lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20231118104040.386381-4-zhangxiaoxu@huaweicloud.com>
Date:   Sat, 18 Nov 2023 18:40:29 +0800
From:   Zhang Xiaoxu <zhangxiaoxu@...weicloud.com>
To:     zhangxiaoxu5@...wei.com, weiyongjun1@...wei.com,
        linux-kernel@...r.kernel.org, broonie@...nel.org,
        rostedt@...dmis.org, mingo@...hat.com, frowand.list@...il.com,
        linux-spi@...r.kernel.org
Subject: [PATCH -next 03/14] kddv/core: Add io fault support to bpf program

From: Zhang Xiaoxu <zhangxiaoxu5@...wei.com>

Add common io fault interface, then the bpf program can use
it to mock the hardware io error.

Signed-off-by: Wei Yongjun <weiyongjun1@...wei.com>
Signed-off-by: Zhang Xiaoxu <zhangxiaoxu5@...wei.com>
---
 tools/testing/kddv/kddv/core/consts.py              |  1 +
 tools/testing/kddv/kddv/core/model.py               |  4 ++++
 .../kddv/kddv/data/bpf/include/bpf-xfer-conf.h      | 13 +++++++++++++
 3 files changed, 18 insertions(+)

diff --git a/tools/testing/kddv/kddv/core/consts.py b/tools/testing/kddv/kddv/core/consts.py
index 22abd7fc655c..b761407f5e88 100755
--- a/tools/testing/kddv/kddv/core/consts.py
+++ b/tools/testing/kddv/kddv/core/consts.py
@@ -10,3 +10,4 @@ CFG_REG_MASK = 0x10
 CFG_REG_RSH = 0x11
 CFG_REG_LSH = 0x12
 CFG_REG_ORD = 0x13
+CFG_IO_FAULT = 0x20
diff --git a/tools/testing/kddv/kddv/core/model.py b/tools/testing/kddv/kddv/core/model.py
index 494b69566536..ff782c20313d 100755
--- a/tools/testing/kddv/kddv/core/model.py
+++ b/tools/testing/kddv/kddv/core/model.py
@@ -8,6 +8,7 @@
 
 from .driver import Driver
 from .mockup import Mockup
+from .consts import CFG_IO_FAULT
 
 class DriverModel(object):
     bus = None
@@ -89,3 +90,6 @@ class DriverModel(object):
 
     def write_regs(self, addr, data):
         self.mockup.write_regs(addr, data)
+
+    def trigger_io_fault(self, count = 1):
+        self.mockup.write_config(CFG_IO_FAULT, count)
diff --git a/tools/testing/kddv/kddv/data/bpf/include/bpf-xfer-conf.h b/tools/testing/kddv/kddv/data/bpf/include/bpf-xfer-conf.h
index 49adbcc6a1af..6a09bd391641 100644
--- a/tools/testing/kddv/kddv/data/bpf/include/bpf-xfer-conf.h
+++ b/tools/testing/kddv/kddv/data/bpf/include/bpf-xfer-conf.h
@@ -18,6 +18,7 @@
 #define BPF_CONF_REG_RSHIFT	0x11
 #define BPF_CONF_REG_LSHIFT	0x12
 #define BPF_CONF_REG_XBSWAP	0x13
+#define BPF_CONF_IO_FAULT	0x20
 
 struct {
 	__uint(type, BPF_MAP_TYPE_ARRAY);
@@ -28,6 +29,7 @@ struct {
 
 static u32 bpf_reg_mask, bpf_reg_xbswap;
 static u32 bpf_reg_rshift, bpf_reg_lshift;
+static u32 bpf_io_fault;
 
 static u32 bpf_xfer_read_conf(u32 key)
 {
@@ -59,6 +61,7 @@ static int bpf_xfer_update_config(void)
 	bpf_reg_rshift = bpf_xfer_read_conf(BPF_CONF_REG_RSHIFT);
 	bpf_reg_lshift = bpf_xfer_read_conf(BPF_CONF_REG_LSHIFT);
 	bpf_reg_xbswap = bpf_xfer_read_conf(BPF_CONF_REG_XBSWAP);
+	bpf_io_fault = bpf_xfer_read_conf(BPF_CONF_IO_FAULT);
 
 	return 0;
 }
@@ -108,4 +111,14 @@ u32 bpf_xfer_reg_u32(u32 reg)
 		reg = reg << bpf_reg_lshift;
 	return reg;
 }
+
+bool bpf_xfer_should_fault(void)
+{
+	bpf_xfer_update_config();
+
+	if (bpf_io_fault)
+		bpf_xfer_write_conf(BPF_CONF_IO_FAULT, bpf_io_fault - 1);
+
+	return !!bpf_io_fault;
+}
 #endif
-- 
2.34.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ