diff mbox series

[PATCHv4,bpf-next,2/5] selftests/bpf: Add re-attach test to fentry_test

Message ID 20210412162502.1417018-3-jolsa@kernel.org
State Superseded
Headers show
Series bpf: Tracing and lsm programs re-attach | expand

Commit Message

Jiri Olsa April 12, 2021, 4:24 p.m. UTC
Adding the test to re-attach (detach/attach again) tracing
fentry programs, plus check that already linked program can't
be attached again.

Also switching to ASSERT* macros and adding missing ';' in
ASSERT_ERR_PTR macro.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
---
 .../selftests/bpf/prog_tests/fentry_test.c    | 51 +++++++++++++------
 tools/testing/selftests/bpf/test_progs.h      |  2 +-
 2 files changed, 37 insertions(+), 16 deletions(-)

Comments

Andrii Nakryiko April 13, 2021, 9:54 p.m. UTC | #1
On Mon, Apr 12, 2021 at 9:29 AM Jiri Olsa <jolsa@kernel.org> wrote:
>

> Adding the test to re-attach (detach/attach again) tracing

> fentry programs, plus check that already linked program can't

> be attached again.

>

> Also switching to ASSERT* macros and adding missing ';' in

> ASSERT_ERR_PTR macro.

>

> Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> ---

>  .../selftests/bpf/prog_tests/fentry_test.c    | 51 +++++++++++++------

>  tools/testing/selftests/bpf/test_progs.h      |  2 +-

>  2 files changed, 37 insertions(+), 16 deletions(-)

>

> diff --git a/tools/testing/selftests/bpf/prog_tests/fentry_test.c b/tools/testing/selftests/bpf/prog_tests/fentry_test.c

> index 04ebbf1cb390..f440c74f5367 100644

> --- a/tools/testing/selftests/bpf/prog_tests/fentry_test.c

> +++ b/tools/testing/selftests/bpf/prog_tests/fentry_test.c

> @@ -3,35 +3,56 @@

>  #include <test_progs.h>

>  #include "fentry_test.skel.h"

>

> -void test_fentry_test(void)

> +static int fentry_test(struct fentry_test *fentry_skel)

>  {

> -       struct fentry_test *fentry_skel = NULL;

>         int err, prog_fd, i;

>         __u32 duration = 0, retval;

> +       struct bpf_link *link;

>         __u64 *result;

>

> -       fentry_skel = fentry_test__open_and_load();

> -       if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))

> -               goto cleanup;

> -

>         err = fentry_test__attach(fentry_skel);

> -       if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))

> -               goto cleanup;

> +       if (!ASSERT_OK(err, "fentry_attach"))

> +               return err;

> +

> +       /* Check that already linked program can't be attached again. */

> +       link = bpf_program__attach(fentry_skel->progs.test1);

> +       if (!ASSERT_ERR_PTR(link, "fentry_attach_link"))

> +               return -1;

>

>         prog_fd = bpf_program__fd(fentry_skel->progs.test1);

>         err = bpf_prog_test_run(prog_fd, 1, NULL, 0,

>                                 NULL, NULL, &retval, &duration);

> -       CHECK(err || retval, "test_run",

> -             "err %d errno %d retval %d duration %d\n",

> -             err, errno, retval, duration);

> +       ASSERT_OK(err || retval, "test_run");


this is quite misleading, even if will result in a correct check. Toke
did this in his patch set:

ASSERT_OK(err, ...);
ASSERT_EQ(retval, 0, ...);

It is a better and more straightforward way to validate the checks
instead of relying on (err || retval) -> bool (true) -> int (1) -> !=
0 chain.


>

>         result = (__u64 *)fentry_skel->bss;

> -       for (i = 0; i < 6; i++) {

> -               if (CHECK(result[i] != 1, "result",

> -                         "fentry_test%d failed err %lld\n", i + 1, result[i]))

> -                       goto cleanup;

> +       for (i = 0; i < sizeof(*fentry_skel->bss) / sizeof(__u64); i++) {

> +               if (!ASSERT_EQ(result[i], 1, "fentry_result"))

> +                       return -1;

>         }

>

> +       fentry_test__detach(fentry_skel);

> +

> +       /* zero results for re-attach test */

> +       memset(fentry_skel->bss, 0, sizeof(*fentry_skel->bss));

> +       return 0;

> +}

> +

> +void test_fentry_test(void)

> +{

> +       struct fentry_test *fentry_skel = NULL;

> +       int err;

> +

> +       fentry_skel = fentry_test__open_and_load();

> +       if (!ASSERT_OK_PTR(fentry_skel, "fentry_skel_load"))

> +               goto cleanup;

> +

> +       err = fentry_test(fentry_skel);

> +       if (!ASSERT_OK(err, "fentry_first_attach"))

> +               goto cleanup;

> +

> +       err = fentry_test(fentry_skel);

> +       ASSERT_OK(err, "fentry_second_attach");

> +

>  cleanup:

>         fentry_test__destroy(fentry_skel);

>  }

> diff --git a/tools/testing/selftests/bpf/test_progs.h b/tools/testing/selftests/bpf/test_progs.h

> index e87c8546230e..ee7e3b45182a 100644

> --- a/tools/testing/selftests/bpf/test_progs.h

> +++ b/tools/testing/selftests/bpf/test_progs.h

> @@ -210,7 +210,7 @@ extern int test__join_cgroup(const char *path);

>  #define ASSERT_ERR_PTR(ptr, name) ({                                   \

>         static int duration = 0;                                        \

>         const void *___res = (ptr);                                     \

> -       bool ___ok = IS_ERR(___res)                                     \

> +       bool ___ok = IS_ERR(___res);                                    \


heh, it probably deserves a separate patch with Fixes tag...

>         CHECK(!___ok, (name), "unexpected pointer: %p\n", ___res);      \

>         ___ok;                                                          \

>  })

> --

> 2.30.2

>
Jiri Olsa April 14, 2021, 10:56 a.m. UTC | #2
On Tue, Apr 13, 2021 at 02:54:10PM -0700, Andrii Nakryiko wrote:

SNIP

> >         __u32 duration = 0, retval;

> > +       struct bpf_link *link;

> >         __u64 *result;

> >

> > -       fentry_skel = fentry_test__open_and_load();

> > -       if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))

> > -               goto cleanup;

> > -

> >         err = fentry_test__attach(fentry_skel);

> > -       if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))

> > -               goto cleanup;

> > +       if (!ASSERT_OK(err, "fentry_attach"))

> > +               return err;

> > +

> > +       /* Check that already linked program can't be attached again. */

> > +       link = bpf_program__attach(fentry_skel->progs.test1);

> > +       if (!ASSERT_ERR_PTR(link, "fentry_attach_link"))

> > +               return -1;

> >

> >         prog_fd = bpf_program__fd(fentry_skel->progs.test1);

> >         err = bpf_prog_test_run(prog_fd, 1, NULL, 0,

> >                                 NULL, NULL, &retval, &duration);

> > -       CHECK(err || retval, "test_run",

> > -             "err %d errno %d retval %d duration %d\n",

> > -             err, errno, retval, duration);

> > +       ASSERT_OK(err || retval, "test_run");

> 

> this is quite misleading, even if will result in a correct check. Toke

> did this in his patch set:

> 

> ASSERT_OK(err, ...);

> ASSERT_EQ(retval, 0, ...);

> 

> It is a better and more straightforward way to validate the checks

> instead of relying on (err || retval) -> bool (true) -> int (1) -> !=

> 0 chain.


ok, makes sense

SNIP

> > +void test_fentry_test(void)

> > +{

> > +       struct fentry_test *fentry_skel = NULL;

> > +       int err;

> > +

> > +       fentry_skel = fentry_test__open_and_load();

> > +       if (!ASSERT_OK_PTR(fentry_skel, "fentry_skel_load"))

> > +               goto cleanup;

> > +

> > +       err = fentry_test(fentry_skel);

> > +       if (!ASSERT_OK(err, "fentry_first_attach"))

> > +               goto cleanup;

> > +

> > +       err = fentry_test(fentry_skel);

> > +       ASSERT_OK(err, "fentry_second_attach");

> > +

> >  cleanup:

> >         fentry_test__destroy(fentry_skel);

> >  }

> > diff --git a/tools/testing/selftests/bpf/test_progs.h b/tools/testing/selftests/bpf/test_progs.h

> > index e87c8546230e..ee7e3b45182a 100644

> > --- a/tools/testing/selftests/bpf/test_progs.h

> > +++ b/tools/testing/selftests/bpf/test_progs.h

> > @@ -210,7 +210,7 @@ extern int test__join_cgroup(const char *path);

> >  #define ASSERT_ERR_PTR(ptr, name) ({                                   \

> >         static int duration = 0;                                        \

> >         const void *___res = (ptr);                                     \

> > -       bool ___ok = IS_ERR(___res)                                     \

> > +       bool ___ok = IS_ERR(___res);                                    \

> 

> heh, it probably deserves a separate patch with Fixes tag...


va bene

jirka
Andrii Nakryiko April 14, 2021, 10:18 p.m. UTC | #3
On Wed, Apr 14, 2021 at 3:57 AM Jiri Olsa <jolsa@redhat.com> wrote:
>

> On Tue, Apr 13, 2021 at 02:54:10PM -0700, Andrii Nakryiko wrote:

>

> SNIP

>

> > >         __u32 duration = 0, retval;

> > > +       struct bpf_link *link;

> > >         __u64 *result;

> > >

> > > -       fentry_skel = fentry_test__open_and_load();

> > > -       if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))

> > > -               goto cleanup;

> > > -

> > >         err = fentry_test__attach(fentry_skel);

> > > -       if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))

> > > -               goto cleanup;

> > > +       if (!ASSERT_OK(err, "fentry_attach"))

> > > +               return err;

> > > +

> > > +       /* Check that already linked program can't be attached again. */

> > > +       link = bpf_program__attach(fentry_skel->progs.test1);

> > > +       if (!ASSERT_ERR_PTR(link, "fentry_attach_link"))

> > > +               return -1;

> > >

> > >         prog_fd = bpf_program__fd(fentry_skel->progs.test1);

> > >         err = bpf_prog_test_run(prog_fd, 1, NULL, 0,

> > >                                 NULL, NULL, &retval, &duration);

> > > -       CHECK(err || retval, "test_run",

> > > -             "err %d errno %d retval %d duration %d\n",

> > > -             err, errno, retval, duration);

> > > +       ASSERT_OK(err || retval, "test_run");

> >

> > this is quite misleading, even if will result in a correct check. Toke

> > did this in his patch set:

> >

> > ASSERT_OK(err, ...);

> > ASSERT_EQ(retval, 0, ...);

> >

> > It is a better and more straightforward way to validate the checks

> > instead of relying on (err || retval) -> bool (true) -> int (1) -> !=

> > 0 chain.

>

> ok, makes sense

>

> SNIP

>

> > > +void test_fentry_test(void)

> > > +{

> > > +       struct fentry_test *fentry_skel = NULL;

> > > +       int err;

> > > +

> > > +       fentry_skel = fentry_test__open_and_load();

> > > +       if (!ASSERT_OK_PTR(fentry_skel, "fentry_skel_load"))

> > > +               goto cleanup;

> > > +

> > > +       err = fentry_test(fentry_skel);

> > > +       if (!ASSERT_OK(err, "fentry_first_attach"))

> > > +               goto cleanup;

> > > +

> > > +       err = fentry_test(fentry_skel);

> > > +       ASSERT_OK(err, "fentry_second_attach");

> > > +

> > >  cleanup:

> > >         fentry_test__destroy(fentry_skel);

> > >  }

> > > diff --git a/tools/testing/selftests/bpf/test_progs.h b/tools/testing/selftests/bpf/test_progs.h

> > > index e87c8546230e..ee7e3b45182a 100644

> > > --- a/tools/testing/selftests/bpf/test_progs.h

> > > +++ b/tools/testing/selftests/bpf/test_progs.h

> > > @@ -210,7 +210,7 @@ extern int test__join_cgroup(const char *path);

> > >  #define ASSERT_ERR_PTR(ptr, name) ({                                   \

> > >         static int duration = 0;                                        \

> > >         const void *___res = (ptr);                                     \

> > > -       bool ___ok = IS_ERR(___res)                                     \

> > > +       bool ___ok = IS_ERR(___res);                                    \

> >

> > heh, it probably deserves a separate patch with Fixes tag...

>

> va bene


Where would I learn some Italian if not on bpf@vger :)

>

> jirka

>
diff mbox series

Patch

diff --git a/tools/testing/selftests/bpf/prog_tests/fentry_test.c b/tools/testing/selftests/bpf/prog_tests/fentry_test.c
index 04ebbf1cb390..f440c74f5367 100644
--- a/tools/testing/selftests/bpf/prog_tests/fentry_test.c
+++ b/tools/testing/selftests/bpf/prog_tests/fentry_test.c
@@ -3,35 +3,56 @@ 
 #include <test_progs.h>
 #include "fentry_test.skel.h"
 
-void test_fentry_test(void)
+static int fentry_test(struct fentry_test *fentry_skel)
 {
-	struct fentry_test *fentry_skel = NULL;
 	int err, prog_fd, i;
 	__u32 duration = 0, retval;
+	struct bpf_link *link;
 	__u64 *result;
 
-	fentry_skel = fentry_test__open_and_load();
-	if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))
-		goto cleanup;
-
 	err = fentry_test__attach(fentry_skel);
-	if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))
-		goto cleanup;
+	if (!ASSERT_OK(err, "fentry_attach"))
+		return err;
+
+	/* Check that already linked program can't be attached again. */
+	link = bpf_program__attach(fentry_skel->progs.test1);
+	if (!ASSERT_ERR_PTR(link, "fentry_attach_link"))
+		return -1;
 
 	prog_fd = bpf_program__fd(fentry_skel->progs.test1);
 	err = bpf_prog_test_run(prog_fd, 1, NULL, 0,
 				NULL, NULL, &retval, &duration);
-	CHECK(err || retval, "test_run",
-	      "err %d errno %d retval %d duration %d\n",
-	      err, errno, retval, duration);
+	ASSERT_OK(err || retval, "test_run");
 
 	result = (__u64 *)fentry_skel->bss;
-	for (i = 0; i < 6; i++) {
-		if (CHECK(result[i] != 1, "result",
-			  "fentry_test%d failed err %lld\n", i + 1, result[i]))
-			goto cleanup;
+	for (i = 0; i < sizeof(*fentry_skel->bss) / sizeof(__u64); i++) {
+		if (!ASSERT_EQ(result[i], 1, "fentry_result"))
+			return -1;
 	}
 
+	fentry_test__detach(fentry_skel);
+
+	/* zero results for re-attach test */
+	memset(fentry_skel->bss, 0, sizeof(*fentry_skel->bss));
+	return 0;
+}
+
+void test_fentry_test(void)
+{
+	struct fentry_test *fentry_skel = NULL;
+	int err;
+
+	fentry_skel = fentry_test__open_and_load();
+	if (!ASSERT_OK_PTR(fentry_skel, "fentry_skel_load"))
+		goto cleanup;
+
+	err = fentry_test(fentry_skel);
+	if (!ASSERT_OK(err, "fentry_first_attach"))
+		goto cleanup;
+
+	err = fentry_test(fentry_skel);
+	ASSERT_OK(err, "fentry_second_attach");
+
 cleanup:
 	fentry_test__destroy(fentry_skel);
 }
diff --git a/tools/testing/selftests/bpf/test_progs.h b/tools/testing/selftests/bpf/test_progs.h
index e87c8546230e..ee7e3b45182a 100644
--- a/tools/testing/selftests/bpf/test_progs.h
+++ b/tools/testing/selftests/bpf/test_progs.h
@@ -210,7 +210,7 @@  extern int test__join_cgroup(const char *path);
 #define ASSERT_ERR_PTR(ptr, name) ({					\
 	static int duration = 0;					\
 	const void *___res = (ptr);					\
-	bool ___ok = IS_ERR(___res)					\
+	bool ___ok = IS_ERR(___res);					\
 	CHECK(!___ok, (name), "unexpected pointer: %p\n", ___res);	\
 	___ok;								\
 })