~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/membarrier/membarrier_test_impl.h

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0 */
  2 #define _GNU_SOURCE
  3 #include <linux/membarrier.h>
  4 #include <syscall.h>
  5 #include <stdio.h>
  6 #include <errno.h>
  7 #include <string.h>
  8 #include <pthread.h>
  9 
 10 #include "../kselftest.h"
 11 
 12 static int registrations;
 13 
 14 static int sys_membarrier(int cmd, int flags)
 15 {
 16         return syscall(__NR_membarrier, cmd, flags);
 17 }
 18 
 19 static int test_membarrier_get_registrations(int cmd)
 20 {
 21         int ret, flags = 0;
 22         const char *test_name =
 23                 "sys membarrier MEMBARRIER_CMD_GET_REGISTRATIONS";
 24 
 25         registrations |= cmd;
 26 
 27         ret = sys_membarrier(MEMBARRIER_CMD_GET_REGISTRATIONS, 0);
 28         if (ret < 0) {
 29                 ksft_exit_fail_msg(
 30                         "%s test: flags = %d, errno = %d\n",
 31                         test_name, flags, errno);
 32         } else if (ret != registrations) {
 33                 ksft_exit_fail_msg(
 34                         "%s test: flags = %d, ret = %d, registrations = %d\n",
 35                         test_name, flags, ret, registrations);
 36         }
 37         ksft_test_result_pass(
 38                 "%s test: flags = %d, ret = %d, registrations = %d\n",
 39                 test_name, flags, ret, registrations);
 40 
 41         return 0;
 42 }
 43 
 44 static int test_membarrier_cmd_fail(void)
 45 {
 46         int cmd = -1, flags = 0;
 47         const char *test_name = "sys membarrier invalid command";
 48 
 49         if (sys_membarrier(cmd, flags) != -1) {
 50                 ksft_exit_fail_msg(
 51                         "%s test: command = %d, flags = %d. Should fail, but passed\n",
 52                         test_name, cmd, flags);
 53         }
 54         if (errno != EINVAL) {
 55                 ksft_exit_fail_msg(
 56                         "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
 57                         test_name, flags, EINVAL, strerror(EINVAL),
 58                         errno, strerror(errno));
 59         }
 60 
 61         ksft_test_result_pass(
 62                 "%s test: command = %d, flags = %d, errno = %d. Failed as expected\n",
 63                 test_name, cmd, flags, errno);
 64         return 0;
 65 }
 66 
 67 static int test_membarrier_flags_fail(void)
 68 {
 69         int cmd = MEMBARRIER_CMD_QUERY, flags = 1;
 70         const char *test_name = "sys membarrier MEMBARRIER_CMD_QUERY invalid flags";
 71 
 72         if (sys_membarrier(cmd, flags) != -1) {
 73                 ksft_exit_fail_msg(
 74                         "%s test: flags = %d. Should fail, but passed\n",
 75                         test_name, flags);
 76         }
 77         if (errno != EINVAL) {
 78                 ksft_exit_fail_msg(
 79                         "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
 80                         test_name, flags, EINVAL, strerror(EINVAL),
 81                         errno, strerror(errno));
 82         }
 83 
 84         ksft_test_result_pass(
 85                 "%s test: flags = %d, errno = %d. Failed as expected\n",
 86                 test_name, flags, errno);
 87         return 0;
 88 }
 89 
 90 static int test_membarrier_global_success(void)
 91 {
 92         int cmd = MEMBARRIER_CMD_GLOBAL, flags = 0;
 93         const char *test_name = "sys membarrier MEMBARRIER_CMD_GLOBAL";
 94 
 95         if (sys_membarrier(cmd, flags) != 0) {
 96                 ksft_exit_fail_msg(
 97                         "%s test: flags = %d, errno = %d\n",
 98                         test_name, flags, errno);
 99         }
100 
101         ksft_test_result_pass(
102                 "%s test: flags = %d\n", test_name, flags);
103         return 0;
104 }
105 
106 static int test_membarrier_private_expedited_fail(void)
107 {
108         int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
109         const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED not registered failure";
110 
111         if (sys_membarrier(cmd, flags) != -1) {
112                 ksft_exit_fail_msg(
113                         "%s test: flags = %d. Should fail, but passed\n",
114                         test_name, flags);
115         }
116         if (errno != EPERM) {
117                 ksft_exit_fail_msg(
118                         "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
119                         test_name, flags, EPERM, strerror(EPERM),
120                         errno, strerror(errno));
121         }
122 
123         ksft_test_result_pass(
124                 "%s test: flags = %d, errno = %d\n",
125                 test_name, flags, errno);
126         return 0;
127 }
128 
129 static int test_membarrier_register_private_expedited_success(void)
130 {
131         int cmd = MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED, flags = 0;
132         const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED";
133 
134         if (sys_membarrier(cmd, flags) != 0) {
135                 ksft_exit_fail_msg(
136                         "%s test: flags = %d, errno = %d\n",
137                         test_name, flags, errno);
138         }
139 
140         ksft_test_result_pass(
141                 "%s test: flags = %d\n",
142                 test_name, flags);
143 
144         test_membarrier_get_registrations(cmd);
145         return 0;
146 }
147 
148 static int test_membarrier_private_expedited_success(void)
149 {
150         int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
151         const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED";
152 
153         if (sys_membarrier(cmd, flags) != 0) {
154                 ksft_exit_fail_msg(
155                         "%s test: flags = %d, errno = %d\n",
156                         test_name, flags, errno);
157         }
158 
159         ksft_test_result_pass(
160                 "%s test: flags = %d\n",
161                 test_name, flags);
162         return 0;
163 }
164 
165 static int test_membarrier_private_expedited_sync_core_fail(void)
166 {
167         int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE, flags = 0;
168         const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE not registered failure";
169 
170         if (sys_membarrier(cmd, flags) != -1) {
171                 ksft_exit_fail_msg(
172                         "%s test: flags = %d. Should fail, but passed\n",
173                         test_name, flags);
174         }
175         if (errno != EPERM) {
176                 ksft_exit_fail_msg(
177                         "%s test: flags = %d. Should return (%d: \"%s\"), but returned (%d: \"%s\").\n",
178                         test_name, flags, EPERM, strerror(EPERM),
179                         errno, strerror(errno));
180         }
181 
182         ksft_test_result_pass(
183                 "%s test: flags = %d, errno = %d\n",
184                 test_name, flags, errno);
185         return 0;
186 }
187 
188 static int test_membarrier_register_private_expedited_sync_core_success(void)
189 {
190         int cmd = MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE, flags = 0;
191         const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE";
192 
193         if (sys_membarrier(cmd, flags) != 0) {
194                 ksft_exit_fail_msg(
195                         "%s test: flags = %d, errno = %d\n",
196                         test_name, flags, errno);
197         }
198 
199         ksft_test_result_pass(
200                 "%s test: flags = %d\n",
201                 test_name, flags);
202 
203         test_membarrier_get_registrations(cmd);
204         return 0;
205 }
206 
207 static int test_membarrier_private_expedited_sync_core_success(void)
208 {
209         int cmd = MEMBARRIER_CMD_PRIVATE_EXPEDITED, flags = 0;
210         const char *test_name = "sys membarrier MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE";
211 
212         if (sys_membarrier(cmd, flags) != 0) {
213                 ksft_exit_fail_msg(
214                         "%s test: flags = %d, errno = %d\n",
215                         test_name, flags, errno);
216         }
217 
218         ksft_test_result_pass(
219                 "%s test: flags = %d\n",
220                 test_name, flags);
221         return 0;
222 }
223 
224 static int test_membarrier_register_global_expedited_success(void)
225 {
226         int cmd = MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED, flags = 0;
227         const char *test_name = "sys membarrier MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED";
228 
229         if (sys_membarrier(cmd, flags) != 0) {
230                 ksft_exit_fail_msg(
231                         "%s test: flags = %d, errno = %d\n",
232                         test_name, flags, errno);
233         }
234 
235         ksft_test_result_pass(
236                 "%s test: flags = %d\n",
237                 test_name, flags);
238 
239         test_membarrier_get_registrations(cmd);
240         return 0;
241 }
242 
243 static int test_membarrier_global_expedited_success(void)
244 {
245         int cmd = MEMBARRIER_CMD_GLOBAL_EXPEDITED, flags = 0;
246         const char *test_name = "sys membarrier MEMBARRIER_CMD_GLOBAL_EXPEDITED";
247 
248         if (sys_membarrier(cmd, flags) != 0) {
249                 ksft_exit_fail_msg(
250                         "%s test: flags = %d, errno = %d\n",
251                         test_name, flags, errno);
252         }
253 
254         ksft_test_result_pass(
255                 "%s test: flags = %d\n",
256                 test_name, flags);
257         return 0;
258 }
259 
260 static int test_membarrier_fail(void)
261 {
262         int status;
263 
264         status = test_membarrier_cmd_fail();
265         if (status)
266                 return status;
267         status = test_membarrier_flags_fail();
268         if (status)
269                 return status;
270         status = test_membarrier_private_expedited_fail();
271         if (status)
272                 return status;
273         status = sys_membarrier(MEMBARRIER_CMD_QUERY, 0);
274         if (status < 0) {
275                 ksft_test_result_fail("sys_membarrier() failed\n");
276                 return status;
277         }
278         if (status & MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE) {
279                 status = test_membarrier_private_expedited_sync_core_fail();
280                 if (status)
281                         return status;
282         }
283         return 0;
284 }
285 
286 static int test_membarrier_success(void)
287 {
288         int status;
289 
290         status = test_membarrier_global_success();
291         if (status)
292                 return status;
293         status = test_membarrier_register_private_expedited_success();
294         if (status)
295                 return status;
296         status = test_membarrier_private_expedited_success();
297         if (status)
298                 return status;
299         status = sys_membarrier(MEMBARRIER_CMD_QUERY, 0);
300         if (status < 0) {
301                 ksft_test_result_fail("sys_membarrier() failed\n");
302                 return status;
303         }
304         if (status & MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE) {
305                 status = test_membarrier_register_private_expedited_sync_core_success();
306                 if (status)
307                         return status;
308                 status = test_membarrier_private_expedited_sync_core_success();
309                 if (status)
310                         return status;
311         }
312         /*
313          * It is valid to send a global membarrier from a non-registered
314          * process.
315          */
316         status = test_membarrier_global_expedited_success();
317         if (status)
318                 return status;
319         status = test_membarrier_register_global_expedited_success();
320         if (status)
321                 return status;
322         status = test_membarrier_global_expedited_success();
323         if (status)
324                 return status;
325         return 0;
326 }
327 
328 static int test_membarrier_query(void)
329 {
330         int flags = 0, ret;
331 
332         ret = sys_membarrier(MEMBARRIER_CMD_QUERY, flags);
333         if (ret < 0) {
334                 if (errno == ENOSYS) {
335                         /*
336                          * It is valid to build a kernel with
337                          * CONFIG_MEMBARRIER=n. However, this skips the tests.
338                          */
339                         ksft_exit_skip(
340                                 "sys membarrier (CONFIG_MEMBARRIER) is disabled.\n");
341                 }
342                 ksft_exit_fail_msg("sys_membarrier() failed\n");
343         }
344         if (!(ret & MEMBARRIER_CMD_GLOBAL))
345                 ksft_exit_skip(
346                         "sys_membarrier unsupported: CMD_GLOBAL not found.\n");
347 
348         ksft_test_result_pass("sys_membarrier available\n");
349         return 0;
350 }
351 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php