Loading...
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2020 Facebook */
3#include <test_progs.h>
4#include "test_global_func1.skel.h"
5#include "test_global_func2.skel.h"
6#include "test_global_func3.skel.h"
7#include "test_global_func4.skel.h"
8#include "test_global_func5.skel.h"
9#include "test_global_func6.skel.h"
10#include "test_global_func7.skel.h"
11#include "test_global_func8.skel.h"
12#include "test_global_func9.skel.h"
13#include "test_global_func10.skel.h"
14#include "test_global_func11.skel.h"
15#include "test_global_func12.skel.h"
16#include "test_global_func13.skel.h"
17#include "test_global_func14.skel.h"
18#include "test_global_func15.skel.h"
19#include "test_global_func16.skel.h"
20#include "test_global_func17.skel.h"
21#include "test_global_func_ctx_args.skel.h"
22
23#include "bpf/libbpf_internal.h"
24#include "btf_helpers.h"
25
26static void check_ctx_arg_type(const struct btf *btf, const struct btf_param *p)
27{
28 const struct btf_type *t;
29 const char *s;
30
31 t = btf__type_by_id(btf, p->type);
32 if (!ASSERT_EQ(btf_kind(t), BTF_KIND_PTR, "ptr_t"))
33 return;
34
35 s = btf_type_raw_dump(btf, t->type);
36 if (!ASSERT_HAS_SUBSTR(s, "STRUCT 'bpf_perf_event_data' size=0 vlen=0",
37 "ctx_struct_t"))
38 return;
39}
40
41static void subtest_ctx_arg_rewrite(void)
42{
43 struct test_global_func_ctx_args *skel = NULL;
44 struct bpf_prog_info info;
45 char func_info_buf[1024] __attribute__((aligned(8)));
46 struct bpf_func_info_min *rec;
47 struct btf *btf = NULL;
48 __u32 info_len = sizeof(info);
49 int err, fd, i;
50 struct btf *kern_btf = NULL;
51
52 kern_btf = btf__load_vmlinux_btf();
53 if (!ASSERT_OK_PTR(kern_btf, "kern_btf_load"))
54 return;
55
56 /* simple detection of kernel native arg:ctx tag support */
57 if (btf__find_by_name_kind(kern_btf, "bpf_subprog_arg_info", BTF_KIND_STRUCT) > 0) {
58 test__skip();
59 btf__free(kern_btf);
60 return;
61 }
62 btf__free(kern_btf);
63
64 skel = test_global_func_ctx_args__open();
65 if (!ASSERT_OK_PTR(skel, "skel_open"))
66 return;
67
68 bpf_program__set_autoload(skel->progs.arg_tag_ctx_perf, true);
69
70 err = test_global_func_ctx_args__load(skel);
71 if (!ASSERT_OK(err, "skel_load"))
72 goto out;
73
74 memset(&info, 0, sizeof(info));
75 info.func_info = ptr_to_u64(&func_info_buf);
76 info.nr_func_info = 3;
77 info.func_info_rec_size = sizeof(struct bpf_func_info_min);
78
79 fd = bpf_program__fd(skel->progs.arg_tag_ctx_perf);
80 err = bpf_prog_get_info_by_fd(fd, &info, &info_len);
81 if (!ASSERT_OK(err, "prog_info"))
82 goto out;
83
84 if (!ASSERT_EQ(info.nr_func_info, 3, "nr_func_info"))
85 goto out;
86
87 btf = btf__load_from_kernel_by_id(info.btf_id);
88 if (!ASSERT_OK_PTR(btf, "obj_kern_btf"))
89 goto out;
90
91 rec = (struct bpf_func_info_min *)func_info_buf;
92 for (i = 0; i < info.nr_func_info; i++, rec = (void *)rec + info.func_info_rec_size) {
93 const struct btf_type *fn_t, *proto_t;
94 const char *name;
95
96 if (rec->insn_off == 0)
97 continue; /* main prog, skip */
98
99 fn_t = btf__type_by_id(btf, rec->type_id);
100 if (!ASSERT_OK_PTR(fn_t, "fn_type"))
101 goto out;
102 if (!ASSERT_EQ(btf_kind(fn_t), BTF_KIND_FUNC, "fn_type_kind"))
103 goto out;
104 proto_t = btf__type_by_id(btf, fn_t->type);
105 if (!ASSERT_OK_PTR(proto_t, "proto_type"))
106 goto out;
107
108 name = btf__name_by_offset(btf, fn_t->name_off);
109 if (strcmp(name, "subprog_ctx_tag") == 0) {
110 /* int subprog_ctx_tag(void *ctx __arg_ctx) */
111 if (!ASSERT_EQ(btf_vlen(proto_t), 1, "arg_cnt"))
112 goto out;
113
114 /* arg 0 is PTR -> STRUCT bpf_perf_event_data */
115 check_ctx_arg_type(btf, &btf_params(proto_t)[0]);
116 } else if (strcmp(name, "subprog_multi_ctx_tags") == 0) {
117 /* int subprog_multi_ctx_tags(void *ctx1 __arg_ctx,
118 * struct my_struct *mem,
119 * void *ctx2 __arg_ctx)
120 */
121 if (!ASSERT_EQ(btf_vlen(proto_t), 3, "arg_cnt"))
122 goto out;
123
124 /* arg 0 is PTR -> STRUCT bpf_perf_event_data */
125 check_ctx_arg_type(btf, &btf_params(proto_t)[0]);
126 /* arg 2 is PTR -> STRUCT bpf_perf_event_data */
127 check_ctx_arg_type(btf, &btf_params(proto_t)[2]);
128 } else {
129 ASSERT_FAIL("unexpected subprog %s", name);
130 goto out;
131 }
132 }
133
134out:
135 btf__free(btf);
136 test_global_func_ctx_args__destroy(skel);
137}
138
139void test_test_global_funcs(void)
140{
141 RUN_TESTS(test_global_func1);
142 RUN_TESTS(test_global_func2);
143 RUN_TESTS(test_global_func3);
144 RUN_TESTS(test_global_func4);
145 RUN_TESTS(test_global_func5);
146 RUN_TESTS(test_global_func6);
147 RUN_TESTS(test_global_func7);
148 RUN_TESTS(test_global_func8);
149 RUN_TESTS(test_global_func9);
150 RUN_TESTS(test_global_func10);
151 RUN_TESTS(test_global_func11);
152 RUN_TESTS(test_global_func12);
153 RUN_TESTS(test_global_func13);
154 RUN_TESTS(test_global_func14);
155 RUN_TESTS(test_global_func15);
156 RUN_TESTS(test_global_func16);
157 RUN_TESTS(test_global_func17);
158 RUN_TESTS(test_global_func_ctx_args);
159
160 if (test__start_subtest("ctx_arg_rewrite"))
161 subtest_ctx_arg_rewrite();
162}
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2020 Facebook */
3#include <test_progs.h>
4
5const char *err_str;
6bool found;
7
8static int libbpf_debug_print(enum libbpf_print_level level,
9 const char *format, va_list args)
10{
11 char *log_buf;
12
13 if (level != LIBBPF_WARN ||
14 strcmp(format, "libbpf: \n%s\n")) {
15 vprintf(format, args);
16 return 0;
17 }
18
19 log_buf = va_arg(args, char *);
20 if (!log_buf)
21 goto out;
22 if (err_str && strstr(log_buf, err_str) == 0)
23 found = true;
24out:
25 printf(format, log_buf);
26 return 0;
27}
28
29extern int extra_prog_load_log_flags;
30
31static int check_load(const char *file)
32{
33 struct bpf_prog_load_attr attr;
34 struct bpf_object *obj = NULL;
35 int err, prog_fd;
36
37 memset(&attr, 0, sizeof(struct bpf_prog_load_attr));
38 attr.file = file;
39 attr.prog_type = BPF_PROG_TYPE_UNSPEC;
40 attr.log_level = extra_prog_load_log_flags;
41 attr.prog_flags = BPF_F_TEST_RND_HI32;
42 found = false;
43 err = bpf_prog_load_xattr(&attr, &obj, &prog_fd);
44 bpf_object__close(obj);
45 return err;
46}
47
48struct test_def {
49 const char *file;
50 const char *err_str;
51};
52
53void test_test_global_funcs(void)
54{
55 struct test_def tests[] = {
56 { "test_global_func1.o", "combined stack size of 4 calls is 544" },
57 { "test_global_func2.o" },
58 { "test_global_func3.o" , "the call stack of 8 frames" },
59 { "test_global_func4.o" },
60 { "test_global_func5.o" , "expected pointer to ctx, but got PTR" },
61 { "test_global_func6.o" , "modified ctx ptr R2" },
62 { "test_global_func7.o" , "foo() doesn't return scalar" },
63 { "test_global_func8.o" },
64 { "test_global_func9.o" },
65 { "test_global_func10.o", "invalid indirect read from stack" },
66 { "test_global_func11.o", "Caller passes invalid args into func#1" },
67 { "test_global_func12.o", "invalid mem access 'mem_or_null'" },
68 { "test_global_func13.o", "Caller passes invalid args into func#1" },
69 { "test_global_func14.o", "reference type('FWD S') size cannot be determined" },
70 { "test_global_func15.o", "At program exit the register R0 has value" },
71 { "test_global_func16.o", "invalid indirect read from stack" },
72 };
73 libbpf_print_fn_t old_print_fn = NULL;
74 int err, i, duration = 0;
75
76 old_print_fn = libbpf_set_print(libbpf_debug_print);
77
78 for (i = 0; i < ARRAY_SIZE(tests); i++) {
79 const struct test_def *test = &tests[i];
80
81 if (!test__start_subtest(test->file))
82 continue;
83
84 err_str = test->err_str;
85 err = check_load(test->file);
86 CHECK_FAIL(!!err ^ !!err_str);
87 if (err_str)
88 CHECK(found, "", "expected string '%s'", err_str);
89 }
90 libbpf_set_print(old_print_fn);
91}