From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B81FC3ABC3 for ; Fri, 9 May 2025 10:19:33 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E82888E000E; Fri, 9 May 2025 06:19:30 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id E0C806B00CD; Fri, 9 May 2025 06:19:30 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C3CD1280001; Fri, 9 May 2025 06:19:30 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 996826B00CC for ; Fri, 9 May 2025 06:19:30 -0400 (EDT) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id DA1B71A0603 for ; Fri, 9 May 2025 10:19:31 +0000 (UTC) X-FDA: 83422972542.11.F506981 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf21.hostedemail.com (Postfix) with ESMTP id 736821C0005 for ; Fri, 9 May 2025 10:19:29 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=IBXwfpa2; spf=pass (imf21.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1746785969; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=XftaH5FzyM09S5RzjEe09GkGUeEVV3zeck5+IqSohtk=; b=maecprGVEbAczOh6eXUlCqk0/ru05EUcgqTLKEIVcjgVZezPVjoeveJbG9JpaNTZbBU13K FU7zzti7H7e2yHpor1YxhmzFyfKHY7rzS9ym+qA+FGpm2cL7F2a56GMYHuR3vEOJIEZl6L g+LUnt3qA8S++Wz41BUwFUwgIQ8WsYo= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1746785969; a=rsa-sha256; cv=none; b=gvHzk6lpfvt4T/OZoiooeU64eyrZT8MwUHdyOQgxeU/GZjiDmJw3JPWrm/SsHOBUj22Sxc U8/u+xC5m0cnprpvwIojZaXCwj6dwQhtUAUut5DIFU5cMW9KYpyIQEMdXxUPk1H0vIhsUJ pj9e3wKdhNQTYMGjdUgm5Z5/PKmi12Y= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=IBXwfpa2; spf=pass (imf21.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1746785968; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=XftaH5FzyM09S5RzjEe09GkGUeEVV3zeck5+IqSohtk=; b=IBXwfpa2V/7jbsZIH9gotqf+SEmTO547BIeVCptJjBGkg2ianpFP8SJqKZBttvpJSHxtYR To4g9whDzLex/0amf/PW5+2EXUGvOlmk87oD3GALQlxG8gLKaX7mb0hKqaqUMTYFUHZSAF w/NwusmyHxSIB/3kTqaE/eGXI2LifbQ= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-651-bRcxP1fsMeuB3eGbD1cqOA-1; Fri, 09 May 2025 06:18:54 -0400 X-MC-Unique: bRcxP1fsMeuB3eGbD1cqOA-1 X-Mimecast-MFC-AGG-ID: bRcxP1fsMeuB3eGbD1cqOA_1746785933 Received: by mail-wm1-f72.google.com with SMTP id 5b1f17b1804b1-43e9b0fd00cso10051735e9.0 for ; Fri, 09 May 2025 03:18:54 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746785933; x=1747390733; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=XftaH5FzyM09S5RzjEe09GkGUeEVV3zeck5+IqSohtk=; b=mqKRYeXmNcL/xAW8P88MigbL5Z1RV3ccBB2TLodTf5LWNMHTatIyLokmnoROu5kAxl RARH4AXygiRuHeb0V+qn26z/S1brqxFH8NciazwzVxBMml10JmgJP0gaKhbq7AlUqfsC FbXqEUbz3VI8en3EgSxyxzydlzzv7qrdeOagDpDLpwQoyMZhT/i0nrijsQCNJ5bzCbaG ZkbfBYvgLpEpFq1zJbxoB+3cFqoJ3Z5q2FnvMvOzgqG9rLmmll8bm3yZzJ7sYll6CNtn dtAjhwZPqRZbZ2XZpD6U8Zw/HW+fod907BvNqHtBg6KN5mMfDvlIa7Sz3BwbXQB0RUhG FrJw== X-Forwarded-Encrypted: i=1; AJvYcCVECzIrulZu3u7WYr8TsuitYLwdPMiQXprMoyJQGdAsonZ0J+Rwl4YgMbpx2tMReoXGvMJkrMgP6w==@kvack.org X-Gm-Message-State: AOJu0Yz9huz5STsM4wJ0LrWEGXCSif+rSYyfZJ1DPq1Xk3DoO0RHjOND k9vNNBQoBpfpucscpfWWlzPqb3+f2Qy08WT+wnIdOP+n2BKaqZRs0EKwANP3YOojioAEXIQ9tSQ +wQdNJXl7NtX0N6DJPGlxU8WuncMFE3mIuPTmQqhkw9U7q3mI X-Gm-Gg: ASbGnctAHL/EcXqDuYajs0Ontj82B5w0r6fw4CW0hPiyUpfcwTt/i8BDKI/3MKJItep FK+P1WjXg3vR8Up0pLyD2ZKCeeHMXMtcH2VLu0lLyh6cvU+fyv7fXKj7PzL9ZslNgL5qjaTZYAM vOOSjJPDaD7eovVPRDycHpCKMvdSQozUGqxmOjNuAqyP7sqZjzCY/4r0MNCQbFv2VrtmLTwejHY 3TC5HsJmWhgV6z5TLntE0PpjNQcaDChDM2QUwO7nMIRzXg5FTOsTsX4Bi0+I/2vp7dYPn+TlVlY dM7rGI6iOHmGEpNgK+PCvIUMnpWKI4A2mIVWRiu8xJF4mT+jiKIfGY4O4rNy/o12xgqopMhrKqQ y7DNfvnkZGRD2K2iQ56Voku/xOJLJ/d/LSCmjSLw= X-Received: by 2002:a05:600c:5344:b0:43c:f3e1:a729 with SMTP id 5b1f17b1804b1-442d0312e08mr49366265e9.12.1746785933141; Fri, 09 May 2025 03:18:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEqSJEKsdFSiAMvPUrkU1iyZ1YBftQM/bXhK6JeyEYDfVJdYz7LYXx6vbUhXVTAL2+Dc5eQTQ== X-Received: by 2002:a05:600c:5344:b0:43c:f3e1:a729 with SMTP id 5b1f17b1804b1-442d0312e08mr49365945e9.12.1746785932599; Fri, 09 May 2025 03:18:52 -0700 (PDT) Received: from ?IPV6:2003:d8:2f45:5500:8267:647f:4209:dedd? (p200300d82f4555008267647f4209dedd.dip0.t-ipconnect.de. [2003:d8:2f45:5500:8267:647f:4209:dedd]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-442d67ee33bsm24482785e9.20.2025.05.09.03.18.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 09 May 2025 03:18:52 -0700 (PDT) Message-ID: <4efa9948-a523-4597-baa4-c36d18a658b0@redhat.com> Date: Fri, 9 May 2025 12:18:51 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v1] selftests/mm: add simple VM_PFNMAP tests based on mmap'ing /dev/mem To: Lorenzo Stoakes Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, Andrew Morton , Shuah Khan , Ingo Molnar , Peter Xu References: <20250508222041.1647645-1-david@redhat.com> <8c94faf4-9af9-4d43-a597-6b06dd21be95@lucifer.local> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: <8c94faf4-9af9-4d43-a597-6b06dd21be95@lucifer.local> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: gczOIfjHjuG2EBKRn-FROtoXPyYxTlxwT4MsBjoiSTc_1746785933 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Stat-Signature: qpkohxdr61n9znc8nzhk9478fw9t588y X-Rspamd-Queue-Id: 736821C0005 X-Rspam-User: X-Rspamd-Server: rspam02 X-HE-Tag: 1746785969-705491 X-HE-Meta: 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 Rm7wEWdd cke5iJ6KAz59MnqKU8oi7fyRb+sX+jUNB9nS/vzv6nGIMyWgWKWXXSWfTXCAzKQOZZYVK4Xq2wPmA+oGVMeZPvCa+skAw0ABYucEZWnmvwH2+00lOpE8hd5ym9/OaxdfI2qR7NU+I5kWXG2l65hk2OF+jR/+L+z8K7DgKsxNRksaIYmNAoX4npteIL+HuTgv9jye2EbQUvg8QwljuYFmQepswlOOH4lV/JvG7QCMlRVrEAk2cX66ki5OKwQYTMgx652M/6LKkEbygV8vduIKvoGTR+ujwvAotighGgr+d0yKZuMPxuSWcwjB6bxN09TDNd5nQu3tBZfs7H3d3a7OP2W0qPFAhaz0zCSy4qe5EoyM9T/R6ZKnZpEk1nnOGjycHXRTqJohsIO4FN5RRHxB7Bo3bGzN2kPoH6F/uIxA29PS5I7UPbYUtSRzXccULMl5gweyDdpXUKPbp3QDwliVE05r2GTjYIGgENKK5 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 09.05.25 11:49, Lorenzo Stoakes wrote: > On Fri, May 09, 2025 at 12:20:41AM +0200, David Hildenbrand wrote: >> Let's test some basic functionality using /dev/mem. These tests will >> implicitly cover some PAT (Page Attribute Handling) handling on x86. > > Ah this is really nice thanks for this! Thanks for your review! > >> ok 14 mprotect(PROT_NONE) >> ok 15 SIGSEGV expected >> ok 16 mprotect(PROT_READ) >> ok 17 SIGSEGV not expected >> ok 18 fork() >> ok 19 SIGSEGV in child not expected >> # Totals: pass:19 fail:0 xfail:0 xpass:0 skip:0 error:0 > > It'd be good to assert that merging doesn't work for VM_PFNMAP, though hm > one could argue that's not hugely useful as it's trivially implemented. > > But I guess anything like that should live in merge.c. I assume we'd need is_range_mapped() from mremap_tests.c. Something for another day :) [...] >> +static void signal_handler(int sig) >> +{ >> + if (sig == SIGSEGV) >> + siglongjmp(env, 1); >> + siglongjmp(env, 2); >> +} > > Hm, wouldn't it be better to only catch these only if you specifically > meant to catch a signal? I had that, but got tired about the repeated register + unregister, after all I really don't want to spend a lot more time on this. > You can see what I did in guard-regions.c for an example (sorry, I'm sure > you know exactly how the thing works, just I mean for an easy reminder :P) > Again, time is the limit. But let me see if I can get something done in a reasonable timeframe. >> + >> +static void sense_support(void) >> +{ > > See below comment about the kselftest_harness, but with that you can > literally declare fixture setups/teardowns very nicely :) You can also > mmap() these 2 pages and munmap() them afterwards straightforwardly. > >> + char *addr, tmp; >> + int ret; >> + >> + dev_mem_fd = open("/dev/mem", O_RDONLY); >> + if (dev_mem_fd < 0) >> + ksft_exit_skip("Cannot open '/dev/mem': %s\n", strerror(errno)); > > Hm skip, or failure? Skip implies it's expected right? I suppose it's > possible a system might be setup without this... Try as non-root or on a lockdowned system :) > >> + >> + /* We'll require the first two pages throughout our tests ... */ >> + addr = mmap(0, pagesize * 2, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr == MAP_FAILED) >> + ksft_exit_skip("Cannot mmap '/dev/mem'"); >> + >> + /* ... and want to be able to read from them. */ >> + ret = sigsetjmp(env, 1); >> + if (!ret) { >> + tmp = *addr + *(addr + pagesize); >> + asm volatile("" : "+r" (tmp)); > > Is this not pretty much equivalent to a volatile read where you're forcing > the compiler to not optimise this unused thing away? In guard-regions I set: > > #define FORCE_READ(x) (*(volatile typeof(x) *)x) > > For this purpose, which would make this: > > FORCE_READ(addr); > FORCE_READ(&addr[pagesize]); Hmmm, a compiler might be allowed to optimize out a volatile read. > >> + } >> + if (ret) >> + ksft_exit_skip("Cannot read-access mmap'ed '/dev/mem'"); > > Why are we returning 1 or 2 if we don't differentiate it here? Copy-and-paste. As we are not registering for SIGBUS, we can just return 1. > >> + >> + munmap(addr, pagesize * 2); >> +} >> + >> +static void test_madvise(void) >> +{ >> +#define INIT_ADVICE(nr) { nr, #nr} >> + const struct { >> + int nr; >> + const char *name; >> + } advices[] = { >> + INIT_ADVICE(MADV_DONTNEED), >> + INIT_ADVICE(MADV_DONTNEED_LOCKED), >> + INIT_ADVICE(MADV_FREE), >> + INIT_ADVICE(MADV_WIPEONFORK), >> + INIT_ADVICE(MADV_COLD), >> + INIT_ADVICE(MADV_PAGEOUT), >> + INIT_ADVICE(MADV_POPULATE_READ), >> + INIT_ADVICE(MADV_POPULATE_WRITE), >> + }; >> + char *addr; >> + int ret, i; >> + >> + addr = mmap(0, pagesize, PROT_READ, MAP_SHARED, dev_mem_fd, 0); > > Nit (same for all mmap() calls) shouldn't this first parameter be NULL, by > convention? I mean not a big deal obviously :) Yes. > >> + if (addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* All these advices must be rejected. */ >> + for (i = 0; i < ARRAY_SIZE(advices); i++) { >> + ret = madvise(addr, pagesize, advices[i].nr); >> + ksft_test_result(ret && errno == EINVAL, >> + "madvise(%s) should be disallowed\n", >> + advices[i].name); >> + } >> + >> + munmap(addr, pagesize); >> +} >> + >> +static void test_munmap_splitting(void) >> +{ >> + char *addr1, *addr2; >> + int ret; >> + >> + addr1 = mmap(0, pagesize * 2, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr1 == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* Unmap the first pages. */ > > NIT: pages -> page. Ack. > >> + ret = munmap(addr1, pagesize); >> + ksft_test_result(!ret, "munmap() splitting\n"); >> + >> + /* Remap the first page while the second page is still mapped. */ >> + addr2 = mmap(0, pagesize, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + ksft_test_result(addr2 != MAP_FAILED, "mmap() after splitting\n"); > > Hm not sure what the assertion is here per se, that we can munmap() partial > bits of the VMA? It'd be pretty weird if we couldn't though? > > If it's that we don't get a merge when we remap, we're not really checking > that, but you actually can, as I added an API to vm_util for this using > PROCMAP_QUERY (very handy tool actually - binary version of /proc/smaps). I don't care about merging tests (I'll leave that to you :P ). This is a PAT test for upcoming changes where partial unmap can leave the original region reserved. Making sure that re-mapping with the pending reservation still works. >> + >> + if (addr2 != MAP_FAILED) >> + munmap(addr2, pagesize); >> + if (!ret) >> + munmap(addr1 + pagesize, pagesize); >> + else >> + munmap(addr1, pagesize * 2); > > There's no need for this dance, you can just munmap() away, it tolerates > gaps and multiple VMAs. Yeah, I know. I was not sure if the ksft_test_result() in between might allocate memory and consume that area. > >> +} >> + >> +static void test_mremap_fixed(void) >> +{ >> + char *addr, *new_addr, *ret; >> + >> + addr = mmap(0, pagesize * 2, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* Reserve a destination area. */ >> + new_addr = mmap(0, pagesize * 2, PROT_READ, MAP_ANON | MAP_PRIVATE, -1, 0); >> + if (new_addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* mremap() over our destination. */ >> + ret = mremap(addr, pagesize * 2, pagesize * 2, >> + MREMAP_FIXED | MREMAP_MAYMOVE, new_addr); >> + ksft_test_result(ret == new_addr, "mremap(MREMAP_FIXED)\n"); >> + if (ret != new_addr) >> + munmap(new_addr, pagesize * 2); > > This could only be an error code, and this will fail right? > > MREMAP_FIXED is 'do or die' at the new address, not hinting. If there's > anything already mapped there it goes a bye bye. > > So again, we could just have a standard munmap(), and this lends itself > well to a FIXTURE_SETUP()/FIXTURE_TEARDOWN() :P I'm afraid I cannot spend much more time on these tests :P But let me try for a couple of minutes. > >> + munmap(addr, pagesize * 2); >> +} >> + >> +static void test_mremap_shrinking(void) >> +{ >> + char *addr, *ret; >> + >> + addr = mmap(0, pagesize * 2, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* Shrinking is expected to work. */ >> + ret = mremap(addr, pagesize * 2, pagesize, 0); >> + ksft_test_result(ret == addr, "mremap() shrinking\n"); >> + if (ret != addr) >> + munmap(addr, pagesize * 2); >> + else >> + munmap(addr, pagesize); > > I think we're safe to just munmap() as usual here :) (it's nitty but I'm > trying to make the case for teardown again of course :P) Same reasoning as above regarding ksft_test_result(). > >> +} >> + >> +static void test_mremap_growing(void) >> +{ >> + char *addr, *ret; >> + >> + addr = mmap(0, pagesize, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* Growing is not expected to work. */ > > God imagine if we did allow it... what hell would it be to figure out how > to do this correctly in all cases :P :) > >> + ret = mremap(addr, pagesize, pagesize * 2, MREMAP_MAYMOVE); >> + ksft_test_result(ret == MAP_FAILED, >> + "mremap() growing should be disallowed\n"); >> + if (ret == MAP_FAILED) >> + munmap(addr, pagesize); >> + else >> + munmap(ret, pagesize * 2); > > This is a bit cautious, for a world where we do lose our minds and allow > this? :) Yeah, went back and forth with this error cleanup shit. > >> +} >> + >> +static void test_mprotect(void) >> +{ >> + char *addr, tmp; >> + int ret; >> + >> + addr = mmap(0, pagesize, PROT_READ, MAP_SHARED, dev_mem_fd, 0); >> + if (addr == MAP_FAILED) >> + ksft_exit_fail_msg("mmap() failed: %s\n", strerror(errno)); >> + >> + /* With PROT_NONE, read access must result in SIGSEGV. */ >> + ret = mprotect(addr, pagesize, PROT_NONE); >> + ksft_test_result(!ret, "mprotect(PROT_NONE)\n"); >> + >> + ret = sigsetjmp(env, 1); >> + if (!ret) { >> + tmp = *addr; >> + asm volatile("" : "+r" (tmp)); >> + } > > This code is duplicated, we definitely want to abstract it. Probably yes. > >> + ksft_test_result(ret == 1, "SIGSEGV expected\n"); > > Hmm, what exactly are we testing here though? I mean PROT_NONE will be a > failed access for _any_ kind of memory? Is this really worthwhile? Maybe > better to mprotect() as PROT_NONE to start then mprotect() to PROT_READ. > > But I'm not sure what that really tests? Is it a PAT-specific thing? It > seems if this is broken then the mapping code is more generally broken > beyond just VM_PFNMAP mappings right? Rationale was to test the !vm_normal_folio() code paths that are not covered by "ordinary" mprotect (except the shared zeropage). But there should indeed only be such a check on the prot_numa code path, so I can just drop this test. [...] >> +int main(int argc, char **argv) >> +{ >> + int err; >> + >> + ksft_print_header(); >> + ksft_set_plan(19); > > I know it's kind of nitpicky, but I really hate this sort of magic number > and so on. You don't actually need any of this, the kselftest_harness.h is > _really_ powerful, and makes for much much more readable and standardised > test code. > > You can look at guard-regions.c in the test code (though there's some > complexity there because I use 'variants') or the merge.c test code > (simpler) for straight-forward examples. > > I won't block this change on this however, I don't want to be a pain and > you're adding very important tests here, but it'd be really nice if you did > use that :>) Yeah, let me explore that real quick, thanks! -- Cheers, David / dhildenb