lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230727113251.15f538ab@ky>
Date:   Thu, 27 Jul 2023 11:32:51 +0800
From:   <guodongtai@...inos.cn>
To:     Nicolas Schier <nicolas@...sle.eu>
Cc:     masahiroy@...nel.org, ndesaulniers@...gle.com, nathan@...nel.org,
        linux-kbuild@...r.kernel.org, linux-kernel@...r.kernel.org,
        bpf@...r.kernel.org
Subject: Re: [PATCH] samples/bpf: Update sockex2: get the expected output
 results

On Wed, 26 Jul 2023 23:22:49 +0200
Nicolas Schier <nicolas@...sle.eu> wrote:

> On Wed, Jul 26, 2023 at 03:09:55PM +0800 George Guo wrote:
> > Running "ping -4 -c5 localhost" only shows 4 times prints not 5:
> > 
> > $ sudo ./samples/bpf/sockex2
> > ip 127.0.0.1 bytes 392 packets 4
> > ip 127.0.0.1 bytes 784 packets 8
> > ip 127.0.0.1 bytes 1176 packets 12
> > ip 127.0.0.1 bytes 1568 packets 16
> > 
> > debug it with num prints:
> > $ sudo ./samples/bpf/sockex2
> > num = 1: ip 127.0.0.1 bytes 392 packets 4
> > num = 2: ip 127.0.0.1 bytes 784 packets 8
> > num = 3: ip 127.0.0.1 bytes 1176 packets 12
> > num = 4: ip 127.0.0.1 bytes 1568 packets 16
> > 
> > The reason is that we check it faster, just put sleep(1) before
> > check while(bpf_map_get_next_key(map_fd, &key, &next_key) == 0).
> > Now we get the expected results:
> > 
> > $ sudo ./samples/bpf/sockex2
> > num = 0: ip 127.0.0.1 bytes 392 packets 4
> > num = 1: ip 127.0.0.1 bytes 784 packets 8
> > num = 2: ip 127.0.0.1 bytes 1176 packets 12
> > num = 3: ip 127.0.0.1 bytes 1568 packets 16
> > num = 4: ip 127.0.0.1 bytes 1960 packets 20
> > 
> > Signed-off-by: George Guo <guodongtai@...inos.cn>
> > ---  
> 
> Thanks, sounds reasonable to me (but I haven't checked it).  Might
> you want to minimize the diff to only contain the move of the sleep
> call?
> 
> Kind regards,
> Nicolas
> 
> 
> >  samples/bpf/sockex2_user.c | 13 +++++++------
> >  1 file changed, 7 insertions(+), 6 deletions(-)
> > 
> > diff --git a/samples/bpf/sockex2_user.c b/samples/bpf/sockex2_user.c
> > index 2c18471336f0..84bf1ab77649 100644
> > --- a/samples/bpf/sockex2_user.c
> > +++ b/samples/bpf/sockex2_user.c
> > @@ -18,8 +18,8 @@ int main(int ac, char **argv)
> >  	struct bpf_program *prog;
> >  	struct bpf_object *obj;
> >  	int map_fd, prog_fd;
> > -	char filename[256];
> > -	int i, sock, err;
> > +	char filename[256], command[64];
> > +	int i, sock, err, num = 5;
> >  	FILE *f;
> >  
> >  	snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
> > @@ -42,21 +42,22 @@ int main(int ac, char **argv)
> >  	assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF,
> > &prog_fd, sizeof(prog_fd)) == 0);
> >  
> > -	f = popen("ping -4 -c5 localhost", "r");
> > +	snprintf(command, sizeof(command), "ping -4 -c%d
> > localhost", num);
> > +	f = popen(command, "r");
> >  	(void) f;
> >  
> > -	for (i = 0; i < 5; i++) {
> > +	for (i = 0; i < num; i++) {
> >  		int key = 0, next_key;
> >  		struct pair value;
> >  
> > +		sleep(1);
> >  		while (bpf_map_get_next_key(map_fd, &key,
> > &next_key) == 0) { bpf_map_lookup_elem(map_fd, &next_key, &value);
> > -			printf("ip %s bytes %lld packets %lld\n",
> > +			printf("num = %d: ip %s bytes %lld packets
> > %lld\n", i, inet_ntoa((struct in_addr){htonl(next_key)}),
> >  			       value.bytes, value.packets);
> >  			key = next_key;
> >  		}
> > -		sleep(1);
> >  	}
> >  	return 0;
> >  }
> > -- 
> > 2.34.1  
> 

hi,

the diff to only contain the move of the sleep call likes this:


diff --git a/samples/bpf/sockex2_user.c b/samples/bpf/sockex2_user.c
index 2c18471336f0..82bb38b9cab0 100644
--- a/samples/bpf/sockex2_user.c
+++ b/samples/bpf/sockex2_user.c
@@ -49,6 +49,7 @@ int main(int ac, char **argv)
                int key = 0, next_key;
                struct pair value;
 
+               sleep(1);
                while (bpf_map_get_next_key(map_fd, &key, &next_key) ==
0) { bpf_map_lookup_elem(map_fd, &next_key, &value);
                        printf("ip %s bytes %lld packets %lld\n",
@@ -56,7 +57,6 @@ int main(int ac, char **argv)
                               value.bytes, value.packets);
                        key = next_key;
                }
-               sleep(1);
        }
        return 0;
 }

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ