1 // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
2 /* Copyright (C) 2019 Netronome Systems, Inc. */
3 /* Copyright (C) 2020 Facebook, Inc. */
9 #include <bpf/libbpf.h>
11 #include "test_progs.h"
12 #include "testing_helpers.h"
13 #include <linux/membarrier.h>
15 int parse_num_list(const char *s, bool **num_set, int *num_set_len)
17 int i, set_len = 0, new_len, num, start = 0, end = -1;
18 bool *set = NULL, *tmp, parsing_end = false;
23 num = strtol(s, &next, 10);
32 if (!parsing_end && *next == '-') {
36 } else if (*next == ',') {
40 } else if (*next == '\0') {
51 if (end + 1 > set_len) {
53 tmp = realloc(set, new_len);
58 for (i = set_len; i < start; i++)
63 for (i = start; i <= end; i++)
67 if (!set || parsing_end)
71 *num_set_len = set_len;
76 static int do_insert_test(struct test_filter_set *set,
80 struct test_filter *tmp, *test;
84 for (i = 0; i < set->cnt; i++) {
85 test = &set->tests[i];
87 if (strcmp(test_str, test->name) == 0) {
93 tmp = realloc(set->tests, sizeof(*test) * (set->cnt + 1));
98 test = &set->tests[set->cnt];
100 test->name = test_str;
101 test->subtests = NULL;
102 test->subtest_cnt = 0;
110 for (i = 0; i < test->subtest_cnt; i++) {
111 if (strcmp(subtest_str, test->subtests[i]) == 0) {
117 ctmp = realloc(test->subtests,
118 sizeof(*test->subtests) * (test->subtest_cnt + 1));
122 test->subtests = ctmp;
123 test->subtests[test->subtest_cnt] = subtest_str;
130 static int insert_test(struct test_filter_set *set,
132 bool is_glob_pattern)
134 char *pattern, *subtest_str, *ext_test_str, *ext_subtest_str = NULL;
137 if (is_glob_pattern) {
144 subtest_str = strchr(test_spec, '/');
150 ext_test_str = malloc(strlen(test_spec) + glob_chars + 1);
154 sprintf(ext_test_str, pattern, test_spec);
157 ext_subtest_str = malloc(strlen(subtest_str) + glob_chars + 1);
158 if (!ext_subtest_str)
161 sprintf(ext_subtest_str, pattern, subtest_str);
164 return do_insert_test(set, ext_test_str, ext_subtest_str);
168 free(ext_subtest_str);
173 int parse_test_list_file(const char *path,
174 struct test_filter_set *set,
175 bool is_glob_pattern)
177 char *buf = NULL, *capture_start, *capture_end, *scan_end;
182 f = fopen(path, "r");
185 fprintf(stderr, "Failed to open '%s': %d\n", path, err);
189 while (getline(&buf, &buflen, f) != -1) {
192 while (isspace(*capture_start))
195 capture_end = capture_start;
196 scan_end = capture_start;
198 while (*scan_end && *scan_end != '#') {
199 if (!isspace(*scan_end))
200 capture_end = scan_end;
205 if (capture_end == capture_start)
208 *(++capture_end) = '\0';
210 err = insert_test(set, capture_start, is_glob_pattern);
219 int parse_test_list(const char *s,
220 struct test_filter_set *set,
221 bool is_glob_pattern)
223 char *input, *state = NULL, *test_spec;
224 int err = 0, cnt = 0;
230 while ((test_spec = strtok_r(cnt++ ? NULL : input, ",", &state))) {
231 err = insert_test(set, test_spec, is_glob_pattern);
240 __u32 link_info_prog_id(const struct bpf_link *link, struct bpf_link_info *info)
242 __u32 info_len = sizeof(*info);
245 memset(info, 0, sizeof(*info));
246 err = bpf_link_get_info_by_fd(bpf_link__fd(link), info, &info_len);
248 printf("failed to get link info: %d\n", -errno);
251 return info->prog_id;
254 int extra_prog_load_log_flags = 0;
256 int testing_prog_flags(void)
258 static int cached_flags = -1;
259 static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS };
260 static struct bpf_insn insns[] = {
261 BPF_MOV64_IMM(BPF_REG_0, 0),
264 int insn_cnt = ARRAY_SIZE(insns), i, fd, flags = 0;
265 LIBBPF_OPTS(bpf_prog_load_opts, opts);
267 if (cached_flags >= 0)
270 for (i = 0; i < ARRAY_SIZE(prog_flags); i++) {
271 opts.prog_flags = prog_flags[i];
272 fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "flag-test", "GPL",
273 insns, insn_cnt, &opts);
275 flags |= prog_flags[i];
280 cached_flags = flags;
284 int bpf_prog_test_load(const char *file, enum bpf_prog_type type,
285 struct bpf_object **pobj, int *prog_fd)
287 LIBBPF_OPTS(bpf_object_open_opts, opts,
288 .kernel_log_level = extra_prog_load_log_flags,
290 struct bpf_object *obj;
291 struct bpf_program *prog;
295 obj = bpf_object__open_file(file, &opts);
299 prog = bpf_object__next_program(obj, NULL);
305 if (type != BPF_PROG_TYPE_UNSPEC && bpf_program__type(prog) != type)
306 bpf_program__set_type(prog, type);
308 flags = bpf_program__flags(prog) | testing_prog_flags();
309 bpf_program__set_flags(prog, flags);
311 err = bpf_object__load(obj);
316 *prog_fd = bpf_program__fd(prog);
320 bpf_object__close(obj);
324 int bpf_test_load_program(enum bpf_prog_type type, const struct bpf_insn *insns,
325 size_t insns_cnt, const char *license,
326 __u32 kern_version, char *log_buf,
329 LIBBPF_OPTS(bpf_prog_load_opts, opts,
330 .kern_version = kern_version,
331 .prog_flags = testing_prog_flags(),
332 .log_level = extra_prog_load_log_flags,
334 .log_size = log_buf_sz,
337 return bpf_prog_load(type, NULL, license, insns, insns_cnt, &opts);
340 __u64 read_perf_max_sample_freq(void)
342 __u64 sample_freq = 5000; /* fallback to 5000 on error */
345 f = fopen("/proc/sys/kernel/perf_event_max_sample_rate", "r");
347 printf("Failed to open /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
348 "return default value: 5000\n", -errno);
351 if (fscanf(f, "%llu", &sample_freq) != 1) {
352 printf("Failed to parse /proc/sys/kernel/perf_event_max_sample_rate: err %d\n"
353 "return default value: 5000\n", -errno);
360 int finit_module(int fd, const char *param_values, int flags)
362 return syscall(__NR_finit_module, fd, param_values, flags);
365 int delete_module(const char *name, int flags)
367 return syscall(__NR_delete_module, name, flags);
370 int unload_module(const char *name, bool verbose)
375 fprintf(stdout, "Failed to trigger kernel-side RCU sync!\n");
378 ret = delete_module(name, 0);
379 if (!ret || errno != EAGAIN)
382 fprintf(stdout, "Unload of %s timed out\n", name);
389 if (errno == ENOENT) {
391 fprintf(stdout, "%s.ko is already unloaded.\n", name);
394 fprintf(stdout, "Failed to unload %s.ko from kernel: %d\n", name, -errno);
398 fprintf(stdout, "Successfully unloaded %s.ko.\n", name);
402 int load_module(const char *path, bool verbose)
407 fprintf(stdout, "Loading %s...\n", path);
409 fd = open(path, O_RDONLY);
411 fprintf(stdout, "Can't find %s kernel module: %d\n", path, -errno);
414 if (finit_module(fd, "", 0)) {
415 fprintf(stdout, "Failed to load %s into the kernel: %d\n", path, -errno);
422 fprintf(stdout, "Successfully loaded %s.\n", path);
426 int unload_bpf_testmod(bool verbose)
428 return unload_module("bpf_testmod", verbose);
431 int load_bpf_testmod(bool verbose)
433 return load_module("bpf_testmod.ko", verbose);
437 * Trigger synchronize_rcu() in kernel.
439 int kern_sync_rcu(void)
441 return syscall(__NR_membarrier, MEMBARRIER_CMD_SHARED, 0, 0);
444 int get_xlated_program(int fd_prog, struct bpf_insn **buf, __u32 *cnt)
446 __u32 buf_element_size = sizeof(struct bpf_insn);
447 struct bpf_prog_info info = {};
448 __u32 info_len = sizeof(info);
449 __u32 xlated_prog_len;
451 if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
452 perror("bpf_prog_get_info_by_fd failed");
456 xlated_prog_len = info.xlated_prog_len;
457 if (xlated_prog_len % buf_element_size) {
458 printf("Program length %u is not multiple of %u\n",
459 xlated_prog_len, buf_element_size);
463 *cnt = xlated_prog_len / buf_element_size;
464 *buf = calloc(*cnt, buf_element_size);
466 perror("can't allocate xlated program buffer");
470 bzero(&info, sizeof(info));
471 info.xlated_prog_len = xlated_prog_len;
472 info.xlated_prog_insns = (__u64)(unsigned long)*buf;
473 if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) {
474 perror("second bpf_prog_get_info_by_fd failed");
486 bool is_jit_enabled(void)
488 const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable";
489 bool enabled = false;
492 sysctl_fd = open(jit_sysctl, O_RDONLY);
493 if (sysctl_fd != -1) {
496 if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1)
497 enabled = (tmpc != '0');