All of lore.kernel.org
 help / color / mirror / Atom feed
From: Song Liu <liu.song.a23@gmail.com>
To: Daniel Borkmann <daniel@iogearbox.net>
Cc: Alexei Starovoitov <ast@kernel.org>, netdev@vger.kernel.org
Subject: Re: [PATCH bpf-next 02/11] bpf: add also cbpf long jump test cases with heavy expansion
Date: Tue, 29 May 2018 11:09:44 -0700	[thread overview]
Message-ID: <CAPhsuW4So3uSu9M_8wpn6qgO+9kHCkseW0JQqPmc7PNxPGbX9A@mail.gmail.com> (raw)
In-Reply-To: <20180528004344.3606-3-daniel@iogearbox.net>

On Sun, May 27, 2018 at 5:43 PM, Daniel Borkmann <daniel@iogearbox.net> wrote:
> We have one triggering on eBPF but lets also add a cBPF example to
> make sure we keep tracking them. Also add anther cBPF test running
> max number of MSH ops.
>
> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
> Acked-by: Alexei Starovoitov <ast@kernel.org>

Acked-by: Song Liu <songliubraving@fb.com>


> ---
>  lib/test_bpf.c | 63 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>  1 file changed, 63 insertions(+)
>
> diff --git a/lib/test_bpf.c b/lib/test_bpf.c
> index 317f231..60aedc8 100644
> --- a/lib/test_bpf.c
> +++ b/lib/test_bpf.c
> @@ -356,6 +356,52 @@ static int bpf_fill_maxinsns11(struct bpf_test *self)
>         return __bpf_fill_ja(self, BPF_MAXINSNS, 68);
>  }
>
> +static int bpf_fill_maxinsns12(struct bpf_test *self)
> +{
> +       unsigned int len = BPF_MAXINSNS;
> +       struct sock_filter *insn;
> +       int i = 0;
> +
> +       insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL);
> +       if (!insn)
> +               return -ENOMEM;
> +
> +       insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0);
> +
> +       for (i = 1; i < len - 1; i++)
> +               insn[i] = __BPF_STMT(BPF_LDX | BPF_B | BPF_MSH, 0);
> +
> +       insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab);
> +
> +       self->u.ptr.insns = insn;
> +       self->u.ptr.len = len;
> +
> +       return 0;
> +}
> +
> +static int bpf_fill_maxinsns13(struct bpf_test *self)
> +{
> +       unsigned int len = BPF_MAXINSNS;
> +       struct sock_filter *insn;
> +       int i = 0;
> +
> +       insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL);
> +       if (!insn)
> +               return -ENOMEM;
> +
> +       for (i = 0; i < len - 3; i++)
> +               insn[i] = __BPF_STMT(BPF_LDX | BPF_B | BPF_MSH, 0);
> +
> +       insn[len - 3] = __BPF_STMT(BPF_LD | BPF_IMM, 0xabababab);
> +       insn[len - 2] = __BPF_STMT(BPF_ALU | BPF_XOR | BPF_X, 0);
> +       insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0);
> +
> +       self->u.ptr.insns = insn;
> +       self->u.ptr.len = len;
> +
> +       return 0;
> +}
> +
>  static int bpf_fill_ja(struct bpf_test *self)
>  {
>         /* Hits exactly 11 passes on x86_64 JIT. */
> @@ -5290,6 +5336,23 @@ static struct bpf_test tests[] = {
>                 .expected_errcode = -ENOTSUPP,
>         },
>         {
> +               "BPF_MAXINSNS: jump over MSH",
> +               { },
> +               CLASSIC | FLAG_EXPECTED_FAIL,
> +               { 0xfa, 0xfb, 0xfc, 0xfd, },
> +               { { 4, 0xabababab } },
> +               .fill_helper = bpf_fill_maxinsns12,
> +               .expected_errcode = -EINVAL,
> +       },
> +       {
> +               "BPF_MAXINSNS: exec all MSH",
> +               { },
> +               CLASSIC,
> +               { 0xfa, 0xfb, 0xfc, 0xfd, },
> +               { { 4, 0xababab83 } },
> +               .fill_helper = bpf_fill_maxinsns13,
> +       },
> +       {
>                 "BPF_MAXINSNS: ld_abs+get_processor_id",
>                 { },
>                 CLASSIC,
> --
> 2.9.5
>

  reply	other threads:[~2018-05-29 18:09 UTC|newest]

Thread overview: 29+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-05-28  0:43 [PATCH bpf-next 00/11] Misc BPF improvements Daniel Borkmann
2018-05-28  0:43 ` [PATCH bpf-next 01/11] bpf: test case for map pointer poison with calls/branches Daniel Borkmann
2018-05-29 18:01   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 02/11] bpf: add also cbpf long jump test cases with heavy expansion Daniel Borkmann
2018-05-29 18:09   ` Song Liu [this message]
2018-05-28  0:43 ` [PATCH bpf-next 03/11] bpf: fixup error message from gpl helpers on license mismatch Daniel Borkmann
2018-05-29 17:16   ` Jesper Dangaard Brouer
2018-05-29 18:10     ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 04/11] bpf: show prog and map id in fdinfo Daniel Borkmann
2018-05-29 17:27   ` Jesper Dangaard Brouer
2018-05-29 19:55     ` Daniel Borkmann
2018-05-30 16:15       ` Song Liu
2018-05-30 17:15         ` Jesper Dangaard Brouer
2018-05-28  0:43 ` [PATCH bpf-next 05/11] bpf: avoid retpoline for lookup/update/delete calls on maps Daniel Borkmann
2018-05-29 17:23   ` Jesper Dangaard Brouer
2018-05-30 17:06   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 06/11] bpf: add bpf_skb_cgroup_id helper Daniel Borkmann
2018-05-29 12:15   ` Quentin Monnet
2018-05-29 15:43     ` Daniel Borkmann
2018-05-28  0:43 ` [PATCH bpf-next 07/11] bpf: make sure to clear unused fields in tunnel/xfrm state fetch Daniel Borkmann
2018-05-30 17:15   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 08/11] bpf: fix cbpf parser bug for octal numbers Daniel Borkmann
2018-05-30 17:16   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 09/11] bpf: fix context access in tracing progs on 32 bit archs Daniel Borkmann
2018-05-30 16:46   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 10/11] bpf: sync bpf uapi header with tools Daniel Borkmann
2018-05-30 16:10   ` Song Liu
2018-05-28  0:43 ` [PATCH bpf-next 11/11] bpf, doc: add missing patchwork url and libbpf to maintainers Daniel Borkmann
2018-05-30  0:16   ` Song Liu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAPhsuW4So3uSu9M_8wpn6qgO+9kHCkseW0JQqPmc7PNxPGbX9A@mail.gmail.com \
    --to=liu.song.a23@gmail.com \
    --cc=ast@kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.