linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* perf test BPF failing on 4.15.0-rc6
@ 2018-01-02 18:59 Arnaldo Carvalho de Melo
  2018-01-03  4:42 ` Wangnan (F)
  0 siblings, 1 reply; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-02 18:59 UTC (permalink / raw)
  To: Wang Nan
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Hi Wang,

	I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
only test failing for me is:

[root@jouet linux]# perf test bpf
39: BPF filter                                            :
39.1: Basic BPF filtering                                 : FAILED!
39.2: BPF pinning                                         : Skip
39.3: BPF prologue generation                             : Skip
39.4: BPF relocation checker                              : Skip
[root@jouet linux]#

I haven't checked but perhaps the problem is that SyS_epoll_wait seems
to now be inlined in three places and perhaps the eBPF proggie is being
added to just one of them?

Seemingly relevant excerpt:

Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
Try to find probe point from debuginfo.
Matched function: SyS_epoll_wait [2f40eb7]
found inline addr: 0xffffffff812b6ff1
Probe point found: compat_SyS_epoll_pwait+129
found inline addr: 0xffffffff812b6de7
Probe point found: SyS_epoll_pwait+135
found inline addr: 0xffffffff812b6c80
Probe point found: SyS_epoll_wait+0
Found 3 probe_trace_events.

- Arnaldo

P.S.: Full -v output:

[root@jouet linux]# uname -a
Linux jouet 4.15.0-rc6 #4 SMP Tue Jan 2 14:30:53 -03 2018 x86_64 x86_64 x86_64 GNU/Linux
[root@jouet linux]# gcc -v
Using built-in specs.
COLLECT_GCC=/usr/bin/gcc
COLLECT_LTO_WRAPPER=/usr/libexec/gcc/x86_64-redhat-linux/7/lto-wrapper
OFFLOAD_TARGET_NAMES=nvptx-none
OFFLOAD_TARGET_DEFAULT=1
Target: x86_64-redhat-linux
Configured with: ../configure --enable-bootstrap --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info --with-bugurl=http://bugzilla.redhat.com/bugzilla --enable-shared --enable-threads=posix --enable-checking=release --enable-multilib --with-system-zlib --enable-__cxa_atexit --disable-libunwind-exceptions --enable-gnu-unique-object --enable-linker-build-id --with-gcc-major-version-only --with-linker-hash-style=gnu --enable-plugin --enable-initfini-array --with-isl --enable-libmpx --enable-offload-targets=nvptx-none --without-cuda-driver --enable-gnu-indirect-function --with-tune=generic --with-arch_32=i686 --build=x86_64-redhat-linux
Thread model: posix
gcc version 7.2.1 20170915 (Red Hat 7.2.1-2) (GCC) 
[root@jouet linux]# clang -v
clang version 6.0.0 (http://llvm.org/git/clang.git 56cc8f8880db2ebc433eeb6b6a707c101467a186) (http://llvm.org/git/llvm.git 3656d83960a4f3fedf6d8f19043abf52379f78c3)
Target: x86_64-unknown-linux-gnu
Thread model: posix
InstalledDir: /usr/local/bin
Found candidate GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
Selected GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
Candidate multilib: .;@m64
Candidate multilib: 32;@m32
Selected multilib: .;@m64
[root@jouet linux]# perf test -v BPF
39: BPF filter                                            :
39.1: Basic BPF filtering                                 :
--- start ---
test child forked, pid 24304
Kernel build dir is set to /lib/modules/4.15.0-rc6/build
set env: KBUILD_DIR=/lib/modules/4.15.0-rc6/build
unset env: KBUILD_OPTS
include option is set to  -nostdinc -isystem /usr/lib/gcc/x86_64-redhat-linux/7/include -I/home/acme/git/linux/arch/x86/include -I./arch/x86/include/generated  -I/home/acme/git/linux/include -I./include -I/home/acme/git/linux/arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I/home/acme/git/linux/include/uapi -I./include/generated/uapi -include /home/acme/git/linux/include/linux/kconfig.h 
set env: NR_CPUS=4
set env: LINUX_VERSION_CODE=0x40f00
set env: CLANG_EXEC=/usr/local/bin/clang
set env: CLANG_OPTIONS=-xc 
set env: KERNEL_INC_OPTIONS= -nostdinc -isystem /usr/lib/gcc/x86_64-redhat-linux/7/include -I/home/acme/git/linux/arch/x86/include -I./arch/x86/include/generated  -I/home/acme/git/linux/include -I./include -I/home/acme/git/linux/arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I/home/acme/git/linux/include/uapi -I./include/generated/uapi -include /home/acme/git/linux/include/linux/kconfig.h 
set env: WORKING_DIR=/lib/modules/4.15.0-rc6/build
set env: CLANG_SOURCE=-
llvm compiling command template: echo '/*
 * bpf-script-example.c
 * Test basic LLVM building
 */
#ifndef LINUX_VERSION_CODE
# error Need LINUX_VERSION_CODE
# error Example: for 4.2 kernel, put 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of ~/.perfconfig'
#endif
#define BPF_ANY 0
#define BPF_MAP_TYPE_ARRAY 2
#define BPF_FUNC_map_lookup_elem 1
#define BPF_FUNC_map_update_elem 2

static void *(*bpf_map_lookup_elem)(void *map, void *key) =
	(void *) BPF_FUNC_map_lookup_elem;
static void *(*bpf_map_update_elem)(void *map, void *key, void *value, int flags) =
	(void *) BPF_FUNC_map_update_elem;

struct bpf_map_def {
	unsigned int type;
	unsigned int key_size;
	unsigned int value_size;
	unsigned int max_entries;
};

#define SEC(NAME) __attribute__((section(NAME), used))
struct bpf_map_def SEC("maps") flip_table = {
	.type = BPF_MAP_TYPE_ARRAY,
	.key_size = sizeof(int),
	.value_size = sizeof(int),
	.max_entries = 1,
};

SEC("func=SyS_epoll_wait")
int bpf_func__SyS_epoll_wait(void *ctx)
{
	int ind =0;
	int *flag = bpf_map_lookup_elem(&flip_table, &ind);
	int new_flag;
	if (!flag)
		return 0;
	/* flip flag and store back */
	new_flag = !*flag;
	bpf_map_update_elem(&flip_table, &ind, &new_flag, BPF_ANY);
	return new_flag;
}
char _license[] SEC("license") = "GPL";
int _version SEC("version") = LINUX_VERSION_CODE;
' | $CLANG_EXEC -D__KERNEL__ -D__NR_CPUS__=$NR_CPUS -DLINUX_VERSION_CODE=$LINUX_VERSION_CODE $CLANG_OPTIONS $KERNEL_INC_OPTIONS -Wno-unused-value -Wno-pointer-sign -working-directory $WORKING_DIR -c "$CLANG_SOURCE" -target bpf -O2 -o -
libbpf: loading object '[basic_bpf_test]' from buffer
libbpf: section .strtab, size 120, link 0, flags 0, type=3
libbpf: section .text, size 0, link 0, flags 6, type=1
libbpf: section func=SyS_epoll_wait, size 192, link 0, flags 6, type=1
libbpf: found program func=SyS_epoll_wait
libbpf: section .relfunc=SyS_epoll_wait, size 32, link 8, flags 0, type=9
libbpf: section maps, size 16, link 0, flags 3, type=1
libbpf: section license, size 4, link 0, flags 3, type=1
libbpf: license of [basic_bpf_test] is GPL
libbpf: section version, size 4, link 0, flags 3, type=1
libbpf: kernel version of [basic_bpf_test] is 40f00
libbpf: section .symtab, size 168, link 1, flags 0, type=2
libbpf: maps in [basic_bpf_test]: 1 maps in 16 bytes
libbpf: map 0 is "flip_table"
libbpf: collecting relocating info for: 'func=SyS_epoll_wait'
libbpf: relocation: insn_idx=4
libbpf: relocation: find map 0 (flip_table) for insn 4
libbpf: relocation: insn_idx=17
libbpf: relocation: find map 0 (flip_table) for insn 17
bpf: config program 'func=SyS_epoll_wait'
symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
bpf: config 'func=SyS_epoll_wait' is ok
Looking at the vmlinux_path (8 entries long)
Using /lib/modules/4.15.0-rc6/build/vmlinux for symbols
Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
Try to find probe point from debuginfo.
Matched function: SyS_epoll_wait [2f40eb7]
found inline addr: 0xffffffff812b6ff1
Probe point found: compat_SyS_epoll_pwait+129
found inline addr: 0xffffffff812b6de7
Probe point found: SyS_epoll_pwait+135
found inline addr: 0xffffffff812b6c80
Probe point found: SyS_epoll_wait+0
Found 3 probe_trace_events.
Opening /sys/kernel/debug/tracing//kprobe_events write=1
Writing event: p:perf_bpf_probe/func _text+2846705
Writing event: p:perf_bpf_probe/func_1 _text+2846183
Writing event: p:perf_bpf_probe/func_2 _text+2845824
libbpf: create map flip_table: fd=3
add bpf event perf_bpf_probe:func and attach bpf program 4
registering plugin: /root/.traceevent/plugins/plugin_kvm.so
registering plugin: /root/.traceevent/plugins/plugin_hrtimer.so
registering plugin: /root/.traceevent/plugins/plugin_jbd2.so
registering plugin: /root/.traceevent/plugins/plugin_kmem.so
registering plugin: /root/.traceevent/plugins/plugin_scsi.so
registering plugin: /root/.traceevent/plugins/plugin_sched_switch.so
registering plugin: /root/.traceevent/plugins/plugin_function.so
registering plugin: /root/.traceevent/plugins/plugin_xen.so
registering plugin: /root/.traceevent/plugins/plugin_mac80211.so
registering plugin: /root/.traceevent/plugins/plugin_cfg80211.so
adding perf_bpf_probe:func
adding perf_bpf_probe:func to 0x24e3850
add bpf event perf_bpf_probe:func_1 and attach bpf program 4
adding perf_bpf_probe:func_1
adding perf_bpf_probe:func_1 to 0x1965020
add bpf event perf_bpf_probe:func_2 and attach bpf program 4
adding perf_bpf_probe:func_2
adding perf_bpf_probe:func_2 to 0x19656a0
mmap size 1052672B
BPF filter result incorrect, expected 56, got 0 samples
Opening /sys/kernel/debug/tracing//kprobe_events write=1
Opening /sys/kernel/debug/tracing//uprobe_events write=1
Parsing probe_events: p:perf_bpf_probe/func _text+2846705
Group:perf_bpf_probe Event:func probe:p
Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
Group:perf_bpf_probe Event:func_1 probe:p
Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
Group:perf_bpf_probe Event:func_2 probe:p
Writing event: -:perf_bpf_probe/func
Opening /sys/kernel/debug/tracing//kprobe_events write=1
Opening /sys/kernel/debug/tracing//uprobe_events write=1
Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
Group:perf_bpf_probe Event:func_1 probe:p
Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
Group:perf_bpf_probe Event:func_2 probe:p
Writing event: -:perf_bpf_probe/func_1
Opening /sys/kernel/debug/tracing//kprobe_events write=1
Opening /sys/kernel/debug/tracing//uprobe_events write=1
Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
Group:perf_bpf_probe Event:func_2 probe:p
Writing event: -:perf_bpf_probe/func_2
test child finished with -1
---- end ----
BPF filter subtest 0: FAILED!
39.2: BPF pinning                                         :
--- force skipped ---
BPF filter subtest 1: Skip
39.3: BPF prologue generation                             :
--- force skipped ---
BPF filter subtest 2: Skip
39.4: BPF relocation checker                              :
--- force skipped ---
BPF filter subtest 3: Skip
[root@jouet linux]# 
[root@jouet linux]#

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-02 18:59 perf test BPF failing on 4.15.0-rc6 Arnaldo Carvalho de Melo
@ 2018-01-03  4:42 ` Wangnan (F)
  2018-01-03  4:58   ` Wangnan (F)
  0 siblings, 1 reply; 9+ messages in thread
From: Wangnan (F) @ 2018-01-03  4:42 UTC (permalink / raw)
  To: Arnaldo Carvalho de Melo
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Unable to reproduce. In my kernel configuration, SyS_epoll_wait is not 
inlined at all.

 From the log you sent, it seems that all 3 instances are attached. This 
testcase should work if the last one (SyS_epoll_wait) get probed correctly.

Could you please have a look if the 3rd kprobe event 
(p:perf_bpf_probe/func_2 _text+2845824) works?

Thank you.

On 2018/1/3 2:59, Arnaldo Carvalho de Melo wrote:
> Hi Wang,
>
> 	I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
> only test failing for me is:
>
> [root@jouet linux]# perf test bpf
> 39: BPF filter                                            :
> 39.1: Basic BPF filtering                                 : FAILED!
> 39.2: BPF pinning                                         : Skip
> 39.3: BPF prologue generation                             : Skip
> 39.4: BPF relocation checker                              : Skip
> [root@jouet linux]#
>
> I haven't checked but perhaps the problem is that SyS_epoll_wait seems
> to now be inlined in three places and perhaps the eBPF proggie is being
> added to just one of them?
>
> Seemingly relevant excerpt:
>
> Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
> Try to find probe point from debuginfo.
> Matched function: SyS_epoll_wait [2f40eb7]
> found inline addr: 0xffffffff812b6ff1
> Probe point found: compat_SyS_epoll_pwait+129
> found inline addr: 0xffffffff812b6de7
> Probe point found: SyS_epoll_pwait+135
> found inline addr: 0xffffffff812b6c80
> Probe point found: SyS_epoll_wait+0
> Found 3 probe_trace_events.
>
> - Arnaldo
>
> P.S.: Full -v output:
>
> [root@jouet linux]# uname -a
> Linux jouet 4.15.0-rc6 #4 SMP Tue Jan 2 14:30:53 -03 2018 x86_64 x86_64 x86_64 GNU/Linux
> [root@jouet linux]# gcc -v
> Using built-in specs.
> COLLECT_GCC=/usr/bin/gcc
> COLLECT_LTO_WRAPPER=/usr/libexec/gcc/x86_64-redhat-linux/7/lto-wrapper
> OFFLOAD_TARGET_NAMES=nvptx-none
> OFFLOAD_TARGET_DEFAULT=1
> Target: x86_64-redhat-linux
> Configured with: ../configure --enable-bootstrap --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info --with-bugurl=http://bugzilla.redhat.com/bugzilla --enable-shared --enable-threads=posix --enable-checking=release --enable-multilib --with-system-zlib --enable-__cxa_atexit --disable-libunwind-exceptions --enable-gnu-unique-object --enable-linker-build-id --with-gcc-major-version-only --with-linker-hash-style=gnu --enable-plugin --enable-initfini-array --with-isl --enable-libmpx --enable-offload-targets=nvptx-none --without-cuda-driver --enable-gnu-indirect-function --with-tune=generic --with-arch_32=i686 --build=x86_64-redhat-linux
> Thread model: posix
> gcc version 7.2.1 20170915 (Red Hat 7.2.1-2) (GCC)
> [root@jouet linux]# clang -v
> clang version 6.0.0 (http://llvm.org/git/clang.git 56cc8f8880db2ebc433eeb6b6a707c101467a186) (http://llvm.org/git/llvm.git 3656d83960a4f3fedf6d8f19043abf52379f78c3)
> Target: x86_64-unknown-linux-gnu
> Thread model: posix
> InstalledDir: /usr/local/bin
> Found candidate GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
> Selected GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
> Candidate multilib: .;@m64
> Candidate multilib: 32;@m32
> Selected multilib: .;@m64
> [root@jouet linux]# perf test -v BPF
> 39: BPF filter                                            :
> 39.1: Basic BPF filtering                                 :
> --- start ---
> test child forked, pid 24304
> Kernel build dir is set to /lib/modules/4.15.0-rc6/build
> set env: KBUILD_DIR=/lib/modules/4.15.0-rc6/build
> unset env: KBUILD_OPTS
> include option is set to  -nostdinc -isystem /usr/lib/gcc/x86_64-redhat-linux/7/include -I/home/acme/git/linux/arch/x86/include -I./arch/x86/include/generated  -I/home/acme/git/linux/include -I./include -I/home/acme/git/linux/arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I/home/acme/git/linux/include/uapi -I./include/generated/uapi -include /home/acme/git/linux/include/linux/kconfig.h
> set env: NR_CPUS=4
> set env: LINUX_VERSION_CODE=0x40f00
> set env: CLANG_EXEC=/usr/local/bin/clang
> set env: CLANG_OPTIONS=-xc
> set env: KERNEL_INC_OPTIONS= -nostdinc -isystem /usr/lib/gcc/x86_64-redhat-linux/7/include -I/home/acme/git/linux/arch/x86/include -I./arch/x86/include/generated  -I/home/acme/git/linux/include -I./include -I/home/acme/git/linux/arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I/home/acme/git/linux/include/uapi -I./include/generated/uapi -include /home/acme/git/linux/include/linux/kconfig.h
> set env: WORKING_DIR=/lib/modules/4.15.0-rc6/build
> set env: CLANG_SOURCE=-
> llvm compiling command template: echo '/*
>   * bpf-script-example.c
>   * Test basic LLVM building
>   */
> #ifndef LINUX_VERSION_CODE
> # error Need LINUX_VERSION_CODE
> # error Example: for 4.2 kernel, put 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of ~/.perfconfig'
> #endif
> #define BPF_ANY 0
> #define BPF_MAP_TYPE_ARRAY 2
> #define BPF_FUNC_map_lookup_elem 1
> #define BPF_FUNC_map_update_elem 2
>
> static void *(*bpf_map_lookup_elem)(void *map, void *key) =
> 	(void *) BPF_FUNC_map_lookup_elem;
> static void *(*bpf_map_update_elem)(void *map, void *key, void *value, int flags) =
> 	(void *) BPF_FUNC_map_update_elem;
>
> struct bpf_map_def {
> 	unsigned int type;
> 	unsigned int key_size;
> 	unsigned int value_size;
> 	unsigned int max_entries;
> };
>
> #define SEC(NAME) __attribute__((section(NAME), used))
> struct bpf_map_def SEC("maps") flip_table = {
> 	.type = BPF_MAP_TYPE_ARRAY,
> 	.key_size = sizeof(int),
> 	.value_size = sizeof(int),
> 	.max_entries = 1,
> };
>
> SEC("func=SyS_epoll_wait")
> int bpf_func__SyS_epoll_wait(void *ctx)
> {
> 	int ind =0;
> 	int *flag = bpf_map_lookup_elem(&flip_table, &ind);
> 	int new_flag;
> 	if (!flag)
> 		return 0;
> 	/* flip flag and store back */
> 	new_flag = !*flag;
> 	bpf_map_update_elem(&flip_table, &ind, &new_flag, BPF_ANY);
> 	return new_flag;
> }
> char _license[] SEC("license") = "GPL";
> int _version SEC("version") = LINUX_VERSION_CODE;
> ' | $CLANG_EXEC -D__KERNEL__ -D__NR_CPUS__=$NR_CPUS -DLINUX_VERSION_CODE=$LINUX_VERSION_CODE $CLANG_OPTIONS $KERNEL_INC_OPTIONS -Wno-unused-value -Wno-pointer-sign -working-directory $WORKING_DIR -c "$CLANG_SOURCE" -target bpf -O2 -o -
> libbpf: loading object '[basic_bpf_test]' from buffer
> libbpf: section .strtab, size 120, link 0, flags 0, type=3
> libbpf: section .text, size 0, link 0, flags 6, type=1
> libbpf: section func=SyS_epoll_wait, size 192, link 0, flags 6, type=1
> libbpf: found program func=SyS_epoll_wait
> libbpf: section .relfunc=SyS_epoll_wait, size 32, link 8, flags 0, type=9
> libbpf: section maps, size 16, link 0, flags 3, type=1
> libbpf: section license, size 4, link 0, flags 3, type=1
> libbpf: license of [basic_bpf_test] is GPL
> libbpf: section version, size 4, link 0, flags 3, type=1
> libbpf: kernel version of [basic_bpf_test] is 40f00
> libbpf: section .symtab, size 168, link 1, flags 0, type=2
> libbpf: maps in [basic_bpf_test]: 1 maps in 16 bytes
> libbpf: map 0 is "flip_table"
> libbpf: collecting relocating info for: 'func=SyS_epoll_wait'
> libbpf: relocation: insn_idx=4
> libbpf: relocation: find map 0 (flip_table) for insn 4
> libbpf: relocation: insn_idx=17
> libbpf: relocation: find map 0 (flip_table) for insn 17
> bpf: config program 'func=SyS_epoll_wait'
> symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
> bpf: config 'func=SyS_epoll_wait' is ok
> Looking at the vmlinux_path (8 entries long)
> Using /lib/modules/4.15.0-rc6/build/vmlinux for symbols
> Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
> Try to find probe point from debuginfo.
> Matched function: SyS_epoll_wait [2f40eb7]
> found inline addr: 0xffffffff812b6ff1
> Probe point found: compat_SyS_epoll_pwait+129
> found inline addr: 0xffffffff812b6de7
> Probe point found: SyS_epoll_pwait+135
> found inline addr: 0xffffffff812b6c80
> Probe point found: SyS_epoll_wait+0
> Found 3 probe_trace_events.
> Opening /sys/kernel/debug/tracing//kprobe_events write=1
> Writing event: p:perf_bpf_probe/func _text+2846705
> Writing event: p:perf_bpf_probe/func_1 _text+2846183
> Writing event: p:perf_bpf_probe/func_2 _text+2845824
> libbpf: create map flip_table: fd=3
> add bpf event perf_bpf_probe:func and attach bpf program 4
> registering plugin: /root/.traceevent/plugins/plugin_kvm.so
> registering plugin: /root/.traceevent/plugins/plugin_hrtimer.so
> registering plugin: /root/.traceevent/plugins/plugin_jbd2.so
> registering plugin: /root/.traceevent/plugins/plugin_kmem.so
> registering plugin: /root/.traceevent/plugins/plugin_scsi.so
> registering plugin: /root/.traceevent/plugins/plugin_sched_switch.so
> registering plugin: /root/.traceevent/plugins/plugin_function.so
> registering plugin: /root/.traceevent/plugins/plugin_xen.so
> registering plugin: /root/.traceevent/plugins/plugin_mac80211.so
> registering plugin: /root/.traceevent/plugins/plugin_cfg80211.so
> adding perf_bpf_probe:func
> adding perf_bpf_probe:func to 0x24e3850
> add bpf event perf_bpf_probe:func_1 and attach bpf program 4
> adding perf_bpf_probe:func_1
> adding perf_bpf_probe:func_1 to 0x1965020
> add bpf event perf_bpf_probe:func_2 and attach bpf program 4
> adding perf_bpf_probe:func_2
> adding perf_bpf_probe:func_2 to 0x19656a0
> mmap size 1052672B
> BPF filter result incorrect, expected 56, got 0 samples
> Opening /sys/kernel/debug/tracing//kprobe_events write=1
> Opening /sys/kernel/debug/tracing//uprobe_events write=1
> Parsing probe_events: p:perf_bpf_probe/func _text+2846705
> Group:perf_bpf_probe Event:func probe:p
> Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
> Group:perf_bpf_probe Event:func_1 probe:p
> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> Group:perf_bpf_probe Event:func_2 probe:p
> Writing event: -:perf_bpf_probe/func
> Opening /sys/kernel/debug/tracing//kprobe_events write=1
> Opening /sys/kernel/debug/tracing//uprobe_events write=1
> Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
> Group:perf_bpf_probe Event:func_1 probe:p
> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> Group:perf_bpf_probe Event:func_2 probe:p
> Writing event: -:perf_bpf_probe/func_1
> Opening /sys/kernel/debug/tracing//kprobe_events write=1
> Opening /sys/kernel/debug/tracing//uprobe_events write=1
> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> Group:perf_bpf_probe Event:func_2 probe:p
> Writing event: -:perf_bpf_probe/func_2
> test child finished with -1
> ---- end ----
> BPF filter subtest 0: FAILED!
> 39.2: BPF pinning                                         :
> --- force skipped ---
> BPF filter subtest 1: Skip
> 39.3: BPF prologue generation                             :
> --- force skipped ---
> BPF filter subtest 2: Skip
> 39.4: BPF relocation checker                              :
> --- force skipped ---
> BPF filter subtest 3: Skip
> [root@jouet linux]#
> [root@jouet linux]#

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03  4:42 ` Wangnan (F)
@ 2018-01-03  4:58   ` Wangnan (F)
  2018-01-03 16:58     ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 9+ messages in thread
From: Wangnan (F) @ 2018-01-03  4:58 UTC (permalink / raw)
  To: Arnaldo Carvalho de Melo
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

And please check if the kprobe created by

  $ perf probe -v SyS_epoll_wait

works for the test program used by this testcase:

#include <sys/epoll.h>
#include <stdlib.h>

#define NR_ITERS 100

static int epoll_wait_loop(void)
{
         int i;

         /* Should fail NR_ITERS times */
         for (i = 0; i < NR_ITERS; i++)
                 epoll_wait(-(i + 1), NULL, 0, 0);
         return 0;
}

int main()
{
         epoll_wait_loop();
         return 0;
}

In my configuration it gives 100 samples:

$ sudo ./perf record -e probe:SyS_epoll_wait /tmp/a.out
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.016 MB perf.data (100 samples) ]

I guess in your configuration you would get 3 tracepoints, and can get 0 
sample from them.

Thank you.

On 2018/1/3 12:42, Wangnan (F) wrote:
> Unable to reproduce. In my kernel configuration, SyS_epoll_wait is not 
> inlined at all.
>
> From the log you sent, it seems that all 3 instances are attached. 
> This testcase should work if the last one (SyS_epoll_wait) get probed 
> correctly.
>
> Could you please have a look if the 3rd kprobe event 
> (p:perf_bpf_probe/func_2 _text+2845824) works?
>
> Thank you.
>
> On 2018/1/3 2:59, Arnaldo Carvalho de Melo wrote:
>> Hi Wang,
>>
>>     I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
>> only test failing for me is:
>>
>> [root@jouet linux]# perf test bpf
>> 39: BPF filter                                            :
>> 39.1: Basic BPF filtering                                 : FAILED!
>> 39.2: BPF pinning                                         : Skip
>> 39.3: BPF prologue generation                             : Skip
>> 39.4: BPF relocation checker                              : Skip
>> [root@jouet linux]#
>>
>> I haven't checked but perhaps the problem is that SyS_epoll_wait seems
>> to now be inlined in three places and perhaps the eBPF proggie is being
>> added to just one of them?
>>
>> Seemingly relevant excerpt:
>>
>> Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
>> Try to find probe point from debuginfo.
>> Matched function: SyS_epoll_wait [2f40eb7]
>> found inline addr: 0xffffffff812b6ff1
>> Probe point found: compat_SyS_epoll_pwait+129
>> found inline addr: 0xffffffff812b6de7
>> Probe point found: SyS_epoll_pwait+135
>> found inline addr: 0xffffffff812b6c80
>> Probe point found: SyS_epoll_wait+0
>> Found 3 probe_trace_events.
>>
>> - Arnaldo
>>
>> P.S.: Full -v output:
>>
>> [root@jouet linux]# uname -a
>> Linux jouet 4.15.0-rc6 #4 SMP Tue Jan 2 14:30:53 -03 2018 x86_64 
>> x86_64 x86_64 GNU/Linux
>> [root@jouet linux]# gcc -v
>> Using built-in specs.
>> COLLECT_GCC=/usr/bin/gcc
>> COLLECT_LTO_WRAPPER=/usr/libexec/gcc/x86_64-redhat-linux/7/lto-wrapper
>> OFFLOAD_TARGET_NAMES=nvptx-none
>> OFFLOAD_TARGET_DEFAULT=1
>> Target: x86_64-redhat-linux
>> Configured with: ../configure --enable-bootstrap 
>> --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto 
>> --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info 
>> --with-bugurl=http://bugzilla.redhat.com/bugzilla --enable-shared 
>> --enable-threads=posix --enable-checking=release --enable-multilib 
>> --with-system-zlib --enable-__cxa_atexit 
>> --disable-libunwind-exceptions --enable-gnu-unique-object 
>> --enable-linker-build-id --with-gcc-major-version-only 
>> --with-linker-hash-style=gnu --enable-plugin --enable-initfini-array 
>> --with-isl --enable-libmpx --enable-offload-targets=nvptx-none 
>> --without-cuda-driver --enable-gnu-indirect-function 
>> --with-tune=generic --with-arch_32=i686 --build=x86_64-redhat-linux
>> Thread model: posix
>> gcc version 7.2.1 20170915 (Red Hat 7.2.1-2) (GCC)
>> [root@jouet linux]# clang -v
>> clang version 6.0.0 (http://llvm.org/git/clang.git 
>> 56cc8f8880db2ebc433eeb6b6a707c101467a186) 
>> (http://llvm.org/git/llvm.git 3656d83960a4f3fedf6d8f19043abf52379f78c3)
>> Target: x86_64-unknown-linux-gnu
>> Thread model: posix
>> InstalledDir: /usr/local/bin
>> Found candidate GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
>> Selected GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
>> Candidate multilib: .;@m64
>> Candidate multilib: 32;@m32
>> Selected multilib: .;@m64
>> [root@jouet linux]# perf test -v BPF
>> 39: BPF filter                                            :
>> 39.1: Basic BPF filtering                                 :
>> --- start ---
>> test child forked, pid 24304
>> Kernel build dir is set to /lib/modules/4.15.0-rc6/build
>> set env: KBUILD_DIR=/lib/modules/4.15.0-rc6/build
>> unset env: KBUILD_OPTS
>> include option is set to  -nostdinc -isystem 
>> /usr/lib/gcc/x86_64-redhat-linux/7/include 
>> -I/home/acme/git/linux/arch/x86/include 
>> -I./arch/x86/include/generated  -I/home/acme/git/linux/include 
>> -I./include -I/home/acme/git/linux/arch/x86/include/uapi 
>> -I./arch/x86/include/generated/uapi 
>> -I/home/acme/git/linux/include/uapi -I./include/generated/uapi 
>> -include /home/acme/git/linux/include/linux/kconfig.h
>> set env: NR_CPUS=4
>> set env: LINUX_VERSION_CODE=0x40f00
>> set env: CLANG_EXEC=/usr/local/bin/clang
>> set env: CLANG_OPTIONS=-xc
>> set env: KERNEL_INC_OPTIONS= -nostdinc -isystem 
>> /usr/lib/gcc/x86_64-redhat-linux/7/include 
>> -I/home/acme/git/linux/arch/x86/include 
>> -I./arch/x86/include/generated  -I/home/acme/git/linux/include 
>> -I./include -I/home/acme/git/linux/arch/x86/include/uapi 
>> -I./arch/x86/include/generated/uapi 
>> -I/home/acme/git/linux/include/uapi -I./include/generated/uapi 
>> -include /home/acme/git/linux/include/linux/kconfig.h
>> set env: WORKING_DIR=/lib/modules/4.15.0-rc6/build
>> set env: CLANG_SOURCE=-
>> llvm compiling command template: echo '/*
>>   * bpf-script-example.c
>>   * Test basic LLVM building
>>   */
>> #ifndef LINUX_VERSION_CODE
>> # error Need LINUX_VERSION_CODE
>> # error Example: for 4.2 kernel, put 
>> 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of 
>> ~/.perfconfig'
>> #endif
>> #define BPF_ANY 0
>> #define BPF_MAP_TYPE_ARRAY 2
>> #define BPF_FUNC_map_lookup_elem 1
>> #define BPF_FUNC_map_update_elem 2
>>
>> static void *(*bpf_map_lookup_elem)(void *map, void *key) =
>>     (void *) BPF_FUNC_map_lookup_elem;
>> static void *(*bpf_map_update_elem)(void *map, void *key, void 
>> *value, int flags) =
>>     (void *) BPF_FUNC_map_update_elem;
>>
>> struct bpf_map_def {
>>     unsigned int type;
>>     unsigned int key_size;
>>     unsigned int value_size;
>>     unsigned int max_entries;
>> };
>>
>> #define SEC(NAME) __attribute__((section(NAME), used))
>> struct bpf_map_def SEC("maps") flip_table = {
>>     .type = BPF_MAP_TYPE_ARRAY,
>>     .key_size = sizeof(int),
>>     .value_size = sizeof(int),
>>     .max_entries = 1,
>> };
>>
>> SEC("func=SyS_epoll_wait")
>> int bpf_func__SyS_epoll_wait(void *ctx)
>> {
>>     int ind =0;
>>     int *flag = bpf_map_lookup_elem(&flip_table, &ind);
>>     int new_flag;
>>     if (!flag)
>>         return 0;
>>     /* flip flag and store back */
>>     new_flag = !*flag;
>>     bpf_map_update_elem(&flip_table, &ind, &new_flag, BPF_ANY);
>>     return new_flag;
>> }
>> char _license[] SEC("license") = "GPL";
>> int _version SEC("version") = LINUX_VERSION_CODE;
>> ' | $CLANG_EXEC -D__KERNEL__ -D__NR_CPUS__=$NR_CPUS 
>> -DLINUX_VERSION_CODE=$LINUX_VERSION_CODE $CLANG_OPTIONS 
>> $KERNEL_INC_OPTIONS -Wno-unused-value -Wno-pointer-sign 
>> -working-directory $WORKING_DIR -c "$CLANG_SOURCE" -target bpf -O2 -o -
>> libbpf: loading object '[basic_bpf_test]' from buffer
>> libbpf: section .strtab, size 120, link 0, flags 0, type=3
>> libbpf: section .text, size 0, link 0, flags 6, type=1
>> libbpf: section func=SyS_epoll_wait, size 192, link 0, flags 6, type=1
>> libbpf: found program func=SyS_epoll_wait
>> libbpf: section .relfunc=SyS_epoll_wait, size 32, link 8, flags 0, 
>> type=9
>> libbpf: section maps, size 16, link 0, flags 3, type=1
>> libbpf: section license, size 4, link 0, flags 3, type=1
>> libbpf: license of [basic_bpf_test] is GPL
>> libbpf: section version, size 4, link 0, flags 3, type=1
>> libbpf: kernel version of [basic_bpf_test] is 40f00
>> libbpf: section .symtab, size 168, link 1, flags 0, type=2
>> libbpf: maps in [basic_bpf_test]: 1 maps in 16 bytes
>> libbpf: map 0 is "flip_table"
>> libbpf: collecting relocating info for: 'func=SyS_epoll_wait'
>> libbpf: relocation: insn_idx=4
>> libbpf: relocation: find map 0 (flip_table) for insn 4
>> libbpf: relocation: insn_idx=17
>> libbpf: relocation: find map 0 (flip_table) for insn 17
>> bpf: config program 'func=SyS_epoll_wait'
>> symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
>> bpf: config 'func=SyS_epoll_wait' is ok
>> Looking at the vmlinux_path (8 entries long)
>> Using /lib/modules/4.15.0-rc6/build/vmlinux for symbols
>> Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
>> Try to find probe point from debuginfo.
>> Matched function: SyS_epoll_wait [2f40eb7]
>> found inline addr: 0xffffffff812b6ff1
>> Probe point found: compat_SyS_epoll_pwait+129
>> found inline addr: 0xffffffff812b6de7
>> Probe point found: SyS_epoll_pwait+135
>> found inline addr: 0xffffffff812b6c80
>> Probe point found: SyS_epoll_wait+0
>> Found 3 probe_trace_events.
>> Opening /sys/kernel/debug/tracing//kprobe_events write=1
>> Writing event: p:perf_bpf_probe/func _text+2846705
>> Writing event: p:perf_bpf_probe/func_1 _text+2846183
>> Writing event: p:perf_bpf_probe/func_2 _text+2845824
>> libbpf: create map flip_table: fd=3
>> add bpf event perf_bpf_probe:func and attach bpf program 4
>> registering plugin: /root/.traceevent/plugins/plugin_kvm.so
>> registering plugin: /root/.traceevent/plugins/plugin_hrtimer.so
>> registering plugin: /root/.traceevent/plugins/plugin_jbd2.so
>> registering plugin: /root/.traceevent/plugins/plugin_kmem.so
>> registering plugin: /root/.traceevent/plugins/plugin_scsi.so
>> registering plugin: /root/.traceevent/plugins/plugin_sched_switch.so
>> registering plugin: /root/.traceevent/plugins/plugin_function.so
>> registering plugin: /root/.traceevent/plugins/plugin_xen.so
>> registering plugin: /root/.traceevent/plugins/plugin_mac80211.so
>> registering plugin: /root/.traceevent/plugins/plugin_cfg80211.so
>> adding perf_bpf_probe:func
>> adding perf_bpf_probe:func to 0x24e3850
>> add bpf event perf_bpf_probe:func_1 and attach bpf program 4
>> adding perf_bpf_probe:func_1
>> adding perf_bpf_probe:func_1 to 0x1965020
>> add bpf event perf_bpf_probe:func_2 and attach bpf program 4
>> adding perf_bpf_probe:func_2
>> adding perf_bpf_probe:func_2 to 0x19656a0
>> mmap size 1052672B
>> BPF filter result incorrect, expected 56, got 0 samples
>> Opening /sys/kernel/debug/tracing//kprobe_events write=1
>> Opening /sys/kernel/debug/tracing//uprobe_events write=1
>> Parsing probe_events: p:perf_bpf_probe/func _text+2846705
>> Group:perf_bpf_probe Event:func probe:p
>> Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
>> Group:perf_bpf_probe Event:func_1 probe:p
>> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
>> Group:perf_bpf_probe Event:func_2 probe:p
>> Writing event: -:perf_bpf_probe/func
>> Opening /sys/kernel/debug/tracing//kprobe_events write=1
>> Opening /sys/kernel/debug/tracing//uprobe_events write=1
>> Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
>> Group:perf_bpf_probe Event:func_1 probe:p
>> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
>> Group:perf_bpf_probe Event:func_2 probe:p
>> Writing event: -:perf_bpf_probe/func_1
>> Opening /sys/kernel/debug/tracing//kprobe_events write=1
>> Opening /sys/kernel/debug/tracing//uprobe_events write=1
>> Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
>> Group:perf_bpf_probe Event:func_2 probe:p
>> Writing event: -:perf_bpf_probe/func_2
>> test child finished with -1
>> ---- end ----
>> BPF filter subtest 0: FAILED!
>> 39.2: BPF pinning                                         :
>> --- force skipped ---
>> BPF filter subtest 1: Skip
>> 39.3: BPF prologue generation                             :
>> --- force skipped ---
>> BPF filter subtest 2: Skip
>> 39.4: BPF relocation checker                              :
>> --- force skipped ---
>> BPF filter subtest 3: Skip
>> [root@jouet linux]#
>> [root@jouet linux]#
>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03  4:58   ` Wangnan (F)
@ 2018-01-03 16:58     ` Arnaldo Carvalho de Melo
  2018-01-03 18:27       ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-03 16:58 UTC (permalink / raw)
  To: Wangnan (F)
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> And please check if the kprobe created by
> 
>  $ perf probe -v SyS_epoll_wait

[root@seventh ~]# perf probe -v SyS_epoll_wait
probe-definition(0): SyS_epoll_wait 
symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
0 arguments
Looking at the vmlinux_path (8 entries long)
Using /usr/lib/debug/lib/modules/4.14.8-300.fc27.x86_64/vmlinux for symbols
Open Debuginfo file: /usr/lib/debug/lib/modules/4.14.8-300.fc27.x86_64/vmlinux
Try to find probe point from debuginfo.
Matched function: SyS_epoll_wait [314b563]
found inline addr: 0xffffffff812d8087
Probe point found: compat_SyS_epoll_pwait+151
found inline addr: 0xffffffff812d7e5a
Probe point found: SyS_epoll_pwait+138
found inline addr: 0xffffffff812d7cf0
Probe point found: SyS_epoll_wait+0
Found 3 probe_trace_events.
Opening /sys/kernel/debug/tracing//kprobe_events write=1
Writing event: p:probe/SyS_epoll_wait _text+2982023
Writing event: p:probe/SyS_epoll_wait_1 _text+2981466
Writing event: p:probe/SyS_epoll_wait_2 _text+2981104
Added new events:
  probe:SyS_epoll_wait (on SyS_epoll_wait)
  probe:SyS_epoll_wait_1 (on SyS_epoll_wait)
  probe:SyS_epoll_wait_2 (on SyS_epoll_wait)

You can now use it in all perf tools, such as:

	perf record -e probe:SyS_epoll_wait_2 -aR sleep 1

[root@seventh ~]#

Then, with your proggie, it seems its glibc that now maps epoll_wait()
to a different syscall than in older systems:

[root@seventh ~]# trace -e probe:SyS_epoll_wait* ~acme/epoll
     0.018 ( 0.001 ms): epoll/20444 brk(                                                                  ) = 0x2600000
     0.029 ( 0.004 ms): epoll/20444 access(filename: 0xe874ec0, mode: R                                   ) = -1 ENOENT No such file or directory
     0.035 ( 0.003 ms): epoll/20444 openat(dfd: CWD, filename: 0xe872726, flags: CLOEXEC                  ) = 3
     0.040 ( 0.002 ms): epoll/20444 fstat(fd: 3, statbuf: 0x7fffcc37b830                                  ) = 0
     0.042 ( 0.002 ms): epoll/20444 mmap(len: 109538, prot: READ, flags: PRIVATE, fd: 3                   ) = 0x7fc50ea5d000
     0.045 ( 0.001 ms): epoll/20444 close(fd: 3                                                           ) = 0
     0.052 ( 0.003 ms): epoll/20444 openat(dfd: CWD, filename: 0xea7ace0, flags: CLOEXEC                  ) = 3
     0.056 ( 0.001 ms): epoll/20444 read(fd: 3, buf: 0x7fffcc37b9f8, count: 832                           ) = 832
     0.059 ( 0.001 ms): epoll/20444 fstat(fd: 3, statbuf: 0x7fffcc37b890                                  ) = 0
     0.060 ( 0.002 ms): epoll/20444 mmap(len: 8192, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS, fd: -1    ) = 0x7fc50ea5b000
     0.065 ( 0.003 ms): epoll/20444 mmap(len: 4074112, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3   ) = 0x7fc50e46e000
     0.068 ( 0.004 ms): epoll/20444 mprotect(start: 0x7fc50e648000, len: 2093056                          ) = 0
     0.073 ( 0.004 ms): epoll/20444 mmap(addr: 0x7fc50e847000, len: 24576, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 1937408) = 0x7fc50e847000
     0.079 ( 0.002 ms): epoll/20444 mmap(addr: 0x7fc50e84d000, len: 14976, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS|FIXED, fd: -1) = 0x7fc50e84d000
     0.085 ( 0.001 ms): epoll/20444 close(fd: 3                                                           ) = 0
     0.093 ( 0.001 ms): epoll/20444 arch_prctl(option: 4098, arg2: 140484331029696                        ) = 0
     0.128 ( 0.003 ms): epoll/20444 mprotect(start: 0x7fc50e847000, len: 16384, prot: READ                ) = 0
     0.133 ( 0.002 ms): epoll/20444 mprotect(start: 0x600000, len: 4096, prot: READ                       ) = 0
     0.137 ( 0.002 ms): epoll/20444 mprotect(start: 0x7fc50ea78000, len: 4096, prot: READ                 ) = 0
     0.140 ( 0.005 ms): epoll/20444 munmap(addr: 0x7fc50ea5d000, len: 109538                              ) = 0
     0.159 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -1, sigsetsize: 8                                   ) = -22
     0.160 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -2, sigsetsize: 8                                   ) = -22
     0.162 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -3, sigsetsize: 8                                   ) = -22
     0.163 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -4, sigsetsize: 8                                   ) = -22
     0.165 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -5, sigsetsize: 8                                   ) = -22
<SNIP>
     0.279 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -85, sigsetsize: 8                                  ) = -22
     0.280 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -86, sigsetsize: 8                                  ) = -22
     0.282 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -87, sigsetsize: 8                                  ) = -22
     0.283 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -88, sigsetsize: 8                                  ) = -22
     0.284 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -89, sigsetsize: 8                                  ) = -22
     0.286 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -90, sigsetsize: 8                                  ) = -22
     0.287 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -91, sigsetsize: 8                                  ) = -22
     0.289 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -92, sigsetsize: 8                                  ) = -22
     0.290 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -93, sigsetsize: 8                                  ) = -22
     0.292 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -94, sigsetsize: 8                                  ) = -22
     0.293 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -95, sigsetsize: 8                                  ) = -22
     0.294 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -96, sigsetsize: 8                                  ) = -22
     0.296 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -97, sigsetsize: 8                                  ) = -22
     0.297 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -98, sigsetsize: 8                                  ) = -22
     0.299 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -99, sigsetsize: 8                                  ) = -22
     0.300 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -100, sigsetsize: 8                                 ) = -22
     0.305 (     ?   ): epoll/20444 exit_group(                                                           )
[root@seventh ~]# 

This is on a Fedora 27 system, that has glibc 2.26, while on a RHEL7
machine, that has glibc 2.17, it still uses epoll_wait() and we get:

[root@felicio ~]# trace ./epoll
     0.018 ( 0.001 ms): epoll/2818 brk(                                                                  ) = 0x8e5000
     0.033 ( 0.002 ms): epoll/2818 mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738e3000
     0.041 ( 0.004 ms): epoll/2818 access(filename: 0x736e2160, mode: R                                  ) = -1 ENOENT No such file or directory
     0.051 ( 0.003 ms): epoll/2818 open(filename: 0x736e0a58, flags: CLOEXEC                             ) = 3
     0.056 ( 0.001 ms): epoll/2818 fstat(fd: 3, statbuf: 0x7fff8b35f5b0                                  ) = 0
     0.057 ( 0.002 ms): epoll/2818 mmap(len: 78559, prot: READ, flags: PRIVATE, fd: 3                    ) = 0x7f3f738cf000
     0.060 ( 0.001 ms): epoll/2818 close(fd: 3                                                           ) = 0
     0.070 ( 0.005 ms): epoll/2818 open(filename: 0x738e3640, flags: CLOEXEC                             ) = 3
     0.076 ( 0.001 ms): epoll/2818 read(fd: 3, buf: 0x7fff8b35f770, count: 832                           ) = 832
     0.079 ( 0.001 ms): epoll/2818 fstat(fd: 3, statbuf: 0x7fff8b35f610                                  ) = 0
     0.082 ( 0.003 ms): epoll/2818 mmap(len: 3932672, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3   ) = 0x7f3f73304000
     0.086 ( 0.005 ms): epoll/2818 mprotect(start: 0x7f3f734bb000, len: 2093056                          ) = 0
     0.091 ( 0.005 ms): epoll/2818 mmap(addr: 0x7f3f736ba000, len: 24576, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 1794048) = 0x7f3f736ba000
     0.100 ( 0.003 ms): epoll/2818 mmap(addr: 0x7f3f736c0000, len: 16896, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS|FIXED) = 0x7f3f736c0000
     0.106 ( 0.001 ms): epoll/2818 close(fd: 3                                                           ) = 0
     0.115 ( 0.002 ms): epoll/2818 mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738ce000
     0.119 ( 0.002 ms): epoll/2818 mmap(len: 8192, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738cc000
     0.123 ( 0.001 ms): epoll/2818 arch_prctl(option: 4098, arg2: 139910498273088, arg3: 139910498275408, arg4: 34, arg5: -1) = 0
     0.181 ( 0.003 ms): epoll/2818 mprotect(start: 0x7f3f736ba000, len: 16384, prot: READ                ) = 0
     0.186 ( 0.002 ms): epoll/2818 mprotect(start: 0x600000, len: 4096, prot: READ                       ) = 0
     0.190 ( 0.002 ms): epoll/2818 mprotect(start: 0x7f3f738e4000, len: 4096, prot: READ                 ) = 0
     0.193 ( 0.004 ms): epoll/2818 munmap(addr: 0x7f3f738cf000, len: 78559                               ) = 0
     0.218 ( 0.001 ms): epoll/2818 epoll_wait(epfd: -1                                                   ) = -1 EINVAL Invalid argument
     0.220 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -2                                                   ) = -1 EINVAL Invalid argument
     0.221 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -3                                                   ) = -1 EINVAL Invalid argument
     0.221 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -4                                                   ) = -1 EINVAL Invalid argument
     0.222 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -5                                                   ) = -1 EINVAL Invalid argument
<SNIP>

It thought that this part would cover it:

Probe point found: SyS_epoll_pwait+138
found inline addr: 0xffffffff812d7cf0

Continuing investigation...

- Arnaldo
 
> works for the test program used by this testcase:
> 
> #include <sys/epoll.h>
> #include <stdlib.h>
> 
> #define NR_ITERS 100
> 
> static int epoll_wait_loop(void)
> {
>         int i;
> 
>         /* Should fail NR_ITERS times */
>         for (i = 0; i < NR_ITERS; i++)
>                 epoll_wait(-(i + 1), NULL, 0, 0);
>         return 0;
> }
> 
> int main()
> {
>         epoll_wait_loop();
>         return 0;
> }
> 
> In my configuration it gives 100 samples:
> 
> $ sudo ./perf record -e probe:SyS_epoll_wait /tmp/a.out
> [ perf record: Woken up 1 times to write data ]
> [ perf record: Captured and wrote 0.016 MB perf.data (100 samples) ]
> 
> I guess in your configuration you would get 3 tracepoints, and can get 0
> sample from them.
> 
> Thank you.
> 
> On 2018/1/3 12:42, Wangnan (F) wrote:
> > Unable to reproduce. In my kernel configuration, SyS_epoll_wait is not
> > inlined at all.
> > 
> > From the log you sent, it seems that all 3 instances are attached. This
> > testcase should work if the last one (SyS_epoll_wait) get probed
> > correctly.
> > 
> > Could you please have a look if the 3rd kprobe event
> > (p:perf_bpf_probe/func_2 _text+2845824) works?
> > 
> > Thank you.
> > 
> > On 2018/1/3 2:59, Arnaldo Carvalho de Melo wrote:
> > > Hi Wang,
> > > 
> > >     I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
> > > only test failing for me is:
> > > 
> > > [root@jouet linux]# perf test bpf
> > > 39: BPF filter                                            :
> > > 39.1: Basic BPF filtering                                 : FAILED!
> > > 39.2: BPF pinning                                         : Skip
> > > 39.3: BPF prologue generation                             : Skip
> > > 39.4: BPF relocation checker                              : Skip
> > > [root@jouet linux]#
> > > 
> > > I haven't checked but perhaps the problem is that SyS_epoll_wait seems
> > > to now be inlined in three places and perhaps the eBPF proggie is being
> > > added to just one of them?
> > > 
> > > Seemingly relevant excerpt:
> > > 
> > > Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
> > > Try to find probe point from debuginfo.
> > > Matched function: SyS_epoll_wait [2f40eb7]
> > > found inline addr: 0xffffffff812b6ff1
> > > Probe point found: compat_SyS_epoll_pwait+129
> > > found inline addr: 0xffffffff812b6de7
> > > Probe point found: SyS_epoll_pwait+135
> > > found inline addr: 0xffffffff812b6c80
> > > Probe point found: SyS_epoll_wait+0
> > > Found 3 probe_trace_events.
> > > 
> > > - Arnaldo
> > > 
> > > P.S.: Full -v output:
> > > 
> > > [root@jouet linux]# uname -a
> > > Linux jouet 4.15.0-rc6 #4 SMP Tue Jan 2 14:30:53 -03 2018 x86_64
> > > x86_64 x86_64 GNU/Linux
> > > [root@jouet linux]# gcc -v
> > > Using built-in specs.
> > > COLLECT_GCC=/usr/bin/gcc
> > > COLLECT_LTO_WRAPPER=/usr/libexec/gcc/x86_64-redhat-linux/7/lto-wrapper
> > > OFFLOAD_TARGET_NAMES=nvptx-none
> > > OFFLOAD_TARGET_DEFAULT=1
> > > Target: x86_64-redhat-linux
> > > Configured with: ../configure --enable-bootstrap
> > > --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto
> > > --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info
> > > --with-bugurl=http://bugzilla.redhat.com/bugzilla --enable-shared
> > > --enable-threads=posix --enable-checking=release --enable-multilib
> > > --with-system-zlib --enable-__cxa_atexit
> > > --disable-libunwind-exceptions --enable-gnu-unique-object
> > > --enable-linker-build-id --with-gcc-major-version-only
> > > --with-linker-hash-style=gnu --enable-plugin --enable-initfini-array
> > > --with-isl --enable-libmpx --enable-offload-targets=nvptx-none
> > > --without-cuda-driver --enable-gnu-indirect-function
> > > --with-tune=generic --with-arch_32=i686 --build=x86_64-redhat-linux
> > > Thread model: posix
> > > gcc version 7.2.1 20170915 (Red Hat 7.2.1-2) (GCC)
> > > [root@jouet linux]# clang -v
> > > clang version 6.0.0 (http://llvm.org/git/clang.git
> > > 56cc8f8880db2ebc433eeb6b6a707c101467a186)
> > > (http://llvm.org/git/llvm.git
> > > 3656d83960a4f3fedf6d8f19043abf52379f78c3)
> > > Target: x86_64-unknown-linux-gnu
> > > Thread model: posix
> > > InstalledDir: /usr/local/bin
> > > Found candidate GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
> > > Selected GCC installation: /usr/lib/gcc/x86_64-redhat-linux/7
> > > Candidate multilib: .;@m64
> > > Candidate multilib: 32;@m32
> > > Selected multilib: .;@m64
> > > [root@jouet linux]# perf test -v BPF
> > > 39: BPF filter                                            :
> > > 39.1: Basic BPF filtering                                 :
> > > --- start ---
> > > test child forked, pid 24304
> > > Kernel build dir is set to /lib/modules/4.15.0-rc6/build
> > > set env: KBUILD_DIR=/lib/modules/4.15.0-rc6/build
> > > unset env: KBUILD_OPTS
> > > include option is set to  -nostdinc -isystem
> > > /usr/lib/gcc/x86_64-redhat-linux/7/include
> > > -I/home/acme/git/linux/arch/x86/include
> > > -I./arch/x86/include/generated  -I/home/acme/git/linux/include
> > > -I./include -I/home/acme/git/linux/arch/x86/include/uapi
> > > -I./arch/x86/include/generated/uapi
> > > -I/home/acme/git/linux/include/uapi -I./include/generated/uapi
> > > -include /home/acme/git/linux/include/linux/kconfig.h
> > > set env: NR_CPUS=4
> > > set env: LINUX_VERSION_CODE=0x40f00
> > > set env: CLANG_EXEC=/usr/local/bin/clang
> > > set env: CLANG_OPTIONS=-xc
> > > set env: KERNEL_INC_OPTIONS= -nostdinc -isystem
> > > /usr/lib/gcc/x86_64-redhat-linux/7/include
> > > -I/home/acme/git/linux/arch/x86/include
> > > -I./arch/x86/include/generated  -I/home/acme/git/linux/include
> > > -I./include -I/home/acme/git/linux/arch/x86/include/uapi
> > > -I./arch/x86/include/generated/uapi
> > > -I/home/acme/git/linux/include/uapi -I./include/generated/uapi
> > > -include /home/acme/git/linux/include/linux/kconfig.h
> > > set env: WORKING_DIR=/lib/modules/4.15.0-rc6/build
> > > set env: CLANG_SOURCE=-
> > > llvm compiling command template: echo '/*
> > >   * bpf-script-example.c
> > >   * Test basic LLVM building
> > >   */
> > > #ifndef LINUX_VERSION_CODE
> > > # error Need LINUX_VERSION_CODE
> > > # error Example: for 4.2 kernel, put
> > > 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of
> > > ~/.perfconfig'
> > > #endif
> > > #define BPF_ANY 0
> > > #define BPF_MAP_TYPE_ARRAY 2
> > > #define BPF_FUNC_map_lookup_elem 1
> > > #define BPF_FUNC_map_update_elem 2
> > > 
> > > static void *(*bpf_map_lookup_elem)(void *map, void *key) =
> > >     (void *) BPF_FUNC_map_lookup_elem;
> > > static void *(*bpf_map_update_elem)(void *map, void *key, void
> > > *value, int flags) =
> > >     (void *) BPF_FUNC_map_update_elem;
> > > 
> > > struct bpf_map_def {
> > >     unsigned int type;
> > >     unsigned int key_size;
> > >     unsigned int value_size;
> > >     unsigned int max_entries;
> > > };
> > > 
> > > #define SEC(NAME) __attribute__((section(NAME), used))
> > > struct bpf_map_def SEC("maps") flip_table = {
> > >     .type = BPF_MAP_TYPE_ARRAY,
> > >     .key_size = sizeof(int),
> > >     .value_size = sizeof(int),
> > >     .max_entries = 1,
> > > };
> > > 
> > > SEC("func=SyS_epoll_wait")
> > > int bpf_func__SyS_epoll_wait(void *ctx)
> > > {
> > >     int ind =0;
> > >     int *flag = bpf_map_lookup_elem(&flip_table, &ind);
> > >     int new_flag;
> > >     if (!flag)
> > >         return 0;
> > >     /* flip flag and store back */
> > >     new_flag = !*flag;
> > >     bpf_map_update_elem(&flip_table, &ind, &new_flag, BPF_ANY);
> > >     return new_flag;
> > > }
> > > char _license[] SEC("license") = "GPL";
> > > int _version SEC("version") = LINUX_VERSION_CODE;
> > > ' | $CLANG_EXEC -D__KERNEL__ -D__NR_CPUS__=$NR_CPUS
> > > -DLINUX_VERSION_CODE=$LINUX_VERSION_CODE $CLANG_OPTIONS
> > > $KERNEL_INC_OPTIONS -Wno-unused-value -Wno-pointer-sign
> > > -working-directory $WORKING_DIR -c "$CLANG_SOURCE" -target bpf -O2
> > > -o -
> > > libbpf: loading object '[basic_bpf_test]' from buffer
> > > libbpf: section .strtab, size 120, link 0, flags 0, type=3
> > > libbpf: section .text, size 0, link 0, flags 6, type=1
> > > libbpf: section func=SyS_epoll_wait, size 192, link 0, flags 6, type=1
> > > libbpf: found program func=SyS_epoll_wait
> > > libbpf: section .relfunc=SyS_epoll_wait, size 32, link 8, flags 0,
> > > type=9
> > > libbpf: section maps, size 16, link 0, flags 3, type=1
> > > libbpf: section license, size 4, link 0, flags 3, type=1
> > > libbpf: license of [basic_bpf_test] is GPL
> > > libbpf: section version, size 4, link 0, flags 3, type=1
> > > libbpf: kernel version of [basic_bpf_test] is 40f00
> > > libbpf: section .symtab, size 168, link 1, flags 0, type=2
> > > libbpf: maps in [basic_bpf_test]: 1 maps in 16 bytes
> > > libbpf: map 0 is "flip_table"
> > > libbpf: collecting relocating info for: 'func=SyS_epoll_wait'
> > > libbpf: relocation: insn_idx=4
> > > libbpf: relocation: find map 0 (flip_table) for insn 4
> > > libbpf: relocation: insn_idx=17
> > > libbpf: relocation: find map 0 (flip_table) for insn 17
> > > bpf: config program 'func=SyS_epoll_wait'
> > > symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
> > > bpf: config 'func=SyS_epoll_wait' is ok
> > > Looking at the vmlinux_path (8 entries long)
> > > Using /lib/modules/4.15.0-rc6/build/vmlinux for symbols
> > > Open Debuginfo file: /lib/modules/4.15.0-rc6/build/vmlinux
> > > Try to find probe point from debuginfo.
> > > Matched function: SyS_epoll_wait [2f40eb7]
> > > found inline addr: 0xffffffff812b6ff1
> > > Probe point found: compat_SyS_epoll_pwait+129
> > > found inline addr: 0xffffffff812b6de7
> > > Probe point found: SyS_epoll_pwait+135
> > > found inline addr: 0xffffffff812b6c80
> > > Probe point found: SyS_epoll_wait+0
> > > Found 3 probe_trace_events.
> > > Opening /sys/kernel/debug/tracing//kprobe_events write=1
> > > Writing event: p:perf_bpf_probe/func _text+2846705
> > > Writing event: p:perf_bpf_probe/func_1 _text+2846183
> > > Writing event: p:perf_bpf_probe/func_2 _text+2845824
> > > libbpf: create map flip_table: fd=3
> > > add bpf event perf_bpf_probe:func and attach bpf program 4
> > > registering plugin: /root/.traceevent/plugins/plugin_kvm.so
> > > registering plugin: /root/.traceevent/plugins/plugin_hrtimer.so
> > > registering plugin: /root/.traceevent/plugins/plugin_jbd2.so
> > > registering plugin: /root/.traceevent/plugins/plugin_kmem.so
> > > registering plugin: /root/.traceevent/plugins/plugin_scsi.so
> > > registering plugin: /root/.traceevent/plugins/plugin_sched_switch.so
> > > registering plugin: /root/.traceevent/plugins/plugin_function.so
> > > registering plugin: /root/.traceevent/plugins/plugin_xen.so
> > > registering plugin: /root/.traceevent/plugins/plugin_mac80211.so
> > > registering plugin: /root/.traceevent/plugins/plugin_cfg80211.so
> > > adding perf_bpf_probe:func
> > > adding perf_bpf_probe:func to 0x24e3850
> > > add bpf event perf_bpf_probe:func_1 and attach bpf program 4
> > > adding perf_bpf_probe:func_1
> > > adding perf_bpf_probe:func_1 to 0x1965020
> > > add bpf event perf_bpf_probe:func_2 and attach bpf program 4
> > > adding perf_bpf_probe:func_2
> > > adding perf_bpf_probe:func_2 to 0x19656a0
> > > mmap size 1052672B
> > > BPF filter result incorrect, expected 56, got 0 samples
> > > Opening /sys/kernel/debug/tracing//kprobe_events write=1
> > > Opening /sys/kernel/debug/tracing//uprobe_events write=1
> > > Parsing probe_events: p:perf_bpf_probe/func _text+2846705
> > > Group:perf_bpf_probe Event:func probe:p
> > > Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
> > > Group:perf_bpf_probe Event:func_1 probe:p
> > > Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> > > Group:perf_bpf_probe Event:func_2 probe:p
> > > Writing event: -:perf_bpf_probe/func
> > > Opening /sys/kernel/debug/tracing//kprobe_events write=1
> > > Opening /sys/kernel/debug/tracing//uprobe_events write=1
> > > Parsing probe_events: p:perf_bpf_probe/func_1 _text+2846183
> > > Group:perf_bpf_probe Event:func_1 probe:p
> > > Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> > > Group:perf_bpf_probe Event:func_2 probe:p
> > > Writing event: -:perf_bpf_probe/func_1
> > > Opening /sys/kernel/debug/tracing//kprobe_events write=1
> > > Opening /sys/kernel/debug/tracing//uprobe_events write=1
> > > Parsing probe_events: p:perf_bpf_probe/func_2 _text+2845824
> > > Group:perf_bpf_probe Event:func_2 probe:p
> > > Writing event: -:perf_bpf_probe/func_2
> > > test child finished with -1
> > > ---- end ----
> > > BPF filter subtest 0: FAILED!
> > > 39.2: BPF pinning                                         :
> > > --- force skipped ---
> > > BPF filter subtest 1: Skip
> > > 39.3: BPF prologue generation                             :
> > > --- force skipped ---
> > > BPF filter subtest 2: Skip
> > > 39.4: BPF relocation checker                              :
> > > --- force skipped ---
> > > BPF filter subtest 3: Skip
> > > [root@jouet linux]#
> > > [root@jouet linux]#
> > 
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03 16:58     ` Arnaldo Carvalho de Melo
@ 2018-01-03 18:27       ` Arnaldo Carvalho de Melo
  2018-01-03 18:33         ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-03 18:27 UTC (permalink / raw)
  To: Wangnan (F)
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Em Wed, Jan 03, 2018 at 01:58:44PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> > And please check if the kprobe created by
> > 
> >  $ perf probe -v SyS_epoll_wait
> 
> [root@seventh ~]# perf probe -v SyS_epoll_wait
> probe-definition(0): SyS_epoll_wait 
> symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0 lazy:(null)
> 0 arguments
> Looking at the vmlinux_path (8 entries long)
> Using /usr/lib/debug/lib/modules/4.14.8-300.fc27.x86_64/vmlinux for symbols
> Open Debuginfo file: /usr/lib/debug/lib/modules/4.14.8-300.fc27.x86_64/vmlinux
> Try to find probe point from debuginfo.
> Matched function: SyS_epoll_wait [314b563]
> found inline addr: 0xffffffff812d8087
> Probe point found: compat_SyS_epoll_pwait+151
> found inline addr: 0xffffffff812d7e5a
> Probe point found: SyS_epoll_pwait+138
> found inline addr: 0xffffffff812d7cf0
> Probe point found: SyS_epoll_wait+0
> Found 3 probe_trace_events.
> Opening /sys/kernel/debug/tracing//kprobe_events write=1
> Writing event: p:probe/SyS_epoll_wait _text+2982023
> Writing event: p:probe/SyS_epoll_wait_1 _text+2981466
> Writing event: p:probe/SyS_epoll_wait_2 _text+2981104
> Added new events:
>   probe:SyS_epoll_wait (on SyS_epoll_wait)
>   probe:SyS_epoll_wait_1 (on SyS_epoll_wait)
>   probe:SyS_epoll_wait_2 (on SyS_epoll_wait)
> 
> You can now use it in all perf tools, such as:
> 
> 	perf record -e probe:SyS_epoll_wait_2 -aR sleep 1
> 
> [root@seventh ~]#
> 
> Then, with your proggie, it seems its glibc that now maps epoll_wait()
> to a different syscall than in older systems:
> 
> [root@seventh ~]# trace -e probe:SyS_epoll_wait* ~acme/epoll
>      0.018 ( 0.001 ms): epoll/20444 brk(                                                                  ) = 0x2600000
>      0.029 ( 0.004 ms): epoll/20444 access(filename: 0xe874ec0, mode: R                                   ) = -1 ENOENT No such file or directory
>      0.035 ( 0.003 ms): epoll/20444 openat(dfd: CWD, filename: 0xe872726, flags: CLOEXEC                  ) = 3
>      0.040 ( 0.002 ms): epoll/20444 fstat(fd: 3, statbuf: 0x7fffcc37b830                                  ) = 0
>      0.042 ( 0.002 ms): epoll/20444 mmap(len: 109538, prot: READ, flags: PRIVATE, fd: 3                   ) = 0x7fc50ea5d000
>      0.045 ( 0.001 ms): epoll/20444 close(fd: 3                                                           ) = 0
>      0.052 ( 0.003 ms): epoll/20444 openat(dfd: CWD, filename: 0xea7ace0, flags: CLOEXEC                  ) = 3
>      0.056 ( 0.001 ms): epoll/20444 read(fd: 3, buf: 0x7fffcc37b9f8, count: 832                           ) = 832
>      0.059 ( 0.001 ms): epoll/20444 fstat(fd: 3, statbuf: 0x7fffcc37b890                                  ) = 0
>      0.060 ( 0.002 ms): epoll/20444 mmap(len: 8192, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS, fd: -1    ) = 0x7fc50ea5b000
>      0.065 ( 0.003 ms): epoll/20444 mmap(len: 4074112, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3   ) = 0x7fc50e46e000
>      0.068 ( 0.004 ms): epoll/20444 mprotect(start: 0x7fc50e648000, len: 2093056                          ) = 0
>      0.073 ( 0.004 ms): epoll/20444 mmap(addr: 0x7fc50e847000, len: 24576, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 1937408) = 0x7fc50e847000
>      0.079 ( 0.002 ms): epoll/20444 mmap(addr: 0x7fc50e84d000, len: 14976, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS|FIXED, fd: -1) = 0x7fc50e84d000
>      0.085 ( 0.001 ms): epoll/20444 close(fd: 3                                                           ) = 0
>      0.093 ( 0.001 ms): epoll/20444 arch_prctl(option: 4098, arg2: 140484331029696                        ) = 0
>      0.128 ( 0.003 ms): epoll/20444 mprotect(start: 0x7fc50e847000, len: 16384, prot: READ                ) = 0
>      0.133 ( 0.002 ms): epoll/20444 mprotect(start: 0x600000, len: 4096, prot: READ                       ) = 0
>      0.137 ( 0.002 ms): epoll/20444 mprotect(start: 0x7fc50ea78000, len: 4096, prot: READ                 ) = 0
>      0.140 ( 0.005 ms): epoll/20444 munmap(addr: 0x7fc50ea5d000, len: 109538                              ) = 0
>      0.159 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -1, sigsetsize: 8                                   ) = -22
>      0.160 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -2, sigsetsize: 8                                   ) = -22
>      0.162 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -3, sigsetsize: 8                                   ) = -22
>      0.163 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -4, sigsetsize: 8                                   ) = -22
>      0.165 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -5, sigsetsize: 8                                   ) = -22
> <SNIP>
>      0.279 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -85, sigsetsize: 8                                  ) = -22
>      0.280 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -86, sigsetsize: 8                                  ) = -22
>      0.282 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -87, sigsetsize: 8                                  ) = -22
>      0.283 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -88, sigsetsize: 8                                  ) = -22
>      0.284 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -89, sigsetsize: 8                                  ) = -22
>      0.286 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -90, sigsetsize: 8                                  ) = -22
>      0.287 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -91, sigsetsize: 8                                  ) = -22
>      0.289 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -92, sigsetsize: 8                                  ) = -22
>      0.290 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -93, sigsetsize: 8                                  ) = -22
>      0.292 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -94, sigsetsize: 8                                  ) = -22
>      0.293 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -95, sigsetsize: 8                                  ) = -22
>      0.294 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -96, sigsetsize: 8                                  ) = -22
>      0.296 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -97, sigsetsize: 8                                  ) = -22
>      0.297 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -98, sigsetsize: 8                                  ) = -22
>      0.299 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -99, sigsetsize: 8                                  ) = -22
>      0.300 ( 0.001 ms): epoll/20444 epoll_pwait(epfd: -100, sigsetsize: 8                                 ) = -22
>      0.305 (     ?   ): epoll/20444 exit_group(                                                           )
> [root@seventh ~]# 
> 
> This is on a Fedora 27 system, that has glibc 2.26, while on a RHEL7
> machine, that has glibc 2.17, it still uses epoll_wait() and we get:
> 
> [root@felicio ~]# trace ./epoll
>      0.018 ( 0.001 ms): epoll/2818 brk(                                                                  ) = 0x8e5000
>      0.033 ( 0.002 ms): epoll/2818 mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738e3000
>      0.041 ( 0.004 ms): epoll/2818 access(filename: 0x736e2160, mode: R                                  ) = -1 ENOENT No such file or directory
>      0.051 ( 0.003 ms): epoll/2818 open(filename: 0x736e0a58, flags: CLOEXEC                             ) = 3
>      0.056 ( 0.001 ms): epoll/2818 fstat(fd: 3, statbuf: 0x7fff8b35f5b0                                  ) = 0
>      0.057 ( 0.002 ms): epoll/2818 mmap(len: 78559, prot: READ, flags: PRIVATE, fd: 3                    ) = 0x7f3f738cf000
>      0.060 ( 0.001 ms): epoll/2818 close(fd: 3                                                           ) = 0
>      0.070 ( 0.005 ms): epoll/2818 open(filename: 0x738e3640, flags: CLOEXEC                             ) = 3
>      0.076 ( 0.001 ms): epoll/2818 read(fd: 3, buf: 0x7fff8b35f770, count: 832                           ) = 832
>      0.079 ( 0.001 ms): epoll/2818 fstat(fd: 3, statbuf: 0x7fff8b35f610                                  ) = 0
>      0.082 ( 0.003 ms): epoll/2818 mmap(len: 3932672, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3   ) = 0x7f3f73304000
>      0.086 ( 0.005 ms): epoll/2818 mprotect(start: 0x7f3f734bb000, len: 2093056                          ) = 0
>      0.091 ( 0.005 ms): epoll/2818 mmap(addr: 0x7f3f736ba000, len: 24576, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 1794048) = 0x7f3f736ba000
>      0.100 ( 0.003 ms): epoll/2818 mmap(addr: 0x7f3f736c0000, len: 16896, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS|FIXED) = 0x7f3f736c0000
>      0.106 ( 0.001 ms): epoll/2818 close(fd: 3                                                           ) = 0
>      0.115 ( 0.002 ms): epoll/2818 mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738ce000
>      0.119 ( 0.002 ms): epoll/2818 mmap(len: 8192, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS            ) = 0x7f3f738cc000
>      0.123 ( 0.001 ms): epoll/2818 arch_prctl(option: 4098, arg2: 139910498273088, arg3: 139910498275408, arg4: 34, arg5: -1) = 0
>      0.181 ( 0.003 ms): epoll/2818 mprotect(start: 0x7f3f736ba000, len: 16384, prot: READ                ) = 0
>      0.186 ( 0.002 ms): epoll/2818 mprotect(start: 0x600000, len: 4096, prot: READ                       ) = 0
>      0.190 ( 0.002 ms): epoll/2818 mprotect(start: 0x7f3f738e4000, len: 4096, prot: READ                 ) = 0
>      0.193 ( 0.004 ms): epoll/2818 munmap(addr: 0x7f3f738cf000, len: 78559                               ) = 0
>      0.218 ( 0.001 ms): epoll/2818 epoll_wait(epfd: -1                                                   ) = -1 EINVAL Invalid argument
>      0.220 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -2                                                   ) = -1 EINVAL Invalid argument
>      0.221 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -3                                                   ) = -1 EINVAL Invalid argument
>      0.221 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -4                                                   ) = -1 EINVAL Invalid argument
>      0.222 ( 0.000 ms): epoll/2818 epoll_wait(epfd: -5                                                   ) = -1 EINVAL Invalid argument
> <SNIP>
> 
> It thought that this part would cover it:
> 
> Probe point found: SyS_epoll_pwait+138
> found inline addr: 0xffffffff812d7cf0
> 
> Continuing investigation...

After applying the fallback patch to allow new tools to work with older
kernels:

[root@felicio ~]# perf test bpf
39: BPF filter                                            :
39.1: Basic BPF filtering                                 : Ok
39.2: BPF pinning                                         : Ok
39.3: BPF prologue generation                             : Ok
39.4: BPF relocation checker                              : Ok
[root@felicio ~]# uname -a
Linux felicio.ghostprotocols.net 4.13.0-rc7+ #1 SMP Mon Sep 11 13:56:18 -03 2017 x86_64 x86_64 x86_64 GNU/Linux
[root@felicio ~]# rpm -q glibc
glibc-2.17-157.el7_3.2.x86_64
[root@felicio ~]#

After applying the patch below I get to, which is what I am trying to
fix now:

[root@jouet ~]# perf test bpf
39: BPF filter                                            :
39.1: Basic BPF filtering                                 : Ok
39.2: BPF pinning                                         : Ok
39.3: BPF prologue generation                             : FAILED!
39.4: BPF relocation checker                              : Skip
[root@jouet ~]# 

Its related to:

<stdin>:11:10: fatal error: 'uapi/linux/fs.h' file not found
#include <uapi/linux/fs.h>
         ^~~~~~~~~~~~~~~~~
1 error generated.
ERROR:	unable to compile -
Hint:	Check error message shown above.
Hint:	You can also pre-compile it into .o using:
     		clang -target bpf -O2 -c -
     	with proper -I and -D options.
Failed to compile test case: 'Compile source for BPF prologue generation'
Unable to get BPF object, fix kbuild first
test child finished with -1
---- end ----
BPF filter subtest 2: FAILED!

- Arnaldo


diff --git a/tools/perf/tests/bpf-script-example.c b/tools/perf/tests/bpf-script-example.c
index 268e5f8e4aa2..d1e67e271675 100644
--- a/tools/perf/tests/bpf-script-example.c
+++ b/tools/perf/tests/bpf-script-example.c
@@ -31,7 +31,7 @@ struct bpf_map_def SEC("maps") flip_table = {
 	.max_entries = 1,
 };
 
-SEC("func=SyS_epoll_wait")
+SEC("func=SyS_epoll_pwait")
 int bpf_func__SyS_epoll_wait(void *ctx)
 {
 	int ind =0;

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03 18:27       ` Arnaldo Carvalho de Melo
@ 2018-01-03 18:33         ` Arnaldo Carvalho de Melo
  2018-01-03 20:13           ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-03 18:33 UTC (permalink / raw)
  To: Wangnan (F)
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > Continuing investigation...
> 
> After applying the fallback patch to allow new tools to work with older
> kernels:
> 
> [root@felicio ~]# perf test bpf
> 39: BPF filter                                            :
> 39.1: Basic BPF filtering                                 : Ok
> 39.2: BPF pinning                                         : Ok
> 39.3: BPF prologue generation                             : Ok
> 39.4: BPF relocation checker                              : Ok
> [root@felicio ~]# uname -a
> Linux felicio.ghostprotocols.net 4.13.0-rc7+ #1 SMP Mon Sep 11 13:56:18 -03 2017 x86_64 x86_64 x86_64 GNU/Linux
> [root@felicio ~]# rpm -q glibc
> glibc-2.17-157.el7_3.2.x86_64
> [root@felicio ~]#
> 
> After applying the patch below I get to, which is what I am trying to
> fix now:
> 
> [root@jouet ~]# perf test bpf
> 39: BPF filter                                            :
> 39.1: Basic BPF filtering                                 : Ok
> 39.2: BPF pinning                                         : Ok
> 39.3: BPF prologue generation                             : FAILED!
> 39.4: BPF relocation checker                              : Skip
> [root@jouet ~]# 

Update the patch to the one at the end of this message to make it work
with older glibcs, so that we ask for epoll_pwait() and hook into that
as well().

Now checking why 39.3 fails...

- Arnaldo

diff --git a/tools/perf/tests/bpf-script-example.c b/tools/perf/tests/bpf-script-example.c
index 268e5f8e4aa2..d1e67e271675 100644
--- a/tools/perf/tests/bpf-script-example.c
+++ b/tools/perf/tests/bpf-script-example.c
@@ -31,7 +31,7 @@ struct bpf_map_def SEC("maps") flip_table = {
 	.max_entries = 1,
 };
 
-SEC("func=SyS_epoll_wait")
+SEC("func=SyS_epoll_pwait")
 int bpf_func__SyS_epoll_wait(void *ctx)
 {
 	int ind =0;
diff --git a/tools/perf/tests/bpf.c b/tools/perf/tests/bpf.c
index 0512f1b5bfdb..7c04e2d5b60b 100644
--- a/tools/perf/tests/bpf.c
+++ b/tools/perf/tests/bpf.c
@@ -25,7 +25,7 @@ static int epoll_wait_loop(void)
 
 	/* Should fail NR_ITERS times */
 	for (i = 0; i < NR_ITERS; i++)
-		epoll_wait(-(i + 1), NULL, 0, 0);
+		epoll_pwait(-(i + 1), NULL, 0, 0, NULL);
 	return 0;
 }
 

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03 18:33         ` Arnaldo Carvalho de Melo
@ 2018-01-03 20:13           ` Arnaldo Carvalho de Melo
  2018-01-04  1:37             ` Wangnan (F)
  0 siblings, 1 reply; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-03 20:13 UTC (permalink / raw)
  To: Wangnan (F)
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Continuing investigation...
> > 
> > After applying the fallback patch to allow new tools to work with older
> > kernels:
> > 
> > [root@felicio ~]# perf test bpf
> > 39: BPF filter                                            :
> > 39.1: Basic BPF filtering                                 : Ok
> > 39.2: BPF pinning                                         : Ok
> > 39.3: BPF prologue generation                             : Ok
> > 39.4: BPF relocation checker                              : Ok
> > [root@felicio ~]# uname -a
> > Linux felicio.ghostprotocols.net 4.13.0-rc7+ #1 SMP Mon Sep 11 13:56:18 -03 2017 x86_64 x86_64 x86_64 GNU/Linux
> > [root@felicio ~]# rpm -q glibc
> > glibc-2.17-157.el7_3.2.x86_64
> > [root@felicio ~]#
> > 
> > After applying the patch below I get to, which is what I am trying to
> > fix now:
> > 
> > [root@jouet ~]# perf test bpf
> > 39: BPF filter                                            :
> > 39.1: Basic BPF filtering                                 : Ok
> > 39.2: BPF pinning                                         : Ok
> > 39.3: BPF prologue generation                             : FAILED!
> > 39.4: BPF relocation checker                              : Skip
> > [root@jouet ~]# 
> 
> Update the patch to the one at the end of this message to make it work
> with older glibcs, so that we ask for epoll_pwait() and hook into that
> as well().
> 
> Now checking why 39.3 fails...

Couldn't reproduce after fixing up some kernel build problems, the patch
below is all I need to have this working with both Fedora 27 and RHEL7,
please take a look and see if it continues to work on your systems,

- Arnaldo
 
> - Arnaldo
> 
> diff --git a/tools/perf/tests/bpf-script-example.c b/tools/perf/tests/bpf-script-example.c
> index 268e5f8e4aa2..d1e67e271675 100644
> --- a/tools/perf/tests/bpf-script-example.c
> +++ b/tools/perf/tests/bpf-script-example.c
> @@ -31,7 +31,7 @@ struct bpf_map_def SEC("maps") flip_table = {
>  	.max_entries = 1,
>  };
>  
> -SEC("func=SyS_epoll_wait")
> +SEC("func=SyS_epoll_pwait")
>  int bpf_func__SyS_epoll_wait(void *ctx)
>  {
>  	int ind =0;
> diff --git a/tools/perf/tests/bpf.c b/tools/perf/tests/bpf.c
> index 0512f1b5bfdb..7c04e2d5b60b 100644
> --- a/tools/perf/tests/bpf.c
> +++ b/tools/perf/tests/bpf.c
> @@ -25,7 +25,7 @@ static int epoll_wait_loop(void)
>  
>  	/* Should fail NR_ITERS times */
>  	for (i = 0; i < NR_ITERS; i++)
> -		epoll_wait(-(i + 1), NULL, 0, 0);
> +		epoll_pwait(-(i + 1), NULL, 0, 0, NULL);
>  	return 0;
>  }
>  

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-03 20:13           ` Arnaldo Carvalho de Melo
@ 2018-01-04  1:37             ` Wangnan (F)
  2018-01-04 15:39               ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 9+ messages in thread
From: Wangnan (F) @ 2018-01-04  1:37 UTC (permalink / raw)
  To: Arnaldo Carvalho de Melo
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List



On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
> Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
>> Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
>>>> Continuing investigation...
>>> After applying the fallback patch to allow new tools to work with older
>>> kernels:
>>>
>>> [root@felicio ~]# perf test bpf
>>> 39: BPF filter                                            :
>>> 39.1: Basic BPF filtering                                 : Ok
>>> 39.2: BPF pinning                                         : Ok
>>> 39.3: BPF prologue generation                             : Ok
>>> 39.4: BPF relocation checker                              : Ok
>>> [root@felicio ~]# uname -a
>>> Linux felicio.ghostprotocols.net 4.13.0-rc7+ #1 SMP Mon Sep 11 13:56:18 -03 2017 x86_64 x86_64 x86_64 GNU/Linux
>>> [root@felicio ~]# rpm -q glibc
>>> glibc-2.17-157.el7_3.2.x86_64
>>> [root@felicio ~]#
>>>
>>> After applying the patch below I get to, which is what I am trying to
>>> fix now:
>>>
>>> [root@jouet ~]# perf test bpf
>>> 39: BPF filter                                            :
>>> 39.1: Basic BPF filtering                                 : Ok
>>> 39.2: BPF pinning                                         : Ok
>>> 39.3: BPF prologue generation                             : FAILED!
>>> 39.4: BPF relocation checker                              : Skip
>>> [root@jouet ~]#
>> Update the patch to the one at the end of this message to make it work
>> with older glibcs, so that we ask for epoll_pwait() and hook into that
>> as well().
>>
>> Now checking why 39.3 fails...
> Couldn't reproduce after fixing up some kernel build problems, the patch
> below is all I need to have this working with both Fedora 27 and RHEL7,
> please take a look and see if it continues to work on your systems,

It works for me. Thank you.

Since we test epoll_pwait, we'd better correct function names:


diff --git a/tools/perf/tests/bpf-script-example.c 
b/tools/perf/tests/bpf-script-example.c
index 268e5f8..e4123c1 100644
--- a/tools/perf/tests/bpf-script-example.c
+++ b/tools/perf/tests/bpf-script-example.c
@@ -31,8 +31,8 @@ struct bpf_map_def SEC("maps") flip_table = {
      .max_entries = 1,
  };

-SEC("func=SyS_epoll_wait")
-int bpf_func__SyS_epoll_wait(void *ctx)
+SEC("func=SyS_epoll_pwait")
+int bpf_func__SyS_epoll_pwait(void *ctx)
  {
      int ind =0;
      int *flag = bpf_map_lookup_elem(&flip_table, &ind);
diff --git a/tools/perf/tests/bpf.c b/tools/perf/tests/bpf.c
index 34c22cd..a8f9095 100644
--- a/tools/perf/tests/bpf.c
+++ b/tools/perf/tests/bpf.c
@@ -19,13 +19,13 @@

  #ifdef HAVE_LIBBPF_SUPPORT

-static int epoll_wait_loop(void)
+static int epoll_pwait_loop(void)
  {
      int i;

      /* Should fail NR_ITERS times */
      for (i = 0; i < NR_ITERS; i++)
-        epoll_wait(-(i + 1), NULL, 0, 0);
+        epoll_pwait(-(i + 1), NULL, 0, 0, NULL);
      return 0;
  }

@@ -68,7 +68,7 @@ static struct {
          "[basic_bpf_test]",
          "fix 'perf test LLVM' first",
          "load bpf object failed",
-        &epoll_wait_loop,
+        &epoll_pwait_loop,
          (NR_ITERS + 1) / 2,
          false,
      },
@@ -78,7 +78,7 @@ static struct {
          "[bpf_pinning]",
          "fix kbuild first",
          "check your vmlinux setting?",
-        &epoll_wait_loop,
+        &epoll_pwait_loop,
          (NR_ITERS + 1) / 2,
          true,
      },

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: perf test BPF failing on 4.15.0-rc6
  2018-01-04  1:37             ` Wangnan (F)
@ 2018-01-04 15:39               ` Arnaldo Carvalho de Melo
  0 siblings, 0 replies; 9+ messages in thread
From: Arnaldo Carvalho de Melo @ 2018-01-04 15:39 UTC (permalink / raw)
  To: Wangnan (F)
  Cc: Adrian Hunter, David Ahern, Jiri Olsa, Namhyung Kim,
	Linux Kernel Mailing List

Em Thu, Jan 04, 2018 at 09:37:35AM +0800, Wangnan (F) escreveu:
> 
> 
> On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
> > Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > > > Continuing investigation...
> > > > After applying the fallback patch to allow new tools to work with older
> > > > kernels:
> > > > 
> > > > [root@felicio ~]# perf test bpf
> > > > 39: BPF filter                                            :
> > > > 39.1: Basic BPF filtering                                 : Ok
> > > > 39.2: BPF pinning                                         : Ok
> > > > 39.3: BPF prologue generation                             : Ok
> > > > 39.4: BPF relocation checker                              : Ok
> > > > [root@felicio ~]# uname -a
> > > > Linux felicio.ghostprotocols.net 4.13.0-rc7+ #1 SMP Mon Sep 11 13:56:18 -03 2017 x86_64 x86_64 x86_64 GNU/Linux
> > > > [root@felicio ~]# rpm -q glibc
> > > > glibc-2.17-157.el7_3.2.x86_64
> > > > [root@felicio ~]#
> > > > 
> > > > After applying the patch below I get to, which is what I am trying to
> > > > fix now:
> > > > 
> > > > [root@jouet ~]# perf test bpf
> > > > 39: BPF filter                                            :
> > > > 39.1: Basic BPF filtering                                 : Ok
> > > > 39.2: BPF pinning                                         : Ok
> > > > 39.3: BPF prologue generation                             : FAILED!
> > > > 39.4: BPF relocation checker                              : Skip
> > > > [root@jouet ~]#
> > > Update the patch to the one at the end of this message to make it work
> > > with older glibcs, so that we ask for epoll_pwait() and hook into that
> > > as well().
> > > 
> > > Now checking why 39.3 fails...
> > Couldn't reproduce after fixing up some kernel build problems, the patch
> > below is all I need to have this working with both Fedora 27 and RHEL7,
> > please take a look and see if it continues to work on your systems,
> 
> It works for me. Thank you.
> 
> Since we test epoll_pwait, we'd better correct function names:

Right, that wasn't strictly needed, so I tried to restrict my changes to
focus on the fix.

Now that we agree on it, I'm doing what you suggest, to make it less
confusing.

I'm adding your Tested-by, thanks!

- Arnaldo
 
> 
> diff --git a/tools/perf/tests/bpf-script-example.c
> b/tools/perf/tests/bpf-script-example.c
> index 268e5f8..e4123c1 100644
> --- a/tools/perf/tests/bpf-script-example.c
> +++ b/tools/perf/tests/bpf-script-example.c
> @@ -31,8 +31,8 @@ struct bpf_map_def SEC("maps") flip_table = {
>      .max_entries = 1,
>  };
> 
> -SEC("func=SyS_epoll_wait")
> -int bpf_func__SyS_epoll_wait(void *ctx)
> +SEC("func=SyS_epoll_pwait")
> +int bpf_func__SyS_epoll_pwait(void *ctx)
>  {
>      int ind =0;
>      int *flag = bpf_map_lookup_elem(&flip_table, &ind);
> diff --git a/tools/perf/tests/bpf.c b/tools/perf/tests/bpf.c
> index 34c22cd..a8f9095 100644
> --- a/tools/perf/tests/bpf.c
> +++ b/tools/perf/tests/bpf.c
> @@ -19,13 +19,13 @@
> 
>  #ifdef HAVE_LIBBPF_SUPPORT
> 
> -static int epoll_wait_loop(void)
> +static int epoll_pwait_loop(void)
>  {
>      int i;
> 
>      /* Should fail NR_ITERS times */
>      for (i = 0; i < NR_ITERS; i++)
> -        epoll_wait(-(i + 1), NULL, 0, 0);
> +        epoll_pwait(-(i + 1), NULL, 0, 0, NULL);
>      return 0;
>  }
> 
> @@ -68,7 +68,7 @@ static struct {
>          "[basic_bpf_test]",
>          "fix 'perf test LLVM' first",
>          "load bpf object failed",
> -        &epoll_wait_loop,
> +        &epoll_pwait_loop,
>          (NR_ITERS + 1) / 2,
>          false,
>      },
> @@ -78,7 +78,7 @@ static struct {
>          "[bpf_pinning]",
>          "fix kbuild first",
>          "check your vmlinux setting?",
> -        &epoll_wait_loop,
> +        &epoll_pwait_loop,
>          (NR_ITERS + 1) / 2,
>          true,
>      },
> 
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2018-01-04 15:39 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-01-02 18:59 perf test BPF failing on 4.15.0-rc6 Arnaldo Carvalho de Melo
2018-01-03  4:42 ` Wangnan (F)
2018-01-03  4:58   ` Wangnan (F)
2018-01-03 16:58     ` Arnaldo Carvalho de Melo
2018-01-03 18:27       ` Arnaldo Carvalho de Melo
2018-01-03 18:33         ` Arnaldo Carvalho de Melo
2018-01-03 20:13           ` Arnaldo Carvalho de Melo
2018-01-04  1:37             ` Wangnan (F)
2018-01-04 15:39               ` Arnaldo Carvalho de Melo

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).