xref: /linux/tools/testing/selftests/bpf/prog_tests/bpf_obj_id.c (revision 4e73826089ce899357580bbf6e0afe4e6f9900b7)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <test_progs.h>
3 
4 #define nr_iters 2
5 
6 void serial_test_bpf_obj_id(void)
7 {
8 	const __u64 array_magic_value = 0xfaceb00c;
9 	const __u32 array_key = 0;
10 	const char *file = "./test_obj_id.bpf.o";
11 	const char *expected_prog_name = "test_obj_id";
12 	const char *expected_map_name = "test_map_id";
13 	const __u64 nsec_per_sec = 1000000000;
14 
15 	struct bpf_object *objs[nr_iters] = {};
16 	struct bpf_link *links[nr_iters] = {};
17 	struct bpf_program *prog;
18 	int prog_fds[nr_iters], map_fds[nr_iters];
19 	/* +1 to test for the info_len returned by kernel */
20 	struct bpf_prog_info prog_infos[nr_iters + 1];
21 	struct bpf_map_info map_infos[nr_iters + 1];
22 	struct bpf_link_info link_infos[nr_iters + 1];
23 	/* Each prog only uses one map. +1 to test nr_map_ids
24 	 * returned by kernel.
25 	 */
26 	__u32 map_ids[nr_iters + 1];
27 	char jited_insns[128], xlated_insns[128], zeros[128], tp_name[128];
28 	__u32 i, next_id, info_len, nr_id_found;
29 	struct timespec real_time_ts, boot_time_ts;
30 	int err = 0;
31 	__u64 array_value;
32 	uid_t my_uid = getuid();
33 	time_t now, load_time;
34 
35 	err = bpf_prog_get_fd_by_id(0);
36 	ASSERT_LT(err, 0, "bpf_prog_get_fd_by_id");
37 	ASSERT_EQ(errno, ENOENT, "bpf_prog_get_fd_by_id");
38 
39 	err = bpf_map_get_fd_by_id(0);
40 	ASSERT_LT(err, 0, "bpf_map_get_fd_by_id");
41 	ASSERT_EQ(errno, ENOENT, "bpf_map_get_fd_by_id");
42 
43 	err = bpf_link_get_fd_by_id(0);
44 	ASSERT_LT(err, 0, "bpf_map_get_fd_by_id");
45 	ASSERT_EQ(errno, ENOENT, "bpf_map_get_fd_by_id");
46 
47 	/* Check bpf_map_get_info_by_fd() */
48 	bzero(zeros, sizeof(zeros));
49 	for (i = 0; i < nr_iters; i++) {
50 		now = time(NULL);
51 		err = bpf_prog_test_load(file, BPF_PROG_TYPE_RAW_TRACEPOINT,
52 				    &objs[i], &prog_fds[i]);
53 		/* test_obj_id.o is a dumb prog. It should never fail
54 		 * to load.
55 		 */
56 		if (!ASSERT_OK(err, "bpf_prog_test_load"))
57 			continue;
58 
59 		/* Insert a magic value to the map */
60 		map_fds[i] = bpf_find_map(__func__, objs[i], "test_map_id");
61 		if (!ASSERT_GE(map_fds[i], 0, "bpf_find_map"))
62 			goto done;
63 
64 		err = bpf_map_update_elem(map_fds[i], &array_key,
65 					  &array_magic_value, 0);
66 		if (!ASSERT_OK(err, "bpf_map_update_elem"))
67 			goto done;
68 
69 		prog = bpf_object__find_program_by_name(objs[i], "test_obj_id");
70 		if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
71 			goto done;
72 
73 		links[i] = bpf_program__attach(prog);
74 		err = libbpf_get_error(links[i]);
75 		if (!ASSERT_OK(err, "bpf_program__attach")) {
76 			links[i] = NULL;
77 			goto done;
78 		}
79 
80 		/* Check getting map info */
81 		info_len = sizeof(struct bpf_map_info) * 2;
82 		bzero(&map_infos[i], info_len);
83 		err = bpf_map_get_info_by_fd(map_fds[i], &map_infos[i],
84 					     &info_len);
85 		if (!ASSERT_OK(err, "bpf_map_get_info_by_fd") ||
86 				!ASSERT_EQ(map_infos[i].type, BPF_MAP_TYPE_ARRAY, "map_type") ||
87 				!ASSERT_EQ(map_infos[i].key_size, sizeof(__u32), "key_size") ||
88 				!ASSERT_EQ(map_infos[i].value_size, sizeof(__u64), "value_size") ||
89 				!ASSERT_EQ(map_infos[i].max_entries, 1, "max_entries") ||
90 				!ASSERT_EQ(map_infos[i].map_flags, 0, "map_flags") ||
91 				!ASSERT_EQ(info_len, sizeof(struct bpf_map_info), "map_info_len") ||
92 				!ASSERT_STREQ((char *)map_infos[i].name, expected_map_name, "map_name"))
93 			goto done;
94 
95 		/* Check getting prog info */
96 		info_len = sizeof(struct bpf_prog_info) * 2;
97 		bzero(&prog_infos[i], info_len);
98 		bzero(jited_insns, sizeof(jited_insns));
99 		bzero(xlated_insns, sizeof(xlated_insns));
100 		prog_infos[i].jited_prog_insns = ptr_to_u64(jited_insns);
101 		prog_infos[i].jited_prog_len = sizeof(jited_insns);
102 		prog_infos[i].xlated_prog_insns = ptr_to_u64(xlated_insns);
103 		prog_infos[i].xlated_prog_len = sizeof(xlated_insns);
104 		prog_infos[i].map_ids = ptr_to_u64(map_ids + i);
105 		prog_infos[i].nr_map_ids = 2;
106 
107 		err = clock_gettime(CLOCK_REALTIME, &real_time_ts);
108 		if (!ASSERT_OK(err, "clock_gettime"))
109 			goto done;
110 
111 		err = clock_gettime(CLOCK_BOOTTIME, &boot_time_ts);
112 		if (!ASSERT_OK(err, "clock_gettime"))
113 			goto done;
114 
115 		err = bpf_prog_get_info_by_fd(prog_fds[i], &prog_infos[i],
116 					      &info_len);
117 		load_time = (real_time_ts.tv_sec - boot_time_ts.tv_sec)
118 			+ (prog_infos[i].load_time / nsec_per_sec);
119 
120 		if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd") ||
121 				!ASSERT_EQ(prog_infos[i].type, BPF_PROG_TYPE_RAW_TRACEPOINT, "prog_type") ||
122 				!ASSERT_EQ(info_len, sizeof(struct bpf_prog_info), "prog_info_len") ||
123 				!ASSERT_FALSE((env.jit_enabled && !prog_infos[i].jited_prog_len), "jited_prog_len") ||
124 				!ASSERT_FALSE((env.jit_enabled && !memcmp(jited_insns, zeros, sizeof(zeros))),
125 					"jited_insns") ||
126 				!ASSERT_NEQ(prog_infos[i].xlated_prog_len, 0, "xlated_prog_len") ||
127 				!ASSERT_NEQ(memcmp(xlated_insns, zeros, sizeof(zeros)), 0, "xlated_insns") ||
128 				!ASSERT_GE(load_time, (now - 60), "load_time") ||
129 				!ASSERT_LE(load_time, (now + 60), "load_time") ||
130 				!ASSERT_EQ(prog_infos[i].created_by_uid, my_uid, "created_by_uid") ||
131 				!ASSERT_EQ(prog_infos[i].nr_map_ids, 1, "nr_map_ids") ||
132 				!ASSERT_EQ(*(int *)(long)prog_infos[i].map_ids, map_infos[i].id, "map_ids") ||
133 				!ASSERT_STREQ((char *)prog_infos[i].name, expected_prog_name, "prog_name"))
134 			goto done;
135 
136 		/* Check getting link info */
137 		info_len = sizeof(struct bpf_link_info) * 2;
138 		bzero(&link_infos[i], info_len);
139 		link_infos[i].raw_tracepoint.tp_name = ptr_to_u64(&tp_name);
140 		link_infos[i].raw_tracepoint.tp_name_len = sizeof(tp_name);
141 		err = bpf_link_get_info_by_fd(bpf_link__fd(links[i]),
142 					      &link_infos[i], &info_len);
143 		if (!ASSERT_OK(err, "bpf_link_get_info_by_fd") ||
144 				!ASSERT_EQ(link_infos[i].type, BPF_LINK_TYPE_RAW_TRACEPOINT, "link_type") ||
145 				!ASSERT_EQ(link_infos[i].prog_id, prog_infos[i].id, "prog_id") ||
146 				!ASSERT_EQ(link_infos[i].raw_tracepoint.tp_name, ptr_to_u64(&tp_name), "&tp_name") ||
147 				!ASSERT_STREQ(u64_to_ptr(link_infos[i].raw_tracepoint.tp_name), "sys_enter", "tp_name"))
148 			goto done;
149 	}
150 
151 	/* Check bpf_prog_get_next_id() */
152 	nr_id_found = 0;
153 	next_id = 0;
154 	while (!bpf_prog_get_next_id(next_id, &next_id)) {
155 		struct bpf_prog_info prog_info = {};
156 		__u32 saved_map_id;
157 		int prog_fd, cmp_res;
158 
159 		info_len = sizeof(prog_info);
160 
161 		prog_fd = bpf_prog_get_fd_by_id(next_id);
162 		if (prog_fd < 0 && errno == ENOENT)
163 			/* The bpf_prog is in the dead row */
164 			continue;
165 		if (!ASSERT_GE(prog_fd, 0, "bpf_prog_get_fd_by_id"))
166 			break;
167 
168 		for (i = 0; i < nr_iters; i++)
169 			if (prog_infos[i].id == next_id)
170 				break;
171 
172 		if (i == nr_iters)
173 			continue;
174 
175 		nr_id_found++;
176 
177 		/* Negative test:
178 		 * prog_info.nr_map_ids = 1
179 		 * prog_info.map_ids = NULL
180 		 */
181 		prog_info.nr_map_ids = 1;
182 		err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len);
183 		if (!ASSERT_ERR(err, "bpf_prog_get_info_by_fd") ||
184 				!ASSERT_EQ(errno, EFAULT, "bpf_prog_get_info_by_fd"))
185 			break;
186 		bzero(&prog_info, sizeof(prog_info));
187 		info_len = sizeof(prog_info);
188 
189 		saved_map_id = *(int *)((long)prog_infos[i].map_ids);
190 		prog_info.map_ids = prog_infos[i].map_ids;
191 		prog_info.nr_map_ids = 2;
192 		err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len);
193 		prog_infos[i].jited_prog_insns = 0;
194 		prog_infos[i].xlated_prog_insns = 0;
195 		cmp_res = memcmp(&prog_info, &prog_infos[i], info_len);
196 
197 		ASSERT_OK(err, "bpf_prog_get_info_by_fd");
198 		ASSERT_EQ(info_len, sizeof(struct bpf_prog_info), "prog_info_len");
199 		ASSERT_OK(cmp_res, "memcmp");
200 		ASSERT_EQ(*(int *)(long)prog_info.map_ids, saved_map_id, "map_id");
201 		close(prog_fd);
202 	}
203 	ASSERT_EQ(nr_id_found, nr_iters, "prog_nr_id_found");
204 
205 	/* Check bpf_map_get_next_id() */
206 	nr_id_found = 0;
207 	next_id = 0;
208 	while (!bpf_map_get_next_id(next_id, &next_id)) {
209 		struct bpf_map_info map_info = {};
210 		int map_fd, cmp_res;
211 
212 		info_len = sizeof(map_info);
213 
214 		map_fd = bpf_map_get_fd_by_id(next_id);
215 		if (map_fd < 0 && errno == ENOENT)
216 			/* The bpf_map is in the dead row */
217 			continue;
218 		if (!ASSERT_GE(map_fd, 0, "bpf_map_get_fd_by_id"))
219 			break;
220 
221 		for (i = 0; i < nr_iters; i++)
222 			if (map_infos[i].id == next_id)
223 				break;
224 
225 		if (i == nr_iters)
226 			continue;
227 
228 		nr_id_found++;
229 
230 		err = bpf_map_lookup_elem(map_fd, &array_key, &array_value);
231 		if (!ASSERT_OK(err, "bpf_map_lookup_elem"))
232 			goto done;
233 
234 		err = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len);
235 		cmp_res = memcmp(&map_info, &map_infos[i], info_len);
236 		ASSERT_OK(err, "bpf_map_get_info_by_fd");
237 		ASSERT_EQ(info_len, sizeof(struct bpf_map_info), "info_len");
238 		ASSERT_OK(cmp_res, "memcmp");
239 		ASSERT_EQ(array_value, array_magic_value, "array_value");
240 
241 		close(map_fd);
242 	}
243 	ASSERT_EQ(nr_id_found, nr_iters, "map_nr_id_found");
244 
245 	/* Check bpf_link_get_next_id() */
246 	nr_id_found = 0;
247 	next_id = 0;
248 	while (!bpf_link_get_next_id(next_id, &next_id)) {
249 		struct bpf_link_info link_info;
250 		int link_fd, cmp_res;
251 
252 		info_len = sizeof(link_info);
253 		memset(&link_info, 0, info_len);
254 
255 		link_fd = bpf_link_get_fd_by_id(next_id);
256 		if (link_fd < 0 && errno == ENOENT)
257 			/* The bpf_link is in the dead row */
258 			continue;
259 		if (!ASSERT_GE(link_fd, 0, "bpf_link_get_fd_by_id"))
260 			break;
261 
262 		for (i = 0; i < nr_iters; i++)
263 			if (link_infos[i].id == next_id)
264 				break;
265 
266 		if (i == nr_iters)
267 			continue;
268 
269 		nr_id_found++;
270 
271 		err = bpf_link_get_info_by_fd(link_fd, &link_info, &info_len);
272 		cmp_res = memcmp(&link_info, &link_infos[i],
273 				offsetof(struct bpf_link_info, raw_tracepoint));
274 		ASSERT_OK(err, "bpf_link_get_info_by_fd");
275 		ASSERT_EQ(info_len, sizeof(link_info), "info_len");
276 		ASSERT_OK(cmp_res, "memcmp");
277 
278 		close(link_fd);
279 	}
280 	ASSERT_EQ(nr_id_found, nr_iters, "link_nr_id_found");
281 
282 done:
283 	for (i = 0; i < nr_iters; i++) {
284 		bpf_link__destroy(links[i]);
285 		bpf_object__close(objs[i]);
286 	}
287 }
288