2019-05-29 01:10:09 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2017-03-31 12:45:41 +08:00
|
|
|
/* Copyright (c) 2017 Facebook
|
|
|
|
*/
|
2019-03-02 11:42:13 +08:00
|
|
|
#include "test_progs.h"
|
2018-02-27 05:34:32 +08:00
|
|
|
#include "bpf_rlimit.h"
|
2019-07-28 11:25:24 +08:00
|
|
|
#include <argp.h>
|
2019-07-28 11:25:25 +08:00
|
|
|
#include <string.h>
|
2017-03-31 12:45:41 +08:00
|
|
|
|
2019-03-02 11:42:13 +08:00
|
|
|
int error_cnt, pass_cnt;
|
|
|
|
bool jit_enabled;
|
2019-04-02 12:27:48 +08:00
|
|
|
bool verifier_stats = false;
|
2017-03-31 12:45:41 +08:00
|
|
|
|
2019-03-02 11:42:13 +08:00
|
|
|
struct ipv4_packet pkt_v4 = {
|
2018-12-12 11:20:52 +08:00
|
|
|
.eth.h_proto = __bpf_constant_htons(ETH_P_IP),
|
2017-03-31 12:45:41 +08:00
|
|
|
.iph.ihl = 5,
|
2019-01-29 00:53:55 +08:00
|
|
|
.iph.protocol = IPPROTO_TCP,
|
2018-12-12 11:20:52 +08:00
|
|
|
.iph.tot_len = __bpf_constant_htons(MAGIC_BYTES),
|
2017-03-31 12:45:41 +08:00
|
|
|
.tcp.urg_ptr = 123,
|
2019-01-29 00:53:55 +08:00
|
|
|
.tcp.doff = 5,
|
2017-03-31 12:45:41 +08:00
|
|
|
};
|
|
|
|
|
2019-03-02 11:42:13 +08:00
|
|
|
struct ipv6_packet pkt_v6 = {
|
2018-12-12 11:20:52 +08:00
|
|
|
.eth.h_proto = __bpf_constant_htons(ETH_P_IPV6),
|
2019-01-29 00:53:55 +08:00
|
|
|
.iph.nexthdr = IPPROTO_TCP,
|
2018-12-12 11:20:52 +08:00
|
|
|
.iph.payload_len = __bpf_constant_htons(MAGIC_BYTES),
|
2017-03-31 12:45:41 +08:00
|
|
|
.tcp.urg_ptr = 123,
|
2019-01-29 00:53:55 +08:00
|
|
|
.tcp.doff = 5,
|
2017-03-31 12:45:41 +08:00
|
|
|
};
|
|
|
|
|
2019-03-02 11:42:13 +08:00
|
|
|
int bpf_find_map(const char *test, struct bpf_object *obj, const char *name)
|
2017-03-31 12:45:42 +08:00
|
|
|
{
|
|
|
|
struct bpf_map *map;
|
|
|
|
|
|
|
|
map = bpf_object__find_map_by_name(obj, name);
|
|
|
|
if (!map) {
|
|
|
|
printf("%s:FAIL:map '%s' not found\n", test, name);
|
|
|
|
error_cnt++;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return bpf_map__fd(map);
|
|
|
|
}
|
|
|
|
|
2018-04-29 13:28:15 +08:00
|
|
|
static bool is_jit_enabled(void)
|
|
|
|
{
|
|
|
|
const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable";
|
|
|
|
bool enabled = false;
|
|
|
|
int sysctl_fd;
|
|
|
|
|
|
|
|
sysctl_fd = open(jit_sysctl, 0, O_RDONLY);
|
|
|
|
if (sysctl_fd != -1) {
|
|
|
|
char tmpc;
|
|
|
|
|
|
|
|
if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1)
|
|
|
|
enabled = (tmpc != '0');
|
|
|
|
close(sysctl_fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
return enabled;
|
|
|
|
}
|
|
|
|
|
2019-03-02 11:42:16 +08:00
|
|
|
int compare_map_keys(int map1_fd, int map2_fd)
|
2018-01-05 05:55:04 +08:00
|
|
|
{
|
|
|
|
__u32 key, next_key;
|
2018-03-15 01:23:22 +08:00
|
|
|
char val_buf[PERF_MAX_STACK_DEPTH *
|
|
|
|
sizeof(struct bpf_stack_build_id)];
|
2018-01-05 05:55:04 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
err = bpf_map_get_next_key(map1_fd, NULL, &key);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
err = bpf_map_lookup_elem(map2_fd, &key, val_buf);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
while (bpf_map_get_next_key(map1_fd, &key, &next_key) == 0) {
|
|
|
|
err = bpf_map_lookup_elem(map2_fd, &next_key, val_buf);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
key = next_key;
|
|
|
|
}
|
|
|
|
if (errno != ENOENT)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-03-02 11:42:16 +08:00
|
|
|
int compare_stack_ips(int smap_fd, int amap_fd, int stack_trace_len)
|
2018-04-29 13:28:16 +08:00
|
|
|
{
|
|
|
|
__u32 key, next_key, *cur_key_p, *next_key_p;
|
|
|
|
char *val_buf1, *val_buf2;
|
|
|
|
int i, err = 0;
|
|
|
|
|
|
|
|
val_buf1 = malloc(stack_trace_len);
|
|
|
|
val_buf2 = malloc(stack_trace_len);
|
|
|
|
cur_key_p = NULL;
|
|
|
|
next_key_p = &key;
|
|
|
|
while (bpf_map_get_next_key(smap_fd, cur_key_p, next_key_p) == 0) {
|
|
|
|
err = bpf_map_lookup_elem(smap_fd, next_key_p, val_buf1);
|
|
|
|
if (err)
|
|
|
|
goto out;
|
|
|
|
err = bpf_map_lookup_elem(amap_fd, next_key_p, val_buf2);
|
|
|
|
if (err)
|
|
|
|
goto out;
|
|
|
|
for (i = 0; i < stack_trace_len; i++) {
|
|
|
|
if (val_buf1[i] != val_buf2[i]) {
|
|
|
|
err = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
key = *next_key_p;
|
|
|
|
cur_key_p = &key;
|
|
|
|
next_key_p = &next_key;
|
|
|
|
}
|
|
|
|
if (errno != ENOENT)
|
|
|
|
err = -1;
|
|
|
|
|
|
|
|
out:
|
|
|
|
free(val_buf1);
|
|
|
|
free(val_buf2);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2019-03-02 11:42:16 +08:00
|
|
|
int extract_build_id(char *build_id, size_t size)
|
2018-03-15 01:23:22 +08:00
|
|
|
{
|
|
|
|
FILE *fp;
|
|
|
|
char *line = NULL;
|
|
|
|
size_t len = 0;
|
|
|
|
|
|
|
|
fp = popen("readelf -n ./urandom_read | grep 'Build ID'", "r");
|
|
|
|
if (fp == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (getline(&line, &len, fp) == -1)
|
|
|
|
goto err;
|
|
|
|
fclose(fp);
|
|
|
|
|
|
|
|
if (len > size)
|
|
|
|
len = size;
|
|
|
|
memcpy(build_id, line, len);
|
|
|
|
build_id[len] = '\0';
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
fclose(fp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-03-02 11:42:18 +08:00
|
|
|
void *spin_lock_thread(void *arg)
|
2019-02-01 07:40:08 +08:00
|
|
|
{
|
|
|
|
__u32 duration, retval;
|
|
|
|
int err, prog_fd = *(u32 *) arg;
|
|
|
|
|
|
|
|
err = bpf_prog_test_run(prog_fd, 10000, &pkt_v4, sizeof(pkt_v4),
|
|
|
|
NULL, NULL, &retval, &duration);
|
|
|
|
CHECK(err || retval, "",
|
|
|
|
"err %d errno %d retval %d duration %d\n",
|
|
|
|
err, errno, retval, duration);
|
|
|
|
pthread_exit(arg);
|
|
|
|
}
|
|
|
|
|
2019-07-28 11:25:24 +08:00
|
|
|
/* extern declarations for test funcs */
|
|
|
|
#define DEFINE_TEST(name) extern void test_##name();
|
2019-03-02 11:42:13 +08:00
|
|
|
#include <prog_tests/tests.h>
|
2019-07-28 11:25:24 +08:00
|
|
|
#undef DEFINE_TEST
|
2019-03-02 11:42:13 +08:00
|
|
|
|
2019-07-28 11:25:24 +08:00
|
|
|
struct prog_test_def {
|
|
|
|
const char *test_name;
|
2019-07-28 11:25:25 +08:00
|
|
|
int test_num;
|
2019-07-28 11:25:24 +08:00
|
|
|
void (*run_test)(void);
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct prog_test_def prog_test_defs[] = {
|
|
|
|
#define DEFINE_TEST(name) { \
|
|
|
|
.test_name = #name, \
|
|
|
|
.run_test = &test_##name, \
|
|
|
|
},
|
|
|
|
#include <prog_tests/tests.h>
|
|
|
|
#undef DEFINE_TEST
|
|
|
|
};
|
|
|
|
|
|
|
|
const char *argp_program_version = "test_progs 0.1";
|
|
|
|
const char *argp_program_bug_address = "<bpf@vger.kernel.org>";
|
|
|
|
const char argp_program_doc[] = "BPF selftests test runner";
|
|
|
|
|
|
|
|
enum ARG_KEYS {
|
2019-07-28 11:25:25 +08:00
|
|
|
ARG_TEST_NUM = 'n',
|
|
|
|
ARG_TEST_NAME = 't',
|
2019-07-28 11:25:24 +08:00
|
|
|
ARG_VERIFIER_STATS = 's',
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct argp_option opts[] = {
|
2019-07-28 11:25:25 +08:00
|
|
|
{ "num", ARG_TEST_NUM, "NUM", 0,
|
|
|
|
"Run test number NUM only " },
|
|
|
|
{ "name", ARG_TEST_NAME, "NAME", 0,
|
|
|
|
"Run tests with names containing NAME" },
|
2019-07-28 11:25:24 +08:00
|
|
|
{ "verifier-stats", ARG_VERIFIER_STATS, NULL, 0,
|
|
|
|
"Output verifier statistics", },
|
|
|
|
{},
|
|
|
|
};
|
|
|
|
|
|
|
|
struct test_env {
|
2019-07-28 11:25:25 +08:00
|
|
|
int test_num_selector;
|
|
|
|
const char *test_name_selector;
|
2019-07-28 11:25:24 +08:00
|
|
|
bool verifier_stats;
|
|
|
|
};
|
|
|
|
|
2019-07-28 11:25:25 +08:00
|
|
|
static struct test_env env = {
|
|
|
|
.test_num_selector = -1,
|
|
|
|
};
|
2019-07-28 11:25:24 +08:00
|
|
|
|
|
|
|
static error_t parse_arg(int key, char *arg, struct argp_state *state)
|
2017-03-31 12:45:41 +08:00
|
|
|
{
|
2019-07-28 11:25:24 +08:00
|
|
|
struct test_env *env = state->input;
|
|
|
|
|
|
|
|
switch (key) {
|
2019-07-28 11:25:25 +08:00
|
|
|
case ARG_TEST_NUM: {
|
|
|
|
int test_num;
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
test_num = strtol(arg, NULL, 10);
|
|
|
|
if (errno)
|
|
|
|
return -errno;
|
|
|
|
env->test_num_selector = test_num;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ARG_TEST_NAME:
|
|
|
|
env->test_name_selector = arg;
|
|
|
|
break;
|
2019-07-28 11:25:24 +08:00
|
|
|
case ARG_VERIFIER_STATS:
|
|
|
|
env->verifier_stats = true;
|
|
|
|
break;
|
|
|
|
case ARGP_KEY_ARG:
|
|
|
|
argp_usage(state);
|
|
|
|
break;
|
|
|
|
case ARGP_KEY_END:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return ARGP_ERR_UNKNOWN;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
static const struct argp argp = {
|
|
|
|
.options = opts,
|
|
|
|
.parser = parse_arg,
|
|
|
|
.doc = argp_program_doc,
|
|
|
|
};
|
2019-07-28 11:25:25 +08:00
|
|
|
struct prog_test_def *test;
|
2019-07-28 11:25:24 +08:00
|
|
|
int err, i;
|
|
|
|
|
|
|
|
err = argp_parse(&argp, argc, argv, 0, NULL, &env);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2018-10-18 21:16:41 +08:00
|
|
|
srand(time(NULL));
|
|
|
|
|
2018-04-29 13:28:15 +08:00
|
|
|
jit_enabled = is_jit_enabled();
|
|
|
|
|
2019-07-28 11:25:24 +08:00
|
|
|
verifier_stats = env.verifier_stats;
|
2019-04-02 12:27:48 +08:00
|
|
|
|
2019-07-28 11:25:24 +08:00
|
|
|
for (i = 0; i < ARRAY_SIZE(prog_test_defs); i++) {
|
2019-07-28 11:25:25 +08:00
|
|
|
test = &prog_test_defs[i];
|
|
|
|
|
|
|
|
test->test_num = i + 1;
|
|
|
|
|
|
|
|
if (env.test_num_selector >= 0 &&
|
|
|
|
test->test_num != env.test_num_selector)
|
|
|
|
continue;
|
|
|
|
if (env.test_name_selector &&
|
|
|
|
!strstr(test->test_name, env.test_name_selector))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
test->run_test();
|
2019-07-28 11:25:24 +08:00
|
|
|
}
|
2017-03-31 12:45:41 +08:00
|
|
|
|
|
|
|
printf("Summary: %d PASSED, %d FAILED\n", pass_cnt, error_cnt);
|
2017-06-13 21:17:19 +08:00
|
|
|
return error_cnt ? EXIT_FAILURE : EXIT_SUCCESS;
|
2017-03-31 12:45:41 +08:00
|
|
|
}
|