Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9258936ybi; Wed, 10 Jul 2019 07:17:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqxhiShrPaqEoaETKCwkZkluG8Fqr7S+yGDP7imAAVyn1pmAK0LxwUuDdfKQbeaxC5IVC77T X-Received: by 2002:a17:90a:1ae2:: with SMTP id p89mr6972383pjp.26.1562768278635; Wed, 10 Jul 2019 07:17:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562768278; cv=none; d=google.com; s=arc-20160816; b=zJM3VoWvL4J7M8zQC632zQ7cYRhI5pqwTv0XTSb6wGu0Qm2iryawIZvLjZYCRizkgr o8KMQS3ZVrdHAakzmryPlBRJsxc6TxfM9DsZl7HHfr0EHAIYM0v8IwOqiN3ycfVprugL wufTIvNas6AyLTz2Y+W7XOxSvH4WwbVS3NjnDHvNEGwG75e0YPm0QLDp6ARhNROoq5dM ECiklHCU/frL/pZM2p43NwdmOC/x0TDqbSSk4eE5w+6lY9Q0llA0wQwtmLjgujbOKvi1 ePWN3uqj62q8PegwJw9dIv+5FEcOT9SP2VLOEAji0+wWEq1fp+5773fXWZVomY4alId2 8cqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Yg+Fia+4TffgvjfVtZaMrwTvAUof2HACdCWfE9Adz90=; b=gh1FiI4LvhtEn+ONrd8NHCIYz6+YCzywXHjPSPjDBqUblxv4hJ2CI6WtTo9/wh/XBL Ek1feAu8ahkP99tes+hafjH9AvfF9ffgVY3IE0jgiw7wlGKAk2zKMvf/INz0L8Y/kGoc fpn5H4ZVsWhHOEIHocpw/ZAOU1FzmS/CHYTdyT8OhTiZaA1eQIXu63F0MkqsEoCuZcrb W7jF8+1NK3sUKcZuG1ewhTJzmqMJIMGDqW6FiL3cug1PkZP9i9dgbtIJBadVehbPCIAM 1tx607AjL7DdL9HIc21rQoM8ijeUdBcoB69BWWEUGQ3N1TZwVB5D+vY47LbcKcu88DO4 N4BQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=puPKxWZQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u14si320974pgb.77.2019.07.10.07.17.42; Wed, 10 Jul 2019 07:17:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=puPKxWZQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727948AbfGJOQP (ORCPT + 99 others); Wed, 10 Jul 2019 10:16:15 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:45880 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727938AbfGJOQN (ORCPT ); Wed, 10 Jul 2019 10:16:13 -0400 Received: by mail-pf1-f193.google.com with SMTP id r1so1161652pfq.12 for ; Wed, 10 Jul 2019 07:16:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Yg+Fia+4TffgvjfVtZaMrwTvAUof2HACdCWfE9Adz90=; b=puPKxWZQb+LZdgernOXSGHoCjjFfNqhgNCQgR3EAJVuYHTxPi0MWhE1gMoTZzoxDtL JPgeBqpXoNCnj35nK/tB1FCJMvJg2YoHOxNlJ0Vchnf+Zhz2VlASaorgKKmUkgTvSIJf 8FW/bsoH46dLIF8XeGGCXT64TEZRMHpQZe0+E= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Yg+Fia+4TffgvjfVtZaMrwTvAUof2HACdCWfE9Adz90=; b=g+ey/zwDi496+Z/Ga0ApC3vc06zvTxdAPv//8abe516WVZxVvS2nJMdZ/ukHU2pj/K 3MDiAOeUSOTBGjwtAFGlbjTqyx29twSryck9vr0uyVnCpOx5iSSIQ7Vr4BhkyWGrNOuv D0sg3twyN6PXXGZZzhfi2exo/BYWFj2URSrnLlv//TTG4AhjZy85uyOsm3rz5LMdoSn3 FOnmBUg0uah8JF5XIbvSwZv+PsCbFOVwpBEou//ryMYYSlYHnc0gtds6gZlMowk4oZKN SeMeD3C5dkdkjIrgqzuQlu9ECB63Y/XyZGkl5cXQJGQGOdNuqGlmyuAWIe67zdwL/HKL VwHQ== X-Gm-Message-State: APjAAAVmFgKqoei4aRPIWvC+J8vjhyD3C6GSVgM5IPpyABXjVJ658k7F UUvGwWOWqQ/YlV+poNPifSrEAawY X-Received: by 2002:a17:90a:290b:: with SMTP id g11mr7342173pjd.122.1562768172230; Wed, 10 Jul 2019 07:16:12 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id l124sm2589249pgl.54.2019.07.10.07.16.08 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Wed, 10 Jul 2019 07:16:11 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Cc: "Joel Fernandes (Google)" , Adrian Ratiu , Alexei Starovoitov , bpf@vger.kernel.org, Brendan Gregg , connoro@google.com, Daniel Borkmann , duyuchao , Ingo Molnar , jeffv@google.com, Karim Yaghmour , kernel-team@android.com, linux-kselftest@vger.kernel.org, Manali Shukla , Manjo Raja Rao , Martin KaFai Lau , Masami Hiramatsu , Matt Mullins , Michal Gregorczyk , Michal Gregorczyk , Mohammad Husain , namhyung@google.com, namhyung@kernel.org, netdev@vger.kernel.org, paul.chaignon@gmail.com, primiano@google.com, Qais Yousef , Shuah Khan , Song Liu , Srinivas Ramana , Steven Rostedt , Tamir Carmeli , Yonghong Song Subject: [PATCH RFC 4/4] selftests/bpf: Add test for ftrace-based BPF attach/detach Date: Wed, 10 Jul 2019 10:15:48 -0400 Message-Id: <20190710141548.132193-5-joel@joelfernandes.org> X-Mailer: git-send-email 2.22.0.410.gd8fdbe21b5-goog In-Reply-To: <20190710141548.132193-1-joel@joelfernandes.org> References: <20190710141548.132193-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Here we add support for testing the attach and detach of a BPF program to a tracepoint through tracefs. Signed-off-by: Joel Fernandes (Google) --- .../raw_tp_writable_test_ftrace_run.c | 89 +++++++++++++++++++ 1 file changed, 89 insertions(+) create mode 100644 tools/testing/selftests/bpf/prog_tests/raw_tp_writable_test_ftrace_run.c diff --git a/tools/testing/selftests/bpf/prog_tests/raw_tp_writable_test_ftrace_run.c b/tools/testing/selftests/bpf/prog_tests/raw_tp_writable_test_ftrace_run.c new file mode 100644 index 000000000000..7b42e3a69b71 --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/raw_tp_writable_test_ftrace_run.c @@ -0,0 +1,89 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include + +void test_raw_tp_writable_test_ftrace_run(void) +{ + __u32 duration = 0; + char error[4096]; + int ret; + + const struct bpf_insn trace_program[] = { + BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0), + BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, 0), + BPF_MOV64_IMM(BPF_REG_0, 42), + BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_0, 0), + BPF_EXIT_INSN(), + }; + + struct bpf_load_program_attr load_attr = { + .prog_type = BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, + .license = "GPL v2", + .insns = trace_program, + .insns_cnt = sizeof(trace_program) / sizeof(struct bpf_insn), + .log_level = 2, + }; + + int bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); + + if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded", + "failed: %d errno %d\n", bpf_fd, errno)) + return; + + const struct bpf_insn skb_program[] = { + BPF_MOV64_IMM(BPF_REG_0, 0), + BPF_EXIT_INSN(), + }; + + struct bpf_load_program_attr skb_load_attr = { + .prog_type = BPF_PROG_TYPE_SOCKET_FILTER, + .license = "GPL v2", + .insns = skb_program, + .insns_cnt = sizeof(skb_program) / sizeof(struct bpf_insn), + }; + + int filter_fd = + bpf_load_program_xattr(&skb_load_attr, error, sizeof(error)); + if (CHECK(filter_fd < 0, "test_program_loaded", "failed: %d errno %d\n", + filter_fd, errno)) + goto out_bpffd; + + ret = bpf_raw_tracepoint_ftrace_attach("bpf_test_run", + "bpf_test_finish", + bpf_fd); + if (CHECK(ret < 0, "bpf_raw_tracepoint_ftrace_attach", + "failed: %d errno %d\n", ret, errno)) + goto out_filterfd; + + char test_skb[128] = { + 0, + }; + + __u32 prog_ret; + int err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0, + 0, &prog_ret, 0); + CHECK(err != 42, "test_run", + "tracepoint did not modify return value\n"); + CHECK(prog_ret != 0, "test_run_ret", + "socket_filter did not return 0\n"); + + ret = bpf_raw_tracepoint_ftrace_detach("bpf_test_run", + "bpf_test_finish", + bpf_fd); + if (CHECK(ret < 0, "bpf_raw_tracepoint_ftrace_detach", + "failed: %d errno %d\n", ret, errno)) + goto out_filterfd; + + err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0, 0, + &prog_ret, 0); + CHECK(err != 0, "test_run_notrace", + "test_run failed with %d errno %d\n", err, errno); + CHECK(prog_ret != 0, "test_run_ret_notrace", + "socket_filter did not return 0\n"); + +out_filterfd: + close(filter_fd); +out_bpffd: + close(bpf_fd); +} -- 2.22.0.410.gd8fdbe21b5-goog