Blame SOURCES/rhbz1643997.0022-standardize-ktime_get_ns-across-lkm-bpf-runtimes.patch

e4e640
From 43f6345c9605c0fad57abfe31dda8951f6630ebf Mon Sep 17 00:00:00 2001
e4e640
From: "Frank Ch. Eigler" <fche@redhat.com>
e4e640
Date: Tue, 6 Nov 2018 16:26:57 -0500
e4e640
Subject: [PATCH 22/32] standardize ktime_get_ns() across lkm, bpf runtimes
e4e640
e4e640
Make sure ktime_get_ns() is available across runtimes.  In the case of
e4e640
bpf, add a userspace helper to implement the function.  Add test case.
e4e640
Add a systemtap.bpf/nobpf.exp test driver, which runs all the
e4e640
bpf_tests but specifically without "--bpf", in the hope that all those
e4e640
scripts should run on the normal backend too.  PR23866 blocks some of
e4e640
that at the moment.
e4e640
---
e4e640
 stapbpf/bpfinterp.cxx                              |  13 ++
e4e640
 tapset/bpf/time.stp                                |   2 +-
e4e640
 tapset/linux/timestamp_monotonic.stp               |  11 ++
e4e640
 testsuite/systemtap.bpf/bpf_tests/ktime_get_ns.stp |  33 +++++
e4e640
 testsuite/systemtap.bpf/nonbpf.exp                 | 152 +++++++++++++++++++++
e4e640
 5 files changed, 210 insertions(+), 1 deletion(-)
e4e640
 create mode 100644 testsuite/systemtap.bpf/bpf_tests/ktime_get_ns.stp
e4e640
 create mode 100644 testsuite/systemtap.bpf/nonbpf.exp
e4e640
e4e640
diff --git a/stapbpf/bpfinterp.cxx b/stapbpf/bpfinterp.cxx
e4e640
index fe6eacc50..13ac8ee71 100644
e4e640
--- a/stapbpf/bpfinterp.cxx
e4e640
+++ b/stapbpf/bpfinterp.cxx
e4e640
@@ -162,6 +162,16 @@ bpf_sprintf(std::vector<std::string> &strings, char *fstr,
e4e640
   return reinterpret_cast<uint64_t>(strings.back().c_str());
e4e640
 }
e4e640
 
e4e640
+uint64_t
e4e640
+bpf_ktime_get_ns()
e4e640
+{
e4e640
+  struct timespec t;
e4e640
+  clock_gettime (CLOCK_BOOTTIME, &t);
e4e640
+  return (t.tv_sec * 1000000000) + t.tv_nsec;
e4e640
+}
e4e640
+
e4e640
+
e4e640
+
e4e640
 uint64_t
e4e640
 bpf_interpret(size_t ninsns, const struct bpf_insn insns[],
e4e640
               std::vector<int> &map_fds, FILE *output_f)
e4e640
@@ -374,6 +384,9 @@ bpf_interpret(size_t ninsns, const struct bpf_insn insns[],
e4e640
 	    case BPF_FUNC_map_delete_elem:
e4e640
 	      dr = bpf_delete_elem(map_fds[regs[1]], as_ptr(regs[2]));
e4e640
 	      break;
e4e640
+	    case BPF_FUNC_ktime_get_ns:
e4e640
+              dr = bpf_ktime_get_ns();
e4e640
+              break;
e4e640
 	    case BPF_FUNC_trace_printk:
e4e640
 #pragma GCC diagnostic push
e4e640
 #pragma GCC diagnostic ignored "-Wformat-nonliteral"
e4e640
diff --git a/tapset/bpf/time.stp b/tapset/bpf/time.stp
e4e640
index ee615330c..a1c827e73 100644
e4e640
--- a/tapset/bpf/time.stp
e4e640
+++ b/tapset/bpf/time.stp
e4e640
@@ -12,7 +12,7 @@
e4e640
  * Description: This function returns the system ktime.
e4e640
  */
e4e640
 function ktime_get_ns:long ()
e4e640
-%{ /* bpf */ /* pure */ /* unprivileged */ /* stable */
e4e640
+%{ /* bpf */ /* pure */ /* unprivileged */
e4e640
    0x85, 0, 0, 0, 5;	/* call BPF_FUNC_ktime_get_ns */
e4e640
    0xbf, $$, 0, 0, 0	/* movx $$, r0 */
e4e640
 %}
e4e640
diff --git a/tapset/linux/timestamp_monotonic.stp b/tapset/linux/timestamp_monotonic.stp
e4e640
index 6b6d445de..c8d142369 100644
e4e640
--- a/tapset/linux/timestamp_monotonic.stp
e4e640
+++ b/tapset/linux/timestamp_monotonic.stp
e4e640
@@ -148,3 +148,14 @@ function local_clock_ms:long () {
e4e640
 function local_clock_s:long () {
e4e640
   return local_clock_ns() / 1000000000;
e4e640
 }
e4e640
+
e4e640
+
e4e640
+/**
e4e640
+ * sfunction ktime_get_ns - Number of nanoseconds since boot
e4e640
+ *
e4e640
+ * Description: This function returns the system ktime.
e4e640
+ */
e4e640
+function ktime_get_ns:long () %{
e4e640
+  /* pure */ /* unprivileged */
e4e640
+  STAP_RETURN ((int64_t) ktime_get_ns());
e4e640
+%}
e4e640
diff --git a/testsuite/systemtap.bpf/bpf_tests/ktime_get_ns.stp b/testsuite/systemtap.bpf/bpf_tests/ktime_get_ns.stp
e4e640
new file mode 100644
e4e640
index 000000000..0b1d98e94
e4e640
--- /dev/null
e4e640
+++ b/testsuite/systemtap.bpf/bpf_tests/ktime_get_ns.stp
e4e640
@@ -0,0 +1,33 @@
e4e640
+global t1, t2, t3
e4e640
+
e4e640
+probe begin {
e4e640
+  printf("BEGIN\n")
e4e640
+  t1 = ktime_get_ns() // bpfinterp.cxx
e4e640
+}
e4e640
+
e4e640
+probe timer.s(1) {
e4e640
+  t2 = ktime_get_ns() // kernel bpf - XXX watch if timer.s() moves to userspace
e4e640
+}
e4e640
+
e4e640
+probe perf.type(1).config(0).hz(1) {
e4e640
+  t3 = ktime_get_ns() // kernel bpf
e4e640
+}
e4e640
+
e4e640
+
e4e640
+/*
e4e640
+probe kernel.function("SOMETHING") { # to trigger kernel side bpf func
e4e640
+  t3 = ktime.get.ns()
e4e640
+}
e4e640
+*/
e4e640
+
e4e640
+
e4e640
+probe timer.s(5) {
e4e640
+	exit()
e4e640
+}
e4e640
+
e4e640
+probe end {
e4e640
+  if (t1 > 0 && t2 > 0 && t3 > 0)
e4e640
+    printf("END PASS\n")
e4e640
+  else
e4e640
+    printf("END FAIL\n")    
e4e640
+}
e4e640
diff --git a/testsuite/systemtap.bpf/nonbpf.exp b/testsuite/systemtap.bpf/nonbpf.exp
e4e640
new file mode 100644
e4e640
index 000000000..35f6a7c99
e4e640
--- /dev/null
e4e640
+++ b/testsuite/systemtap.bpf/nonbpf.exp
e4e640
@@ -0,0 +1,152 @@
e4e640
+# bpf.exp
e4e640
+#
e4e640
+# To restrict scripts to test, set the CHECK_ONLY environment variable.
e4e640
+# For example, to only test the printf and uprobes scripts, run:
e4e640
+#
e4e640
+#    make installcheck RUNTESTFLAGS="nonbpf.exp" CHECK_ONLY="printf uprobes"
e4e640
+
e4e640
+set testdir "$srcdir/$subdir/bpf_tests"
e4e640
+
e4e640
+# All tests should start by printing "BEGIN". If OUTPUT_STR is "", then 
e4e640
+# the test passes if "END PASS" is read and fails if "END FAIL" is read. Otherwise
e4e640
+# the test passes when "${OUTPUT_STR}END" is read and fails if END is read without
e4e640
+# OUTPUT_STR preceeding it.
e4e640
+proc stapnonbpf_run { TEST_NAME OUTPUT_STR args } { 
e4e640
+    global rc
e4e640
+    set rc -1
e4e640
+    set begin_str "BEGIN"
e4e640
+    set pass_str [expr { $OUTPUT_STR == "" ? "END PASS" : "${OUTPUT_STR}END" }]
e4e640
+    set fail_str [expr { $OUTPUT_STR == "" ? "END FAIL" : "END" }]
e4e640
+
e4e640
+    # return codes
e4e640
+    set pass 0
e4e640
+    set fail 1
e4e640
+    set bad_output 2
e4e640
+    set eof_start 3
e4e640
+    set eof_end 4
e4e640
+    set timeout_start 5
e4e640
+    set timeout_end 6
e4e640
+    set invalid_prog 7
e4e640
+    set comp_err 8
e4e640
+    
e4e640
+    set cmd [concat stap -v $args]
e4e640
+    # don't the following: ... $test_file_name could be some transient or leftover file
e4e640
+    # if [file readable $test_file_name] { lappend cmd $test_file_name }
e4e640
+
e4e640
+    send_log "executing: $cmd\n"
e4e640
+    eval spawn $cmd
e4e640
+    set mypid [exp_pid -i $spawn_id]
e4e640
+    expect {
e4e640
+        -timeout 30 
e4e640
+        -re {^WARNING: cannot find module [^\r]*DWARF[^\r]*\r\n} {exp_continue}
e4e640
+        -re {^WARNING: No unwind data for /.+\r\n} {exp_continue}
e4e640
+        -re {^Pass\ ([1234]):[^\r]*\ in\ ([0-9]+)usr/([0-9]+)sys/([0-9]+)real\ ms\.\r\n}
e4e640
+        {set pass$expect_out(1,string) "\t$expect_out(2,string)\t$expect_out(3,string)\t$expect_out(4,string)"; exp_continue}
e4e640
+        -re {^Pass\ ([34]): using cached [^\r]+\r\n}
e4e640
+        {set pass$expect_out(1,string) "\t0\t0\t0"; exp_continue}
e4e640
+        -re {^Passes: via server [^\r]* using [^\r]* in [0-9]+usr/[0-9]+sys/[0-9]+real ms\.\r\n} {exp_continue}
e4e640
+        -re {^Pass 5: starting run.\r\n} {exp_continue}
e4e640
+        -re $begin_str {
e4e640
+            # By default, "expect -re" will match up to 2000 chars.
e4e640
+            # Increase this to 8K worth of data.
e4e640
+            exp_match_max 8192
e4e640
+
e4e640
+            # Avoid PR17274 to propagate
e4e640
+            set origexpinternal 1
e4e640
+            if {"[exp_internal -info]" == "0"} {set origexpinternal 0}
e4e640
+            #exp_internal 0
e4e640
+
e4e640
+            expect {
e4e640
+                -timeout 20
e4e640
+                -re $pass_str  {
e4e640
+                    set rc $pass
e4e640
+                }
e4e640
+                -re $fail_str {
e4e640
+                    set rc $fail
e4e640
+                }
e4e640
+                default {
e4e640
+                    set rc $bad_output
e4e640
+                }
e4e640
+                timeout {
e4e640
+                    set rc $timeout_end
e4e640
+                    kill -INT -$mypid
e4e640
+                }
e4e640
+                eof { set rc $eof_end }
e4e640
+            }
e4e640
+            exp_internal $origexpinternal
e4e640
+        }
e4e640
+        -re "semantic error:" { set rc $comp_err }
e4e640
+        timeout {
e4e640
+            set rc $timeout_start
e4e640
+            kill -INT -$mypid
e4e640
+        }
e4e640
+        eof { set rc $eof_start  }
e4e640
+    }
e4e640
+  # again for good measure with KILL after 3s
e4e640
+  kill -INT -$mypid 3
e4e640
+  catch close
e4e640
+  wait
e4e640
+  return $rc
e4e640
+}
e4e640
+
e4e640
+proc get_output_str { test } {
e4e640
+    global res
e4e640
+    switch $test {
e4e640
+        printf.stp { set res [string repeat "abcd123456" 3] }
e4e640
+        sprintf.stp { set res [string repeat "0123456789" 2] }
e4e640
+        string1.stp { set res {begin\[str0str1str2str3\]probe\[str0str1str2str3\]end\[str0str1str2str3\]} }
e4e640
+        string2.stp { set res {probe0\[str0str1str2str3\]probe1\[str0str1str2str3\]end\[str0str1str2str3\]} }
e4e640
+        default { set res "" }
e4e640
+    }
e4e640
+    return $res
e4e640
+}
e4e640
+
e4e640
+if {[info exists env(CHECK_ONLY)]} {
e4e640
+    set all_files [lsort [glob -nocomplain $testdir/*.stp]]
e4e640
+    set stap_files ""
e4e640
+    foreach file $env(CHECK_ONLY) {
e4e640
+        if {[lsearch $all_files $testdir/$file.stp] >= 0} {
e4e640
+            set stap_files "$stap_files $testdir/$file.stp"
e4e640
+        }
e4e640
+    }
e4e640
+} else {
e4e640
+    set stap_files [lsort [glob -nocomplain $testdir/*.stp]]
e4e640
+}
e4e640
+
e4e640
+foreach file $stap_files {
e4e640
+    global mypid
e4e640
+    set mypid 0
e4e640
+    set test [file tail $file]
e4e640
+    if {! [installtest_p]} { untested $test; continue }
e4e640
+
e4e640
+    # create a process for the tests that require one
e4e640
+    switch $test {
e4e640
+        uprobes.stp {
e4e640
+            eval spawn /usr/bin/sleep 20
e4e640
+            set mypid [exp_pid -i $spawn_id]
e4e640
+        }
e4e640
+    }
e4e640
+
e4e640
+    set output_str [get_output_str $test]
e4e640
+    verbose -log "Running $file"
e4e640
+    switch [stapnonbpf_run $test $output_str $file] {
e4e640
+        0 { pass $test }
e4e640
+        1 { fail "$test incorrect result" }
e4e640
+        2 { fail "$test unexpected output" }
e4e640
+        3 { fail "$test eof (startup)" }
e4e640
+        4 { fail "$test eof (shutdown)" }
e4e640
+        5 { fail "$test timeout (startup)" }
e4e640
+        6 { fail "$test timeout (startup)" }
e4e640
+        7 { fail "$test invalid bpf program" }
e4e640
+        8 { fail "$test compilation" }
e4e640
+        default { fail "$test unknown return value" }
e4e640
+    }
e4e640
+
e4e640
+    if { $mypid > 0 } {
e4e640
+        kill -INT -$mypid 3
e4e640
+        catch close
e4e640
+        wait
e4e640
+    }
e4e640
+}
e4e640
+
e4e640
+
e4e640
-- 
e4e640
2.14.5
e4e640