Loading...
Note: File does not exist in v5.4.
1// SPDX-License-Identifier: GPL-2.0-only
2/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
3#include <stdlib.h>
4#include <test_progs.h>
5#include <bpf/btf.h>
6
7#define str_has_pfx(str, pfx) \
8 (strncmp(str, pfx, __builtin_constant_p(pfx) ? sizeof(pfx) - 1 : strlen(pfx)) == 0)
9
10#define TEST_LOADER_LOG_BUF_SZ 1048576
11
12#define TEST_TAG_EXPECT_FAILURE "comment:test_expect_failure"
13#define TEST_TAG_EXPECT_SUCCESS "comment:test_expect_success"
14#define TEST_TAG_EXPECT_MSG_PFX "comment:test_expect_msg="
15#define TEST_TAG_LOG_LEVEL_PFX "comment:test_log_level="
16
17struct test_spec {
18 const char *name;
19 bool expect_failure;
20 const char *expect_msg;
21 int log_level;
22};
23
24static int tester_init(struct test_loader *tester)
25{
26 if (!tester->log_buf) {
27 tester->log_buf_sz = TEST_LOADER_LOG_BUF_SZ;
28 tester->log_buf = malloc(tester->log_buf_sz);
29 if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf"))
30 return -ENOMEM;
31 }
32
33 return 0;
34}
35
36void test_loader_fini(struct test_loader *tester)
37{
38 if (!tester)
39 return;
40
41 free(tester->log_buf);
42}
43
44static int parse_test_spec(struct test_loader *tester,
45 struct bpf_object *obj,
46 struct bpf_program *prog,
47 struct test_spec *spec)
48{
49 struct btf *btf;
50 int func_id, i;
51
52 memset(spec, 0, sizeof(*spec));
53
54 spec->name = bpf_program__name(prog);
55
56 btf = bpf_object__btf(obj);
57 if (!btf) {
58 ASSERT_FAIL("BPF object has no BTF");
59 return -EINVAL;
60 }
61
62 func_id = btf__find_by_name_kind(btf, spec->name, BTF_KIND_FUNC);
63 if (func_id < 0) {
64 ASSERT_FAIL("failed to find FUNC BTF type for '%s'", spec->name);
65 return -EINVAL;
66 }
67
68 for (i = 1; i < btf__type_cnt(btf); i++) {
69 const struct btf_type *t;
70 const char *s;
71
72 t = btf__type_by_id(btf, i);
73 if (!btf_is_decl_tag(t))
74 continue;
75
76 if (t->type != func_id || btf_decl_tag(t)->component_idx != -1)
77 continue;
78
79 s = btf__str_by_offset(btf, t->name_off);
80 if (strcmp(s, TEST_TAG_EXPECT_FAILURE) == 0) {
81 spec->expect_failure = true;
82 } else if (strcmp(s, TEST_TAG_EXPECT_SUCCESS) == 0) {
83 spec->expect_failure = false;
84 } else if (str_has_pfx(s, TEST_TAG_EXPECT_MSG_PFX)) {
85 spec->expect_msg = s + sizeof(TEST_TAG_EXPECT_MSG_PFX) - 1;
86 } else if (str_has_pfx(s, TEST_TAG_LOG_LEVEL_PFX)) {
87 errno = 0;
88 spec->log_level = strtol(s + sizeof(TEST_TAG_LOG_LEVEL_PFX) - 1, NULL, 0);
89 if (errno) {
90 ASSERT_FAIL("failed to parse test log level from '%s'", s);
91 return -EINVAL;
92 }
93 }
94 }
95
96 return 0;
97}
98
99static void prepare_case(struct test_loader *tester,
100 struct test_spec *spec,
101 struct bpf_object *obj,
102 struct bpf_program *prog)
103{
104 int min_log_level = 0;
105
106 if (env.verbosity > VERBOSE_NONE)
107 min_log_level = 1;
108 if (env.verbosity > VERBOSE_VERY)
109 min_log_level = 2;
110
111 bpf_program__set_log_buf(prog, tester->log_buf, tester->log_buf_sz);
112
113 /* Make sure we set at least minimal log level, unless test requirest
114 * even higher level already. Make sure to preserve independent log
115 * level 4 (verifier stats), though.
116 */
117 if ((spec->log_level & 3) < min_log_level)
118 bpf_program__set_log_level(prog, (spec->log_level & 4) | min_log_level);
119 else
120 bpf_program__set_log_level(prog, spec->log_level);
121
122 tester->log_buf[0] = '\0';
123}
124
125static void emit_verifier_log(const char *log_buf, bool force)
126{
127 if (!force && env.verbosity == VERBOSE_NONE)
128 return;
129 fprintf(stdout, "VERIFIER LOG:\n=============\n%s=============\n", log_buf);
130}
131
132static void validate_case(struct test_loader *tester,
133 struct test_spec *spec,
134 struct bpf_object *obj,
135 struct bpf_program *prog,
136 int load_err)
137{
138 if (spec->expect_msg) {
139 char *match;
140
141 match = strstr(tester->log_buf, spec->expect_msg);
142 if (!ASSERT_OK_PTR(match, "expect_msg")) {
143 /* if we are in verbose mode, we've already emitted log */
144 if (env.verbosity == VERBOSE_NONE)
145 emit_verifier_log(tester->log_buf, true /*force*/);
146 fprintf(stderr, "EXPECTED MSG: '%s'\n", spec->expect_msg);
147 return;
148 }
149 }
150}
151
152/* this function is forced noinline and has short generic name to look better
153 * in test_progs output (in case of a failure)
154 */
155static noinline
156void run_subtest(struct test_loader *tester,
157 const char *skel_name,
158 skel_elf_bytes_fn elf_bytes_factory)
159{
160 LIBBPF_OPTS(bpf_object_open_opts, open_opts, .object_name = skel_name);
161 struct bpf_object *obj = NULL, *tobj;
162 struct bpf_program *prog, *tprog;
163 const void *obj_bytes;
164 size_t obj_byte_cnt;
165 int err;
166
167 if (tester_init(tester) < 0)
168 return; /* failed to initialize tester */
169
170 obj_bytes = elf_bytes_factory(&obj_byte_cnt);
171 obj = bpf_object__open_mem(obj_bytes, obj_byte_cnt, &open_opts);
172 if (!ASSERT_OK_PTR(obj, "obj_open_mem"))
173 return;
174
175 bpf_object__for_each_program(prog, obj) {
176 const char *prog_name = bpf_program__name(prog);
177 struct test_spec spec;
178
179 if (!test__start_subtest(prog_name))
180 continue;
181
182 /* if we can't derive test specification, go to the next test */
183 err = parse_test_spec(tester, obj, prog, &spec);
184 if (!ASSERT_OK(err, "parse_test_spec"))
185 continue;
186
187 tobj = bpf_object__open_mem(obj_bytes, obj_byte_cnt, &open_opts);
188 if (!ASSERT_OK_PTR(tobj, "obj_open_mem")) /* shouldn't happen */
189 continue;
190
191 bpf_object__for_each_program(tprog, tobj)
192 bpf_program__set_autoload(tprog, false);
193
194 bpf_object__for_each_program(tprog, tobj) {
195 /* only load specified program */
196 if (strcmp(bpf_program__name(tprog), prog_name) == 0) {
197 bpf_program__set_autoload(tprog, true);
198 break;
199 }
200 }
201
202 prepare_case(tester, &spec, tobj, tprog);
203
204 err = bpf_object__load(tobj);
205 if (spec.expect_failure) {
206 if (!ASSERT_ERR(err, "unexpected_load_success")) {
207 emit_verifier_log(tester->log_buf, false /*force*/);
208 goto tobj_cleanup;
209 }
210 } else {
211 if (!ASSERT_OK(err, "unexpected_load_failure")) {
212 emit_verifier_log(tester->log_buf, true /*force*/);
213 goto tobj_cleanup;
214 }
215 }
216
217 emit_verifier_log(tester->log_buf, false /*force*/);
218 validate_case(tester, &spec, tobj, tprog, err);
219
220tobj_cleanup:
221 bpf_object__close(tobj);
222 }
223
224 bpf_object__close(obj);
225}
226
227void test_loader__run_subtests(struct test_loader *tester,
228 const char *skel_name,
229 skel_elf_bytes_fn elf_bytes_factory)
230{
231 /* see comment in run_subtest() for why we do this function nesting */
232 run_subtest(tester, skel_name, elf_bytes_factory);
233}