Module Name: src Committed By: maxv Date: Sun Apr 26 09:08:41 UTC 2020
Modified Files: src/distrib/sets/lists/debug: md.amd64 src/distrib/sets/lists/tests: md.amd64 src/tests/modules: Makefile Added Files: src/tests/modules: t_x86_pte.c src/tests/modules/x86_pte_tester: Makefile x86_pte_tester.c Log Message: Add tests on the x86 PTEs. We scan the MMU page tables directly and verify certain properties. To generate a diff of this commit: cvs rdiff -u -r1.107 -r1.108 src/distrib/sets/lists/debug/md.amd64 cvs rdiff -u -r1.8 -r1.9 src/distrib/sets/lists/tests/md.amd64 cvs rdiff -u -r1.18 -r1.19 src/tests/modules/Makefile cvs rdiff -u -r0 -r1.1 src/tests/modules/t_x86_pte.c cvs rdiff -u -r0 -r1.1 src/tests/modules/x86_pte_tester/Makefile \ src/tests/modules/x86_pte_tester/x86_pte_tester.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/distrib/sets/lists/debug/md.amd64 diff -u src/distrib/sets/lists/debug/md.amd64:1.107 src/distrib/sets/lists/debug/md.amd64:1.108 --- src/distrib/sets/lists/debug/md.amd64:1.107 Sun Apr 19 13:22:58 2020 +++ src/distrib/sets/lists/debug/md.amd64 Sun Apr 26 09:08:40 2020 @@ -1,4 +1,4 @@ -# $NetBSD: md.amd64,v 1.107 2020/04/19 13:22:58 maxv Exp $ +# $NetBSD: md.amd64,v 1.108 2020/04/26 09:08:40 maxv Exp $ ./usr/lib/i386/12.202++_g.a comp-c-debuglib debuglib,compat,12.202xx ./usr/lib/i386/libi386_g.a comp-c-debuglib debuglib,compat ./usr/lib/i386/libiberty_g.a comp-obsolete obsolete @@ -28,3 +28,4 @@ ./usr/libdata/debug/usr/tests/lib/libi386/t_user_ldt.debug tests-lib-debug debug,atf ./usr/libdata/debug/usr/tests/lib/libnvmm/h_io_assist.debug tests-lib-debug debug,atf ./usr/libdata/debug/usr/tests/lib/libnvmm/h_mem_assist.debug tests-lib-debug debug,atf +./usr/libdata/debug/usr/tests/modules/t_x86_pte.debug tests-sys-debug debug,atf Index: src/distrib/sets/lists/tests/md.amd64 diff -u src/distrib/sets/lists/tests/md.amd64:1.8 src/distrib/sets/lists/tests/md.amd64:1.9 --- src/distrib/sets/lists/tests/md.amd64:1.8 Sun Apr 19 13:22:58 2020 +++ src/distrib/sets/lists/tests/md.amd64 Sun Apr 26 09:08:40 2020 @@ -1,4 +1,4 @@ -# $NetBSD: md.amd64,v 1.8 2020/04/19 13:22:58 maxv Exp $ +# $NetBSD: md.amd64,v 1.9 2020/04/26 09:08:40 maxv Exp $ ./usr/tests/kernel/arch/x86/Atffile tests-obsolete obsolete ./usr/tests/kernel/arch/x86/Kyuafile tests-obsolete obsolete ./usr/tests/kernel/arch/x86/t_ptrace_wait tests-obsolete obsolete @@ -12,3 +12,6 @@ ./usr/tests/lib/libnvmm/t_io_assist tests-lib-tests compattestfile,atf ./usr/tests/lib/libnvmm/h_mem_assist tests-lib-tests compattestfile,atf ./usr/tests/lib/libnvmm/t_mem_assist tests-lib-tests compattestfile,atf +./usr/tests/modules/t_x86_pte tests-sys-tests atf +./usr/tests/modules/x86_pte_tester tests-sys-tests atf +./usr/tests/modules/x86_pte_tester/x86_pte_tester.kmod tests-sys-tests atf Index: src/tests/modules/Makefile diff -u src/tests/modules/Makefile:1.18 src/tests/modules/Makefile:1.19 --- src/tests/modules/Makefile:1.18 Sun Mar 1 18:08:15 2020 +++ src/tests/modules/Makefile Sun Apr 26 09:08:40 2020 @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.18 2020/03/01 18:08:15 christos Exp $ +# $NetBSD: Makefile,v 1.19 2020/04/26 09:08:40 maxv Exp $ .include <bsd.own.mk> @@ -20,6 +20,10 @@ LDADD.${i}= -lprop LDADD.${i}+= -lrumpfs_kernfs ${LIBRUMPBASE} .endfor +.if ${MACHINE} == "amd64" +TESTS_C+= t_x86_pte +.endif + TESTS_SH= t_abi_uvm TESTS_SH+= t_modload TESTS_SH+= t_klua_pr_52864 @@ -31,5 +35,8 @@ SUBDIR+= k_helper3 SUBDIR+= k_uvm SUBDIR+= threadpool_tester SUBDIR+= ufetchstore +.if ${MACHINE} == "amd64" +SUBDIR+= x86_pte_tester +.endif .include <bsd.test.mk> Added files: Index: src/tests/modules/t_x86_pte.c diff -u /dev/null src/tests/modules/t_x86_pte.c:1.1 --- /dev/null Sun Apr 26 09:08:41 2020 +++ src/tests/modules/t_x86_pte.c Sun Apr 26 09:08:40 2020 @@ -0,0 +1,132 @@ +/* $NetBSD: t_x86_pte.c,v 1.1 2020/04/26 09:08:40 maxv Exp $ */ + +/* + * Copyright (c) 2020 The NetBSD Foundation, Inc. + * All rights reserved. + * + * This code is derived from software contributed to The NetBSD Foundation + * by Maxime Villard. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS + * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + */ + +#include <sys/cdefs.h> +__COPYRIGHT("@(#) Copyright (c) 2020\ + The NetBSD Foundation, inc. All rights reserved."); +__RCSID("$NetBSD: t_x86_pte.c,v 1.1 2020/04/26 09:08:40 maxv Exp $"); + +#include <sys/types.h> +#include <sys/module.h> +#include <sys/sysctl.h> +#include <err.h> +#include <errno.h> +#include <atf-c.h> + +#define mib_name "kern.x86_pte_test.test" +#define MODULE_PATH "/usr/tests/modules/x86_pte_tester/x86_pte_tester.kmod" +#define MODULE_NAME "x86_pte_tester" + +static bool module_loaded; + +static void +load_module(void) +{ +#ifndef SKIP_MODULE + if (module_loaded) + return; + + modctl_load_t params = { + .ml_filename = MODULE_PATH, + .ml_flags = MODCTL_NO_PROP, + }; + + if (modctl(MODCTL_LOAD, ¶ms) != 0) { + warn("failed to load module '%s'", MODULE_PATH); + } else { + module_loaded = true; + } +#else + module_loaded = true; +#endif /* ! SKIP_MODULE */ +} + +static void +unload_module(void) +{ +#ifndef SKIP_MODULE + char module_name[] = MODULE_NAME; + + if (modctl(MODCTL_UNLOAD, module_name) != 0) { + warn("failed to unload module '%s'", MODULE_NAME); + } else { + module_loaded = false; + } +#endif /* ! SKIP_MODULE */ +} + +ATF_TC_WITH_CLEANUP(x86_pte); +ATF_TC_HEAD(x86_pte, tc) +{ + atf_tc_set_md_var(tc, "descr", + "testing the PTEs for correctness"); +} +ATF_TC_BODY(x86_pte, tc) +{ + struct { + size_t n_rwx; + bool kernel_map_with_low_ptes; + bool pte_is_user_accessible; + size_t n_user_space_is_kernel; + size_t n_kernel_space_is_user; + size_t n_svs_g_bit_set; + } results; + size_t len = sizeof(results); + int rv; + + load_module(); + if (!module_loaded) { + atf_tc_skip("loading '%s' module failed.", MODULE_NAME); + } + + rv = sysctlbyname(mib_name, &results, &len, 0, 0); + ATF_REQUIRE_EQ(rv, 0); + + ATF_REQUIRE_EQ(results.n_rwx, 0); + ATF_REQUIRE_EQ(results.kernel_map_with_low_ptes, false); + ATF_REQUIRE_EQ(results.pte_is_user_accessible, false); + ATF_REQUIRE_EQ(results.n_user_space_is_kernel, 0); + ATF_REQUIRE_EQ(results.n_kernel_space_is_user, 0); + if (results.n_svs_g_bit_set != (size_t)-1) { + ATF_REQUIRE_EQ(results.n_svs_g_bit_set, 0); + } +} +ATF_TC_CLEANUP(x86_pte, tc) +{ + unload_module(); +} + +ATF_TP_ADD_TCS(tp) +{ + ATF_TP_ADD_TC(tp, x86_pte); + + return atf_no_error(); +} Index: src/tests/modules/x86_pte_tester/Makefile diff -u /dev/null src/tests/modules/x86_pte_tester/Makefile:1.1 --- /dev/null Sun Apr 26 09:08:41 2020 +++ src/tests/modules/x86_pte_tester/Makefile Sun Apr 26 09:08:41 2020 @@ -0,0 +1,14 @@ +# $NetBSD: Makefile,v 1.1 2020/04/26 09:08:41 maxv Exp $ + +.include <bsd.own.mk> + +KMOD= x86_pte_tester +KMODULEDIR= ${DESTDIR}/${TESTSBASE}/modules/${KMOD} + +SRCS= x86_pte_tester.c + +ATFFILE= no +NOMAN= # defined + +.include <bsd.test.mk> +.include <bsd.kmodule.mk> Index: src/tests/modules/x86_pte_tester/x86_pte_tester.c diff -u /dev/null src/tests/modules/x86_pte_tester/x86_pte_tester.c:1.1 --- /dev/null Sun Apr 26 09:08:41 2020 +++ src/tests/modules/x86_pte_tester/x86_pte_tester.c Sun Apr 26 09:08:41 2020 @@ -0,0 +1,464 @@ +/* $NetBSD: x86_pte_tester.c,v 1.1 2020/04/26 09:08:41 maxv Exp $ */ + +/* + * Copyright (c) 2016 The NetBSD Foundation, Inc. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS + * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + */ + +#define __HAVE_DIRECT_MAP +#define __HAVE_PCPU_AREA +#define SVS + +#include <sys/cdefs.h> +#include <sys/param.h> +#include <sys/module.h> +#include <sys/proc.h> +#include <sys/sysctl.h> +#include <uvm/uvm.h> +#include <x86/pmap.h> + +#if defined(__x86_64__) +# include <amd64/pmap.h> +# define NLEVEL 4 +#else +# error "Unsupported configuration" +#endif + +static struct { + struct sysctllog *ctx_sysctllog; + vaddr_t levels[NLEVEL]; + struct { + size_t l4; + size_t l3; + size_t l2; + size_t l1; + } coord; + struct { + size_t n_rwx; + bool kernel_map_with_low_ptes; + bool pte_is_user_accessible; + size_t n_user_space_is_kernel; + size_t n_kernel_space_is_user; + size_t n_svs_g_bit_set; + } results; +} tester_ctx; + +typedef enum { + WALK_NEXT, /* go to the next level */ + WALK_SKIP, /* skip the next level, but keep iterating on the current one */ + WALK_STOP /* stop the iteration on the current level */ +} walk_type; + +/* -------------------------------------------------------------------------- */ + +#define is_flag(__ent, __flag) (((__ent) & __flag) != 0) +#define is_valid(__ent) is_flag(__ent, PTE_P) +#define get_pa(__pde) (__pde & PTE_FRAME) + +#define L4_MAX_NENTRIES (PAGE_SIZE / sizeof(pd_entry_t)) +#define L3_MAX_NENTRIES (PAGE_SIZE / sizeof(pd_entry_t)) +#define L2_MAX_NENTRIES (PAGE_SIZE / sizeof(pd_entry_t)) +#define L1_MAX_NENTRIES (PAGE_SIZE / sizeof(pd_entry_t)) + +static void +scan_l1(paddr_t pa, walk_type (fn)(pd_entry_t pde, size_t slot, int lvl)) +{ + pd_entry_t *pd = (pd_entry_t *)tester_ctx.levels[0]; + size_t i; + + pmap_kenter_pa(tester_ctx.levels[0], pa, VM_PROT_READ, 0); + pmap_update(pmap_kernel()); + + for (i = 0; i < L1_MAX_NENTRIES; i++) { + tester_ctx.coord.l1 = i; + if (is_valid(pd[i])) { + fn(pd[i], i, 1); + } + } + + pmap_kremove(tester_ctx.levels[0], PAGE_SIZE); + pmap_update(pmap_kernel()); +} + +static void +scan_l2(paddr_t pa, walk_type (fn)(pd_entry_t pde, size_t slot, int lvl)) +{ + pd_entry_t *pd = (pd_entry_t *)tester_ctx.levels[1]; + walk_type ret; + size_t i; + + pmap_kenter_pa(tester_ctx.levels[1], pa, VM_PROT_READ, 0); + pmap_update(pmap_kernel()); + + for (i = 0; i < L2_MAX_NENTRIES; i++) { + tester_ctx.coord.l2 = i; + if (!is_valid(pd[i])) + continue; + ret = fn(pd[i], i, 2); + if (ret == WALK_STOP) + break; + if (is_flag(pd[i], PTE_PS)) + continue; + if (ret == WALK_NEXT) + scan_l1(get_pa(pd[i]), fn); + } + + pmap_kremove(tester_ctx.levels[1], PAGE_SIZE); + pmap_update(pmap_kernel()); +} + +static void +scan_l3(paddr_t pa, walk_type (fn)(pd_entry_t pde, size_t slot, int lvl)) +{ + pd_entry_t *pd = (pd_entry_t *)tester_ctx.levels[2]; + walk_type ret; + size_t i; + + pmap_kenter_pa(tester_ctx.levels[2], pa, VM_PROT_READ, 0); + pmap_update(pmap_kernel()); + + for (i = 0; i < L3_MAX_NENTRIES; i++) { + tester_ctx.coord.l3 = i; + if (!is_valid(pd[i])) + continue; + ret = fn(pd[i], i, 3); + if (ret == WALK_STOP) + break; + if (is_flag(pd[i], PTE_PS)) + continue; + if (ret == WALK_NEXT) + scan_l2(get_pa(pd[i]), fn); + } + + pmap_kremove(tester_ctx.levels[2], PAGE_SIZE); + pmap_update(pmap_kernel()); +} + +static void +scan_l4(paddr_t pa, walk_type (fn)(pd_entry_t pde, size_t slot, int lvl)) +{ + pd_entry_t *pd = (pd_entry_t *)tester_ctx.levels[3]; + walk_type ret; + size_t i; + + pmap_kenter_pa(tester_ctx.levels[3], pa, VM_PROT_READ, 0); + pmap_update(pmap_kernel()); + + for (i = 0; i < L4_MAX_NENTRIES; i++) { + tester_ctx.coord.l4 = i; + if (!is_valid(pd[i])) + continue; + ret = fn(pd[i], i, 4); + if (ret == WALK_STOP) + break; + if (is_flag(pd[i], PTE_PS)) + continue; + if (ret == WALK_NEXT) + scan_l3(get_pa(pd[i]), fn); + } + + pmap_kremove(tester_ctx.levels[3], PAGE_SIZE); + pmap_update(pmap_kernel()); +} + +static void +scan_tree(paddr_t pa, walk_type (fn)(pd_entry_t pde, size_t slot, int lvl)) +{ + scan_l4(pa, fn); +} + +/* -------------------------------------------------------------------------- */ + +/* + * Rule: the number of kernel RWX pages should be zero. + */ +static walk_type +count_krwx(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl == NLEVEL && slot < 256) { + return WALK_SKIP; + } + if (is_flag(pde, PTE_NX) || !is_flag(pde, PTE_W)) { + return WALK_SKIP; + } + if (lvl != 1 && !is_flag(pde, PTE_PS)) { + return WALK_NEXT; + } + + if (lvl == 4) { + tester_ctx.results.n_rwx += (NBPD_L4 / PAGE_SIZE); + } else if (lvl == 3) { + tester_ctx.results.n_rwx += (NBPD_L3 / PAGE_SIZE); + } else if (lvl == 2) { + tester_ctx.results.n_rwx += (NBPD_L2 / PAGE_SIZE); + } else if (lvl == 1) { + tester_ctx.results.n_rwx += (NBPD_L1 / PAGE_SIZE); + } + + return WALK_NEXT; +} + +/* + * Rule: the lower half of the kernel map must be zero. + */ +static walk_type +check_kernel_map(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl != NLEVEL) { + return WALK_STOP; + } + if (slot >= 256) { + return WALK_SKIP; + } + if (pde != 0) { + tester_ctx.results.kernel_map_with_low_ptes |= true; + } + return WALK_SKIP; +} + +/* + * Rule: the PTE space must not have user permissions. + */ +static walk_type +check_pte_space(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl != NLEVEL) { + return WALK_STOP; + } + if (slot != PDIR_SLOT_PTE) { + return WALK_SKIP; + } + if (is_flag(pde, PTE_U)) { + tester_ctx.results.pte_is_user_accessible |= true; + } + return WALK_SKIP; +} + +/* + * Rule: each page in the lower half must have user permissions. + */ +static walk_type +check_user_space(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl == NLEVEL && slot >= 256) { + return WALK_SKIP; + } + if (!is_flag(pde, PTE_U)) { + tester_ctx.results.n_user_space_is_kernel += 1; + return WALK_SKIP; + } + return WALK_NEXT; +} + +/* + * Rule: each page in the higher half must have kernel permissions. + */ +static walk_type +check_kernel_space(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl == NLEVEL && slot < 256) { + return WALK_SKIP; + } + if (lvl == NLEVEL && slot == PDIR_SLOT_PTE) { + return WALK_SKIP; + } + if (is_flag(pde, PTE_U)) { + tester_ctx.results.n_kernel_space_is_user += 1; + return WALK_SKIP; + } + return WALK_NEXT; +} + +/* + * Rule: the SVS map is allowed to use the G bit only on the PCPU area. + */ +static walk_type +check_svs_g_bit(pd_entry_t pde, size_t slot, int lvl) +{ + if (lvl == NLEVEL && slot == PDIR_SLOT_PCPU) { + return WALK_SKIP; + } + if (is_flag(pde, PTE_G)) { + tester_ctx.results.n_svs_g_bit_set += 1; + return WALK_SKIP; + } + return WALK_NEXT; +} + +/* -------------------------------------------------------------------------- */ + +static void +scan_svs(void) +{ + extern bool svs_enabled; + paddr_t pa0; + + if (!svs_enabled) { + tester_ctx.results.n_svs_g_bit_set = -1; + return; + } + + kpreempt_disable(); + pa0 = curcpu()->ci_svs_updirpa; + scan_tree(pa0, &check_user_space); + scan_tree(pa0, &check_kernel_space); + scan_tree(pa0, &check_svs_g_bit); + kpreempt_enable(); +} + +static void +scan_proc(struct proc *p) +{ + struct pmap *pmap = p->p_vmspace->vm_map.pmap; + paddr_t pa0; + + mutex_enter(&pmap->pm_lock); + + kpreempt_disable(); + pa0 = (paddr_t)pmap->pm_pdirpa[0]; + scan_tree(pa0, &check_user_space); + scan_tree(pa0, &check_kernel_space); + scan_tree(pa0, &check_pte_space); + kpreempt_enable(); + + mutex_exit(&pmap->pm_lock); +} + +static void +x86_pte_run_scans(void) +{ + struct pmap *kpm = pmap_kernel(); + paddr_t pa0; + + memset(&tester_ctx.results, 0, sizeof(tester_ctx.results)); + + /* Scan the current user process. */ + scan_proc(curproc); + + /* Scan the SVS mapping. */ + scan_svs(); + + /* Scan the kernel map. */ + pa0 = (paddr_t)kpm->pm_pdirpa[0]; + scan_tree(pa0, &count_krwx); + scan_tree(pa0, &check_kernel_map); +} + +static void +x86_pte_levels_init(void) +{ + size_t i; + for (i = 0; i < NLEVEL; i++) { + tester_ctx.levels[i] = uvm_km_alloc(kernel_map, PAGE_SIZE, 0, + UVM_KMF_VAONLY); + } +} + +static void +x86_pte_levels_destroy(void) +{ + size_t i; + for (i = 0; i < NLEVEL; i++) { + uvm_km_free(kernel_map, tester_ctx.levels[i], PAGE_SIZE, + UVM_KMF_VAONLY); + } +} + +/* -------------------------------------------------------------------------- */ + +static int +x86_pte_sysctl_run(SYSCTLFN_ARGS) +{ + if (oldlenp == NULL) + return EINVAL; + + x86_pte_run_scans(); + + if (oldp == NULL) { + *oldlenp = sizeof(tester_ctx.results); + return 0; + } + + if (*oldlenp < sizeof(tester_ctx.results)) + return ENOMEM; + + return copyout(&tester_ctx.results, oldp, sizeof(tester_ctx.results)); +} + +static int +x86_pte_sysctl_init(void) +{ + struct sysctllog **log = &tester_ctx.ctx_sysctllog; + const struct sysctlnode *rnode, *cnode; + int error; + + error = sysctl_createv(log, 0, NULL, &rnode, CTLFLAG_PERMANENT, + CTLTYPE_NODE, "x86_pte_test", + SYSCTL_DESCR("x86_pte testing interface"), + NULL, 0, NULL, 0, CTL_KERN, CTL_CREATE, CTL_EOL); + if (error) + goto out; + + error = sysctl_createv(log, 0, &rnode, &cnode, CTLFLAG_PERMANENT, + CTLTYPE_STRUCT, "test", + SYSCTL_DESCR("execute a x86_pte test"), + x86_pte_sysctl_run, 0, NULL, 0, CTL_CREATE, CTL_EOL); + +out: + if (error) + sysctl_teardown(log); + return error; +} + +static void +x86_pte_sysctl_destroy(void) +{ + sysctl_teardown(&tester_ctx.ctx_sysctllog); +} + +/* -------------------------------------------------------------------------- */ + +MODULE(MODULE_CLASS_MISC, x86_pte_tester, NULL); + +static int +x86_pte_tester_modcmd(modcmd_t cmd, void *arg __unused) +{ + int error = 0; + + switch (cmd) { + case MODULE_CMD_INIT: + x86_pte_levels_init(); + error = x86_pte_sysctl_init(); + break; + case MODULE_CMD_FINI: + x86_pte_sysctl_destroy(); + x86_pte_levels_destroy(); + break; + default: + error = ENOTTY; + break; + } + + return error; +}