xref: /linux/tools/testing/selftests/bpf/testing_helpers.c (revision 3d5ad2d4eca337e80f38df77de89614aa5aaceb9)
1 // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
2 /* Copyright (C) 2019 Netronome Systems, Inc. */
3 /* Copyright (C) 2020 Facebook, Inc. */
4 #include <ctype.h>
5 #include <stdlib.h>
6 #include <string.h>
7 #include <errno.h>
8 #include <bpf/bpf.h>
9 #include <bpf/libbpf.h>
10 #include "disasm.h"
11 #include "test_progs.h"
12 #include "testing_helpers.h"
13 #include <linux/membarrier.h>
14 
parse_num_list(const char * s,bool ** num_set,int * num_set_len)15 int parse_num_list(const char *s, bool **num_set, int *num_set_len)
16 {
17 	int i, set_len = 0, new_len, num, start = 0, end = -1;
18 	bool *set = NULL, *tmp, parsing_end = false;
19 	char *next;
20 
21 	while (s[0]) {
22 		errno = 0;
23 		num = strtol(s, &next, 10);
24 		if (errno)
25 			return -errno;
26 
27 		if (parsing_end)
28 			end = num;
29 		else
30 			start = num;
31 
32 		if (!parsing_end && *next == '-') {
33 			s = next + 1;
34 			parsing_end = true;
35 			continue;
36 		} else if (*next == ',') {
37 			parsing_end = false;
38 			s = next + 1;
39 			end = num;
40 		} else if (*next == '\0') {
41 			parsing_end = false;
42 			s = next;
43 			end = num;
44 		} else {
45 			return -EINVAL;
46 		}
47 
48 		if (start > end)
49 			return -EINVAL;
50 
51 		if (end + 1 > set_len) {
52 			new_len = end + 1;
53 			tmp = realloc(set, new_len);
54 			if (!tmp) {
55 				free(set);
56 				return -ENOMEM;
57 			}
58 			for (i = set_len; i < start; i++)
59 				tmp[i] = false;
60 			set = tmp;
61 			set_len = new_len;
62 		}
63 		for (i = start; i <= end; i++)
64 			set[i] = true;
65 	}
66 
67 	if (!set || parsing_end)
68 		return -EINVAL;
69 
70 	*num_set = set;
71 	*num_set_len = set_len;
72 
73 	return 0;
74 }
75 
do_insert_test(struct test_filter_set * set,char * test_str,char * subtest_str)76 static int do_insert_test(struct test_filter_set *set,
77 			  char *test_str,
78 			  char *subtest_str)
79 {
80 	struct test_filter *tmp, *test;
81 	char **ctmp;
82 	int i;
83 
84 	for (i = 0; i < set->cnt; i++) {
85 		test = &set->tests[i];
86 
87 		if (strcmp(test_str, test->name) == 0) {
88 			free(test_str);
89 			goto subtest;
90 		}
91 	}
92 
93 	tmp = realloc(set->tests, sizeof(*test) * (set->cnt + 1));
94 	if (!tmp)
95 		return -ENOMEM;
96 
97 	set->tests = tmp;
98 	test = &set->tests[set->cnt];
99 
100 	test->name = test_str;
101 	test->subtests = NULL;
102 	test->subtest_cnt = 0;
103 
104 	set->cnt++;
105 
106 subtest:
107 	if (!subtest_str)
108 		return 0;
109 
110 	for (i = 0; i < test->subtest_cnt; i++) {
111 		if (strcmp(subtest_str, test->subtests[i]) == 0) {
112 			free(subtest_str);
113 			return 0;
114 		}
115 	}
116 
117 	ctmp = realloc(test->subtests,
118 		       sizeof(*test->subtests) * (test->subtest_cnt + 1));
119 	if (!ctmp)
120 		return -ENOMEM;
121 
122 	test->subtests = ctmp;
123 	test->subtests[test->subtest_cnt] = subtest_str;
124 
125 	test->subtest_cnt++;
126 
127 	return 0;
128 }
129 
insert_test(struct test_filter_set * set,char * test_spec,bool is_glob_pattern)130 static int insert_test(struct test_filter_set *set,
131 		       char *test_spec,
132 		       bool is_glob_pattern)
133 {
134 	char *pattern, *subtest_str, *ext_test_str, *ext_subtest_str = NULL;
135 	int glob_chars = 0;
136 
137 	if (is_glob_pattern) {
138 		pattern = "%s";
139 	} else {
140 		pattern = "*%s*";
141 		glob_chars = 2;
142 	}
143 
144 	subtest_str = strchr(test_spec, '/');
145 	if (subtest_str) {
146 		*subtest_str = '\0';
147 		subtest_str += 1;
148 	}
149 
150 	ext_test_str = malloc(strlen(test_spec) + glob_chars + 1);
151 	if (!ext_test_str)
152 		goto err;
153 
154 	sprintf(ext_test_str, pattern, test_spec);
155 
156 	if (subtest_str) {
157 		ext_subtest_str = malloc(strlen(subtest_str) + glob_chars + 1);
158 		if (!ext_subtest_str)
159 			goto err;
160 
161 		sprintf(ext_subtest_str, pattern, subtest_str);
162 	}
163 
164 	return do_insert_test(set, ext_test_str, ext_subtest_str);
165 
166 err:
167 	free(ext_test_str);
168 	free(ext_subtest_str);
169 
170 	return -ENOMEM;
171 }
172 
parse_test_list_file(const char * path,struct test_filter_set * set,bool is_glob_pattern)173 int parse_test_list_file(const char *path,
174 			 struct test_filter_set *set,
175 			 bool is_glob_pattern)
176 {
177 	char *buf = NULL, *capture_start, *capture_end, *scan_end;
178 	size_t buflen = 0;
179 	int err = 0;
180 	FILE *f;
181 
182 	f = fopen(path, "r");
183 	if (!f) {
184 		err = -errno;
185 		fprintf(stderr, "Failed to open '%s': %d\n", path, err);
186 		return err;
187 	}
188 
189 	while (getline(&buf, &buflen, f) != -1) {
190 		capture_start = buf;
191 
192 		while (isspace(*capture_start))
193 			++capture_start;
194 
195 		capture_end = capture_start;
196 		scan_end = capture_start;
197 
198 		while (*scan_end && *scan_end != '#') {
199 			if (!isspace(*scan_end))
200 				capture_end = scan_end;
201 
202 			++scan_end;
203 		}
204 
205 		if (capture_end == capture_start)
206 			continue;
207 
208 		*(++capture_end) = '\0';
209 
210 		err = insert_test(set, capture_start, is_glob_pattern);
211 		if (err)
212 			break;
213 	}
214 
215 	fclose(f);
216 	return err;
217 }
218 
parse_test_list(const char * s,struct test_filter_set * set,bool is_glob_pattern)219 int parse_test_list(const char *s,
220 		    struct test_filter_set *set,
221 		    bool is_glob_pattern)
222 {
223 	char *input, *state = NULL, *test_spec;
224 	int err = 0, cnt = 0;
225 
226 	input = strdup(s);
227 	if (!input)
228 		return -ENOMEM;
229 
230 	while ((test_spec = strtok_r(cnt++ ? NULL : input, ",", &state))) {
231 		err = insert_test(set, test_spec, is_glob_pattern);
232 		if (err)
233 			break;
234 	}
235 
236 	free(input);
237 	return err;
238 }
239 
link_info_prog_id(const struct bpf_link * link,struct bpf_link_info * info)240 __u32 link_info_prog_id(const struct bpf_link *link, struct bpf_link_info *info)
241 {
242 	__u32 info_len = sizeof(*info);
243 	int err;
244 
245 	memset(info, 0, sizeof(*info));
246 	err = bpf_link_get_info_by_fd(bpf_link__fd(link), info, &info_len);
247 	if (err) {
248 		printf("failed to get link info: %d\n", -errno);
249 		return 0;
250 	}
251 	return info->prog_id;
252 }
253 
254 int extra_prog_load_log_flags = 0;
255 
testing_prog_flags(void)256 int testing_prog_flags(void)
257 {
258 	static int cached_flags = -1;
259 	static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS };
260 	static struct bpf_insn insns[] = {
261 		BPF_MOV64_IMM(BPF_REG_0, 0),
262 		BPF_EXIT_INSN(),
263 	};
264 	int insn_cnt = ARRAY_SIZE(insns), i, fd, flags = 0;
265 	LIBBPF_OPTS(bpf_prog_load_opts, opts);
266 
267 	if (cached_flags >= 0)
268 		return cached_flags;
269 
270 	for (i = 0; i < ARRAY_SIZE(prog_flags); i++) {
271 		opts.prog_flags = prog_flags[i];
272 		fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "flag-test", "GPL",
273 				   insns, insn_cnt, &opts);
274 		if (fd >= 0) {
275 			flags |= prog_flags[i];
276 			close(fd);
277 		}
278 	}
279 
280 	cached_flags = flags;
281 	return cached_flags;
282 }
283 
bpf_prog_test_load(const char * file,enum bpf_prog_type type,struct bpf_object ** pobj,int * prog_fd)284 int bpf_prog_test_load(const char *file, enum bpf_prog_type type,
285 		       struct bpf_object **pobj, int *prog_fd)
286 {
287 	LIBBPF_OPTS(bpf_object_open_opts, opts,
288 		.kernel_log_level = extra_prog_load_log_flags,
289 	);
290 	struct bpf_object *obj;
291 	struct bpf_program *prog;
292 	__u32 flags;
293 	int err;
294 
295 	obj = bpf_object__open_file(file, &opts);
296 	if (!obj)
297 		return -errno;
298 
299 	prog = bpf_object__next_program(obj, NULL);
300 	if (!prog) {
301 		err = -ENOENT;
302 		goto err_out;
303 	}
304 
305 	if (type != BPF_PROG_TYPE_UNSPEC && bpf_program__type(prog) != type)
306 		bpf_program__set_type(prog, type);
307 
308 	flags = bpf_program__flags(prog) | testing_prog_flags();
309 	bpf_program__set_flags(prog, flags);
310 
311 	err = bpf_object__load(obj);
312 	if (err)
313 		goto err_out;
314 
315 	*pobj = obj;
316 	*prog_fd = bpf_program__fd(prog);
317 
318 	return 0;
319 err_out:
320 	bpf_object__close(obj);
321 	return err;
322 }
323 
bpf_test_load_program(enum bpf_prog_type type,const struct bpf_insn * insns,size_t insns_cnt,const char * license,__u32 kern_version,char * log_buf,size_t log_buf_sz)324 int bpf_test_load_program(enum bpf_prog_type type, const struct bpf_insn *insns,
325 			  size_t insns_cnt, const char *license,
326 			  __u32 kern_version, char *log_buf,
327 			  size_t log_buf_sz)
328 {
329 	LIBBPF_OPTS(bpf_prog_load_opts, opts,
330 		.kern_version = kern_version,
331 		.prog_flags = testing_prog_flags(),
332 		.log_level = extra_prog_load_log_flags,
333 		.log_buf = log_buf,
334 		.log_size = log_buf_sz,
335 	);
336 
337 	return bpf_prog_load(type, NULL, license, insns, insns_cnt, &opts);
338 }
339 
read_perf_max_sample_freq(void)340 __u64 read_perf_max_sample_freq(void)
341 {
342 	__u64 sample_freq = 5000; /* fallback to 5000 on error */
343 	FILE *f;
344 
345 	f = fopen("/proc/sys/kernel/perf_event_max_sample_rate", "r");
346 	if (f == NULL) {
347 		printf("Failed to open /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
348 		       "return default value: 5000\n", -errno);
349 		return sample_freq;
350 	}
351 	if (fscanf(f, "%llu", &sample_freq) != 1) {
352 		printf("Failed to parse /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
353 		       "return default value: 5000\n", -errno);
354 	}
355 
356 	fclose(f);
357 	return sample_freq;
358 }
359 
finit_module(int fd,const char * param_values,int flags)360 int finit_module(int fd, const char *param_values, int flags)
361 {
362 	return syscall(__NR_finit_module, fd, param_values, flags);
363 }
364 
delete_module(const char * name,int flags)365 int delete_module(const char *name, int flags)
366 {
367 	return syscall(__NR_delete_module, name, flags);
368 }
369 
unload_module(const char * name,bool verbose)370 int unload_module(const char *name, bool verbose)
371 {
372 	int ret, cnt = 0;
373 
374 	if (kern_sync_rcu())
375 		fprintf(stdout, "Failed to trigger kernel-side RCU sync!\n");
376 
377 	for (;;) {
378 		ret = delete_module(name, 0);
379 		if (!ret || errno != EAGAIN)
380 			break;
381 		if (++cnt > 10000) {
382 			fprintf(stdout, "Unload of %s timed out\n", name);
383 			break;
384 		}
385 		usleep(100);
386 	}
387 
388 	if (ret) {
389 		if (errno == ENOENT) {
390 			if (verbose)
391 				fprintf(stdout, "%s.ko is already unloaded.\n", name);
392 			return -1;
393 		}
394 		fprintf(stdout, "Failed to unload %s.ko from kernel: %d\n", name, -errno);
395 		return -1;
396 	}
397 	if (verbose)
398 		fprintf(stdout, "Successfully unloaded %s.ko.\n", name);
399 	return 0;
400 }
401 
load_module(const char * path,bool verbose)402 int load_module(const char *path, bool verbose)
403 {
404 	int fd;
405 
406 	if (verbose)
407 		fprintf(stdout, "Loading %s...\n", path);
408 
409 	fd = open(path, O_RDONLY);
410 	if (fd < 0) {
411 		fprintf(stdout, "Can't find %s kernel module: %d\n", path, -errno);
412 		return -ENOENT;
413 	}
414 	if (finit_module(fd, "", 0)) {
415 		fprintf(stdout, "Failed to load %s into the kernel: %d\n", path, -errno);
416 		close(fd);
417 		return -EINVAL;
418 	}
419 	close(fd);
420 
421 	if (verbose)
422 		fprintf(stdout, "Successfully loaded %s.\n", path);
423 	return 0;
424 }
425 
unload_bpf_testmod(bool verbose)426 int unload_bpf_testmod(bool verbose)
427 {
428 	return unload_module("bpf_testmod", verbose);
429 }
430 
load_bpf_testmod(bool verbose)431 int load_bpf_testmod(bool verbose)
432 {
433 	return load_module("bpf_testmod.ko", verbose);
434 }
435 
436 /*
437  * Trigger synchronize_rcu() in kernel.
438  */
kern_sync_rcu(void)439 int kern_sync_rcu(void)
440 {
441 	return syscall(__NR_membarrier, MEMBARRIER_CMD_SHARED, 0, 0);
442 }
443 
get_xlated_program(int fd_prog,struct bpf_insn ** buf,__u32 * cnt)444 int get_xlated_program(int fd_prog, struct bpf_insn **buf, __u32 *cnt)
445 {
446 	__u32 buf_element_size = sizeof(struct bpf_insn);
447 	struct bpf_prog_info info = {};
448 	__u32 info_len = sizeof(info);
449 	__u32 xlated_prog_len;
450 
451 	if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
452 		perror("bpf_prog_get_info_by_fd failed");
453 		return -1;
454 	}
455 
456 	xlated_prog_len = info.xlated_prog_len;
457 	if (xlated_prog_len % buf_element_size) {
458 		printf("Program length %u is not multiple of %u\n",
459 		       xlated_prog_len, buf_element_size);
460 		return -1;
461 	}
462 
463 	*cnt = xlated_prog_len / buf_element_size;
464 	*buf = calloc(*cnt, buf_element_size);
465 	if (!*buf) {
466 		perror("can't allocate xlated program buffer");
467 		return -ENOMEM;
468 	}
469 
470 	bzero(&info, sizeof(info));
471 	info.xlated_prog_len = xlated_prog_len;
472 	info.xlated_prog_insns = (__u64)(unsigned long)*buf;
473 	if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
474 		perror("second bpf_prog_get_info_by_fd failed");
475 		goto out_free_buf;
476 	}
477 
478 	return 0;
479 
480 out_free_buf:
481 	free(*buf);
482 	*buf = NULL;
483 	return -1;
484 }
485 
is_jit_enabled(void)486 bool is_jit_enabled(void)
487 {
488 	const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable";
489 	bool enabled = false;
490 	int sysctl_fd;
491 
492 	sysctl_fd = open(jit_sysctl, O_RDONLY);
493 	if (sysctl_fd != -1) {
494 		char tmpc;
495 
496 		if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1)
497 			enabled = (tmpc != '0');
498 		close(sysctl_fd);
499 	}
500 
501 	return enabled;
502 }
503