xref: /linux/tools/testing/selftests/bpf/prog_tests/spin_lock.c (revision 5ea5880764cbb164afb17a62e76ca75dc371409d)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <regex.h>
3 #include <test_progs.h>
4 #include <network_helpers.h>
5 
6 #include "test_spin_lock.skel.h"
7 #include "test_spin_lock_fail.skel.h"
8 
9 static char log_buf[1024 * 1024];
10 
11 static struct {
12 	const char *prog_name;
13 	const char *err_msg;
14 } spin_lock_fail_tests[] = {
15 	{ "lock_id_kptr_preserve",
16 	  "[0-9]\\+: (bf) r1 = r0                       ; R0=ptr_foo(id=2,ref_obj_id=2)"
17 	  " R1=ptr_foo(id=2,ref_obj_id=2) refs=2\n"
18 	  "[0-9]\\+: (85) call bpf_this_cpu_ptr#154\n"
19 	  "R1 type=ptr_ expected=percpu_ptr_" },
20 	{ "lock_id_global_zero",
21 	  "; R1=map_value(map=.data.A,ks=4,vs=4)\n2: (85) call bpf_this_cpu_ptr#154\n"
22 	  "R1 type=map_value expected=percpu_ptr_" },
23 	{ "lock_id_mapval_preserve",
24 	  "[0-9]\\+: (bf) r1 = r0                       ;"
25 	  " R0=map_value(id=1,map=array_map,ks=4,vs=8)"
26 	  " R1=map_value(id=1,map=array_map,ks=4,vs=8)\n"
27 	  "[0-9]\\+: (85) call bpf_this_cpu_ptr#154\n"
28 	  "R1 type=map_value expected=percpu_ptr_" },
29 	{ "lock_id_innermapval_preserve",
30 	  "[0-9]\\+: (bf) r1 = r0                      ;"
31 	  " R0=map_value(id=2,ks=4,vs=8)"
32 	  " R1=map_value(id=2,ks=4,vs=8)\n"
33 	  "[0-9]\\+: (85) call bpf_this_cpu_ptr#154\n"
34 	  "R1 type=map_value expected=percpu_ptr_" },
35 	{ "lock_id_mismatch_kptr_kptr", "bpf_spin_unlock of different lock" },
36 	{ "lock_id_mismatch_kptr_global", "bpf_spin_unlock of different lock" },
37 	{ "lock_id_mismatch_kptr_mapval", "bpf_spin_unlock of different lock" },
38 	{ "lock_id_mismatch_kptr_innermapval", "bpf_spin_unlock of different lock" },
39 	{ "lock_id_mismatch_global_global", "bpf_spin_unlock of different lock" },
40 	{ "lock_id_mismatch_global_kptr", "bpf_spin_unlock of different lock" },
41 	{ "lock_id_mismatch_global_mapval", "bpf_spin_unlock of different lock" },
42 	{ "lock_id_mismatch_global_innermapval", "bpf_spin_unlock of different lock" },
43 	{ "lock_id_mismatch_mapval_mapval", "bpf_spin_unlock of different lock" },
44 	{ "lock_id_mismatch_mapval_kptr", "bpf_spin_unlock of different lock" },
45 	{ "lock_id_mismatch_mapval_global", "bpf_spin_unlock of different lock" },
46 	{ "lock_id_mismatch_mapval_innermapval", "bpf_spin_unlock of different lock" },
47 	{ "lock_id_mismatch_innermapval_innermapval1", "bpf_spin_unlock of different lock" },
48 	{ "lock_id_mismatch_innermapval_innermapval2", "bpf_spin_unlock of different lock" },
49 	{ "lock_id_mismatch_innermapval_kptr", "bpf_spin_unlock of different lock" },
50 	{ "lock_id_mismatch_innermapval_global", "bpf_spin_unlock of different lock" },
51 	{ "lock_id_mismatch_innermapval_mapval", "bpf_spin_unlock of different lock" },
52 	{ "lock_global_subprog_call1", "global function calls are not allowed while holding a lock" },
53 	{ "lock_global_subprog_call2", "global function calls are not allowed while holding a lock" },
54 	{ "lock_global_sleepable_helper_subprog", "global function calls are not allowed while holding a lock" },
55 	{ "lock_global_sleepable_kfunc_subprog", "global function calls are not allowed while holding a lock" },
56 	{ "lock_global_sleepable_subprog_indirect", "global function calls are not allowed while holding a lock" },
57 };
58 
59 static int match_regex(const char *pattern, const char *string)
60 {
61 	int err, rc;
62 	regex_t re;
63 
64 	err = regcomp(&re, pattern, REG_NOSUB);
65 	if (err) {
66 		char errbuf[512];
67 
68 		regerror(err, &re, errbuf, sizeof(errbuf));
69 		PRINT_FAIL("Can't compile regex: %s\n", errbuf);
70 		return -1;
71 	}
72 	rc = regexec(&re, string, 0, NULL, 0);
73 	regfree(&re);
74 	return rc == 0 ? 1 : 0;
75 }
76 
77 static void test_spin_lock_fail_prog(const char *prog_name, const char *err_msg)
78 {
79 	LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf,
80 						.kernel_log_size = sizeof(log_buf),
81 						.kernel_log_level = 1);
82 	struct test_spin_lock_fail *skel;
83 	struct bpf_program *prog;
84 	int ret;
85 
86 	skel = test_spin_lock_fail__open_opts(&opts);
87 	if (!ASSERT_OK_PTR(skel, "test_spin_lock_fail__open_opts"))
88 		return;
89 
90 	prog = bpf_object__find_program_by_name(skel->obj, prog_name);
91 	if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
92 		goto end;
93 
94 	bpf_program__set_autoload(prog, true);
95 
96 	ret = test_spin_lock_fail__load(skel);
97 	if (!ASSERT_ERR(ret, "test_spin_lock_fail__load must fail"))
98 		goto end;
99 
100 	/* Skip check if JIT does not support kfuncs */
101 	if (strstr(log_buf, "JIT does not support calling kernel function")) {
102 		test__skip();
103 		goto end;
104 	}
105 
106 	ret = match_regex(err_msg, log_buf);
107 	if (!ASSERT_GE(ret, 0, "match_regex"))
108 		goto end;
109 
110 	if (!ASSERT_TRUE(ret, "no match for expected error message")) {
111 		fprintf(stderr, "Expected: %s\n", err_msg);
112 		fprintf(stderr, "Verifier: %s\n", log_buf);
113 	}
114 
115 end:
116 	test_spin_lock_fail__destroy(skel);
117 }
118 
119 static void *spin_lock_thread(void *arg)
120 {
121 	int err, prog_fd = *(u32 *) arg;
122 	LIBBPF_OPTS(bpf_test_run_opts, topts,
123 		.data_in = &pkt_v4,
124 		.data_size_in = sizeof(pkt_v4),
125 		.repeat = 10000,
126 	);
127 
128 	err = bpf_prog_test_run_opts(prog_fd, &topts);
129 	ASSERT_OK(err, "test_run");
130 	ASSERT_OK(topts.retval, "test_run retval");
131 	pthread_exit(arg);
132 }
133 
134 void test_spin_lock_success(void)
135 {
136 	struct test_spin_lock *skel;
137 	pthread_t thread_id[4];
138 	int prog_fd, i;
139 	void *ret;
140 
141 	skel = test_spin_lock__open_and_load();
142 	if (!ASSERT_OK_PTR(skel, "test_spin_lock__open_and_load"))
143 		return;
144 	prog_fd = bpf_program__fd(skel->progs.bpf_spin_lock_test);
145 	for (i = 0; i < 4; i++) {
146 		int err;
147 
148 		err = pthread_create(&thread_id[i], NULL, &spin_lock_thread, &prog_fd);
149 		if (!ASSERT_OK(err, "pthread_create"))
150 			goto end;
151 	}
152 
153 	for (i = 0; i < 4; i++) {
154 		if (!ASSERT_OK(pthread_join(thread_id[i], &ret), "pthread_join"))
155 			goto end;
156 		if (!ASSERT_EQ(ret, &prog_fd, "ret == prog_fd"))
157 			goto end;
158 	}
159 end:
160 	test_spin_lock__destroy(skel);
161 }
162 
163 void test_spin_lock(void)
164 {
165 	int i;
166 
167 	test_spin_lock_success();
168 
169 	for (i = 0; i < ARRAY_SIZE(spin_lock_fail_tests); i++) {
170 		if (!test__start_subtest(spin_lock_fail_tests[i].prog_name))
171 			continue;
172 		test_spin_lock_fail_prog(spin_lock_fail_tests[i].prog_name,
173 					 spin_lock_fail_tests[i].err_msg);
174 	}
175 }
176