* [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
@ 2023-02-03 18:28 Grant Seltzer
2023-02-04 6:58 ` Martin KaFai Lau
0 siblings, 1 reply; 7+ messages in thread
From: Grant Seltzer @ 2023-02-03 18:28 UTC (permalink / raw)
To: bpf; +Cc: andrii, kpsingh, Grant Seltzer
This patch changes the behavior of how BPF_PROG_RUN treats tracing
(fentry/fexit) programs. Previously only a return value is injected
but the actual program was not run. New behavior mirrors that of
running raw tracepoint BPF programs which actually runs the
instructions of the program via `bpf_prog_run()`
Tracing programs only needs to support an input context so we validate
that non-relevant attributes are not set.
Changes v1 -> v2:
- Fixed unused variable and logic for how the fmod_ret test is handled
Signed-off-by: Grant Seltzer <grantseltzer@gmail.com>
---
net/bpf/test_run.c | 77 +++++++++++++++++++++++++++++++++++++++++-----
1 file changed, 70 insertions(+), 7 deletions(-)
diff --git a/net/bpf/test_run.c b/net/bpf/test_run.c
index 8da0d73b368e..0c36ed7dd88e 100644
--- a/net/bpf/test_run.c
+++ b/net/bpf/test_run.c
@@ -794,14 +794,34 @@ static void *bpf_test_init(const union bpf_attr *kattr, u32 user_size,
return data;
}
+struct bpf_tracing_test_run_info {
+ struct bpf_prog *prog;
+ void *ctx;
+ u32 retval;
+};
+
+static void
+__bpf_prog_test_run_tracing(void *data)
+{
+ struct bpf_tracing_test_run_info *info = data;
+
+ rcu_read_lock();
+ info->retval = bpf_prog_run(info->prog, info->ctx);
+ rcu_read_unlock();
+}
+
int bpf_prog_test_run_tracing(struct bpf_prog *prog,
const union bpf_attr *kattr,
union bpf_attr __user *uattr)
{
struct bpf_fentry_test_t arg = {};
- u16 side_effect = 0, ret = 0;
- int b = 2, err = -EFAULT;
- u32 retval = 0;
+ int b = 2, err = -EFAULT, current_cpu;
+
+ void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in);
+ __u32 ctx_size_in = kattr->test.ctx_size_in;
+ struct bpf_tracing_test_run_info info;
+ int cpu = kattr->test.cpu;
+ u16 side_effect = 0;
if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
return -EINVAL;
@@ -820,7 +840,7 @@ int bpf_prog_test_run_tracing(struct bpf_prog *prog,
goto out;
break;
case BPF_MODIFY_RETURN:
- ret = bpf_modify_return_test(1, &b);
+ bpf_modify_return_test(1, &b);
if (b != 2)
side_effect = 1;
break;
@@ -828,11 +848,54 @@ int bpf_prog_test_run_tracing(struct bpf_prog *prog,
goto out;
}
- retval = ((u32)side_effect << 16) | ret;
- if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval)))
- goto out;
+ /* doesn't support data_in/out, ctx_out, duration, or repeat */
+ if (kattr->test.data_in || kattr->test.data_out ||
+ kattr->test.ctx_out || kattr->test.duration ||
+ kattr->test.repeat || kattr->test.batch_size)
+ return -EINVAL;
+
+ if (ctx_size_in < prog->aux->max_ctx_offset ||
+ ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64))
+ return -EINVAL;
+
+ if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 && cpu != 0)
+ return -EINVAL;
+
+ if (ctx_size_in) {
+ info.ctx = memdup_user(ctx_in, ctx_size_in);
+ if (IS_ERR(info.ctx))
+ return PTR_ERR(info.ctx);
+ } else {
+ info.ctx = NULL;
+ }
err = 0;
+ info.prog = prog;
+
+ current_cpu = get_cpu();
+ if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 ||
+ cpu == current_cpu) {
+ __bpf_prog_test_run_tracing(&info);
+ } else if (cpu >= nr_cpu_ids || !cpu_online(cpu)) {
+ /* smp_call_function_single() also checks cpu_online()
+ * after csd_lock(). However, since cpu is from user
+ * space, let's do an extra quick check to filter out
+ * invalid value before smp_call_function_single().
+ */
+ err = -ENXIO;
+ } else {
+ err = smp_call_function_single(cpu, __bpf_prog_test_run_tracing,
+ &info, 1);
+ }
+ put_cpu();
+
+ info.retval = ((u32)side_effect << 16) | info.retval;
+ if (!err &&
+ copy_to_user(&uattr->test.retval, &info.retval, sizeof(u32)))
+ err = -EFAULT;
+
+ kfree(info.ctx);
+
out:
trace_bpf_test_finish(&err);
return err;
--
2.39.1
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-03 18:28 [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN Grant Seltzer
@ 2023-02-04 6:58 ` Martin KaFai Lau
2023-02-05 17:29 ` Grant Seltzer Richman
0 siblings, 1 reply; 7+ messages in thread
From: Martin KaFai Lau @ 2023-02-04 6:58 UTC (permalink / raw)
To: Grant Seltzer; +Cc: andrii, kpsingh, bpf
On 2/3/23 10:28 AM, Grant Seltzer wrote:
> This patch changes the behavior of how BPF_PROG_RUN treats tracing
> (fentry/fexit) programs. Previously only a return value is injected
> but the actual program was not run.
hmm... I don't understand this. The actual program is run by attaching to the
bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
> New behavior mirrors that of running raw tracepoint BPF programs which
> actually runs the instructions of the program via `bpf_prog_run()`
Which tracepoint and how is it tested?
The CI kernel is crashing:
https://patchwork.kernel.org/project/netdevbpf/patch/20230203182812.20657-1-grantseltzer@gmail.com/
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-04 6:58 ` Martin KaFai Lau
@ 2023-02-05 17:29 ` Grant Seltzer Richman
2023-02-06 20:37 ` Martin KaFai Lau
0 siblings, 1 reply; 7+ messages in thread
From: Grant Seltzer Richman @ 2023-02-05 17:29 UTC (permalink / raw)
To: Martin KaFai Lau; +Cc: andrii, kpsingh, bpf
On Sat, Feb 4, 2023 at 1:58 AM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>
> On 2/3/23 10:28 AM, Grant Seltzer wrote:
> > This patch changes the behavior of how BPF_PROG_RUN treats tracing
> > (fentry/fexit) programs. Previously only a return value is injected
> > but the actual program was not run.
>
> hmm... I don't understand this. The actual program is run by attaching to the
> bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
I'm not sure what you mean. Are you saying in order to use the
BPF_PROG_RUN bpf syscall command the user must first attach to
`bpf_fentry_test1` (or any 1-8), and then execute the BPF_PROG_RUN?
>
> > New behavior mirrors that of running raw tracepoint BPF programs which
> > actually runs the instructions of the program via `bpf_prog_run()`
>
> Which tracepoint and how is it tested?
I was referring to the `bpf_prog_test_run_raw_tp()` function in the
same file. I can write additional selftests
>
> The CI kernel is crashing:
> https://patchwork.kernel.org/project/netdevbpf/patch/20230203182812.20657-1-grantseltzer@gmail.com/
>
Thanks for linking to this, I was unaware of this being available!
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-05 17:29 ` Grant Seltzer Richman
@ 2023-02-06 20:37 ` Martin KaFai Lau
2023-02-07 15:46 ` Grant Seltzer Richman
0 siblings, 1 reply; 7+ messages in thread
From: Martin KaFai Lau @ 2023-02-06 20:37 UTC (permalink / raw)
To: Grant Seltzer Richman; +Cc: andrii, kpsingh, bpf
On 2/5/23 9:29 AM, Grant Seltzer Richman wrote:
> On Sat, Feb 4, 2023 at 1:58 AM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>>
>> On 2/3/23 10:28 AM, Grant Seltzer wrote:
>>> This patch changes the behavior of how BPF_PROG_RUN treats tracing
>>> (fentry/fexit) programs. Previously only a return value is injected
>>> but the actual program was not run.
>>
>> hmm... I don't understand this. The actual program is run by attaching to the
>> bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
>
> I'm not sure what you mean. Are you saying in order to use the
> BPF_PROG_RUN bpf syscall command the user must first attach to
> `bpf_fentry_test1` (or any 1-8), and then execute the BPF_PROG_RUN?
It is how the fentry/fexit/fmod_ret...BPF_PROG_TYPE_TRACIN_xxx prog is setup to
run now in test_run. afaik, these tracing progs require the trampoline setup
before calling the bpf prog, so don't understand how __bpf_prog_test_run_tracing
will work safely.
A selftest will help how this will work without the traompline but may be first
need to understand what it is trying to solve.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-06 20:37 ` Martin KaFai Lau
@ 2023-02-07 15:46 ` Grant Seltzer Richman
2023-02-08 1:05 ` Martin KaFai Lau
0 siblings, 1 reply; 7+ messages in thread
From: Grant Seltzer Richman @ 2023-02-07 15:46 UTC (permalink / raw)
To: Martin KaFai Lau; +Cc: andrii, kpsingh, bpf
On Mon, Feb 6, 2023 at 3:37 PM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>
> On 2/5/23 9:29 AM, Grant Seltzer Richman wrote:
> > On Sat, Feb 4, 2023 at 1:58 AM Martin KaFai Lau <martin.lau@linux.dev> wrote:
> >>
> >> On 2/3/23 10:28 AM, Grant Seltzer wrote:
> >>> This patch changes the behavior of how BPF_PROG_RUN treats tracing
> >>> (fentry/fexit) programs. Previously only a return value is injected
> >>> but the actual program was not run.
> >>
> >> hmm... I don't understand this. The actual program is run by attaching to the
> >> bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
> >
> > I'm not sure what you mean. Are you saying in order to use the
> > BPF_PROG_RUN bpf syscall command the user must first attach to
> > `bpf_fentry_test1` (or any 1-8), and then execute the BPF_PROG_RUN?
>
> It is how the fentry/fexit/fmod_ret...BPF_PROG_TYPE_TRACIN_xxx prog is setup to
> run now in test_run. afaik, these tracing progs require the trampoline setup
> before calling the bpf prog, so don't understand how __bpf_prog_test_run_tracing
> will work safely.
My goal is to be able to take a bpf program of type
BPF_PROG_TYPE_TRACING and run it via BPF_PROG_TEST_RUN without having
to attach it. The motivation is testing. You can run tracing programs
but the actual program isn't run, from the users perspective the
syscall just returns 0. You can see how I'm testing this here [1].
If I understand you correctly, it's possible to do something like
this, can you give me more information on how I can and I'll be sure
to submit documentation for it?
[1] https://github.com/grantseltzer/bpf-prog-test-run/tree/main/programs
>
> A selftest will help how this will work without the traompline but may be first
> need to understand what it is trying to solve.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-07 15:46 ` Grant Seltzer Richman
@ 2023-02-08 1:05 ` Martin KaFai Lau
2023-02-08 15:40 ` Grant Seltzer Richman
0 siblings, 1 reply; 7+ messages in thread
From: Martin KaFai Lau @ 2023-02-08 1:05 UTC (permalink / raw)
To: Grant Seltzer Richman; +Cc: andrii, kpsingh, bpf
On 2/7/23 7:46 AM, Grant Seltzer Richman wrote:
> On Mon, Feb 6, 2023 at 3:37 PM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>>
>> On 2/5/23 9:29 AM, Grant Seltzer Richman wrote:
>>> On Sat, Feb 4, 2023 at 1:58 AM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>>>>
>>>> On 2/3/23 10:28 AM, Grant Seltzer wrote:
>>>>> This patch changes the behavior of how BPF_PROG_RUN treats tracing
>>>>> (fentry/fexit) programs. Previously only a return value is injected
>>>>> but the actual program was not run.
>>>>
>>>> hmm... I don't understand this. The actual program is run by attaching to the
>>>> bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
>>>
>>> I'm not sure what you mean. Are you saying in order to use the
>>> BPF_PROG_RUN bpf syscall command the user must first attach to
>>> `bpf_fentry_test1` (or any 1-8), and then execute the BPF_PROG_RUN?
>>
>> It is how the fentry/fexit/fmod_ret...BPF_PROG_TYPE_TRACIN_xxx prog is setup to
>> run now in test_run. afaik, these tracing progs require the trampoline setup
>> before calling the bpf prog, so don't understand how __bpf_prog_test_run_tracing
>> will work safely.
>
> My goal is to be able to take a bpf program of type
> BPF_PROG_TYPE_TRACING and run it via BPF_PROG_TEST_RUN without having
> to attach it. The motivation is testing. You can run tracing programs
> but the actual program isn't run, from the users perspective the
> syscall just returns 0. You can see how I'm testing this here [1].
>
> If I understand you correctly, it's possible to do something like
> this, can you give me more information on how I can and I'll be sure
> to submit documentation for it?
>
> [1] https://github.com/grantseltzer/bpf-prog-test-run/tree/main/programs
In raw tracepoint, the "ctx" is just a u64 array for the args.
fentry/fexit/fmod_ret is much demanding than preparing a u64 array. The
trampoline is preparing more than just 'args'. The trampoline is likely to be
expanded and changed in the future also. You can take a look at
arch_prepare_bpf_trampoline().
Yes, might be the trampoline preparation can be reused. However, I am not
convinced tracing program can be tested through test_run in a meaningful and
reliable way to worth this complication. eg. A tracing function taking 'struct
task_struct *task'. It is not easy for the user space program to prepare the ctx
containing a task_struct and the task_struct layout may change also. There are
so many traceable kernel functions and I don't think test_run can ever become a
single point to test tracing prog for all kernel functions.
[ Side-note: test_run for skb/xdp has much narrower focus in terms of argument
because it is driven by the packet header like the standard IPv6/TCP/UDP. ]
Even for bpf_prog_test_run_raw_tp, the raw_tp_test_run.c is mostly testing if
the prog is running on a particular cpu. It is not looking into the args which
is what the tracing prog usually does.
Please attach the tracing prog to the kernel function to test
or reuse the existing bpf_prog_test_run_raw_tp to test it if it does not care
the args.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN
2023-02-08 1:05 ` Martin KaFai Lau
@ 2023-02-08 15:40 ` Grant Seltzer Richman
0 siblings, 0 replies; 7+ messages in thread
From: Grant Seltzer Richman @ 2023-02-08 15:40 UTC (permalink / raw)
To: Martin KaFai Lau; +Cc: andrii, kpsingh, bpf
On Tue, Feb 7, 2023 at 8:05 PM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>
> On 2/7/23 7:46 AM, Grant Seltzer Richman wrote:
> > On Mon, Feb 6, 2023 at 3:37 PM Martin KaFai Lau <martin.lau@linux.dev> wrote:
> >>
> >> On 2/5/23 9:29 AM, Grant Seltzer Richman wrote:
> >>> On Sat, Feb 4, 2023 at 1:58 AM Martin KaFai Lau <martin.lau@linux.dev> wrote:
> >>>>
> >>>> On 2/3/23 10:28 AM, Grant Seltzer wrote:
> >>>>> This patch changes the behavior of how BPF_PROG_RUN treats tracing
> >>>>> (fentry/fexit) programs. Previously only a return value is injected
> >>>>> but the actual program was not run.
> >>>>
> >>>> hmm... I don't understand this. The actual program is run by attaching to the
> >>>> bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
> >>>
> >>> I'm not sure what you mean. Are you saying in order to use the
> >>> BPF_PROG_RUN bpf syscall command the user must first attach to
> >>> `bpf_fentry_test1` (or any 1-8), and then execute the BPF_PROG_RUN?
> >>
> >> It is how the fentry/fexit/fmod_ret...BPF_PROG_TYPE_TRACIN_xxx prog is setup to
> >> run now in test_run. afaik, these tracing progs require the trampoline setup
> >> before calling the bpf prog, so don't understand how __bpf_prog_test_run_tracing
> >> will work safely.
> >
> > My goal is to be able to take a bpf program of type
> > BPF_PROG_TYPE_TRACING and run it via BPF_PROG_TEST_RUN without having
> > to attach it. The motivation is testing. You can run tracing programs
> > but the actual program isn't run, from the users perspective the
> > syscall just returns 0. You can see how I'm testing this here [1].
> >
> > If I understand you correctly, it's possible to do something like
> > this, can you give me more information on how I can and I'll be sure
> > to submit documentation for it?
> >
> > [1] https://github.com/grantseltzer/bpf-prog-test-run/tree/main/programs
>
> In raw tracepoint, the "ctx" is just a u64 array for the args.
>
> fentry/fexit/fmod_ret is much demanding than preparing a u64 array. The
> trampoline is preparing more than just 'args'. The trampoline is likely to be
> expanded and changed in the future also. You can take a look at
> arch_prepare_bpf_trampoline().
>
> Yes, might be the trampoline preparation can be reused. However, I am not
> convinced tracing program can be tested through test_run in a meaningful and
> reliable way to worth this complication. eg. A tracing function taking 'struct
> task_struct *task'. It is not easy for the user space program to prepare the ctx
> containing a task_struct and the task_struct layout may change also. There are
> so many traceable kernel functions and I don't think test_run can ever become a
> single point to test tracing prog for all kernel functions.
> [ Side-note: test_run for skb/xdp has much narrower focus in terms of argument
> because it is driven by the packet header like the standard IPv6/TCP/UDP. ]
>
> Even for bpf_prog_test_run_raw_tp, the raw_tp_test_run.c is mostly testing if
> the prog is running on a particular cpu. It is not looking into the args which
> is what the tracing prog usually does.
>
> Please attach the tracing prog to the kernel function to test
> or reuse the existing bpf_prog_test_run_raw_tp to test it if it does not care
> the args.
Thank you for the explanation, I understand!
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2023-02-08 15:41 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-02-03 18:28 [PATCH v2 bpf-next] Add support for tracing programs in BPF_PROG_RUN Grant Seltzer
2023-02-04 6:58 ` Martin KaFai Lau
2023-02-05 17:29 ` Grant Seltzer Richman
2023-02-06 20:37 ` Martin KaFai Lau
2023-02-07 15:46 ` Grant Seltzer Richman
2023-02-08 1:05 ` Martin KaFai Lau
2023-02-08 15:40 ` Grant Seltzer Richman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox