@@ -2121,6 +2121,32 @@ static void test_seal_madvise_nodiscard(bool seal)
REPORT_TEST_PASS();
}
+static void test_seal_discard_madvise_advice(void)
+{
+ void *ptr;
+ unsigned long page_size = getpagesize();
+ unsigned long size = 4 * page_size;
+ int ret;
+ int sealed_advice[] = {MADV_FREE, MADV_DONTNEED,
+ MADV_DONTNEED_LOCKED, MADV_REMOVE,
+ MADV_DONTFORK, MADV_WIPEONFORK};
+ int size_sealed_advice = sizeof(sealed_advice) / sizeof(int);
+
+ setup_single_address(size, &ptr);
+ FAIL_TEST_IF_FALSE(ptr != (void *)-1);
+
+ ret = seal_single_address(ptr, size);
+ FAIL_TEST_IF_FALSE(!ret);
+
+ for (int i = 0; i < size_sealed_advice; i++) {
+ ret = sys_madvise(ptr, size, sealed_advice[i]);
+ FAIL_TEST_IF_FALSE(ret < 0);
+ FAIL_TEST_IF_FALSE(errno == EPERM);
+ }
+
+ REPORT_TEST_PASS();
+}
+
int main(int argc, char **argv)
{
bool test_seal = seal_support();
@@ -2142,7 +2168,7 @@ int main(int argc, char **argv)
if (!get_vma_size_supported())
ksft_exit_skip("get_vma_size not supported\n");
- ksft_set_plan(88);
+ ksft_set_plan(89);
test_seal_addseal();
test_seal_unmapped_start();
@@ -2251,5 +2277,7 @@ int main(int argc, char **argv)
test_seal_discard_ro_anon_on_pkey(false);
test_seal_discard_ro_anon_on_pkey(true);
+ test_seal_discard_madvise_advice();
+
ksft_finished();
}