Linux Audio

Check our new training course

Loading...
Note: File does not exist in v5.4.
  1// SPDX-License-Identifier: GPL-2.0
  2
  3/*
  4 * Copyright (c) 2022 Facebook
  5 * Copyright (C) 2022 Huawei Technologies Duesseldorf GmbH
  6 *
  7 * Author: Roberto Sassu <roberto.sassu@huawei.com>
  8 */
  9
 10#include <test_progs.h>
 11#include "test_kfunc_dynptr_param.skel.h"
 12
 13static size_t log_buf_sz = 1048576; /* 1 MB */
 14static char obj_log_buf[1048576];
 15
 16static struct {
 17	const char *prog_name;
 18	const char *expected_verifier_err_msg;
 19	int expected_runtime_err;
 20} kfunc_dynptr_tests[] = {
 21	{"not_valid_dynptr", "Expected an initialized dynptr as arg #1", 0},
 22	{"not_ptr_to_stack", "arg#0 expected pointer to stack or dynptr_ptr", 0},
 23	{"dynptr_data_null", NULL, -EBADMSG},
 24};
 25
 26static bool kfunc_not_supported;
 27
 28static int libbpf_print_cb(enum libbpf_print_level level, const char *fmt,
 29			   va_list args)
 30{
 31	if (strcmp(fmt, "libbpf: extern (func ksym) '%s': not found in kernel or module BTFs\n"))
 32		return 0;
 33
 34	if (strcmp(va_arg(args, char *), "bpf_verify_pkcs7_signature"))
 35		return 0;
 36
 37	kfunc_not_supported = true;
 38	return 0;
 39}
 40
 41static void verify_fail(const char *prog_name, const char *expected_err_msg)
 42{
 43	struct test_kfunc_dynptr_param *skel;
 44	LIBBPF_OPTS(bpf_object_open_opts, opts);
 45	libbpf_print_fn_t old_print_cb;
 46	struct bpf_program *prog;
 47	int err;
 48
 49	opts.kernel_log_buf = obj_log_buf;
 50	opts.kernel_log_size = log_buf_sz;
 51	opts.kernel_log_level = 1;
 52
 53	skel = test_kfunc_dynptr_param__open_opts(&opts);
 54	if (!ASSERT_OK_PTR(skel, "test_kfunc_dynptr_param__open_opts"))
 55		goto cleanup;
 56
 57	prog = bpf_object__find_program_by_name(skel->obj, prog_name);
 58	if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
 59		goto cleanup;
 60
 61	bpf_program__set_autoload(prog, true);
 62
 63	bpf_map__set_max_entries(skel->maps.ringbuf, getpagesize());
 64
 65	kfunc_not_supported = false;
 66
 67	old_print_cb = libbpf_set_print(libbpf_print_cb);
 68	err = test_kfunc_dynptr_param__load(skel);
 69	libbpf_set_print(old_print_cb);
 70
 71	if (err < 0 && kfunc_not_supported) {
 72		fprintf(stderr,
 73		  "%s:SKIP:bpf_verify_pkcs7_signature() kfunc not supported\n",
 74		  __func__);
 75		test__skip();
 76		goto cleanup;
 77	}
 78
 79	if (!ASSERT_ERR(err, "unexpected load success"))
 80		goto cleanup;
 81
 82	if (!ASSERT_OK_PTR(strstr(obj_log_buf, expected_err_msg), "expected_err_msg")) {
 83		fprintf(stderr, "Expected err_msg: %s\n", expected_err_msg);
 84		fprintf(stderr, "Verifier output: %s\n", obj_log_buf);
 85	}
 86
 87cleanup:
 88	test_kfunc_dynptr_param__destroy(skel);
 89}
 90
 91static void verify_success(const char *prog_name, int expected_runtime_err)
 92{
 93	struct test_kfunc_dynptr_param *skel;
 94	libbpf_print_fn_t old_print_cb;
 95	struct bpf_program *prog;
 96	struct bpf_link *link;
 97	__u32 next_id;
 98	int err;
 99
100	skel = test_kfunc_dynptr_param__open();
101	if (!ASSERT_OK_PTR(skel, "test_kfunc_dynptr_param__open"))
102		return;
103
104	skel->bss->pid = getpid();
105
106	bpf_map__set_max_entries(skel->maps.ringbuf, getpagesize());
107
108	kfunc_not_supported = false;
109
110	old_print_cb = libbpf_set_print(libbpf_print_cb);
111	err = test_kfunc_dynptr_param__load(skel);
112	libbpf_set_print(old_print_cb);
113
114	if (err < 0 && kfunc_not_supported) {
115		fprintf(stderr,
116		  "%s:SKIP:bpf_verify_pkcs7_signature() kfunc not supported\n",
117		  __func__);
118		test__skip();
119		goto cleanup;
120	}
121
122	if (!ASSERT_OK(err, "test_kfunc_dynptr_param__load"))
123		goto cleanup;
124
125	prog = bpf_object__find_program_by_name(skel->obj, prog_name);
126	if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
127		goto cleanup;
128
129	link = bpf_program__attach(prog);
130	if (!ASSERT_OK_PTR(link, "bpf_program__attach"))
131		goto cleanup;
132
133	err = bpf_prog_get_next_id(0, &next_id);
134
135	bpf_link__destroy(link);
136
137	if (!ASSERT_OK(err, "bpf_prog_get_next_id"))
138		goto cleanup;
139
140	ASSERT_EQ(skel->bss->err, expected_runtime_err, "err");
141
142cleanup:
143	test_kfunc_dynptr_param__destroy(skel);
144}
145
146void test_kfunc_dynptr_param(void)
147{
148	int i;
149
150	for (i = 0; i < ARRAY_SIZE(kfunc_dynptr_tests); i++) {
151		if (!test__start_subtest(kfunc_dynptr_tests[i].prog_name))
152			continue;
153
154		if (kfunc_dynptr_tests[i].expected_verifier_err_msg)
155			verify_fail(kfunc_dynptr_tests[i].prog_name,
156			  kfunc_dynptr_tests[i].expected_verifier_err_msg);
157		else
158			verify_success(kfunc_dynptr_tests[i].prog_name,
159				kfunc_dynptr_tests[i].expected_runtime_err);
160	}
161}