1 // SPDX-License-Identifier: GPL-2.0 2 #include <uapi/linux/bpf.h> 3 #include <linux/if_link.h> 4 #include <test_progs.h> 5 #include <network_helpers.h> 6 7 #include "test_xdp_with_cpumap_frags_helpers.skel.h" 8 #include "test_xdp_with_cpumap_helpers.skel.h" 9 10 #define IFINDEX_LO 1 11 #define TEST_NS "cpu_attach_ns" 12 13 static void test_xdp_with_cpumap_helpers(void) 14 { 15 struct test_xdp_with_cpumap_helpers *skel = NULL; 16 struct bpf_prog_info info = {}; 17 __u32 len = sizeof(info); 18 struct bpf_cpumap_val val = { 19 .qsize = 192, 20 }; 21 int err, prog_fd, prog_redir_fd, map_fd, bad_fd; 22 struct nstoken *nstoken = NULL; 23 __u32 idx = 0; 24 25 SYS(out_close, "ip netns add %s", TEST_NS); 26 nstoken = open_netns(TEST_NS); 27 if (!ASSERT_OK_PTR(nstoken, "open_netns")) 28 goto out_close; 29 SYS(out_close, "ip link set dev lo up"); 30 31 skel = test_xdp_with_cpumap_helpers__open_and_load(); 32 if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load")) 33 return; 34 35 prog_redir_fd = bpf_program__fd(skel->progs.xdp_redir_prog); 36 err = bpf_xdp_attach(IFINDEX_LO, prog_redir_fd, XDP_FLAGS_SKB_MODE, NULL); 37 if (!ASSERT_OK(err, "Generic attach of program with 8-byte CPUMAP")) 38 goto out_close; 39 40 prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm); 41 map_fd = bpf_map__fd(skel->maps.cpu_map); 42 err = bpf_prog_get_info_by_fd(prog_fd, &info, &len); 43 if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 44 goto out_close; 45 46 val.bpf_prog.fd = prog_fd; 47 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 48 ASSERT_OK(err, "Add program to cpumap entry"); 49 50 err = bpf_map_lookup_elem(map_fd, &idx, &val); 51 ASSERT_OK(err, "Read cpumap entry"); 52 ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to cpumap entry prog_id"); 53 54 /* send a packet to trigger any potential bugs in there */ 55 char data[ETH_HLEN] = {}; 56 DECLARE_LIBBPF_OPTS(bpf_test_run_opts, opts, 57 .data_in = &data, 58 .data_size_in = sizeof(data), 59 .flags = BPF_F_TEST_XDP_LIVE_FRAMES, 60 .repeat = 1, 61 ); 62 err = bpf_prog_test_run_opts(prog_redir_fd, &opts); 63 ASSERT_OK(err, "XDP test run"); 64 65 /* wait for the packets to be flushed, then check that redirect has been 66 * performed 67 */ 68 kern_sync_rcu(); 69 ASSERT_NEQ(skel->bss->redirect_count, 0, "redirected packets"); 70 71 err = bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL); 72 ASSERT_OK(err, "XDP program detach"); 73 74 /* can not attach BPF_XDP_CPUMAP program to a device */ 75 err = bpf_xdp_attach(IFINDEX_LO, prog_fd, XDP_FLAGS_SKB_MODE, NULL); 76 if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_CPUMAP program")) 77 bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL); 78 79 val.qsize = 192; 80 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_prog); 81 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 82 ASSERT_EQ(err, -EINVAL, "Add non-BPF_XDP_CPUMAP program to cpumap entry"); 83 84 /* Try to attach non-BPF file descriptor */ 85 bad_fd = open("/dev/null", O_RDONLY); 86 ASSERT_GE(bad_fd, 0, "Open /dev/null for non-BPF fd"); 87 88 val.bpf_prog.fd = bad_fd; 89 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 90 ASSERT_EQ(err, -EINVAL, "Add non-BPF fd to cpumap entry"); 91 92 /* Try to attach nonexistent file descriptor */ 93 err = close(bad_fd); 94 ASSERT_EQ(err, 0, "Close non-BPF fd for nonexistent fd"); 95 96 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 97 ASSERT_EQ(err, -EBADF, "Add nonexistent fd to cpumap entry"); 98 99 /* Try to attach BPF_XDP program with frags to cpumap when we have 100 * already loaded a BPF_XDP program on the map 101 */ 102 idx = 1; 103 val.qsize = 192; 104 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags); 105 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 106 ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to cpumap entry"); 107 108 out_close: 109 close_netns(nstoken); 110 SYS_NOFAIL("ip netns del %s", TEST_NS); 111 test_xdp_with_cpumap_helpers__destroy(skel); 112 } 113 114 static void test_xdp_with_cpumap_frags_helpers(void) 115 { 116 struct test_xdp_with_cpumap_frags_helpers *skel; 117 struct bpf_prog_info info = {}; 118 __u32 len = sizeof(info); 119 struct bpf_cpumap_val val = { 120 .qsize = 192, 121 }; 122 int err, frags_prog_fd, map_fd; 123 __u32 idx = 0; 124 125 skel = test_xdp_with_cpumap_frags_helpers__open_and_load(); 126 if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load")) 127 return; 128 129 frags_prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags); 130 map_fd = bpf_map__fd(skel->maps.cpu_map); 131 err = bpf_prog_get_info_by_fd(frags_prog_fd, &info, &len); 132 if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 133 goto out_close; 134 135 val.bpf_prog.fd = frags_prog_fd; 136 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 137 ASSERT_OK(err, "Add program to cpumap entry"); 138 139 err = bpf_map_lookup_elem(map_fd, &idx, &val); 140 ASSERT_OK(err, "Read cpumap entry"); 141 ASSERT_EQ(info.id, val.bpf_prog.id, 142 "Match program id to cpumap entry prog_id"); 143 144 /* Try to attach BPF_XDP program to cpumap when we have 145 * already loaded a BPF_XDP program with frags on the map 146 */ 147 idx = 1; 148 val.qsize = 192; 149 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm); 150 err = bpf_map_update_elem(map_fd, &idx, &val, 0); 151 ASSERT_NEQ(err, 0, "Add BPF_XDP program to cpumap entry"); 152 153 out_close: 154 test_xdp_with_cpumap_frags_helpers__destroy(skel); 155 } 156 157 void test_xdp_cpumap_attach(void) 158 { 159 if (test__start_subtest("CPUMAP with programs in entries")) 160 test_xdp_with_cpumap_helpers(); 161 162 if (test__start_subtest("CPUMAP with frags programs in entries")) 163 test_xdp_with_cpumap_frags_helpers(); 164 } 165