Received: by 2002:a05:7412:8d09:b0:fa:4c10:6cad with SMTP id bj9csp377820rdb; Tue, 16 Jan 2024 03:15:50 -0800 (PST) X-Google-Smtp-Source: AGHT+IHInTTqW1uPcFsFraJ4QKXiQ/+18vvLJJhVfeY1kpZUGrqQElvo8dv2sPiVeeitrsesHD7l X-Received: by 2002:a37:ad16:0:b0:783:1558:d1b0 with SMTP id f22-20020a37ad16000000b007831558d1b0mr8404123qkm.82.1705403750063; Tue, 16 Jan 2024 03:15:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705403750; cv=none; d=google.com; s=arc-20160816; b=jJkOGfwv1YaPM2TMlYzKkIHiIR5CdqL8GRkJSXKepblNu5s7eIGJh2ZQbGKZXykgps ht0xZ2qFm4SPvQQ9y/qfTH+zr4xhKTWLuJn+79NGC2bs4gGcp1dALhdlTMthP85Eq8Jh rHcde2iR8ILZ8qyTwi69TK3Yak2ZJHFrO7IH/DaxKJwV/Zo8ENwdw81majX2DMNBxNDa APONtrcrl36ZKhJjtOj5SKc+vYbgW9aFhFLsSE0+WlbIQGuUZ5lzHOWAybzkPRyb4fTJ b+TT8x7TA2SSIuL5+8nY9DE3Q5gidPoRIzN+43iqVCl1adQ4JegZNrznXZog2r5NS0kk b+Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-language:content-transfer-encoding:in-reply-to:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:user-agent:date :message-id:from:references:cc:to:subject; bh=WBJ/uy6JIIpRB8Wvsg2fN89LMRkXmgs89qxDOB8nViA=; fh=yECD7NgnTI3gLd2JYWx196DBx1V8pQOlQZzWlb1vTy8=; b=ErhIsZULNZh0243fqRXz7vUJ7d5/dDey9ZTGIVKOSUfPjdcY0O6mjLuedzf7L5tbxq Iqtpzyl/dILOBf8plQtmZm8h1TmPOzu+q/p2XwnOMPTApnv40ndOCouztMqFMsPITrC7 c4oAtiN9OjoC20xk/0dLthp33IxC9hUijgx+4PDyWVq2qPUGblR/V0XfrJ1ubK+2UB4N eo3PLoInH4geuNWWrjKCS/g3poNqpAEq6/dHpVyBDhwr2lz5y35vERbU5Pj689tUxf7W tTXlockVzWujnk1SUhVu6P3bkqDYg3u9gB2HtWYeQtq0WiwAY1byZaZhL479qn2czfAT DoZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-27300-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27300-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id pe5-20020a05620a850500b007810ca77e71si9278111qkn.539.2024.01.16.03.15.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 03:15:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-27300-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-27300-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27300-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B98681C22FAC for ; Tue, 16 Jan 2024 11:15:49 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 06EE81B802; Tue, 16 Jan 2024 11:15:42 +0000 (UTC) Received: from dggsgout11.his.huawei.com (unknown [45.249.212.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2B4391B7ED; Tue, 16 Jan 2024 11:15:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=huaweicloud.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=huaweicloud.com Received: from mail.maildlp.com (unknown [172.19.93.142]) by dggsgout11.his.huawei.com (SkyGuard) with ESMTP id 4TDmdX1LrSz4f3m73; Tue, 16 Jan 2024 19:15:28 +0800 (CST) Received: from mail02.huawei.com (unknown [10.116.40.75]) by mail.maildlp.com (Postfix) with ESMTP id 44E531A016E; Tue, 16 Jan 2024 19:15:34 +0800 (CST) Received: from [10.174.176.117] (unknown [10.174.176.117]) by APP2 (Coremail) with SMTP id Syh0CgC32QxSZaZlQkMQBA--.63503S2; Tue, 16 Jan 2024 19:15:34 +0800 (CST) Subject: Re: [PATCH bpf-next v4 2/2] selftests/bpf: Skip callback tests if jit is disabled in test_verifier To: Tiezhu Yang , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko Cc: Eduard Zingerman , John Fastabend , Jiri Olsa , bpf@vger.kernel.org, linux-kernel@vger.kernel.org References: <20240116045030.23739-1-yangtiezhu@loongson.cn> <20240116045030.23739-3-yangtiezhu@loongson.cn> From: Hou Tao Message-ID: <398c3793-1530-fdcb-3a0c-2b82c52256cb@huaweicloud.com> Date: Tue, 16 Jan 2024 19:15:30 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 In-Reply-To: <20240116045030.23739-3-yangtiezhu@loongson.cn> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-CM-TRANSID:Syh0CgC32QxSZaZlQkMQBA--.63503S2 X-Coremail-Antispam: 1UD129KBjvJXoW7CFWUGr45KFWkAFy7ZF4xWFg_yoW8Gryfpa 1UCrWqyF1qqw109r9rXrn3XFyjv3y0qw4fG34rG3y8AF4kuw43Jrn3Cr1UZasxGr4F9a4S 93yUurW8Ww1UXa7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUyKb4IE77IF4wAFF20E14v26r4j6ryUM7CY07I20VC2zVCF04k2 6cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rwA2F7IY1VAKz4 vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Ar0_tr1l84ACjcxK6xIIjxv20xvEc7Cj xVAFwI0_Cr0_Gr1UM28EF7xvwVC2z280aVAFwI0_GcCE3s1l84ACjcxK6I8E87Iv6xkF7I 0E14v26rxl6s0DM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVACY4xI64kE6c02F40E x7xfMcIj6xIIjxv20xvE14v26r1j6r18McIj6I8E87Iv67AKxVWUJVW8JwAm72CE4IkC6x 0Yz7v_Jr0_Gr1lF7xvr2IY64vIr41lc7I2V7IY0VAS07AlzVAYIcxG8wCF04k20xvY0x0E wIxGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E74 80Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkGc2Ij64vIr41lIxAIcVC0 I7IYx2IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF04 k26cxKx2IYs7xG6rW3Jr0E3s1lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY 1x0267AKxVWUJVW8JbIYCTnIWIevJa73UjIFyTuYvjxUrR6zUUUUU X-CM-SenderInfo: xkrx3t3r6k3tpzhluzxrxghudrp/ On 1/16/2024 12:50 PM, Tiezhu Yang wrote: > If CONFIG_BPF_JIT_ALWAYS_ON is not set and bpf_jit_enable is 0, there > exist 6 failed tests. > > [root@linux bpf]# echo 0 > /proc/sys/net/core/bpf_jit_enable > [root@linux bpf]# echo 0 > /proc/sys/kernel/unprivileged_bpf_disabled > [root@linux bpf]# ./test_verifier | grep FAIL > #106/p inline simple bpf_loop call FAIL > #107/p don't inline bpf_loop call, flags non-zero FAIL > #108/p don't inline bpf_loop call, callback non-constant FAIL > #109/p bpf_loop_inline and a dead func FAIL > #110/p bpf_loop_inline stack locations for loop vars FAIL > #111/p inline bpf_loop call in a big program FAIL > Summary: 768 PASSED, 15 SKIPPED, 6 FAILED > > The test log shows that callbacks are not allowed in non-JITed programs, > interpreter doesn't support them yet, thus these tests should be skipped > if jit is disabled, copy some check functions from the other places under > tools directory, and then handle this case in do_test_single(). > > With this patch: > > [root@linux bpf]# echo 0 > /proc/sys/net/core/bpf_jit_enable > [root@linux bpf]# echo 0 > /proc/sys/kernel/unprivileged_bpf_disabled > [root@linux bpf]# ./test_verifier | grep FAIL > Summary: 768 PASSED, 21 SKIPPED, 0 FAILED > > Signed-off-by: Tiezhu Yang Acked-by: Hou Tao