Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1// SPDX-License-Identifier: GPL-2.0
2#include <uapi/linux/bpf.h>
3#include <linux/if_link.h>
4#include <test_progs.h>
5#include <network_helpers.h>
6
7#include "test_xdp_with_cpumap_frags_helpers.skel.h"
8#include "test_xdp_with_cpumap_helpers.skel.h"
9
10#define IFINDEX_LO 1
11#define TEST_NS "cpu_attach_ns"
12
13static void test_xdp_with_cpumap_helpers(void)
14{
15 struct test_xdp_with_cpumap_helpers *skel = NULL;
16 struct bpf_prog_info info = {};
17 __u32 len = sizeof(info);
18 struct bpf_cpumap_val val = {
19 .qsize = 192,
20 };
21 int err, prog_fd, prog_redir_fd, map_fd, bad_fd;
22 struct nstoken *nstoken = NULL;
23 __u32 idx = 0;
24
25 SYS(out_close, "ip netns add %s", TEST_NS);
26 nstoken = open_netns(TEST_NS);
27 if (!ASSERT_OK_PTR(nstoken, "open_netns"))
28 goto out_close;
29 SYS(out_close, "ip link set dev lo up");
30
31 skel = test_xdp_with_cpumap_helpers__open_and_load();
32 if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
33 return;
34
35 prog_redir_fd = bpf_program__fd(skel->progs.xdp_redir_prog);
36 err = bpf_xdp_attach(IFINDEX_LO, prog_redir_fd, XDP_FLAGS_SKB_MODE, NULL);
37 if (!ASSERT_OK(err, "Generic attach of program with 8-byte CPUMAP"))
38 goto out_close;
39
40 prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
41 map_fd = bpf_map__fd(skel->maps.cpu_map);
42 err = bpf_prog_get_info_by_fd(prog_fd, &info, &len);
43 if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
44 goto out_close;
45
46 val.bpf_prog.fd = prog_fd;
47 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
48 ASSERT_OK(err, "Add program to cpumap entry");
49
50 err = bpf_map_lookup_elem(map_fd, &idx, &val);
51 ASSERT_OK(err, "Read cpumap entry");
52 ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to cpumap entry prog_id");
53
54 /* send a packet to trigger any potential bugs in there */
55 char data[ETH_HLEN] = {};
56 DECLARE_LIBBPF_OPTS(bpf_test_run_opts, opts,
57 .data_in = &data,
58 .data_size_in = sizeof(data),
59 .flags = BPF_F_TEST_XDP_LIVE_FRAMES,
60 .repeat = 1,
61 );
62 err = bpf_prog_test_run_opts(prog_redir_fd, &opts);
63 ASSERT_OK(err, "XDP test run");
64
65 /* wait for the packets to be flushed, then check that redirect has been
66 * performed
67 */
68 kern_sync_rcu();
69 ASSERT_NEQ(skel->bss->redirect_count, 0, "redirected packets");
70
71 err = bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
72 ASSERT_OK(err, "XDP program detach");
73
74 /* can not attach BPF_XDP_CPUMAP program to a device */
75 err = bpf_xdp_attach(IFINDEX_LO, prog_fd, XDP_FLAGS_SKB_MODE, NULL);
76 if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_CPUMAP program"))
77 bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
78
79 val.qsize = 192;
80 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_prog);
81 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
82 ASSERT_EQ(err, -EINVAL, "Add non-BPF_XDP_CPUMAP program to cpumap entry");
83
84 /* Try to attach non-BPF file descriptor */
85 bad_fd = open("/dev/null", O_RDONLY);
86 ASSERT_GE(bad_fd, 0, "Open /dev/null for non-BPF fd");
87
88 val.bpf_prog.fd = bad_fd;
89 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
90 ASSERT_EQ(err, -EINVAL, "Add non-BPF fd to cpumap entry");
91
92 /* Try to attach nonexistent file descriptor */
93 err = close(bad_fd);
94 ASSERT_EQ(err, 0, "Close non-BPF fd for nonexistent fd");
95
96 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
97 ASSERT_EQ(err, -EBADF, "Add nonexistent fd to cpumap entry");
98
99 /* Try to attach BPF_XDP program with frags to cpumap when we have
100 * already loaded a BPF_XDP program on the map
101 */
102 idx = 1;
103 val.qsize = 192;
104 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
105 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
106 ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to cpumap entry");
107
108out_close:
109 close_netns(nstoken);
110 SYS_NOFAIL("ip netns del %s", TEST_NS);
111 test_xdp_with_cpumap_helpers__destroy(skel);
112}
113
114static void test_xdp_with_cpumap_frags_helpers(void)
115{
116 struct test_xdp_with_cpumap_frags_helpers *skel;
117 struct bpf_prog_info info = {};
118 __u32 len = sizeof(info);
119 struct bpf_cpumap_val val = {
120 .qsize = 192,
121 };
122 int err, frags_prog_fd, map_fd;
123 __u32 idx = 0;
124
125 skel = test_xdp_with_cpumap_frags_helpers__open_and_load();
126 if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
127 return;
128
129 frags_prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
130 map_fd = bpf_map__fd(skel->maps.cpu_map);
131 err = bpf_prog_get_info_by_fd(frags_prog_fd, &info, &len);
132 if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
133 goto out_close;
134
135 val.bpf_prog.fd = frags_prog_fd;
136 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
137 ASSERT_OK(err, "Add program to cpumap entry");
138
139 err = bpf_map_lookup_elem(map_fd, &idx, &val);
140 ASSERT_OK(err, "Read cpumap entry");
141 ASSERT_EQ(info.id, val.bpf_prog.id,
142 "Match program id to cpumap entry prog_id");
143
144 /* Try to attach BPF_XDP program to cpumap when we have
145 * already loaded a BPF_XDP program with frags on the map
146 */
147 idx = 1;
148 val.qsize = 192;
149 val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
150 err = bpf_map_update_elem(map_fd, &idx, &val, 0);
151 ASSERT_NEQ(err, 0, "Add BPF_XDP program to cpumap entry");
152
153out_close:
154 test_xdp_with_cpumap_frags_helpers__destroy(skel);
155}
156
157void test_xdp_cpumap_attach(void)
158{
159 if (test__start_subtest("CPUMAP with programs in entries"))
160 test_xdp_with_cpumap_helpers();
161
162 if (test__start_subtest("CPUMAP with frags programs in entries"))
163 test_xdp_with_cpumap_frags_helpers();
164}