1 // SPDX-License-Identifier: GPL-2.0
2 #include <string.h>
3 #include <errno.h>
4 #include <fcntl.h>
5 #include <dirent.h>
6 #include <inttypes.h>
7 #include <sys/ioctl.h>
8 #include <linux/userfaultfd.h>
9 #include <linux/fs.h>
10 #include <sys/syscall.h>
11 #include <unistd.h>
12 #include "../kselftest.h"
13 #include "vm_util.h"
14
15 #define PMD_SIZE_FILE_PATH "/sys/kernel/mm/transparent_hugepage/hpage_pmd_size"
16 #define SMAP_FILE_PATH "/proc/self/smaps"
17 #define STATUS_FILE_PATH "/proc/self/status"
18 #define MAX_LINE_LENGTH 500
19
20 unsigned int __page_size;
21 unsigned int __page_shift;
22
pagemap_get_entry(int fd,char * start)23 uint64_t pagemap_get_entry(int fd, char *start)
24 {
25 const unsigned long pfn = (unsigned long)start / getpagesize();
26 uint64_t entry;
27 int ret;
28
29 ret = pread(fd, &entry, sizeof(entry), pfn * sizeof(entry));
30 if (ret != sizeof(entry))
31 ksft_exit_fail_msg("reading pagemap failed\n");
32 return entry;
33 }
34
__pagemap_scan_get_categories(int fd,char * start,struct page_region * r)35 static uint64_t __pagemap_scan_get_categories(int fd, char *start, struct page_region *r)
36 {
37 struct pm_scan_arg arg;
38
39 arg.start = (uintptr_t)start;
40 arg.end = (uintptr_t)(start + psize());
41 arg.vec = (uintptr_t)r;
42 arg.vec_len = 1;
43 arg.flags = 0;
44 arg.size = sizeof(struct pm_scan_arg);
45 arg.max_pages = 0;
46 arg.category_inverted = 0;
47 arg.category_mask = 0;
48 arg.category_anyof_mask = PAGE_IS_WPALLOWED | PAGE_IS_WRITTEN | PAGE_IS_FILE |
49 PAGE_IS_PRESENT | PAGE_IS_SWAPPED | PAGE_IS_PFNZERO |
50 PAGE_IS_HUGE | PAGE_IS_SOFT_DIRTY;
51 arg.return_mask = arg.category_anyof_mask;
52
53 return ioctl(fd, PAGEMAP_SCAN, &arg);
54 }
55
pagemap_scan_get_categories(int fd,char * start)56 static uint64_t pagemap_scan_get_categories(int fd, char *start)
57 {
58 struct page_region r;
59 long ret;
60
61 ret = __pagemap_scan_get_categories(fd, start, &r);
62 if (ret < 0)
63 ksft_exit_fail_msg("PAGEMAP_SCAN failed: %s\n", strerror(errno));
64 if (ret == 0)
65 return 0;
66 return r.categories;
67 }
68
69 /* `start` is any valid address. */
pagemap_scan_supported(int fd,char * start)70 static bool pagemap_scan_supported(int fd, char *start)
71 {
72 static int supported = -1;
73 int ret;
74
75 if (supported != -1)
76 return supported;
77
78 /* Provide an invalid address in order to trigger EFAULT. */
79 ret = __pagemap_scan_get_categories(fd, start, (struct page_region *) ~0UL);
80 if (ret == 0)
81 ksft_exit_fail_msg("PAGEMAP_SCAN succeeded unexpectedly\n");
82
83 supported = errno == EFAULT;
84
85 return supported;
86 }
87
page_entry_is(int fd,char * start,char * desc,uint64_t pagemap_flags,uint64_t pagescan_flags)88 static bool page_entry_is(int fd, char *start, char *desc,
89 uint64_t pagemap_flags, uint64_t pagescan_flags)
90 {
91 bool m = pagemap_get_entry(fd, start) & pagemap_flags;
92
93 if (pagemap_scan_supported(fd, start)) {
94 bool s = pagemap_scan_get_categories(fd, start) & pagescan_flags;
95
96 if (m == s)
97 return m;
98
99 ksft_exit_fail_msg(
100 "read and ioctl return unmatched results for %s: %d %d", desc, m, s);
101 }
102 return m;
103 }
104
pagemap_is_softdirty(int fd,char * start)105 bool pagemap_is_softdirty(int fd, char *start)
106 {
107 return page_entry_is(fd, start, "soft-dirty",
108 PM_SOFT_DIRTY, PAGE_IS_SOFT_DIRTY);
109 }
110
pagemap_is_swapped(int fd,char * start)111 bool pagemap_is_swapped(int fd, char *start)
112 {
113 return page_entry_is(fd, start, "swap", PM_SWAP, PAGE_IS_SWAPPED);
114 }
115
pagemap_is_populated(int fd,char * start)116 bool pagemap_is_populated(int fd, char *start)
117 {
118 return page_entry_is(fd, start, "populated",
119 PM_PRESENT | PM_SWAP,
120 PAGE_IS_PRESENT | PAGE_IS_SWAPPED);
121 }
122
pagemap_get_pfn(int fd,char * start)123 unsigned long pagemap_get_pfn(int fd, char *start)
124 {
125 uint64_t entry = pagemap_get_entry(fd, start);
126
127 /* If present (63th bit), PFN is at bit 0 -- 54. */
128 if (entry & PM_PRESENT)
129 return entry & 0x007fffffffffffffull;
130 return -1ul;
131 }
132
clear_softdirty(void)133 void clear_softdirty(void)
134 {
135 int ret;
136 const char *ctrl = "4";
137 int fd = open("/proc/self/clear_refs", O_WRONLY);
138
139 if (fd < 0)
140 ksft_exit_fail_msg("opening clear_refs failed\n");
141 ret = write(fd, ctrl, strlen(ctrl));
142 close(fd);
143 if (ret != (signed int)strlen(ctrl))
144 ksft_exit_fail_msg("writing clear_refs failed\n");
145 }
146
check_for_pattern(FILE * fp,const char * pattern,char * buf,size_t len)147 bool check_for_pattern(FILE *fp, const char *pattern, char *buf, size_t len)
148 {
149 while (fgets(buf, len, fp)) {
150 if (!strncmp(buf, pattern, strlen(pattern)))
151 return true;
152 }
153 return false;
154 }
155
read_pmd_pagesize(void)156 uint64_t read_pmd_pagesize(void)
157 {
158 int fd;
159 char buf[20];
160 ssize_t num_read;
161
162 fd = open(PMD_SIZE_FILE_PATH, O_RDONLY);
163 if (fd == -1)
164 return 0;
165
166 num_read = read(fd, buf, 19);
167 if (num_read < 1) {
168 close(fd);
169 return 0;
170 }
171 buf[num_read] = '\0';
172 close(fd);
173
174 return strtoul(buf, NULL, 10);
175 }
176
rss_anon(void)177 unsigned long rss_anon(void)
178 {
179 unsigned long rss_anon = 0;
180 FILE *fp;
181 char buffer[MAX_LINE_LENGTH];
182
183 fp = fopen(STATUS_FILE_PATH, "r");
184 if (!fp)
185 ksft_exit_fail_msg("%s: Failed to open file %s\n", __func__, STATUS_FILE_PATH);
186
187 if (!check_for_pattern(fp, "RssAnon:", buffer, sizeof(buffer)))
188 goto err_out;
189
190 if (sscanf(buffer, "RssAnon:%10lu kB", &rss_anon) != 1)
191 ksft_exit_fail_msg("Reading status error\n");
192
193 err_out:
194 fclose(fp);
195 return rss_anon;
196 }
197
__get_smap_entry(void * addr,const char * pattern,char * buf,size_t len)198 char *__get_smap_entry(void *addr, const char *pattern, char *buf, size_t len)
199 {
200 int ret;
201 FILE *fp;
202 char *entry = NULL;
203 char addr_pattern[MAX_LINE_LENGTH];
204
205 ret = snprintf(addr_pattern, MAX_LINE_LENGTH, "%08lx-",
206 (unsigned long) addr);
207 if (ret >= MAX_LINE_LENGTH)
208 ksft_exit_fail_msg("%s: Pattern is too long\n", __func__);
209
210 fp = fopen(SMAP_FILE_PATH, "r");
211 if (!fp)
212 ksft_exit_fail_msg("%s: Failed to open file %s\n", __func__, SMAP_FILE_PATH);
213
214 if (!check_for_pattern(fp, addr_pattern, buf, len))
215 goto err_out;
216
217 /* Fetch the pattern in the same block */
218 if (!check_for_pattern(fp, pattern, buf, len))
219 goto err_out;
220
221 /* Trim trailing newline */
222 entry = strchr(buf, '\n');
223 if (entry)
224 *entry = '\0';
225
226 entry = buf + strlen(pattern);
227
228 err_out:
229 fclose(fp);
230 return entry;
231 }
232
__check_huge(void * addr,char * pattern,int nr_hpages,uint64_t hpage_size)233 bool __check_huge(void *addr, char *pattern, int nr_hpages,
234 uint64_t hpage_size)
235 {
236 char buffer[MAX_LINE_LENGTH];
237 uint64_t thp = -1;
238 char *entry;
239
240 entry = __get_smap_entry(addr, pattern, buffer, sizeof(buffer));
241 if (!entry)
242 goto err_out;
243
244 if (sscanf(entry, "%9" SCNu64 " kB", &thp) != 1)
245 ksft_exit_fail_msg("Reading smap error\n");
246
247 err_out:
248 return thp == (nr_hpages * (hpage_size >> 10));
249 }
250
check_huge_anon(void * addr,int nr_hpages,uint64_t hpage_size)251 bool check_huge_anon(void *addr, int nr_hpages, uint64_t hpage_size)
252 {
253 return __check_huge(addr, "AnonHugePages: ", nr_hpages, hpage_size);
254 }
255
check_huge_file(void * addr,int nr_hpages,uint64_t hpage_size)256 bool check_huge_file(void *addr, int nr_hpages, uint64_t hpage_size)
257 {
258 return __check_huge(addr, "FilePmdMapped:", nr_hpages, hpage_size);
259 }
260
check_huge_shmem(void * addr,int nr_hpages,uint64_t hpage_size)261 bool check_huge_shmem(void *addr, int nr_hpages, uint64_t hpage_size)
262 {
263 return __check_huge(addr, "ShmemPmdMapped:", nr_hpages, hpage_size);
264 }
265
allocate_transhuge(void * ptr,int pagemap_fd)266 int64_t allocate_transhuge(void *ptr, int pagemap_fd)
267 {
268 uint64_t ent[2];
269
270 /* drop pmd */
271 if (mmap(ptr, HPAGE_SIZE, PROT_READ | PROT_WRITE,
272 MAP_FIXED | MAP_ANONYMOUS |
273 MAP_NORESERVE | MAP_PRIVATE, -1, 0) != ptr)
274 ksft_exit_fail_msg("mmap transhuge\n");
275
276 if (madvise(ptr, HPAGE_SIZE, MADV_HUGEPAGE))
277 ksft_exit_fail_msg("MADV_HUGEPAGE\n");
278
279 /* allocate transparent huge page */
280 *(volatile void **)ptr = ptr;
281
282 if (pread(pagemap_fd, ent, sizeof(ent),
283 (uintptr_t)ptr >> (pshift() - 3)) != sizeof(ent))
284 ksft_exit_fail_msg("read pagemap\n");
285
286 if (PAGEMAP_PRESENT(ent[0]) && PAGEMAP_PRESENT(ent[1]) &&
287 PAGEMAP_PFN(ent[0]) + 1 == PAGEMAP_PFN(ent[1]) &&
288 !(PAGEMAP_PFN(ent[0]) & ((1 << (HPAGE_SHIFT - pshift())) - 1)))
289 return PAGEMAP_PFN(ent[0]);
290
291 return -1;
292 }
293
default_huge_page_size(void)294 unsigned long default_huge_page_size(void)
295 {
296 unsigned long hps = 0;
297 char *line = NULL;
298 size_t linelen = 0;
299 FILE *f = fopen("/proc/meminfo", "r");
300
301 if (!f)
302 return 0;
303 while (getline(&line, &linelen, f) > 0) {
304 if (sscanf(line, "Hugepagesize: %lu kB", &hps) == 1) {
305 hps <<= 10;
306 break;
307 }
308 }
309
310 free(line);
311 fclose(f);
312 return hps;
313 }
314
detect_hugetlb_page_sizes(size_t sizes[],int max)315 int detect_hugetlb_page_sizes(size_t sizes[], int max)
316 {
317 DIR *dir = opendir("/sys/kernel/mm/hugepages/");
318 int count = 0;
319
320 if (!dir)
321 return 0;
322
323 while (count < max) {
324 struct dirent *entry = readdir(dir);
325 size_t kb;
326
327 if (!entry)
328 break;
329 if (entry->d_type != DT_DIR)
330 continue;
331 if (sscanf(entry->d_name, "hugepages-%zukB", &kb) != 1)
332 continue;
333 sizes[count++] = kb * 1024;
334 ksft_print_msg("[INFO] detected hugetlb page size: %zu KiB\n",
335 kb);
336 }
337 closedir(dir);
338 return count;
339 }
340
pageflags_get(unsigned long pfn,int kpageflags_fd,uint64_t * flags)341 int pageflags_get(unsigned long pfn, int kpageflags_fd, uint64_t *flags)
342 {
343 size_t count;
344
345 count = pread(kpageflags_fd, flags, sizeof(*flags),
346 pfn * sizeof(*flags));
347
348 if (count != sizeof(*flags))
349 return -1;
350
351 return 0;
352 }
353
354 /* If `ioctls' non-NULL, the allowed ioctls will be returned into the var */
uffd_register_with_ioctls(int uffd,void * addr,uint64_t len,bool miss,bool wp,bool minor,uint64_t * ioctls)355 int uffd_register_with_ioctls(int uffd, void *addr, uint64_t len,
356 bool miss, bool wp, bool minor, uint64_t *ioctls)
357 {
358 struct uffdio_register uffdio_register = { 0 };
359 uint64_t mode = 0;
360 int ret = 0;
361
362 if (miss)
363 mode |= UFFDIO_REGISTER_MODE_MISSING;
364 if (wp)
365 mode |= UFFDIO_REGISTER_MODE_WP;
366 if (minor)
367 mode |= UFFDIO_REGISTER_MODE_MINOR;
368
369 uffdio_register.range.start = (unsigned long)addr;
370 uffdio_register.range.len = len;
371 uffdio_register.mode = mode;
372
373 if (ioctl(uffd, UFFDIO_REGISTER, &uffdio_register) == -1)
374 ret = -errno;
375 else if (ioctls)
376 *ioctls = uffdio_register.ioctls;
377
378 return ret;
379 }
380
uffd_register(int uffd,void * addr,uint64_t len,bool miss,bool wp,bool minor)381 int uffd_register(int uffd, void *addr, uint64_t len,
382 bool miss, bool wp, bool minor)
383 {
384 return uffd_register_with_ioctls(uffd, addr, len,
385 miss, wp, minor, NULL);
386 }
387
uffd_unregister(int uffd,void * addr,uint64_t len)388 int uffd_unregister(int uffd, void *addr, uint64_t len)
389 {
390 struct uffdio_range range = { .start = (uintptr_t)addr, .len = len };
391 int ret = 0;
392
393 if (ioctl(uffd, UFFDIO_UNREGISTER, &range) == -1)
394 ret = -errno;
395
396 return ret;
397 }
398
get_free_hugepages(void)399 unsigned long get_free_hugepages(void)
400 {
401 unsigned long fhp = 0;
402 char *line = NULL;
403 size_t linelen = 0;
404 FILE *f = fopen("/proc/meminfo", "r");
405
406 if (!f)
407 return fhp;
408 while (getline(&line, &linelen, f) > 0) {
409 if (sscanf(line, "HugePages_Free: %lu", &fhp) == 1)
410 break;
411 }
412
413 free(line);
414 fclose(f);
415 return fhp;
416 }
417
check_vmflag(void * addr,const char * flag)418 static bool check_vmflag(void *addr, const char *flag)
419 {
420 char buffer[MAX_LINE_LENGTH];
421 const char *flags;
422 size_t flaglen;
423
424 flags = __get_smap_entry(addr, "VmFlags:", buffer, sizeof(buffer));
425 if (!flags)
426 ksft_exit_fail_msg("%s: No VmFlags for %p\n", __func__, addr);
427
428 while (true) {
429 flags += strspn(flags, " ");
430
431 flaglen = strcspn(flags, " ");
432 if (!flaglen)
433 return false;
434
435 if (flaglen == strlen(flag) && !memcmp(flags, flag, flaglen))
436 return true;
437
438 flags += flaglen;
439 }
440 }
441
check_vmflag_io(void * addr)442 bool check_vmflag_io(void *addr)
443 {
444 return check_vmflag(addr, "io");
445 }
446
check_vmflag_pfnmap(void * addr)447 bool check_vmflag_pfnmap(void *addr)
448 {
449 return check_vmflag(addr, "pf");
450 }
451
softdirty_supported(void)452 bool softdirty_supported(void)
453 {
454 char *addr;
455 bool supported = false;
456 const size_t pagesize = getpagesize();
457
458 /* New mappings are expected to be marked with VM_SOFTDIRTY (sd). */
459 addr = mmap(0, pagesize, PROT_READ | PROT_WRITE,
460 MAP_ANONYMOUS | MAP_PRIVATE, 0, 0);
461 if (!addr)
462 ksft_exit_fail_msg("mmap failed\n");
463
464 supported = check_vmflag(addr, "sd");
465 munmap(addr, pagesize);
466 return supported;
467 }
468
469 /*
470 * Open an fd at /proc/$pid/maps and configure procmap_out ready for
471 * PROCMAP_QUERY query. Returns 0 on success, or an error code otherwise.
472 */
open_procmap(pid_t pid,struct procmap_fd * procmap_out)473 int open_procmap(pid_t pid, struct procmap_fd *procmap_out)
474 {
475 char path[256];
476 int ret = 0;
477
478 memset(procmap_out, '\0', sizeof(*procmap_out));
479 sprintf(path, "/proc/%d/maps", pid);
480 procmap_out->query.size = sizeof(procmap_out->query);
481 procmap_out->fd = open(path, O_RDONLY);
482 if (procmap_out->fd < 0)
483 ret = -errno;
484
485 return ret;
486 }
487
488 /* Perform PROCMAP_QUERY. Returns 0 on success, or an error code otherwise. */
query_procmap(struct procmap_fd * procmap)489 int query_procmap(struct procmap_fd *procmap)
490 {
491 int ret = 0;
492
493 if (ioctl(procmap->fd, PROCMAP_QUERY, &procmap->query) == -1)
494 ret = -errno;
495
496 return ret;
497 }
498
499 /*
500 * Try to find the VMA at specified address, returns true if found, false if not
501 * found, and the test is failed if any other error occurs.
502 *
503 * On success, procmap->query is populated with the results.
504 */
find_vma_procmap(struct procmap_fd * procmap,void * address)505 bool find_vma_procmap(struct procmap_fd *procmap, void *address)
506 {
507 int err;
508
509 procmap->query.query_flags = 0;
510 procmap->query.query_addr = (unsigned long)address;
511 err = query_procmap(procmap);
512 if (!err)
513 return true;
514
515 if (err != -ENOENT)
516 ksft_exit_fail_msg("%s: Error %d on ioctl(PROCMAP_QUERY)\n",
517 __func__, err);
518 return false;
519 }
520
521 /*
522 * Close fd used by PROCMAP_QUERY mechanism. Returns 0 on success, or an error
523 * code otherwise.
524 */
close_procmap(struct procmap_fd * procmap)525 int close_procmap(struct procmap_fd *procmap)
526 {
527 return close(procmap->fd);
528 }
529
write_sysfs(const char * file_path,unsigned long val)530 int write_sysfs(const char *file_path, unsigned long val)
531 {
532 FILE *f = fopen(file_path, "w");
533
534 if (!f) {
535 fprintf(stderr, "f %s\n", file_path);
536 perror("fopen");
537 return 1;
538 }
539 if (fprintf(f, "%lu", val) < 0) {
540 perror("fprintf");
541 fclose(f);
542 return 1;
543 }
544 fclose(f);
545
546 return 0;
547 }
548
read_sysfs(const char * file_path,unsigned long * val)549 int read_sysfs(const char *file_path, unsigned long *val)
550 {
551 FILE *f = fopen(file_path, "r");
552
553 if (!f) {
554 fprintf(stderr, "f %s\n", file_path);
555 perror("fopen");
556 return 1;
557 }
558 if (fscanf(f, "%lu", val) != 1) {
559 perror("fscanf");
560 fclose(f);
561 return 1;
562 }
563 fclose(f);
564
565 return 0;
566 }
567
sys_mremap(void * old_address,unsigned long old_size,unsigned long new_size,int flags,void * new_address)568 void *sys_mremap(void *old_address, unsigned long old_size,
569 unsigned long new_size, int flags, void *new_address)
570 {
571 return (void *)syscall(__NR_mremap, (unsigned long)old_address,
572 old_size, new_size, flags,
573 (unsigned long)new_address);
574 }
575
detect_huge_zeropage(void)576 bool detect_huge_zeropage(void)
577 {
578 int fd = open("/sys/kernel/mm/transparent_hugepage/use_zero_page",
579 O_RDONLY);
580 bool enabled = 0;
581 char buf[15];
582 int ret;
583
584 if (fd < 0)
585 return 0;
586
587 ret = pread(fd, buf, sizeof(buf), 0);
588 if (ret > 0 && ret < sizeof(buf)) {
589 buf[ret] = 0;
590
591 if (strtoul(buf, NULL, 10) == 1)
592 enabled = 1;
593 }
594
595 close(fd);
596 return enabled;
597 }
598
ksm_get_self_zero_pages(void)599 long ksm_get_self_zero_pages(void)
600 {
601 int proc_self_ksm_stat_fd;
602 char buf[200];
603 char *substr_ksm_zero;
604 size_t value_pos;
605 ssize_t read_size;
606
607 proc_self_ksm_stat_fd = open("/proc/self/ksm_stat", O_RDONLY);
608 if (proc_self_ksm_stat_fd < 0)
609 return -errno;
610
611 read_size = pread(proc_self_ksm_stat_fd, buf, sizeof(buf) - 1, 0);
612 close(proc_self_ksm_stat_fd);
613 if (read_size < 0)
614 return -errno;
615
616 buf[read_size] = 0;
617
618 substr_ksm_zero = strstr(buf, "ksm_zero_pages");
619 if (!substr_ksm_zero)
620 return 0;
621
622 value_pos = strcspn(substr_ksm_zero, "0123456789");
623 return strtol(substr_ksm_zero + value_pos, NULL, 10);
624 }
625
ksm_get_self_merging_pages(void)626 long ksm_get_self_merging_pages(void)
627 {
628 int proc_self_ksm_merging_pages_fd;
629 char buf[10];
630 ssize_t ret;
631
632 proc_self_ksm_merging_pages_fd = open("/proc/self/ksm_merging_pages",
633 O_RDONLY);
634 if (proc_self_ksm_merging_pages_fd < 0)
635 return -errno;
636
637 ret = pread(proc_self_ksm_merging_pages_fd, buf, sizeof(buf) - 1, 0);
638 close(proc_self_ksm_merging_pages_fd);
639 if (ret <= 0)
640 return -errno;
641 buf[ret] = 0;
642
643 return strtol(buf, NULL, 10);
644 }
645
ksm_get_full_scans(void)646 long ksm_get_full_scans(void)
647 {
648 int ksm_full_scans_fd;
649 char buf[10];
650 ssize_t ret;
651
652 ksm_full_scans_fd = open("/sys/kernel/mm/ksm/full_scans", O_RDONLY);
653 if (ksm_full_scans_fd < 0)
654 return -errno;
655
656 ret = pread(ksm_full_scans_fd, buf, sizeof(buf) - 1, 0);
657 close(ksm_full_scans_fd);
658 if (ret <= 0)
659 return -errno;
660 buf[ret] = 0;
661
662 return strtol(buf, NULL, 10);
663 }
664
ksm_use_zero_pages(void)665 int ksm_use_zero_pages(void)
666 {
667 int ksm_use_zero_pages_fd;
668 ssize_t ret;
669
670 ksm_use_zero_pages_fd = open("/sys/kernel/mm/ksm/use_zero_pages", O_RDWR);
671 if (ksm_use_zero_pages_fd < 0)
672 return -errno;
673
674 ret = write(ksm_use_zero_pages_fd, "1", 1);
675 close(ksm_use_zero_pages_fd);
676 return ret == 1 ? 0 : -errno;
677 }
678
ksm_start(void)679 int ksm_start(void)
680 {
681 int ksm_fd;
682 ssize_t ret;
683 long start_scans, end_scans;
684
685 ksm_fd = open("/sys/kernel/mm/ksm/run", O_RDWR);
686 if (ksm_fd < 0)
687 return -errno;
688
689 /* Wait for two full scans such that any possible merging happened. */
690 start_scans = ksm_get_full_scans();
691 if (start_scans < 0) {
692 close(ksm_fd);
693 return start_scans;
694 }
695 ret = write(ksm_fd, "1", 1);
696 close(ksm_fd);
697 if (ret != 1)
698 return -errno;
699 do {
700 end_scans = ksm_get_full_scans();
701 if (end_scans < 0)
702 return end_scans;
703 } while (end_scans < start_scans + 2);
704
705 return 0;
706 }
707
ksm_stop(void)708 int ksm_stop(void)
709 {
710 int ksm_fd;
711 ssize_t ret;
712
713 ksm_fd = open("/sys/kernel/mm/ksm/run", O_RDWR);
714 if (ksm_fd < 0)
715 return -errno;
716
717 ret = write(ksm_fd, "2", 1);
718 close(ksm_fd);
719 return ret == 1 ? 0 : -errno;
720 }
721