[PATCH v3 2/5] selftests/mseal: add sealed madvise type

From: jeffxu
Date: Fri Aug 30 2024 - 14:03:00 EST


From: Jeff Xu <jeffxu@xxxxxxxxxxxx>

Add a testcase to cover all sealed madvise type.

Signed-off-by: Jeff Xu <jeffxu@xxxxxxxxxxxx>
---
tools/testing/selftests/mm/mseal_test.c | 30 ++++++++++++++++++++++++-
1 file changed, 29 insertions(+), 1 deletion(-)

diff --git a/tools/testing/selftests/mm/mseal_test.c b/tools/testing/selftests/mm/mseal_test.c
index 7198f2314f9b..6d77dc9b5442 100644
--- a/tools/testing/selftests/mm/mseal_test.c
+++ b/tools/testing/selftests/mm/mseal_test.c
@@ -2121,6 +2121,32 @@ static void test_seal_madvise_nodiscard(bool seal)
REPORT_TEST_PASS();
}

+static void test_seal_discard_madvise_advice(void)
+{
+ void *ptr;
+ unsigned long page_size = getpagesize();
+ unsigned long size = 4 * page_size;
+ int ret;
+ int sealed_advice[] = {MADV_FREE, MADV_DONTNEED,
+ MADV_DONTNEED_LOCKED, MADV_REMOVE,
+ MADV_DONTFORK, MADV_WIPEONFORK};
+ int size_sealed_advice = sizeof(sealed_advice) / sizeof(int);
+
+ setup_single_address(size, &ptr);
+ FAIL_TEST_IF_FALSE(ptr != (void *)-1);
+
+ ret = seal_single_address(ptr, size);
+ FAIL_TEST_IF_FALSE(!ret);
+
+ for (int i = 0; i < size_sealed_advice; i++) {
+ ret = sys_madvise(ptr, size, sealed_advice[i]);
+ FAIL_TEST_IF_FALSE(ret < 0);
+ FAIL_TEST_IF_FALSE(errno == EPERM);
+ }
+
+ REPORT_TEST_PASS();
+}
+
int main(int argc, char **argv)
{
bool test_seal = seal_support();
@@ -2142,7 +2168,7 @@ int main(int argc, char **argv)
if (!get_vma_size_supported())
ksft_exit_skip("get_vma_size not supported\n");

- ksft_set_plan(88);
+ ksft_set_plan(89);

test_seal_addseal();
test_seal_unmapped_start();
@@ -2251,5 +2277,7 @@ int main(int argc, char **argv)
test_seal_discard_ro_anon_on_pkey(false);
test_seal_discard_ro_anon_on_pkey(true);

+ test_seal_discard_madvise_advice();
+
ksft_finished();
}
--
2.46.0.469.g59c65b2a67-goog