Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1767725iog; Tue, 14 Jun 2022 12:55:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwBnaZnbrctazgBKpiqoaLZJJ3ZsfjmaePoFfZRSufaaH7x5CUEq538HEbPHqQqrgTsfOI+ X-Received: by 2002:a63:604:0:b0:3fc:8830:a67c with SMTP id 4-20020a630604000000b003fc8830a67cmr5811173pgg.402.1655236504781; Tue, 14 Jun 2022 12:55:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655236504; cv=none; d=google.com; s=arc-20160816; b=XXWD8cf5BoME1cFF9v9pZsvvGjDHSMRt3NXYKrjlO3aR3RkmVSSZ9xBGEp329HzuVe jljacqgSLyG/uvkev9PBj+efbQ3ePOWGXmOH5FNdACbpwWfsOC3icFrI/3VkVSIZHlIC J0VfXCBTfN6tzKLcFmPmwcB7Cy8fG+thY1vZnBY6evQwGSwG74mYkcQlrSGKTv/t+KW7 SKkA/5J2JaHzWExnB0iOzr+4xrpF9nQyjV33E9qI7exzLvpCPf+2MpMP8+W0z3ca9LUU o3VJBRIY6RSCyv6zGNiuO84kDDdQW1YKRQxYO5OSyxn6R7G8atkiq8R27jsfpiRjTzXL qKZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=m1JgHuVxzVW3EUm2DTV344V5KoB3ftgRF+8dYijCj7E=; b=Tph+YF3Du0l3XRTHkGsJ0KmyZcq13AK/wirGOH15pedyIR5hWi9U8mALrjRam0OBf6 IKY/hf9D19CYbdh00PrZW9JbgNEWZ+dLrYiea5dL5hYCIkxZyrO7lBo4qYQYrqvlQGwz 4I6U8XXe7fgRkVWpBPeonBt72XQV/BDMnlJN8PelDFRffIB8DKMtOxg7kkJ+rfrquIm6 7Y5rU9eI6FbMm95IN3opgj+N7uhAcVk82l2F9o9g7ZvnI+FQey7VX+px1pOt4lwSs9fX NNwjE4V3vMeNLP5EFI4p+Fz93hCyef0+iUUVAYsYDNK/4znFMTkqyOe7E2anM9qEBURq YDFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OZSMXpNw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lb8-20020a17090b4a4800b001df4e4f854csi20256368pjb.131.2022.06.14.12.54.43; Tue, 14 Jun 2022 12:55:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OZSMXpNw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243056AbiFNTZO (ORCPT + 99 others); Tue, 14 Jun 2022 15:25:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229988AbiFNTZM (ORCPT ); Tue, 14 Jun 2022 15:25:12 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1E65A193C9 for ; Tue, 14 Jun 2022 12:25:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1655234710; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=m1JgHuVxzVW3EUm2DTV344V5KoB3ftgRF+8dYijCj7E=; b=OZSMXpNwul8OyzzikAUgP8nvfEMDx9/luvbGxQhC2p6G21Sfg9Kc8x4Sb7MZ726ERGVVlM dxd0eKCBUgeXLuz27/a7tm+EVua6KqXQx8t6CE4qEnzIzhnvuAzzqv82kSCAwB6pX++OMq CZ86jSxehk1Q2PHyQ8MTgPPz6t2Bqmo= Received: from mail-io1-f72.google.com (mail-io1-f72.google.com [209.85.166.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-517-FE_8bVsLOP-6CzERy8PBBQ-1; Tue, 14 Jun 2022 15:25:09 -0400 X-MC-Unique: FE_8bVsLOP-6CzERy8PBBQ-1 Received: by mail-io1-f72.google.com with SMTP id r76-20020a6b2b4f000000b00669b75529e5so4792466ior.16 for ; Tue, 14 Jun 2022 12:25:08 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=m1JgHuVxzVW3EUm2DTV344V5KoB3ftgRF+8dYijCj7E=; b=M7e/CLTUwd4s/WaASi4KceAbDU7220YNH7X9F/hkkW85IizYd4mNbZL2x+y8F+9fO9 9zdScGKLLRDsp6I7Ij9EyvyBsfUYsgHfsgA11KIGHb9I2csGv2BBvjjO5utwMPYK+O+k KEMuCWqZRdXIWw7Wmy83Uyzn711un2dVXk3RR3iiviFgCcQNNJBHxW4fCfe9PZTKzKCC hZiuHlFXcPDIIZtUpowDmyKjTGyzaDXCCvKG3+xhZhhhGuPrhqvekhVi4uLXVaTwRsI0 JD1qCCBvW3igpVX+MPHYvCSoBTH593dTq3o7FjBmWTdnH4hjE/U53DPyJoV1ve/VfY98 SJEw== X-Gm-Message-State: AJIora+zu/1amPqE2jzN14lOG8j417aRXEhOOH2k8cuRxBTzvv3zc8fF mz4NMH+v+TvPHBAV0JjO/kxDHTEJM9fa4Dg6tvPafMh9FMRCwZqqY6HtaNnrityMaGjoluhGdvM uFpG2KTcc7H4YlyRLaMnsFXIQ X-Received: by 2002:a05:6e02:156e:b0:2d1:c265:964f with SMTP id k14-20020a056e02156e00b002d1c265964fmr3980768ilu.153.1655234708495; Tue, 14 Jun 2022 12:25:08 -0700 (PDT) X-Received: by 2002:a05:6e02:156e:b0:2d1:c265:964f with SMTP id k14-20020a056e02156e00b002d1c265964fmr3980749ilu.153.1655234708266; Tue, 14 Jun 2022 12:25:08 -0700 (PDT) Received: from xz-m1.local (cpec09435e3e0ee-cmc09435e3e0ec.cpe.net.cable.rogers.com. [99.241.198.116]) by smtp.gmail.com with ESMTPSA id y11-20020a02904b000000b0032e6f0d3796sm5206324jaf.145.2022.06.14.12.25.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 14 Jun 2022 12:25:07 -0700 (PDT) Date: Tue, 14 Jun 2022 15:25:04 -0400 From: Peter Xu To: Axel Rasmussen Cc: Alexander Viro , Andrew Morton , Charan Teja Reddy , Dave Hansen , "Dmitry V . Levin" , Gleb Fotengauer-Malinovskiy , Hugh Dickins , Jan Kara , Jonathan Corbet , Mel Gorman , Mike Kravetz , Mike Rapoport , Nadav Amit , Shuah Khan , Suren Baghdasaryan , Vlastimil Babka , zhangyi , linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH v3 3/6] userfaultfd: selftests: modify selftest to use /dev/userfaultfd Message-ID: References: <20220601210951.3916598-1-axelrasmussen@google.com> <20220601210951.3916598-4-axelrasmussen@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220601210951.3916598-4-axelrasmussen@google.com> X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 01, 2022 at 02:09:48PM -0700, Axel Rasmussen wrote: > We clearly want to ensure both userfaultfd(2) and /dev/userfaultfd keep > working into the future, so just run the test twice, using each > interface. > > Signed-off-by: Axel Rasmussen > --- > tools/testing/selftests/vm/userfaultfd.c | 37 +++++++++++++++++++++--- > 1 file changed, 33 insertions(+), 4 deletions(-) > > diff --git a/tools/testing/selftests/vm/userfaultfd.c b/tools/testing/selftests/vm/userfaultfd.c > index 0bdfc1955229..1badb5d31bf9 100644 > --- a/tools/testing/selftests/vm/userfaultfd.c > +++ b/tools/testing/selftests/vm/userfaultfd.c > @@ -77,6 +77,9 @@ static int bounces; > #define TEST_SHMEM 3 > static int test_type; > > +/* test using /dev/userfaultfd, instead of userfaultfd(2) */ > +static bool test_dev_userfaultfd; > + > /* exercise the test_uffdio_*_eexist every ALARM_INTERVAL_SECS */ > #define ALARM_INTERVAL_SECS 10 > static volatile bool test_uffdio_copy_eexist = true; > @@ -154,12 +157,14 @@ static void usage(void) > ret, __LINE__); \ > } while (0) > > -#define err(fmt, ...) \ > +#define errexit(exitcode, fmt, ...) \ > do { \ > _err(fmt, ##__VA_ARGS__); \ > - exit(1); \ > + exit(exitcode); \ > } while (0) > > +#define err(fmt, ...) errexit(1, fmt, ##__VA_ARGS__) > + > static void uffd_stats_reset(struct uffd_stats *uffd_stats, > unsigned long n_cpus) > { > @@ -383,13 +388,31 @@ static void assert_expected_ioctls_present(uint64_t mode, uint64_t ioctls) > } > } > > +static void __userfaultfd_open_dev(void) > +{ > + int fd; > + > + uffd = -1; > + fd = open("/dev/userfaultfd", O_RDWR | O_CLOEXEC); > + if (fd < 0) > + return; > + > + uffd = ioctl(fd, USERFAULTFD_IOC_NEW, > + O_CLOEXEC | O_NONBLOCK | UFFD_USER_MODE_ONLY); > + close(fd); > +} > + > static void userfaultfd_open(uint64_t *features) > { > struct uffdio_api uffdio_api; > > - uffd = syscall(__NR_userfaultfd, O_CLOEXEC | O_NONBLOCK | UFFD_USER_MODE_ONLY); > + if (test_dev_userfaultfd) > + __userfaultfd_open_dev(); I can understand uffd is a global var, but still AFAICT that's trivially easy to do the return to match the syscall case.. uffd = __userfaultfd_open_dev(); And since at it, it'll be great to make a macro: #define UFFD_FLAGS (O_CLOEXEC | O_NONBLOCK | UFFD_USER_MODE_ONLY) Thanks, > + else > + uffd = syscall(__NR_userfaultfd, > + O_CLOEXEC | O_NONBLOCK | UFFD_USER_MODE_ONLY); > if (uffd < 0) > - err("userfaultfd syscall not available in this kernel"); > + errexit(KSFT_SKIP, "creating userfaultfd failed"); > uffd_flags = fcntl(uffd, F_GETFD, NULL); > > uffdio_api.api = UFFD_API; > @@ -1691,6 +1714,12 @@ int main(int argc, char **argv) > } > printf("nr_pages: %lu, nr_pages_per_cpu: %lu\n", > nr_pages, nr_pages_per_cpu); > + > + test_dev_userfaultfd = false; > + if (userfaultfd_stress()) > + return 1; > + > + test_dev_userfaultfd = true; > return userfaultfd_stress(); > } > > -- > 2.36.1.255.ge46751e96f-goog > -- Peter Xu