From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B01B0C71159 for ; Mon, 16 Jun 2025 16:07:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3B7086B0099; Mon, 16 Jun 2025 12:07:06 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 340A26B009A; Mon, 16 Jun 2025 12:07:06 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 22F266B009B; Mon, 16 Jun 2025 12:07:06 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 0B0936B0099 for ; Mon, 16 Jun 2025 12:07:06 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id A8B6A1A0837 for ; Mon, 16 Jun 2025 16:07:05 +0000 (UTC) X-FDA: 83561742810.15.0C973DF Received: from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by imf14.hostedemail.com (Postfix) with ESMTP id 4C35C10000A for ; Mon, 16 Jun 2025 16:07:03 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=ibm.com header.s=pp1 header.b=saNTRhBk; dmarc=pass (policy=none) header.from=ibm.com; spf=pass (imf14.hostedemail.com: domain of aboorvad@linux.ibm.com designates 148.163.158.5 as permitted sender) smtp.mailfrom=aboorvad@linux.ibm.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1750090023; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=xe0e17Cr1rJj295eXhp8vC9URjObKeiC1eU0faSu0MY=; b=LU9tTQg3HN+APaNm8EisWy0xypbJZ2QFLl5zISrQBUeIo9iqGuBG439317ozgrMAvA6ese fBuCqdfs8hCyf4eb0MOWYXUKzVyS/wXCr/pWsoN34nQqaFhUSr0KK3qJaR06hGFZBrn32R ufZVWTLLY62oMWC54g7qRENnEUihjzI= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1750090023; a=rsa-sha256; cv=none; b=tQl2QC36+1hcXitiKF1W/cNNK57LbZdo/M6Rrv2uYRKQTtnVY41oldfzEpjsGlLaZEqdM5 6DHswaoQkjpgKZoHQZmQjIIYqNBtSluQ5kVMApJZn1C+PhudDQiyBekmeMtxdmzXy5NrBR xO0LTqFnB+X8eughxBd/w78VyGaPhjA= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=ibm.com header.s=pp1 header.b=saNTRhBk; dmarc=pass (policy=none) header.from=ibm.com; spf=pass (imf14.hostedemail.com: domain of aboorvad@linux.ibm.com designates 148.163.158.5 as permitted sender) smtp.mailfrom=aboorvad@linux.ibm.com Received: from pps.filterd (m0356516.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 55G88dRW014140; Mon, 16 Jun 2025 16:06:58 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc :content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=pp1; bh=xe0e17Cr1rJj295eX hp8vC9URjObKeiC1eU0faSu0MY=; b=saNTRhBk1qp2DZ82wm5UENHtt2QlyWfCx oB9bVix9PXWXMDoDywGuS8PWEtJhV20nMOkM3PbZmo3sCFvRQH3yxrBzz+5KfpOF cGQ6L5oTDYDX/sywMPZ38rJUHCc86cWwAmMsu1FkrjEV7r298fVoEOlvmH/kZgHL tMCWS0uIKsSLrMyWXR2bu38wTEuN1mk8wlhEKkoyAcNvQSnT08NaxvaFhqz7vCli t+ZnrRVj9MgmxyD8FcFFBbEsBoLPOhVVQXop7n9CHu/Q+zTGFkVrzPlMAbtvVkoF xFcn6nrQEVrRbSEiMnYsjxMl1fTf/eVquLIgVKXdbD1O7tYDlN9nw== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4794qp1wyv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 16 Jun 2025 16:06:58 +0000 (GMT) Received: from m0356516.ppops.net (m0356516.ppops.net [127.0.0.1]) by pps.reinject (8.18.0.8/8.18.0.8) with ESMTP id 55GG6vfX006822; Mon, 16 Jun 2025 16:06:57 GMT Received: from ppma21.wdc07v.mail.ibm.com (5b.69.3da9.ip4.static.sl-reverse.com [169.61.105.91]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4794qp1wyt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 16 Jun 2025 16:06:57 +0000 (GMT) Received: from pps.filterd (ppma21.wdc07v.mail.ibm.com [127.0.0.1]) by ppma21.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id 55GCcx9P000724; Mon, 16 Jun 2025 16:06:56 GMT Received: from smtprelay02.fra02v.mail.ibm.com ([9.218.2.226]) by ppma21.wdc07v.mail.ibm.com (PPS) with ESMTPS id 479mdnxw6n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 16 Jun 2025 16:06:56 +0000 Received: from smtpav05.fra02v.mail.ibm.com (smtpav05.fra02v.mail.ibm.com [10.20.54.104]) by smtprelay02.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 55GG6qjG31654396 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 16 Jun 2025 16:06:53 GMT Received: from smtpav05.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D702120040; Mon, 16 Jun 2025 16:06:52 +0000 (GMT) Received: from smtpav05.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 097142004D; Mon, 16 Jun 2025 16:06:47 +0000 (GMT) Received: from li-c18b6acc-24ee-11b2-a85c-81492619bda1.ibm.com.com (unknown [9.43.33.110]) by smtpav05.fra02v.mail.ibm.com (Postfix) with ESMTP; Mon, 16 Jun 2025 16:06:46 +0000 (GMT) From: Aboorva Devarajan To: akpm@linux-foundation.org, Liam.Howlett@oracle.com, lorenzo.stoakes@oracle.com, shuah@kernel.org, pfalcato@suse.de, david@redhat.com, ziy@nvidia.com, baolin.wang@linux.alibaba.com, npache@redhat.com, ryan.roberts@arm.com, dev.jain@arm.com, baohua@kernel.org Cc: linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, donettom@linux.ibm.com, ritesh.list@gmail.com, aboorvad@linux.ibm.com Subject: [PATCH 2/6] selftest/mm: Fix ksm_funtional_test failures Date: Mon, 16 Jun 2025 21:36:28 +0530 Message-ID: <20250616160632.35250-3-aboorvad@linux.ibm.com> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250616160632.35250-1-aboorvad@linux.ibm.com> References: <20250616160632.35250-1-aboorvad@linux.ibm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: y6-_jGxMO5Ixf-POL2mqGkYKbYwgfbm9 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwNjE2MDEwMiBTYWx0ZWRfX34W9jF4ui3Cu EsFMr1Z3PTiuT5+jFm5U6x/pNBXOXOvzAJIHjQqP5LIJwdahLaUTtQU7/Cbx606KEbXwaR55ZMc 1UBdDlVuSGMsDGkvfY7uQ1cNKzbh7ioY87VdOrj1f1CVHRr6FM1ctv2/4GDoYTvDkb3yZn7Fv7H Fw60Ju5277gBKI1+55xLGFSpMavBQHkOfEPLwjllKb+EBdiWgfDZGi9F8qx/nmxVJijeJud9O7c Yn4ThY3fWjfdO59jB5lGyt6sxo63kM+D/W+6KSEZYvvMDNdERrqGySESVy/Q6HLqBr31pthVrKD KJl4F6IawDKnlXdyVxWgrUNA1Vwq8wtla7+17SFmey8cSeUUMUqoH0kpZdMP/ejTw+gJp5HSEFp yiG0YQhwdyG51Fj4/g28VLUceBzGfkfAZelrrdaI++VVh01YXCjmMdW/hjUAKSrkZtr44Hxp X-Authority-Analysis: v=2.4 cv=NYfm13D4 c=1 sm=1 tr=0 ts=68504122 cx=c_pps a=GFwsV6G8L6GxiO2Y/PsHdQ==:117 a=GFwsV6G8L6GxiO2Y/PsHdQ==:17 a=6IFa9wvqVegA:10 a=VnNF1IyMAAAA:8 a=XZ3g74cd2hs7hPLhLkYA:9 X-Proofpoint-ORIG-GUID: -GNsCcKqF_06mTWmQeYuwTMVY67S1mTq X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.0.736,FMLib:17.12.80.40 definitions=2025-06-16_08,2025-06-13_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 adultscore=0 suspectscore=0 mlxlogscore=999 mlxscore=0 impostorscore=0 phishscore=0 lowpriorityscore=0 clxscore=1011 spamscore=0 priorityscore=1501 malwarescore=0 classifier=spam authscore=0 authtc=n/a authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2505280000 definitions=main-2506160102 X-Stat-Signature: ssspuezfjfb4mi5ujbgtj8wa388uqxwf X-Rspamd-Queue-Id: 4C35C10000A X-Rspam-User: X-Rspamd-Server: rspam06 X-HE-Tag: 1750090023-877036 X-HE-Meta: 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 tQnO7goM 0aE1N7sfAtF0Q7fSfSAHbq+7xAti1ue8SFg1xSqxuEd4EXkkJfSqjCb+dBto2ChueFHVG+z+0rIP+Akm75dYQouA0GViWsjrlBdEH+gwRx1sNVkx1S2XMSoq2HMw48BqJ7zIND40dWz3mTu09J74PKlECxxbMaSQ1sWpM9WTtb5lK8vBs0ERuMpGM3B5K2zHerzBLc0iz/DrQIKdUyMOpY34RjbYXBp1m5+P0TGyg7x9pcb06QHDA3mCkGMPsVbnYYICZK/wMO53OjmakDkx+yGRVS79U2fOfOEKeNd1ZhvbtvTrXh5toPOXAIFDbe3zB0chjuikwi7EqmFc= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Donet Tom This patch fixed 2 issues. 1)After fork() in test_prctl_fork, the child process uses the file descriptors from the parent process to read ksm_stat and ksm_merging_pages. This results in incorrect values being read (parent process ksm_stat and ksm_merge_pages will be read in child), causing the test to fail. This patch calls init_global_file_handles() in the child process to ensure that the current process's file descriptors are used to read ksm_stat and ksm_merging_pages. 2) All tests currently call ksm_merge to trigger page merging. To ensure the system remains in a consistent state for subsequent tests, it is better to call ksm_unmerge during the test cleanup phase In the test_prctl_fork test, after a fork(), reading ksm_merging_pages in the child process returns a non-zero value because a previous test performed a merge, and the child's memory state is inherited from the parent. Although the child process calls ksm_unmerge, the ksm_merging_pages counter in the parent is reset to zero, while the child's counter remains unchanged. This discrepancy causes the test to fail. To avoid this issue, each test should call ksm_unmerge during cleanup to ensure the counter is reset and the system is in a clean state for subsequent tests. Signed-off-by: Donet Tom Signed-off-by: Aboorva Devarajan --- tools/testing/selftests/mm/ksm_functional_tests.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/tools/testing/selftests/mm/ksm_functional_tests.c b/tools/testing/selftests/mm/ksm_functional_tests.c index b61803e36d1c..d7d3c22c077a 100644 --- a/tools/testing/selftests/mm/ksm_functional_tests.c +++ b/tools/testing/selftests/mm/ksm_functional_tests.c @@ -46,6 +46,8 @@ static int ksm_use_zero_pages_fd; static int pagemap_fd; static size_t pagesize; +static void init_global_file_handles(void); + static bool range_maps_duplicates(char *addr, unsigned long size) { unsigned long offs_a, offs_b, pfn_a, pfn_b; @@ -274,6 +276,7 @@ static void test_unmerge(void) ksft_test_result(!range_maps_duplicates(map, size), "Pages were unmerged\n"); unmap: + ksm_unmerge(); munmap(map, size); } @@ -338,6 +341,7 @@ static void test_unmerge_zero_pages(void) ksft_test_result(!range_maps_duplicates(map, size), "KSM zero pages were unmerged\n"); unmap: + ksm_unmerge(); munmap(map, size); } @@ -366,6 +370,7 @@ static void test_unmerge_discarded(void) ksft_test_result(!range_maps_duplicates(map, size), "Pages were unmerged\n"); unmap: + ksm_unmerge(); munmap(map, size); } @@ -428,6 +433,7 @@ static void test_unmerge_uffd_wp(void) close_uffd: close(uffd); unmap: + ksm_unmerge(); munmap(map, size); } #endif @@ -491,6 +497,7 @@ static int test_child_ksm(void) else if (map == MAP_MERGE_SKIP) return -3; + ksm_unmerge(); munmap(map, size); return 0; } @@ -524,6 +531,7 @@ static void test_prctl_fork(void) child_pid = fork(); if (!child_pid) { + init_global_file_handles(); exit(test_child_ksm()); } else if (child_pid < 0) { ksft_test_result_fail("fork() failed\n"); @@ -620,6 +628,7 @@ static void test_prctl_unmerge(void) ksft_test_result(!range_maps_duplicates(map, size), "Pages were unmerged\n"); unmap: + ksm_unmerge(); munmap(map, size); } @@ -653,6 +662,7 @@ static void test_prot_none(void) ksft_test_result(!range_maps_duplicates(map, size), "Pages were unmerged\n"); unmap: + ksm_unmerge(); munmap(map, size); } -- 2.43.5