xref: /linux/tools/testing/selftests/mm/vm_util.c (revision 8804d970fab45726b3c7cd7f240b31122aa94219)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <string.h>
3 #include <errno.h>
4 #include <fcntl.h>
5 #include <dirent.h>
6 #include <inttypes.h>
7 #include <sys/ioctl.h>
8 #include <linux/userfaultfd.h>
9 #include <linux/fs.h>
10 #include <sys/syscall.h>
11 #include <unistd.h>
12 #include "../kselftest.h"
13 #include "vm_util.h"
14 
15 #define PMD_SIZE_FILE_PATH "/sys/kernel/mm/transparent_hugepage/hpage_pmd_size"
16 #define SMAP_FILE_PATH "/proc/self/smaps"
17 #define STATUS_FILE_PATH "/proc/self/status"
18 #define MAX_LINE_LENGTH 500
19 
20 unsigned int __page_size;
21 unsigned int __page_shift;
22 
pagemap_get_entry(int fd,char * start)23 uint64_t pagemap_get_entry(int fd, char *start)
24 {
25 	const unsigned long pfn = (unsigned long)start / getpagesize();
26 	uint64_t entry;
27 	int ret;
28 
29 	ret = pread(fd, &entry, sizeof(entry), pfn * sizeof(entry));
30 	if (ret != sizeof(entry))
31 		ksft_exit_fail_msg("reading pagemap failed\n");
32 	return entry;
33 }
34 
__pagemap_scan_get_categories(int fd,char * start,struct page_region * r)35 static uint64_t __pagemap_scan_get_categories(int fd, char *start, struct page_region *r)
36 {
37 	struct pm_scan_arg arg;
38 
39 	arg.start = (uintptr_t)start;
40 	arg.end = (uintptr_t)(start + psize());
41 	arg.vec = (uintptr_t)r;
42 	arg.vec_len = 1;
43 	arg.flags = 0;
44 	arg.size = sizeof(struct pm_scan_arg);
45 	arg.max_pages = 0;
46 	arg.category_inverted = 0;
47 	arg.category_mask = 0;
48 	arg.category_anyof_mask = PAGE_IS_WPALLOWED | PAGE_IS_WRITTEN | PAGE_IS_FILE |
49 				  PAGE_IS_PRESENT | PAGE_IS_SWAPPED | PAGE_IS_PFNZERO |
50 				  PAGE_IS_HUGE | PAGE_IS_SOFT_DIRTY;
51 	arg.return_mask = arg.category_anyof_mask;
52 
53 	return ioctl(fd, PAGEMAP_SCAN, &arg);
54 }
55 
pagemap_scan_get_categories(int fd,char * start)56 static uint64_t pagemap_scan_get_categories(int fd, char *start)
57 {
58 	struct page_region r;
59 	long ret;
60 
61 	ret = __pagemap_scan_get_categories(fd, start, &r);
62 	if (ret < 0)
63 		ksft_exit_fail_msg("PAGEMAP_SCAN failed: %s\n", strerror(errno));
64 	if (ret == 0)
65 		return 0;
66 	return r.categories;
67 }
68 
69 /* `start` is any valid address. */
pagemap_scan_supported(int fd,char * start)70 static bool pagemap_scan_supported(int fd, char *start)
71 {
72 	static int supported = -1;
73 	int ret;
74 
75 	if (supported != -1)
76 		return supported;
77 
78 	/* Provide an invalid address in order to trigger EFAULT. */
79 	ret = __pagemap_scan_get_categories(fd, start, (struct page_region *) ~0UL);
80 	if (ret == 0)
81 		ksft_exit_fail_msg("PAGEMAP_SCAN succeeded unexpectedly\n");
82 
83 	supported = errno == EFAULT;
84 
85 	return supported;
86 }
87 
page_entry_is(int fd,char * start,char * desc,uint64_t pagemap_flags,uint64_t pagescan_flags)88 static bool page_entry_is(int fd, char *start, char *desc,
89 			  uint64_t pagemap_flags, uint64_t pagescan_flags)
90 {
91 	bool m = pagemap_get_entry(fd, start) & pagemap_flags;
92 
93 	if (pagemap_scan_supported(fd, start)) {
94 		bool s = pagemap_scan_get_categories(fd, start) & pagescan_flags;
95 
96 		if (m == s)
97 			return m;
98 
99 		ksft_exit_fail_msg(
100 			"read and ioctl return unmatched results for %s: %d %d", desc, m, s);
101 	}
102 	return m;
103 }
104 
pagemap_is_softdirty(int fd,char * start)105 bool pagemap_is_softdirty(int fd, char *start)
106 {
107 	return page_entry_is(fd, start, "soft-dirty",
108 				PM_SOFT_DIRTY, PAGE_IS_SOFT_DIRTY);
109 }
110 
pagemap_is_swapped(int fd,char * start)111 bool pagemap_is_swapped(int fd, char *start)
112 {
113 	return page_entry_is(fd, start, "swap", PM_SWAP, PAGE_IS_SWAPPED);
114 }
115 
pagemap_is_populated(int fd,char * start)116 bool pagemap_is_populated(int fd, char *start)
117 {
118 	return page_entry_is(fd, start, "populated",
119 				PM_PRESENT | PM_SWAP,
120 				PAGE_IS_PRESENT | PAGE_IS_SWAPPED);
121 }
122 
pagemap_get_pfn(int fd,char * start)123 unsigned long pagemap_get_pfn(int fd, char *start)
124 {
125 	uint64_t entry = pagemap_get_entry(fd, start);
126 
127 	/* If present (63th bit), PFN is at bit 0 -- 54. */
128 	if (entry & PM_PRESENT)
129 		return entry & 0x007fffffffffffffull;
130 	return -1ul;
131 }
132 
clear_softdirty(void)133 void clear_softdirty(void)
134 {
135 	int ret;
136 	const char *ctrl = "4";
137 	int fd = open("/proc/self/clear_refs", O_WRONLY);
138 
139 	if (fd < 0)
140 		ksft_exit_fail_msg("opening clear_refs failed\n");
141 	ret = write(fd, ctrl, strlen(ctrl));
142 	close(fd);
143 	if (ret != (signed int)strlen(ctrl))
144 		ksft_exit_fail_msg("writing clear_refs failed\n");
145 }
146 
check_for_pattern(FILE * fp,const char * pattern,char * buf,size_t len)147 bool check_for_pattern(FILE *fp, const char *pattern, char *buf, size_t len)
148 {
149 	while (fgets(buf, len, fp)) {
150 		if (!strncmp(buf, pattern, strlen(pattern)))
151 			return true;
152 	}
153 	return false;
154 }
155 
read_pmd_pagesize(void)156 uint64_t read_pmd_pagesize(void)
157 {
158 	int fd;
159 	char buf[20];
160 	ssize_t num_read;
161 
162 	fd = open(PMD_SIZE_FILE_PATH, O_RDONLY);
163 	if (fd == -1)
164 		return 0;
165 
166 	num_read = read(fd, buf, 19);
167 	if (num_read < 1) {
168 		close(fd);
169 		return 0;
170 	}
171 	buf[num_read] = '\0';
172 	close(fd);
173 
174 	return strtoul(buf, NULL, 10);
175 }
176 
rss_anon(void)177 unsigned long rss_anon(void)
178 {
179 	unsigned long rss_anon = 0;
180 	FILE *fp;
181 	char buffer[MAX_LINE_LENGTH];
182 
183 	fp = fopen(STATUS_FILE_PATH, "r");
184 	if (!fp)
185 		ksft_exit_fail_msg("%s: Failed to open file %s\n", __func__, STATUS_FILE_PATH);
186 
187 	if (!check_for_pattern(fp, "RssAnon:", buffer, sizeof(buffer)))
188 		goto err_out;
189 
190 	if (sscanf(buffer, "RssAnon:%10lu kB", &rss_anon) != 1)
191 		ksft_exit_fail_msg("Reading status error\n");
192 
193 err_out:
194 	fclose(fp);
195 	return rss_anon;
196 }
197 
__get_smap_entry(void * addr,const char * pattern,char * buf,size_t len)198 char *__get_smap_entry(void *addr, const char *pattern, char *buf, size_t len)
199 {
200 	int ret;
201 	FILE *fp;
202 	char *entry = NULL;
203 	char addr_pattern[MAX_LINE_LENGTH];
204 
205 	ret = snprintf(addr_pattern, MAX_LINE_LENGTH, "%08lx-",
206 		       (unsigned long) addr);
207 	if (ret >= MAX_LINE_LENGTH)
208 		ksft_exit_fail_msg("%s: Pattern is too long\n", __func__);
209 
210 	fp = fopen(SMAP_FILE_PATH, "r");
211 	if (!fp)
212 		ksft_exit_fail_msg("%s: Failed to open file %s\n", __func__, SMAP_FILE_PATH);
213 
214 	if (!check_for_pattern(fp, addr_pattern, buf, len))
215 		goto err_out;
216 
217 	/* Fetch the pattern in the same block */
218 	if (!check_for_pattern(fp, pattern, buf, len))
219 		goto err_out;
220 
221 	/* Trim trailing newline */
222 	entry = strchr(buf, '\n');
223 	if (entry)
224 		*entry = '\0';
225 
226 	entry = buf + strlen(pattern);
227 
228 err_out:
229 	fclose(fp);
230 	return entry;
231 }
232 
__check_huge(void * addr,char * pattern,int nr_hpages,uint64_t hpage_size)233 bool __check_huge(void *addr, char *pattern, int nr_hpages,
234 		  uint64_t hpage_size)
235 {
236 	char buffer[MAX_LINE_LENGTH];
237 	uint64_t thp = -1;
238 	char *entry;
239 
240 	entry = __get_smap_entry(addr, pattern, buffer, sizeof(buffer));
241 	if (!entry)
242 		goto err_out;
243 
244 	if (sscanf(entry, "%9" SCNu64 " kB", &thp) != 1)
245 		ksft_exit_fail_msg("Reading smap error\n");
246 
247 err_out:
248 	return thp == (nr_hpages * (hpage_size >> 10));
249 }
250 
check_huge_anon(void * addr,int nr_hpages,uint64_t hpage_size)251 bool check_huge_anon(void *addr, int nr_hpages, uint64_t hpage_size)
252 {
253 	return __check_huge(addr, "AnonHugePages: ", nr_hpages, hpage_size);
254 }
255 
check_huge_file(void * addr,int nr_hpages,uint64_t hpage_size)256 bool check_huge_file(void *addr, int nr_hpages, uint64_t hpage_size)
257 {
258 	return __check_huge(addr, "FilePmdMapped:", nr_hpages, hpage_size);
259 }
260 
check_huge_shmem(void * addr,int nr_hpages,uint64_t hpage_size)261 bool check_huge_shmem(void *addr, int nr_hpages, uint64_t hpage_size)
262 {
263 	return __check_huge(addr, "ShmemPmdMapped:", nr_hpages, hpage_size);
264 }
265 
allocate_transhuge(void * ptr,int pagemap_fd)266 int64_t allocate_transhuge(void *ptr, int pagemap_fd)
267 {
268 	uint64_t ent[2];
269 
270 	/* drop pmd */
271 	if (mmap(ptr, HPAGE_SIZE, PROT_READ | PROT_WRITE,
272 		 MAP_FIXED | MAP_ANONYMOUS |
273 		 MAP_NORESERVE | MAP_PRIVATE, -1, 0) != ptr)
274 		ksft_exit_fail_msg("mmap transhuge\n");
275 
276 	if (madvise(ptr, HPAGE_SIZE, MADV_HUGEPAGE))
277 		ksft_exit_fail_msg("MADV_HUGEPAGE\n");
278 
279 	/* allocate transparent huge page */
280 	*(volatile void **)ptr = ptr;
281 
282 	if (pread(pagemap_fd, ent, sizeof(ent),
283 		  (uintptr_t)ptr >> (pshift() - 3)) != sizeof(ent))
284 		ksft_exit_fail_msg("read pagemap\n");
285 
286 	if (PAGEMAP_PRESENT(ent[0]) && PAGEMAP_PRESENT(ent[1]) &&
287 	    PAGEMAP_PFN(ent[0]) + 1 == PAGEMAP_PFN(ent[1]) &&
288 	    !(PAGEMAP_PFN(ent[0]) & ((1 << (HPAGE_SHIFT - pshift())) - 1)))
289 		return PAGEMAP_PFN(ent[0]);
290 
291 	return -1;
292 }
293 
default_huge_page_size(void)294 unsigned long default_huge_page_size(void)
295 {
296 	unsigned long hps = 0;
297 	char *line = NULL;
298 	size_t linelen = 0;
299 	FILE *f = fopen("/proc/meminfo", "r");
300 
301 	if (!f)
302 		return 0;
303 	while (getline(&line, &linelen, f) > 0) {
304 		if (sscanf(line, "Hugepagesize:       %lu kB", &hps) == 1) {
305 			hps <<= 10;
306 			break;
307 		}
308 	}
309 
310 	free(line);
311 	fclose(f);
312 	return hps;
313 }
314 
detect_hugetlb_page_sizes(size_t sizes[],int max)315 int detect_hugetlb_page_sizes(size_t sizes[], int max)
316 {
317 	DIR *dir = opendir("/sys/kernel/mm/hugepages/");
318 	int count = 0;
319 
320 	if (!dir)
321 		return 0;
322 
323 	while (count < max) {
324 		struct dirent *entry = readdir(dir);
325 		size_t kb;
326 
327 		if (!entry)
328 			break;
329 		if (entry->d_type != DT_DIR)
330 			continue;
331 		if (sscanf(entry->d_name, "hugepages-%zukB", &kb) != 1)
332 			continue;
333 		sizes[count++] = kb * 1024;
334 		ksft_print_msg("[INFO] detected hugetlb page size: %zu KiB\n",
335 			       kb);
336 	}
337 	closedir(dir);
338 	return count;
339 }
340 
pageflags_get(unsigned long pfn,int kpageflags_fd,uint64_t * flags)341 int pageflags_get(unsigned long pfn, int kpageflags_fd, uint64_t *flags)
342 {
343 	size_t count;
344 
345 	count = pread(kpageflags_fd, flags, sizeof(*flags),
346 		      pfn * sizeof(*flags));
347 
348 	if (count != sizeof(*flags))
349 		return -1;
350 
351 	return 0;
352 }
353 
354 /* If `ioctls' non-NULL, the allowed ioctls will be returned into the var */
uffd_register_with_ioctls(int uffd,void * addr,uint64_t len,bool miss,bool wp,bool minor,uint64_t * ioctls)355 int uffd_register_with_ioctls(int uffd, void *addr, uint64_t len,
356 			      bool miss, bool wp, bool minor, uint64_t *ioctls)
357 {
358 	struct uffdio_register uffdio_register = { 0 };
359 	uint64_t mode = 0;
360 	int ret = 0;
361 
362 	if (miss)
363 		mode |= UFFDIO_REGISTER_MODE_MISSING;
364 	if (wp)
365 		mode |= UFFDIO_REGISTER_MODE_WP;
366 	if (minor)
367 		mode |= UFFDIO_REGISTER_MODE_MINOR;
368 
369 	uffdio_register.range.start = (unsigned long)addr;
370 	uffdio_register.range.len = len;
371 	uffdio_register.mode = mode;
372 
373 	if (ioctl(uffd, UFFDIO_REGISTER, &uffdio_register) == -1)
374 		ret = -errno;
375 	else if (ioctls)
376 		*ioctls = uffdio_register.ioctls;
377 
378 	return ret;
379 }
380 
uffd_register(int uffd,void * addr,uint64_t len,bool miss,bool wp,bool minor)381 int uffd_register(int uffd, void *addr, uint64_t len,
382 		  bool miss, bool wp, bool minor)
383 {
384 	return uffd_register_with_ioctls(uffd, addr, len,
385 					 miss, wp, minor, NULL);
386 }
387 
uffd_unregister(int uffd,void * addr,uint64_t len)388 int uffd_unregister(int uffd, void *addr, uint64_t len)
389 {
390 	struct uffdio_range range = { .start = (uintptr_t)addr, .len = len };
391 	int ret = 0;
392 
393 	if (ioctl(uffd, UFFDIO_UNREGISTER, &range) == -1)
394 		ret = -errno;
395 
396 	return ret;
397 }
398 
get_free_hugepages(void)399 unsigned long get_free_hugepages(void)
400 {
401 	unsigned long fhp = 0;
402 	char *line = NULL;
403 	size_t linelen = 0;
404 	FILE *f = fopen("/proc/meminfo", "r");
405 
406 	if (!f)
407 		return fhp;
408 	while (getline(&line, &linelen, f) > 0) {
409 		if (sscanf(line, "HugePages_Free:      %lu", &fhp) == 1)
410 			break;
411 	}
412 
413 	free(line);
414 	fclose(f);
415 	return fhp;
416 }
417 
check_vmflag(void * addr,const char * flag)418 static bool check_vmflag(void *addr, const char *flag)
419 {
420 	char buffer[MAX_LINE_LENGTH];
421 	const char *flags;
422 	size_t flaglen;
423 
424 	flags = __get_smap_entry(addr, "VmFlags:", buffer, sizeof(buffer));
425 	if (!flags)
426 		ksft_exit_fail_msg("%s: No VmFlags for %p\n", __func__, addr);
427 
428 	while (true) {
429 		flags += strspn(flags, " ");
430 
431 		flaglen = strcspn(flags, " ");
432 		if (!flaglen)
433 			return false;
434 
435 		if (flaglen == strlen(flag) && !memcmp(flags, flag, flaglen))
436 			return true;
437 
438 		flags += flaglen;
439 	}
440 }
441 
check_vmflag_io(void * addr)442 bool check_vmflag_io(void *addr)
443 {
444 	return check_vmflag(addr, "io");
445 }
446 
check_vmflag_pfnmap(void * addr)447 bool check_vmflag_pfnmap(void *addr)
448 {
449 	return check_vmflag(addr, "pf");
450 }
451 
softdirty_supported(void)452 bool softdirty_supported(void)
453 {
454 	char *addr;
455 	bool supported = false;
456 	const size_t pagesize = getpagesize();
457 
458 	/* New mappings are expected to be marked with VM_SOFTDIRTY (sd). */
459 	addr = mmap(0, pagesize, PROT_READ | PROT_WRITE,
460 		    MAP_ANONYMOUS | MAP_PRIVATE, 0, 0);
461 	if (!addr)
462 		ksft_exit_fail_msg("mmap failed\n");
463 
464 	supported = check_vmflag(addr, "sd");
465 	munmap(addr, pagesize);
466 	return supported;
467 }
468 
469 /*
470  * Open an fd at /proc/$pid/maps and configure procmap_out ready for
471  * PROCMAP_QUERY query. Returns 0 on success, or an error code otherwise.
472  */
open_procmap(pid_t pid,struct procmap_fd * procmap_out)473 int open_procmap(pid_t pid, struct procmap_fd *procmap_out)
474 {
475 	char path[256];
476 	int ret = 0;
477 
478 	memset(procmap_out, '\0', sizeof(*procmap_out));
479 	sprintf(path, "/proc/%d/maps", pid);
480 	procmap_out->query.size = sizeof(procmap_out->query);
481 	procmap_out->fd = open(path, O_RDONLY);
482 	if (procmap_out->fd < 0)
483 		ret = -errno;
484 
485 	return ret;
486 }
487 
488 /* Perform PROCMAP_QUERY. Returns 0 on success, or an error code otherwise. */
query_procmap(struct procmap_fd * procmap)489 int query_procmap(struct procmap_fd *procmap)
490 {
491 	int ret = 0;
492 
493 	if (ioctl(procmap->fd, PROCMAP_QUERY, &procmap->query) == -1)
494 		ret = -errno;
495 
496 	return ret;
497 }
498 
499 /*
500  * Try to find the VMA at specified address, returns true if found, false if not
501  * found, and the test is failed if any other error occurs.
502  *
503  * On success, procmap->query is populated with the results.
504  */
find_vma_procmap(struct procmap_fd * procmap,void * address)505 bool find_vma_procmap(struct procmap_fd *procmap, void *address)
506 {
507 	int err;
508 
509 	procmap->query.query_flags = 0;
510 	procmap->query.query_addr = (unsigned long)address;
511 	err = query_procmap(procmap);
512 	if (!err)
513 		return true;
514 
515 	if (err != -ENOENT)
516 		ksft_exit_fail_msg("%s: Error %d on ioctl(PROCMAP_QUERY)\n",
517 				   __func__, err);
518 	return false;
519 }
520 
521 /*
522  * Close fd used by PROCMAP_QUERY mechanism. Returns 0 on success, or an error
523  * code otherwise.
524  */
close_procmap(struct procmap_fd * procmap)525 int close_procmap(struct procmap_fd *procmap)
526 {
527 	return close(procmap->fd);
528 }
529 
write_sysfs(const char * file_path,unsigned long val)530 int write_sysfs(const char *file_path, unsigned long val)
531 {
532 	FILE *f = fopen(file_path, "w");
533 
534 	if (!f) {
535 		fprintf(stderr, "f %s\n", file_path);
536 		perror("fopen");
537 		return 1;
538 	}
539 	if (fprintf(f, "%lu", val) < 0) {
540 		perror("fprintf");
541 		fclose(f);
542 		return 1;
543 	}
544 	fclose(f);
545 
546 	return 0;
547 }
548 
read_sysfs(const char * file_path,unsigned long * val)549 int read_sysfs(const char *file_path, unsigned long *val)
550 {
551 	FILE *f = fopen(file_path, "r");
552 
553 	if (!f) {
554 		fprintf(stderr, "f %s\n", file_path);
555 		perror("fopen");
556 		return 1;
557 	}
558 	if (fscanf(f, "%lu", val) != 1) {
559 		perror("fscanf");
560 		fclose(f);
561 		return 1;
562 	}
563 	fclose(f);
564 
565 	return 0;
566 }
567 
sys_mremap(void * old_address,unsigned long old_size,unsigned long new_size,int flags,void * new_address)568 void *sys_mremap(void *old_address, unsigned long old_size,
569 		 unsigned long new_size, int flags, void *new_address)
570 {
571 	return (void *)syscall(__NR_mremap, (unsigned long)old_address,
572 			       old_size, new_size, flags,
573 			       (unsigned long)new_address);
574 }
575 
detect_huge_zeropage(void)576 bool detect_huge_zeropage(void)
577 {
578 	int fd = open("/sys/kernel/mm/transparent_hugepage/use_zero_page",
579 		      O_RDONLY);
580 	bool enabled = 0;
581 	char buf[15];
582 	int ret;
583 
584 	if (fd < 0)
585 		return 0;
586 
587 	ret = pread(fd, buf, sizeof(buf), 0);
588 	if (ret > 0 && ret < sizeof(buf)) {
589 		buf[ret] = 0;
590 
591 		if (strtoul(buf, NULL, 10) == 1)
592 			enabled = 1;
593 	}
594 
595 	close(fd);
596 	return enabled;
597 }
598 
ksm_get_self_zero_pages(void)599 long ksm_get_self_zero_pages(void)
600 {
601 	int proc_self_ksm_stat_fd;
602 	char buf[200];
603 	char *substr_ksm_zero;
604 	size_t value_pos;
605 	ssize_t read_size;
606 
607 	proc_self_ksm_stat_fd = open("/proc/self/ksm_stat", O_RDONLY);
608 	if (proc_self_ksm_stat_fd < 0)
609 		return -errno;
610 
611 	read_size = pread(proc_self_ksm_stat_fd, buf, sizeof(buf) - 1, 0);
612 	close(proc_self_ksm_stat_fd);
613 	if (read_size < 0)
614 		return -errno;
615 
616 	buf[read_size] = 0;
617 
618 	substr_ksm_zero = strstr(buf, "ksm_zero_pages");
619 	if (!substr_ksm_zero)
620 		return 0;
621 
622 	value_pos = strcspn(substr_ksm_zero, "0123456789");
623 	return strtol(substr_ksm_zero + value_pos, NULL, 10);
624 }
625 
ksm_get_self_merging_pages(void)626 long ksm_get_self_merging_pages(void)
627 {
628 	int proc_self_ksm_merging_pages_fd;
629 	char buf[10];
630 	ssize_t ret;
631 
632 	proc_self_ksm_merging_pages_fd = open("/proc/self/ksm_merging_pages",
633 						O_RDONLY);
634 	if (proc_self_ksm_merging_pages_fd < 0)
635 		return -errno;
636 
637 	ret = pread(proc_self_ksm_merging_pages_fd, buf, sizeof(buf) - 1, 0);
638 	close(proc_self_ksm_merging_pages_fd);
639 	if (ret <= 0)
640 		return -errno;
641 	buf[ret] = 0;
642 
643 	return strtol(buf, NULL, 10);
644 }
645 
ksm_get_full_scans(void)646 long ksm_get_full_scans(void)
647 {
648 	int ksm_full_scans_fd;
649 	char buf[10];
650 	ssize_t ret;
651 
652 	ksm_full_scans_fd = open("/sys/kernel/mm/ksm/full_scans", O_RDONLY);
653 	if (ksm_full_scans_fd < 0)
654 		return -errno;
655 
656 	ret = pread(ksm_full_scans_fd, buf, sizeof(buf) - 1, 0);
657 	close(ksm_full_scans_fd);
658 	if (ret <= 0)
659 		return -errno;
660 	buf[ret] = 0;
661 
662 	return strtol(buf, NULL, 10);
663 }
664 
ksm_use_zero_pages(void)665 int ksm_use_zero_pages(void)
666 {
667 	int ksm_use_zero_pages_fd;
668 	ssize_t ret;
669 
670 	ksm_use_zero_pages_fd = open("/sys/kernel/mm/ksm/use_zero_pages", O_RDWR);
671 	if (ksm_use_zero_pages_fd < 0)
672 		return -errno;
673 
674 	ret = write(ksm_use_zero_pages_fd, "1", 1);
675 	close(ksm_use_zero_pages_fd);
676 	return ret == 1 ? 0 : -errno;
677 }
678 
ksm_start(void)679 int ksm_start(void)
680 {
681 	int ksm_fd;
682 	ssize_t ret;
683 	long start_scans, end_scans;
684 
685 	ksm_fd = open("/sys/kernel/mm/ksm/run", O_RDWR);
686 	if (ksm_fd < 0)
687 		return -errno;
688 
689 	/* Wait for two full scans such that any possible merging happened. */
690 	start_scans = ksm_get_full_scans();
691 	if (start_scans < 0) {
692 		close(ksm_fd);
693 		return start_scans;
694 	}
695 	ret = write(ksm_fd, "1", 1);
696 	close(ksm_fd);
697 	if (ret != 1)
698 		return -errno;
699 	do {
700 		end_scans = ksm_get_full_scans();
701 		if (end_scans < 0)
702 			return end_scans;
703 	} while (end_scans < start_scans + 2);
704 
705 	return 0;
706 }
707 
ksm_stop(void)708 int ksm_stop(void)
709 {
710 	int ksm_fd;
711 	ssize_t ret;
712 
713 	ksm_fd = open("/sys/kernel/mm/ksm/run", O_RDWR);
714 	if (ksm_fd < 0)
715 		return -errno;
716 
717 	ret = write(ksm_fd, "2", 1);
718 	close(ksm_fd);
719 	return ret == 1 ? 0 : -errno;
720 }
721