From patchwork Tue Dec 19 21:21:19 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 181266 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:24d3:b0:fb:cd0c:d3e with SMTP id r19csp2235369dyi; Tue, 19 Dec 2023 13:22:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IHNooPW+NkKAplNz+uHWkGoa9eTfF8aov4F5/HBSIzVkeWviZJ33hxK+Kd7ED2uH1/Sn2bz X-Received: by 2002:a05:6214:2509:b0:67f:2b5:b96a with SMTP id gf9-20020a056214250900b0067f02b5b96amr17348781qvb.51.1703020960742; Tue, 19 Dec 2023 13:22:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703020960; cv=none; d=google.com; s=arc-20160816; b=uCJCgmsCIl6y8mGa+ssrO6rs168VWXyyCTXIj8+KYI+DC3qyb/ko7tq16RnLWC3IH/ 6xwvKP9MiTLg7iiQ10eoLXuDOrn43Jrf/BIYakWdklDvNoW1DmVupb5ZSN4cud1q5kVb SzWex3USvdrP+GO4ccDgbJNfsFG23ykD6T0Ypp/LQ46/fjlLkK1e7hW5w1vcdoKBc0h8 Z2j4OqOFyrv7+8H1xSJ9tvOZi0ekEwqlgapWkZDxynJW5UDAEREVAkIN2LZ+T0iwpPMQ H9IAvgJr6UQJs7XyX4+huP+g73VCHXGgFlw8vtC/SKbjUevs01uiLfbRIRmbfVVVjnzl UZyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :subject:date:from:dkim-signature; bh=tCT0VI6Q84pYr8lVXh0H80KmAQcVgR3Qt0RMkYn4KNI=; fh=AWGRrYbdrZEzAbtHshVADdACQbgc7pZKSs/DT5CASU4=; b=0BbuGd17yQtlJYukZr+V5qNKu4ptDB4NXd1AWIBIgXFCX102p4UOvahwJn4v9Kz92z FLlAO77tBjjkstl9zGIZRRpZNypYQDS6L9nJPWls3KT+xn+8g7P4TSLyoRUFKQ7pOfSJ HxdlmyhPSqWJSplUhRbYQSeVRJPA5Af1X4uIqmuiw3faWT0HkL2SnM3+jJ5N0pyCvdK/ mITI5JBqTb9Uqo9fOgurAbgT0BToHfGLJth1yMjdXQcB3Oyy1HHnQUF8Ig04+nlGbE21 JWuFNtvICLi4uEREo73uUhETiAagvo/UMDrepILYwMx+Czc89WWC/HZDM+cA4OWSEUii XV4Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OXdOslmS; spf=pass (google.com: domain of linux-kernel+bounces-5966-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-5966-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id a13-20020a0cb34d000000b0067f1b8febe2si10028552qvf.98.2023.12.19.13.22.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Dec 2023 13:22:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-5966-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OXdOslmS; spf=pass (google.com: domain of linux-kernel+bounces-5966-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-5966-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 516181C2529A for ; Tue, 19 Dec 2023 21:22:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F05273EA95; Tue, 19 Dec 2023 21:21:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="OXdOslmS" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DA3D03B795; Tue, 19 Dec 2023 21:21:33 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CE7C7C433CB; Tue, 19 Dec 2023 21:21:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1703020893; bh=/6Du62khS6+mPSPQl4NojRywrcNucj3y1bs+UHh2N8s=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=OXdOslmSRGeSw/+OMUsivb/kKzI+9FouykNEE4GpU/0ODqi3Fwu+flD6SvKib0Wxt MjB5ErEmP5FlpAPBuwKVtfX5aOnbRxeyppFwWh7WjzLcxiwgiaSgwV/s8aS8zW1TKd lp2TZDj6XYAX6k1IYba7rcVmHdPr01IopVM+WUNdoaCxnRveIuUFGDpmmflm7/RC6Q zXukACwOe++PuEcJks89O39FxzxnMs4wu2TQdoNH/yHeawegU9VUNmk/LGZRw7eHSQ eOXlI3sYUN2Si5oEkPFXmfOcaG2Otz8YqO5IrupiTpHEsMz9n+t4TAd0iGaSLFCccK nYdILJ+G3PWaA== From: Mark Brown Date: Tue, 19 Dec 2023 21:21:19 +0000 Subject: [PATCH 1/2] kselftest/seccomp: Use kselftest output functions for benchmark Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20231219-b4-kselftest-seccomp-benchmark-ktap-v1-1-f99e228631b0@kernel.org> References: <20231219-b4-kselftest-seccomp-benchmark-ktap-v1-0-f99e228631b0@kernel.org> In-Reply-To: <20231219-b4-kselftest-seccomp-benchmark-ktap-v1-0-f99e228631b0@kernel.org> To: Kees Cook , Andy Lutomirski , Will Drewry , Shuah Khan Cc: linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown X-Mailer: b4 0.13-dev-5c066 X-Developer-Signature: v=1; a=openpgp-sha256; l=6298; i=broonie@kernel.org; h=from:subject:message-id; bh=/6Du62khS6+mPSPQl4NojRywrcNucj3y1bs+UHh2N8s=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBlgglY3Xqud3QDQGsOnu6Bl17eNqabR/vKtLwyr5JZ uRGIzIeJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZYIJWAAKCRAk1otyXVSH0NSjB/ 9gD1x2kzPfLXrhhQNuWZ+Okq9MOR363rrV1tgbPP/4y6f84snqLvjABf5o2wTYSg6euIuuhcNUbYXH c314rrtmK+sVHptDlndr+pbYWZGZlsznLGOLo8rerX18RfQKsPykt04XlMigV00/DfUsSCIXdAnOev eeVqd1L/XVdbYwjNCqzZjLMWqgpoMQqkCJMS8BEmy+kGXh5PWJpO9XixtllYRpYRJpP4n8xreqtHgO homNQrHpG5fNtqqKCBEcYUf6UUtxjxTQFZMT6v2YyWjYf4+hOp+MsnVfhJjJe0jm/Vt1PDJ6ddE6Ed 0TtQEsx/kljB6lv/Hre3MQOgt7mf/u X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1785746906482553028 X-GMAIL-MSGID: 1785746906482553028 In preparation for trying to output the test results themselves in TAP format rework all the prints in the benchmark to use the kselftest output functions. The uses of system() all produce single line output so we can avoid having to deal with fully managing the child process and continue to use system() by simply printing an empty message before we invoke system(). We also leave one printf() used to complete a line of output in place. Signed-off-by: Mark Brown --- .../testing/selftests/seccomp/seccomp_benchmark.c | 45 ++++++++++++---------- 1 file changed, 24 insertions(+), 21 deletions(-) diff --git a/tools/testing/selftests/seccomp/seccomp_benchmark.c b/tools/testing/selftests/seccomp/seccomp_benchmark.c index 5b5c9d558dee..93168dd2c1e3 100644 --- a/tools/testing/selftests/seccomp/seccomp_benchmark.c +++ b/tools/testing/selftests/seccomp/seccomp_benchmark.c @@ -38,10 +38,10 @@ unsigned long long timing(clockid_t clk_id, unsigned long long samples) i *= 1000000000ULL; i += finish.tv_nsec - start.tv_nsec; - printf("%lu.%09lu - %lu.%09lu = %llu (%.1fs)\n", - finish.tv_sec, finish.tv_nsec, - start.tv_sec, start.tv_nsec, - i, (double)i / 1000000000.0); + ksft_print_msg("%lu.%09lu - %lu.%09lu = %llu (%.1fs)\n", + finish.tv_sec, finish.tv_nsec, + start.tv_sec, start.tv_nsec, + i, (double)i / 1000000000.0); return i; } @@ -53,7 +53,7 @@ unsigned long long calibrate(void) pid_t pid, ret; int seconds = 15; - printf("Calibrating sample size for %d seconds worth of syscalls ...\n", seconds); + ksft_print_msg("Calibrating sample size for %d seconds worth of syscalls ...\n", seconds); samples = 0; pid = getpid(); @@ -102,14 +102,14 @@ long compare(const char *name_one, const char *name_eval, const char *name_two, { bool good; - printf("\t%s %s %s (%lld %s %lld): ", name_one, name_eval, name_two, - (long long)one, name_eval, (long long)two); + ksft_print_msg("\t%s %s %s (%lld %s %lld): ", name_one, name_eval, name_two, + (long long)one, name_eval, (long long)two); if (one > INT_MAX) { - printf("Miscalculation! Measurement went negative: %lld\n", (long long)one); + ksft_print_msg("Miscalculation! Measurement went negative: %lld\n", (long long)one); return 1; } if (two > INT_MAX) { - printf("Miscalculation! Measurement went negative: %lld\n", (long long)two); + ksft_print_msg("Miscalculation! Measurement went negative: %lld\n", (long long)two); return 1; } @@ -145,12 +145,15 @@ int main(int argc, char *argv[]) setbuf(stdout, NULL); - printf("Running on:\n"); + ksft_print_msg("Running on:\n"); + ksft_print_msg(""); system("uname -a"); - printf("Current BPF sysctl settings:\n"); + ksft_print_msg("Current BPF sysctl settings:\n"); /* Avoid using "sysctl" which may not be installed. */ + ksft_print_msg(""); system("grep -H . /proc/sys/net/core/bpf_jit_enable"); + ksft_print_msg(""); system("grep -H . /proc/sys/net/core/bpf_jit_harden"); if (argc > 1) @@ -158,11 +161,11 @@ int main(int argc, char *argv[]) else samples = calibrate(); - printf("Benchmarking %llu syscalls...\n", samples); + ksft_print_msg("Benchmarking %llu syscalls...\n", samples); /* Native call */ native = timing(CLOCK_PROCESS_CPUTIME_ID, samples) / samples; - printf("getpid native: %llu ns\n", native); + ksft_print_msg("getpid native: %llu ns\n", native); ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); assert(ret == 0); @@ -172,33 +175,33 @@ int main(int argc, char *argv[]) assert(ret == 0); bitmap1 = timing(CLOCK_PROCESS_CPUTIME_ID, samples) / samples; - printf("getpid RET_ALLOW 1 filter (bitmap): %llu ns\n", bitmap1); + ksft_print_msg("getpid RET_ALLOW 1 filter (bitmap): %llu ns\n", bitmap1); /* Second filter resulting in a bitmap */ ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); assert(ret == 0); bitmap2 = timing(CLOCK_PROCESS_CPUTIME_ID, samples) / samples; - printf("getpid RET_ALLOW 2 filters (bitmap): %llu ns\n", bitmap2); + ksft_print_msg("getpid RET_ALLOW 2 filters (bitmap): %llu ns\n", bitmap2); /* Third filter, can no longer be converted to bitmap */ ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); assert(ret == 0); filter1 = timing(CLOCK_PROCESS_CPUTIME_ID, samples) / samples; - printf("getpid RET_ALLOW 3 filters (full): %llu ns\n", filter1); + ksft_print_msg("getpid RET_ALLOW 3 filters (full): %llu ns\n", filter1); /* Fourth filter, can not be converted to bitmap because of filter 3 */ ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); assert(ret == 0); filter2 = timing(CLOCK_PROCESS_CPUTIME_ID, samples) / samples; - printf("getpid RET_ALLOW 4 filters (full): %llu ns\n", filter2); + ksft_print_msg("getpid RET_ALLOW 4 filters (full): %llu ns\n", filter2); /* Estimations */ #define ESTIMATE(fmt, var, what) do { \ var = (what); \ - printf("Estimated " fmt ": %llu ns\n", var); \ + ksft_print_msg("Estimated " fmt ": %llu ns\n", var); \ if (var > INT_MAX) \ goto more_samples; \ } while (0) @@ -218,7 +221,7 @@ int main(int argc, char *argv[]) ESTIMATE("seccomp per-filter overhead (filters / 4)", per_filter2, (filter2 - native - entry) / 4); - printf("Expectations:\n"); + ksft_print_msg("Expectations:\n"); ret |= compare("native", "≤", "1 bitmap", native, le, bitmap1); bits = compare("native", "≤", "1 filter", native, le, filter1); if (bits) @@ -230,7 +233,7 @@ int main(int argc, char *argv[]) bits = compare("1 bitmapped", "≈", "2 bitmapped", bitmap1 - native, approx, bitmap2 - native); if (bits) { - printf("Skipping constant action bitmap expectations: they appear unsupported.\n"); + ksft_print_msg("Skipping constant action bitmap expectations: they appear unsupported.\n"); goto out; } @@ -242,7 +245,7 @@ int main(int argc, char *argv[]) goto out; more_samples: - printf("Saw unexpected benchmark result. Try running again with more samples?\n"); + ksft_print_msg("Saw unexpected benchmark result. Try running again with more samples?\n"); out: return 0; }