Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp1390401ybd; Wed, 26 Jun 2019 16:59:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqzCjo1VWsjfMvpye8T2NX3BlsR7vwBlptUOVLG0Vm0/pT5WVFk/9vwMPkyiygCgO9/Pzp5c X-Received: by 2002:a17:902:59c8:: with SMTP id d8mr946049plj.55.1561593594424; Wed, 26 Jun 2019 16:59:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561593594; cv=none; d=google.com; s=arc-20160816; b=Af5tsC1G81bBoF+sa+fXNTIBgAJAvpK3TEQUtLfmO5ZVK67GPWUP/1PX5lEfdUHNDp /rRfCQ+eUtVz9njPfz39LCC9aSbiznaOchnFNmHTKSGTuMw5rz5jhksCH5+eydPxNYdq NryMpMMVPkj8D5lwP9kvzF4pR8PKDxYGVdMFfu3obXcTJbhdwxe2OMdF9ZXYYw1V9/05 x0xvoLioea6/Ttzi6xgv9X8FghVt6zaBI1NSbcam3T6ZfMWKtEWCsgtS8+iXQjKnb4RH dt+b780+Q8Dc+KnyPAGxEDgRApY6T57w0oB215HaKcqy82KQpHxIdmF7kZi/zYz/aRwE 76EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=0WL/jljCGlROBH86CmnLzOjHAwL3bkQ6tSEEkvmazWc=; b=mUtNMY20O4uITzKgL4yw60Cr9gxdZrXsBwli1Rk+/IXYe1XB5axDMkG+bSsdtPcPkx NKJby2jS5KWJ8No+Vj5XLeS1gJXPM0/Dl9SrSFSR9YGvQAw9fs45sMorfxi8Nc7YE4Yn 7hi6QYV2aoRNnMXncZxV/X1M/Uh/gDH0DUZPqOu0VuG8qJc+CvY2ay3SGl0JTt6yFX44 wqdc3QNPNNlYcAi3a7TSLPR9aCHxnUOj86e1lcwhGNzR2Me0Ic3GCWvd/5Hi71IzL8kA OsEsDxdxqmOLwQhrk5K9lmykYJ8A2buSnN5p+7CxI4lUTgXMmq2v4sDsNAuYG2oRjUnl bHnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NzKx2bj1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s3si3262850pji.94.2019.06.26.16.59.38; Wed, 26 Jun 2019 16:59:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NzKx2bj1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726754AbfFZX6Q (ORCPT + 99 others); Wed, 26 Jun 2019 19:58:16 -0400 Received: from mail-pg1-f201.google.com ([209.85.215.201]:37075 "EHLO mail-pg1-f201.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726385AbfFZX6M (ORCPT ); Wed, 26 Jun 2019 19:58:12 -0400 Received: by mail-pg1-f201.google.com with SMTP id e16so215887pga.4 for ; Wed, 26 Jun 2019 16:58:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=0WL/jljCGlROBH86CmnLzOjHAwL3bkQ6tSEEkvmazWc=; b=NzKx2bj19tMWCT9Eyw8dPulZ9LKYlUIwz1E2ZXh3SvbJpqmyo0i6kwSfGrNyKZhg15 Vq7vcpb6Rjm3v3gB6yFvzLhgGtWvBxGV+wYSxmMQn+SkCYMPkVBxM/rSu0Rp9W/nihjq PtG2VZ/QWBzSJLRiYjztgYOegSYchkx+h1SLGWwU0omQMe6Fs0JdmejQ3vFuE2faQHN7 TsPMAAQIxtWdin3HMKaVFPS7ayce9TxnW4nOcxNLtOyprQ3bDe5CDolwDauX3IChgXML QkA8bnHEQOnYS5oWtjaehTKuo3g84Sgq3wJUo1SXXmaOQsVmc3cDy0swx/mU+vsBblCH zgpQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=0WL/jljCGlROBH86CmnLzOjHAwL3bkQ6tSEEkvmazWc=; b=eicqhl5FyQFxAN/ld9r6pSSbhAjzTV2/BphxIYsA2+UtzIs6coNoQHXuxcS5mn0NHe 0AE28+Sf9hIMCnuRNfRYe/CnZbyynBzd7t24WL4tvitxwXvl+jQuGa3R72Zmq0OqSY7y FvbRAeHXz3l4aCJOJwuc9+aUKbw4wgB8V7r4C0KJ4DGjUBYkpzb4jAEINHMDOTIoghuz RJrT7ZjynEOzvaYTvWLqi2lio9z4VfjRqvtNyR2rSMLpO9VbNg4cJ1gFpk4K7YbWf1Im Odd7xQ0T+Px4Mktx/WBMSoyH5kF0Y3cBHFj/ewDZFW9QxR2d6kCa8EeOomh8POjtAtxi Dfxw== X-Gm-Message-State: APjAAAXlWyuC4y8ZPblYMUPRhZ8lGUZbds4WfAoBvb35fMXwi+jQSkS7 wdcwEMn4VaTm/fR/97uZSdXw+v0QshkR7F0S X-Received: by 2002:a63:6b0a:: with SMTP id g10mr614799pgc.295.1561593491417; Wed, 26 Jun 2019 16:58:11 -0700 (PDT) Date: Wed, 26 Jun 2019 16:58:01 -0700 In-Reply-To: <20190626235801.210508-1-allanzhang@google.com> Message-Id: <20190626235801.210508-3-allanzhang@google.com> Mime-Version: 1.0 References: <20190626235801.210508-1-allanzhang@google.com> X-Mailer: git-send-email 2.22.0.410.gd8fdbe21b5-goog Subject: [PATCH bpf-next v7 2/2] selftests/bpf: Add selftests for bpf_perf_event_output From: Allan Zhang To: Daniel Borkmann , Song Liu Cc: Alexei Starovoitov , Martin KaFai Lau , Yonghong Song , "David S. Miller" , linux-kernel@vger.kernel.org, allanzhang Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: allanzhang Software event output is only enabled by a few prog types. This test is to ensure that all supported types are enabled for bpf_perf_event_output successfully. Signed-off-by: Allan Zhang --- tools/testing/selftests/bpf/test_verifier.c | 12 ++- .../selftests/bpf/verifier/event_output.c | 94 +++++++++++++++++++ 2 files changed, 105 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/bpf/verifier/event_output.c diff --git a/tools/testing/selftests/bpf/test_verifier.c b/tools/testing/selftests/bpf/test_verifier.c index c5514daf8865..5e98d7c37eb7 100644 --- a/tools/testing/selftests/bpf/test_verifier.c +++ b/tools/testing/selftests/bpf/test_verifier.c @@ -50,7 +50,7 @@ #define MAX_INSNS BPF_MAXINSNS #define MAX_TEST_INSNS 1000000 #define MAX_FIXUPS 8 -#define MAX_NR_MAPS 18 +#define MAX_NR_MAPS 19 #define MAX_TEST_RUNS 8 #define POINTER_VALUE 0xcafe4all #define TEST_DATA_LEN 64 @@ -84,6 +84,7 @@ struct bpf_test { int fixup_map_array_wo[MAX_FIXUPS]; int fixup_map_array_small[MAX_FIXUPS]; int fixup_sk_storage_map[MAX_FIXUPS]; + int fixup_map_event_output[MAX_FIXUPS]; const char *errstr; const char *errstr_unpriv; uint32_t retval, retval_unpriv, insn_processed; @@ -627,6 +628,7 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type, int *fixup_map_array_wo = test->fixup_map_array_wo; int *fixup_map_array_small = test->fixup_map_array_small; int *fixup_sk_storage_map = test->fixup_sk_storage_map; + int *fixup_map_event_output = test->fixup_map_event_output; if (test->fill_helper) { test->fill_insns = calloc(MAX_TEST_INSNS, sizeof(struct bpf_insn)); @@ -788,6 +790,14 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type, fixup_sk_storage_map++; } while (*fixup_sk_storage_map); } + if (*fixup_map_event_output) { + map_fds[18] = __create_map(BPF_MAP_TYPE_PERF_EVENT_ARRAY, + sizeof(int), sizeof(int), 1, 0); + do { + prog[*fixup_map_event_output].imm = map_fds[18]; + fixup_map_event_output++; + } while (*fixup_map_event_output); + } } static int set_admin(bool admin) diff --git a/tools/testing/selftests/bpf/verifier/event_output.c b/tools/testing/selftests/bpf/verifier/event_output.c new file mode 100644 index 000000000000..130553e19eca --- /dev/null +++ b/tools/testing/selftests/bpf/verifier/event_output.c @@ -0,0 +1,94 @@ +/* instructions used to output a skb based software event, produced + * from code snippet: + * struct TMP { + * uint64_t tmp; + * } tt; + * tt.tmp = 5; + * bpf_perf_event_output(skb, &connection_tracking_event_map, 0, + * &tt, sizeof(tt)); + * return 1; + * + * the bpf assembly from llvm is: + * 0: b7 02 00 00 05 00 00 00 r2 = 5 + * 1: 7b 2a f8 ff 00 00 00 00 *(u64 *)(r10 - 8) = r2 + * 2: bf a4 00 00 00 00 00 00 r4 = r10 + * 3: 07 04 00 00 f8 ff ff ff r4 += -8 + * 4: 18 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 r2 = 0ll + * 6: b7 03 00 00 00 00 00 00 r3 = 0 + * 7: b7 05 00 00 08 00 00 00 r5 = 8 + * 8: 85 00 00 00 19 00 00 00 call 25 + * 9: b7 00 00 00 01 00 00 00 r0 = 1 + * 10: 95 00 00 00 00 00 00 00 exit + * + * The reason I put the code here instead of fill_helpers is that map fixup + * is against the insns, instead of filled prog. + */ + +#define __PERF_EVENT_INSNS__ \ + BPF_MOV64_IMM(BPF_REG_2, 5), \ + BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -8), \ + BPF_MOV64_REG(BPF_REG_4, BPF_REG_10), \ + BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8), \ + BPF_LD_MAP_FD(BPF_REG_2, 0), \ + BPF_MOV64_IMM(BPF_REG_3, 0), \ + BPF_MOV64_IMM(BPF_REG_5, 8), \ + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, \ + BPF_FUNC_perf_event_output), \ + BPF_MOV64_IMM(BPF_REG_0, 1), \ + BPF_EXIT_INSN(), +{ + "perfevent for sockops", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_SOCK_OPS, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for tc", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_SCHED_CLS, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for lwt out", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_LWT_OUT, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for xdp", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_XDP, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for socket filter", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_SOCKET_FILTER, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for sk_skb", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_SK_SKB, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, +{ + "perfevent for cgroup skb", + .insns = { __PERF_EVENT_INSNS__ }, + .prog_type = BPF_PROG_TYPE_CGROUP_SKB, + .fixup_map_event_output = { 4 }, + .result = ACCEPT, + .retval = 1, +}, -- 2.22.0.410.gd8fdbe21b5-goog