From patchwork Fri Mar 7 04:17:35 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Emil Tsalapatis X-Patchwork-Id: 14005881 X-Patchwork-Delegate: bpf@iogearbox.net Received: from mail-qk1-f177.google.com (mail-qk1-f177.google.com [209.85.222.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 02992249E5 for ; Fri, 7 Mar 2025 04:17:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.222.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321065; cv=none; b=C/L2vKLZJ0T54dJQGisFvmM+reb6nE/Xo1QS6iAd8+YJ/uRMBRAhmaNwB0kIwLhQhssUBv8YlssFw9USoY/UHBLo5MwtTy+qduBEh82ON2SNe8fz69CxobMiUruBEmNe+y5+aoXTfiDrlutClh5BwqAJ16x+jFVstaiS4dQRwuY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321065; c=relaxed/simple; bh=jWOUUt+7DEV91SW9usSGCPHzlJSQ5pKOyZ0xZWq+8ME=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=C7zo5QfrgnI47dJugvZTj/yjFs+ioGbnTBOKDvSGvzvfDGKGSwoo3HhZL1yTj8l28e8/YLwW5lKkRfDXz2pYiHYi0+i8KgZLa7+meY3IOq3j9++/jjZ3cxtCmUhPULbETM6E05/kT78hkC/V+5pafhH56nVPMDgJfiEA02ludP4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com; spf=pass smtp.mailfrom=etsalapatis.com; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b=HUM7hgu+; arc=none smtp.client-ip=209.85.222.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b="HUM7hgu+" Received: by mail-qk1-f177.google.com with SMTP id af79cd13be357-7c08fc20194so255623085a.2 for ; Thu, 06 Mar 2025 20:17:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=etsalapatis-com.20230601.gappssmtp.com; s=20230601; t=1741321062; x=1741925862; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=tOlPAt6QzAtIMcKAdCSiS4FyW9j3OpeK4f/Kfe5aLZ8=; b=HUM7hgu+qMPiFbgCB8e4gwnq0GMCir8NDWTh3O6MrzTv9wVdA5rquK2nJQasUl96wN x4GHp0vrFXB5xlscEEQxuhgGKZuMznxhq+o1/oG0KDyipm4iTBFDE1v3QMPk+YtHTR2Y hVRPBtgjRrz1uLXu6Y9QH+w3yeEd20JxsWjANn950yTprWl3Tzcw5JO15dXq4PIcTeXA 9P5cnI+29r8X3HcXh9Lmz8sPekUmWbDZSu5grXNzMu56sglyTv+VsyEeKcWjEhu2pI13 cq070mJVpdDdDYiIVdw+t9GtqTEJ/v4RzgMf0DM8TfW6dJo3IG78fuUAzLI8JXEdak2h TfZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741321062; x=1741925862; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tOlPAt6QzAtIMcKAdCSiS4FyW9j3OpeK4f/Kfe5aLZ8=; b=UcxNpzBmK5LjFo4hwBfKt807v1A80oOR8OJ29pLPYpTxnrrMHpMJKwgP2C0bbYLBgT XnRT1L/VdOaKYC8ujpfGgX0+JrKa31NJUXdnHIlwLYkwU2biT8fyp4yB2M7IyAIZ+Ce6 7vfkHOPJyF1S8jusiHNkLHrQ2e37ToAmVCGE0G33xE7aZ5hpCSb86AuT1kSmJolfPF71 L1+3zEKgcRxm6RJTphJI4Gg05H8S46LVZZRHFNCWHi3pwfp1yEZ1tMb8yxoPfwK/J9Ya 3yzZiKt1jU9k30CzCwKa4xdaYX9I50dtaNCosEvlarcYB0P37j+YLaPJ8KjOGLhQ6wjx QhJg== X-Gm-Message-State: AOJu0Yy4Tpf9WwMDKb5wx4yJt2DyNutRChzv/YINrDvaG+cTQ8gFVuYe K7nG+Dxtul4aeiGBYvqlKbQN8rwJJ7JtuncSOy/+6dANNbx2kbfKXaEUq6JJM0gZB4XrK5Q9dNH 8pcrHFA== X-Gm-Gg: ASbGncvR8LNe8PA9a5EHMkS9/Cv0b1QpHk5U1oYp6fUkFv0RasbOMFgmLDQ0+SN8tvn eI4kjuhZlo8rDIzmNb283rw8usls6yVQJKMLjuXp82S18+AjI+NjpjlJr2WRAhu7NLuNdVf3X/e ahSjjnoimXuW7ehuZU6aBVXaDle1TdjcOsKzfv3nRwCPQvNjl2Gx+Ju9TWK3iE594CJ/oAnJPHR 99Z9fuke1xs61E72S1Q7G5MeUH7zeN/St4s31WmO6pFZ1E2svnoPjW1ZwC2rJAxUn/0AvYE9c0u HXwyzPzBtRJgvimaUcOFEC4m2oT436Yf2GP7hXIOHQ== X-Google-Smtp-Source: AGHT+IFqAFVMB9lROknniHCzNFkyEwEpNC2RIllmYtCGnN66Bv5yYXb3L4sISfmZGSwcOb43JcFa2w== X-Received: by 2002:a05:620a:6884:b0:7c3:cfa6:d1e1 with SMTP id af79cd13be357-7c4e61ca08cmr291524585a.41.1741321061855; Thu, 06 Mar 2025 20:17:41 -0800 (PST) Received: from boreas.. ([140.174.215.88]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7c3e534ba85sm186108085a.28.2025.03.06.20.17.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Mar 2025 20:17:41 -0800 (PST) From: Emil Tsalapatis To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, yonghong.song@linux.dev, tj@kernel.org, memxor@gmail.com, houtao@huaweicloud.com, Emil Tsalapatis , Hou Tao Subject: [PATCH v5 1/4] bpf: add kfunc for populating cpumask bits Date: Thu, 6 Mar 2025 23:17:35 -0500 Message-ID: <20250307041738.6665-2-emil@etsalapatis.com> X-Mailer: git-send-email 2.47.1 In-Reply-To: <20250307041738.6665-1-emil@etsalapatis.com> References: <20250307041738.6665-1-emil@etsalapatis.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net Add a helper kfunc that sets the bitmap of a bpf_cpumask from BPF memory. Signed-off-by: Emil Tsalapatis (Meta) Acked-by: Hou Tao --- kernel/bpf/cpumask.c | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/kernel/bpf/cpumask.c b/kernel/bpf/cpumask.c index cfa1c18e3a48..77900cbbbd75 100644 --- a/kernel/bpf/cpumask.c +++ b/kernel/bpf/cpumask.c @@ -420,6 +420,38 @@ __bpf_kfunc u32 bpf_cpumask_weight(const struct cpumask *cpumask) return cpumask_weight(cpumask); } +/** + * bpf_cpumask_populate() - Populate the CPU mask from the contents of + * a BPF memory region. + * + * @cpumask: The cpumask being populated. + * @src: The BPF memory holding the bit pattern. + * @src__sz: Length of the BPF memory region in bytes. + * + * Return: + * * 0 if the struct cpumask * instance was populated successfully. + * * -EACCES if the memory region is too small to populate the cpumask. + * * -EINVAL if the memory region is not aligned to the size of a long + * and the architecture does not support efficient unaligned accesses. + */ +__bpf_kfunc int bpf_cpumask_populate(struct cpumask *cpumask, void *src, size_t src__sz) +{ + unsigned long source = (unsigned long)src; + + /* The memory region must be large enough to populate the entire CPU mask. */ + if (src__sz < bitmap_size(nr_cpu_ids)) + return -EACCES; + + /* If avoiding unaligned accesses, the input region must be aligned to the nearest long. */ + if (!IS_ENABLED(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) && + !IS_ALIGNED(source, sizeof(long))) + return -EINVAL; + + bitmap_copy(cpumask_bits(cpumask), src, nr_cpu_ids); + + return 0; +} + __bpf_kfunc_end_defs(); BTF_KFUNCS_START(cpumask_kfunc_btf_ids) @@ -448,6 +480,7 @@ BTF_ID_FLAGS(func, bpf_cpumask_copy, KF_RCU) BTF_ID_FLAGS(func, bpf_cpumask_any_distribute, KF_RCU) BTF_ID_FLAGS(func, bpf_cpumask_any_and_distribute, KF_RCU) BTF_ID_FLAGS(func, bpf_cpumask_weight, KF_RCU) +BTF_ID_FLAGS(func, bpf_cpumask_populate, KF_RCU) BTF_KFUNCS_END(cpumask_kfunc_btf_ids) static const struct btf_kfunc_id_set cpumask_kfunc_set = { From patchwork Fri Mar 7 04:17:36 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Emil Tsalapatis X-Patchwork-Id: 14005882 X-Patchwork-Delegate: bpf@iogearbox.net Received: from mail-qk1-f181.google.com (mail-qk1-f181.google.com [209.85.222.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CC82818DB1F for ; Fri, 7 Mar 2025 04:17:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.222.181 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321065; cv=none; b=OI8oHCUQ4pG6hKiMiTcUM4iF0hAY2U23OkDkrfTQ6pxzEuwqTulVhOwMGdTwRofjyBYNXv6zwFJcqow3dKy8sdsteX6NGcwKGFApG3zkwv5/AnIG9DtJooU9sTErY+tUjp5cb3ZLPz8HAf8yglIcdNuyTvG4D14ax0cLJkX6noY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321065; c=relaxed/simple; bh=YDT7Sh5v0Yam1nCsPKADYKKn5PY6M0j+JaCuzRJ6Z2o=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=CA21sUKrgj436CSF1wus6sGzkHIEtoc0xI+I579J9B0I9nhebNcpGK1WCaxvBCLw3TkAe4CpIQ3Jh/GKWoI1HPaNbuzNm9UAlE3nGCdBQGy01K6FT1z5P4uSUxW2j0e1xkELYxkwYRLpHWD5KRV1KbDTfA2ArY71TqgpXgJLT20= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com; spf=pass smtp.mailfrom=etsalapatis.com; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b=SRk4VEGS; arc=none smtp.client-ip=209.85.222.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b="SRk4VEGS" Received: by mail-qk1-f181.google.com with SMTP id af79cd13be357-7be8f28172dso100277485a.3 for ; Thu, 06 Mar 2025 20:17:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=etsalapatis-com.20230601.gappssmtp.com; s=20230601; t=1741321063; x=1741925863; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0moReXPNjWc8b1AJ5JBr9O/f6u0316M//hylR1kcV78=; b=SRk4VEGSkg0FOcY5Eqx2i3CHyXoinm4v2Us4Beg1DFYfviLTZIj6hMYdwy2Lx41j0E dJGEwdxu6MS25/kMW82PqcnjHdJiyvHphV6S9OIfXRNVoFZW0W4kjE5Ly4kQPo9+cvVF ceVD5Yki2Go2UckDty6sZApkhUlr7F5yBGoJ1I2u2wNCZIo0pK0iWdj/RM12RnJtK+YB quPrjPbTZ2Y6Kt2KcYtZwBmWPbOzBDDY0BONUdn58OHrXrtVGsRyLG7aegR+yk4TxRcI ysKokzXgM4xclaz9RTI0v6x8khYNxf6WSCAmNcuav3jo0Xmlu11w4PVf9Hwwmh2+VzQu 6+Tg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741321063; x=1741925863; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0moReXPNjWc8b1AJ5JBr9O/f6u0316M//hylR1kcV78=; b=sOVtDDksrTSIaHGTaMwUV/0swo8HJx0SsY5KFeuEx1MW/DuMsT8JWn+r2yS43J8r+z x5p0+QGv7TADW+9bj112BBF64IW7pbZkBqvRUv6/MjUzjS7fiyJ8w7zlTEU5H2mIj45d 9Ztp/ha5D66CsFuUFDAcjYYoMa/Uxb9MGdbjeRGL6x1yDOMWsTX6007acCv6Z6evqj8V GDkRnAYyAppkmv+WMRaPD3tmSz7UnaIhqi95qmEwkrDid44pKcCbHJfO5DDAYqw2Acn7 YY//EExokLU/f666shEgPS9S2W3DYqVkbhzHeU2rMlamyfJfdv6FdMmp/Qp46AmlTSxf lSjQ== X-Gm-Message-State: AOJu0YyM+8AyTs6c3ud8H8FCXX+JE+O2+UbpUuJ6PYxIYWiQpoNRiJiq tkPlIQQMeW0y+9WbusV8Ms5qnmy4Z/cAcoU3Vwt9gklPfXJZOgf66zNxaWygMqgwLtr+c3EvxsC yFTmC5A== X-Gm-Gg: ASbGncv73x3kTqT7WGnRa48A7IuqUUciZjnt6op6bw6+5I64jckvrruaPpZxqHPw2p9 qdJlcDo77VsjA9ecitrCDu6syOcyYh5Qc+/eVEJhdXiN9+f0HpCpE8J6qF9RyLgtftjSlIkEw54 orK1pk6QS6etTyiwqqB9trd3UHem0BpAzoIwP62sFxSCqEK/QEEkjeMdTvmhprxHDo8Wl/mycBM pdFz1jchBYp+WLHeVAE+vk3IZz9682XpZrDOFSwNE6JbguT1LDOGKg9TXoe/IczpJSJ22wZj/s1 uIzmS1q5imxXrxSbutdzKMLXCZYC0k7aUgO+G9p9vw== X-Google-Smtp-Source: AGHT+IFmCZWdyicH8Entbh45gKW4XWo63dJBsvlOU3L3o43nERh/2c3rMcc/sSAQu5A9kzEO8wJ4mg== X-Received: by 2002:a05:620a:2694:b0:7c0:a63e:4622 with SMTP id af79cd13be357-7c4e610a1c9mr291687585a.31.1741321062504; Thu, 06 Mar 2025 20:17:42 -0800 (PST) Received: from boreas.. ([140.174.215.88]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7c3e534ba85sm186108085a.28.2025.03.06.20.17.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Mar 2025 20:17:42 -0800 (PST) From: Emil Tsalapatis To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, yonghong.song@linux.dev, tj@kernel.org, memxor@gmail.com, houtao@huaweicloud.com, Emil Tsalapatis Subject: [PATCH v5 2/4] selftests: bpf: add bpf_cpumask_fill selftests Date: Thu, 6 Mar 2025 23:17:36 -0500 Message-ID: <20250307041738.6665-3-emil@etsalapatis.com> X-Mailer: git-send-email 2.47.1 In-Reply-To: <20250307041738.6665-1-emil@etsalapatis.com> References: <20250307041738.6665-1-emil@etsalapatis.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net Add selftests for the bpf_cpumask_fill helper that sets a bpf_cpumask to a bit pattern provided by a BPF program. Signed-off-by: Emil Tsalapatis (Meta) --- .../selftests/bpf/prog_tests/cpumask.c | 3 + .../selftests/bpf/progs/cpumask_common.h | 1 + .../selftests/bpf/progs/cpumask_failure.c | 38 ++++++ .../selftests/bpf/progs/cpumask_success.c | 113 ++++++++++++++++++ 4 files changed, 155 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/cpumask.c b/tools/testing/selftests/bpf/prog_tests/cpumask.c index e58a04654238..9b09beba988b 100644 --- a/tools/testing/selftests/bpf/prog_tests/cpumask.c +++ b/tools/testing/selftests/bpf/prog_tests/cpumask.c @@ -25,6 +25,9 @@ static const char * const cpumask_success_testcases[] = { "test_global_mask_nested_deep_rcu", "test_global_mask_nested_deep_array_rcu", "test_cpumask_weight", + "test_populate_reject_small_mask", + "test_populate_reject_unaligned", + "test_populate", }; static void verify_success(const char *prog_name) diff --git a/tools/testing/selftests/bpf/progs/cpumask_common.h b/tools/testing/selftests/bpf/progs/cpumask_common.h index 4ece7873ba60..86085b79f5ca 100644 --- a/tools/testing/selftests/bpf/progs/cpumask_common.h +++ b/tools/testing/selftests/bpf/progs/cpumask_common.h @@ -61,6 +61,7 @@ u32 bpf_cpumask_any_distribute(const struct cpumask *src) __ksym __weak; u32 bpf_cpumask_any_and_distribute(const struct cpumask *src1, const struct cpumask *src2) __ksym __weak; u32 bpf_cpumask_weight(const struct cpumask *cpumask) __ksym __weak; +int bpf_cpumask_populate(struct cpumask *cpumask, void *src, size_t src__sz) __ksym __weak; void bpf_rcu_read_lock(void) __ksym __weak; void bpf_rcu_read_unlock(void) __ksym __weak; diff --git a/tools/testing/selftests/bpf/progs/cpumask_failure.c b/tools/testing/selftests/bpf/progs/cpumask_failure.c index b40b52548ffb..8a2fd596c8a3 100644 --- a/tools/testing/selftests/bpf/progs/cpumask_failure.c +++ b/tools/testing/selftests/bpf/progs/cpumask_failure.c @@ -222,3 +222,41 @@ int BPF_PROG(test_invalid_nested_array, struct task_struct *task, u64 clone_flag return 0; } + +SEC("tp_btf/task_newtask") +__failure __msg("type=scalar expected=fp") +int BPF_PROG(test_populate_invalid_destination, struct task_struct *task, u64 clone_flags) +{ + struct bpf_cpumask *invalid = (struct bpf_cpumask *)0x123456; + u64 bits; + int ret; + + ret = bpf_cpumask_populate((struct cpumask *)invalid, &bits, sizeof(bits)); + if (!ret) + err = 2; + + return 0; +} + +SEC("tp_btf/task_newtask") +__failure __msg("leads to invalid memory access") +int BPF_PROG(test_populate_invalid_source, struct task_struct *task, u64 clone_flags) +{ + void *garbage = (void *)0x123456; + struct bpf_cpumask *local; + int ret; + + local = create_cpumask(); + if (!local) { + err = 1; + return 0; + } + + ret = bpf_cpumask_populate((struct cpumask *)local, garbage, 8); + if (!ret) + err = 2; + + bpf_cpumask_release(local); + + return 0; +} diff --git a/tools/testing/selftests/bpf/progs/cpumask_success.c b/tools/testing/selftests/bpf/progs/cpumask_success.c index 80ee469b0b60..51f3dcf8869f 100644 --- a/tools/testing/selftests/bpf/progs/cpumask_success.c +++ b/tools/testing/selftests/bpf/progs/cpumask_success.c @@ -770,3 +770,116 @@ int BPF_PROG(test_refcount_null_tracking, struct task_struct *task, u64 clone_fl bpf_cpumask_release(mask2); return 0; } + +SEC("tp_btf/task_newtask") +__success +int BPF_PROG(test_populate_reject_small_mask, struct task_struct *task, u64 clone_flags) +{ + struct bpf_cpumask *local; + u8 toofewbits; + int ret; + + local = create_cpumask(); + if (!local) + return 0; + + /* The kfunc should prevent this operation */ + ret = bpf_cpumask_populate((struct cpumask *)local, &toofewbits, sizeof(toofewbits)); + if (ret != -EACCES) + err = 2; + + bpf_cpumask_release(local); + + return 0; +} + +/* Mask is guaranteed to be large enough for bpf_cpumask_t. */ +#define CPUMASK_TEST_MASKLEN (sizeof(cpumask_t)) + +/* Add an extra word for the test_populate_reject_unaligned test. */ +u64 bits[CPUMASK_TEST_MASKLEN / 8 + 1]; +extern bool CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS __kconfig __weak; + +SEC("tp_btf/task_newtask") +__success +int BPF_PROG(test_populate_reject_unaligned, struct task_struct *task, u64 clone_flags) +{ + struct bpf_cpumask *mask; + char *src; + int ret; + + /* Skip if unaligned accesses are fine for this arch. */ + if (CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) + return 0; + + mask = bpf_cpumask_create(); + if (!mask) { + err = 1; + return 0; + } + + /* Misalign the source array by a byte. */ + src = &((char *)bits)[1]; + + ret = bpf_cpumask_populate((struct cpumask *)mask, src, CPUMASK_TEST_MASKLEN); + if (ret != -EINVAL) + err = 2; + + bpf_cpumask_release(mask); + + return 0; +} + + +SEC("tp_btf/task_newtask") +__success +int BPF_PROG(test_populate, struct task_struct *task, u64 clone_flags) +{ + struct bpf_cpumask *mask; + bool bit; + int ret; + int i; + + /* Set only odd bits. */ + __builtin_memset(bits, 0xaa, CPUMASK_TEST_MASKLEN); + + mask = bpf_cpumask_create(); + if (!mask) { + err = 1; + return 0; + } + + /* Pass the entire bits array, the kfunc will only copy the valid bits. */ + ret = bpf_cpumask_populate((struct cpumask *)mask, bits, CPUMASK_TEST_MASKLEN); + if (ret) { + err = 2; + goto out; + } + + /* + * Test is there to appease the verifier. We cannot directly + * access NR_CPUS, the upper bound for nr_cpus, so we infer + * it from the size of cpumask_t. + */ + if (nr_cpus < 0 || nr_cpus >= CPUMASK_TEST_MASKLEN * 8) { + err = 3; + goto out; + } + + bpf_for(i, 0, nr_cpus) { + /* Odd-numbered bits should be set, even ones unset. */ + bit = bpf_cpumask_test_cpu(i, (const struct cpumask *)mask); + if (bit == (i % 2 != 0)) + continue; + + err = 4; + break; + } + +out: + bpf_cpumask_release(mask); + + return 0; +} + +#undef CPUMASK_TEST_MASKLEN From patchwork Fri Mar 7 04:17:37 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Emil Tsalapatis X-Patchwork-Id: 14005883 X-Patchwork-Delegate: bpf@iogearbox.net Received: from mail-qk1-f182.google.com (mail-qk1-f182.google.com [209.85.222.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9768B18DF86 for ; Fri, 7 Mar 2025 04:17:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.222.182 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321066; cv=none; b=HOD3ZpibaEMN//jJIjvZBN3TD0ElhZ2JVB6wWpTGeMl7Q23YKeHyeVuaBZ1syarX7sCBJou1OUy/LHcWvBQPt8S1An1f1MXIoGFITD65ieBV3QJ3h4A9ji73EMcGkfRBLDbavfg6EvtZt/2s3BmovkVkQX40/MXEPoEuPNovoHM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321066; c=relaxed/simple; bh=pffXZtsvnmipo8zxunVckuQSInHRDVZnsOQw0ZSXVIw=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EFXdVNkJFhAx8AMkN3T4sJQ2bpqZ6X7zm1syPNaJxjQfHxw26OvmqxcJb5UvpCPVUlnyOilFOMrjjKZuLgFH9wPMZrhqxVmDYPHppx+G5kITTHNwi7LeRBNa81U/Jp8B8uKf0sxw73jY7vp98f+brL5BZhIR9HFbwrA7XI6rGSg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com; spf=pass smtp.mailfrom=etsalapatis.com; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b=VWuAe+Oc; arc=none smtp.client-ip=209.85.222.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b="VWuAe+Oc" Received: by mail-qk1-f182.google.com with SMTP id af79cd13be357-7c3ca86e8c3so98506285a.1 for ; Thu, 06 Mar 2025 20:17:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=etsalapatis-com.20230601.gappssmtp.com; s=20230601; t=1741321063; x=1741925863; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=lOjHJ/XEu8gnFlKw6M/pi/0WwNdhD20bEIw+Ix+DTXM=; b=VWuAe+OcFJr28ZbnzruBbeMawbeDNAiupFvoSji3H+DRvsEjRsPdH6L2s3MlbSAjbd KMPhHL3+xtBySfPa1yrMBdQ7KMLD/LHQD8NQo7UTPSEPQ0eGZD7qf9AY5LKXsiKn9ty2 nsNztZAcIKNHy0Z39dwDrfuw4KLGyZO0GLugNSqTliZtaRI/M9caqsZ3zCNGwKe+YGU6 tv7TowIMm8cbxzHzjdM/qXZMqUYk96R9HwI5TxAfqFFc8ZDkDHZC8RFuyWMThJKaCCno ZcRp7LGLpQ6OGUS70FkIUxj76nfkkhsXjfJteC3E6M+HztER9FkclD5AaSZ17GCyBNnC PpZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741321063; x=1741925863; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=lOjHJ/XEu8gnFlKw6M/pi/0WwNdhD20bEIw+Ix+DTXM=; b=YdFbKvDqVO8J+IrvCWVRYpjIQ8/eId3QaEA1PZvHzXSZ8VbC4TamealuCxhLApC9rW 0+t7cmRjbNJUe0GJdDePcd4T0MFqnAIxQWMnFi1gVBVrcvMttomXUuQ9gCdLTtD94nW8 RYgUJcOp3Iy9YT9TNokZ8Tug8fTAipI8YdC8836Ok+d3pHr0Gi0mikgX7HQLOVNC31fS GPXISvPMoKnw0uK4gBQ6cE8XLNNIsSfq59m6Edkt9zMIw3+ioBdmEiEMLqmb2hUzhu15 tIJV1zIZ5lsFfvP/OOi/J7DSpgOV9Wos92GIhfRWTxr4bcX2K7XxhX/RZorT/Er5DX/q zzSA== X-Gm-Message-State: AOJu0Yyl1nFI7kiKSdYb5k+lYRSMGd8817csGKKQi41ri7Tv6HDHzMtA FaefMjpiIl4HpH42r0xyzCuBIf/SRcX4fcOYBHVelkbIL2sXbEk9cHlCsVOsC3tXWB0WbYxz2Jq YNIkz6A== X-Gm-Gg: ASbGnct8t2UKY1G500/5hj0kexDygTWzmCxvedKEmkMZNCtf2g5vOuF33l5TO2hbmVc +735OtH0w8xzaEQoag3ueDBlDGLYeCYg3hBycUbirei9+USXs2DA+yB3uiw4m3P9CX/8qYLB4ZS XtYnnSFBskpQSyT1TozBxYWvtqR6/ulu+W6lp7ICiVWfqfAcpwCx6FGcS6Er8Oqp0cDvcup+dNR WSnt9BYQXklR9IOG2Vp4TNAbD+BtcXV29WcOIoM1YMoNar/QdK0XeC5hZZi1dIrWZ0OyaKdNAPm evGG8m70ifvFwYAOvAo2CqIjiE5n5O9H59qYpGGj2Q== X-Google-Smtp-Source: AGHT+IEXrYZY523Nu1GWO26r3Rz5yymxhU1g54usZ9bHZKUCJJ85RoLf1D25CLbaV3CGDemboIsZTg== X-Received: by 2002:a05:620a:4885:b0:7c3:d314:7238 with SMTP id af79cd13be357-7c4e61a0c12mr300898285a.49.1741321063354; Thu, 06 Mar 2025 20:17:43 -0800 (PST) Received: from boreas.. ([140.174.215.88]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7c3e534ba85sm186108085a.28.2025.03.06.20.17.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Mar 2025 20:17:43 -0800 (PST) From: Emil Tsalapatis To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, yonghong.song@linux.dev, tj@kernel.org, memxor@gmail.com, houtao@huaweicloud.com, Emil Tsalapatis Subject: [PATCH v5 3/4] bpf: fix missing kdoc string fields in cpumask.c Date: Thu, 6 Mar 2025 23:17:37 -0500 Message-ID: <20250307041738.6665-4-emil@etsalapatis.com> X-Mailer: git-send-email 2.47.1 In-Reply-To: <20250307041738.6665-1-emil@etsalapatis.com> References: <20250307041738.6665-1-emil@etsalapatis.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net Some bpf_cpumask-related kfuncs have kdoc strings that are missing return values. Add a the missing descriptions for the return values. Reported-by: Alexei Starovoitov Signed-off-by: Emil Tsalapatis (Meta) --- kernel/bpf/cpumask.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/kernel/bpf/cpumask.c b/kernel/bpf/cpumask.c index 77900cbbbd75..9876c5fe6c2a 100644 --- a/kernel/bpf/cpumask.c +++ b/kernel/bpf/cpumask.c @@ -45,6 +45,10 @@ __bpf_kfunc_start_defs(); * * bpf_cpumask_create() allocates memory using the BPF memory allocator, and * will not block. It may return NULL if no memory is available. + * + * Return: + * * A pointer to a new struct bpf_cpumask instance on success. + * * NULL if the BPF memory allocator is out of memory. */ __bpf_kfunc struct bpf_cpumask *bpf_cpumask_create(void) { @@ -71,6 +75,10 @@ __bpf_kfunc struct bpf_cpumask *bpf_cpumask_create(void) * Acquires a reference to a BPF cpumask. The cpumask returned by this function * must either be embedded in a map as a kptr, or freed with * bpf_cpumask_release(). + * + * Return: + * * The struct bpf_cpumask pointer passed to the function. + * */ __bpf_kfunc struct bpf_cpumask *bpf_cpumask_acquire(struct bpf_cpumask *cpumask) { @@ -106,6 +114,9 @@ CFI_NOSEAL(bpf_cpumask_release_dtor); * * Find the index of the first nonzero bit of the cpumask. A struct bpf_cpumask * pointer may be safely passed to this function. + * + * Return: + * * The index of the first nonzero bit in the struct cpumask. */ __bpf_kfunc u32 bpf_cpumask_first(const struct cpumask *cpumask) { @@ -119,6 +130,9 @@ __bpf_kfunc u32 bpf_cpumask_first(const struct cpumask *cpumask) * * Find the index of the first unset bit of the cpumask. A struct bpf_cpumask * pointer may be safely passed to this function. + * + * Return: + * * The index of the first zero bit in the struct cpumask. */ __bpf_kfunc u32 bpf_cpumask_first_zero(const struct cpumask *cpumask) { @@ -133,6 +147,9 @@ __bpf_kfunc u32 bpf_cpumask_first_zero(const struct cpumask *cpumask) * * Find the index of the first nonzero bit of the AND of two cpumasks. * struct bpf_cpumask pointers may be safely passed to @src1 and @src2. + * + * Return: + * * The index of the first bit that is nonzero in both cpumask instances. */ __bpf_kfunc u32 bpf_cpumask_first_and(const struct cpumask *src1, const struct cpumask *src2) @@ -414,6 +431,9 @@ __bpf_kfunc u32 bpf_cpumask_any_and_distribute(const struct cpumask *src1, * @cpumask: The cpumask being queried. * * Count the number of set bits in the given cpumask. + * + * Return: + * * The number of bits set in the mask. */ __bpf_kfunc u32 bpf_cpumask_weight(const struct cpumask *cpumask) { From patchwork Fri Mar 7 04:17:38 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Emil Tsalapatis X-Patchwork-Id: 14005884 X-Patchwork-Delegate: bpf@iogearbox.net Received: from mail-qk1-f181.google.com (mail-qk1-f181.google.com [209.85.222.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BDB618FDDF for ; Fri, 7 Mar 2025 04:17:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.222.181 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321067; cv=none; b=rpXd3PJEaQ6xIckZSyRKi5+l+ZeevaFG5AD309zz7UdLDmUa9GkZPhp7ewPZQ7OfYCpErXEG08uRBnznMzIc8enct+JIQr/n+62Ev7xsDOCydwFNFCqD4STkBn2RDJf6OUxN+ZI3KpWBU466ZTwmA+FnuofROfdCpFHEAhrlkE8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741321067; c=relaxed/simple; bh=yoOB3XBAUFWLJl/+mhpsMsnVbIGA2WEJ3UCxQBXv/pc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=m7kaSw19Xs1tZKhmp4w/7iL5orp0nxcr/I9Xed7BvkNqzxFmMLS5K2ZXUJn2Bwizx+5XtOWw7nMXkQ1QZhaqyj2jS2EqCqiE486n89w+sFmwOdhHCdK+/j5dCZA7nrX/aSO6swkFABWAOTzpekfHvGkedWV6KbHZMCbgq+HWty8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com; spf=pass smtp.mailfrom=etsalapatis.com; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b=tf8m70e7; arc=none smtp.client-ip=209.85.222.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=etsalapatis.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=etsalapatis-com.20230601.gappssmtp.com header.i=@etsalapatis-com.20230601.gappssmtp.com header.b="tf8m70e7" Received: by mail-qk1-f181.google.com with SMTP id af79cd13be357-7c08b14baa9so136020785a.3 for ; Thu, 06 Mar 2025 20:17:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=etsalapatis-com.20230601.gappssmtp.com; s=20230601; t=1741321064; x=1741925864; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ysk8uSizI198pwDNFtWduhkixI8nyvj/TN+YYY0BGnE=; b=tf8m70e7m+E/z2pI14czSaE1jrXQ6Rj9cFl1RVDjN5g4sR9pKmfNJzOk64QmfXGVhy n5dDiS7TA1JQLJYwT75UtB/SVhQc1BqgmP3gHLZlbm9ub1ck/MFq1kud+cgE8tFJUQfk Bksknw98T3zXCx6S2XnqcIG+FTkqHrWDjHmwFqxb5IytWVvKzTT8Qx/fDCGAcZtu1qgy rXMUHJf8axoYilNee/W3J5UDe5vbtBXkIUXeabLNnNGDh09pBA1YQjaejkWk/IIjO9dc QTizNQkPHgBUVxdWIc9V1/Lzw3FEt9BU28UfgOSdzu1U3UeOkQhe/TsXDBYxMYfxYzf8 VDWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1741321064; x=1741925864; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ysk8uSizI198pwDNFtWduhkixI8nyvj/TN+YYY0BGnE=; b=iuNXJNAiXgb6ziZqdhe9fIUvJhcvBsmuwjPIDdneFLGCNel9vh0X8MVkJ537JdktBB 7XpnYt9Ww/Ia73kKfcu52FcYnmD2VQ3Tg1oOGxlKby8u7afc9+ArcMJrh6xquiyCp2b+ Sn0jU69p5xPQTlYuQESpsqeq+G3GqiE8H1svk82dcRIvSQnqK1v/HZK94D7i7T0uC38I Y9XNO4l0c7SjHVPhJ/oHTYvfilWG4KuhTDGDgPKd2Bx3aUBWLsOSr2YtPYdjQRtLiU00 qDGJXiOezfbclsy/KIf/meYefm6KMq6o7b9ZVuRyoYZzxLACITDJJokFqYA8zTMU5OPy ZgpQ== X-Gm-Message-State: AOJu0Yzj/5c396FU9rruMpOHKyJtC4yi9l1bg5y4c/Zy99Pth4nD4hUV /EHvAUAG56dKhS3msIJV950APSoxlYBwKiNulx4vIrB6cclH+mRrD0Q4eoQdth5FACSxGNqZm3B FbAOOIQ== X-Gm-Gg: ASbGncvi6tkysHTKUbQQrKNfPHw16cSN5t/bKZB/wW2KVVYeQyGjtjVTu647b5ANLGs 28QHEMU8y1onWfSXTQdz3Ez4PDjlM8IQi7ux7wSgWBKi+z3HURYWNvQg2dyCTPkV9kstCJarGdr SSkWHskFW3BLyrmhl/8zdI6ju/BZmuVLCg4dG1LSsbUGjP8Gn2FM+9g4UskFJ/FOJ9CsDO05hyZ dEU16ftkW+WVocmTAoyWMRMzuf3CDsdZq5RgHG36seKqmhrSaJYgv2tJ/wM7QiEEXovMTG8iFtJ B3l5ltcV2Di90O2Ggm+h+bykBBh+rkw2U6GGN0+RYA== X-Google-Smtp-Source: AGHT+IFNAERyWPisIpQ5LXZbWMPq/B3ycSGtAxfFqyXRpDxX6+N+9uuZ8b7mXwkury/iu+YagWPmBw== X-Received: by 2002:a05:620a:2787:b0:7c3:c199:c3b0 with SMTP id af79cd13be357-7c4e610578fmr332020085a.32.1741321064056; Thu, 06 Mar 2025 20:17:44 -0800 (PST) Received: from boreas.. ([140.174.215.88]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7c3e534ba85sm186108085a.28.2025.03.06.20.17.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Mar 2025 20:17:43 -0800 (PST) From: Emil Tsalapatis To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, yonghong.song@linux.dev, tj@kernel.org, memxor@gmail.com, houtao@huaweicloud.com, Emil Tsalapatis Subject: [PATCH v5 4/4] selftests: bpf: add missing cpumask test to runner and annotate existing tests Date: Thu, 6 Mar 2025 23:17:38 -0500 Message-ID: <20250307041738.6665-5-emil@etsalapatis.com> X-Mailer: git-send-email 2.47.1 In-Reply-To: <20250307041738.6665-1-emil@etsalapatis.com> References: <20250307041738.6665-1-emil@etsalapatis.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net The BPF cpumask selftests are supposed to be run twice, once to ensure that they load properly and once to actually test their behavior. The load test is triggered by annotating the tests with __success, while the run test needs adding to tools/testing/selftests/bpf/prog_tests/cpumask.c the name of the new test. However, most existing tests are missing the __success annotation, and test_refcount_null_tracking is missing from the main test file. Add the missing annotations and test name. Signed-off-by: Emil Tsalapatis (Meta) --- .../testing/selftests/bpf/prog_tests/cpumask.c | 1 + .../selftests/bpf/progs/cpumask_success.c | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/cpumask.c b/tools/testing/selftests/bpf/prog_tests/cpumask.c index 9b09beba988b..447a6e362fcd 100644 --- a/tools/testing/selftests/bpf/prog_tests/cpumask.c +++ b/tools/testing/selftests/bpf/prog_tests/cpumask.c @@ -25,6 +25,7 @@ static const char * const cpumask_success_testcases[] = { "test_global_mask_nested_deep_rcu", "test_global_mask_nested_deep_array_rcu", "test_cpumask_weight", + "test_refcount_null_tracking", "test_populate_reject_small_mask", "test_populate_reject_unaligned", "test_populate", diff --git a/tools/testing/selftests/bpf/progs/cpumask_success.c b/tools/testing/selftests/bpf/progs/cpumask_success.c index 51f3dcf8869f..8abae7a59f92 100644 --- a/tools/testing/selftests/bpf/progs/cpumask_success.c +++ b/tools/testing/selftests/bpf/progs/cpumask_success.c @@ -136,6 +136,7 @@ static bool create_cpumask_set(struct bpf_cpumask **out1, } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_alloc_free_cpumask, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -152,6 +153,7 @@ int BPF_PROG(test_alloc_free_cpumask, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_set_clear_cpu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -181,6 +183,7 @@ int BPF_PROG(test_set_clear_cpu, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_setall_clear_cpu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -210,6 +213,7 @@ int BPF_PROG(test_setall_clear_cpu, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_first_firstzero_cpu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -249,6 +253,7 @@ int BPF_PROG(test_first_firstzero_cpu, struct task_struct *task, u64 clone_flags } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_firstand_nocpu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *mask1, *mask2; @@ -281,6 +286,7 @@ int BPF_PROG(test_firstand_nocpu, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_test_and_set_clear, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -313,6 +319,7 @@ int BPF_PROG(test_test_and_set_clear, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_and_or_xor, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *mask1, *mask2, *dst1, *dst2; @@ -360,6 +367,7 @@ int BPF_PROG(test_and_or_xor, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_intersects_subset, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *mask1, *mask2, *dst1, *dst2; @@ -402,6 +410,7 @@ int BPF_PROG(test_intersects_subset, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_copy_any_anyand, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *mask1, *mask2, *dst1, *dst2; @@ -456,6 +465,7 @@ int BPF_PROG(test_copy_any_anyand, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_insert_leave, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -471,6 +481,7 @@ int BPF_PROG(test_insert_leave, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_insert_remove_release, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *cpumask; @@ -501,6 +512,7 @@ int BPF_PROG(test_insert_remove_release, struct task_struct *task, u64 clone_fla } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_rcu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *local, *prev; @@ -534,6 +546,7 @@ int BPF_PROG(test_global_mask_rcu, struct task_struct *task, u64 clone_flags) } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_array_one_rcu, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *local, *prev; @@ -632,12 +645,14 @@ static int _global_mask_array_rcu(struct bpf_cpumask **mask0, } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_array_rcu, struct task_struct *task, u64 clone_flags) { return _global_mask_array_rcu(&global_mask_array[0], &global_mask_array[1]); } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_array_l2_rcu, struct task_struct *task, u64 clone_flags) { return _global_mask_array_rcu(&global_mask_array_l2[0][0], &global_mask_array_l2[1][0]); @@ -670,6 +685,7 @@ int BPF_PROG(test_global_mask_nested_rcu, struct task_struct *task, u64 clone_fl * incorrect offset. */ SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_nested_deep_rcu, struct task_struct *task, u64 clone_flags) { int r, i; @@ -689,6 +705,7 @@ int BPF_PROG(test_global_mask_nested_deep_rcu, struct task_struct *task, u64 clo } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_global_mask_nested_deep_array_rcu, struct task_struct *task, u64 clone_flags) { int i; @@ -706,6 +723,7 @@ int BPF_PROG(test_global_mask_nested_deep_array_rcu, struct task_struct *task, u } SEC("tp_btf/task_newtask") +__success int BPF_PROG(test_cpumask_weight, struct task_struct *task, u64 clone_flags) { struct bpf_cpumask *local;