On 08/25/2017 11:39 PM, Jakub Kicinski wrote:
Add a basic test for checking whether kernel is populating
the jited and xlated BPF images.  It was used to confirm
the behaviour change from commit d777b2ddbecf ("bpf: don't
zero out the info struct in bpf_obj_get_info_by_fd()"),
which made bpf_obj_get_info_by_fd() usable for retrieving
the image dumps.

Signed-off-by: Jakub Kicinski <jakub.kicin...@netronome.com>
[...]
@@ -328,15 +331,20 @@ static void test_bpf_obj_id(void)
                          prog_infos[i].type != BPF_PROG_TYPE_SOCKET_FILTER ||
                          info_len != sizeof(struct bpf_prog_info) ||
                          (jit_enabled && !prog_infos[i].jited_prog_len) ||
-                         !prog_infos[i].xlated_prog_len,
+                         (jit_enabled &&
+                          !memcmp(jited_insns, zeros, sizeof(zeros))) ||
+                         !prog_infos[i].xlated_prog_len ||
+                         !memcmp(xlated_insns, zeros, sizeof(zeros)),

There could still be the case where a JIT could bail out
for some reason and punt to the interpreter instead, but
I'm fine assuming for the specific test cases we have it
has to succeed, and if not JIT misses features or has other
issues. ;) Thus:

Acked-by: Daniel Borkmann <dan...@iogearbox.net>

Thanks!

Reply via email to