> Am 07.11.2019 um 00:07 schrieb Daniel Borkmann <daniel@xxxxxxxxxxxxx>: > > On 11/6/19 5:50 PM, John Fastabend wrote: >> Ilya Leoshkevich wrote: >>>> Am 06.11.2019 um 17:15 schrieb Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>: >>>> On Wed, Nov 6, 2019 at 8:12 AM Ilya Leoshkevich <iii@xxxxxxxxxxxxx> wrote: >>>>> >>>>> Currently it's not possible to set bpf_jit_enable = 2 when >>>>> CONFIG_BPF_JIT_ALWAYS_ON is set, which makes debugging certain problems >>>>> harder. >>>> >>>> This is obsolete way of debugging. >>>> Please use bpftool dump jited instead. >>> >>> Is there a way to integrate bpftool nicely with e.g. test_verifier? >>> With bpf_jit_enable = 2, I can see JITed code for each test right away, >>> without pausing it (via gdb or rebuilding with added sleep()) and >>> running bpftool. >> On the library side we can set the log_level causing the verifier logic >> steps to be printed. I guess adding it to bpftool might be nice. At least >> I would find it useful. I'll probably get to it sometime if its not >> already there somewhere and/or someone doesn't beat me to it. > > +1 > > Was wondering whether it may be worth it moving parts of the logic from bpftool > into libbpf wrt jit dump as a higher level api, so it could be used directly for > checking out the jit disasm + opcodes for specific tests given we have the fd > there as well, but that might be too specific perhaps and would bring one more > lib dependency to libbpf for a rather narrow use case. Adding sleep before prog > fd close and/or shelling out to bpftool etc all is a crude temporary hack as > well (currently using something long these lines locally). Would it make sense > to dump some meta data and generated opcodes per test case to a file as opt-in > e.g. ./test_verifier 711 --dump produces 711.opcodes out of bpf_obj_get_info_by_fd() > which then bpftool could dump this artifact through its own disasm? > > Thanks, > Daniel Yes, this sounds fine - if the test fails or behaves strangely, I won't have to re-run it using a special setup, but rather just disasm the dumped JITted image (maybe even without bpftool, just with objdump). Another question though: what about seccomp? It looks as if those programs are not shown by bpftool, since they are not created using bpf syscall. Best regards, Ilya