occlum/test/mmap/main.c

1704 lines
55 KiB
C

#define _GNU_SOURCE
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/mman.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <assert.h>
#include <string.h>
#include <fcntl.h>
#include <sys/syscall.h>
#include <pthread.h>
#include "test_fs.h"
// ============================================================================
// Helper macros
// ============================================================================
#define KB (1024UL)
#define MB (1024 * 1024UL)
#define PAGE_SIZE (4 * KB)
#define ALIGN_DOWN(x, a) ((x) & ~(a-1)) // a must be a power of two
#define ALIGN_UP(x, a) ALIGN_DOWN((x+(a-1)), (a))
#define MAX_MMAP_USED_MEMORY (4 * MB)
#define DEFAULT_CHUNK_SIZE (32 * MB) // This is the default chunk size used in Occlum kernel.
// ============================================================================
// Helper functions
// ============================================================================
static void *get_a_stack_ptr() {
volatile int a = 0;
return (void *) &a;
}
// ============================================================================
// Test suite initialization
// ============================================================================
// Get a valid range of address hints for mmap
static int get_a_valid_range_of_hints(size_t *hint_begin, size_t *hint_end) {
size_t big_buf_len = MAX_MMAP_USED_MEMORY;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *big_buf = mmap(NULL, big_buf_len, prot, flags, -1, 0);
if (big_buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
// Check if munmap will clean the range
memset(big_buf, 0xff, big_buf_len);
int ret = munmap(big_buf, big_buf_len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
*hint_begin = (size_t)big_buf;
*hint_end = *hint_begin + big_buf_len;
return 0;
}
static int create_random_file(char *path, size_t size) {
FILE *myFile = fopen(path, "w");
FILE *urandom = fopen("/dev/urandom", "r");
const size_t unit_size = 256 * 1024;
size_t write_len = 0;
char *tmp = calloc(1, unit_size);
while (write_len < size) {
int write_once_len = unit_size;
if (size - write_len < unit_size) {
write_once_len = size - write_len;
}
size_t ret = fread(tmp, 1, write_once_len, urandom);
fwrite(tmp, 1, ret, myFile);
write_len += write_once_len;
}
fclose(myFile);
fclose(urandom);
return 0;
}
static size_t HINT_BEGIN, HINT_END;
int test_suite_init() {
if (get_a_valid_range_of_hints(&HINT_BEGIN, &HINT_END) < 0) {
THROW_ERROR("get_a_valid_range_of_hints failed");
}
return 0;
}
// ============================================================================
// Test cases for anonymous mmap
// ============================================================================
int test_anonymous_mmap() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
for (size_t len = PAGE_SIZE; len <= MAX_MMAP_USED_MEMORY; len *= 2) {
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
if (check_bytes_in_buf(buf, len, 0) < 0) {
THROW_ERROR("the buffer is not initialized to zeros");
}
int ret = munmap(buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_anonymous_mmap_randomly() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *bufs[16] = {NULL};
size_t lens[16];
size_t num_bufs = 0;
size_t used_memory = 0;
for (int i = 0; i < 5; i++) {
// Phrase 1: do mmap with random sizes until no more buffers or memory
for (num_bufs = 0;
num_bufs < ARRAY_SIZE(bufs) && used_memory < MAX_MMAP_USED_MEMORY;
num_bufs++) {
// Choose the mmap size randomly
size_t len = rand() % (MAX_MMAP_USED_MEMORY - used_memory) + 1;
len = ALIGN_UP(len, PAGE_SIZE);
// Do mmap
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
bufs[num_bufs] = buf;
lens[num_bufs] = len;
// Update memory usage
used_memory += len;
}
// Phrase 2: do munmap to free all memory mapped memory
for (int bi = 0; bi < num_bufs; bi++) {
void *buf = bufs[bi];
size_t len = lens[bi];
int ret = munmap(buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
bufs[bi] = NULL;
lens[bi] = 0;
}
num_bufs = 0;
used_memory = 0;
}
return 0;
}
int test_anonymous_mmap_randomly_with_good_hints() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
for (int i = 0; i < 10; i++) {
size_t hint = HINT_BEGIN + rand() % (HINT_END - HINT_BEGIN);
hint = ALIGN_DOWN(hint, PAGE_SIZE);
size_t len = rand() % (HINT_END - (size_t)hint);
len = ALIGN_UP(len + 1, PAGE_SIZE);
void *addr = mmap((void *)hint, len, prot, flags, -1, 0);
if (addr != (void *)hint) {
THROW_ERROR("mmap with hint failed");
}
int ret = munmap(addr, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_anonymous_mmap_with_bad_hints() {
size_t bad_hints[] = {
PAGE_SIZE, // too low!
0xffff800000000000UL, // too high!
ALIGN_DOWN((size_t)get_a_stack_ptr(), PAGE_SIZE), // overlapped with stack!
HINT_BEGIN + 123, // within the valid range, not page aligned!
};
int len = PAGE_SIZE;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
for (int hi = 0; hi < ARRAY_SIZE(bad_hints); hi++) {
void *bad_hint = (void *)bad_hints[hi];
void *addr = mmap(bad_hint, len, prot, flags, -1, 0);
if (addr == MAP_FAILED) {
THROW_ERROR("mmap should have tolerated a bad hint");
}
if (addr == bad_hint) {
THROW_ERROR("mmap should not have accepted a bad hint");
}
int ret = munmap(addr, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_anonymous_mmap_with_zero_len() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
int len = 0; // invalid!
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf != MAP_FAILED) {
THROW_ERROR("mmap with zero len should have been failed");
}
return 0;
}
int test_anonymous_mmap_with_non_page_aligned_len() {
int len = PAGE_SIZE + 17; // length need not to be page aligned!
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap with non-page aligned len should have worked");
}
// Even the length is not page aligned, the page mmaping is done in pages
if (check_bytes_in_buf(buf, ALIGN_UP(len, PAGE_SIZE), 0) < 0) {
THROW_ERROR("the buffer is not initialized to zeros");
}
int ret = munmap(buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
// ============================================================================
// Test cases for file-backed mmap
// ============================================================================
int test_private_file_mmap() {
const char *file_path = "/root/mmap_file.data";
int fd = open(file_path, O_CREAT | O_TRUNC | O_WRONLY, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
int file_len = 12 * KB + 128;
int byte_val = 0xab;
fill_file_with_repeated_bytes(fd, file_len, byte_val);
close(fd);
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE;
fd = open(file_path, O_RDONLY);
if (fd < 0) {
THROW_ERROR("file open failed");
}
off_t offset = 0;
for (size_t len = PAGE_SIZE; len <= file_len; len *= 2) {
char *buf = mmap(NULL, len, prot, flags, fd, offset);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
if (check_bytes_in_buf(buf, len, byte_val) < 0) {
THROW_ERROR("the buffer is not initialized according to the file");
}
int ret = munmap(buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
close(fd);
unlink(file_path);
return 0;
}
int test_private_file_mmap_with_offset() {
const char *file_path = "/root/mmap_file.data";
int fd = open(file_path, O_CREAT | O_TRUNC | O_RDWR, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
size_t first_len = 4 * KB + 47;
int first_val = 0xab;
fill_file_with_repeated_bytes(fd, first_len, first_val);
size_t second_len = 9 * KB - 47;
int second_val = 0xcd;
fill_file_with_repeated_bytes(fd, second_len, second_val);
size_t file_len = first_len + second_len;
off_t offset = 4 * KB;
int len = file_len - offset + 1 * KB;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE;
assert(offset <= first_len);
char *buf = mmap(NULL, len, prot, flags, fd, offset);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
char *buf_cursor = buf;
if (check_bytes_in_buf(buf_cursor, first_len - offset, first_val) < 0) {
THROW_ERROR("the buffer is not initialized according to the file");
}
buf_cursor += first_len - offset;
if (check_bytes_in_buf(buf_cursor, second_len, second_val) < 0) {
THROW_ERROR("the buffer is not initialized according to the file");
}
buf_cursor += second_len;
if (check_bytes_in_buf(buf_cursor, ALIGN_UP(len, PAGE_SIZE) - (buf_cursor - buf),
0) < 0) {
THROW_ERROR("the remaining of the last page occupied by the buffer is not initialized to zeros");
}
int ret = munmap(buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
close(fd);
unlink(file_path);
return 0;
}
int test_private_file_mmap_with_invalid_fd() {
size_t len = PAGE_SIZE;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE;
int fd = 1234; // invalid!
off_t offset = 0;
void *buf = mmap(NULL, len, prot, flags, fd, offset);
if (buf != MAP_FAILED) {
THROW_ERROR("file mmap with an invalid fd should have been failed");
}
return 0;
}
int test_private_file_mmap_with_non_page_aligned_offset() {
const char *file_path = "/root/mmap_file.data";
int fd = open(file_path, O_CREAT | O_TRUNC | O_RDWR, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
int file_len = 12 * KB + 128;
int byte_val = 0xab;
fill_file_with_repeated_bytes(fd, file_len, byte_val);
size_t len = PAGE_SIZE;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
off_t offset = PAGE_SIZE + 127; // Invalid!
void *buf = mmap(NULL, len, prot, flags, fd, offset);
if (buf != MAP_FAILED) {
THROW_ERROR("mmap with non-page aligned len should have been failed");
}
close(fd);
unlink(file_path);
return 0;
}
// TODO: what if offset > file size or offset + len > file size?
typedef int (*flush_file_mmap_func_t)(int /*fd*/, void * /*addr*/, size_t /*size*/);
static int __test_shared_file_mmap_flushing_file(flush_file_mmap_func_t flush_fn) {
// Update a file by writing to its file-backed memory mapping
const char *file_path = "/root/mmap_file.data";
int fd = open(file_path, O_CREAT | O_TRUNC | O_RDWR, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
if (fill_file_with_repeated_bytes(fd, PAGE_SIZE, 0) < 0) {
THROW_ERROR("file init failed");
}
int byte_val = 0xde;
char *write_buf = mmap(NULL, PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (write_buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
for (int i = 0; i < PAGE_SIZE; i++) { write_buf[i] = byte_val; }
int ret = flush_fn(fd, write_buf, PAGE_SIZE);
if (ret < 0) {
THROW_ERROR("fdatasync failed");
}
close(fd);
// Read the file back to see if the updates are durable
fd = open(file_path, O_RDONLY);
if (fd < 0) {
THROW_ERROR("file open failed");
}
if (check_file_with_repeated_bytes(fd, PAGE_SIZE, byte_val) < 0) {
THROW_ERROR("unexpected file content");
}
close(fd);
unlink(file_path);
return 0;
}
static int flush_shared_file_mmap_with_msync(int _fd, void *addr, size_t size) {
return msync(addr, size, MS_SYNC);
}
static int flush_shared_file_mmap_with_munmap(int _fd, void *addr, size_t size) {
return munmap(addr, size);
}
static int flush_shared_file_mmap_with_fdatasync(int fd, void *_addr, size_t _size) {
return fsync(fd);
}
static int flush_shared_file_mmap_with_fsync(int fd, void *_addr, size_t _size) {
return fdatasync(fd);
}
int test_shared_file_mmap_flushing_with_msync(void) {
if (__test_shared_file_mmap_flushing_file(flush_shared_file_mmap_with_msync)) {
THROW_ERROR("unexpected file content");
}
return 0;
}
int test_shared_file_mmap_flushing_with_munmap(void) {
if (__test_shared_file_mmap_flushing_file(flush_shared_file_mmap_with_munmap)) {
THROW_ERROR("unexpected file content");
}
return 0;
}
int test_shared_file_mmap_flushing_with_fdatasync(void) {
if (__test_shared_file_mmap_flushing_file(flush_shared_file_mmap_with_fdatasync)) {
THROW_ERROR("unexpected file content");
}
return 0;
}
int test_shared_file_mmap_flushing_with_fsync(void) {
if (__test_shared_file_mmap_flushing_file(flush_shared_file_mmap_with_fsync)) {
THROW_ERROR("unexpected file content");
}
return 0;
}
// ============================================================================
// Test cases for fixed mmap
// ============================================================================
int test_fixed_mmap_that_does_not_override_any_mmaping() {
size_t hint = HINT_BEGIN + (HINT_END - HINT_BEGIN) / 3;
hint = ALIGN_DOWN(hint, PAGE_SIZE);
size_t len = (HINT_END - HINT_BEGIN) / 3;
len = ALIGN_UP(len, PAGE_SIZE);
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
void *addr = mmap((void *)hint, len, prot, flags, -1, 0);
if (addr != (void *)hint) {
THROW_ERROR("mmap with fixed address failed");
}
int ret = munmap(addr, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_fixed_mmap_that_overrides_existing_mmaping() {
// We're about to allocate two buffers: parent_buf and child_buf.
// The child_buf will override a range of memory that has already
// been allocated to the parent_buf.
size_t parent_len = 10 * PAGE_SIZE;
size_t pre_child_len = 2 * PAGE_SIZE, post_child_len = 3 * PAGE_SIZE;
size_t child_len = parent_len - pre_child_len - post_child_len;
// Allocate parent_buf
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *parent_buf = mmap(NULL, parent_len, prot, flags, -1, 0);
if (parent_buf == MAP_FAILED) {
THROW_ERROR("mmap for parent failed");
}
int parent_val = 0xab;
memset(parent_buf, parent_val, parent_len);
// Allocate child_buf
void *child_buf = (char *)parent_buf + pre_child_len;
if (mmap(child_buf, child_len, prot, flags | MAP_FIXED, -1, 0) != child_buf) {
THROW_ERROR("mmap with fixed address failed");
}
// Check that child_buf, which overrides parent_buf, is initialized to zeros
if (check_bytes_in_buf(child_buf, child_len, 0) < 0) {
THROW_ERROR("the content of child mmap memory is not initialized");
}
// Check that the rest of parent_buf are kept intact
if (check_bytes_in_buf((char *)child_buf - pre_child_len,
pre_child_len, parent_val) < 0 ||
check_bytes_in_buf((char *)child_buf + child_len,
post_child_len, parent_val) < 0) {
THROW_ERROR("the content of parent mmap memory is broken");
}
// Deallocate parent_buf along with child_buf
int ret = munmap(parent_buf, parent_len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_fixed_mmap_with_non_page_aligned_addr() {
size_t hint = HINT_BEGIN + 123; // Not aligned!
size_t len = 1 * PAGE_SIZE;
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
void *addr = mmap((void *)hint, len, prot, flags, -1, 0);
if (addr != MAP_FAILED) {
THROW_ERROR("fixed mmap with non-page aligned hint should have failed");
}
return 0;
}
int test_fixed_mmap_spans_over_two_chunks() {
size_t hint = HINT_BEGIN + (HINT_END - HINT_BEGIN) / 3;
hint = ALIGN_DOWN(hint, PAGE_SIZE);
size_t len = (HINT_END - HINT_BEGIN) / 3 + 1;
len = ALIGN_UP(len, PAGE_SIZE);
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
// Firstly, allocate memory at the default chunk
void *addr = mmap((void *)hint, len, prot, flags, -1, 0);
if ((size_t)addr != hint) {
THROW_ERROR("fixed mmap with good hint failed");
}
// Second, allocate single-vma chunk after the default chunk
hint = HINT_BEGIN + 36 * MB;
len = 2 * MB;
addr = mmap((void *)hint, len, prot, flags, -1, 0);
if ((size_t)addr != hint) {
THROW_ERROR("fixed mmap with good hint failed");
}
// Last, force allocate memory spans over these two chunks
hint = HINT_BEGIN + 30 * MB;
len = 16 * MB;
addr = mmap((void *)hint, len, prot, flags, -1, 0);
if ((size_t)addr != hint) {
THROW_ERROR("fixed mmap spans over two chunks failed");
}
// Free all potential allocated memory
size_t overall_len = (HINT_END - HINT_BEGIN) + (30 + 16) * MB;
if (munmap((void *)HINT_BEGIN, overall_len) < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
// ============================================================================
// Test cases for munmap
// ============================================================================
static int check_buf_is_munmapped(void *target_addr, size_t len) {
// The trivial case of zero-len meory region is considered as unmapped
if (len == 0) { return 0; }
// If the target_addr is not already mmaped, it should succeed to use it as
// a hint for mmap.
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *real_addr = mmap(target_addr, len, prot, flags, -1, 0);
if (real_addr != target_addr) {
THROW_ERROR("address is already mmaped");
}
munmap(target_addr, len);
return 0;
}
static int mmap_then_munmap(size_t mmap_len, ssize_t munmap_offset, size_t munmap_len) {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
// Make sure that we are manipulating memory between [HINT_BEGIN, HINT_END)
void *mmap_addr = (void *)(munmap_offset >= 0 ? HINT_BEGIN : HINT_BEGIN - munmap_offset);
if (mmap(mmap_addr, mmap_len, prot, flags, -1, 0) != mmap_addr) {
THROW_ERROR("mmap failed");
}
void *munmap_addr = (char *)mmap_addr + munmap_offset;
if (munmap(munmap_addr, munmap_len) < 0) {
THROW_ERROR("munmap failed");
}
if (check_buf_is_munmapped(munmap_addr, munmap_len) < 0) {
THROW_ERROR("munmap does not really free the memory");
}
// Make sure that when this function returns, there are no memory mappings
// within [HINT_BEGIN, HINT_END)
if (munmap((void *)HINT_BEGIN, HINT_END - HINT_BEGIN) < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_munmap_whose_range_is_a_subset_of_a_mmap_region() {
size_t mmap_len = 4 * PAGE_SIZE;
ssize_t munmap_offset = 1 * PAGE_SIZE;
size_t munmap_len = 2 * PAGE_SIZE;
if (mmap_then_munmap(mmap_len, munmap_offset, munmap_len) < 0) {
THROW_ERROR("first mmap and then munmap failed");
}
return 0;
}
int test_munmap_whose_range_is_a_superset_of_a_mmap_region() {
size_t mmap_len = 4 * PAGE_SIZE;
ssize_t munmap_offset = -2 * PAGE_SIZE;
size_t munmap_len = 7 * PAGE_SIZE;
if (mmap_then_munmap(mmap_len, munmap_offset, munmap_len) < 0) {
THROW_ERROR("first mmap and then munmap failed");
}
return 0;
}
int test_munmap_whose_range_intersects_with_a_mmap_region() {
size_t mmap_len = 200 * PAGE_SIZE;
size_t munmap_offset = 100 * PAGE_SIZE + 10 * PAGE_SIZE;
size_t munmap_len = 4 * PAGE_SIZE;
if (mmap_then_munmap(mmap_len, munmap_offset, munmap_len) < 0) {
THROW_ERROR("first mmap and then munmap failed");
}
return 0;
}
int test_munmap_whose_range_intersects_with_no_mmap_regions() {
size_t mmap_len = 1 * PAGE_SIZE;
size_t munmap_offset = 1 * PAGE_SIZE;
size_t munmap_len = 1 * PAGE_SIZE;
if (mmap_then_munmap(mmap_len, munmap_offset, munmap_len) < 0) {
THROW_ERROR("first mmap and then munmap failed");
}
return 0;
}
int test_munmap_whose_range_intersects_with_multiple_mmap_regions() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
size_t mmap_len1 = 100 * PAGE_SIZE;
void *mmap_addr1 = mmap(NULL, mmap_len1, prot, flags, -1, 0);
if (mmap_addr1 == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
size_t mmap_len2 = 12 * PAGE_SIZE;
void *mmap_addr2 = mmap(NULL, mmap_len2, prot, flags, -1, 0);
if (mmap_addr2 == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
size_t mmap_min = MIN((size_t)mmap_addr1, (size_t)mmap_addr2);
size_t mmap_max = MAX((size_t)mmap_addr1 + mmap_len1,
(size_t)mmap_addr2 + mmap_len2);
void *munmap_addr = (void *)mmap_min;
size_t munmap_len = mmap_max - mmap_min;
if (munmap(munmap_addr, munmap_len) < 0) {
THROW_ERROR("munmap failed");
}
if (check_buf_is_munmapped(munmap_addr, munmap_len) < 0) {
THROW_ERROR("munmap does not really free the memory");
}
return 0;
}
static void *child_routine(void *_arg) {
size_t len = 1 * MB;
void *old_addr = _arg;
void *new_addr = old_addr + 3 * len;
void *addr = mremap(old_addr, len, 2 * len, MREMAP_MAYMOVE | MREMAP_FIXED,
new_addr);
if (addr != new_addr) {
printf("mremap fail in client routine\n");
return (void *) -1;
}
int ret = munmap(addr, 2 * len);
if (ret < 0) {
printf("munmap failed");
return (void *) -1;
}
return NULL;
}
int test_mremap_concurrent() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
size_t len = 1 * MB;
void *child_ret;
// Allocate continuous single vma chunks at the end of the default chunk
size_t hint_1 = HINT_BEGIN + DEFAULT_CHUNK_SIZE;
void *addr = mmap((void *)hint_1, len, prot, flags, -1, 0);
if ((size_t)addr != hint_1) {
THROW_ERROR("fixed mmap with good hint failed");
}
size_t hint_2 = hint_1 + len;
addr = mmap((void *)hint_2, len, prot, flags, -1, 0);
if ((size_t)addr != hint_2) {
THROW_ERROR("fixed mmap spans over two chunks failed");
}
// create a child thread to mremap chunk from hint_2 to address after the chunk which starts with hint_3
pthread_t child_thread = 0;
int ret = pthread_create(&child_thread, NULL, child_routine, (void *)hint_2);
if (ret < 0) {
THROW_ERROR("pthread create failed");
}
// mremap chunk from hint_1 to hint_3
size_t hint_3 = hint_2 + len;
void *ret_addr = mremap((void *)hint_1, len, len * 2, MREMAP_MAYMOVE | MREMAP_FIXED,
(void *)hint_3);
if (ret_addr != (void *)hint_3) {
THROW_ERROR("mremap failed");
}
ret = pthread_join(child_thread, &child_ret);
if (ret < 0 || child_ret != NULL) {
THROW_ERROR("pthread_join failed");
}
if (munmap((void *)hint_3, len * 2) < 0) {
THROW_ERROR("munmap failed");
}
if (check_buf_is_munmapped((void *)hint_1, len * 5) < 0) {
THROW_ERROR("munmap does not really free the memory");
}
return 0;
}
int test_munmap_whose_range_intersects_with_several_chunks() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED;
size_t len = 1 * MB;
// Allocate three continuous single vma chunks at the end of the default chunk
size_t hint_1 = HINT_BEGIN + DEFAULT_CHUNK_SIZE;
void *addr = mmap((void *)hint_1, len, prot, flags, -1, 0);
if ((size_t)addr != hint_1) {
THROW_ERROR("fixed mmap with good hint failed");
}
size_t hint_2 = hint_1 + len;
addr = mmap((void *)hint_2, len, prot, flags, -1, 0);
if ((size_t)addr != hint_2) {
THROW_ERROR("fixed mmap spans over two chunks failed");
}
size_t hint_3 = hint_2 + len;
addr = mmap((void *)hint_3, len, prot, flags, -1, 0);
if ((size_t)addr != hint_3) {
THROW_ERROR("fixed mmap spans over two chunks failed");
}
// Munmap the range spans above three ranges
size_t munmap_start = hint_1 + len / 2;
size_t munmap_end = hint_3 + len / 2;
if (munmap((void *)munmap_start, munmap_end - munmap_start) < 0) {
THROW_ERROR("munmap failed");
}
if (check_buf_is_munmapped((void *)munmap_start, munmap_end - munmap_start) < 0) {
THROW_ERROR("munmap does not really free the memory");
}
if (munmap((void *)hint_1, 3 * len) < 0) {
THROW_ERROR("munmap remaining ranges failed");
}
return 0;
}
int test_munmap_with_null_addr() {
// Set the address for munmap to NULL!
//
// The man page of munmap states that "it is not an error if the indicated
// range does not contain any mapped pages". This is not considered as
// an error!
void *munmap_addr = NULL;
size_t munmap_len = PAGE_SIZE;
if (munmap(munmap_addr, munmap_len) < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_munmap_with_zero_len() {
void *munmap_addr = (void *)HINT_BEGIN;
// Set the length for munmap to 0! This is invalid!
size_t munmap_len = 0;
if (munmap(munmap_addr, munmap_len) == 0) {
THROW_ERROR("munmap with zero length should have failed");
}
return 0;
}
int test_munmap_with_non_page_aligned_len() {
size_t mmap_len = 2 * PAGE_SIZE;
size_t munmap_offset = 0;
// Set the length for munmap to a non-page aligned value!
//
// The man page of munmap states that "the address addr must be a
// multiple of the page size (but length need not be). All pages
// containing a part of the indicated range are unmapped". So this is
// not considered as an error!
size_t munmap_len = 1 * PAGE_SIZE + 123;
if (mmap_then_munmap(mmap_len, munmap_offset, munmap_len) < 0) {
THROW_ERROR("first mmap and then munmap failed");
}
return 0;
}
// ============================================================================
// Test cases for mremap
// ============================================================================
int test_mremap() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
for (size_t len = PAGE_SIZE; len < MAX_MMAP_USED_MEMORY; len *= 2) {
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
if (check_bytes_in_buf(buf, len, 0) < 0) {
THROW_ERROR("the buffer is not initialized to zeros");
}
void *expand_buf = mremap(buf, len, 2 * len, MREMAP_MAYMOVE);
if (expand_buf == MAP_FAILED) {
THROW_ERROR("mremap with big size failed");
}
if (check_bytes_in_buf(expand_buf, len, 0) < 0) {
THROW_ERROR("the old part of expand buffer is not zero");
}
memset(expand_buf, 'a', len * 2);
void *shrink_buf = mremap(expand_buf, 2 * len, len, 0);
if (shrink_buf == MAP_FAILED) {
THROW_ERROR("mmap with small size failed");
}
if (check_bytes_in_buf(shrink_buf, len, 'a') < 0) {
THROW_ERROR("the shrink buffer is not correct");
}
int ret = munmap(shrink_buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_mremap_subrange() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
size_t len = PAGE_SIZE * 4;
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
if (check_bytes_in_buf(buf, len, 0) < 0) {
THROW_ERROR("the buffer is not initialized to zeros");
}
/* remap a subrange in the buffer */
void *new_part_buf = mremap(buf + len / 4, len / 4, len, MREMAP_MAYMOVE);
if (new_part_buf == MAP_FAILED) {
THROW_ERROR("mremap with subrange failed");
}
if (check_bytes_in_buf(new_part_buf, len / 4, 0) < 0) {
THROW_ERROR("the old part of buffer is not zero");
}
void *rear_buf = buf + len / 2;
/* now the length of rear buffer is (len / 2), remap the second part */
void *new_part_rear_buf = mremap(rear_buf + len / 4, len / 4, len, MREMAP_MAYMOVE);
if (new_part_rear_buf == MAP_FAILED) {
THROW_ERROR("mremap with rear subrange failed");
}
if (check_bytes_in_buf(new_part_rear_buf, len / 4, 0) < 0) {
THROW_ERROR("the old part of rear buffer is not zero");
}
int ret = munmap(buf, len / 4) || munmap(new_part_buf, len) ||
munmap(rear_buf, len / 4) || munmap(new_part_rear_buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
// FIXME: may cause segfault on Linux
int test_mremap_with_fixed_addr() {
int prot = PROT_READ | PROT_WRITE;
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
size_t len = PAGE_SIZE * 2;
void *buf = mmap(NULL, len, prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
if (check_bytes_in_buf(buf, len, 0) < 0) {
THROW_ERROR("the buffer is not initialized to zeros");
}
void *new_addr = buf + len * 2;
void *new_buf = mremap(buf, len, len, MREMAP_FIXED, new_addr);
if (new_buf != MAP_FAILED || errno != EINVAL) {
THROW_ERROR("check mremap with invalid flags failed");
}
new_buf = mremap(buf, len, len, MREMAP_FIXED | MREMAP_MAYMOVE, buf);
if (new_buf != MAP_FAILED || errno != EINVAL) {
THROW_ERROR("check mremap with overlap addr failed");
}
new_buf = mremap(buf, len, len, MREMAP_FIXED | MREMAP_MAYMOVE, new_addr);
if (new_buf == MAP_FAILED) {
THROW_ERROR("mmap with a fixed address failed");
}
if (check_bytes_in_buf(new_buf, len, 0) < 0) {
THROW_ERROR("the new buffer is not zero");
}
int ret = munmap(new_buf, len);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
// ============================================================================
// Test cases for mprotect
// ============================================================================
int test_mprotect_once() {
// The memory permissions initially looks like below:
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Memory perms: [ ][ ][ ][ ]
size_t total_len = 4; // in pages
int init_prot = PROT_NONE;
// The four settings for mprotect and its resulting memory perms.
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Setting (i = 0):
// mprotect: [RW ][RW ][RW ][RW ]
// result: [RW ][RW ][RW ][RW ]
// Setting (i = 1):
// mprotect: [RW ]
// result: [RW ][ ][ ][ ]
// Setting (i = 2):
// mprotect: [RW ][RW ]
// result: [ ][ ][RW ][RW ]
// Setting (i = 3):
// mprotect: [RW ][RW ]
// result: [ ][RW ][RW ][ ]
size_t lens[] = { 4, 1, 2, 2}; // in pages
size_t offsets[] = { 0, 0, 2, 1}; // in pages
for (int i = 0; i < ARRAY_SIZE(lens); i++) {
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, total_len * PAGE_SIZE, init_prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
size_t len = lens[i] * PAGE_SIZE;
size_t offset = offsets[i] * PAGE_SIZE;
int prot = PROT_READ | PROT_WRITE;
void *tmp_buf = (char *)buf + offset;
int ret = mprotect(tmp_buf, len, prot);
if (ret < 0) {
THROW_ERROR("mprotect failed");
}
ret = munmap(buf, total_len * PAGE_SIZE);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_mprotect_twice() {
// The memory permissions initially looks like below:
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Memory perms: [ ][ ][ ][ ]
size_t total_len = 4; // in pages
int init_prot = PROT_NONE;
// The four settings for mprotects and their results
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Setting (i = 0):
// mprotect (j = 0): [RW ][RW ]
// mprotect (j = 1): [RW ][RW ]
// result: [RW ][RW ][RW ][RW ]
// Setting (i = 1):
// mprotect (j = 0): [RW ]
// mprotect (j = 1): [RW ]
// result: [ ][RW ][ ][RW ]
// Setting (i = 2):
// mprotect (j = 0): [RW ][RW ]
// mprotect (j = 1): [ WX][ WX]
// result: [ ][ WX][ WX][ ]
// Setting (i = 3):
// mprotect (j = 0): [RW ][RW ]
// mprotect (j = 1): [ ]
// result: [ ][ ][RW ][ ]
size_t lens[][2] = {
{ 2, 2 },
{ 1, 1 },
{ 2, 2 },
{ 2, 1 }
}; // in pages
size_t offsets[][2] = {
{ 0, 2 },
{ 1, 3 },
{ 1, 1 },
{ 1, 1 }
}; // in pages
int prots[][2] = {
{ PROT_READ | PROT_WRITE, PROT_READ | PROT_WRITE },
{ PROT_READ | PROT_WRITE, PROT_READ | PROT_WRITE },
{ PROT_READ | PROT_WRITE, PROT_WRITE | PROT_EXEC },
{ PROT_READ | PROT_WRITE, PROT_NONE }
};
for (int i = 0; i < ARRAY_SIZE(lens); i++) {
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, total_len * PAGE_SIZE, init_prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
for (int j = 0; j < 2; j++) {
size_t len = lens[i][j] * PAGE_SIZE;
size_t offset = offsets[i][j] * PAGE_SIZE;
int prot = prots[i][j];
void *tmp_buf = (char *)buf + offset;
int ret = mprotect(tmp_buf, len, prot);
if (ret < 0) {
THROW_ERROR("mprotect failed");
}
}
int ret = munmap(buf, total_len * PAGE_SIZE);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_mprotect_triple() {
// The memory permissions initially looks like below:
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Memory perms: [RWX][RWX][RWX][RWX]
size_t total_len = 4; // in pages
int init_prot = PROT_READ | PROT_WRITE | PROT_EXEC;
// The four settings for mprotects and their results
//
// Pages: #0 #1 #2 #3
// -------------------------------------
// Setting (i = 0):
// mprotect (j = 0): [ ][ ]
// mprotect (j = 1): [ ]
// mprotect (j = 2): [ ]
// result: [ ][ ][ ][ ]
size_t lens[][3] = {
{ 2, 1, 1 },
}; // in pages
size_t offsets[][3] = {
{ 0, 3, 2 },
}; // in pages
int prots[][3] = {
{ PROT_NONE, PROT_NONE, PROT_NONE },
};
for (int i = 0; i < ARRAY_SIZE(lens); i++) {
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, total_len * PAGE_SIZE, init_prot, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
for (int j = 0; j < 3; j++) {
size_t len = lens[i][j] * PAGE_SIZE;
size_t offset = offsets[i][j] * PAGE_SIZE;
int prot = prots[i][j];
void *tmp_buf = (char *)buf + offset;
int ret = mprotect(tmp_buf, len, prot);
if (ret < 0) {
THROW_ERROR("mprotect failed");
}
}
int ret = munmap(buf, total_len * PAGE_SIZE);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
}
return 0;
}
int test_mprotect_with_zero_len() {
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, PAGE_SIZE, PROT_NONE, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
int ret = mprotect(buf, 0, PROT_NONE);
if (ret < 0) {
THROW_ERROR("mprotect failed");
}
ret = munmap(buf, PAGE_SIZE);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_mprotect_with_invalid_addr() {
int ret = mprotect(NULL, PAGE_SIZE, PROT_NONE);
if (ret == 0 || errno != ENOMEM) {
THROW_ERROR("using invalid addr should have failed");
}
return 0;
}
int test_mprotect_with_invalid_prot() {
int invalid_prot = 0x1234; // invalid protection bits
void *valid_addr = &invalid_prot;
size_t valid_len = PAGE_SIZE;
int ret = mprotect(valid_addr, valid_len, invalid_prot);
if (ret == 0 || errno != EINVAL) {
THROW_ERROR("using invalid addr should have failed");
}
return 0;
}
int test_mprotect_with_non_page_aligned_size() {
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf = mmap(NULL, PAGE_SIZE * 2, PROT_NONE, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
// Use raw syscall interface becase libc wrapper will handle non-page-aligned address
// and will not cause failure.
// Raw mprotect syscall with non-page-aligned address should fail.
int ret = syscall(SYS_mprotect, buf + 10, PAGE_SIZE, PROT_WRITE);
if (ret == 0 || errno != EINVAL) {
THROW_ERROR("mprotect with non-page-aligned address should fail with EINVAL");
}
// According to man page of mprotect, this syscall require a page aligned start address, but the size could be any value.
// Raw mprotect syscall with non-page-aligned size should succeed.
ret = syscall(SYS_mprotect, buf, PAGE_SIZE + 100, PROT_WRITE);
if (ret < 0) {
THROW_ERROR("mprotect with non-page-aligned size failed");
}
// Mprotect succeeded and the pages are writable.
*(char *)buf = 1;
*(char *)(buf + PAGE_SIZE) = 1;
ret = munmap(buf, PAGE_SIZE * 2);
if (ret < 0) {
THROW_ERROR("munmap failed");
}
return 0;
}
int test_mprotect_multiple_vmas() {
// Create multiple VMA with PROT_NONE
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
void *buf_a = mmap((void *)HINT_BEGIN, PAGE_SIZE * 2, PROT_NONE, flags, -1, 0);
if (buf_a == MAP_FAILED || buf_a != (void *)HINT_BEGIN) {
THROW_ERROR("mmap failed");
}
void *buf_b = mmap((void *)(HINT_BEGIN + 2 * PAGE_SIZE), PAGE_SIZE, PROT_NONE, flags, -1,
0);
if (buf_b == MAP_FAILED || buf_b != (void *)(HINT_BEGIN + 2 * PAGE_SIZE)) {
THROW_ERROR("mmap failed");
}
void *buf_c = mmap((void *)(HINT_BEGIN + 3 * PAGE_SIZE), PAGE_SIZE * 2, PROT_NONE, flags,
-1, 0);
if (buf_c == MAP_FAILED || buf_c != (void *)(HINT_BEGIN + 3 * PAGE_SIZE)) {
THROW_ERROR("mmap failed");
}
// Set a part of the ranges to read-write
int ret = mprotect(buf_a + PAGE_SIZE, 3 * PAGE_SIZE, PROT_READ | PROT_WRITE);
if (ret < 0) {
THROW_ERROR("mprotect multiple vmas failed");
}
// Check if these ranges are writable
*(char *)(buf_a + PAGE_SIZE) = 1;
*(char *)(buf_b) = 1;
*(char *)(buf_c) = 1;
ret = munmap(buf_a, PAGE_SIZE * 5);
if (ret < 0) {
THROW_ERROR("munmap multiple vmas failed");
}
return 0;
}
int test_mprotect_grow_down() {
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_GROWSDOWN;
void *buf = mmap(0, PAGE_SIZE * 2, PROT_NONE, flags, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
// Mprotect can use PROT_GROWSDOWN on a stack segment or a segment mapped with the MAP_GROWSDOWN flag set
int ret = mprotect(buf, 2 * PAGE_SIZE,
PROT_READ | PROT_WRITE | PROT_EXEC | PROT_GROWSDOWN);
if (ret < 0) {
THROW_ERROR("mprotect failed");
}
return 0;
}
int check_file_first_four_page(char *file_path, int first_page_val, int secend_page_val,
int third_page_val, int fourth_page_val) {
int fd = open(file_path, O_RDONLY);
if (fd < 0) {
THROW_ERROR("file open failed");
}
if (check_file_with_repeated_bytes(fd, PAGE_SIZE, first_page_val) < 0) {
THROW_ERROR("unexpected file content");
}
if (check_file_with_repeated_bytes(fd, PAGE_SIZE, secend_page_val) < 0) {
THROW_ERROR("unexpected file content");
}
if (check_file_with_repeated_bytes(fd, PAGE_SIZE, third_page_val) < 0) {
THROW_ERROR("unexpected file content\n");
}
if (check_file_with_repeated_bytes(fd, PAGE_SIZE, fourth_page_val) < 0) {
THROW_ERROR("unexpectbed file content");
}
close(fd);
return 0;
}
typedef int (* test_file_backed_mremap_fn_t) (void *, size_t, void **);
static int byte_val_0 = 0xff;
static int byte_val_1 = 0xab;
static int byte_val_2 = 0xcd;
static int byte_val_3 = 0xef;
int file_backed_mremap_simple(void *buf, size_t len, void **new_buf) {
void *expand_buf = mremap(buf, len, 2 * len, 0);
if (expand_buf == MAP_FAILED) {
THROW_ERROR("mremap with big size failed");
}
// Check the value assigned before
if (check_bytes_in_buf(expand_buf, len, byte_val_1) != 0 ) {
THROW_ERROR("check expand_buf error");
};
// Check the value of second page which should be mapped from file
if (check_bytes_in_buf(expand_buf + len, len, byte_val_0) != 0 ) {
THROW_ERROR("check expand_buf error");
};
// Assign new value to the second page
for (int i = len; i < len * 2; i++) { ((char *)expand_buf)[i] = byte_val_2; }
expand_buf = mremap(expand_buf, len * 2, 4 * len, 0);
if (expand_buf == MAP_FAILED) {
THROW_ERROR("mremap with bigger size failed");
}
// Third and fourth page are not assigned any new value, so should still be 0.
if (check_bytes_in_buf((void *)(expand_buf + len * 2), len * 2, 0) != 0) {
THROW_ERROR("check buf content error");
};
// Assign new value to the fourth page
for (int i = len * 3; i < len * 4; i++) { ((char *)expand_buf)[i] = byte_val_3; }
*new_buf = expand_buf;
return 0;
}
int file_backed_mremap_mem_may_move(void *buf, size_t len, void **new_buf) {
int prot = PROT_READ | PROT_WRITE;
// Allocate a gap buffer to make sure mremap buf must move to a new range
unsigned long gap_buf = (unsigned long) buf + len;
assert(gap_buf % PAGE_SIZE == 0);
void *ret = mmap((void *)gap_buf, PAGE_SIZE, prot,
MAP_ANONYMOUS | MAP_PRIVATE | MAP_FIXED, 0, 0);
if ((unsigned long)ret != gap_buf) {
THROW_ERROR("mmap gap_buf with prefered address failed");
}
void *expand_buf = mremap(buf, len, 2 * len, MREMAP_MAYMOVE);
if (expand_buf == MAP_FAILED) {
THROW_ERROR("mremap with big size failed");
}
// Check the value assigned before
if (check_bytes_in_buf(expand_buf, len, byte_val_1) != 0 ) {
THROW_ERROR("check expand_buf error");
};
// Check the value of second page which should be mapped from file
if (check_bytes_in_buf(expand_buf + len, len, byte_val_0) != 0 ) {
THROW_ERROR("check expand_buf error");
};
// Assign new value to the second page
for (int i = len; i < len * 2; i++) { ((char *)expand_buf)[i] = byte_val_2; }
// Mremap to a new fixed address
unsigned long fixed_addr = (unsigned long) expand_buf + 2 * len;
ret = mremap(expand_buf, len * 2, 4 * len, MREMAP_FIXED | MREMAP_MAYMOVE,
(void *)fixed_addr);
if ((unsigned long)ret != fixed_addr) {
THROW_ERROR("mremap with fixed address and more big size failed");
}
// Third and fourth page are not assigned any new value, so should still be 0.
if (check_bytes_in_buf((void *)(fixed_addr + len * 2), len * 2, 0) != 0) {
THROW_ERROR("check buf content error");
};
// Assign new value to the fourth page
for (int i = len * 3; i < len * 4; i++) { ((char *)fixed_addr)[i] = byte_val_3; }
int rc = munmap((void *)gap_buf, PAGE_SIZE);
if (rc < 0) {
THROW_ERROR("munmap gap_buf failed");
}
*new_buf = (void *)fixed_addr;
return 0;
}
int _test_file_backed_mremap(test_file_backed_mremap_fn_t fn) {
int prot = PROT_READ | PROT_WRITE;
size_t len = PAGE_SIZE;
char *file_path = "/tmp/test";
// O_TRUNC is not supported by Occlum yet.
remove(file_path);
int fd = open(file_path, O_RDWR | O_CREAT | O_NOFOLLOW | O_CLOEXEC | O_TRUNC, 0600);
if (fd < 0) {
THROW_ERROR("open file error");
}
fallocate(fd, 0, 0, len * 4);
fill_file_with_repeated_bytes(fd, len * 2, byte_val_0);
void *buf = mmap(0, len, prot, MAP_SHARED, fd, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
for (int i = 0; i < len; i++) { ((char *)buf)[i] = byte_val_1; }
void *expand_buf = 0;
int ret = fn(buf, len, &expand_buf);
if (ret != 0) {
THROW_ERROR("mremap test failed");
}
int rc = msync((void *)expand_buf, 4 * len, MS_SYNC);
if (rc < 0) {
THROW_ERROR("msync failed");
}
rc = munmap((void *)expand_buf, 4 * len);
if (rc < 0) {
THROW_ERROR("munmap failed");
}
close(fd);
return check_file_first_four_page(file_path, byte_val_1, byte_val_2, 0, byte_val_3);;
}
int test_file_backed_mremap() {
return _test_file_backed_mremap(file_backed_mremap_simple);
}
int test_file_backed_mremap_mem_may_move() {
return _test_file_backed_mremap(file_backed_mremap_mem_may_move);
}
int test_random_mmap_file() {
char *test_buf = calloc(1, 1024);
char *file_path = "/root/myfile";
const size_t file_len = 4 * 1024 * 1024; //4M
create_random_file(file_path, file_len);
int fd = open(file_path, O_RDWR, 0600);
if (fd < 0) {
THROW_ERROR("open file error");
}
int ret = pread(fd, test_buf, 1024, PAGE_SIZE * 4);
if (ret != 1024) {
THROW_ERROR("read failed");
}
// Allocate in the new chunk. So that the access can trigger PF.
size_t desired_addr = HINT_BEGIN + DEFAULT_CHUNK_SIZE;
char *file = mmap((void *)desired_addr, file_len, PROT_READ, MAP_PRIVATE, fd, 0);
if ((size_t)file != desired_addr) {
THROW_ERROR("mmap with desired addr failed");
}
int offset = 1 * PAGE_SIZE;
void *addr = mmap((void *)(file + offset), 4096, PROT_READ | PROT_EXEC,
MAP_PRIVATE | MAP_FIXED, fd, offset);
if (addr != file + offset) {
THROW_ERROR("mmap with desired addr failed");
}
offset = 2 * PAGE_SIZE;
addr = mmap(file + offset, 8192, PROT_READ, MAP_FIXED | MAP_PRIVATE, fd, offset);
if (addr != file + offset) {
THROW_ERROR("mmap with desired addr failed");
}
offset = 4 * PAGE_SIZE;
addr = mmap(file + offset, 8192 * 2, PROT_READ | PROT_WRITE, MAP_FIXED | MAP_PRIVATE, fd,
offset);
if (addr != file + offset) {
THROW_ERROR("mmap with desired addr failed");
}
if (memcmp(test_buf + 512, addr + 512, 512) != 0 ) {
THROW_ERROR("content mismatch");
}
return 0;
}
int test_user_space_pf_trigger() {
size_t total_len = 4 * PAGE_SIZE;
size_t magic_length = 100 * MB; // Used to find a uncommitted memory
int init_prot = PROT_READ | PROT_EXEC;
void *buf = mmap((void *)(HINT_END + magic_length), total_len, init_prot,
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
// Trigger PF by read
char test = ((char *)buf)[0];
if (test != 0) {
THROW_ERROR("check test valure failed");
}
return 0;
}
int test_kernel_space_pf_trigger() {
size_t total_len = 4 * PAGE_SIZE;
size_t magic_length = 200 * MB; // Used to find a uncommitted memory
int init_prot = PROT_READ | PROT_WRITE;
void *buf = mmap((void *)(HINT_END + magic_length), total_len, init_prot,
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
char *file_path = "/root/test-file";
const size_t file_len = total_len * 2;
create_random_file(file_path, file_len);
int fd = open(file_path, O_RDWR, 0600);
if (fd < 0) {
THROW_ERROR("open file error");
}
// Read to uncommitted memory will trigger #PF and handled by the kernel
int ret = pread(fd, buf, total_len, 1024);
if (ret != total_len) {
THROW_ERROR("read failed");
}
return 0;
}
int test_shared_file_mmap_small_file() {
int fd;
struct stat sb1, sb2;
char *mapped;
char write_buf[] = "hello world\n";
size_t page_sz;
size_t file_sz;
size_t new_file_sz;
if ((fd = open("/root/a.txt", O_RDWR | O_CREAT, S_IRWXU)) < 0) {
perror("open");
return -1;
}
if (write(fd, write_buf, strlen(write_buf)) < 0) {
perror("write");
return -1;
}
if ((fstat(fd, &sb1)) == -1 ) {
perror("fstat");
return -1;
}
file_sz = sb1.st_size;
page_sz = getpagesize();
// Output the size before mmap
printf("before msync file_sz = %ld\n", file_sz);
if ((mapped = mmap(NULL, page_sz, PROT_READ | PROT_WRITE, MAP_SHARED, fd,
0)) == (void *) -1) {
perror("mmap");
return -1;
}
// Appending characters at the end of a file.
mapped[file_sz] = '9';
// Synchronizing the modified contents of a file
if ((msync((void *)mapped, page_sz, MS_SYNC)) == -1) {
perror("msync");
return -1;
}
if (fstat(fd, &sb2) == -1) {
perror("fstat");
return -1;
}
new_file_sz = sb2.st_size;
// Output the size after mmap
printf("msync after file_sz = %ld\n", new_file_sz);
if (new_file_sz != file_sz) {
THROW_ERROR("The file size doesn't match");
}
if ((munmap((void *)mapped, page_sz)) == -1) {
perror("munmap");
return -1;
}
if ((fstat(fd, &sb1)) == -1 ) {
perror("fstat");
return -1;
}
file_sz = sb1.st_size;
if (new_file_sz != file_sz) {
THROW_ERROR("The file size doesn't match");
}
return 0;
}
int test_shared_file_mmap_permissions() {
const char *file_path = "/root/mmap_file.data";
int fd = open(file_path, O_CREAT | O_TRUNC | O_RDONLY, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
char *buf = mmap(NULL, PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (buf != MAP_FAILED || errno != EACCES) {
THROW_ERROR("permission violation not detected");
}
close(fd);
fd = open(file_path, O_CREAT | O_TRUNC | O_RDONLY, 0644);
if (fd < 0) {
THROW_ERROR("file creation failed");
}
buf = mmap(NULL, PAGE_SIZE, PROT_READ, MAP_SHARED, fd, 0);
if (buf == MAP_FAILED) {
THROW_ERROR("mmap failed");
}
int ret = mprotect(buf, PAGE_SIZE, PROT_READ | PROT_WRITE);
if (ret != -1 || errno != EACCES) {
printf("ret = %d, errno = %d\n", ret, errno);
THROW_ERROR("permission violation not detected");
}
return 0;
}
// ============================================================================
// Test suite main
// ============================================================================
static test_case_t test_cases[] = {
TEST_CASE(test_anonymous_mmap),
TEST_CASE(test_anonymous_mmap_randomly),
TEST_CASE(test_anonymous_mmap_randomly_with_good_hints),
TEST_CASE(test_anonymous_mmap_with_bad_hints),
TEST_CASE(test_anonymous_mmap_with_zero_len),
TEST_CASE(test_anonymous_mmap_with_non_page_aligned_len),
TEST_CASE(test_private_file_mmap),
TEST_CASE(test_private_file_mmap_with_offset),
TEST_CASE(test_private_file_mmap_with_invalid_fd),
TEST_CASE(test_private_file_mmap_with_non_page_aligned_offset),
TEST_CASE(test_shared_file_mmap_flushing_with_msync),
TEST_CASE(test_shared_file_mmap_flushing_with_munmap),
TEST_CASE(test_shared_file_mmap_flushing_with_fdatasync),
TEST_CASE(test_shared_file_mmap_flushing_with_fsync),
TEST_CASE(test_shared_file_mmap_small_file),
TEST_CASE(test_shared_file_mmap_permissions),
TEST_CASE(test_fixed_mmap_that_does_not_override_any_mmaping),
TEST_CASE(test_fixed_mmap_that_overrides_existing_mmaping),
TEST_CASE(test_fixed_mmap_with_non_page_aligned_addr),
TEST_CASE(test_fixed_mmap_spans_over_two_chunks),
TEST_CASE(test_munmap_whose_range_is_a_subset_of_a_mmap_region),
TEST_CASE(test_munmap_whose_range_is_a_superset_of_a_mmap_region),
TEST_CASE(test_munmap_whose_range_intersects_with_a_mmap_region),
TEST_CASE(test_munmap_whose_range_intersects_with_no_mmap_regions),
TEST_CASE(test_munmap_whose_range_intersects_with_multiple_mmap_regions),
TEST_CASE(test_munmap_whose_range_intersects_with_several_chunks),
TEST_CASE(test_munmap_with_null_addr),
TEST_CASE(test_munmap_with_zero_len),
TEST_CASE(test_munmap_with_non_page_aligned_len),
TEST_CASE(test_mremap),
TEST_CASE(test_mremap_subrange),
TEST_CASE(test_mremap_with_fixed_addr),
TEST_CASE(test_file_backed_mremap),
TEST_CASE(test_file_backed_mremap_mem_may_move),
TEST_CASE(test_mprotect_once),
TEST_CASE(test_mprotect_twice),
TEST_CASE(test_mprotect_triple),
TEST_CASE(test_mprotect_with_zero_len),
TEST_CASE(test_mprotect_with_invalid_addr),
TEST_CASE(test_mprotect_with_invalid_prot),
TEST_CASE(test_mprotect_with_non_page_aligned_size),
TEST_CASE(test_mprotect_multiple_vmas),
TEST_CASE(test_mprotect_grow_down),
TEST_CASE(test_mremap_concurrent),
TEST_CASE(test_random_mmap_file),
TEST_CASE(test_user_space_pf_trigger),
TEST_CASE(test_kernel_space_pf_trigger),
};
int main() {
if (test_suite_init() < 0) {
THROW_ERROR("test_suite_init failed");
}
return test_suite_run(test_cases, ARRAY_SIZE(test_cases));
}