diff mbox series

[v5] syscalls/mlock05: add mlock test for locking and pre-faulting of memory

Message ID 20240513151408.237675-1-fstornio@redhat.com
State Accepted
Headers show
Series [v5] syscalls/mlock05: add mlock test for locking and pre-faulting of memory | expand

Commit Message

Filippo Storniolo May 13, 2024, 3:14 p.m. UTC
check Rss and Locked variables from /proc/$pid/smaps of the
the new memory mapping.
Rss and Locked size should be equal to the size
of the memory allocation.

Co-developed-by: Dennis Brendel <dbrendel@redhat.com>
Signed-off-by: Filippo Storniolo <fstornio@redhat.com>
---
 runtest/syscalls                           |   1 +
 testcases/kernel/syscalls/mlock/.gitignore |   1 +
 testcases/kernel/syscalls/mlock/mlock05.c  | 114 +++++++++++++++++++++
 3 files changed, 116 insertions(+)
 create mode 100644 testcases/kernel/syscalls/mlock/mlock05.c

Comments

Cyril Hrubis May 14, 2024, 3:16 p.m. UTC | #1
Hi!
Applied, thanks.
diff mbox series

Patch

diff --git a/runtest/syscalls b/runtest/syscalls
index 252123d8b..05a52fc8f 100644
--- a/runtest/syscalls
+++ b/runtest/syscalls
@@ -781,6 +781,7 @@  mlock01 mlock01
 mlock02 mlock02
 mlock03 mlock03 -i 20
 mlock04 mlock04
+mlock05 mlock05
 
 mlock201 mlock201
 mlock202 mlock202
diff --git a/testcases/kernel/syscalls/mlock/.gitignore b/testcases/kernel/syscalls/mlock/.gitignore
index 306574bbc..1872229b8 100644
--- a/testcases/kernel/syscalls/mlock/.gitignore
+++ b/testcases/kernel/syscalls/mlock/.gitignore
@@ -2,3 +2,4 @@ 
 /mlock02
 /mlock03
 /mlock04
+/mlock05
diff --git a/testcases/kernel/syscalls/mlock/mlock05.c b/testcases/kernel/syscalls/mlock/mlock05.c
new file mode 100644
index 000000000..8e805736d
--- /dev/null
+++ b/testcases/kernel/syscalls/mlock/mlock05.c
@@ -0,0 +1,114 @@ 
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright Red Hat
+ * Author: Filippo Storniolo <fstornio@redhat.com>
+ */
+
+/*\
+ * [Description]
+ *
+ * Verify mlock() causes pre-faulting of PTEs and prevent memory to be swapped out.
+ *
+ * Find the new mapping in /proc/$pid/smaps and check Rss and Locked fields after
+ * mlock syscall:
+ * Rss and Locked size should be equal to the size of the memory allocation
+ */
+
+#include "tst_test.h"
+#include "tst_safe_stdio.h"
+
+#define MMAPLEN			(1UL<<20)
+#define LINELEN			256
+
+static void get_proc_smaps_info(unsigned long desired_mapping_address, unsigned long *Rss, unsigned long *Locked)
+{
+	bool mapping_found = false;
+	bool Locked_found = false;
+	bool Rss_found = false;
+	char buffer[LINELEN];
+	FILE *fp;
+	int ret;
+
+	fp = SAFE_FOPEN("/proc/self/smaps", "r");
+
+	while (fgets(buffer, LINELEN, fp) != NULL) {
+		unsigned long mapping_address;
+
+		ret = sscanf(buffer, "%lx[^-]", &mapping_address);
+		if ((ret == 1) && (mapping_address == desired_mapping_address)) {
+			mapping_found = true;
+			break;
+		}
+	}
+
+	if (!mapping_found) {
+		SAFE_FCLOSE(fp);
+		tst_brk(TBROK, "Mapping %lx not found in /proc/self/smaps", desired_mapping_address);
+		return;
+	}
+
+	while (fgets(buffer, LINELEN, fp) != NULL) {
+		unsigned long possible_starting_mapping;
+		unsigned long possible_ending_mapping;
+
+		ret = sscanf(buffer, "%lx-%lx", &possible_starting_mapping, &possible_ending_mapping);
+		if (ret == 2)
+			break;
+
+		if (strncmp(buffer, "Rss", strlen("Rss")) == 0) {
+			ret = sscanf(buffer, "%*[^:]:%lu kB", Rss);
+			if (ret != 1) {
+				SAFE_FCLOSE(fp);
+				tst_brk(TBROK, "failure occurred while reading field Rss");
+				return;
+			}
+
+			Rss_found = true;
+		}
+
+		if (strncmp(buffer, "Locked", strlen("Locked")) == 0) {
+			ret = sscanf(buffer, "%*[^:]:%lu kB", Locked);
+			if (ret != 1) {
+				SAFE_FCLOSE(fp);
+				tst_brk(TBROK, "failure occurred while reading field Locked");
+				return;
+			}
+
+			Locked_found =  true;
+		}
+
+		if (Rss_found && Locked_found) {
+			SAFE_FCLOSE(fp);
+			return;
+		}
+	}
+
+	SAFE_FCLOSE(fp);
+	tst_brk(TBROK, "cannot find both Rss and Locked in mapping %lx", desired_mapping_address);
+}
+
+static void verify_mlock(void)
+{
+	unsigned long Locked;
+	unsigned long Rss;
+	char *buf;
+
+	buf = SAFE_MMAP(NULL, MMAPLEN, PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
+	SAFE_MLOCK(buf, MMAPLEN);
+
+	get_proc_smaps_info((unsigned long)buf, &Rss, &Locked);
+
+	// Convertion from KiB to B
+	Rss *= 1024;
+	Locked *= 1024;
+
+	TST_EXP_EQ_LU(Rss, MMAPLEN);
+	TST_EXP_EQ_LU(Locked, MMAPLEN);
+
+	SAFE_MUNLOCK(buf, MMAPLEN);
+	SAFE_MUNMAP(buf, MMAPLEN);
+}
+
+static struct tst_test test = {
+	.test_all = verify_mlock,
+};