From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from relay3-d.mail.gandi.net (relay3-d.mail.gandi.net [217.70.183.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2730F1BC40; Thu, 1 Aug 2024 10:00:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.70.183.195 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722506456; cv=none; b=eNPBNChgXYzH5ZcjcRZGSsqaAZF/lXMu9QLtjruiSJIRFhm/m1CxKiA+ZDhFKLAF8MJfpPWvch+PZdJNY+ubvIZCAkHgnfxUPyVDBKfImiIqe9iJT9BtmW4IlHrpDCDyFGqEm6GJ00ZWNm0XihEq/4Xyc0pmGlR1J3wAgbssDrA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722506456; c=relaxed/simple; bh=K6I/niX/GoP0AV7OtnP7n3vvhMFQyfQMmTDwt0+9paU=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=X+jMe6JMZaAuNztltzZazXP/Y2E8vVQQDCRy1mX3/7lz9hlQOj/VMAtVwsAtjEBoLJxYMJQtfk8XGPXi2ufh5kPWYOIbHqYjUXiIHiklDkxFEKtuIr+nfKriZSXL99pXLgq8dZ6RRR7CeNUdEV8bPacckZcA51LoWS+Y04h7ZTw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=bootlin.com; spf=pass smtp.mailfrom=bootlin.com; dkim=pass (2048-bit key) header.d=bootlin.com header.i=@bootlin.com header.b=FGgMp0bx; arc=none smtp.client-ip=217.70.183.195 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=bootlin.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=bootlin.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=bootlin.com header.i=@bootlin.com header.b="FGgMp0bx" Received: by mail.gandi.net (Postfix) with ESMTPSA id 031176000E; Thu, 1 Aug 2024 10:00:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1722506451; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=6l4DubqDM8I1nmz+oJ4LtiF6KCbDTupNGvhFdJo8uQI=; b=FGgMp0bx8N1aF+qE79nGnn0SI7rqMm91gdxss1iiLeMbCnLfQmbAGQZNsVlc006/RzA6nl /66PwNV6qutW/yTpZxoerji9PtCHFF0Q1ZfhUG3y/cCaOJh6gh0qgIkS7Nv9ALV48811PL Na2CyOFj+hKfa6wUZ7riZGN3M9J78jIy1KLh1Qp0/Diev+lNz/qbx/doGbzq4oi4obYUTY 8SnIwdpSC7ls6016fv2zPZiO3s0XT+i3rHUTrrWvDq73utDt7MenlFIAMHfMFcouQTtNOL fe70xyLlhxaE9GXCl94CrQM9E+GS/26ukmompkr2WRlxc0FInFVcL1ZaSGgOAA== Message-ID: <263cd78b-0392-45d4-a13c-b2b0463c4c8c@bootlin.com> Date: Thu, 1 Aug 2024 12:00:34 +0200 Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH bpf-next 3/4] selftests/bpf: add proper section name to bpf prog and rename it To: Alan Maguire , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: ebpf@linuxfoundation.org, Thomas Petazzoni , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org References: <20240731-convert_cgroup_tests-v1-0-14cbc51b6947@bootlin.com> <20240731-convert_cgroup_tests-v1-3-14cbc51b6947@bootlin.com> From: =?UTF-8?Q?Alexis_Lothor=C3=A9?= Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-GND-Sasl: alexis.lothore@bootlin.com On 8/1/24 10:35, Alan Maguire wrote: > On 31/07/2024 11:38, Alexis Lothoré (eBPF Foundation) wrote: >> test_skb_cgroup_id_kern.c is currently involved in a manual test. In its >> current form, it can not be used with the auto-generated skeleton APIs, >> because the section name is not valid to allow libbpf to deduce the program >> type. >> >> Update section name to allow skeleton APIs usage. Also rename the program >> name to make it shorter and more straighforward regarding the API it is >> testing. While doing so, make sure that test_skb_cgroup_id.sh passes to get >> a working reference before converting it to test_progs >> - update the obj name >> - fix loading issue (verifier rejecting the program when loaded through tc, >> because of map not found), by preloading the whole obj with bpftool >> >> Signed-off-by: Alexis Lothoré (eBPF Foundation) > > Reviewed-by: Alan Maguire [...] >> tc qdisc add dev ${TEST_IF} clsact >> - tc filter add dev ${TEST_IF} egress bpf obj ${BPF_PROG_OBJ} \ >> - sec ${BPF_PROG_SECTION} da >> + mkdir -p /sys/fs/bpf/${BPF_PROG_PIN} >> + bpftool prog loadall ${BPF_PROG_OBJ} /sys/fs/bpf/${BPF_PROG_PIN} type tc >> + tc filter add dev ${TEST_IF} egress bpf da object-pinned \ >> + /sys/fs/bpf/${BPF_PROG_PIN}/${BPF_PROG_NAME} >> > > Just out of curiosity; did you find that the pin is needed? I would have > thought tc attach would be enough to keep the program aroud. That's more because that's the only way I found to make the filter addition work. With the current command, the tc command fails because of the verifier rejecting the program: Verifier analysis: func#0 @0 0: R1=ctx() R10=fp0 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx() 1: (b4) w1 = 0 ; R1_w=0 2: (63) *(u32 *)(r10 -4) = r1 mark_precise: frame0: last_idx 2 first_idx 0 subseq_idx -1 mark_precise: frame0: regs=r1 stack= before 1: (b4) w1 = 0 3: R1_w=0 R10=fp0 fp-8=0000???? 3: (bf) r1 = r6 ; R1_w=ctx() R6_w=ctx() 4: (b4) w2 = 0 ; R2_w=0 5: (85) call bpf_skb_ancestor_cgroup_id#83 ; R0_w=scalar() 6: (7b) *(u64 *)(r10 -16) = r0 ; R0_w=scalar(id=1) R10=fp0 fp-16_w=scalar(id=1) 7: (bf) r2 = r10 ; R2_w=fp0 R10=fp0 8: (07) r2 += -4 ; R2_w=fp-4 9: (bf) r3 = r10 ; R3_w=fp0 R10=fp0 10: (07) r3 += -16 ; R3_w=fp-16 11: (18) r1 = 0x0 ; R1_w=0 13: (b7) r4 = 0 ; R4_w=0 14: (85) call bpf_map_update_elem#2 R1 type=scalar expected=map_ptr processed 14 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 (I also tried to remove the sec argument from the tc commandline, in case it could allow tc to load everything, but the issue remains the same) IIUC the verifier output, there's an issue with the variable representing the map. When stracing the tc filter add command, I indeed see the BPF_PROG_LOAD syscall but no BPF_MAP_CREATE at all, so I assumed tc did not read/create the map correctly. That's why I used bpftool to make sure everything is loaded, but as a consequence I need to provide a pin path when using load/loadall. But maybe I am missing something ? -- Alexis Lothoré, Bootlin Embedded Linux and Kernel engineering https://bootlin.com