diff options
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests')
4 files changed, 158 insertions, 2 deletions
| diff --git a/tools/testing/selftests/bpf/prog_tests/empty_skb.c b/tools/testing/selftests/bpf/prog_tests/empty_skb.c index 3b77d8a422db..261228eb68e8 100644 --- a/tools/testing/selftests/bpf/prog_tests/empty_skb.c +++ b/tools/testing/selftests/bpf/prog_tests/empty_skb.c @@ -24,6 +24,7 @@ void test_empty_skb(void)  		int *ifindex;  		int err;  		int ret; +		int lwt_egress_ret; /* expected retval at lwt/egress */  		bool success_on_tc;  	} tests[] = {  		/* Empty packets are always rejected. */ @@ -57,6 +58,7 @@ void test_empty_skb(void)  			.data_size_in = sizeof(eth_hlen),  			.ifindex = &veth_ifindex,  			.ret = -ERANGE, +			.lwt_egress_ret = -ERANGE,  			.success_on_tc = true,  		},  		{ @@ -70,6 +72,7 @@ void test_empty_skb(void)  			.data_size_in = sizeof(eth_hlen),  			.ifindex = &ipip_ifindex,  			.ret = -ERANGE, +			.lwt_egress_ret = -ERANGE,  		},  		/* ETH_HLEN+1-sized packet should be redirected. */ @@ -79,6 +82,7 @@ void test_empty_skb(void)  			.data_in = eth_hlen_pp,  			.data_size_in = sizeof(eth_hlen_pp),  			.ifindex = &veth_ifindex, +			.lwt_egress_ret = 1, /* veth_xmit NET_XMIT_DROP */  		},  		{  			.msg = "ipip ETH_HLEN+1 packet ingress", @@ -108,8 +112,12 @@ void test_empty_skb(void)  	for (i = 0; i < ARRAY_SIZE(tests); i++) {  		bpf_object__for_each_program(prog, bpf_obj->obj) { -			char buf[128]; +			bool at_egress = strstr(bpf_program__name(prog), "egress") != NULL;  			bool at_tc = !strncmp(bpf_program__section_name(prog), "tc", 2); +			int expected_ret; +			char buf[128]; + +			expected_ret = at_egress && !at_tc ? tests[i].lwt_egress_ret : tests[i].ret;  			tattr.data_in = tests[i].data_in;  			tattr.data_size_in = tests[i].data_size_in; @@ -128,7 +136,7 @@ void test_empty_skb(void)  			if (at_tc && tests[i].success_on_tc)  				ASSERT_GE(bpf_obj->bss->ret, 0, buf);  			else -				ASSERT_EQ(bpf_obj->bss->ret, tests[i].ret, buf); +				ASSERT_EQ(bpf_obj->bss->ret, expected_ret, buf);  		}  	} diff --git a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c index 179fe300534f..4041cfa670eb 100644 --- a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c +++ b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c @@ -3,6 +3,7 @@  #include "kprobe_multi.skel.h"  #include "trace_helpers.h"  #include "kprobe_multi_empty.skel.h" +#include "kprobe_multi_override.skel.h"  #include "bpf/libbpf_internal.h"  #include "bpf/hashmap.h" @@ -453,6 +454,40 @@ cleanup:  	}  } +static void test_attach_override(void) +{ +	struct kprobe_multi_override *skel = NULL; +	struct bpf_link *link = NULL; + +	skel = kprobe_multi_override__open_and_load(); +	if (!ASSERT_OK_PTR(skel, "kprobe_multi_empty__open_and_load")) +		goto cleanup; + +	/* The test_override calls bpf_override_return so it should fail +	 * to attach to bpf_fentry_test1 function, which is not on error +	 * injection list. +	 */ +	link = bpf_program__attach_kprobe_multi_opts(skel->progs.test_override, +						     "bpf_fentry_test1", NULL); +	if (!ASSERT_ERR_PTR(link, "override_attached_bpf_fentry_test1")) { +		bpf_link__destroy(link); +		goto cleanup; +	} + +	/* The should_fail_bio function is on error injection list, +	 * attach should succeed. +	 */ +	link = bpf_program__attach_kprobe_multi_opts(skel->progs.test_override, +						     "should_fail_bio", NULL); +	if (!ASSERT_OK_PTR(link, "override_attached_should_fail_bio")) +		goto cleanup; + +	bpf_link__destroy(link); + +cleanup: +	kprobe_multi_override__destroy(skel); +} +  void serial_test_kprobe_multi_bench_attach(void)  {  	if (test__start_subtest("kernel")) @@ -480,4 +515,6 @@ void test_kprobe_multi_test(void)  		test_attach_api_syms();  	if (test__start_subtest("attach_api_fails"))  		test_attach_api_fails(); +	if (test__start_subtest("attach_override")) +		test_attach_override();  } diff --git a/tools/testing/selftests/bpf/prog_tests/test_bpf_ma.c b/tools/testing/selftests/bpf/prog_tests/test_bpf_ma.c new file mode 100644 index 000000000000..0cca4e8ae38e --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/test_bpf_ma.c @@ -0,0 +1,50 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Copyright (C) 2023. Huawei Technologies Co., Ltd */ +#define _GNU_SOURCE +#include <sched.h> +#include <pthread.h> +#include <stdbool.h> +#include <bpf/btf.h> +#include <test_progs.h> + +#include "test_bpf_ma.skel.h" + +void test_test_bpf_ma(void) +{ +	struct test_bpf_ma *skel; +	struct btf *btf; +	int i, err; + +	skel = test_bpf_ma__open(); +	if (!ASSERT_OK_PTR(skel, "open")) +		return; + +	btf = bpf_object__btf(skel->obj); +	if (!ASSERT_OK_PTR(btf, "btf")) +		goto out; + +	for (i = 0; i < ARRAY_SIZE(skel->rodata->data_sizes); i++) { +		char name[32]; +		int id; + +		snprintf(name, sizeof(name), "bin_data_%u", skel->rodata->data_sizes[i]); +		id = btf__find_by_name_kind(btf, name, BTF_KIND_STRUCT); +		if (!ASSERT_GT(id, 0, "bin_data")) +			goto out; +		skel->rodata->data_btf_ids[i] = id; +	} + +	err = test_bpf_ma__load(skel); +	if (!ASSERT_OK(err, "load")) +		goto out; + +	err = test_bpf_ma__attach(skel); +	if (!ASSERT_OK(err, "attach")) +		goto out; + +	skel->bss->pid = getpid(); +	usleep(1); +	ASSERT_OK(skel->bss->err, "test error"); +out: +	test_bpf_ma__destroy(skel); +} diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_dev_bound_only.c b/tools/testing/selftests/bpf/prog_tests/xdp_dev_bound_only.c new file mode 100644 index 000000000000..7dd18c6d06c6 --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/xdp_dev_bound_only.c @@ -0,0 +1,61 @@ +// SPDX-License-Identifier: GPL-2.0 +#include <net/if.h> +#include <test_progs.h> +#include <network_helpers.h> + +#define LOCAL_NETNS "xdp_dev_bound_only_netns" + +static int load_dummy_prog(char *name, __u32 ifindex, __u32 flags) +{ +	struct bpf_insn insns[] = { BPF_MOV64_IMM(BPF_REG_0, 0), BPF_EXIT_INSN() }; +	LIBBPF_OPTS(bpf_prog_load_opts, opts); + +	opts.prog_flags = flags; +	opts.prog_ifindex = ifindex; +	return bpf_prog_load(BPF_PROG_TYPE_XDP, name, "GPL", insns, ARRAY_SIZE(insns), &opts); +} + +/* A test case for bpf_offload_netdev->offload handling bug: + * - create a veth device (does not support offload); + * - create a device bound XDP program with BPF_F_XDP_DEV_BOUND_ONLY flag + *   (such programs are not offloaded); + * - create a device bound XDP program without flags (such programs are offloaded). + * This might lead to 'BUG: kernel NULL pointer dereference'. + */ +void test_xdp_dev_bound_only_offdev(void) +{ +	struct nstoken *tok = NULL; +	__u32 ifindex; +	int fd1 = -1; +	int fd2 = -1; + +	SYS(out, "ip netns add " LOCAL_NETNS); +	tok = open_netns(LOCAL_NETNS); +	if (!ASSERT_OK_PTR(tok, "open_netns")) +		goto out; +	SYS(out, "ip link add eth42 type veth"); +	ifindex = if_nametoindex("eth42"); +	if (!ASSERT_NEQ(ifindex, 0, "if_nametoindex")) { +		perror("if_nametoindex"); +		goto out; +	} +	fd1 = load_dummy_prog("dummy1", ifindex, BPF_F_XDP_DEV_BOUND_ONLY); +	if (!ASSERT_GE(fd1, 0, "load_dummy_prog #1")) { +		perror("load_dummy_prog #1"); +		goto out; +	} +	/* Program with ifindex is considered offloaded, however veth +	 * does not support offload => error should be reported. +	 */ +	fd2 = load_dummy_prog("dummy2", ifindex, 0); +	ASSERT_EQ(fd2, -EINVAL, "load_dummy_prog #2 (offloaded)"); + +out: +	close(fd1); +	close(fd2); +	close_netns(tok); +	/* eth42 was added inside netns, removing the netns will +	 * also remove eth42 veth pair. +	 */ +	SYS_NOFAIL("ip netns del " LOCAL_NETNS); +} |