[LTP] [PATCH v4] syscalls/mlock05: add mlock test for locking and pre-faulting of memory
Filippo Storniolo
fstornio@redhat.com
Thu May 9 15:37:12 CEST 2024
check Rss and Locked variables from /proc/$pid/smaps of the
the new memory mapping.
Rss and Locked size should be equal to the size
of the memory allocation.
Co-developed-by: Dennis Brendel <dbrendel@redhat.com>
Signed-off-by: Filippo Storniolo <fstornio@redhat.com>
---
runtest/syscalls | 1 +
testcases/kernel/syscalls/mlock/.gitignore | 1 +
testcases/kernel/syscalls/mlock/mlock05.c | 103 +++++++++++++++++++++
3 files changed, 105 insertions(+)
create mode 100644 testcases/kernel/syscalls/mlock/mlock05.c
diff --git a/runtest/syscalls b/runtest/syscalls
index 252123d8b..05a52fc8f 100644
--- a/runtest/syscalls
+++ b/runtest/syscalls
@@ -781,6 +781,7 @@ mlock01 mlock01
mlock02 mlock02
mlock03 mlock03 -i 20
mlock04 mlock04
+mlock05 mlock05
mlock201 mlock201
mlock202 mlock202
diff --git a/testcases/kernel/syscalls/mlock/.gitignore b/testcases/kernel/syscalls/mlock/.gitignore
index 306574bbc..1872229b8 100644
--- a/testcases/kernel/syscalls/mlock/.gitignore
+++ b/testcases/kernel/syscalls/mlock/.gitignore
@@ -2,3 +2,4 @@
/mlock02
/mlock03
/mlock04
+/mlock05
diff --git a/testcases/kernel/syscalls/mlock/mlock05.c b/testcases/kernel/syscalls/mlock/mlock05.c
new file mode 100644
index 000000000..4b131d0dd
--- /dev/null
+++ b/testcases/kernel/syscalls/mlock/mlock05.c
@@ -0,0 +1,103 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright Red Hat
+ * Author: Filippo Storniolo <fstornio@redhat.com>
+ */
+
+/*\
+ * [Description]
+ *
+ * Verify mlock() causes pre-faulting of PTEs and prevent memory to be swapped out.
+ *
+ * Find the new mapping in /proc/$pid/smaps and check Rss and Locked fields after
+ * mlock syscall:
+ * Rss and Locked size should be equal to the size of the memory allocation
+ */
+
+#include "tst_test.h"
+
+#define MMAPLEN (1UL<<20)
+#define LINELEN 256
+
+static unsigned long get_proc_smaps_field(unsigned long desired_mapping_address, char *desired_field)
+{
+ bool mapping_found = false;
+ char buffer[LINELEN] = "";
+ FILE *file = NULL;
+ int ret = 0;
+
+ file = fopen("/proc/self/smaps", "r");
+ if (file == NULL) {
+ tst_brk(TBROK | TERRNO, "cannot open file proc/self/smaps");
+ return 0;
+ }
+
+ // find desired mapping
+ while (fgets(buffer, LINELEN, file) != NULL) {
+ unsigned long mapping_address;
+
+ // check the starting address
+ ret = sscanf(buffer, "%lx[^-]", &mapping_address);
+
+ if ((ret == 1) && (mapping_address == desired_mapping_address)) {
+ mapping_found = true;
+ break;
+ }
+ }
+
+ if (!mapping_found) {
+ fclose(file);
+ tst_brk(TBROK, "cannot find mapping %lx in proc/self/smaps", desired_mapping_address);
+ return 0;
+ }
+
+ // find desired field
+ while (fgets(buffer, LINELEN, file) != NULL) {
+ if (strstr(buffer, desired_field) != NULL) {
+ unsigned long desired_value;
+
+ // extract the value for the requested field
+ ret = sscanf(buffer, "%*[^0-9]%lu%*[^0-9]", &desired_value);
+ fclose(file);
+
+ if (ret != 1) {
+ tst_brk(TBROK, "failure occured while reading field %s", desired_field);
+ return 0;
+ }
+
+ return desired_value;
+ }
+ }
+
+ fclose(file);
+ tst_brk(TBROK, "cannot find %s field", desired_field);
+
+ return 0;
+}
+
+static void verify_mlock(void)
+{
+ unsigned long Locked;
+ unsigned long Rss;
+ char *buf;
+
+ buf = SAFE_MMAP(NULL, MMAPLEN, PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
+ SAFE_MLOCK(buf, MMAPLEN);
+
+ Rss = get_proc_smaps_field((unsigned long)buf, "Rss");
+ Locked = get_proc_smaps_field((unsigned long)buf, "Locked");
+
+ // Convertion from KiB to B
+ Rss *= 1024;
+ Locked *= 1024;
+
+ TST_EXP_EQ_LU(Rss, MMAPLEN);
+ TST_EXP_EQ_LU(Locked, MMAPLEN);
+
+ SAFE_MUNLOCK(buf, MMAPLEN);
+ SAFE_MUNMAP(buf, MMAPLEN);
+}
+
+static struct tst_test test = {
+ .test_all = verify_mlock,
+};
--
2.44.0
More information about the ltp
mailing list