1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * KSM functional tests
4 *
5 * Copyright 2022, Red Hat, Inc.
6 *
7 * Author(s): David Hildenbrand <david@redhat.com>
8 */
9 #define _GNU_SOURCE
10 #include <stdlib.h>
11 #include <string.h>
12 #include <stdbool.h>
13 #include <stdint.h>
14 #include <asm-generic/unistd.h>
15 #include <errno.h>
16 #include <fcntl.h>
17 #include <sys/mman.h>
18 #include <sys/prctl.h>
19 #include <sys/syscall.h>
20 #include <sys/ioctl.h>
21 #include <sys/wait.h>
22 #include <linux/userfaultfd.h>
23
24 #include "../kselftest.h"
25 #include "vm_util.h"
26
27 #define KiB 1024u
28 #define MiB (1024 * KiB)
29 #define FORK_EXEC_CHILD_PRG_NAME "ksm_fork_exec_child"
30
31 #define MAP_MERGE_FAIL ((void *)-1)
32 #define MAP_MERGE_SKIP ((void *)-2)
33
34 enum ksm_merge_mode {
35 KSM_MERGE_PRCTL,
36 KSM_MERGE_MADVISE,
37 KSM_MERGE_NONE, /* PRCTL already set */
38 };
39
40 static int mem_fd;
41 static int ksm_fd;
42 static int ksm_full_scans_fd;
43 static int proc_self_ksm_stat_fd;
44 static int proc_self_ksm_merging_pages_fd;
45 static int ksm_use_zero_pages_fd;
46 static int pagemap_fd;
47 static size_t pagesize;
48
range_maps_duplicates(char * addr,unsigned long size)49 static bool range_maps_duplicates(char *addr, unsigned long size)
50 {
51 unsigned long offs_a, offs_b, pfn_a, pfn_b;
52
53 /*
54 * There is no easy way to check if there are KSM pages mapped into
55 * this range. We only check that the range does not map the same PFN
56 * twice by comparing each pair of mapped pages.
57 */
58 for (offs_a = 0; offs_a < size; offs_a += pagesize) {
59 pfn_a = pagemap_get_pfn(pagemap_fd, addr + offs_a);
60 /* Page not present or PFN not exposed by the kernel. */
61 if (pfn_a == -1ul || !pfn_a)
62 continue;
63
64 for (offs_b = offs_a + pagesize; offs_b < size;
65 offs_b += pagesize) {
66 pfn_b = pagemap_get_pfn(pagemap_fd, addr + offs_b);
67 if (pfn_b == -1ul || !pfn_b)
68 continue;
69 if (pfn_a == pfn_b)
70 return true;
71 }
72 }
73 return false;
74 }
75
get_my_ksm_zero_pages(void)76 static long get_my_ksm_zero_pages(void)
77 {
78 char buf[200];
79 char *substr_ksm_zero;
80 size_t value_pos;
81 ssize_t read_size;
82 unsigned long my_ksm_zero_pages;
83
84 if (!proc_self_ksm_stat_fd)
85 return 0;
86
87 read_size = pread(proc_self_ksm_stat_fd, buf, sizeof(buf) - 1, 0);
88 if (read_size < 0)
89 return -errno;
90
91 buf[read_size] = 0;
92
93 substr_ksm_zero = strstr(buf, "ksm_zero_pages");
94 if (!substr_ksm_zero)
95 return 0;
96
97 value_pos = strcspn(substr_ksm_zero, "0123456789");
98 my_ksm_zero_pages = strtol(substr_ksm_zero + value_pos, NULL, 10);
99
100 return my_ksm_zero_pages;
101 }
102
get_my_merging_pages(void)103 static long get_my_merging_pages(void)
104 {
105 char buf[10];
106 ssize_t ret;
107
108 if (proc_self_ksm_merging_pages_fd < 0)
109 return proc_self_ksm_merging_pages_fd;
110
111 ret = pread(proc_self_ksm_merging_pages_fd, buf, sizeof(buf) - 1, 0);
112 if (ret <= 0)
113 return -errno;
114 buf[ret] = 0;
115
116 return strtol(buf, NULL, 10);
117 }
118
ksm_get_full_scans(void)119 static long ksm_get_full_scans(void)
120 {
121 char buf[10];
122 ssize_t ret;
123
124 ret = pread(ksm_full_scans_fd, buf, sizeof(buf) - 1, 0);
125 if (ret <= 0)
126 return -errno;
127 buf[ret] = 0;
128
129 return strtol(buf, NULL, 10);
130 }
131
ksm_merge(void)132 static int ksm_merge(void)
133 {
134 long start_scans, end_scans;
135
136 /* Wait for two full scans such that any possible merging happened. */
137 start_scans = ksm_get_full_scans();
138 if (start_scans < 0)
139 return start_scans;
140 if (write(ksm_fd, "1", 1) != 1)
141 return -errno;
142 do {
143 end_scans = ksm_get_full_scans();
144 if (end_scans < 0)
145 return end_scans;
146 } while (end_scans < start_scans + 2);
147
148 return 0;
149 }
150
ksm_unmerge(void)151 static int ksm_unmerge(void)
152 {
153 if (write(ksm_fd, "2", 1) != 1)
154 return -errno;
155 return 0;
156 }
157
__mmap_and_merge_range(char val,unsigned long size,int prot,enum ksm_merge_mode mode)158 static char *__mmap_and_merge_range(char val, unsigned long size, int prot,
159 enum ksm_merge_mode mode)
160 {
161 char *map;
162 char *err_map = MAP_MERGE_FAIL;
163 int ret;
164
165 /* Stabilize accounting by disabling KSM completely. */
166 if (ksm_unmerge()) {
167 ksft_print_msg("Disabling (unmerging) KSM failed\n");
168 return err_map;
169 }
170
171 if (get_my_merging_pages() > 0) {
172 ksft_print_msg("Still pages merged\n");
173 return err_map;
174 }
175
176 map = mmap(NULL, size, PROT_READ|PROT_WRITE,
177 MAP_PRIVATE|MAP_ANON, -1, 0);
178 if (map == MAP_FAILED) {
179 ksft_print_msg("mmap() failed\n");
180 return err_map;
181 }
182
183 /* Don't use THP. Ignore if THP are not around on a kernel. */
184 if (madvise(map, size, MADV_NOHUGEPAGE) && errno != EINVAL) {
185 ksft_print_msg("MADV_NOHUGEPAGE failed\n");
186 goto unmap;
187 }
188
189 /* Make sure each page contains the same values to merge them. */
190 memset(map, val, size);
191
192 if (mprotect(map, size, prot)) {
193 ksft_print_msg("mprotect() failed\n");
194 err_map = MAP_MERGE_SKIP;
195 goto unmap;
196 }
197
198 switch (mode) {
199 case KSM_MERGE_PRCTL:
200 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0);
201 if (ret < 0 && errno == EINVAL) {
202 ksft_print_msg("PR_SET_MEMORY_MERGE not supported\n");
203 err_map = MAP_MERGE_SKIP;
204 goto unmap;
205 } else if (ret) {
206 ksft_print_msg("PR_SET_MEMORY_MERGE=1 failed\n");
207 goto unmap;
208 }
209 break;
210 case KSM_MERGE_MADVISE:
211 if (madvise(map, size, MADV_MERGEABLE)) {
212 ksft_print_msg("MADV_MERGEABLE failed\n");
213 goto unmap;
214 }
215 break;
216 case KSM_MERGE_NONE:
217 break;
218 }
219
220 /* Run KSM to trigger merging and wait. */
221 if (ksm_merge()) {
222 ksft_print_msg("Running KSM failed\n");
223 goto unmap;
224 }
225
226 /*
227 * Check if anything was merged at all. Ignore the zero page that is
228 * accounted differently (depending on kernel support).
229 */
230 if (val && !get_my_merging_pages()) {
231 ksft_print_msg("No pages got merged\n");
232 goto unmap;
233 }
234
235 return map;
236 unmap:
237 munmap(map, size);
238 return err_map;
239 }
240
mmap_and_merge_range(char val,unsigned long size,int prot,enum ksm_merge_mode mode)241 static char *mmap_and_merge_range(char val, unsigned long size, int prot,
242 enum ksm_merge_mode mode)
243 {
244 char *map;
245 char *ret = MAP_FAILED;
246
247 map = __mmap_and_merge_range(val, size, prot, mode);
248 if (map == MAP_MERGE_FAIL)
249 ksft_test_result_fail("Merging memory failed");
250 else if (map == MAP_MERGE_SKIP)
251 ksft_test_result_skip("Merging memory skipped");
252 else
253 ret = map;
254
255 return ret;
256 }
257
test_unmerge(void)258 static void test_unmerge(void)
259 {
260 const unsigned int size = 2 * MiB;
261 char *map;
262
263 ksft_print_msg("[RUN] %s\n", __func__);
264
265 map = mmap_and_merge_range(0xcf, size, PROT_READ | PROT_WRITE, KSM_MERGE_MADVISE);
266 if (map == MAP_FAILED)
267 return;
268
269 if (madvise(map, size, MADV_UNMERGEABLE)) {
270 ksft_test_result_fail("MADV_UNMERGEABLE failed\n");
271 goto unmap;
272 }
273
274 ksft_test_result(!range_maps_duplicates(map, size),
275 "Pages were unmerged\n");
276 unmap:
277 munmap(map, size);
278 }
279
test_unmerge_zero_pages(void)280 static void test_unmerge_zero_pages(void)
281 {
282 const unsigned int size = 2 * MiB;
283 char *map;
284 unsigned int offs;
285 unsigned long pages_expected;
286
287 ksft_print_msg("[RUN] %s\n", __func__);
288
289 if (proc_self_ksm_stat_fd < 0) {
290 ksft_test_result_skip("open(\"/proc/self/ksm_stat\") failed\n");
291 return;
292 }
293 if (ksm_use_zero_pages_fd < 0) {
294 ksft_test_result_skip("open \"/sys/kernel/mm/ksm/use_zero_pages\" failed\n");
295 return;
296 }
297 if (write(ksm_use_zero_pages_fd, "1", 1) != 1) {
298 ksft_test_result_skip("write \"/sys/kernel/mm/ksm/use_zero_pages\" failed\n");
299 return;
300 }
301
302 /* Let KSM deduplicate zero pages. */
303 map = mmap_and_merge_range(0x00, size, PROT_READ | PROT_WRITE, KSM_MERGE_MADVISE);
304 if (map == MAP_FAILED)
305 return;
306
307 /* Check if ksm_zero_pages is updated correctly after KSM merging */
308 pages_expected = size / pagesize;
309 if (pages_expected != get_my_ksm_zero_pages()) {
310 ksft_test_result_fail("'ksm_zero_pages' updated after merging\n");
311 goto unmap;
312 }
313
314 /* Try to unmerge half of the region */
315 if (madvise(map, size / 2, MADV_UNMERGEABLE)) {
316 ksft_test_result_fail("MADV_UNMERGEABLE failed\n");
317 goto unmap;
318 }
319
320 /* Check if ksm_zero_pages is updated correctly after unmerging */
321 pages_expected /= 2;
322 if (pages_expected != get_my_ksm_zero_pages()) {
323 ksft_test_result_fail("'ksm_zero_pages' updated after unmerging\n");
324 goto unmap;
325 }
326
327 /* Trigger unmerging of the other half by writing to the pages. */
328 for (offs = size / 2; offs < size; offs += pagesize)
329 *((unsigned int *)&map[offs]) = offs;
330
331 /* Now we should have no zeropages remaining. */
332 if (get_my_ksm_zero_pages()) {
333 ksft_test_result_fail("'ksm_zero_pages' updated after write fault\n");
334 goto unmap;
335 }
336
337 /* Check if ksm zero pages are really unmerged */
338 ksft_test_result(!range_maps_duplicates(map, size),
339 "KSM zero pages were unmerged\n");
340 unmap:
341 munmap(map, size);
342 }
343
test_unmerge_discarded(void)344 static void test_unmerge_discarded(void)
345 {
346 const unsigned int size = 2 * MiB;
347 char *map;
348
349 ksft_print_msg("[RUN] %s\n", __func__);
350
351 map = mmap_and_merge_range(0xcf, size, PROT_READ | PROT_WRITE, KSM_MERGE_MADVISE);
352 if (map == MAP_FAILED)
353 return;
354
355 /* Discard half of all mapped pages so we have pte_none() entries. */
356 if (madvise(map, size / 2, MADV_DONTNEED)) {
357 ksft_test_result_fail("MADV_DONTNEED failed\n");
358 goto unmap;
359 }
360
361 if (madvise(map, size, MADV_UNMERGEABLE)) {
362 ksft_test_result_fail("MADV_UNMERGEABLE failed\n");
363 goto unmap;
364 }
365
366 ksft_test_result(!range_maps_duplicates(map, size),
367 "Pages were unmerged\n");
368 unmap:
369 munmap(map, size);
370 }
371
test_unmerge_uffd_wp(void)372 static void test_unmerge_uffd_wp(void)
373 {
374 struct uffdio_writeprotect uffd_writeprotect;
375 const unsigned int size = 2 * MiB;
376 struct uffdio_api uffdio_api;
377 char *map;
378 int uffd;
379
380 ksft_print_msg("[RUN] %s\n", __func__);
381
382 map = mmap_and_merge_range(0xcf, size, PROT_READ | PROT_WRITE, KSM_MERGE_MADVISE);
383 if (map == MAP_FAILED)
384 return;
385
386 /* See if UFFD is around. */
387 uffd = syscall(__NR_userfaultfd, O_CLOEXEC | O_NONBLOCK);
388 if (uffd < 0) {
389 ksft_test_result_skip("__NR_userfaultfd failed\n");
390 goto unmap;
391 }
392
393 /* See if UFFD-WP is around. */
394 uffdio_api.api = UFFD_API;
395 uffdio_api.features = UFFD_FEATURE_PAGEFAULT_FLAG_WP;
396 if (ioctl(uffd, UFFDIO_API, &uffdio_api) < 0) {
397 ksft_test_result_fail("UFFDIO_API failed\n");
398 goto close_uffd;
399 }
400 if (!(uffdio_api.features & UFFD_FEATURE_PAGEFAULT_FLAG_WP)) {
401 ksft_test_result_skip("UFFD_FEATURE_PAGEFAULT_FLAG_WP not available\n");
402 goto close_uffd;
403 }
404
405 /* Register UFFD-WP, no need for an actual handler. */
406 if (uffd_register(uffd, map, size, false, true, false)) {
407 ksft_test_result_fail("UFFDIO_REGISTER_MODE_WP failed\n");
408 goto close_uffd;
409 }
410
411 /* Write-protect the range using UFFD-WP. */
412 uffd_writeprotect.range.start = (unsigned long) map;
413 uffd_writeprotect.range.len = size;
414 uffd_writeprotect.mode = UFFDIO_WRITEPROTECT_MODE_WP;
415 if (ioctl(uffd, UFFDIO_WRITEPROTECT, &uffd_writeprotect)) {
416 ksft_test_result_fail("UFFDIO_WRITEPROTECT failed\n");
417 goto close_uffd;
418 }
419
420 if (madvise(map, size, MADV_UNMERGEABLE)) {
421 ksft_test_result_fail("MADV_UNMERGEABLE failed\n");
422 goto close_uffd;
423 }
424
425 ksft_test_result(!range_maps_duplicates(map, size),
426 "Pages were unmerged\n");
427 close_uffd:
428 close(uffd);
429 unmap:
430 munmap(map, size);
431 }
432
433 /* Verify that KSM can be enabled / queried with prctl. */
test_prctl(void)434 static void test_prctl(void)
435 {
436 int ret;
437
438 ksft_print_msg("[RUN] %s\n", __func__);
439
440 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0);
441 if (ret < 0 && errno == EINVAL) {
442 ksft_test_result_skip("PR_SET_MEMORY_MERGE not supported\n");
443 return;
444 } else if (ret) {
445 ksft_test_result_fail("PR_SET_MEMORY_MERGE=1 failed\n");
446 return;
447 }
448
449 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0);
450 if (ret < 0) {
451 ksft_test_result_fail("PR_GET_MEMORY_MERGE failed\n");
452 return;
453 } else if (ret != 1) {
454 ksft_test_result_fail("PR_SET_MEMORY_MERGE=1 not effective\n");
455 return;
456 }
457
458 ret = prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0);
459 if (ret) {
460 ksft_test_result_fail("PR_SET_MEMORY_MERGE=0 failed\n");
461 return;
462 }
463
464 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0);
465 if (ret < 0) {
466 ksft_test_result_fail("PR_GET_MEMORY_MERGE failed\n");
467 return;
468 } else if (ret != 0) {
469 ksft_test_result_fail("PR_SET_MEMORY_MERGE=0 not effective\n");
470 return;
471 }
472
473 ksft_test_result_pass("Setting/clearing PR_SET_MEMORY_MERGE works\n");
474 }
475
test_child_ksm(void)476 static int test_child_ksm(void)
477 {
478 const unsigned int size = 2 * MiB;
479 char *map;
480
481 /* Test if KSM is enabled for the process. */
482 if (prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0) != 1)
483 return -1;
484
485 /* Test if merge could really happen. */
486 map = __mmap_and_merge_range(0xcf, size, PROT_READ | PROT_WRITE, KSM_MERGE_NONE);
487 if (map == MAP_MERGE_FAIL)
488 return -2;
489 else if (map == MAP_MERGE_SKIP)
490 return -3;
491
492 munmap(map, size);
493 return 0;
494 }
495
test_child_ksm_err(int status)496 static void test_child_ksm_err(int status)
497 {
498 if (status == -1)
499 ksft_test_result_fail("unexpected PR_GET_MEMORY_MERGE result in child\n");
500 else if (status == -2)
501 ksft_test_result_fail("Merge in child failed\n");
502 else if (status == -3)
503 ksft_test_result_skip("Merge in child skipped\n");
504 }
505
506 /* Verify that prctl ksm flag is inherited. */
test_prctl_fork(void)507 static void test_prctl_fork(void)
508 {
509 int ret, status;
510 pid_t child_pid;
511
512 ksft_print_msg("[RUN] %s\n", __func__);
513
514 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0);
515 if (ret < 0 && errno == EINVAL) {
516 ksft_test_result_skip("PR_SET_MEMORY_MERGE not supported\n");
517 return;
518 } else if (ret) {
519 ksft_test_result_fail("PR_SET_MEMORY_MERGE=1 failed\n");
520 return;
521 }
522
523 child_pid = fork();
524 if (!child_pid) {
525 exit(test_child_ksm());
526 } else if (child_pid < 0) {
527 ksft_test_result_fail("fork() failed\n");
528 return;
529 }
530
531 if (waitpid(child_pid, &status, 0) < 0) {
532 ksft_test_result_fail("waitpid() failed\n");
533 return;
534 }
535
536 status = WEXITSTATUS(status);
537 if (status) {
538 test_child_ksm_err(status);
539 return;
540 }
541
542 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) {
543 ksft_test_result_fail("PR_SET_MEMORY_MERGE=0 failed\n");
544 return;
545 }
546
547 ksft_test_result_pass("PR_SET_MEMORY_MERGE value is inherited\n");
548 }
549
test_prctl_fork_exec(void)550 static void test_prctl_fork_exec(void)
551 {
552 int ret, status;
553 pid_t child_pid;
554
555 ksft_print_msg("[RUN] %s\n", __func__);
556
557 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0);
558 if (ret < 0 && errno == EINVAL) {
559 ksft_test_result_skip("PR_SET_MEMORY_MERGE not supported\n");
560 return;
561 } else if (ret) {
562 ksft_test_result_fail("PR_SET_MEMORY_MERGE=1 failed\n");
563 return;
564 }
565
566 child_pid = fork();
567 if (child_pid == -1) {
568 ksft_test_result_skip("fork() failed\n");
569 return;
570 } else if (child_pid == 0) {
571 char *prg_name = "./ksm_functional_tests";
572 char *argv_for_program[] = { prg_name, FORK_EXEC_CHILD_PRG_NAME };
573
574 execv(prg_name, argv_for_program);
575 return;
576 }
577
578 if (waitpid(child_pid, &status, 0) > 0) {
579 if (WIFEXITED(status)) {
580 status = WEXITSTATUS(status);
581 if (status) {
582 test_child_ksm_err(status);
583 return;
584 }
585 } else {
586 ksft_test_result_fail("program didn't terminate normally\n");
587 return;
588 }
589 } else {
590 ksft_test_result_fail("waitpid() failed\n");
591 return;
592 }
593
594 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) {
595 ksft_test_result_fail("PR_SET_MEMORY_MERGE=0 failed\n");
596 return;
597 }
598
599 ksft_test_result_pass("PR_SET_MEMORY_MERGE value is inherited\n");
600 }
601
test_prctl_unmerge(void)602 static void test_prctl_unmerge(void)
603 {
604 const unsigned int size = 2 * MiB;
605 char *map;
606
607 ksft_print_msg("[RUN] %s\n", __func__);
608
609 map = mmap_and_merge_range(0xcf, size, PROT_READ | PROT_WRITE, KSM_MERGE_PRCTL);
610 if (map == MAP_FAILED)
611 return;
612
613 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) {
614 ksft_test_result_fail("PR_SET_MEMORY_MERGE=0 failed\n");
615 goto unmap;
616 }
617
618 ksft_test_result(!range_maps_duplicates(map, size),
619 "Pages were unmerged\n");
620 unmap:
621 munmap(map, size);
622 }
623
test_prot_none(void)624 static void test_prot_none(void)
625 {
626 const unsigned int size = 2 * MiB;
627 char *map;
628 int i;
629
630 ksft_print_msg("[RUN] %s\n", __func__);
631
632 map = mmap_and_merge_range(0x11, size, PROT_NONE, KSM_MERGE_MADVISE);
633 if (map == MAP_FAILED)
634 goto unmap;
635
636 /* Store a unique value in each page on one half using ptrace */
637 for (i = 0; i < size / 2; i += pagesize) {
638 lseek(mem_fd, (uintptr_t) map + i, SEEK_SET);
639 if (write(mem_fd, &i, sizeof(i)) != sizeof(i)) {
640 ksft_test_result_fail("ptrace write failed\n");
641 goto unmap;
642 }
643 }
644
645 /* Trigger unsharing on the other half. */
646 if (madvise(map + size / 2, size / 2, MADV_UNMERGEABLE)) {
647 ksft_test_result_fail("MADV_UNMERGEABLE failed\n");
648 goto unmap;
649 }
650
651 ksft_test_result(!range_maps_duplicates(map, size),
652 "Pages were unmerged\n");
653 unmap:
654 munmap(map, size);
655 }
656
init_global_file_handles(void)657 static void init_global_file_handles(void)
658 {
659 mem_fd = open("/proc/self/mem", O_RDWR);
660 if (mem_fd < 0)
661 ksft_exit_fail_msg("opening /proc/self/mem failed\n");
662 ksm_fd = open("/sys/kernel/mm/ksm/run", O_RDWR);
663 if (ksm_fd < 0)
664 ksft_exit_skip("open(\"/sys/kernel/mm/ksm/run\") failed\n");
665 ksm_full_scans_fd = open("/sys/kernel/mm/ksm/full_scans", O_RDONLY);
666 if (ksm_full_scans_fd < 0)
667 ksft_exit_skip("open(\"/sys/kernel/mm/ksm/full_scans\") failed\n");
668 pagemap_fd = open("/proc/self/pagemap", O_RDONLY);
669 if (pagemap_fd < 0)
670 ksft_exit_skip("open(\"/proc/self/pagemap\") failed\n");
671 proc_self_ksm_stat_fd = open("/proc/self/ksm_stat", O_RDONLY);
672 proc_self_ksm_merging_pages_fd = open("/proc/self/ksm_merging_pages",
673 O_RDONLY);
674 ksm_use_zero_pages_fd = open("/sys/kernel/mm/ksm/use_zero_pages", O_RDWR);
675 }
676
main(int argc,char ** argv)677 int main(int argc, char **argv)
678 {
679 unsigned int tests = 8;
680 int err;
681
682 if (argc > 1 && !strcmp(argv[1], FORK_EXEC_CHILD_PRG_NAME)) {
683 init_global_file_handles();
684 exit(test_child_ksm());
685 }
686
687 tests++;
688
689 ksft_print_header();
690 ksft_set_plan(tests);
691
692 pagesize = getpagesize();
693
694 init_global_file_handles();
695
696 test_unmerge();
697 test_unmerge_zero_pages();
698 test_unmerge_discarded();
699 test_unmerge_uffd_wp();
700
701 test_prot_none();
702
703 test_prctl();
704 test_prctl_fork();
705 test_prctl_fork_exec();
706 test_prctl_unmerge();
707
708 err = ksft_get_fail_cnt();
709 if (err)
710 ksft_exit_fail_msg("%d out of %d tests failed\n",
711 err, ksft_test_num());
712 ksft_exit_pass();
713 }
714