The previous libbpf patch allows user to specify "prog_flags" to bpf program load APIs. To enable high 32-bit randomization for a test, we need to set BPF_F_TEST_RND_HI32 in "prog_flags". To enable such randomization for all tests, we need to make sure all places are passing BPF_F_TEST_RND_HI32. Changing them one by one is not convenient, also, it would be better if a test could be switched to "normal" running mode without code change. Given the program load APIs used across bpf selftests are mostly: bpf_prog_load: load from file bpf_load_program: load from raw insns A test_stub.c is implemented for bpf seltests, it offers two functions for testing purpose: bpf_prog_test_load bpf_test_load_program The are the same as "bpf_prog_load" and "bpf_load_program", except they also set BPF_F_TEST_RND_HI32. Given *_xattr functions are the APIs to customize any "prog_flags", it makes little sense to put these two functions into libbpf. Then, the following CFLAGS are passed to compilations for host programs: -Dbpf_prog_load=bpf_prog_test_load -Dbpf_load_program=bpf_test_load_program They migrate the used load APIs to the test version, hence enable high 32-bit randomization for these tests without changing source code. Besides all these, there are several testcases are using "bpf_prog_load_attr" directly, their call sites are updated to pass BPF_F_TEST_RND_HI32. Signed-off-by: Jiong Wang <jiong.wang@netronome.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
56 lines
1.4 KiB
C
56 lines
1.4 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
// Copyright (c) 2019 Facebook
|
|
#include <test_progs.h>
|
|
static int libbpf_debug_print(enum libbpf_print_level level,
|
|
const char *format, va_list args)
|
|
{
|
|
if (level != LIBBPF_DEBUG)
|
|
return 0;
|
|
|
|
if (!strstr(format, "verifier log"))
|
|
return 0;
|
|
return vfprintf(stderr, "%s", args);
|
|
}
|
|
|
|
static int check_load(const char *file, enum bpf_prog_type type)
|
|
{
|
|
struct bpf_prog_load_attr attr;
|
|
struct bpf_object *obj = NULL;
|
|
int err, prog_fd;
|
|
|
|
memset(&attr, 0, sizeof(struct bpf_prog_load_attr));
|
|
attr.file = file;
|
|
attr.prog_type = type;
|
|
attr.log_level = 4;
|
|
attr.prog_flags = BPF_F_TEST_RND_HI32;
|
|
err = bpf_prog_load_xattr(&attr, &obj, &prog_fd);
|
|
bpf_object__close(obj);
|
|
if (err)
|
|
error_cnt++;
|
|
return err;
|
|
}
|
|
|
|
void test_bpf_verif_scale(void)
|
|
{
|
|
const char *scale[] = {
|
|
"./test_verif_scale1.o", "./test_verif_scale2.o", "./test_verif_scale3.o"
|
|
};
|
|
const char *pyperf[] = {
|
|
"./pyperf50.o", "./pyperf100.o", "./pyperf180.o"
|
|
};
|
|
int err, i;
|
|
|
|
if (verifier_stats)
|
|
libbpf_set_print(libbpf_debug_print);
|
|
|
|
for (i = 0; i < ARRAY_SIZE(scale); i++) {
|
|
err = check_load(scale[i], BPF_PROG_TYPE_SCHED_CLS);
|
|
printf("test_scale:%s:%s\n", scale[i], err ? "FAIL" : "OK");
|
|
}
|
|
|
|
for (i = 0; i < ARRAY_SIZE(pyperf); i++) {
|
|
err = check_load(pyperf[i], BPF_PROG_TYPE_RAW_TRACEPOINT);
|
|
printf("test_scale:%s:%s\n", pyperf[i], err ? "FAIL" : "OK");
|
|
}
|
|
}
|