e9bbda13a7
Ensure struct_ops rejects the registration of struct_ops types without proper CFI stub functions. bpf_test_no_cfi.ko is a module that attempts to register a struct_ops type called "bpf_test_no_cfi_ops" with cfi_stubs of NULL and non-NULL value. The NULL one should fail, and the non-NULL one should succeed. The module can only be loaded successfully if these registrations yield the expected results. Signed-off-by: Kui-Feng Lee <thinker.li@gmail.com> Link: https://lore.kernel.org/r/20240222021105.1180475-3-thinker.li@gmail.com Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>
478 lines
9.8 KiB
C
478 lines
9.8 KiB
C
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
|
/* Copyright (C) 2019 Netronome Systems, Inc. */
|
|
/* Copyright (C) 2020 Facebook, Inc. */
|
|
#include <ctype.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <bpf/bpf.h>
|
|
#include <bpf/libbpf.h>
|
|
#include "test_progs.h"
|
|
#include "testing_helpers.h"
|
|
#include <linux/membarrier.h>
|
|
|
|
int parse_num_list(const char *s, bool **num_set, int *num_set_len)
|
|
{
|
|
int i, set_len = 0, new_len, num, start = 0, end = -1;
|
|
bool *set = NULL, *tmp, parsing_end = false;
|
|
char *next;
|
|
|
|
while (s[0]) {
|
|
errno = 0;
|
|
num = strtol(s, &next, 10);
|
|
if (errno)
|
|
return -errno;
|
|
|
|
if (parsing_end)
|
|
end = num;
|
|
else
|
|
start = num;
|
|
|
|
if (!parsing_end && *next == '-') {
|
|
s = next + 1;
|
|
parsing_end = true;
|
|
continue;
|
|
} else if (*next == ',') {
|
|
parsing_end = false;
|
|
s = next + 1;
|
|
end = num;
|
|
} else if (*next == '\0') {
|
|
parsing_end = false;
|
|
s = next;
|
|
end = num;
|
|
} else {
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (start > end)
|
|
return -EINVAL;
|
|
|
|
if (end + 1 > set_len) {
|
|
new_len = end + 1;
|
|
tmp = realloc(set, new_len);
|
|
if (!tmp) {
|
|
free(set);
|
|
return -ENOMEM;
|
|
}
|
|
for (i = set_len; i < start; i++)
|
|
tmp[i] = false;
|
|
set = tmp;
|
|
set_len = new_len;
|
|
}
|
|
for (i = start; i <= end; i++)
|
|
set[i] = true;
|
|
}
|
|
|
|
if (!set || parsing_end)
|
|
return -EINVAL;
|
|
|
|
*num_set = set;
|
|
*num_set_len = set_len;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int do_insert_test(struct test_filter_set *set,
|
|
char *test_str,
|
|
char *subtest_str)
|
|
{
|
|
struct test_filter *tmp, *test;
|
|
char **ctmp;
|
|
int i;
|
|
|
|
for (i = 0; i < set->cnt; i++) {
|
|
test = &set->tests[i];
|
|
|
|
if (strcmp(test_str, test->name) == 0) {
|
|
free(test_str);
|
|
goto subtest;
|
|
}
|
|
}
|
|
|
|
tmp = realloc(set->tests, sizeof(*test) * (set->cnt + 1));
|
|
if (!tmp)
|
|
return -ENOMEM;
|
|
|
|
set->tests = tmp;
|
|
test = &set->tests[set->cnt];
|
|
|
|
test->name = test_str;
|
|
test->subtests = NULL;
|
|
test->subtest_cnt = 0;
|
|
|
|
set->cnt++;
|
|
|
|
subtest:
|
|
if (!subtest_str)
|
|
return 0;
|
|
|
|
for (i = 0; i < test->subtest_cnt; i++) {
|
|
if (strcmp(subtest_str, test->subtests[i]) == 0) {
|
|
free(subtest_str);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
ctmp = realloc(test->subtests,
|
|
sizeof(*test->subtests) * (test->subtest_cnt + 1));
|
|
if (!ctmp)
|
|
return -ENOMEM;
|
|
|
|
test->subtests = ctmp;
|
|
test->subtests[test->subtest_cnt] = subtest_str;
|
|
|
|
test->subtest_cnt++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int insert_test(struct test_filter_set *set,
|
|
char *test_spec,
|
|
bool is_glob_pattern)
|
|
{
|
|
char *pattern, *subtest_str, *ext_test_str, *ext_subtest_str = NULL;
|
|
int glob_chars = 0;
|
|
|
|
if (is_glob_pattern) {
|
|
pattern = "%s";
|
|
} else {
|
|
pattern = "*%s*";
|
|
glob_chars = 2;
|
|
}
|
|
|
|
subtest_str = strchr(test_spec, '/');
|
|
if (subtest_str) {
|
|
*subtest_str = '\0';
|
|
subtest_str += 1;
|
|
}
|
|
|
|
ext_test_str = malloc(strlen(test_spec) + glob_chars + 1);
|
|
if (!ext_test_str)
|
|
goto err;
|
|
|
|
sprintf(ext_test_str, pattern, test_spec);
|
|
|
|
if (subtest_str) {
|
|
ext_subtest_str = malloc(strlen(subtest_str) + glob_chars + 1);
|
|
if (!ext_subtest_str)
|
|
goto err;
|
|
|
|
sprintf(ext_subtest_str, pattern, subtest_str);
|
|
}
|
|
|
|
return do_insert_test(set, ext_test_str, ext_subtest_str);
|
|
|
|
err:
|
|
free(ext_test_str);
|
|
free(ext_subtest_str);
|
|
|
|
return -ENOMEM;
|
|
}
|
|
|
|
int parse_test_list_file(const char *path,
|
|
struct test_filter_set *set,
|
|
bool is_glob_pattern)
|
|
{
|
|
char *buf = NULL, *capture_start, *capture_end, *scan_end;
|
|
size_t buflen = 0;
|
|
int err = 0;
|
|
FILE *f;
|
|
|
|
f = fopen(path, "r");
|
|
if (!f) {
|
|
err = -errno;
|
|
fprintf(stderr, "Failed to open '%s': %d\n", path, err);
|
|
return err;
|
|
}
|
|
|
|
while (getline(&buf, &buflen, f) != -1) {
|
|
capture_start = buf;
|
|
|
|
while (isspace(*capture_start))
|
|
++capture_start;
|
|
|
|
capture_end = capture_start;
|
|
scan_end = capture_start;
|
|
|
|
while (*scan_end && *scan_end != '#') {
|
|
if (!isspace(*scan_end))
|
|
capture_end = scan_end;
|
|
|
|
++scan_end;
|
|
}
|
|
|
|
if (capture_end == capture_start)
|
|
continue;
|
|
|
|
*(++capture_end) = '\0';
|
|
|
|
err = insert_test(set, capture_start, is_glob_pattern);
|
|
if (err)
|
|
break;
|
|
}
|
|
|
|
fclose(f);
|
|
return err;
|
|
}
|
|
|
|
int parse_test_list(const char *s,
|
|
struct test_filter_set *set,
|
|
bool is_glob_pattern)
|
|
{
|
|
char *input, *state = NULL, *test_spec;
|
|
int err = 0;
|
|
|
|
input = strdup(s);
|
|
if (!input)
|
|
return -ENOMEM;
|
|
|
|
while ((test_spec = strtok_r(state ? NULL : input, ",", &state))) {
|
|
err = insert_test(set, test_spec, is_glob_pattern);
|
|
if (err)
|
|
break;
|
|
}
|
|
|
|
free(input);
|
|
return err;
|
|
}
|
|
|
|
__u32 link_info_prog_id(const struct bpf_link *link, struct bpf_link_info *info)
|
|
{
|
|
__u32 info_len = sizeof(*info);
|
|
int err;
|
|
|
|
memset(info, 0, sizeof(*info));
|
|
err = bpf_link_get_info_by_fd(bpf_link__fd(link), info, &info_len);
|
|
if (err) {
|
|
printf("failed to get link info: %d\n", -errno);
|
|
return 0;
|
|
}
|
|
return info->prog_id;
|
|
}
|
|
|
|
int extra_prog_load_log_flags = 0;
|
|
|
|
int testing_prog_flags(void)
|
|
{
|
|
static int cached_flags = -1;
|
|
static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS };
|
|
static struct bpf_insn insns[] = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
};
|
|
int insn_cnt = ARRAY_SIZE(insns), i, fd, flags = 0;
|
|
LIBBPF_OPTS(bpf_prog_load_opts, opts);
|
|
|
|
if (cached_flags >= 0)
|
|
return cached_flags;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(prog_flags); i++) {
|
|
opts.prog_flags = prog_flags[i];
|
|
fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "flag-test", "GPL",
|
|
insns, insn_cnt, &opts);
|
|
if (fd >= 0) {
|
|
flags |= prog_flags[i];
|
|
close(fd);
|
|
}
|
|
}
|
|
|
|
cached_flags = flags;
|
|
return cached_flags;
|
|
}
|
|
|
|
int bpf_prog_test_load(const char *file, enum bpf_prog_type type,
|
|
struct bpf_object **pobj, int *prog_fd)
|
|
{
|
|
LIBBPF_OPTS(bpf_object_open_opts, opts,
|
|
.kernel_log_level = extra_prog_load_log_flags,
|
|
);
|
|
struct bpf_object *obj;
|
|
struct bpf_program *prog;
|
|
__u32 flags;
|
|
int err;
|
|
|
|
obj = bpf_object__open_file(file, &opts);
|
|
if (!obj)
|
|
return -errno;
|
|
|
|
prog = bpf_object__next_program(obj, NULL);
|
|
if (!prog) {
|
|
err = -ENOENT;
|
|
goto err_out;
|
|
}
|
|
|
|
if (type != BPF_PROG_TYPE_UNSPEC && bpf_program__type(prog) != type)
|
|
bpf_program__set_type(prog, type);
|
|
|
|
flags = bpf_program__flags(prog) | testing_prog_flags();
|
|
bpf_program__set_flags(prog, flags);
|
|
|
|
err = bpf_object__load(obj);
|
|
if (err)
|
|
goto err_out;
|
|
|
|
*pobj = obj;
|
|
*prog_fd = bpf_program__fd(prog);
|
|
|
|
return 0;
|
|
err_out:
|
|
bpf_object__close(obj);
|
|
return err;
|
|
}
|
|
|
|
int bpf_test_load_program(enum bpf_prog_type type, const struct bpf_insn *insns,
|
|
size_t insns_cnt, const char *license,
|
|
__u32 kern_version, char *log_buf,
|
|
size_t log_buf_sz)
|
|
{
|
|
LIBBPF_OPTS(bpf_prog_load_opts, opts,
|
|
.kern_version = kern_version,
|
|
.prog_flags = testing_prog_flags(),
|
|
.log_level = extra_prog_load_log_flags,
|
|
.log_buf = log_buf,
|
|
.log_size = log_buf_sz,
|
|
);
|
|
|
|
return bpf_prog_load(type, NULL, license, insns, insns_cnt, &opts);
|
|
}
|
|
|
|
__u64 read_perf_max_sample_freq(void)
|
|
{
|
|
__u64 sample_freq = 5000; /* fallback to 5000 on error */
|
|
FILE *f;
|
|
|
|
f = fopen("/proc/sys/kernel/perf_event_max_sample_rate", "r");
|
|
if (f == NULL) {
|
|
printf("Failed to open /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
|
|
"return default value: 5000\n", -errno);
|
|
return sample_freq;
|
|
}
|
|
if (fscanf(f, "%llu", &sample_freq) != 1) {
|
|
printf("Failed to parse /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
|
|
"return default value: 5000\n", -errno);
|
|
}
|
|
|
|
fclose(f);
|
|
return sample_freq;
|
|
}
|
|
|
|
int finit_module(int fd, const char *param_values, int flags)
|
|
{
|
|
return syscall(__NR_finit_module, fd, param_values, flags);
|
|
}
|
|
|
|
int delete_module(const char *name, int flags)
|
|
{
|
|
return syscall(__NR_delete_module, name, flags);
|
|
}
|
|
|
|
int unload_bpf_testmod(bool verbose)
|
|
{
|
|
if (kern_sync_rcu())
|
|
fprintf(stdout, "Failed to trigger kernel-side RCU sync!\n");
|
|
if (delete_module("bpf_testmod", 0)) {
|
|
if (errno == ENOENT) {
|
|
if (verbose)
|
|
fprintf(stdout, "bpf_testmod.ko is already unloaded.\n");
|
|
return -1;
|
|
}
|
|
fprintf(stdout, "Failed to unload bpf_testmod.ko from kernel: %d\n", -errno);
|
|
return -1;
|
|
}
|
|
if (verbose)
|
|
fprintf(stdout, "Successfully unloaded bpf_testmod.ko.\n");
|
|
return 0;
|
|
}
|
|
|
|
int load_bpf_testmod(bool verbose)
|
|
{
|
|
int fd;
|
|
|
|
if (verbose)
|
|
fprintf(stdout, "Loading bpf_testmod.ko...\n");
|
|
|
|
fd = open("bpf_testmod.ko", O_RDONLY);
|
|
if (fd < 0) {
|
|
fprintf(stdout, "Can't find bpf_testmod.ko kernel module: %d\n", -errno);
|
|
return -ENOENT;
|
|
}
|
|
if (finit_module(fd, "", 0)) {
|
|
fprintf(stdout, "Failed to load bpf_testmod.ko into the kernel: %d\n", -errno);
|
|
close(fd);
|
|
return -EINVAL;
|
|
}
|
|
close(fd);
|
|
|
|
if (verbose)
|
|
fprintf(stdout, "Successfully loaded bpf_testmod.ko.\n");
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Trigger synchronize_rcu() in kernel.
|
|
*/
|
|
int kern_sync_rcu(void)
|
|
{
|
|
return syscall(__NR_membarrier, MEMBARRIER_CMD_SHARED, 0, 0);
|
|
}
|
|
|
|
int get_xlated_program(int fd_prog, struct bpf_insn **buf, __u32 *cnt)
|
|
{
|
|
__u32 buf_element_size = sizeof(struct bpf_insn);
|
|
struct bpf_prog_info info = {};
|
|
__u32 info_len = sizeof(info);
|
|
__u32 xlated_prog_len;
|
|
|
|
if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
|
|
perror("bpf_prog_get_info_by_fd failed");
|
|
return -1;
|
|
}
|
|
|
|
xlated_prog_len = info.xlated_prog_len;
|
|
if (xlated_prog_len % buf_element_size) {
|
|
printf("Program length %u is not multiple of %u\n",
|
|
xlated_prog_len, buf_element_size);
|
|
return -1;
|
|
}
|
|
|
|
*cnt = xlated_prog_len / buf_element_size;
|
|
*buf = calloc(*cnt, buf_element_size);
|
|
if (!buf) {
|
|
perror("can't allocate xlated program buffer");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
bzero(&info, sizeof(info));
|
|
info.xlated_prog_len = xlated_prog_len;
|
|
info.xlated_prog_insns = (__u64)(unsigned long)*buf;
|
|
if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
|
|
perror("second bpf_prog_get_info_by_fd failed");
|
|
goto out_free_buf;
|
|
}
|
|
|
|
return 0;
|
|
|
|
out_free_buf:
|
|
free(*buf);
|
|
*buf = NULL;
|
|
return -1;
|
|
}
|
|
|
|
bool is_jit_enabled(void)
|
|
{
|
|
const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable";
|
|
bool enabled = false;
|
|
int sysctl_fd;
|
|
|
|
sysctl_fd = open(jit_sysctl, O_RDONLY);
|
|
if (sysctl_fd != -1) {
|
|
char tmpc;
|
|
|
|
if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1)
|
|
enabled = (tmpc != '0');
|
|
close(sysctl_fd);
|
|
}
|
|
|
|
return enabled;
|
|
}
|