// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) /* Copyright (C) 2019 Netronome Systems, Inc. */ /* Copyright (C) 2020 Facebook, Inc. */ #include #include #include #include #include #include #include "test_progs.h" #include "testing_helpers.h" #include int parse_num_list(const char *s, bool **num_set, int *num_set_len) { int i, set_len = 0, new_len, num, start = 0, end = -1; bool *set = NULL, *tmp, parsing_end = false; char *next; while (s[0]) { errno = 0; num = strtol(s, &next, 10); if (errno) return -errno; if (parsing_end) end = num; else start = num; if (!parsing_end && *next == '-') { s = next + 1; parsing_end = true; continue; } else if (*next == ',') { parsing_end = false; s = next + 1; end = num; } else if (*next == '\0') { parsing_end = false; s = next; end = num; } else { return -EINVAL; } if (start > end) return -EINVAL; if (end + 1 > set_len) { new_len = end + 1; tmp = realloc(set, new_len); if (!tmp) { free(set); return -ENOMEM; } for (i = set_len; i < start; i++) tmp[i] = false; set = tmp; set_len = new_len; } for (i = start; i <= end; i++) set[i] = true; } if (!set || parsing_end) return -EINVAL; *num_set = set; *num_set_len = set_len; return 0; } static int do_insert_test(struct test_filter_set *set, char *test_str, char *subtest_str) { struct test_filter *tmp, *test; char **ctmp; int i; for (i = 0; i < set->cnt; i++) { test = &set->tests[i]; if (strcmp(test_str, test->name) == 0) { free(test_str); goto subtest; } } tmp = realloc(set->tests, sizeof(*test) * (set->cnt + 1)); if (!tmp) return -ENOMEM; set->tests = tmp; test = &set->tests[set->cnt]; test->name = test_str; test->subtests = NULL; test->subtest_cnt = 0; set->cnt++; subtest: if (!subtest_str) return 0; for (i = 0; i < test->subtest_cnt; i++) { if (strcmp(subtest_str, test->subtests[i]) == 0) { free(subtest_str); return 0; } } ctmp = realloc(test->subtests, sizeof(*test->subtests) * (test->subtest_cnt + 1)); if (!ctmp) return -ENOMEM; test->subtests = ctmp; test->subtests[test->subtest_cnt] = subtest_str; test->subtest_cnt++; return 0; } static int insert_test(struct test_filter_set *set, char *test_spec, bool is_glob_pattern) { char *pattern, *subtest_str, *ext_test_str, *ext_subtest_str = NULL; int glob_chars = 0; if (is_glob_pattern) { pattern = "%s"; } else { pattern = "*%s*"; glob_chars = 2; } subtest_str = strchr(test_spec, '/'); if (subtest_str) { *subtest_str = '\0'; subtest_str += 1; } ext_test_str = malloc(strlen(test_spec) + glob_chars + 1); if (!ext_test_str) goto err; sprintf(ext_test_str, pattern, test_spec); if (subtest_str) { ext_subtest_str = malloc(strlen(subtest_str) + glob_chars + 1); if (!ext_subtest_str) goto err; sprintf(ext_subtest_str, pattern, subtest_str); } return do_insert_test(set, ext_test_str, ext_subtest_str); err: free(ext_test_str); free(ext_subtest_str); return -ENOMEM; } int parse_test_list_file(const char *path, struct test_filter_set *set, bool is_glob_pattern) { char *buf = NULL, *capture_start, *capture_end, *scan_end; size_t buflen = 0; int err = 0; FILE *f; f = fopen(path, "r"); if (!f) { err = -errno; fprintf(stderr, "Failed to open '%s': %d\n", path, err); return err; } while (getline(&buf, &buflen, f) != -1) { capture_start = buf; while (isspace(*capture_start)) ++capture_start; capture_end = capture_start; scan_end = capture_start; while (*scan_end && *scan_end != '#') { if (!isspace(*scan_end)) capture_end = scan_end; ++scan_end; } if (capture_end == capture_start) continue; *(++capture_end) = '\0'; err = insert_test(set, capture_start, is_glob_pattern); if (err) break; } fclose(f); return err; } int parse_test_list(const char *s, struct test_filter_set *set, bool is_glob_pattern) { char *input, *state = NULL, *test_spec; int err = 0; input = strdup(s); if (!input) return -ENOMEM; while ((test_spec = strtok_r(state ? NULL : input, ",", &state))) { err = insert_test(set, test_spec, is_glob_pattern); if (err) break; } free(input); return err; } __u32 link_info_prog_id(const struct bpf_link *link, struct bpf_link_info *info) { __u32 info_len = sizeof(*info); int err; memset(info, 0, sizeof(*info)); err = bpf_link_get_info_by_fd(bpf_link__fd(link), info, &info_len); if (err) { printf("failed to get link info: %d\n", -errno); return 0; } return info->prog_id; } int extra_prog_load_log_flags = 0; int testing_prog_flags(void) { static int cached_flags = -1; static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS }; static struct bpf_insn insns[] = { BPF_MOV64_IMM(BPF_REG_0, 0), BPF_EXIT_INSN(), }; int insn_cnt = ARRAY_SIZE(insns), i, fd, flags = 0; LIBBPF_OPTS(bpf_prog_load_opts, opts); if (cached_flags >= 0) return cached_flags; for (i = 0; i < ARRAY_SIZE(prog_flags); i++) { opts.prog_flags = prog_flags[i]; fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "flag-test", "GPL", insns, insn_cnt, &opts); if (fd >= 0) { flags |= prog_flags[i]; close(fd); } } cached_flags = flags; return cached_flags; } int bpf_prog_test_load(const char *file, enum bpf_prog_type type, struct bpf_object **pobj, int *prog_fd) { LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_level = extra_prog_load_log_flags, ); struct bpf_object *obj; struct bpf_program *prog; __u32 flags; int err; obj = bpf_object__open_file(file, &opts); if (!obj) return -errno; prog = bpf_object__next_program(obj, NULL); if (!prog) { err = -ENOENT; goto err_out; } if (type != BPF_PROG_TYPE_UNSPEC && bpf_program__type(prog) != type) bpf_program__set_type(prog, type); flags = bpf_program__flags(prog) | testing_prog_flags(); bpf_program__set_flags(prog, flags); err = bpf_object__load(obj); if (err) goto err_out; *pobj = obj; *prog_fd = bpf_program__fd(prog); return 0; err_out: bpf_object__close(obj); return err; } int bpf_test_load_program(enum bpf_prog_type type, const struct bpf_insn *insns, size_t insns_cnt, const char *license, __u32 kern_version, char *log_buf, size_t log_buf_sz) { LIBBPF_OPTS(bpf_prog_load_opts, opts, .kern_version = kern_version, .prog_flags = testing_prog_flags(), .log_level = extra_prog_load_log_flags, .log_buf = log_buf, .log_size = log_buf_sz, ); return bpf_prog_load(type, NULL, license, insns, insns_cnt, &opts); } __u64 read_perf_max_sample_freq(void) { __u64 sample_freq = 5000; /* fallback to 5000 on error */ FILE *f; f = fopen("/proc/sys/kernel/perf_event_max_sample_rate", "r"); if (f == NULL) { printf("Failed to open /proc/sys/kernel/perf_event_max_sample_rate: err %d\n" "return default value: 5000\n", -errno); return sample_freq; } if (fscanf(f, "%llu", &sample_freq) != 1) { printf("Failed to parse /proc/sys/kernel/perf_event_max_sample_rate: err %d\n" "return default value: 5000\n", -errno); } fclose(f); return sample_freq; } int finit_module(int fd, const char *param_values, int flags) { return syscall(__NR_finit_module, fd, param_values, flags); } int delete_module(const char *name, int flags) { return syscall(__NR_delete_module, name, flags); } int unload_bpf_testmod(bool verbose) { if (kern_sync_rcu()) fprintf(stdout, "Failed to trigger kernel-side RCU sync!\n"); if (delete_module("bpf_testmod", 0)) { if (errno == ENOENT) { if (verbose) fprintf(stdout, "bpf_testmod.ko is already unloaded.\n"); return -1; } fprintf(stdout, "Failed to unload bpf_testmod.ko from kernel: %d\n", -errno); return -1; } if (verbose) fprintf(stdout, "Successfully unloaded bpf_testmod.ko.\n"); return 0; } int load_bpf_testmod(bool verbose) { int fd; if (verbose) fprintf(stdout, "Loading bpf_testmod.ko...\n"); fd = open("bpf_testmod.ko", O_RDONLY); if (fd < 0) { fprintf(stdout, "Can't find bpf_testmod.ko kernel module: %d\n", -errno); return -ENOENT; } if (finit_module(fd, "", 0)) { fprintf(stdout, "Failed to load bpf_testmod.ko into the kernel: %d\n", -errno); close(fd); return -EINVAL; } close(fd); if (verbose) fprintf(stdout, "Successfully loaded bpf_testmod.ko.\n"); return 0; } /* * Trigger synchronize_rcu() in kernel. */ int kern_sync_rcu(void) { return syscall(__NR_membarrier, MEMBARRIER_CMD_SHARED, 0, 0); } int get_xlated_program(int fd_prog, struct bpf_insn **buf, __u32 *cnt) { __u32 buf_element_size = sizeof(struct bpf_insn); struct bpf_prog_info info = {}; __u32 info_len = sizeof(info); __u32 xlated_prog_len; if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) { perror("bpf_prog_get_info_by_fd failed"); return -1; } xlated_prog_len = info.xlated_prog_len; if (xlated_prog_len % buf_element_size) { printf("Program length %u is not multiple of %u\n", xlated_prog_len, buf_element_size); return -1; } *cnt = xlated_prog_len / buf_element_size; *buf = calloc(*cnt, buf_element_size); if (!buf) { perror("can't allocate xlated program buffer"); return -ENOMEM; } bzero(&info, sizeof(info)); info.xlated_prog_len = xlated_prog_len; info.xlated_prog_insns = (__u64)(unsigned long)*buf; if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) { perror("second bpf_prog_get_info_by_fd failed"); goto out_free_buf; } return 0; out_free_buf: free(*buf); *buf = NULL; return -1; } bool is_jit_enabled(void) { const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable"; bool enabled = false; int sysctl_fd; sysctl_fd = open(jit_sysctl, O_RDONLY); if (sysctl_fd != -1) { char tmpc; if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1) enabled = (tmpc != '0'); close(sysctl_fd); } return enabled; }