From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-qv1-f46.google.com (mail-qv1-f46.google.com [209.85.219.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B610C257AF0 for ; Sat, 10 May 2025 12:35:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.46 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746880517; cv=none; b=M82EexbtreYfsPCpea/zsyjY7yuedJL1yeFkRrvNmSVrGNLgHwdEttZelpbl1jEjNkAroRQoLR/Om/jprjyfn24IO8YkZStiDkwiWowixKrD6fXNMzBrkhoz5znN1d3nVOYEytEtYBAAVd4lMmo4k6CwaN0V1B9mnVSxAToZtJQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746880517; c=relaxed/simple; bh=E4dMNNnVTsxU67yMkTyvHQT6LvBD9dD3EKDdUb1spL8=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=UNW60ywPFwM7LklKGIVT0RF6cd5BPVORasK+WmTaYOLNbUW+g5ULsB6z3iBHIQSuJvF84WzeMzvstA6lrbENXqhhi26orcvZyO7SkdDmLygY19zpcMd3yx1JpKmhtmUl9TSOgKjIUyTeAGhHE9V4HXf61dC8mDoICHu63TrEg2k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=S7dgPmSn; arc=none smtp.client-ip=209.85.219.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="S7dgPmSn" Received: by mail-qv1-f46.google.com with SMTP id 6a1803df08f44-6ecf99dd567so41799986d6.0 for ; Sat, 10 May 2025 05:35:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746880513; x=1747485313; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=ZSmxBWoHOESSY60Jb4jCFImphntRhbF/jzT+yOUkKiI=; b=S7dgPmSnNNazETW6TQjbweZPw/gNgFpOkAaREbKCCl9UKZNMknX5A93rt4Xa59Anzu JFdQ5YLxWIcyagD5i+9hvaS6oYCDJeL94I99I1DmSPabvMcsBRd6Mb6fTT+hr1DC9bvQ DFWX3ZlICC01a+kRz6txaACNZUyDhybQcBmsgpUQpMRnkRDReMYbzsTH1njfpJAMsfhp idR2fnjcq5407bUJLLZZUYQj7lyn+CX72U81vJboGS2W2qnCPLzxOyB52rImaBL6TgzP lc0zj3I05BP6nQglv8pmq9UTJlIPE/c+qCtHeKSX6XqAonIwG9XzOazafuadXywnJrxa BVmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746880513; x=1747485313; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZSmxBWoHOESSY60Jb4jCFImphntRhbF/jzT+yOUkKiI=; b=erLsVkHmHFWOaHx+qGn7ELL176o/vVMWHZ+J64QB2HldSpj6phsrNV5nohgbpXg7PL fjw72rFxhaWkQS15SZ5oLm9zssxc1YzR7deHK/Ey5ox3RyFVki/Usgd0YtKQWuKSQec3 FrS8lMSlxr8PoXKvakrGoAvdjnIo0AGfYtebtJFgC3QF2RXCHpjfhSOINB825GVU5fif zuHOVykW6ei9ip6yIHVXk2vzqeWpPKPspOK37bd98dCbu9PfCWBFXZwUKbJ1YwXcEFQm w8ANhfWZdeFREg7tkcWo1hXO3mzAEvTEAReVuYs2urF1Pw0JVKX4YgFo/n9ocT0x+nkN LLgg== X-Forwarded-Encrypted: i=1; AJvYcCW+8PvKG3YhGy/cwOs1XPIYRzMH0DWgUJqqxYWfzkAxhPbznbUkB/tPQyp4OhBzlkgxfnU=@vger.kernel.org X-Gm-Message-State: AOJu0YzKmx62/WdpoIjwt0ImPE6brg5F+cZbTmQVfXA5+6rsBKq72qsf rp/EcEMJdWXaZkH4lGvUfKnjihTVEZDFddwbKT5fZBaof+d/tBGCc/0BE4GrPHY= X-Gm-Gg: ASbGncv7k5y5979Su6G9h8PdNUQXAyQ2RgS8yqwxf++3hrg3q9Wq6oE7pv+USw71Muk 1F+UZaOrpojvttuWHrUTf29UMvN4bkkFKaHJaFVXtvjvu3wThoXV/aMfPhdxSAVovMfCCZpqKgR T2qdm3waEyRkdlINMATPag7hWt1z3RgWSBH/5zKIB0gEEk19rcGvy/5KLrmcWGqSwd8zFOeCfcd 8hvIK7FXSzgLAYWHV9mQeV7fLNWJAIG1HQcC5QYdxiaV8ydscp1CkVz2Dh7RUrd9Pl9dEVkqsXq kpIK2kybwfivQdAdH9I6964in0O26qnx9dr9TyaI6aWu2kpkRpceU/RqP660vTqpy8maasSTacL OD1T8ab8= X-Google-Smtp-Source: AGHT+IFDBOzsnKDQDmN5hEIHEOheS6MBFMmjcf/7s7AIHD7p09Y4avPfN2YUFnkpyoryFPv6mOLk+g== X-Received: by 2002:a0c:f68d:0:b0:6f5:401b:c985 with SMTP id 6a1803df08f44-6f6e4841d07mr76743466d6.42.1746880513549; Sat, 10 May 2025 05:35:13 -0700 (PDT) Received: from [192.168.1.45] (ool-182edad1.dyn.optonline.net. [24.46.218.209]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-6f6e39f588asm25725556d6.49.2025.05.10.05.35.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 10 May 2025 05:35:13 -0700 (PDT) From: Lorenz Bauer Date: Sat, 10 May 2025 08:34:55 -0400 Subject: [PATCH bpf-next v4 2/3] selftests: bpf: add a test for mmapable vmlinux BTF Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20250510-vmlinux-mmap-v4-2-69e424b2a672@isovalent.com> References: <20250510-vmlinux-mmap-v4-0-69e424b2a672@isovalent.com> In-Reply-To: <20250510-vmlinux-mmap-v4-0-69e424b2a672@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 Add a basic test for the ability to mmap /sys/kernel/btf/vmlinux. Ensure that the data is valid BTF and that it is padded with zero. Signed-off-by: Lorenz Bauer --- tools/testing/selftests/bpf/prog_tests/btf_sysfs.c | 81 ++++++++++++++++++++++ 1 file changed, 81 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c b/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c new file mode 100644 index 0000000000000000000000000000000000000000..3923e64c4c1d0f1dfeef2a39c7bbab7c9a19f0ca --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/btf_sysfs.c @@ -0,0 +1,81 @@ +// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause +/* Copyright (c) 2025 Isovalent */ + +#include +#include +#include +#include +#include +#include + +static void test_btf_mmap_sysfs(const char *path, struct btf *base) +{ + struct stat st; + __u64 btf_size, end; + void *raw_data = NULL; + int fd = -1; + long page_size; + struct btf *btf = NULL; + + page_size = sysconf(_SC_PAGESIZE); + if (!ASSERT_GE(page_size, 0, "get_page_size")) + goto cleanup; + + if (!ASSERT_OK(stat(path, &st), "stat_btf")) + goto cleanup; + + btf_size = st.st_size; + end = (btf_size + page_size - 1) / page_size * page_size; + + fd = open(path, O_RDONLY); + if (!ASSERT_GE(fd, 0, "open_btf")) + goto cleanup; + + raw_data = mmap(NULL, btf_size, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_writable")) + goto cleanup; + + raw_data = mmap(NULL, btf_size, PROT_READ, MAP_SHARED, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_shared")) + goto cleanup; + + raw_data = mmap(NULL, end + 1, PROT_READ, MAP_PRIVATE, fd, 0); + if (!ASSERT_EQ(raw_data, MAP_FAILED, "mmap_btf_invalid_size")) + goto cleanup; + + raw_data = mmap(NULL, end, PROT_READ, MAP_PRIVATE, fd, 0); + if (!ASSERT_OK_PTR(raw_data, "mmap_btf")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_WRITE), -1, + "mprotect_writable")) + goto cleanup; + + if (!ASSERT_EQ(mprotect(raw_data, btf_size, PROT_READ | PROT_EXEC), -1, + "mprotect_executable")) + goto cleanup; + + /* Check padding is zeroed */ + for (int i = btf_size; i < end; i++) { + if (((__u8 *)raw_data)[i] != 0) { + PRINT_FAIL("tail of BTF is not zero at page offset %d\n", i); + goto cleanup; + } + } + + btf = btf__new_split(raw_data, btf_size, base); + if (!ASSERT_OK_PTR(btf, "parse_btf")) + goto cleanup; + +cleanup: + btf__free(btf); + if (raw_data && raw_data != MAP_FAILED) + munmap(raw_data, btf_size); + if (fd >= 0) + close(fd); +} + +void test_btf_sysfs(void) +{ + test_btf_mmap_sysfs("/sys/kernel/btf/vmlinux", NULL); +} -- 2.49.0