xref: /linux/tools/testing/selftests/bpf/prog_tests/xdp_cpumap_attach.c (revision 6f7e6393d1ce636bb7ec77a7fe7b77458fddf701)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <uapi/linux/bpf.h>
3 #include <linux/if_link.h>
4 #include <test_progs.h>
5 #include <network_helpers.h>
6 
7 #include "test_xdp_with_cpumap_frags_helpers.skel.h"
8 #include "test_xdp_with_cpumap_helpers.skel.h"
9 
10 #define IFINDEX_LO	1
11 #define TEST_NS "cpu_attach_ns"
12 
13 static void test_xdp_with_cpumap_helpers(void)
14 {
15 	struct test_xdp_with_cpumap_helpers *skel = NULL;
16 	struct bpf_prog_info info = {};
17 	__u32 len = sizeof(info);
18 	struct bpf_cpumap_val val = {
19 		.qsize = 192,
20 	};
21 	int err, prog_fd, prog_redir_fd, map_fd, bad_fd;
22 	struct nstoken *nstoken = NULL;
23 	__u32 idx = 0;
24 
25 	SYS(out_close, "ip netns add %s", TEST_NS);
26 	nstoken = open_netns(TEST_NS);
27 	if (!ASSERT_OK_PTR(nstoken, "open_netns"))
28 		goto out_close;
29 	SYS(out_close, "ip link set dev lo up");
30 
31 	skel = test_xdp_with_cpumap_helpers__open_and_load();
32 	if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
33 		return;
34 
35 	prog_redir_fd = bpf_program__fd(skel->progs.xdp_redir_prog);
36 	err = bpf_xdp_attach(IFINDEX_LO, prog_redir_fd, XDP_FLAGS_SKB_MODE, NULL);
37 	if (!ASSERT_OK(err, "Generic attach of program with 8-byte CPUMAP"))
38 		goto out_close;
39 
40 	prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
41 	map_fd = bpf_map__fd(skel->maps.cpu_map);
42 	err = bpf_prog_get_info_by_fd(prog_fd, &info, &len);
43 	if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
44 		goto out_close;
45 
46 	val.bpf_prog.fd = prog_fd;
47 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
48 	ASSERT_OK(err, "Add program to cpumap entry");
49 
50 	err = bpf_map_lookup_elem(map_fd, &idx, &val);
51 	ASSERT_OK(err, "Read cpumap entry");
52 	ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to cpumap entry prog_id");
53 
54 	/* send a packet to trigger any potential bugs in there */
55 	char data[ETH_HLEN] = {};
56 	DECLARE_LIBBPF_OPTS(bpf_test_run_opts, opts,
57 			    .data_in = &data,
58 			    .data_size_in = sizeof(data),
59 			    .flags = BPF_F_TEST_XDP_LIVE_FRAMES,
60 			    .repeat = 1,
61 		);
62 	err = bpf_prog_test_run_opts(prog_redir_fd, &opts);
63 	ASSERT_OK(err, "XDP test run");
64 
65 	/* wait for the packets to be flushed, then check that redirect has been
66 	 * performed
67 	 */
68 	kern_sync_rcu();
69 	ASSERT_NEQ(skel->bss->redirect_count, 0, "redirected packets");
70 
71 	err = bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
72 	ASSERT_OK(err, "XDP program detach");
73 
74 	/* can not attach BPF_XDP_CPUMAP program to a device */
75 	err = bpf_xdp_attach(IFINDEX_LO, prog_fd, XDP_FLAGS_SKB_MODE, NULL);
76 	if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_CPUMAP program"))
77 		bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
78 
79 	val.qsize = 192;
80 	val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_prog);
81 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
82 	ASSERT_EQ(err, -EINVAL, "Add non-BPF_XDP_CPUMAP program to cpumap entry");
83 
84 	/* Try to attach non-BPF file descriptor */
85 	bad_fd = open("/dev/null", O_RDONLY);
86 	ASSERT_GE(bad_fd, 0, "Open /dev/null for non-BPF fd");
87 
88 	val.bpf_prog.fd = bad_fd;
89 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
90 	ASSERT_EQ(err, -EINVAL, "Add non-BPF fd to cpumap entry");
91 
92 	/* Try to attach nonexistent file descriptor */
93 	err = close(bad_fd);
94 	ASSERT_EQ(err, 0, "Close non-BPF fd for nonexistent fd");
95 
96 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
97 	ASSERT_EQ(err, -EBADF, "Add nonexistent fd to cpumap entry");
98 
99 	/* Try to attach BPF_XDP program with frags to cpumap when we have
100 	 * already loaded a BPF_XDP program on the map
101 	 */
102 	idx = 1;
103 	val.qsize = 192;
104 	val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
105 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
106 	ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to cpumap entry");
107 
108 out_close:
109 	close_netns(nstoken);
110 	SYS_NOFAIL("ip netns del %s", TEST_NS);
111 	test_xdp_with_cpumap_helpers__destroy(skel);
112 }
113 
114 static void test_xdp_with_cpumap_frags_helpers(void)
115 {
116 	struct test_xdp_with_cpumap_frags_helpers *skel;
117 	struct bpf_prog_info info = {};
118 	__u32 len = sizeof(info);
119 	struct bpf_cpumap_val val = {
120 		.qsize = 192,
121 	};
122 	int err, frags_prog_fd, map_fd;
123 	__u32 idx = 0;
124 
125 	skel = test_xdp_with_cpumap_frags_helpers__open_and_load();
126 	if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
127 		return;
128 
129 	frags_prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
130 	map_fd = bpf_map__fd(skel->maps.cpu_map);
131 	err = bpf_prog_get_info_by_fd(frags_prog_fd, &info, &len);
132 	if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
133 		goto out_close;
134 
135 	val.bpf_prog.fd = frags_prog_fd;
136 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
137 	ASSERT_OK(err, "Add program to cpumap entry");
138 
139 	err = bpf_map_lookup_elem(map_fd, &idx, &val);
140 	ASSERT_OK(err, "Read cpumap entry");
141 	ASSERT_EQ(info.id, val.bpf_prog.id,
142 		  "Match program id to cpumap entry prog_id");
143 
144 	/* Try to attach BPF_XDP program to cpumap when we have
145 	 * already loaded a BPF_XDP program with frags on the map
146 	 */
147 	idx = 1;
148 	val.qsize = 192;
149 	val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
150 	err = bpf_map_update_elem(map_fd, &idx, &val, 0);
151 	ASSERT_NEQ(err, 0, "Add BPF_XDP program to cpumap entry");
152 
153 out_close:
154 	test_xdp_with_cpumap_frags_helpers__destroy(skel);
155 }
156 
157 void test_xdp_cpumap_attach(void)
158 {
159 	if (test__start_subtest("CPUMAP with programs in entries"))
160 		test_xdp_with_cpumap_helpers();
161 
162 	if (test__start_subtest("CPUMAP with frags programs in entries"))
163 		test_xdp_with_cpumap_frags_helpers();
164 }
165