From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.5 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 56F00C432BE for ; Thu, 26 Aug 2021 19:42:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3B14360F11 for ; Thu, 26 Aug 2021 19:42:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243641AbhHZTnD (ORCPT ); Thu, 26 Aug 2021 15:43:03 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:45223 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243632AbhHZTnC (ORCPT ); Thu, 26 Aug 2021 15:43:02 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1630006934; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=s1ZTGe/UoYnoQvh13a27N1ppHSSL1B6a+t6brCKLLcE=; b=g39CIpd7eeDw6yScLgHUHigVsMkH1eZ2EW7lgfCe8l96w3eYQxsf7tAKNdhwjYXWKUEVmE sohBMCfXK67a6PBamRz6UCVdHLBDVa0V1oxAiFbwmYhysi0EVvxGXTyPkxghfisZvWTxr+ GN+pGVjlKH+ZAhAXCf+6hCXRxbRIEf8= Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-351-yfDD_6e-OzGCm4w32a83yg-1; Thu, 26 Aug 2021 15:42:13 -0400 X-MC-Unique: yfDD_6e-OzGCm4w32a83yg-1 Received: by mail-wr1-f70.google.com with SMTP id p10-20020a5d68ca000000b001552bf8b9daso1179984wrw.22 for ; Thu, 26 Aug 2021 12:42:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=s1ZTGe/UoYnoQvh13a27N1ppHSSL1B6a+t6brCKLLcE=; b=g5dmjKUxQzncXmT2kDs3F2ZurxTEwGa9anECKtyn7SaCndT8OmgdMXW7Mw13GgIiZJ 8qsVD3FjMFYl/jyQCs+Ou9ChDYThGjAaPD36HTtjJZNNrFm3QAUxyt7ltMlA2ZTNl7IS nLKA2PuglK8T+Dd1tlGfFrGBi7bJl/RhSLdmLZYEZkmZ8Q+RPWv5rhc1RbYO1d005n2S b0VxCgfZhZJpzkWeaTx3q/IIo00w9Rs8hMb1f7vwBF1FiS02NMENeC8aily2ulw6e+Xp IqQj01kVZNGhou6YJ+BVM6+nuxdO5C8/AWs7+VhJYiw7lQyNG1STvrN9tIo+cZ4ajBCA pgog== X-Gm-Message-State: AOAM531f6weI0Copqyp4T5xxi7pRPOuD/xqbgPaOB8/yZCi9FzQ5jVhq Jn/qtFGiEPZKAn9Ak7Dc80yUEzIssg/NXVIxnnolWHyd2X010eItD9Mn4FHbW7JtIqL1I+d794s c1H7FrAPPLqEsKthr X-Received: by 2002:a05:600c:a49:: with SMTP id c9mr15575555wmq.159.1630006931866; Thu, 26 Aug 2021 12:42:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCKcQiJSVwruqkLwerb4RepMP4yAha4C4WOLcw9+AfBwsUrdhovlrq4XZznn+xhUvmxg7e6A== X-Received: by 2002:a05:600c:a49:: with SMTP id c9mr15575526wmq.159.1630006931617; Thu, 26 Aug 2021 12:42:11 -0700 (PDT) Received: from krava.redhat.com ([83.240.63.86]) by smtp.gmail.com with ESMTPSA id f20sm3372228wml.38.2021.08.26.12.42.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 26 Aug 2021 12:42:11 -0700 (PDT) From: Jiri Olsa X-Google-Original-From: Jiri Olsa To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , "Steven Rostedt (VMware)" Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Daniel Xu , Viktor Malik Subject: [PATCH bpf-next v4 27/27] selftests/bpf: Add ret_mod multi func test Date: Thu, 26 Aug 2021 21:39:22 +0200 Message-Id: <20210826193922.66204-28-jolsa@kernel.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210826193922.66204-1-jolsa@kernel.org> References: <20210826193922.66204-1-jolsa@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Adding extra test to existing modify_return test to test this with multi func program attached on top of the modify return program. Because the supported wildcards do not allow us to match both bpf_fentry_test* and bpf_modify_return_test, adding extra code to look it up in kernel's BTF. Signed-off-by: Jiri Olsa --- .../selftests/bpf/prog_tests/modify_return.c | 114 +++++++++++++++++- .../selftests/bpf/progs/multi_modify_return.c | 17 +++ 2 files changed, 128 insertions(+), 3 deletions(-) create mode 100644 tools/testing/selftests/bpf/progs/multi_modify_return.c diff --git a/tools/testing/selftests/bpf/prog_tests/modify_return.c b/tools/testing/selftests/bpf/prog_tests/modify_return.c index 97fec70c600b..9876104ad5b2 100644 --- a/tools/testing/selftests/bpf/prog_tests/modify_return.c +++ b/tools/testing/selftests/bpf/prog_tests/modify_return.c @@ -5,13 +5,100 @@ */ #include +#include #include "modify_return.skel.h" +#include "multi_modify_return.skel.h" #define LOWER(x) ((x) & 0xffff) #define UPPER(x) ((x) >> 16) -static void run_test(__u32 input_retval, __u16 want_side_effect, __s16 want_ret) +struct multi_data { + struct multi_modify_return *skel; + int link_fentry; + int link_fexit; + __u32 btf_ids[9]; +}; + +static int multi_btf_ids(struct multi_data *md) +{ + __u32 i, nr_types, ids_cnt; + struct btf *btf; + + btf = btf__load_vmlinux_btf(); + if (!ASSERT_OK_PTR(btf, "btf__load_vmlinux_btf")) + return -1; + + nr_types = btf__get_nr_types(btf); + + for (i = 1; i <= nr_types; i++) { + const struct btf_type *t = btf__type_by_id(btf, i); + const char *name; + bool match; + + if (!btf_is_func(t)) + continue; + + name = btf__name_by_offset(btf, t->name_off); + if (!name) + continue; + match = strncmp(name, "bpf_modify_return_test", + sizeof("bpf_modify_return_test") - 1) == 0; + match |= strncmp(name, "bpf_fentry_test", + sizeof("bpf_fentry_test") - 1) == 0; + if (!match) + continue; + + md->btf_ids[ids_cnt] = i; + ids_cnt++; + } + + btf__free(btf); + return ASSERT_EQ(ids_cnt, 9, "multi_btf_ids") ? 0 : -1; +} + +static int multi_attach(struct multi_data *md) +{ + DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts); + int prog_fd; + + md->skel = multi_modify_return__open_and_load(); + if (!ASSERT_OK_PTR(md->skel, "multi_attach_check__load")) + return -1; + + opts.multi.btf_ids = md->btf_ids; + opts.multi.btf_ids_cnt = 9; + + prog_fd = bpf_program__fd(md->skel->progs.test1); + + md->link_fentry = bpf_link_create(prog_fd, 0, BPF_TRACE_FENTRY, &opts); + if (!ASSERT_GE(md->link_fentry, 0, "bpf_link_create")) + goto cleanup; + + prog_fd = bpf_program__fd(md->skel->progs.test2); + + md->link_fexit = bpf_link_create(prog_fd, 0, BPF_TRACE_FEXIT, &opts); + if (!ASSERT_GE(md->link_fexit, 0, "bpf_link_create")) + goto cleanup_close; + + return 0; + +cleanup_close: + close(md->link_fentry); +cleanup: + multi_modify_return__destroy(md->skel); + return -1; +} + +static void multi_detach(struct multi_data *md) +{ + close(md->link_fentry); + close(md->link_fexit); + multi_modify_return__destroy(md->skel); +} + +static void run_test(__u32 input_retval, __u16 want_side_effect, __s16 want_ret, + struct multi_data *md) { struct modify_return *skel = NULL; int err, prog_fd; @@ -27,6 +114,9 @@ static void run_test(__u32 input_retval, __u16 want_side_effect, __s16 want_ret) if (CHECK(err, "modify_return", "attach failed: %d\n", err)) goto cleanup; + if (md && !ASSERT_OK(multi_attach(md), "multi_attach")) + goto cleanup; + skel->bss->input_retval = input_retval; prog_fd = bpf_program__fd(skel->progs.fmod_ret_test); err = bpf_prog_test_run(prog_fd, 1, NULL, 0, NULL, 0, @@ -49,17 +139,35 @@ static void run_test(__u32 input_retval, __u16 want_side_effect, __s16 want_ret) CHECK(skel->bss->fmod_ret_result != 1, "modify_return", "fmod_ret failed\n"); + if (md) + multi_detach(md); cleanup: modify_return__destroy(skel); } void test_modify_return(void) { + struct multi_data data = {}; + + run_test(0 /* input_retval */, + 1 /* want_side_effect */, + 4 /* want_ret */, + NULL /* no multi func test */); + run_test(-EINVAL /* input_retval */, + 0 /* want_side_effect */, + -EINVAL /* want_ret */, + NULL /* no multi func test */); + + if (!ASSERT_OK(multi_btf_ids(&data), "multi_attach")) + return; + run_test(0 /* input_retval */, 1 /* want_side_effect */, - 4 /* want_ret */); + 4 /* want_ret */, + &data); run_test(-EINVAL /* input_retval */, 0 /* want_side_effect */, - -EINVAL /* want_ret */); + -EINVAL /* want_ret */, + &data); } diff --git a/tools/testing/selftests/bpf/progs/multi_modify_return.c b/tools/testing/selftests/bpf/progs/multi_modify_return.c new file mode 100644 index 000000000000..34754e438c96 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/multi_modify_return.c @@ -0,0 +1,17 @@ +// SPDX-License-Identifier: GPL-2.0 +#include +#include +#include + +char _license[] SEC("license") = "GPL"; +SEC("fentry.multi/bpf_fentry_test*") +int BPF_PROG(test1, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f) +{ + return 0; +} + +SEC("fexit.multi/bpf_fentry_test*") +int BPF_PROG(test2, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, int ret) +{ + return 0; +} -- 2.31.1