From nobody Mon Feb 9 15:11:27 2026 Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8E0171F1512 for ; Thu, 1 May 2025 14:28:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.50 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; cv=none; b=hr3fIVVWAt38P+EywM9hbjNdVnO3cO6zpDjwznvvPz+lLmiz7mp5buwRQxkX1FLF+mpFhQEVV0G2I285Qkl4u//ZoK3g9I1AiYDjTbB1vCjD0yVXEhF7al/AfqfDPlLyBakhwBdnVnvqDi5a7CsnkAF/hYd04n0WvPvpKS4YEU8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746109711; c=relaxed/simple; bh=Bdk+C4naWZdvQAznGsmCl57RU0n4Z14M9ctNJtILpyE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=RmBXXO5/rmFLrwPuwLkZKpjZ+ctNX6by/jK5Nh8/e3PGEHldSJBPnV3kZIxvYn4ZCnbCwy8hEuuj7BCMQ1nUNMDbQY1RNSjcVeLvf+LoW5bTlYq/NWzPC0vFcquhcXYKvEonVxIyTqyqQhiTFZyfIlkAk+t1NoIFpZQ1yipKRU8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com; spf=pass smtp.mailfrom=isovalent.com; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b=gXRCHB6m; arc=none smtp.client-ip=209.85.128.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=isovalent.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=isovalent.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=isovalent.com header.i=@isovalent.com header.b="gXRCHB6m" Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-441ab63a415so9463285e9.3 for ; Thu, 01 May 2025 07:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1746109707; x=1746714507; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=gXRCHB6mtmqMV/okRDRU9EyktzsXSmmV5WPy+DfL0lDyiWr0OB5HCc/1ZrT4ew0kHu nIndcfA/LBA6um74Q1eZmr41F0vbLUxiNlxgAiUsx/uX9SUqaiVcwRbx9XBFLPe199Zm CY/yHy587MbF25y7T6CqrdrlQK4JwLqVlMHg1iISal17vLmYWpL4Ibs+SYS1lH4FB7L5 dCDdM1oyODjVwkifMBoQM+Uoo5UQytv93bR+OQvCttuuKmHECIK3gxhRKmU/WNslRLpl zo8gcYTUKtLKuK1Hv5+TczEYerBM4VwS95z6CXICTVieAyHedlnr69nzEW9K8oHh65yF Hbuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746109707; x=1746714507; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rQvdlwU602sy2200o3Yv2M/yNfMxMp0HA+iE0MAoltw=; b=aRA+11zRN9SiGERR/h28pNasXzg0+pN1IbOWjNS2EWaEt1jRUf7XVGUYzuk4gOxQGW te1mLffBPVqfp4Wkq48i2VI89eKmzyAfuu+7c1/eTPbyRQH92XZJIchXBpKaOljS/y4N WVQ37b+iCgzH+VHdEQqdDyEXB1sFqduhPnpmuYtRWcMnqUkeumaAJU+vOOG8Vf0/fCY6 TUlIi9TZADJxLB6FsjkpYqqrym+iZV6BNPJzERvbUM4awMoxh38de0Dd92CEXAxb1nbZ xVO/lkbUsKNWpvHbc0zv9fcch5a0656+imjMoulRw5BI7leynuNQBXElitFQura4L09X li9w== X-Forwarded-Encrypted: i=1; AJvYcCUNpEw10IGCjLvoUtraT2OjtEvwrr16R2bhmKKzQ3EDxsK0RM0ghfouc6+29nSap6BujWsBNQFnOc2DoIE=@vger.kernel.org X-Gm-Message-State: AOJu0YwkClX91+HJngYXwSVAglI4zHBpziPC+P1jCcEjvDMN/f0NXf3F w4HXKe5gl63/cJBOu5AcGdi/PgqaOlWbbpq9+0KyAG6xTXdTbO7v67Q3FmVC4s0= X-Gm-Gg: ASbGncuzIaLDas4CocYhE0CJhua0gaBlxPHOxDUfuDI1CpfAH5ErLPEdp7HRuE2bbi0 jYyg/bZB//3zbErhgMf7iuYWFFtPeppOpQHDUDbMLzpUUxcwg4twexkjHkQnapcpQpb9VfGi4Zy EYC50IoKA5/Y/mvw2I0MWNHEzdNyz+/7/ktqTgGLLekXVVyrZM+6LLWQIMXBt6GW1oqNDAosIVG hdA5ZyXgnC70VfePU+5T33xotYXcOVCUtuECIeknf0PDXmlw8XUqka2I/5Xfy+bXmtmPxxvCxZ3 M/CGqoWTPHz2W/KOF/8OMrHodIIsCx+HdMWjMHLoBleJM4RmS3nPgbrizLN1GmhHieb6vigjG6E nVaUkhinCCgdxZDBtOwW2VK+5TDr/6saV+xId X-Google-Smtp-Source: AGHT+IGy0LDUHyJXOVHAC98GhTWux6/a5g/Z2ztBK4/3fRtxG05OxDLTr5GuNeJQsjhZZpo79dJY/A== X-Received: by 2002:a05:600c:502b:b0:43c:fb8e:aec0 with SMTP id 5b1f17b1804b1-441b1f2f0fdmr58254725e9.1.1746109706849; Thu, 01 May 2025 07:28:26 -0700 (PDT) Received: from [192.168.1.240] (0.0.6.0.0.0.0.0.0.0.0.0.0.0.0.0.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff::600]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-441b89d15dasm13908445e9.16.2025.05.01.07.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 May 2025 07:28:26 -0700 (PDT) From: Lorenz Bauer Date: Thu, 01 May 2025 15:28:21 +0100 Subject: [PATCH bpf-next 1/2] btf: allow mmap of vmlinux btf Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250501-vmlinux-mmap-v1-1-aa2724572598@isovalent.com> References: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> In-Reply-To: <20250501-vmlinux-mmap-v1-0-aa2724572598@isovalent.com> To: Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, Lorenz Bauer X-Mailer: b4 0.14.2 User space needs access to kernel BTF for many modern features of BPF. Right now each process needs to read the BTF blob either in pieces or as a whole. Allow mmaping the sysfs file so that processes can directly access the memory allocated for it in the kernel. Signed-off-by: Lorenz Bauer --- include/asm-generic/vmlinux.lds.h | 3 ++- kernel/bpf/sysfs_btf.c | 25 +++++++++++++++++++++++-- 2 files changed, 25 insertions(+), 3 deletions(-) diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinu= x.lds.h index 58a635a6d5bdf0c53c267c2a3d21a5ed8678ce73..1750390735fac7637cc4d2fa05f= 96cb2a36aa448 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -667,10 +667,11 @@ defined(CONFIG_AUTOFDO_CLANG) || defined(CONFIG_PROPE= LLER_CLANG) */ #ifdef CONFIG_DEBUG_INFO_BTF #define BTF \ + . =3D ALIGN(PAGE_SIZE); \ .BTF : AT(ADDR(.BTF) - LOAD_OFFSET) { \ BOUNDED_SECTION_BY(.BTF, _BTF) \ } \ - . =3D ALIGN(4); \ + . =3D ALIGN(PAGE_SIZE); \ .BTF_ids : AT(ADDR(.BTF_ids) - LOAD_OFFSET) { \ *(.BTF_ids) \ } diff --git a/kernel/bpf/sysfs_btf.c b/kernel/bpf/sysfs_btf.c index 81d6cf90584a7157929c50f62a5c6862e7a3d081..7651f37b82c78b8afd96078567a= 5b6612f5f4d97 100644 --- a/kernel/bpf/sysfs_btf.c +++ b/kernel/bpf/sysfs_btf.c @@ -7,18 +7,39 @@ #include #include #include +#include +#include =20 /* See scripts/link-vmlinux.sh, gen_btf() func for details */ extern char __start_BTF[]; extern char __stop_BTF[]; =20 +struct kobject *btf_kobj; + +static int btf_vmlinux_mmap(struct file *filp, struct kobject *kobj, + const struct bin_attribute *attr, + struct vm_area_struct *vma) +{ + size_t btf_size =3D __stop_BTF - __start_BTF; + + if (kobj !=3D btf_kobj) + return -EINVAL; + + if (vma->vm_flags & (VM_WRITE|VM_EXEC|VM_MAYSHARE)) + return -EACCES; + + vm_flags_clear(vma, VM_MAYEXEC); + vm_flags_clear(vma, VM_MAYWRITE); + + return vm_iomap_memory(vma, virt_to_phys(__start_BTF), btf_size); +} + static struct bin_attribute bin_attr_btf_vmlinux __ro_after_init =3D { .attr =3D { .name =3D "vmlinux", .mode =3D 0444, }, .read_new =3D sysfs_bin_attr_simple_read, + .mmap =3D btf_vmlinux_mmap, }; =20 -struct kobject *btf_kobj; - static int __init btf_vmlinux_init(void) { bin_attr_btf_vmlinux.private =3D __start_BTF; --=20 2.49.0