[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <71f71244-fad6-424e-8335-5476007418a0@kernel.org>
Date: Thu, 15 Jan 2026 11:36:40 +0000
From: Quentin Monnet <qmo@...nel.org>
To: Alexis Lothoré (eBPF Foundation)
<alexis.lothore@...tlin.com>, Andrii Nakryiko <andrii@...nel.org>,
Eduard Zingerman <eddyz87@...il.com>, Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
Martin KaFai Lau <martin.lau@...ux.dev>, Song Liu <song@...nel.org>,
Yonghong Song <yonghong.song@...ux.dev>,
John Fastabend <john.fastabend@...il.com>, KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...ichev.me>, Hao Luo <haoluo@...gle.com>,
Jiri Olsa <jolsa@...nel.org>, Shuah Khan <shuah@...nel.org>
Cc: ebpf@...uxfoundation.org,
Bastien Curutchet <bastien.curutchet@...tlin.com>,
Thomas Petazzoni <thomas.petazzoni@...tlin.com>,
linux-kernel@...r.kernel.org, bpf@...r.kernel.org,
linux-kselftest@...r.kernel.org
Subject: Re: [PATCH bpf-next 3/4] selftests/bpf: add bpftool map manipulations
tests
2026-01-14 09:59 UTC+0100 ~ "Alexis Lothoré (eBPF Foundation)"
<alexis.lothore@...tlin.com>
> The test_bpftool_map.sh script tests that maps read/write accesses
> are being properly allowed/refused by the kernel depending on a specific
> fmod_ret program being attached on security_bpf_map function.
>
> Rewrite this test to integrate it in the new test_bpftool runner. The
> new test spawns a few subtests:
>
> #1/1 maps_access/unprotected_unpinned: OK
> #1/2 maps_access/unprotected_pinned: OK
> #1/3 maps_access/protected_unpinned: OK
> #1/4 maps_access/protected_pinned: OK
> #1/5 maps_access/nested_maps: OK
> #1/6 maps_access/btf_list: OK
> #1 maps_access: OK
> #2/1 metadata/metadata_unused: OK
> #2/2 metadata/metadata_used: OK
> #2 metadata: OK
> Summary: 2 PASSED, 0 FAILED
>
> Signed-off-by: Alexis Lothoré (eBPF Foundation) <alexis.lothore@...tlin.com>
Acked-by: Quentin Monnet <qmo@...nel.org>
Powered by blists - more mailing lists