forked from mirrors/linux
The function bpf_test_init() now returns an error if user_size (.data_size_in) is less than ETH_HLEN, causing the tests to fail. Adjust the data size to ensure it meets the requirement of ETH_HLEN. Signed-off-by: Shigeru Yoshida <syoshida@redhat.com> Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Link: https://patch.msgid.link/20250121150643.671650-2-syoshida@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
149 lines
4.7 KiB
C
149 lines
4.7 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <uapi/linux/bpf.h>
|
|
#include <linux/if_link.h>
|
|
#include <test_progs.h>
|
|
#include <network_helpers.h>
|
|
|
|
#include "test_xdp_with_cpumap_frags_helpers.skel.h"
|
|
#include "test_xdp_with_cpumap_helpers.skel.h"
|
|
|
|
#define IFINDEX_LO 1
|
|
#define TEST_NS "cpu_attach_ns"
|
|
|
|
static void test_xdp_with_cpumap_helpers(void)
|
|
{
|
|
struct test_xdp_with_cpumap_helpers *skel = NULL;
|
|
struct bpf_prog_info info = {};
|
|
__u32 len = sizeof(info);
|
|
struct bpf_cpumap_val val = {
|
|
.qsize = 192,
|
|
};
|
|
int err, prog_fd, prog_redir_fd, map_fd;
|
|
struct nstoken *nstoken = NULL;
|
|
__u32 idx = 0;
|
|
|
|
SYS(out_close, "ip netns add %s", TEST_NS);
|
|
nstoken = open_netns(TEST_NS);
|
|
if (!ASSERT_OK_PTR(nstoken, "open_netns"))
|
|
goto out_close;
|
|
SYS(out_close, "ip link set dev lo up");
|
|
|
|
skel = test_xdp_with_cpumap_helpers__open_and_load();
|
|
if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
|
|
return;
|
|
|
|
prog_redir_fd = bpf_program__fd(skel->progs.xdp_redir_prog);
|
|
err = bpf_xdp_attach(IFINDEX_LO, prog_redir_fd, XDP_FLAGS_SKB_MODE, NULL);
|
|
if (!ASSERT_OK(err, "Generic attach of program with 8-byte CPUMAP"))
|
|
goto out_close;
|
|
|
|
prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
|
|
map_fd = bpf_map__fd(skel->maps.cpu_map);
|
|
err = bpf_prog_get_info_by_fd(prog_fd, &info, &len);
|
|
if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
|
|
goto out_close;
|
|
|
|
val.bpf_prog.fd = prog_fd;
|
|
err = bpf_map_update_elem(map_fd, &idx, &val, 0);
|
|
ASSERT_OK(err, "Add program to cpumap entry");
|
|
|
|
err = bpf_map_lookup_elem(map_fd, &idx, &val);
|
|
ASSERT_OK(err, "Read cpumap entry");
|
|
ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to cpumap entry prog_id");
|
|
|
|
/* send a packet to trigger any potential bugs in there */
|
|
char data[ETH_HLEN] = {};
|
|
DECLARE_LIBBPF_OPTS(bpf_test_run_opts, opts,
|
|
.data_in = &data,
|
|
.data_size_in = sizeof(data),
|
|
.flags = BPF_F_TEST_XDP_LIVE_FRAMES,
|
|
.repeat = 1,
|
|
);
|
|
err = bpf_prog_test_run_opts(prog_redir_fd, &opts);
|
|
ASSERT_OK(err, "XDP test run");
|
|
|
|
/* wait for the packets to be flushed, then check that redirect has been
|
|
* performed
|
|
*/
|
|
kern_sync_rcu();
|
|
ASSERT_NEQ(skel->bss->redirect_count, 0, "redirected packets");
|
|
|
|
err = bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
|
|
ASSERT_OK(err, "XDP program detach");
|
|
|
|
/* can not attach BPF_XDP_CPUMAP program to a device */
|
|
err = bpf_xdp_attach(IFINDEX_LO, prog_fd, XDP_FLAGS_SKB_MODE, NULL);
|
|
if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_CPUMAP program"))
|
|
bpf_xdp_detach(IFINDEX_LO, XDP_FLAGS_SKB_MODE, NULL);
|
|
|
|
val.qsize = 192;
|
|
val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_prog);
|
|
err = bpf_map_update_elem(map_fd, &idx, &val, 0);
|
|
ASSERT_NEQ(err, 0, "Add non-BPF_XDP_CPUMAP program to cpumap entry");
|
|
|
|
/* Try to attach BPF_XDP program with frags to cpumap when we have
|
|
* already loaded a BPF_XDP program on the map
|
|
*/
|
|
idx = 1;
|
|
val.qsize = 192;
|
|
val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
|
|
err = bpf_map_update_elem(map_fd, &idx, &val, 0);
|
|
ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to cpumap entry");
|
|
|
|
out_close:
|
|
close_netns(nstoken);
|
|
SYS_NOFAIL("ip netns del %s", TEST_NS);
|
|
test_xdp_with_cpumap_helpers__destroy(skel);
|
|
}
|
|
|
|
static void test_xdp_with_cpumap_frags_helpers(void)
|
|
{
|
|
struct test_xdp_with_cpumap_frags_helpers *skel;
|
|
struct bpf_prog_info info = {};
|
|
__u32 len = sizeof(info);
|
|
struct bpf_cpumap_val val = {
|
|
.qsize = 192,
|
|
};
|
|
int err, frags_prog_fd, map_fd;
|
|
__u32 idx = 0;
|
|
|
|
skel = test_xdp_with_cpumap_frags_helpers__open_and_load();
|
|
if (!ASSERT_OK_PTR(skel, "test_xdp_with_cpumap_helpers__open_and_load"))
|
|
return;
|
|
|
|
frags_prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags);
|
|
map_fd = bpf_map__fd(skel->maps.cpu_map);
|
|
err = bpf_prog_get_info_by_fd(frags_prog_fd, &info, &len);
|
|
if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd"))
|
|
goto out_close;
|
|
|
|
val.bpf_prog.fd = frags_prog_fd;
|
|
err = bpf_map_update_elem(map_fd, &idx, &val, 0);
|
|
ASSERT_OK(err, "Add program to cpumap entry");
|
|
|
|
err = bpf_map_lookup_elem(map_fd, &idx, &val);
|
|
ASSERT_OK(err, "Read cpumap entry");
|
|
ASSERT_EQ(info.id, val.bpf_prog.id,
|
|
"Match program id to cpumap entry prog_id");
|
|
|
|
/* Try to attach BPF_XDP program to cpumap when we have
|
|
* already loaded a BPF_XDP program with frags on the map
|
|
*/
|
|
idx = 1;
|
|
val.qsize = 192;
|
|
val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_dummy_cm);
|
|
err = bpf_map_update_elem(map_fd, &idx, &val, 0);
|
|
ASSERT_NEQ(err, 0, "Add BPF_XDP program to cpumap entry");
|
|
|
|
out_close:
|
|
test_xdp_with_cpumap_frags_helpers__destroy(skel);
|
|
}
|
|
|
|
void test_xdp_cpumap_attach(void)
|
|
{
|
|
if (test__start_subtest("CPUMAP with programs in entries"))
|
|
test_xdp_with_cpumap_helpers();
|
|
|
|
if (test__start_subtest("CPUMAP with frags programs in entries"))
|
|
test_xdp_with_cpumap_frags_helpers();
|
|
}
|