Add non-mmapable data section to test_skeleton selftest and make sure it really isn't mmapable by trying to mmap() it anyways. Also make sure that libbpf doesn't report BPF_F_MMAPABLE flag to users. Additional, some more manual testing was performed that this feature works as intended. Looking at created map through bpftool shows that flags passed to kernel are indeed zero: $ bpftool map show ... 1782: array name .data.non_mmapa flags 0x0 key 4B value 16B max_entries 1 memlock 4096B btf_id 1169 pids test_progs(8311) ... Checking BTF uploaded to kernel for this map shows that zero_key and zero_value are indeed marked as static, even though zero_key is actually original global (but STV_HIDDEN) variable: $ bpftool btf dump id 1169 ... [51] VAR 'zero_key' type_id=2, linkage=static [52] VAR 'zero_value' type_id=7, linkage=static ... [62] DATASEC '.data.non_mmapable' size=16 vlen=2 type_id=51 offset=0 size=4 (VAR 'zero_key') type_id=52 offset=4 size=12 (VAR 'zero_value') ... And original BTF does have zero_key marked as linkage=global: $ bpftool btf dump file test_skeleton.bpf.linked3.o ... [51] VAR 'zero_key' type_id=2, linkage=global [52] VAR 'zero_value' type_id=7, linkage=static ... [62] DATASEC '.data.non_mmapable' size=16 vlen=2 type_id=51 offset=0 size=4 (VAR 'zero_key') type_id=52 offset=4 size=12 (VAR 'zero_value') Bpftool didn't require any changes at all because it checks whether internal map is mmapable already, but just to double-check generated skeleton, we see that .data.non_mmapable neither sets mmaped pointer nor has a corresponding field in the skeleton: $ grep non_mmapable test_skeleton.skel.h struct bpf_map *data_non_mmapable; s->maps[7].name = ".data.non_mmapable"; s->maps[7].map = &obj->maps.data_non_mmapable; But .data.read_mostly has all of those things: $ grep read_mostly test_skeleton.skel.h struct bpf_map *data_read_mostly; struct test_skeleton__data_read_mostly { int read_mostly_var; } *data_read_mostly; s->maps[6].name = ".data.read_mostly"; s->maps[6].map = &obj->maps.data_read_mostly; s->maps[6].mmaped = (void **)&obj->data_read_mostly; _Static_assert(sizeof(s->data_read_mostly->read_mostly_var) == 4, "unexpected size of 'read_mostly_var'"); Acked-by: Stanislav Fomichev <sdf@google.com> Acked-by: Dave Marchevsky <davemarchevsky@fb.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/r/20221019002816.359650-4-andrii@kernel.org Signed-off-by: Alexei Starovoitov <ast@kernel.org>
98 lines
1.9 KiB
C
98 lines
1.9 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2019 Facebook */
|
|
|
|
#include <stdbool.h>
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
|
|
#define __read_mostly SEC(".data.read_mostly")
|
|
|
|
struct s {
|
|
int a;
|
|
long long b;
|
|
} __attribute__((packed));
|
|
|
|
/* .data section */
|
|
int in1 = -1;
|
|
long long in2 = -1;
|
|
|
|
/* .bss section */
|
|
char in3 = '\0';
|
|
long long in4 __attribute__((aligned(64))) = 0;
|
|
struct s in5 = {};
|
|
|
|
/* .rodata section */
|
|
const volatile struct {
|
|
const int in6;
|
|
} in = {};
|
|
|
|
/* .data section */
|
|
int out1 = -1;
|
|
long long out2 = -1;
|
|
|
|
/* .bss section */
|
|
char out3 = 0;
|
|
long long out4 = 0;
|
|
int out6 = 0;
|
|
|
|
extern bool CONFIG_BPF_SYSCALL __kconfig;
|
|
extern int LINUX_KERNEL_VERSION __kconfig;
|
|
bool bpf_syscall = 0;
|
|
int kern_ver = 0;
|
|
|
|
struct s out5 = {};
|
|
|
|
|
|
const volatile int in_dynarr_sz SEC(".rodata.dyn");
|
|
const volatile int in_dynarr[4] SEC(".rodata.dyn") = { -1, -2, -3, -4 };
|
|
|
|
int out_dynarr[4] SEC(".data.dyn") = { 1, 2, 3, 4 };
|
|
|
|
int read_mostly_var __read_mostly;
|
|
int out_mostly_var;
|
|
|
|
char huge_arr[16 * 1024 * 1024];
|
|
|
|
/* non-mmapable custom .data section */
|
|
|
|
struct my_value { int x, y, z; };
|
|
|
|
__hidden int zero_key SEC(".data.non_mmapable");
|
|
static struct my_value zero_value SEC(".data.non_mmapable");
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_ARRAY);
|
|
__type(key, int);
|
|
__type(value, struct my_value);
|
|
__uint(max_entries, 1);
|
|
} my_map SEC(".maps");
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
int handler(const void *ctx)
|
|
{
|
|
int i;
|
|
|
|
out1 = in1;
|
|
out2 = in2;
|
|
out3 = in3;
|
|
out4 = in4;
|
|
out5 = in5;
|
|
out6 = in.in6;
|
|
|
|
bpf_syscall = CONFIG_BPF_SYSCALL;
|
|
kern_ver = LINUX_KERNEL_VERSION;
|
|
|
|
for (i = 0; i < in_dynarr_sz; i++)
|
|
out_dynarr[i] = in_dynarr[i];
|
|
|
|
out_mostly_var = read_mostly_var;
|
|
|
|
huge_arr[sizeof(huge_arr) - 1] = 123;
|
|
|
|
/* make sure zero_key and zero_value are not optimized out */
|
|
bpf_map_update_elem(&my_map, &zero_key, &zero_value, BPF_ANY);
|
|
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|