selftests/bpf: Fix fill_link_info selftest on powerpc
authorSaket Kumar Bhaskar <skb99@linux.ibm.com>
Mon, 9 Dec 2024 06:57:20 +0000 (12:27 +0530)
committerAndrii Nakryiko <andrii@kernel.org>
Mon, 9 Dec 2024 21:55:29 +0000 (13:55 -0800)
With CONFIG_KPROBES_ON_FTRACE enabled on powerpc, ftrace_location_range
returns ftrace location for bpf_fentry_test1 at offset of 4 bytes from
function entry. This is because branch to _mcount function is at offset
of 4 bytes in function profile sequence.

To fix this, add entry_offset of 4 bytes while verifying the address for
kprobe entry address of bpf_fentry_test1 in verify_perf_link_info in
selftest, when CONFIG_KPROBES_ON_FTRACE is enabled.

Disassemble of bpf_fentry_test1:

c000000000e4b080 <bpf_fentry_test1>:
c000000000e4b080:       a6 02 08 7c     mflr    r0
c000000000e4b084:       b9 e2 22 4b     bl      c00000000007933c <_mcount>
c000000000e4b088:       01 00 63 38     addi    r3,r3,1
c000000000e4b08c:       b4 07 63 7c     extsw   r3,r3
c000000000e4b090:       20 00 80 4e     blr

When CONFIG_PPC_FTRACE_OUT_OF_LINE [1] is enabled, these function profile
sequence is moved out of line with an unconditional branch at offset 0.
So, the test works without altering the offset for
'CONFIG_KPROBES_ON_FTRACE && CONFIG_PPC_FTRACE_OUT_OF_LINE' case.

Disassemble of bpf_fentry_test1:

c000000000f95190 <bpf_fentry_test1>:
c000000000f95190:       00 00 00 60     nop
c000000000f95194:       01 00 63 38     addi    r3,r3,1
c000000000f95198:       b4 07 63 7c     extsw   r3,r3
c000000000f9519c:       20 00 80 4e     blr

[1] https://lore.kernel.org/all/20241030070850.1361304-13-hbathini@linux.ibm.com/

Fixes: 23cf7aa539dc ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Saket Kumar Bhaskar <skb99@linux.ibm.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20241209065720.234344-1-skb99@linux.ibm.com
tools/testing/selftests/bpf/prog_tests/fill_link_info.c
tools/testing/selftests/bpf/progs/test_fill_link_info.c

index d50cbd8040d45fdb51cef51d087f3c8813926a1e..e59af2aa660166b390930da651e5174ad4dea722 100644 (file)
@@ -171,6 +171,10 @@ static void test_kprobe_fill_link_info(struct test_fill_link_info *skel,
                /* See also arch_adjust_kprobe_addr(). */
                if (skel->kconfig->CONFIG_X86_KERNEL_IBT)
                        entry_offset = 4;
+               if (skel->kconfig->CONFIG_PPC64 &&
+                   skel->kconfig->CONFIG_KPROBES_ON_FTRACE &&
+                   !skel->kconfig->CONFIG_PPC_FTRACE_OUT_OF_LINE)
+                       entry_offset = 4;
                err = verify_perf_link_info(link_fd, type, kprobe_addr, 0, entry_offset);
                ASSERT_OK(err, "verify_perf_link_info");
        } else {
index 6afa834756e9fdd87a1f824ec8c63b2b48fe0408..fac33a14f2009c82ce856f56c24aa2f6854cfa9b 100644 (file)
@@ -6,13 +6,20 @@
 #include <stdbool.h>
 
 extern bool CONFIG_X86_KERNEL_IBT __kconfig __weak;
+extern bool CONFIG_PPC_FTRACE_OUT_OF_LINE __kconfig __weak;
+extern bool CONFIG_KPROBES_ON_FTRACE __kconfig __weak;
+extern bool CONFIG_PPC64 __kconfig __weak;
 
-/* This function is here to have CONFIG_X86_KERNEL_IBT
- * used and added to object BTF.
+/* This function is here to have CONFIG_X86_KERNEL_IBT,
+ * CONFIG_PPC_FTRACE_OUT_OF_LINE, CONFIG_KPROBES_ON_FTRACE,
+ * CONFIG_PPC6 used and added to object BTF.
  */
 int unused(void)
 {
-       return CONFIG_X86_KERNEL_IBT ? 0 : 1;
+       return CONFIG_X86_KERNEL_IBT ||
+                       CONFIG_PPC_FTRACE_OUT_OF_LINE ||
+                       CONFIG_KPROBES_ON_FTRACE ||
+                       CONFIG_PPC64 ? 0 : 1;
 }
 
 SEC("kprobe")