membarrier_test.c 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312
  1. // SPDX-License-Identifier: GPL-2.0
  2. #define _GNU_SOURCE
  3. #include <linux/membarrier.h>
  4. #include <syscall.h>
  5. #include <stdio.h>
  6. #include <errno.h>
  7. #include <string.h>
  8. #include "../kselftest.h"
  9. static int sys_membarrier(int cmd, int flags)
  10. {
  11. return syscall(__NR_membarrier, cmd, flags);
  12. }
  13. static int test_membarrier_cmd_fail(void)
  14. {
  15. int cmd = -1, flags = 0;
  16. const char *test_name = "sys membarrier invalid command";
  17. if (sys_membarrier(cmd, flags) != -1) {
  18. ksft_exit_fail_msg(
  19. "%s test: command = %d, flags = %d. Should fail, but passed\n",
  20. test_name, cmd, flags);
  21. }
  22. if (errno != EINVAL) {
  23. ksft_exit_fail_msg(
  24. "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
  25. test_name, flags, EINVAL, strerror(EINVAL),
  26. errno, strerror(errno));
  27. }
  28. ksft_test_result_pass(
  29. "%s test: command = %d, flags = %d, errno = %d. Failed as expected\n",
  30. test_name, cmd, flags, errno);
  31. return 0;
  32. }
  33. static int test_membarrier_flags_fail(void)
  34. {
  35. int cmd = MEMBARRIER_CMD_QUERY, flags = 1;
  36. const char *test_name = "sys membarrier MEMBARRIER_CMD_QUERY invalid flags";
  37. if (sys_membarrier(cmd, flags) != -1) {
  38. ksft_exit_fail_msg(
  39. "%s test: flags = %d. Should fail, but passed\n",
  40. test_name, flags);
  41. }
  42. if (errno != EINVAL) {
  43. ksft_exit_fail_msg(
  44. "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
  45. test_name, flags, EINVAL, strerror(EINVAL),
  46. errno, strerror(errno));
  47. }
  48. ksft_test_result_pass(
  49. "%s test: flags = %d, errno = %d. Failed as expected\n",
  50. test_name, flags, errno);
  51. return 0;
  52. }
  53. static int test_membarrier_global_success(void)
  54. {
  55. int cmd = MEMBARRIER_CMD_GLOBAL, flags = 0;
  56. const char *test_name = "sys membarrier MEMBARRIER_CMD_GLOBAL";
  57. if (sys_membarrier(cmd, flags) != 0) {
  58. ksft_exit_fail_msg(
  59. "%s test: flags = %d, errno = %d\n",
  60. test_name, flags, errno);
  61. }
  62. ksft_test_result_pass(
  63. "%s test: flags = %d\n", test_name, flags);
  64. return 0;
  65. }
  66. static int test_membarrier_private_expedited_fail(void)
  67. {
  68. int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
  69. const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED not registered failure";
  70. if (sys_membarrier(cmd, flags) != -1) {
  71. ksft_exit_fail_msg(
  72. "%s test: flags = %d. Should fail, but passed\n",
  73. test_name, flags);
  74. }
  75. if (errno != EPERM) {
  76. ksft_exit_fail_msg(
  77. "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
  78. test_name, flags, EPERM, strerror(EPERM),
  79. errno, strerror(errno));
  80. }
  81. ksft_test_result_pass(
  82. "%s test: flags = %d, errno = %d\n",
  83. test_name, flags, errno);
  84. return 0;
  85. }
  86. static int test_membarrier_register_private_expedited_success(void)
  87. {
  88. int cmd = MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED, flags = 0;
  89. const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED";
  90. if (sys_membarrier(cmd, flags) != 0) {
  91. ksft_exit_fail_msg(
  92. "%s test: flags = %d, errno = %d\n",
  93. test_name, flags, errno);
  94. }
  95. ksft_test_result_pass(
  96. "%s test: flags = %d\n",
  97. test_name, flags);
  98. return 0;
  99. }
  100. static int test_membarrier_private_expedited_success(void)
  101. {
  102. int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
  103. const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED";
  104. if (sys_membarrier(cmd, flags) != 0) {
  105. ksft_exit_fail_msg(
  106. "%s test: flags = %d, errno = %d\n",
  107. test_name, flags, errno);
  108. }
  109. ksft_test_result_pass(
  110. "%s test: flags = %d\n",
  111. test_name, flags);
  112. return 0;
  113. }
  114. static int test_membarrier_private_expedited_sync_core_fail(void)
  115. {
  116. int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE, flags = 0;
  117. const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE not registered failure";
  118. if (sys_membarrier(cmd, flags) != -1) {
  119. ksft_exit_fail_msg(
  120. "%s test: flags = %d. Should fail, but passed\n",
  121. test_name, flags);
  122. }
  123. if (errno != EPERM) {
  124. ksft_exit_fail_msg(
  125. "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
  126. test_name, flags, EPERM, strerror(EPERM),
  127. errno, strerror(errno));
  128. }
  129. ksft_test_result_pass(
  130. "%s test: flags = %d, errno = %d\n",
  131. test_name, flags, errno);
  132. return 0;
  133. }
  134. static int test_membarrier_register_private_expedited_sync_core_success(void)
  135. {
  136. int cmd = MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE, flags = 0;
  137. const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE";
  138. if (sys_membarrier(cmd, flags) != 0) {
  139. ksft_exit_fail_msg(
  140. "%s test: flags = %d, errno = %d\n",
  141. test_name, flags, errno);
  142. }
  143. ksft_test_result_pass(
  144. "%s test: flags = %d\n",
  145. test_name, flags);
  146. return 0;
  147. }
  148. static int test_membarrier_private_expedited_sync_core_success(void)
  149. {
  150. int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
  151. const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE";
  152. if (sys_membarrier(cmd, flags) != 0) {
  153. ksft_exit_fail_msg(
  154. "%s test: flags = %d, errno = %d\n",
  155. test_name, flags, errno);
  156. }
  157. ksft_test_result_pass(
  158. "%s test: flags = %d\n",
  159. test_name, flags);
  160. return 0;
  161. }
  162. static int test_membarrier_register_global_expedited_success(void)
  163. {
  164. int cmd = MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED, flags = 0;
  165. const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED";
  166. if (sys_membarrier(cmd, flags) != 0) {
  167. ksft_exit_fail_msg(
  168. "%s test: flags = %d, errno = %d\n",
  169. test_name, flags, errno);
  170. }
  171. ksft_test_result_pass(
  172. "%s test: flags = %d\n",
  173. test_name, flags);
  174. return 0;
  175. }
  176. static int test_membarrier_global_expedited_success(void)
  177. {
  178. int cmd = MEMBARRIER_CMD_GLOBAL_EXPEDITED, flags = 0;
  179. const char *test_name = "sys membarrier MEMBARRIER_CMD_GLOBAL_EXPEDITED";
  180. if (sys_membarrier(cmd, flags) != 0) {
  181. ksft_exit_fail_msg(
  182. "%s test: flags = %d, errno = %d\n",
  183. test_name, flags, errno);
  184. }
  185. ksft_test_result_pass(
  186. "%s test: flags = %d\n",
  187. test_name, flags);
  188. return 0;
  189. }
  190. static int test_membarrier(void)
  191. {
  192. int status;
  193. status = test_membarrier_cmd_fail();
  194. if (status)
  195. return status;
  196. status = test_membarrier_flags_fail();
  197. if (status)
  198. return status;
  199. status = test_membarrier_global_success();
  200. if (status)
  201. return status;
  202. status = test_membarrier_private_expedited_fail();
  203. if (status)
  204. return status;
  205. status = test_membarrier_register_private_expedited_success();
  206. if (status)
  207. return status;
  208. status = test_membarrier_private_expedited_success();
  209. if (status)
  210. return status;
  211. status = sys_membarrier(MEMBARRIER_CMD_QUERY, 0);
  212. if (status < 0) {
  213. ksft_test_result_fail("sys_membarrier() failed\n");
  214. return status;
  215. }
  216. if (status & MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE) {
  217. status = test_membarrier_private_expedited_sync_core_fail();
  218. if (status)
  219. return status;
  220. status = test_membarrier_register_private_expedited_sync_core_success();
  221. if (status)
  222. return status;
  223. status = test_membarrier_private_expedited_sync_core_success();
  224. if (status)
  225. return status;
  226. }
  227. /*
  228. * It is valid to send a global membarrier from a non-registered
  229. * process.
  230. */
  231. status = test_membarrier_global_expedited_success();
  232. if (status)
  233. return status;
  234. status = test_membarrier_register_global_expedited_success();
  235. if (status)
  236. return status;
  237. status = test_membarrier_global_expedited_success();
  238. if (status)
  239. return status;
  240. return 0;
  241. }
  242. static int test_membarrier_query(void)
  243. {
  244. int flags = 0, ret;
  245. ret = sys_membarrier(MEMBARRIER_CMD_QUERY, flags);
  246. if (ret < 0) {
  247. if (errno == ENOSYS) {
  248. /*
  249. * It is valid to build a kernel with
  250. * CONFIG_MEMBARRIER=n. However, this skips the tests.
  251. */
  252. ksft_exit_skip(
  253. "sys membarrier (CONFIG_MEMBARRIER) is disabled.\n");
  254. }
  255. ksft_exit_fail_msg("sys_membarrier() failed\n");
  256. }
  257. if (!(ret & MEMBARRIER_CMD_GLOBAL))
  258. ksft_exit_skip(
  259. "sys_membarrier unsupported: CMD_GLOBAL not found.\n");
  260. ksft_test_result_pass("sys_membarrier available\n");
  261. return 0;
  262. }
  263. int main(int argc, char **argv)
  264. {
  265. ksft_print_header();
  266. test_membarrier_query();
  267. test_membarrier();
  268. return ksft_exit_pass();
  269. }