12e 100644 --- a/tools/testing/selftests/arm64/fp/Makefile +++ b/tools/testing/selftests/arm64/fp/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 CFLAGS += -I../../../../../usr/include/ -TEST_GEN_PROGS := sve-ptrace sve-probe-vls +TEST_GEN_PROGS := sve-ptrace sve-probe-vls vec-syscfg TEST_PROGS_EXTENDED := fpsimd-test fpsimd-stress \ rdvl-sve \ sve-test sve-stress \ @@ -16,6 +16,7 @@ sve-ptrace: sve-ptrace.o sve-ptrace-asm.o sve-probe-vls: sve-probe-vls.o rdvl.o sve-test: sve-test.o $(CC) -nostdlib $^ -o $@ +vec-syscfg: vec-syscfg.o rdvl.o vlset: vlset.o include ../../lib.mk diff --git a/tools/testing/selftests/arm64/fp/vec-syscfg.c b/tools/testing/selftests/arm64/fp/vec-syscfg.c new file mode 100644 index 000000000000..15fec1aaeec6 --- /dev/null +++ b/tools/testing/selftests/arm64/fp/vec-syscfg.c @@ -0,0 +1,594 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (C) 2021 ARM Limited. + * Original author: Mark Brown + */ +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "../../kselftest.h" +#include "rdvl.h" + +#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0])) + +#define ARCH_MIN_VL SVE_VL_MIN + +struct vec_data { + const char *name; + unsigned long hwcap_type; + unsigned long hwcap; + const char *rdvl_binary; + int (*rdvl)(void); + + int prctl_get; + int prctl_set; + const char *default_vl_file; + + int default_vl; + int min_vl; + int max_vl; +}; + + +static struct vec_data vec_data[] = { + { + .name = "SVE", + .hwcap_type = AT_HWCAP, + .hwcap = HWCAP_SVE, + .rdvl = rdvl_sve, + .rdvl_binary = "./rdvl-sve", + .prctl_get = PR_SVE_GET_VL, + .prctl_set = PR_SVE_SET_VL, + .default_vl_file = "/proc/sys/abi/sve_default_vector_length", + }, +}; + +static int stdio_read_integer(FILE *f, const char *what, int *val) +{ + int ret, n; + + ret = fscanf(f, "%d%*1[\n]%n", val, &n); + if (ret < 1 || n < 1) { + ksft_print_msg("%d %d %d\n", ret, n, *val); + ksft_print_msg("failed to parse VL from %s\n", what); + return -1; + } + + return 0; +} + +/* Start a new process and return the vector length it sees */ +static int get_child_rdvl(struct vec_data *data) +{ + FILE *out; + int pipefd[2]; + pid_t pid, child; + int read_vl, ret; + + ret = pipe(pipefd); + if (ret == -1) { + ksft_print_msg("pipe() failed: %d (%s)\n", + errno, strerror(errno)); + return -1; + } + + fflush(stdout); + + child = fork(); + if (child == -1) { + ksft_print_msg("fork() failed: %d (%s)\n", + errno, strerror(errno)); + close(pipefd[0]); + close(pipefd[1]); + return -1; + } + + /* Child: put vector length on the pipe */ + if (child == 0) { + /* + * Replace stdout with the pipe, errors to stderr from + * here as kselftest prints to stdout. + */ + ret = dup2(pipefd[1], 1); + if (ret == -1) { + fprintf(stderr, "dup2() %d\n", errno); + exit(EXIT_FAILURE); + } + + /* exec() a new binary which puts the VL on stdout */ + ret = execl(data->rdvl_binary, data->rdvl_binary, NULL); + fprintf(stderr, "execl(%s) failed: %d\n", + data->rdvl_binary, errno, strerror(errno)); + + exit(EXIT_FAILURE); + } + + close(pipefd[1]); + + /* Parent; wait for the exit status from the child & verify it */ + do { + pid = wait(&ret); + if (pid == -1) { + ksft_print_msg("wait() failed: %d (%s)\n", + errno, strerror(errno)); + close(pipefd[0]); + return -1; + } + } while (pid != child); + + assert(pid == child); + + if (!WIFEXITED(ret)) { + ksft_print_msg("child exited abnormally\n"); + close(pipefd[0]); + return -1; + } + + if (WEXITSTATUS(ret) != 0) { + ksft_print_msg("child returned error %d\n", + WEXITSTATUS(ret)); + close(pipefd[0]); + return -1; + } + + out = fdopen(pipefd[0], "r"); + if (!out) { + ksft_print_msg("failed to open child stdout\n"); + close(pipefd[0]); + return -1; + } + + ret = stdio_read_integer(out, "child", &read_vl); + fclose(out); + if (ret != 0) + return ret; + + return read_vl; +} + +static int file_read_integer(const char *name, int *val) +{ + FILE *f; + int ret; + + f = fopen(name, "r"); + if (!f) { + ksft_test_result_fail("Unable to open %s: %d (%s)\n", + name, errno, + strerror(errno)); + return -1; + } + + ret = stdio_read_integer(f, name, val); + fclose(f); + + return ret; +} + +static int file_write_integer(const char *name, int val) +{ + FILE *f; + int ret; + + f = fopen(name, "w"); + if (!f) { + ksft_test_result_fail("Unable to open %s: %d (%s)\n", + name, errno, + strerror(errno)); + return -1; + } + + fprintf(f, "%d", val); + fclose(f); + if (ret < 0) { + ksft_test_result_fail("Error writing %d to %s\n", + val, name); + return -1; + } + + return 0; +} + +/* + * Verify that we can read the default VL via proc, checking that it + * is set in a freshly spawned child. + */ +static void proc_read_default(struct vec_data *data) +{ + int default_vl, child_vl, ret; + + ret = file_read_integer(data->default_vl_file, &default_vl); + if (ret != 0) + return; + + /* Is this the actual default seen by new processes? */ + child_vl = get_child_rdvl(data); + if (child_vl != default_vl) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + default_vl, child_vl); + return; + } + + ksft_test_result_pass("%s default vector length %d\n", data->name, + default_vl); + data->default_vl = default_vl; +} + +/* Verify that we can write a minimum value and have it take effect */ +static void proc_write_min(struct vec_data *data) +{ + int ret, new_default, child_vl; + + if (geteuid() != 0) { + ksft_test_result_skip("Need to be root to write to /proc\n"); + return; + } + + ret = file_write_integer(data->default_vl_file, ARCH_MIN_VL); + if (ret != 0) + return; + + /* What was the new value? */ + ret = file_read_integer(data->default_vl_file, &new_default); + if (ret != 0) + return; + + /* Did it take effect in a new process? */ + child_vl = get_child_rdvl(data); + if (child_vl != new_default) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + new_default, child_vl); + return; + } + + ksft_test_result_pass("%s minimum vector length %d\n", data->name, + new_default); + data->min_vl = new_default; + + file_write_integer(data->default_vl_file, data->default_vl); +} + +/* Verify that we can write a maximum value and have it take effect */ +static void proc_write_max(struct vec_data *data) +{ + int ret, new_default, child_vl; + + if (geteuid() != 0) { + ksft_test_result_skip("Need to be root to write to /proc\n"); + return; + } + + /* -1 is accepted by the /proc interface as the maximum VL */ + ret = file_write_integer(data->default_vl_file, -1); + if (ret != 0) + return; + + /* What was the new value? */ + ret = file_read_integer(data->default_vl_file, &new_default); + if (ret != 0) + return; + + /* Did it take effect in a new process? */ + child_vl = get_child_rdvl(data); + if (child_vl != new_default) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + new_default, child_vl); + return; + } + + ksft_test_result_pass("%s maximum vector length %d\n", data->name, + new_default); + data->max_vl = new_default; + + file_write_integer(data->default_vl_file, data->default_vl); +} + +/* Can we read back a VL from prctl? */ +static void prctl_get(struct vec_data *data) +{ + int ret; + + ret = prctl(data->prctl_get); + if (ret == -1) { + ksft_test_result_fail("%s prctl() read failed: %d (%s)\n", + data->name, errno, strerror(errno)); + return; + } + + /* Mask out any flags */ + ret &= PR_SVE_VL_LEN_MASK; + + /* Is that what we can read back directly? */ + if (ret == data->rdvl()) + ksft_test_result_pass("%s current VL is %d\n", + data->name, ret); + else + ksft_test_result_fail("%s prctl() VL %d but RDVL is %d\n", + data->name, ret, data->rdvl()); +} + +/* Does the prctl let us set the VL we already have? */ +static void prctl_set_same(struct vec_data *data) +{ + int cur_vl = data->rdvl(); + int ret; + + ret = prctl(data->prctl_set, cur_vl); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed: %d (%s)\n", + data->name, errno, strerror(errno)); + return; + } + + if (cur_vl != data->rdvl()) + ksft_test_result_pass("%s current VL is %d\n", + data->name, ret); + else + ksft_test_result_fail("%s prctl() VL %d but RDVL is %d\n", + data->name, ret, data->rdvl()); +} + +/* Can we set a new VL for this process? */ +static void prctl_set(struct vec_data *data) +{ + int ret; + + if (data->min_vl == data->max_vl) { + ksft_test_result_skip("%s only one VL supported\n", + data->name); + return; + } + + /* Try to set the minimum VL */ + ret = prctl(data->prctl_set, data->min_vl); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->min_vl, + errno, strerror(errno)); + return; + } + + if ((ret & PR_SVE_VL_LEN_MASK) != data->min_vl) { + ksft_test_result_fail("%s prctl set %d but return value is %d\n", + data->name, data->min_vl, data->rdvl()); + return; + } + + if (data->rdvl() != data->min_vl) { + ksft_test_result_fail("%s set %d but RDVL is %d\n", + data->name, data->min_vl, data->rdvl()); + return; + } + + /* Try to set the maximum VL */ + ret = prctl(data->prctl_set, data->max_vl); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->max_vl, + errno, strerror(errno)); + return; + } + + if ((ret & PR_SVE_VL_LEN_MASK) != data->max_vl) { + ksft_test_result_fail("%s prctl() set %d but return value is %d\n", + data->name, data->max_vl, data->rdvl()); + return; + } + + /* The _INHERIT flag should not be present when we read the VL */ + ret = prctl(data->prctl_get); + if (ret == -1) { + ksft_test_result_fail("%s prctl() read failed: %d (%s)\n", + data->name, errno, strerror(errno)); + return; + } + + if (ret & PR_SVE_VL_INHERIT) { + ksft_test_result_fail("%s prctl() reports _INHERIT\n", + data->name); + return; + } + + ksft_test_result_pass("%s prctl() set min/max\n", data->name); +} + +/* If we didn't request it a new VL shouldn't affect the child */ +static void prctl_set_no_child(struct vec_data *data) +{ + int ret, child_vl; + + if (data->min_vl == data->max_vl) { + ksft_test_result_skip("%s only one VL supported\n", + data->name); + return; + } + + ret = prctl(data->prctl_set, data->min_vl); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->min_vl, + errno, strerror(errno)); + return; + } + + /* Ensure the default VL is different */ + ret = file_write_integer(data->default_vl_file, data->max_vl); + if (ret != 0) + return; + + /* Check that the child has the default we just set */ + child_vl = get_child_rdvl(data); + if (child_vl != data->max_vl) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + data->max_vl, child_vl); + return; + } + + ksft_test_result_pass("%s vector length used default\n", data->name); + + file_write_integer(data->default_vl_file, data->default_vl); +} + +/* If we didn't request it a new VL shouldn't affect the child */ +static void prctl_set_for_child(struct vec_data *data) +{ + int ret, child_vl; + + if (data->min_vl == data->max_vl) { + ksft_test_result_skip("%s only one VL supported\n", + data->name); + return; + } + + ret = prctl(data->prctl_set, data->min_vl | PR_SVE_VL_INHERIT); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->min_vl, + errno, strerror(errno)); + return; + } + + /* The _INHERIT flag should be present when we read the VL */ + ret = prctl(data->prctl_get); + if (ret == -1) { + ksft_test_result_fail("%s prctl() read failed: %d (%s)\n", + data->name, errno, strerror(errno)); + return; + } + if (!(ret & PR_SVE_VL_INHERIT)) { + ksft_test_result_fail("%s prctl() does not report _INHERIT\n", + data->name); + return; + } + + /* Ensure the default VL is different */ + ret = file_write_integer(data->default_vl_file, data->max_vl); + if (ret != 0) + return; + + /* Check that the child inherited our VL */ + child_vl = get_child_rdvl(data); + if (child_vl != data->min_vl) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + data->min_vl, child_vl); + return; + } + + ksft_test_result_pass("%s vector length was inherited\n", data->name); + + file_write_integer(data->default_vl_file, data->default_vl); +} + +/* _ONEXEC takes effect only in the child process */ +static void prctl_set_onexec(struct vec_data *data) +{ + int ret, child_vl; + + if (data->min_vl == data->max_vl) { + ksft_test_result_skip("%s only one VL supported\n", + data->name); + return; + } + + /* Set a known value for the default and our current VL */ + ret = file_write_integer(data->default_vl_file, data->max_vl); + if (ret != 0) + return; + + ret = prctl(data->prctl_set, data->max_vl); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->min_vl, + errno, strerror(errno)); + return; + } + + /* Set a different value for the child to have on exec */ + ret = prctl(data->prctl_set, data->min_vl | PR_SVE_SET_VL_ONEXEC); + if (ret < 0) { + ksft_test_result_fail("%s prctl set failed for %d: %d (%s)\n", + data->name, data->min_vl, + errno, strerror(errno)); + return; + } + + /* Our current VL should stay the same */ + if (data->rdvl() != data->max_vl) { + ksft_test_result_fail("%s VL changed by _ONEXEC prctl()\n", + data->name); + return; + } + + /* Check that the child inherited our VL */ + child_vl = get_child_rdvl(data); + if (child_vl != data->min_vl) { + ksft_test_result_fail("%s is %d but child VL is %d\n", + data->default_vl_file, + data->min_vl, child_vl); + return; + } + + ksft_test_result_pass("%s vector length set on exec\n", data->name); + + file_write_integer(data->default_vl_file, data->default_vl); +} + +typedef void (*test_type)(struct vec_data *); + +static const test_type tests[] = { + /* + * The default/min/max tests must be first and in this order + * to provide data for other tests. + */ + proc_read_default, + proc_write_min, + proc_write_max, + + prctl_get, + prctl_set, + prctl_set_no_child, + prctl_set_for_child, + prctl_set_onexec, +}; + +int main(void) +{ + int i, j; + + ksft_print_header(); + ksft_set_plan(ARRAY_SIZE(tests) * ARRAY_SIZE(vec_data)); + + for (i = 0; i < ARRAY_SIZE(vec_data); i++) { + struct vec_data *data = &vec_data[i]; + unsigned long supported; + + supported = getauxval(data->hwcap_type) & data->hwcap; + + for (j = 0; j < ARRAY_SIZE(tests); j++) { + if (supported) + tests[j](data); + else + ksft_test_result_skip("%s not supported\n", + data->name); + } + } + + ksft_exit_pass(); +} From patchwork Thu Jul 29 17:37:13 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 488740 Delivered-To: patch@linaro.org Received: by 2002:a05:6638:1185:0:0:0:0 with SMTP id f5csp2371763jas; Thu, 29 Jul 2021 10:37:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz1+4Y68gLBBZaNd5zIvXu4/iW66QMSA5x4KZAK9Qt289gIKct8V6cCAXUDo0vTWDrKJltG X-Received: by 2002:aa7:d748:: with SMTP id a8mr7209193eds.169.1627580257683; Thu, 29 Jul 2021 10:37:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627580257; cv=none; d=google.com; s=arc-20160816; b=UV5eDu449amaB7a4xkhROVlJdn6Wnmecf3puXvua/Y8coMYQxkF+5BizqV5bgDOfSg 7VZAdgVInPBTBBV/fFzk2fm6G8+8SKpiPjgTs8OFvPk5pg2jdnU26vq188UgN0cpjJSv xCx9QDXlDEexgYXFwCAUBnU6ZRG3ZgS9AwpAQ98DigGvzgbVo6aCdTIRMRNrVBfeQemt BsE0SkK+XXzrO6uUpowFpVZq4nmKGR8TXficXuiCQyRC06bp363pwFVEKQJZwi4Hg9Xz hZV/xcY0HGOnT0AAklGdZYaB5MIPa/cykiL46AMYwiscyGK8QScf6txtMXtjymnRHB0s DLmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4yRXMPmR+3XEhRWasDYe5qLb0bWViuPTmKuicZKMgn8=; b=ayUuseoOHfVtqRqpsj817vSqIzx5fybEd/3lT7IyxWMws9bWB3ZiphAPmLhrlkUam+ I/x/wG366op+tmwivtVrVaVyTGQSACMFmm/qsPqpLqsOzW0Bv8JvfjZUCB0JkRomTeqp f7PLoDYJakIa0W5ib90OE4dmQ960V9nn9oxyFy4EIN4XqM7hWU3h6d9j/CSFJGzGjs1/ 7cbG54PugETgxunq3YvBGg8wts10UZMgvhv9aa6d9A1AAHU2DYKmPjHN5rhvkyz18zbr 2l46Q0w+T39AWNIYtcTHHNGYKhS/ZHL1l4w8sibMqLofGBzL/fQoG9csSF98ClPw1Ikg BAOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E8LK8n4f; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si3465803eds.488.2021.07.29.10.37.37; Thu, 29 Jul 2021 10:37:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E8LK8n4f; spf=pass (google.com: domain of linux-kselftest-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kselftest-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229657AbhG2Rhj (ORCPT + 5 others); Thu, 29 Jul 2021 13:37:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:49422 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229844AbhG2Rhj (ORCPT ); Thu, 29 Jul 2021 13:37:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id ADCF160F42; Thu, 29 Jul 2021 17:37:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627580256; bh=cqrIBm2+sPklmC33fnKs89kCRIiPSCWLJxj9sFAPJDg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=E8LK8n4f3Ok3kQ2k+PRuT/K75+0RTmp/aBrZpaZYCygKwc4xt3JP5epoUnIrcaNlf J/w69jWmEaSVaT5diYraUjpSQ9wndv2gF0EknbMJ+EjILBRUhApg/kWOeU6+JPbpWr KzYjvbcuNspLBHs4e6K9gBKwgh12uDiC2U8Zzsm/L2kSOQZNlgd2M81jM7cLrF39k/ UeiG/YAXceFljLRt8tRLVCexSxbKWfe04WqXHUEE0QRQWmrBGV+jca5vwlDeVirHcm ncYgP9SOUeruySnLyDjli2sPUdJejLlfOofy/NrZ3YokpxzVMaAvd1n9eZewIS1yo6 Mqhh/Q3IinyRw== From: Mark Brown To: Catalin Marinas , Will Deacon , Shuah Khan Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, Mark Brown Subject: [PATCH v4 4/4] kselftest/arm64: Add a TODO list for floating point tests Date: Thu, 29 Jul 2021 18:37:13 +0100 Message-Id: <20210729173713.4534-5-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210729173713.4534-1-broonie@kernel.org> References: <20210729173713.4534-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=729; h=from:subject; bh=cqrIBm2+sPklmC33fnKs89kCRIiPSCWLJxj9sFAPJDg=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBhAudIpAt85pVYYwEvPdu3ySEq4insB+GbRbW9Wt46 aWTg8G+JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYQLnSAAKCRAk1otyXVSH0LuQB/ 9qqmY9aNIXsJ435N/UpULhUjREijRfIqfAVltCqUpOLH5tdkK/WGSaAK68jfzwXBpTyyjx9PF/HONV C4jgtHE/GQjtlK+tFoFKG6EgvkDx1NxJPslapD73aa9itICxfEv6/FXfo0/GdHv3bsZagF/GEnVrE/ heOJj/eC+JpFoRTslY9F96XG6Cp0RiaRxlEICt2emzvt7hdKa5YDo8yCf5sZhfqfZaXXsiIfJDrCup d8w5SHDAnVXwgy5gJNbsBPU6BH4OUD1pG1+le1hTT4AJBXOJpN3jrgeBYC/V6q+RWbHI8B7PiEGSYG XN2/mv7yAOPXy/azUsL7Zw6qBLBw4G X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org Write down some ideas for additional coverage for floating point in case someone feels inspired to look into them. Signed-off-by: Mark Brown Reviewed-by: Dave Martin --- tools/testing/selftests/arm64/fp/TODO | 3 +++ 1 file changed, 3 insertions(+) create mode 100644 tools/testing/selftests/arm64/fp/TODO -- 2.20.1 diff --git a/tools/testing/selftests/arm64/fp/TODO b/tools/testing/selftests/arm64/fp/TODO new file mode 100644 index 000000000000..eada915227cf --- /dev/null +++ b/tools/testing/selftests/arm64/fp/TODO @@ -0,0 +1,3 @@ +- Test unsupported values in the ABIs +- More coverage for ptrace (eg, vector length conversions). +- Coverage for signals.