linux-yocto/tools/testing/selftests/bpf
Matthew Wilcox (Oracle) f9a6f9a85a minmax: add in_range() macro
[ Upstream commit f9bff0e318 ]

Patch series "New page table range API", v6.

This patchset changes the API used by the MM to set up page table entries.
The four APIs are:

    set_ptes(mm, addr, ptep, pte, nr)
    update_mmu_cache_range(vma, addr, ptep, nr)
    flush_dcache_folio(folio)
    flush_icache_pages(vma, page, nr)

flush_dcache_folio() isn't technically new, but no architecture
implemented it, so I've done that for them.  The old APIs remain around
but are mostly implemented by calling the new interfaces.

The new APIs are based around setting up N page table entries at once.
The N entries belong to the same PMD, the same folio and the same VMA, so
ptep++ is a legitimate operation, and locking is taken care of for you.
Some architectures can do a better job of it than just a loop, but I have
hesitated to make too deep a change to architectures I don't understand
well.

One thing I have changed in every architecture is that PG_arch_1 is now a
per-folio bit instead of a per-page bit when used for dcache clean/dirty
tracking.  This was something that would have to happen eventually, and it
makes sense to do it now rather than iterate over every page involved in a
cache flush and figure out if it needs to happen.

The point of all this is better performance, and Fengwei Yin has measured
improvement on x86.  I suspect you'll see improvement on your architecture
too.  Try the new will-it-scale test mentioned here:
https://lore.kernel.org/linux-mm/20230206140639.538867-5-fengwei.yin@intel.com/
You'll need to run it on an XFS filesystem and have
CONFIG_TRANSPARENT_HUGEPAGE set.

This patchset is the basis for much of the anonymous large folio work
being done by Ryan, so it's received quite a lot of testing over the last
few months.

This patch (of 38):

Determine if a value lies within a range more efficiently (subtraction +
comparison vs two comparisons and an AND).  It also has useful (under some
circumstances) behaviour if the range exceeds the maximum value of the
type.  Convert all the conflicting definitions of in_range() within the
kernel; some can use the generic definition while others need their own
definition.

Link: https://lkml.kernel.org/r/20230802151406.3735276-1-willy@infradead.org
Link: https://lkml.kernel.org/r/20230802151406.3735276-2-willy@infradead.org
Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Eliav Farber <farbere@amazon.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2025-10-02 13:40:41 +02:00
..
benchs selftests/bpf: Clean up fmod_ret in bench_rename test script 2023-09-13 09:42:33 +02:00
bpf_testmod selftests/bpf: Add struct argument tests with fentry/fexit programs. 2022-09-06 19:51:14 -07:00
gnu
map_tests selftests/bpf: Fix compile error from rlim_t in sk_storage_map.c 2024-10-17 15:20:55 +02:00
prog_tests selftests/bpf: Fix a user_ringbuf failure with arm64 64KB page size 2025-08-28 16:25:58 +02:00
progs minmax: add in_range() macro 2025-10-02 13:40:41 +02:00
verifier bpf: Allow reads from uninit stack 2024-07-18 13:18:42 +02:00
.gitignore selftests/bpf: add sign-file to .gitignore 2022-09-23 18:14:44 -07:00
bench.c selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c 2024-10-17 15:20:56 +02:00
bench.h selftests/bpf: Fix missing UINT_MAX definitions in benchmarks 2024-10-17 15:20:56 +02:00
bpf_legacy.h selftests/bpf: remove last tests with legacy BPF map definitions 2022-06-28 13:13:33 -07:00
bpf_rand.h
bpf_sockopt_helpers.h
bpf_tcp_helpers.h selftests/bpf: Verify first of struct mptcp_sock 2022-05-20 15:36:48 -07:00
bpf_util.h
btf_helpers.c selftests/bpf: Test new enum kflag and enum64 API functions 2022-06-07 10:20:43 -07:00
btf_helpers.h
cap_helpers.c bpf: selftests: Add helpers to directly use the capget and capset syscall 2022-03-16 15:07:49 -07:00
cap_helpers.h bpf: selftests: Add helpers to directly use the capget and capset syscall 2022-03-16 15:07:49 -07:00
cgroup_getset_retval_hooks.h selftests/bpf: Make sure bpf_{g,s}et_retval is exposed everywhere 2022-08-23 16:08:22 -07:00
cgroup_helpers.c selftests/bpf: Fix issues in setup_classid_environment() 2024-02-05 20:12:50 +00:00
cgroup_helpers.h selftests/bpf: extend cgroup helpers 2022-08-25 11:35:37 -07:00
config selftests/bpf: Select CONFIG_FUNCTION_ERROR_INJECTION 2022-12-31 13:32:53 +01:00
config.s390x selftests/bpf: Copy over libbpf configs 2022-07-27 17:02:38 +02:00
config.x86_64 selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc 2022-09-21 17:33:42 -07:00
DENYLIST selftests/bpf: Copy over libbpf configs 2022-07-27 17:02:38 +02:00
DENYLIST.s390x selftests/bpf: Add tests for _opts variants of bpf_*_get_fd_by_id() 2024-10-17 15:20:55 +02:00
flow_dissector_load.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
flow_dissector_load.h
get_cgroup_id_user.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
ima_setup.sh selftests/bpf: Add test for bpf_lsm_kernel_read_file() 2022-03-10 18:57:55 -08:00
Makefile selftests/bpf: Fix cross-compiling urandom_read 2024-11-01 01:55:58 +01:00
Makefile.docs
netcnt_common.h
network_helpers.c selftests/bpf: Fix a fd leak in error paths in open_netns 2024-06-12 11:03:13 +02:00
network_helpers.h selftests/bpf: add missing header include for htons 2024-12-14 19:53:27 +01:00
README.rst selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
sdt-config.h selftests/bpf: Add basic USDT selftests 2022-04-05 13:16:08 -07:00
sdt.h selftests/bpf: Use asm constraint "m" for LoongArch 2024-12-27 13:53:00 +01:00
settings
task_local_storage_helpers.h selftests/bpf: Move sys_pidfd_open() into task_local_storage_helpers.h 2022-09-01 12:16:20 -07:00
test_bpftool_build.sh
test_bpftool_metadata.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_bpftool_synctypes.py bpftool: Use feature list in bash completion 2022-06-30 16:17:06 +02:00
test_bpftool.py
test_bpftool.sh
test_btf.h selftests/bpf: allow BTF specs and func infos in test_verifier tests 2022-06-20 17:40:51 -07:00
test_cgroup_storage.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
test_cpp.cpp selftests/bpf: Fix C++ compile error from missing _Bool type 2024-10-17 15:20:58 +02:00
test_dev_cgroup.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_doc_build.sh
test_flow_dissector.c
test_flow_dissector.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_ftrace.sh
test_iptunnel_common.h
test_kmod.sh selftests/bpf: Fix passing arguments via function in test_kmod.sh 2022-09-27 15:57:54 +02:00
test_lirc_mode2_user.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_lirc_mode2.sh selftests/bpf/test_lirc_mode2.sh: Exit with proper code 2022-03-21 14:48:06 +01:00
test_lpm_map.c bpf: Replace bpf_lpm_trie_key 0-length array with flexible array 2024-08-29 17:30:22 +02:00
test_lru_map.c selftests/bpf: Fix error compiling test_lru_map.c 2024-10-17 15:20:57 +02:00
test_lwt_ip_encap.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_lwt_seg6local.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_maps.c selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values 2024-03-26 18:20:31 -04:00
test_maps.h selftests/bpf: Add test result messages for test_task_storage_map_stress_lookup 2022-09-19 11:17:38 -07:00
test_offload.py selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_progs.c selftests/bpf: Fix backtrace printing for selftests crashes 2024-12-14 19:53:27 +01:00
test_progs.h selftests/bpf: Move test_progs helpers to testing_helpers object 2024-10-17 15:20:58 +02:00
test_select_reuseport_common.h
test_skb_cgroup_id_user.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
test_skb_cgroup_id.sh selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_sock_addr.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_sock_addr.sh
test_sock.c selftests/bpf: Fix attach tests retcode checks 2022-04-21 16:34:55 +02:00
test_sockmap.c selftests/bpf: Add push/pop checking for msg_verify_data in test_sockmap 2024-12-14 19:53:32 +01:00
test_sysctl.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_tag.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
test_tc_edt.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_tc_tunnel.sh tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind 2025-02-21 13:49:06 +01:00
test_tcp_check_syncookie_user.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
test_tcp_check_syncookie.sh selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_tcp_hdr_options.h
test_tcpbpf.h
test_tcpnotify_user.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_tcpnotify.h
test_tunnel.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_verifier_log.c selftests/bpf: Use libbpf 1.0 API mode instead of RLIMIT_MEMLOCK 2022-04-10 20:17:16 -07:00
test_verifier.c selftests/bpf: Fix casting error when cross-compiling test_verifier for 32-bit platforms 2022-11-09 12:23:25 -08:00
test_xdp_meta.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_xdp_redirect_multi.sh selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_xdp_redirect.sh selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_xdp_veth.sh selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
test_xdp_vlan_mode_generic.sh
test_xdp_vlan_mode_native.sh
test_xdp_vlan.sh selftests/bpf: fix missing BPF object files 2022-12-31 13:32:03 +01:00
test_xdping.sh selftests/bpf: Add drv mode testing for xdping 2022-06-03 14:53:34 -07:00
test_xsk.sh selftests: xsk: Disable IPv6 on VETH1 2023-05-11 23:03:20 +09:00
testing_helpers.c selftests/bpf: Move test_progs helpers to testing_helpers object 2024-10-17 15:20:58 +02:00
testing_helpers.h selftests/bpf: Move test_progs helpers to testing_helpers object 2024-10-17 15:20:58 +02:00
trace_helpers.c selftests/bpf: Fix file descriptor leak in load_kallsyms() 2022-04-05 16:49:32 -07:00
trace_helpers.h selftests/bpf: fix uprobe offset calculation in selftests 2022-01-26 20:04:01 -08:00
urandom_read_aux.c selftests/bpf: Add urandom_read shared lib and USDTs 2022-04-05 13:16:08 -07:00
urandom_read_lib1.c selftests/bpf: Add urandom_read shared lib and USDTs 2022-04-05 13:16:08 -07:00
urandom_read_lib2.c selftests/bpf: Add urandom_read shared lib and USDTs 2022-04-05 13:16:08 -07:00
urandom_read.c selftests/bpf: Add urandom_read shared lib and USDTs 2022-04-05 13:16:08 -07:00
verify_sig_setup.sh selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc 2022-09-21 17:33:42 -07:00
veristat.c selftests/bpf: allow to adjust BPF verifier log level in veristat 2022-09-23 18:14:45 -07:00
veristat.cfg selftests/bpf: add ability to filter programs in veristat 2022-09-21 19:41:37 -07:00
vmtest.sh selftests/bpf: Fix vmtest.sh getopts optstring 2022-08-09 22:30:02 +02:00
with_addr.sh
with_tunnels.sh
xdp_redirect_multi.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
xdp_synproxy.c selftests/bpf: Initialize tc in xdp_synproxy 2023-03-10 09:32:58 +01:00
xdping.c selftests/bpf: Store BPF object files with .bpf.o extension 2022-09-02 15:55:37 +02:00
xdping.h
xsk_prereqs.sh selftests, xsk: Rename AF_XDP testing app 2022-07-08 14:22:15 +02:00
xsk.c selftests/xsk: Avoid use-after-free on ctx 2022-09-02 15:57:18 +02:00
xsk.h selftests/xsk: Introduce XDP prog load based on existing AF_XDP socket 2022-06-30 22:49:05 +02:00
xskxceiver.c selftests: xsk: Deflakify STATS_RX_DROPPED test 2023-05-11 23:03:21 +09:00
xskxceiver.h selftests: xsk: Use correct UMEM size in testapp_invalid_desc 2023-05-11 23:03:20 +09:00

==================
BPF Selftest Notes
==================
General instructions on running selftests can be found in
`Documentation/bpf/bpf_devel_QA.rst`__.

__ /Documentation/bpf/bpf_devel_QA.rst#q-how-to-run-bpf-selftests

=========================
Running Selftests in a VM
=========================

It's now possible to run the selftests using ``tools/testing/selftests/bpf/vmtest.sh``.
The script tries to ensure that the tests are run with the same environment as they
would be run post-submit in the CI used by the Maintainers.

This script downloads a suitable Kconfig and VM userspace image from the system used by
the CI. It builds the kernel (without overwriting your existing Kconfig), recompiles the
bpf selftests, runs them (by default ``tools/testing/selftests/bpf/test_progs``) and
saves the resulting output (by default in ``~/.bpf_selftests``).

Script dependencies:
- clang (preferably built from sources, https://github.com/llvm/llvm-project);
- pahole (preferably built from sources, https://git.kernel.org/pub/scm/devel/pahole/pahole.git/);
- qemu;
- docutils (for ``rst2man``);
- libcap-devel.

For more information on about using the script, run:

.. code-block:: console

  $ tools/testing/selftests/bpf/vmtest.sh -h

In case of linker errors when running selftests, try using static linking:

.. code-block:: console

  $ LDLIBS=-static vmtest.sh

.. note:: Some distros may not support static linking.

.. note:: The script uses pahole and clang based on host environment setting.
          If you want to change pahole and llvm, you can change `PATH` environment
          variable in the beginning of script.

.. note:: The script currently only supports x86_64 and s390x architectures.

Additional information about selftest failures are
documented here.

profiler[23] test failures with clang/llvm <12.0.0
==================================================

With clang/llvm <12.0.0, the profiler[23] test may fail.
The symptom looks like

.. code-block:: c

  // r9 is a pointer to map_value
  // r7 is a scalar
  17:       bf 96 00 00 00 00 00 00 r6 = r9
  18:       0f 76 00 00 00 00 00 00 r6 += r7
  math between map_value pointer and register with unbounded min value is not allowed

  // the instructions below will not be seen in the verifier log
  19:       a5 07 01 00 01 01 00 00 if r7 < 257 goto +1
  20:       bf 96 00 00 00 00 00 00 r6 = r9
  // r6 is used here

The verifier will reject such code with above error.
At insn 18 the r7 is indeed unbounded. The later insn 19 checks the bounds and
the insn 20 undoes map_value addition. It is currently impossible for the
verifier to understand such speculative pointer arithmetic.
Hence `this patch`__ addresses it on the compiler side. It was committed on llvm 12.

__ https://reviews.llvm.org/D85570

The corresponding C code

.. code-block:: c

  for (int i = 0; i < MAX_CGROUPS_PATH_DEPTH; i++) {
          filepart_length = bpf_probe_read_str(payload, ...);
          if (filepart_length <= MAX_PATH) {
                  barrier_var(filepart_length); // workaround
                  payload += filepart_length;
          }
  }

bpf_iter test failures with clang/llvm 10.0.0
=============================================

With clang/llvm 10.0.0, the following two bpf_iter tests failed:
  * ``bpf_iter/ipv6_route``
  * ``bpf_iter/netlink``

The symptom for ``bpf_iter/ipv6_route`` looks like

.. code-block:: c

  2: (79) r8 = *(u64 *)(r1 +8)
  ...
  14: (bf) r2 = r8
  15: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pi6 %02x ", &rt->fib6_dst.addr, rt->fib6_dst.plen);
  16: (7b) *(u64 *)(r8 +64) = r2
  only read is supported

The symptom for ``bpf_iter/netlink`` looks like

.. code-block:: c

  ; struct netlink_sock *nlk = ctx->sk;
  2: (79) r7 = *(u64 *)(r1 +8)
  ...
  15: (bf) r2 = r7
  16: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pK %-3d ", s, s->sk_protocol);
  17: (7b) *(u64 *)(r7 +0) = r2
  only read is supported

This is due to a llvm BPF backend bug. `The fix`__
has been pushed to llvm 10.x release branch and will be
available in 10.0.1. The patch is available in llvm 11.0.0 trunk.

__  https://reviews.llvm.org/D78466

bpf_verif_scale/loop6.bpf.o test failure with Clang 12
======================================================

With Clang 12, the following bpf_verif_scale test failed:
  * ``bpf_verif_scale/loop6.bpf.o``

The verifier output looks like

.. code-block:: c

  R1 type=ctx expected=fp
  The sequence of 8193 jumps is too complex.

The reason is compiler generating the following code

.. code-block:: c

  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      14:       16 05 40 00 00 00 00 00 if w5 == 0 goto +64 <LBB0_6>
      15:       bc 51 00 00 00 00 00 00 w1 = w5
      16:       04 01 00 00 ff ff ff ff w1 += -1
      17:       67 05 00 00 20 00 00 00 r5 <<= 32
      18:       77 05 00 00 20 00 00 00 r5 >>= 32
      19:       a6 01 01 00 05 00 00 00 if w1 < 5 goto +1 <LBB0_4>
      20:       b7 05 00 00 06 00 00 00 r5 = 6
  00000000000000a8 <LBB0_4>:
      21:       b7 02 00 00 00 00 00 00 r2 = 0
      22:       b7 01 00 00 00 00 00 00 r1 = 0
  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      23:       7b 1a e0 ff 00 00 00 00 *(u64 *)(r10 - 32) = r1
      24:       7b 5a c0 ff 00 00 00 00 *(u64 *)(r10 - 64) = r5

Note that insn #15 has w1 = w5 and w1 is refined later but
r5(w5) is eventually saved on stack at insn #24 for later use.
This cause later verifier failure. The bug has been `fixed`__ in
Clang 13.

__  https://reviews.llvm.org/D97479

BPF CO-RE-based tests and Clang version
=======================================

A set of selftests use BPF target-specific built-ins, which might require
bleeding-edge Clang versions (Clang 12 nightly at this time).

Few sub-tests of core_reloc test suit (part of test_progs test runner) require
the following built-ins, listed with corresponding Clang diffs introducing
them to Clang/LLVM. These sub-tests are going to be skipped if Clang is too
old to support them, they shouldn't cause build failures or runtime test
failures:

- __builtin_btf_type_id() [0_, 1_, 2_];
- __builtin_preserve_type_info(), __builtin_preserve_enum_value() [3_, 4_].

.. _0: https://reviews.llvm.org/D74572
.. _1: https://reviews.llvm.org/D74668
.. _2: https://reviews.llvm.org/D85174
.. _3: https://reviews.llvm.org/D83878
.. _4: https://reviews.llvm.org/D83242

Floating-point tests and Clang version
======================================

Certain selftests, e.g. core_reloc, require support for the floating-point
types, which was introduced in `Clang 13`__. The older Clang versions will
either crash when compiling these tests, or generate an incorrect BTF.

__  https://reviews.llvm.org/D83289

Kernel function call test and Clang version
===========================================

Some selftests (e.g. kfunc_call and bpf_tcp_ca) require a LLVM support
to generate extern function in BTF.  It was introduced in `Clang 13`__.

Without it, the error from compiling bpf selftests looks like:

.. code-block:: console

  libbpf: failed to find BTF for extern 'tcp_slow_start' [25] section: -2

__ https://reviews.llvm.org/D93563

btf_tag test and Clang version
==============================

The btf_tag selftest requires LLVM support to recognize the btf_decl_tag and
btf_type_tag attributes. They are introduced in `Clang 14` [0_, 1_].
The subtests ``btf_type_tag_user_{mod1, mod2, vmlinux}`` also requires
pahole version ``1.23``.

Without them, the btf_tag selftest will be skipped and you will observe:

.. code-block:: console

  #<test_num> btf_tag:SKIP

.. _0: https://reviews.llvm.org/D111588
.. _1: https://reviews.llvm.org/D111199

Clang dependencies for static linking tests
===========================================

linked_vars, linked_maps, and linked_funcs tests depend on `Clang fix`__ to
generate valid BTF information for weak variables. Please make sure you use
Clang that contains the fix.

__ https://reviews.llvm.org/D100362

Clang relocation changes
========================

Clang 13 patch `clang reloc patch`_  made some changes on relocations such
that existing relocation types are broken into more types and
each new type corresponds to only one way to resolve relocation.
See `kernel llvm reloc`_ for more explanation and some examples.
Using clang 13 to compile old libbpf which has static linker support,
there will be a compilation failure::

  libbpf: ELF relo #0 in section #6 has unexpected type 2 in .../bpf_tcp_nogpl.bpf.o

Here, ``type 2`` refers to new relocation type ``R_BPF_64_ABS64``.
To fix this issue, user newer libbpf.

.. Links
.. _clang reloc patch: https://reviews.llvm.org/D102712
.. _kernel llvm reloc: /Documentation/bpf/llvm_reloc.rst

Clang dependencies for the u32 spill test (xdpwall)
===================================================
The xdpwall selftest requires a change in `Clang 14`__.

Without it, the xdpwall selftest will fail and the error message
from running test_progs will look like:

.. code-block:: console

  test_xdpwall:FAIL:Does LLVM have https://reviews.llvm.org/D109073? unexpected error: -4007

__ https://reviews.llvm.org/D109073