Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Peter Xu | 2685 | 79.27% | 19 | 43.18% |
Andrea Arcangeli | 210 | 6.20% | 3 | 6.82% |
Suren Baghdasaryan | 152 | 4.49% | 2 | 4.55% |
Axel Rasmussen | 108 | 3.19% | 6 | 13.64% |
Mike Kravetz | 104 | 3.07% | 3 | 6.82% |
Zach O'Keefe | 69 | 2.04% | 1 | 2.27% |
Mike Rapoport | 22 | 0.65% | 5 | 11.36% |
Zi Yan | 14 | 0.41% | 1 | 2.27% |
Peter Collingbourne | 14 | 0.41% | 1 | 2.27% |
David Hildenbrand | 8 | 0.24% | 2 | 4.55% |
Thomas Gleixner | 1 | 0.03% | 1 | 2.27% |
Total | 3387 | 44 |
// SPDX-License-Identifier: GPL-2.0-only /* * Userfaultfd tests util functions * * Copyright (C) 2015-2023 Red Hat, Inc. */ #include "uffd-common.h" #define BASE_PMD_ADDR ((void *)(1UL << 30)) volatile bool test_uffdio_copy_eexist = true; unsigned long nr_cpus, nr_pages, nr_pages_per_cpu, page_size; char *area_src, *area_src_alias, *area_dst, *area_dst_alias, *area_remap; int uffd = -1, uffd_flags, finished, *pipefd, test_type; bool map_shared; bool test_uffdio_wp = true; unsigned long long *count_verify; uffd_test_ops_t *uffd_test_ops; uffd_test_case_ops_t *uffd_test_case_ops; static int uffd_mem_fd_create(off_t mem_size, bool hugetlb) { unsigned int memfd_flags = 0; int mem_fd; if (hugetlb) memfd_flags = MFD_HUGETLB; mem_fd = memfd_create("uffd-test", memfd_flags); if (mem_fd < 0) err("memfd_create"); if (ftruncate(mem_fd, mem_size)) err("ftruncate"); if (fallocate(mem_fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, mem_size)) err("fallocate"); return mem_fd; } static void anon_release_pages(char *rel_area) { if (madvise(rel_area, nr_pages * page_size, MADV_DONTNEED)) err("madvise(MADV_DONTNEED) failed"); } static int anon_allocate_area(void **alloc_area, bool is_src) { *alloc_area = mmap(NULL, nr_pages * page_size, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); if (*alloc_area == MAP_FAILED) { *alloc_area = NULL; return -errno; } return 0; } static void noop_alias_mapping(__u64 *start, size_t len, unsigned long offset) { } static void hugetlb_release_pages(char *rel_area) { if (!map_shared) { if (madvise(rel_area, nr_pages * page_size, MADV_DONTNEED)) err("madvise(MADV_DONTNEED) failed"); } else { if (madvise(rel_area, nr_pages * page_size, MADV_REMOVE)) err("madvise(MADV_REMOVE) failed"); } } static int hugetlb_allocate_area(void **alloc_area, bool is_src) { off_t size = nr_pages * page_size; off_t offset = is_src ? 0 : size; void *area_alias = NULL; char **alloc_area_alias; int mem_fd = uffd_mem_fd_create(size * 2, true); *alloc_area = mmap(NULL, size, PROT_READ | PROT_WRITE, (map_shared ? MAP_SHARED : MAP_PRIVATE) | (is_src ? 0 : MAP_NORESERVE), mem_fd, offset); if (*alloc_area == MAP_FAILED) { *alloc_area = NULL; return -errno; } if (map_shared) { area_alias = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, mem_fd, offset); if (area_alias == MAP_FAILED) return -errno; } if (is_src) { alloc_area_alias = &area_src_alias; } else { alloc_area_alias = &area_dst_alias; } if (area_alias) *alloc_area_alias = area_alias; close(mem_fd); return 0; } static void hugetlb_alias_mapping(__u64 *start, size_t len, unsigned long offset) { if (!map_shared) return; *start = (unsigned long) area_dst_alias + offset; } static void shmem_release_pages(char *rel_area) { if (madvise(rel_area, nr_pages * page_size, MADV_REMOVE)) err("madvise(MADV_REMOVE) failed"); } static int shmem_allocate_area(void **alloc_area, bool is_src) { void *area_alias = NULL; size_t bytes = nr_pages * page_size, hpage_size = read_pmd_pagesize(); unsigned long offset = is_src ? 0 : bytes; char *p = NULL, *p_alias = NULL; int mem_fd = uffd_mem_fd_create(bytes * 2, false); /* TODO: clean this up. Use a static addr is ugly */ p = BASE_PMD_ADDR; if (!is_src) /* src map + alias + interleaved hpages */ p += 2 * (bytes + hpage_size); p_alias = p; p_alias += bytes; p_alias += hpage_size; /* Prevent src/dst VMA merge */ *alloc_area = mmap(p, bytes, PROT_READ | PROT_WRITE, MAP_SHARED, mem_fd, offset); if (*alloc_area == MAP_FAILED) { *alloc_area = NULL; return -errno; } if (*alloc_area != p) err("mmap of memfd failed at %p", p); area_alias = mmap(p_alias, bytes, PROT_READ | PROT_WRITE, MAP_SHARED, mem_fd, offset); if (area_alias == MAP_FAILED) { munmap(*alloc_area, bytes); *alloc_area = NULL; return -errno; } if (area_alias != p_alias) err("mmap of anonymous memory failed at %p", p_alias); if (is_src) area_src_alias = area_alias; else area_dst_alias = area_alias; close(mem_fd); return 0; } static void shmem_alias_mapping(__u64 *start, size_t len, unsigned long offset) { *start = (unsigned long)area_dst_alias + offset; } static void shmem_check_pmd_mapping(void *p, int expect_nr_hpages) { if (!check_huge_shmem(area_dst_alias, expect_nr_hpages, read_pmd_pagesize())) err("Did not find expected %d number of hugepages", expect_nr_hpages); } struct uffd_test_ops anon_uffd_test_ops = { .allocate_area = anon_allocate_area, .release_pages = anon_release_pages, .alias_mapping = noop_alias_mapping, .check_pmd_mapping = NULL, }; struct uffd_test_ops shmem_uffd_test_ops = { .allocate_area = shmem_allocate_area, .release_pages = shmem_release_pages, .alias_mapping = shmem_alias_mapping, .check_pmd_mapping = shmem_check_pmd_mapping, }; struct uffd_test_ops hugetlb_uffd_test_ops = { .allocate_area = hugetlb_allocate_area, .release_pages = hugetlb_release_pages, .alias_mapping = hugetlb_alias_mapping, .check_pmd_mapping = NULL, }; void uffd_stats_report(struct uffd_args *args, int n_cpus) { int i; unsigned long long miss_total = 0, wp_total = 0, minor_total = 0; for (i = 0; i < n_cpus; i++) { miss_total += args[i].missing_faults; wp_total += args[i].wp_faults; minor_total += args[i].minor_faults; } printf("userfaults: "); if (miss_total) { printf("%llu missing (", miss_total); for (i = 0; i < n_cpus; i++) printf("%lu+", args[i].missing_faults); printf("\b) "); } if (wp_total) { printf("%llu wp (", wp_total); for (i = 0; i < n_cpus; i++) printf("%lu+", args[i].wp_faults); printf("\b) "); } if (minor_total) { printf("%llu minor (", minor_total); for (i = 0; i < n_cpus; i++) printf("%lu+", args[i].minor_faults); printf("\b)"); } printf("\n"); } int userfaultfd_open(uint64_t *features) { struct uffdio_api uffdio_api; uffd = uffd_open(UFFD_FLAGS); if (uffd < 0) return -1; uffd_flags = fcntl(uffd, F_GETFD, NULL); uffdio_api.api = UFFD_API; uffdio_api.features = *features; if (ioctl(uffd, UFFDIO_API, &uffdio_api)) /* Probably lack of CAP_PTRACE? */ return -1; if (uffdio_api.api != UFFD_API) err("UFFDIO_API error: %" PRIu64, (uint64_t)uffdio_api.api); *features = uffdio_api.features; return 0; } static inline void munmap_area(void **area) { if (*area) if (munmap(*area, nr_pages * page_size)) err("munmap"); *area = NULL; } void uffd_test_ctx_clear(void) { size_t i; if (pipefd) { for (i = 0; i < nr_cpus * 2; ++i) { if (close(pipefd[i])) err("close pipefd"); } free(pipefd); pipefd = NULL; } if (count_verify) { free(count_verify); count_verify = NULL; } if (uffd != -1) { if (close(uffd)) err("close uffd"); uffd = -1; } munmap_area((void **)&area_src); munmap_area((void **)&area_src_alias); munmap_area((void **)&area_dst); munmap_area((void **)&area_dst_alias); munmap_area((void **)&area_remap); } int uffd_test_ctx_init(uint64_t features, const char **errmsg) { unsigned long nr, cpu; int ret; if (uffd_test_case_ops && uffd_test_case_ops->pre_alloc) { ret = uffd_test_case_ops->pre_alloc(errmsg); if (ret) return ret; } ret = uffd_test_ops->allocate_area((void **)&area_src, true); ret |= uffd_test_ops->allocate_area((void **)&area_dst, false); if (ret) { if (errmsg) *errmsg = "memory allocation failed"; return ret; } if (uffd_test_case_ops && uffd_test_case_ops->post_alloc) { ret = uffd_test_case_ops->post_alloc(errmsg); if (ret) return ret; } ret = userfaultfd_open(&features); if (ret) { if (errmsg) *errmsg = "possible lack of priviledge"; return ret; } count_verify = malloc(nr_pages * sizeof(unsigned long long)); if (!count_verify) err("count_verify"); for (nr = 0; nr < nr_pages; nr++) { *area_mutex(area_src, nr) = (pthread_mutex_t)PTHREAD_MUTEX_INITIALIZER; count_verify[nr] = *area_count(area_src, nr) = 1; /* * In the transition between 255 to 256, powerpc will * read out of order in my_bcmp and see both bytes as * zero, so leave a placeholder below always non-zero * after the count, to avoid my_bcmp to trigger false * positives. */ *(area_count(area_src, nr) + 1) = 1; } /* * After initialization of area_src, we must explicitly release pages * for area_dst to make sure it's fully empty. Otherwise we could have * some area_dst pages be errornously initialized with zero pages, * hence we could hit memory corruption later in the test. * * One example is when THP is globally enabled, above allocate_area() * calls could have the two areas merged into a single VMA (as they * will have the same VMA flags so they're mergeable). When we * initialize the area_src above, it's possible that some part of * area_dst could have been faulted in via one huge THP that will be * shared between area_src and area_dst. It could cause some of the * area_dst won't be trapped by missing userfaults. * * This release_pages() will guarantee even if that happened, we'll * proactively split the thp and drop any accidentally initialized * pages within area_dst. */ uffd_test_ops->release_pages(area_dst); pipefd = malloc(sizeof(int) * nr_cpus * 2); if (!pipefd) err("pipefd"); for (cpu = 0; cpu < nr_cpus; cpu++) if (pipe2(&pipefd[cpu * 2], O_CLOEXEC | O_NONBLOCK)) err("pipe"); return 0; } void wp_range(int ufd, __u64 start, __u64 len, bool wp) { struct uffdio_writeprotect prms; /* Write protection page faults */ prms.range.start = start; prms.range.len = len; /* Undo write-protect, do wakeup after that */ prms.mode = wp ? UFFDIO_WRITEPROTECT_MODE_WP : 0; if (ioctl(ufd, UFFDIO_WRITEPROTECT, &prms)) err("clear WP failed: address=0x%"PRIx64, (uint64_t)start); } static void continue_range(int ufd, __u64 start, __u64 len, bool wp) { struct uffdio_continue req; int ret; req.range.start = start; req.range.len = len; req.mode = 0; if (wp) req.mode |= UFFDIO_CONTINUE_MODE_WP; if (ioctl(ufd, UFFDIO_CONTINUE, &req)) err("UFFDIO_CONTINUE failed for address 0x%" PRIx64, (uint64_t)start); /* * Error handling within the kernel for continue is subtly different * from copy or zeropage, so it may be a source of bugs. Trigger an * error (-EEXIST) on purpose, to verify doing so doesn't cause a BUG. */ req.mapped = 0; ret = ioctl(ufd, UFFDIO_CONTINUE, &req); if (ret >= 0 || req.mapped != -EEXIST) err("failed to exercise UFFDIO_CONTINUE error handling, ret=%d, mapped=%" PRId64, ret, (int64_t) req.mapped); } int uffd_read_msg(int ufd, struct uffd_msg *msg) { int ret = read(uffd, msg, sizeof(*msg)); if (ret != sizeof(*msg)) { if (ret < 0) { if (errno == EAGAIN || errno == EINTR) return 1; err("blocking read error"); } else { err("short read"); } } return 0; } void uffd_handle_page_fault(struct uffd_msg *msg, struct uffd_args *args) { unsigned long offset; if (msg->event != UFFD_EVENT_PAGEFAULT) err("unexpected msg event %u", msg->event); if (msg->arg.pagefault.flags & UFFD_PAGEFAULT_FLAG_WP) { /* Write protect page faults */ wp_range(uffd, msg->arg.pagefault.address, page_size, false); args->wp_faults++; } else if (msg->arg.pagefault.flags & UFFD_PAGEFAULT_FLAG_MINOR) { uint8_t *area; int b; /* * Minor page faults * * To prove we can modify the original range for testing * purposes, we're going to bit flip this range before * continuing. * * Note that this requires all minor page fault tests operate on * area_dst (non-UFFD-registered) and area_dst_alias * (UFFD-registered). */ area = (uint8_t *)(area_dst + ((char *)msg->arg.pagefault.address - area_dst_alias)); for (b = 0; b < page_size; ++b) area[b] = ~area[b]; continue_range(uffd, msg->arg.pagefault.address, page_size, args->apply_wp); args->minor_faults++; } else { /* * Missing page faults. * * Here we force a write check for each of the missing mode * faults. It's guaranteed because the only threads that * will trigger uffd faults are the locking threads, and * their first instruction to touch the missing page will * always be pthread_mutex_lock(). * * Note that here we relied on an NPTL glibc impl detail to * always read the lock type at the entry of the lock op * (pthread_mutex_t.__data.__type, offset 0x10) before * doing any locking operations to guarantee that. It's * actually not good to rely on this impl detail because * logically a pthread-compatible lib can implement the * locks without types and we can fail when linking with * them. However since we used to find bugs with this * strict check we still keep it around. Hopefully this * could be a good hint when it fails again. If one day * it'll break on some other impl of glibc we'll revisit. */ if (msg->arg.pagefault.flags & UFFD_PAGEFAULT_FLAG_WRITE) err("unexpected write fault"); offset = (char *)(unsigned long)msg->arg.pagefault.address - area_dst; offset &= ~(page_size-1); if (copy_page(uffd, offset, args->apply_wp)) args->missing_faults++; } } void *uffd_poll_thread(void *arg) { struct uffd_args *args = (struct uffd_args *)arg; unsigned long cpu = args->cpu; struct pollfd pollfd[2]; struct uffd_msg msg; struct uffdio_register uffd_reg; int ret; char tmp_chr; if (!args->handle_fault) args->handle_fault = uffd_handle_page_fault; pollfd[0].fd = uffd; pollfd[0].events = POLLIN; pollfd[1].fd = pipefd[cpu*2]; pollfd[1].events = POLLIN; for (;;) { ret = poll(pollfd, 2, -1); if (ret <= 0) { if (errno == EINTR || errno == EAGAIN) continue; err("poll error: %d", ret); } if (pollfd[1].revents) { if (!(pollfd[1].revents & POLLIN)) err("pollfd[1].revents %d", pollfd[1].revents); if (read(pollfd[1].fd, &tmp_chr, 1) != 1) err("read pipefd error"); break; } if (!(pollfd[0].revents & POLLIN)) err("pollfd[0].revents %d", pollfd[0].revents); if (uffd_read_msg(uffd, &msg)) continue; switch (msg.event) { default: err("unexpected msg event %u\n", msg.event); break; case UFFD_EVENT_PAGEFAULT: args->handle_fault(&msg, args); break; case UFFD_EVENT_FORK: close(uffd); uffd = msg.arg.fork.ufd; pollfd[0].fd = uffd; break; case UFFD_EVENT_REMOVE: uffd_reg.range.start = msg.arg.remove.start; uffd_reg.range.len = msg.arg.remove.end - msg.arg.remove.start; if (ioctl(uffd, UFFDIO_UNREGISTER, &uffd_reg.range)) err("remove failure"); break; case UFFD_EVENT_REMAP: area_remap = area_dst; /* save for later unmap */ area_dst = (char *)(unsigned long)msg.arg.remap.to; break; } } return NULL; } static void retry_copy_page(int ufd, struct uffdio_copy *uffdio_copy, unsigned long offset) { uffd_test_ops->alias_mapping(&uffdio_copy->dst, uffdio_copy->len, offset); if (ioctl(ufd, UFFDIO_COPY, uffdio_copy)) { /* real retval in ufdio_copy.copy */ if (uffdio_copy->copy != -EEXIST) err("UFFDIO_COPY retry error: %"PRId64, (int64_t)uffdio_copy->copy); } else { err("UFFDIO_COPY retry unexpected: %"PRId64, (int64_t)uffdio_copy->copy); } } static void wake_range(int ufd, unsigned long addr, unsigned long len) { struct uffdio_range uffdio_wake; uffdio_wake.start = addr; uffdio_wake.len = len; if (ioctl(ufd, UFFDIO_WAKE, &uffdio_wake)) fprintf(stderr, "error waking %lu\n", addr), exit(1); } int __copy_page(int ufd, unsigned long offset, bool retry, bool wp) { struct uffdio_copy uffdio_copy; if (offset >= nr_pages * page_size) err("unexpected offset %lu\n", offset); uffdio_copy.dst = (unsigned long) area_dst + offset; uffdio_copy.src = (unsigned long) area_src + offset; uffdio_copy.len = page_size; if (wp) uffdio_copy.mode = UFFDIO_COPY_MODE_WP; else uffdio_copy.mode = 0; uffdio_copy.copy = 0; if (ioctl(ufd, UFFDIO_COPY, &uffdio_copy)) { /* real retval in ufdio_copy.copy */ if (uffdio_copy.copy != -EEXIST) err("UFFDIO_COPY error: %"PRId64, (int64_t)uffdio_copy.copy); wake_range(ufd, uffdio_copy.dst, page_size); } else if (uffdio_copy.copy != page_size) { err("UFFDIO_COPY error: %"PRId64, (int64_t)uffdio_copy.copy); } else { if (test_uffdio_copy_eexist && retry) { test_uffdio_copy_eexist = false; retry_copy_page(ufd, &uffdio_copy, offset); } return 1; } return 0; } int copy_page(int ufd, unsigned long offset, bool wp) { return __copy_page(ufd, offset, false, wp); } int move_page(int ufd, unsigned long offset, unsigned long len) { struct uffdio_move uffdio_move; if (offset + len > nr_pages * page_size) err("unexpected offset %lu and length %lu\n", offset, len); uffdio_move.dst = (unsigned long) area_dst + offset; uffdio_move.src = (unsigned long) area_src + offset; uffdio_move.len = len; uffdio_move.mode = UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES; uffdio_move.move = 0; if (ioctl(ufd, UFFDIO_MOVE, &uffdio_move)) { /* real retval in uffdio_move.move */ if (uffdio_move.move != -EEXIST) err("UFFDIO_MOVE error: %"PRId64, (int64_t)uffdio_move.move); wake_range(ufd, uffdio_move.dst, len); } else if (uffdio_move.move != len) { err("UFFDIO_MOVE error: %"PRId64, (int64_t)uffdio_move.move); } else return 1; return 0; } int uffd_open_dev(unsigned int flags) { int fd, uffd; fd = open("/dev/userfaultfd", O_RDWR | O_CLOEXEC); if (fd < 0) return fd; uffd = ioctl(fd, USERFAULTFD_IOC_NEW, flags); close(fd); return uffd; } int uffd_open_sys(unsigned int flags) { #ifdef __NR_userfaultfd return syscall(__NR_userfaultfd, flags); #else return -1; #endif } int uffd_open(unsigned int flags) { int uffd = uffd_open_sys(flags); if (uffd < 0) uffd = uffd_open_dev(flags); return uffd; } int uffd_get_features(uint64_t *features) { struct uffdio_api uffdio_api = { .api = UFFD_API, .features = 0 }; /* * This should by default work in most kernels; the feature list * will be the same no matter what we pass in here. */ int fd = uffd_open(UFFD_USER_MODE_ONLY); if (fd < 0) /* Maybe the kernel is older than user-only mode? */ fd = uffd_open(0); if (fd < 0) return fd; if (ioctl(fd, UFFDIO_API, &uffdio_api)) { close(fd); return -errno; } *features = uffdio_api.features; close(fd); return 0; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1