7158005b4e
BPF filtering tests can sometime fail. Running the test in verbose mode shows the following: $ sudo perf test 42 42: BPF filter : 42.1: Basic BPF filtering : FAILED! 42.2: BPF pinning : Skip 42.3: BPF prologue generation : Skip $ perf --version perf version 4.18.0-425.3.1.el8.ppc64le $ sudo perf test -v 42 42: BPF filter : 42.1: Basic BPF filtering : --- start --- test child forked, pid 711060 ... bpf: config 'func=do_epoll_wait' is ok Looking at the vmlinux_path (8 entries long) Using /usr/lib/debug/lib/modules/4.18.0-425.3.1.el8.ppc64le/vmlinux for symbols Open Debuginfo file: /usr/lib/debug/.build-id/81/56f5a07f92ccb62c5600ba0e4aacfb5f3a7534.debug Try to find probe point from debuginfo. Matched function: do_epoll_wait [4ef8cb0] found inline addr: 0xc00000000061dbe4 Probe point found: __se_compat_sys_epoll_pwait+196 found inline addr: 0xc00000000061d9f4 Probe point found: __se_sys_epoll_pwait+196 found inline addr: 0xc00000000061d824 Probe point found: __se_sys_epoll_wait+36 Found 3 probe_trace_events. Opening /sys/kernel/tracing//kprobe_events write=1 ... BPF filter result incorrect, expected 56, got 56 samples test child finished with -1 ---- end ---- BPF filter subtest 1: FAILED! The statement above about the result being incorrect looks weird, and it is due to that particular perf build missing commit3e11300cdf
("perf test: Fix bpf test sample mismatch reporting"). In reality, due to commit4b04e0decd
("perf test: Fix basic bpf filtering test"), perf expects there to be 56*3 samples. However, the number of samples we receive is going to be dependent on where the probes are installed, which is dependent on where do_epoll_wait gets inlined. On s390x, it looks like probes at all the inlined locations are hit. But, that is not the case on ppc64le. Fix this by switching the test to instead use the syscall tracepoint. This ensures that we will only ever install a single event enabling us to reliably determine the sample count. Reported-by: Disha Goel <disgoel@linux.vnet.ibm.com> Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com> Cc: Kajol Jain <kjain@linux.ibm.com> Cc: bpf@vger.kernel.org Link: http://lore.kernel.org/lkml/20230123083224.276404-1-naveen.n.rao@linux.vnet.ibm.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
61 lines
1.8 KiB
C
61 lines
1.8 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* bpf-script-example.c
|
|
* Test basic LLVM building
|
|
*/
|
|
#ifndef LINUX_VERSION_CODE
|
|
# error Need LINUX_VERSION_CODE
|
|
# error Example: for 4.2 kernel, put 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of ~/.perfconfig'
|
|
#endif
|
|
#define BPF_ANY 0
|
|
#define BPF_MAP_TYPE_ARRAY 2
|
|
#define BPF_FUNC_map_lookup_elem 1
|
|
#define BPF_FUNC_map_update_elem 2
|
|
|
|
static void *(*bpf_map_lookup_elem)(void *map, void *key) =
|
|
(void *) BPF_FUNC_map_lookup_elem;
|
|
static void *(*bpf_map_update_elem)(void *map, void *key, void *value, int flags) =
|
|
(void *) BPF_FUNC_map_update_elem;
|
|
|
|
/*
|
|
* Following macros are taken from tools/lib/bpf/bpf_helpers.h,
|
|
* and are used to create BTF defined maps. It is easier to take
|
|
* 2 simple macros, than being able to include above header in
|
|
* runtime.
|
|
*
|
|
* __uint - defines integer attribute of BTF map definition,
|
|
* Such attributes are represented using a pointer to an array,
|
|
* in which dimensionality of array encodes specified integer
|
|
* value.
|
|
*
|
|
* __type - defines pointer variable with typeof(val) type for
|
|
* attributes like key or value, which will be defined by the
|
|
* size of the type.
|
|
*/
|
|
#define __uint(name, val) int (*name)[val]
|
|
#define __type(name, val) typeof(val) *name
|
|
|
|
#define SEC(NAME) __attribute__((section(NAME), used))
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_ARRAY);
|
|
__uint(max_entries, 1);
|
|
__type(key, int);
|
|
__type(value, int);
|
|
} flip_table SEC(".maps");
|
|
|
|
SEC("syscalls:sys_enter_epoll_pwait")
|
|
int bpf_func__SyS_epoll_pwait(void *ctx)
|
|
{
|
|
int ind =0;
|
|
int *flag = bpf_map_lookup_elem(&flip_table, &ind);
|
|
int new_flag;
|
|
if (!flag)
|
|
return 0;
|
|
/* flip flag and store back */
|
|
new_flag = !*flag;
|
|
bpf_map_update_elem(&flip_table, &ind, &new_flag, BPF_ANY);
|
|
return new_flag;
|
|
}
|
|
char _license[] SEC("license") = "GPL";
|
|
int _version SEC("version") = LINUX_VERSION_CODE;
|