From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from 69-171-232-180.mail-mxout.facebook.com (69-171-232-180.mail-mxout.facebook.com [69.171.232.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EA54B82863 for ; Wed, 4 Sep 2024 22:13:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=69.171.232.180 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725487994; cv=none; b=lYjNUKTig3RlGoAGllYXYpGFVeBYUofAkS8X83+92N/hpMkyngFkeuVmIWRzPMzx38xCJGhqzkul+yN5xctoEodXzfppt/6Fp/ifdVEXwmo9Wdqg49VsK11LTjsP96wZL6/dcYXIWsqqBGDlUpqh2vivfa2CIx3Iq/PdrieGf5M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725487994; c=relaxed/simple; bh=DEqO42yF/W7zBA6iIkOnwYRhnqFjHyA1/GYLxIJV+BU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=qq5qovJj6J1IKYv/K1wf1Pi73mC6uSCFE9kYeg91AsDdiAjF7NLAzkdfqZ2HK411OJByr8HEm72lrnsNMdl2st5gfhUdHcLv0rOsC4vMM/WqKKl2UhnBLe+4rzOvQ+jlECqBh4Zx+ENQsMCfLyQx3OSoTOr8BdYECXbZePIFf9A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.dev; spf=fail smtp.mailfrom=linux.dev; arc=none smtp.client-ip=69.171.232.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=linux.dev Received: by devbig309.ftw3.facebook.com (Postfix, from userid 128203) id EAD8D897E931; Wed, 4 Sep 2024 15:12:56 -0700 (PDT) From: Yonghong Song To: bpf@vger.kernel.org Cc: Alexei Starovoitov , Andrii Nakryiko , Daniel Borkmann , kernel-team@fb.com, Martin KaFai Lau Subject: [PATCH bpf-next v3 2/2] selftests/bpf: Add a selftest for x86 jit convergence issues Date: Wed, 4 Sep 2024 15:12:56 -0700 Message-ID: <20240904221256.37389-1-yonghong.song@linux.dev> X-Mailer: git-send-email 2.43.5 In-Reply-To: <20240904221251.37109-1-yonghong.song@linux.dev> References: <20240904221251.37109-1-yonghong.song@linux.dev> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable The core part of the selftest, i.e., the je <-> jmp cycle, mimics the original sched-ext bpf program. The test will fail without the previous patch. I tried to create some cases for other potential cycles (je <-> je, jmp <-> je and jmp <-> jmp) with similar pattern to the test in this patch, but failed. So this patch only contains one test for je <-> jmp cycle. Signed-off-by: Yonghong Song --- .../selftests/bpf/prog_tests/verifier.c | 2 + .../bpf/progs/verifier_jit_convergence.c | 114 ++++++++++++++++++ 2 files changed, 116 insertions(+) create mode 100644 tools/testing/selftests/bpf/progs/verifier_jit_conver= gence.c Changelogs: v2 -> v3: - remove x86_64 guard, the test runs on all arch's in the ci. diff --git a/tools/testing/selftests/bpf/prog_tests/verifier.c b/tools/te= sting/selftests/bpf/prog_tests/verifier.c index 80a90c627182..df398e714dff 100644 --- a/tools/testing/selftests/bpf/prog_tests/verifier.c +++ b/tools/testing/selftests/bpf/prog_tests/verifier.c @@ -39,6 +39,7 @@ #include "verifier_int_ptr.skel.h" #include "verifier_iterating_callbacks.skel.h" #include "verifier_jeq_infer_not_null.skel.h" +#include "verifier_jit_convergence.skel.h" #include "verifier_ld_ind.skel.h" #include "verifier_ldsx.skel.h" #include "verifier_leak_ptr.skel.h" @@ -163,6 +164,7 @@ void test_verifier_helper_value_access(void) { RUN(v= erifier_helper_value_access void test_verifier_int_ptr(void) { RUN(verifier_int_ptr); } void test_verifier_iterating_callbacks(void) { RUN(verifier_iterating_c= allbacks); } void test_verifier_jeq_infer_not_null(void) { RUN(verifier_jeq_infer_n= ot_null); } +void test_verifier_jit_convergence(void) { RUN(verifier_jit_converg= ence); } void test_verifier_ld_ind(void) { RUN(verifier_ld_ind); } void test_verifier_ldsx(void) { RUN(verifier_ldsx); } void test_verifier_leak_ptr(void) { RUN(verifier_leak_ptr); = } diff --git a/tools/testing/selftests/bpf/progs/verifier_jit_convergence.c= b/tools/testing/selftests/bpf/progs/verifier_jit_convergence.c new file mode 100644 index 000000000000..9f3f2b7db450 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/verifier_jit_convergence.c @@ -0,0 +1,114 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Copyright (c) 2024 Meta Platforms, Inc. and affiliates. */ + +#include +#include +#include "bpf_misc.h" + +struct value_t { + long long a[32]; +}; + +struct { + __uint(type, BPF_MAP_TYPE_HASH); + __uint(max_entries, 1); + __type(key, long long); + __type(value, struct value_t); +} map_hash SEC(".maps"); + +SEC("socket") +__description("bpf_jit_convergence je <-> jmp") +__success __retval(0) +__arch_x86_64 +__jited(" pushq %rbp") +__naked void btf_jit_convergence_je_jmp(void) +{ + asm volatile ( + "call %[bpf_get_prandom_u32];" + "if r0 =3D=3D 0 goto l20_%=3D;" + "if r0 =3D=3D 1 goto l21_%=3D;" + "if r0 =3D=3D 2 goto l22_%=3D;" + "if r0 =3D=3D 3 goto l23_%=3D;" + "if r0 =3D=3D 4 goto l24_%=3D;" + "call %[bpf_get_prandom_u32];" + "call %[bpf_get_prandom_u32];" +"l20_%=3D:" +"l21_%=3D:" +"l22_%=3D:" +"l23_%=3D:" +"l24_%=3D:" + "r1 =3D 0;" + "*(u64 *)(r10 - 8) =3D r1;" + "r2 =3D r10;" + "r2 +=3D -8;" + "r1 =3D %[map_hash] ll;" + "call %[bpf_map_lookup_elem];" + "if r0 =3D=3D 0 goto l1_%=3D;" + "r6 =3D r0;" + "call %[bpf_get_prandom_u32];" + "r7 =3D r0;" + "r5 =3D r6;" + "if r0 !=3D 0x0 goto l12_%=3D;" + "call %[bpf_get_prandom_u32];" + "r1 =3D r0;" + "r2 =3D r6;" + "if r1 =3D=3D 0x0 goto l0_%=3D;" +"l9_%=3D:" + "r2 =3D *(u64 *)(r6 + 0x0);" + "r2 +=3D 0x1;" + "*(u64 *)(r6 + 0x0) =3D r2;" + "goto l1_%=3D;" +"l12_%=3D:" + "r1 =3D r7;" + "r1 +=3D 0x98;" + "r2 =3D r5;" + "r2 +=3D 0x90;" + "r2 =3D *(u32 *)(r2 + 0x0);" + "r3 =3D r7;" + "r3 &=3D 0x1;" + "r2 *=3D 0xa8;" + "if r3 =3D=3D 0x0 goto l2_%=3D;" + "r1 +=3D r2;" + "r1 -=3D r7;" + "r1 +=3D 0x8;" + "if r1 <=3D 0xb20 goto l3_%=3D;" + "r1 =3D 0x0;" + "goto l4_%=3D;" +"l3_%=3D:" + "r1 +=3D r7;" +"l4_%=3D:" + "if r1 =3D=3D 0x0 goto l8_%=3D;" + "goto l9_%=3D;" +"l2_%=3D:" + "r1 +=3D r2;" + "r1 -=3D r7;" + "r1 +=3D 0x10;" + "if r1 <=3D 0xb20 goto l6_%=3D;" + "r1 =3D 0x0;" + "goto l7_%=3D;" +"l6_%=3D:" + "r1 +=3D r7;" +"l7_%=3D:" + "if r1 =3D=3D 0x0 goto l8_%=3D;" + "goto l9_%=3D;" +"l0_%=3D:" + "r1 =3D 0x3;" + "*(u64 *)(r10 - 0x10) =3D r1;" + "r2 =3D r1;" + "goto l1_%=3D;" +"l8_%=3D:" + "r1 =3D r5;" + "r1 +=3D 0x4;" + "r1 =3D *(u32 *)(r1 + 0x0);" + "*(u64 *)(r10 - 0x8) =3D r1;" +"l1_%=3D:" + "r0 =3D 0;" + "exit;" + : + : __imm(bpf_get_prandom_u32), + __imm(bpf_map_lookup_elem), + __imm_addr(map_hash) + : __clobber_all); +} + +char _license[] SEC("license") =3D "GPL"; --=20 2.43.5