mlock2-tests.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677
  1. // SPDX-License-Identifier: GPL-2.0
  2. #define _GNU_SOURCE
  3. #include <sys/mman.h>
  4. #include <stdint.h>
  5. #include <unistd.h>
  6. #include <string.h>
  7. #include <sys/time.h>
  8. #include <sys/resource.h>
  9. #include <stdbool.h>
  10. #include "mlock2.h"
  11. struct vm_boundaries {
  12. unsigned long start;
  13. unsigned long end;
  14. };
  15. static int get_vm_area(unsigned long addr, struct vm_boundaries *area)
  16. {
  17. FILE *file;
  18. int ret = 1;
  19. char line[1024] = {0};
  20. char *end_addr;
  21. char *stop;
  22. unsigned long start;
  23. unsigned long end;
  24. if (!area)
  25. return ret;
  26. file = fopen("/proc/self/maps", "r");
  27. if (!file) {
  28. perror("fopen");
  29. return ret;
  30. }
  31. memset(area, 0, sizeof(struct vm_boundaries));
  32. while(fgets(line, 1024, file)) {
  33. end_addr = strchr(line, '-');
  34. if (!end_addr) {
  35. printf("cannot parse /proc/self/maps\n");
  36. goto out;
  37. }
  38. *end_addr = '\0';
  39. end_addr++;
  40. stop = strchr(end_addr, ' ');
  41. if (!stop) {
  42. printf("cannot parse /proc/self/maps\n");
  43. goto out;
  44. }
  45. stop = '\0';
  46. sscanf(line, "%lx", &start);
  47. sscanf(end_addr, "%lx", &end);
  48. if (start <= addr && end > addr) {
  49. area->start = start;
  50. area->end = end;
  51. ret = 0;
  52. goto out;
  53. }
  54. }
  55. out:
  56. fclose(file);
  57. return ret;
  58. }
  59. static uint64_t get_pageflags(unsigned long addr)
  60. {
  61. FILE *file;
  62. uint64_t pfn;
  63. unsigned long offset;
  64. file = fopen("/proc/self/pagemap", "r");
  65. if (!file) {
  66. perror("fopen pagemap");
  67. _exit(1);
  68. }
  69. offset = addr / getpagesize() * sizeof(pfn);
  70. if (fseek(file, offset, SEEK_SET)) {
  71. perror("fseek pagemap");
  72. _exit(1);
  73. }
  74. if (fread(&pfn, sizeof(pfn), 1, file) != 1) {
  75. perror("fread pagemap");
  76. _exit(1);
  77. }
  78. fclose(file);
  79. return pfn;
  80. }
  81. static uint64_t get_kpageflags(unsigned long pfn)
  82. {
  83. uint64_t flags;
  84. FILE *file;
  85. file = fopen("/proc/kpageflags", "r");
  86. if (!file) {
  87. perror("fopen kpageflags");
  88. _exit(1);
  89. }
  90. if (fseek(file, pfn * sizeof(flags), SEEK_SET)) {
  91. perror("fseek kpageflags");
  92. _exit(1);
  93. }
  94. if (fread(&flags, sizeof(flags), 1, file) != 1) {
  95. perror("fread kpageflags");
  96. _exit(1);
  97. }
  98. fclose(file);
  99. return flags;
  100. }
  101. #define VMFLAGS "VmFlags:"
  102. static bool is_vmflag_set(unsigned long addr, const char *vmflag)
  103. {
  104. char *line = NULL;
  105. char *flags;
  106. size_t size = 0;
  107. bool ret = false;
  108. FILE *smaps;
  109. smaps = seek_to_smaps_entry(addr);
  110. if (!smaps) {
  111. printf("Unable to parse /proc/self/smaps\n");
  112. goto out;
  113. }
  114. while (getline(&line, &size, smaps) > 0) {
  115. if (!strstr(line, VMFLAGS)) {
  116. free(line);
  117. line = NULL;
  118. size = 0;
  119. continue;
  120. }
  121. flags = line + strlen(VMFLAGS);
  122. ret = (strstr(flags, vmflag) != NULL);
  123. goto out;
  124. }
  125. out:
  126. free(line);
  127. fclose(smaps);
  128. return ret;
  129. }
  130. #define SIZE "Size:"
  131. #define RSS "Rss:"
  132. #define LOCKED "lo"
  133. static bool is_vma_lock_on_fault(unsigned long addr)
  134. {
  135. bool ret = false;
  136. bool locked;
  137. FILE *smaps = NULL;
  138. unsigned long vma_size, vma_rss;
  139. char *line = NULL;
  140. char *value;
  141. size_t size = 0;
  142. locked = is_vmflag_set(addr, LOCKED);
  143. if (!locked)
  144. goto out;
  145. smaps = seek_to_smaps_entry(addr);
  146. if (!smaps) {
  147. printf("Unable to parse /proc/self/smaps\n");
  148. goto out;
  149. }
  150. while (getline(&line, &size, smaps) > 0) {
  151. if (!strstr(line, SIZE)) {
  152. free(line);
  153. line = NULL;
  154. size = 0;
  155. continue;
  156. }
  157. value = line + strlen(SIZE);
  158. if (sscanf(value, "%lu kB", &vma_size) < 1) {
  159. printf("Unable to parse smaps entry for Size\n");
  160. goto out;
  161. }
  162. break;
  163. }
  164. while (getline(&line, &size, smaps) > 0) {
  165. if (!strstr(line, RSS)) {
  166. free(line);
  167. line = NULL;
  168. size = 0;
  169. continue;
  170. }
  171. value = line + strlen(RSS);
  172. if (sscanf(value, "%lu kB", &vma_rss) < 1) {
  173. printf("Unable to parse smaps entry for Rss\n");
  174. goto out;
  175. }
  176. break;
  177. }
  178. ret = locked && (vma_rss < vma_size);
  179. out:
  180. free(line);
  181. if (smaps)
  182. fclose(smaps);
  183. return ret;
  184. }
  185. #define PRESENT_BIT 0x8000000000000000ULL
  186. #define PFN_MASK 0x007FFFFFFFFFFFFFULL
  187. #define UNEVICTABLE_BIT (1UL << 18)
  188. static int lock_check(char *map)
  189. {
  190. unsigned long page_size = getpagesize();
  191. uint64_t page1_flags, page2_flags;
  192. page1_flags = get_pageflags((unsigned long)map);
  193. page2_flags = get_pageflags((unsigned long)map + page_size);
  194. /* Both pages should be present */
  195. if (((page1_flags & PRESENT_BIT) == 0) ||
  196. ((page2_flags & PRESENT_BIT) == 0)) {
  197. printf("Failed to make both pages present\n");
  198. return 1;
  199. }
  200. page1_flags = get_kpageflags(page1_flags & PFN_MASK);
  201. page2_flags = get_kpageflags(page2_flags & PFN_MASK);
  202. /* Both pages should be unevictable */
  203. if (((page1_flags & UNEVICTABLE_BIT) == 0) ||
  204. ((page2_flags & UNEVICTABLE_BIT) == 0)) {
  205. printf("Failed to make both pages unevictable\n");
  206. return 1;
  207. }
  208. if (!is_vmflag_set((unsigned long)map, LOCKED)) {
  209. printf("VMA flag %s is missing on page 1\n", LOCKED);
  210. return 1;
  211. }
  212. if (!is_vmflag_set((unsigned long)map + page_size, LOCKED)) {
  213. printf("VMA flag %s is missing on page 2\n", LOCKED);
  214. return 1;
  215. }
  216. return 0;
  217. }
  218. static int unlock_lock_check(char *map)
  219. {
  220. unsigned long page_size = getpagesize();
  221. uint64_t page1_flags, page2_flags;
  222. page1_flags = get_pageflags((unsigned long)map);
  223. page2_flags = get_pageflags((unsigned long)map + page_size);
  224. page1_flags = get_kpageflags(page1_flags & PFN_MASK);
  225. page2_flags = get_kpageflags(page2_flags & PFN_MASK);
  226. if ((page1_flags & UNEVICTABLE_BIT) || (page2_flags & UNEVICTABLE_BIT)) {
  227. printf("A page is still marked unevictable after unlock\n");
  228. return 1;
  229. }
  230. if (is_vmflag_set((unsigned long)map, LOCKED)) {
  231. printf("VMA flag %s is present on page 1 after unlock\n", LOCKED);
  232. return 1;
  233. }
  234. if (is_vmflag_set((unsigned long)map + page_size, LOCKED)) {
  235. printf("VMA flag %s is present on page 2 after unlock\n", LOCKED);
  236. return 1;
  237. }
  238. return 0;
  239. }
  240. static int test_mlock_lock()
  241. {
  242. char *map;
  243. int ret = 1;
  244. unsigned long page_size = getpagesize();
  245. map = mmap(NULL, 2 * page_size, PROT_READ | PROT_WRITE,
  246. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  247. if (map == MAP_FAILED) {
  248. perror("test_mlock_locked mmap");
  249. goto out;
  250. }
  251. if (mlock2_(map, 2 * page_size, 0)) {
  252. if (errno == ENOSYS) {
  253. printf("Cannot call new mlock family, skipping test\n");
  254. _exit(0);
  255. }
  256. perror("mlock2(0)");
  257. goto unmap;
  258. }
  259. if (lock_check(map))
  260. goto unmap;
  261. /* Now unlock and recheck attributes */
  262. if (munlock(map, 2 * page_size)) {
  263. perror("munlock()");
  264. goto unmap;
  265. }
  266. ret = unlock_lock_check(map);
  267. unmap:
  268. munmap(map, 2 * page_size);
  269. out:
  270. return ret;
  271. }
  272. static int onfault_check(char *map)
  273. {
  274. unsigned long page_size = getpagesize();
  275. uint64_t page1_flags, page2_flags;
  276. page1_flags = get_pageflags((unsigned long)map);
  277. page2_flags = get_pageflags((unsigned long)map + page_size);
  278. /* Neither page should be present */
  279. if ((page1_flags & PRESENT_BIT) || (page2_flags & PRESENT_BIT)) {
  280. printf("Pages were made present by MLOCK_ONFAULT\n");
  281. return 1;
  282. }
  283. *map = 'a';
  284. page1_flags = get_pageflags((unsigned long)map);
  285. page2_flags = get_pageflags((unsigned long)map + page_size);
  286. /* Only page 1 should be present */
  287. if ((page1_flags & PRESENT_BIT) == 0) {
  288. printf("Page 1 is not present after fault\n");
  289. return 1;
  290. } else if (page2_flags & PRESENT_BIT) {
  291. printf("Page 2 was made present\n");
  292. return 1;
  293. }
  294. page1_flags = get_kpageflags(page1_flags & PFN_MASK);
  295. /* Page 1 should be unevictable */
  296. if ((page1_flags & UNEVICTABLE_BIT) == 0) {
  297. printf("Failed to make faulted page unevictable\n");
  298. return 1;
  299. }
  300. if (!is_vma_lock_on_fault((unsigned long)map)) {
  301. printf("VMA is not marked for lock on fault\n");
  302. return 1;
  303. }
  304. if (!is_vma_lock_on_fault((unsigned long)map + page_size)) {
  305. printf("VMA is not marked for lock on fault\n");
  306. return 1;
  307. }
  308. return 0;
  309. }
  310. static int unlock_onfault_check(char *map)
  311. {
  312. unsigned long page_size = getpagesize();
  313. uint64_t page1_flags;
  314. page1_flags = get_pageflags((unsigned long)map);
  315. page1_flags = get_kpageflags(page1_flags & PFN_MASK);
  316. if (page1_flags & UNEVICTABLE_BIT) {
  317. printf("Page 1 is still marked unevictable after unlock\n");
  318. return 1;
  319. }
  320. if (is_vma_lock_on_fault((unsigned long)map) ||
  321. is_vma_lock_on_fault((unsigned long)map + page_size)) {
  322. printf("VMA is still lock on fault after unlock\n");
  323. return 1;
  324. }
  325. return 0;
  326. }
  327. static int test_mlock_onfault()
  328. {
  329. char *map;
  330. int ret = 1;
  331. unsigned long page_size = getpagesize();
  332. map = mmap(NULL, 2 * page_size, PROT_READ | PROT_WRITE,
  333. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  334. if (map == MAP_FAILED) {
  335. perror("test_mlock_locked mmap");
  336. goto out;
  337. }
  338. if (mlock2_(map, 2 * page_size, MLOCK_ONFAULT)) {
  339. if (errno == ENOSYS) {
  340. printf("Cannot call new mlock family, skipping test\n");
  341. _exit(0);
  342. }
  343. perror("mlock2(MLOCK_ONFAULT)");
  344. goto unmap;
  345. }
  346. if (onfault_check(map))
  347. goto unmap;
  348. /* Now unlock and recheck attributes */
  349. if (munlock(map, 2 * page_size)) {
  350. if (errno == ENOSYS) {
  351. printf("Cannot call new mlock family, skipping test\n");
  352. _exit(0);
  353. }
  354. perror("munlock()");
  355. goto unmap;
  356. }
  357. ret = unlock_onfault_check(map);
  358. unmap:
  359. munmap(map, 2 * page_size);
  360. out:
  361. return ret;
  362. }
  363. static int test_lock_onfault_of_present()
  364. {
  365. char *map;
  366. int ret = 1;
  367. unsigned long page_size = getpagesize();
  368. uint64_t page1_flags, page2_flags;
  369. map = mmap(NULL, 2 * page_size, PROT_READ | PROT_WRITE,
  370. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  371. if (map == MAP_FAILED) {
  372. perror("test_mlock_locked mmap");
  373. goto out;
  374. }
  375. *map = 'a';
  376. if (mlock2_(map, 2 * page_size, MLOCK_ONFAULT)) {
  377. if (errno == ENOSYS) {
  378. printf("Cannot call new mlock family, skipping test\n");
  379. _exit(0);
  380. }
  381. perror("mlock2(MLOCK_ONFAULT)");
  382. goto unmap;
  383. }
  384. page1_flags = get_pageflags((unsigned long)map);
  385. page2_flags = get_pageflags((unsigned long)map + page_size);
  386. page1_flags = get_kpageflags(page1_flags & PFN_MASK);
  387. page2_flags = get_kpageflags(page2_flags & PFN_MASK);
  388. /* Page 1 should be unevictable */
  389. if ((page1_flags & UNEVICTABLE_BIT) == 0) {
  390. printf("Failed to make present page unevictable\n");
  391. goto unmap;
  392. }
  393. if (!is_vma_lock_on_fault((unsigned long)map) ||
  394. !is_vma_lock_on_fault((unsigned long)map + page_size)) {
  395. printf("VMA with present pages is not marked lock on fault\n");
  396. goto unmap;
  397. }
  398. ret = 0;
  399. unmap:
  400. munmap(map, 2 * page_size);
  401. out:
  402. return ret;
  403. }
  404. static int test_munlockall()
  405. {
  406. char *map;
  407. int ret = 1;
  408. unsigned long page_size = getpagesize();
  409. map = mmap(NULL, 2 * page_size, PROT_READ | PROT_WRITE,
  410. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  411. if (map == MAP_FAILED) {
  412. perror("test_munlockall mmap");
  413. goto out;
  414. }
  415. if (mlockall(MCL_CURRENT)) {
  416. perror("mlockall(MCL_CURRENT)");
  417. goto out;
  418. }
  419. if (lock_check(map))
  420. goto unmap;
  421. if (munlockall()) {
  422. perror("munlockall()");
  423. goto unmap;
  424. }
  425. if (unlock_lock_check(map))
  426. goto unmap;
  427. munmap(map, 2 * page_size);
  428. map = mmap(NULL, 2 * page_size, PROT_READ | PROT_WRITE,
  429. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  430. if (map == MAP_FAILED) {
  431. perror("test_munlockall second mmap");
  432. goto out;
  433. }
  434. if (mlockall(MCL_CURRENT | MCL_ONFAULT)) {
  435. perror("mlockall(MCL_CURRENT | MCL_ONFAULT)");
  436. goto unmap;
  437. }
  438. if (onfault_check(map))
  439. goto unmap;
  440. if (munlockall()) {
  441. perror("munlockall()");
  442. goto unmap;
  443. }
  444. if (unlock_onfault_check(map))
  445. goto unmap;
  446. if (mlockall(MCL_CURRENT | MCL_FUTURE)) {
  447. perror("mlockall(MCL_CURRENT | MCL_FUTURE)");
  448. goto out;
  449. }
  450. if (lock_check(map))
  451. goto unmap;
  452. if (munlockall()) {
  453. perror("munlockall()");
  454. goto unmap;
  455. }
  456. ret = unlock_lock_check(map);
  457. unmap:
  458. munmap(map, 2 * page_size);
  459. out:
  460. munlockall();
  461. return ret;
  462. }
  463. static int test_vma_management(bool call_mlock)
  464. {
  465. int ret = 1;
  466. void *map;
  467. unsigned long page_size = getpagesize();
  468. struct vm_boundaries page1;
  469. struct vm_boundaries page2;
  470. struct vm_boundaries page3;
  471. map = mmap(NULL, 3 * page_size, PROT_READ | PROT_WRITE,
  472. MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
  473. if (map == MAP_FAILED) {
  474. perror("mmap()");
  475. return ret;
  476. }
  477. if (call_mlock && mlock2_(map, 3 * page_size, MLOCK_ONFAULT)) {
  478. if (errno == ENOSYS) {
  479. printf("Cannot call new mlock family, skipping test\n");
  480. _exit(0);
  481. }
  482. perror("mlock(ONFAULT)\n");
  483. goto out;
  484. }
  485. if (get_vm_area((unsigned long)map, &page1) ||
  486. get_vm_area((unsigned long)map + page_size, &page2) ||
  487. get_vm_area((unsigned long)map + page_size * 2, &page3)) {
  488. printf("couldn't find mapping in /proc/self/maps\n");
  489. goto out;
  490. }
  491. /*
  492. * Before we unlock a portion, we need to that all three pages are in
  493. * the same VMA. If they are not we abort this test (Note that this is
  494. * not a failure)
  495. */
  496. if (page1.start != page2.start || page2.start != page3.start) {
  497. printf("VMAs are not merged to start, aborting test\n");
  498. ret = 0;
  499. goto out;
  500. }
  501. if (munlock(map + page_size, page_size)) {
  502. perror("munlock()");
  503. goto out;
  504. }
  505. if (get_vm_area((unsigned long)map, &page1) ||
  506. get_vm_area((unsigned long)map + page_size, &page2) ||
  507. get_vm_area((unsigned long)map + page_size * 2, &page3)) {
  508. printf("couldn't find mapping in /proc/self/maps\n");
  509. goto out;
  510. }
  511. /* All three VMAs should be different */
  512. if (page1.start == page2.start || page2.start == page3.start) {
  513. printf("failed to split VMA for munlock\n");
  514. goto out;
  515. }
  516. /* Now unlock the first and third page and check the VMAs again */
  517. if (munlock(map, page_size * 3)) {
  518. perror("munlock()");
  519. goto out;
  520. }
  521. if (get_vm_area((unsigned long)map, &page1) ||
  522. get_vm_area((unsigned long)map + page_size, &page2) ||
  523. get_vm_area((unsigned long)map + page_size * 2, &page3)) {
  524. printf("couldn't find mapping in /proc/self/maps\n");
  525. goto out;
  526. }
  527. /* Now all three VMAs should be the same */
  528. if (page1.start != page2.start || page2.start != page3.start) {
  529. printf("failed to merge VMAs after munlock\n");
  530. goto out;
  531. }
  532. ret = 0;
  533. out:
  534. munmap(map, 3 * page_size);
  535. return ret;
  536. }
  537. static int test_mlockall(int (test_function)(bool call_mlock))
  538. {
  539. int ret = 1;
  540. if (mlockall(MCL_CURRENT | MCL_ONFAULT | MCL_FUTURE)) {
  541. perror("mlockall");
  542. return ret;
  543. }
  544. ret = test_function(false);
  545. munlockall();
  546. return ret;
  547. }
  548. int main(int argc, char **argv)
  549. {
  550. int ret = 0;
  551. ret += test_mlock_lock();
  552. ret += test_mlock_onfault();
  553. ret += test_munlockall();
  554. ret += test_lock_onfault_of_present();
  555. ret += test_vma_management(true);
  556. ret += test_mlockall(test_vma_management);
  557. return ret;
  558. }