/* * Copyright (c) Linux Test Project, 2014 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Library General Public License for more details. */ /* * This is a regression test for madvise(2) system call. It tests kernel * for NULL ptr deref Oops fixed by: * commit ee53664bda169f519ce3c6a22d378f0b946c8178 * Author: Kirill A. Shutemov <kirill.shutemov@linux.intel.com> * Date: Fri Dec 20 15:10:03 2013 +0200 * mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support * * On buggy kernel with CONFIG_TRANSPARENT_HUGEPAGE=y CONFIG_DEBUG_LOCK_ALLOC=y * this testcase should produce Oops and/or be killed. On fixed/good kernel * this testcase runs to completion (retcode is 0) */ #include <sys/mman.h> #include <errno.h> #include "tst_test.h" #define ALLOC_SIZE (32 * 1024 * 1024) static void verify_madvise(void) { void *p; p = SAFE_MMAP(NULL, ALLOC_SIZE, PROT_READ, MAP_PRIVATE | MAP_ANONYMOUS | MAP_POPULATE, -1, 0); TEST(mprotect(p, ALLOC_SIZE, PROT_NONE)); if (TEST_RETURN == -1) tst_brk(TBROK | TTERRNO, "mprotect failed"); TEST(madvise(p, ALLOC_SIZE, MADV_WILLNEED)); SAFE_MUNMAP(p, ALLOC_SIZE); if (TEST_RETURN == 0) { tst_res(TPASS, "issue has not been reproduced"); return; } if (TEST_ERRNO == EBADF) tst_brk(TCONF, "CONFIG_SWAP=n"); else tst_brk(TBROK | TTERRNO, "madvise failed"); } static struct tst_test test = { .min_kver = "3.9.0", .test_all = verify_madvise, };