1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (c) 2022 Facebook */ 3 4 #include <test_progs.h> 5 #include <network_helpers.h> 6 #include "dynptr_fail.skel.h" 7 #include "dynptr_success.skel.h" 8 9 enum test_setup_type { 10 SETUP_SYSCALL_SLEEP, 11 SETUP_SKB_PROG, 12 SETUP_SKB_PROG_TP, 13 SETUP_XDP_PROG, 14 }; 15 16 static struct { 17 const char *prog_name; 18 enum test_setup_type type; 19 } success_tests[] = { 20 {"test_read_write", SETUP_SYSCALL_SLEEP}, 21 {"test_dynptr_data", SETUP_SYSCALL_SLEEP}, 22 {"test_dynptr_copy", SETUP_SYSCALL_SLEEP}, 23 {"test_dynptr_copy_xdp", SETUP_XDP_PROG}, 24 {"test_dynptr_memset_zero", SETUP_SYSCALL_SLEEP}, 25 {"test_dynptr_memset_notzero", SETUP_SYSCALL_SLEEP}, 26 {"test_dynptr_memset_zero_offset", SETUP_SYSCALL_SLEEP}, 27 {"test_dynptr_memset_zero_adjusted", SETUP_SYSCALL_SLEEP}, 28 {"test_dynptr_memset_overflow", SETUP_SYSCALL_SLEEP}, 29 {"test_dynptr_memset_overflow_offset", SETUP_SYSCALL_SLEEP}, 30 {"test_dynptr_memset_readonly", SETUP_SKB_PROG}, 31 {"test_dynptr_memset_xdp_chunks", SETUP_XDP_PROG}, 32 {"test_ringbuf", SETUP_SYSCALL_SLEEP}, 33 {"test_skb_readonly", SETUP_SKB_PROG}, 34 {"test_dynptr_skb_data", SETUP_SKB_PROG}, 35 {"test_adjust", SETUP_SYSCALL_SLEEP}, 36 {"test_adjust_err", SETUP_SYSCALL_SLEEP}, 37 {"test_zero_size_dynptr", SETUP_SYSCALL_SLEEP}, 38 {"test_dynptr_is_null", SETUP_SYSCALL_SLEEP}, 39 {"test_dynptr_is_rdonly", SETUP_SKB_PROG}, 40 {"test_dynptr_clone", SETUP_SKB_PROG}, 41 {"test_dynptr_skb_no_buff", SETUP_SKB_PROG}, 42 {"test_dynptr_skb_strcmp", SETUP_SKB_PROG}, 43 {"test_dynptr_skb_tp_btf", SETUP_SKB_PROG_TP}, 44 {"test_probe_read_user_dynptr", SETUP_XDP_PROG}, 45 {"test_probe_read_kernel_dynptr", SETUP_XDP_PROG}, 46 {"test_probe_read_user_str_dynptr", SETUP_XDP_PROG}, 47 {"test_probe_read_kernel_str_dynptr", SETUP_XDP_PROG}, 48 {"test_copy_from_user_dynptr", SETUP_SYSCALL_SLEEP}, 49 {"test_copy_from_user_str_dynptr", SETUP_SYSCALL_SLEEP}, 50 {"test_copy_from_user_task_dynptr", SETUP_SYSCALL_SLEEP}, 51 {"test_copy_from_user_task_str_dynptr", SETUP_SYSCALL_SLEEP}, 52 }; 53 54 #define PAGE_SIZE_64K 65536 55 56 static void verify_success(const char *prog_name, enum test_setup_type setup_type) 57 { 58 char user_data[384] = {[0 ... 382] = 'a', '\0'}; 59 struct dynptr_success *skel; 60 struct bpf_program *prog; 61 struct bpf_link *link; 62 int err; 63 64 skel = dynptr_success__open(); 65 if (!ASSERT_OK_PTR(skel, "dynptr_success__open")) 66 return; 67 68 skel->bss->pid = getpid(); 69 70 prog = bpf_object__find_program_by_name(skel->obj, prog_name); 71 if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name")) 72 goto cleanup; 73 74 bpf_program__set_autoload(prog, true); 75 76 err = dynptr_success__load(skel); 77 if (!ASSERT_OK(err, "dynptr_success__load")) 78 goto cleanup; 79 80 skel->bss->user_ptr = user_data; 81 skel->data->test_len[0] = sizeof(user_data); 82 memcpy(skel->bss->expected_str, user_data, sizeof(user_data)); 83 84 switch (setup_type) { 85 case SETUP_SYSCALL_SLEEP: 86 link = bpf_program__attach(prog); 87 if (!ASSERT_OK_PTR(link, "bpf_program__attach")) 88 goto cleanup; 89 90 usleep(1); 91 92 bpf_link__destroy(link); 93 break; 94 case SETUP_SKB_PROG: 95 { 96 int prog_fd; 97 char buf[64]; 98 99 LIBBPF_OPTS(bpf_test_run_opts, topts, 100 .data_in = &pkt_v4, 101 .data_size_in = sizeof(pkt_v4), 102 .data_out = buf, 103 .data_size_out = sizeof(buf), 104 .repeat = 1, 105 ); 106 107 prog_fd = bpf_program__fd(prog); 108 if (!ASSERT_GE(prog_fd, 0, "prog_fd")) 109 goto cleanup; 110 111 err = bpf_prog_test_run_opts(prog_fd, &topts); 112 113 if (!ASSERT_OK(err, "test_run")) 114 goto cleanup; 115 116 break; 117 } 118 case SETUP_SKB_PROG_TP: 119 { 120 struct __sk_buff skb = {}; 121 struct bpf_object *obj; 122 int aux_prog_fd; 123 124 /* Just use its test_run to trigger kfree_skb tracepoint */ 125 err = bpf_prog_test_load("./test_pkt_access.bpf.o", BPF_PROG_TYPE_SCHED_CLS, 126 &obj, &aux_prog_fd); 127 if (!ASSERT_OK(err, "prog_load sched cls")) 128 goto cleanup; 129 130 LIBBPF_OPTS(bpf_test_run_opts, topts, 131 .data_in = &pkt_v4, 132 .data_size_in = sizeof(pkt_v4), 133 .ctx_in = &skb, 134 .ctx_size_in = sizeof(skb), 135 ); 136 137 link = bpf_program__attach(prog); 138 if (!ASSERT_OK_PTR(link, "bpf_program__attach")) 139 goto cleanup; 140 141 err = bpf_prog_test_run_opts(aux_prog_fd, &topts); 142 bpf_link__destroy(link); 143 144 if (!ASSERT_OK(err, "test_run")) 145 goto cleanup; 146 147 break; 148 } 149 case SETUP_XDP_PROG: 150 { 151 char data[90000]; 152 int err, prog_fd; 153 LIBBPF_OPTS(bpf_test_run_opts, opts, 154 .data_in = &data, 155 .repeat = 1, 156 ); 157 158 if (getpagesize() == PAGE_SIZE_64K) 159 opts.data_size_in = sizeof(data); 160 else 161 opts.data_size_in = 5000; 162 163 prog_fd = bpf_program__fd(prog); 164 err = bpf_prog_test_run_opts(prog_fd, &opts); 165 166 if (!ASSERT_OK(err, "test_run")) 167 goto cleanup; 168 169 break; 170 } 171 } 172 173 ASSERT_EQ(skel->bss->err, 0, "err"); 174 175 cleanup: 176 dynptr_success__destroy(skel); 177 } 178 179 void test_dynptr(void) 180 { 181 int i; 182 183 for (i = 0; i < ARRAY_SIZE(success_tests); i++) { 184 if (!test__start_subtest(success_tests[i].prog_name)) 185 continue; 186 187 verify_success(success_tests[i].prog_name, success_tests[i].type); 188 } 189 190 RUN_TESTS(dynptr_fail); 191 } 192