Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/tools/testing/selftests/damon/sysfs_memcg_path_leak.sh
29268 views
1
#!/bin/bash
2
# SPDX-License-Identifier: GPL-2.0
3
4
if [ $EUID -ne 0 ]
5
then
6
echo "Run as root"
7
exit $ksft_skip
8
fi
9
10
damon_sysfs="/sys/kernel/mm/damon/admin"
11
if [ ! -d "$damon_sysfs" ]
12
then
13
echo "damon sysfs not found"
14
exit $ksft_skip
15
fi
16
17
# ensure filter directory
18
echo 1 > "$damon_sysfs/kdamonds/nr_kdamonds"
19
echo 1 > "$damon_sysfs/kdamonds/0/contexts/nr_contexts"
20
echo 1 > "$damon_sysfs/kdamonds/0/contexts/0/schemes/nr_schemes"
21
echo 1 > "$damon_sysfs/kdamonds/0/contexts/0/schemes/0/filters/nr_filters"
22
23
filter_dir="$damon_sysfs/kdamonds/0/contexts/0/schemes/0/filters/0"
24
25
before_kb=$(grep Slab /proc/meminfo | awk '{print $2}')
26
27
# try to leak 3000 KiB
28
for i in {1..102400};
29
do
30
echo "012345678901234567890123456789" > "$filter_dir/memcg_path"
31
done
32
33
after_kb=$(grep Slab /proc/meminfo | awk '{print $2}')
34
# expect up to 1500 KiB free from other tasks memory
35
expected_after_kb_max=$((before_kb + 1500))
36
37
if [ "$after_kb" -gt "$expected_after_kb_max" ]
38
then
39
echo "maybe memcg_path are leaking: $before_kb -> $after_kb"
40
exit 1
41
else
42
exit 0
43
fi
44
45