234 lines
6.1 KiB
C
234 lines
6.1 KiB
C
|
// SPDX-License-Identifier: GPL-2.0-only
|
||
|
/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
|
||
|
#include <stdlib.h>
|
||
|
#include <test_progs.h>
|
||
|
#include <bpf/btf.h>
|
||
|
|
||
|
#define str_has_pfx(str, pfx) \
|
||
|
(strncmp(str, pfx, __builtin_constant_p(pfx) ? sizeof(pfx) - 1 : strlen(pfx)) == 0)
|
||
|
|
||
|
#define TEST_LOADER_LOG_BUF_SZ 1048576
|
||
|
|
||
|
#define TEST_TAG_EXPECT_FAILURE "comment:test_expect_failure"
|
||
|
#define TEST_TAG_EXPECT_SUCCESS "comment:test_expect_success"
|
||
|
#define TEST_TAG_EXPECT_MSG_PFX "comment:test_expect_msg="
|
||
|
#define TEST_TAG_LOG_LEVEL_PFX "comment:test_log_level="
|
||
|
|
||
|
struct test_spec {
|
||
|
const char *name;
|
||
|
bool expect_failure;
|
||
|
const char *expect_msg;
|
||
|
int log_level;
|
||
|
};
|
||
|
|
||
|
static int tester_init(struct test_loader *tester)
|
||
|
{
|
||
|
if (!tester->log_buf) {
|
||
|
tester->log_buf_sz = TEST_LOADER_LOG_BUF_SZ;
|
||
|
tester->log_buf = malloc(tester->log_buf_sz);
|
||
|
if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf"))
|
||
|
return -ENOMEM;
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
void test_loader_fini(struct test_loader *tester)
|
||
|
{
|
||
|
if (!tester)
|
||
|
return;
|
||
|
|
||
|
free(tester->log_buf);
|
||
|
}
|
||
|
|
||
|
static int parse_test_spec(struct test_loader *tester,
|
||
|
struct bpf_object *obj,
|
||
|
struct bpf_program *prog,
|
||
|
struct test_spec *spec)
|
||
|
{
|
||
|
struct btf *btf;
|
||
|
int func_id, i;
|
||
|
|
||
|
memset(spec, 0, sizeof(*spec));
|
||
|
|
||
|
spec->name = bpf_program__name(prog);
|
||
|
|
||
|
btf = bpf_object__btf(obj);
|
||
|
if (!btf) {
|
||
|
ASSERT_FAIL("BPF object has no BTF");
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
|
||
|
func_id = btf__find_by_name_kind(btf, spec->name, BTF_KIND_FUNC);
|
||
|
if (func_id < 0) {
|
||
|
ASSERT_FAIL("failed to find FUNC BTF type for '%s'", spec->name);
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
|
||
|
for (i = 1; i < btf__type_cnt(btf); i++) {
|
||
|
const struct btf_type *t;
|
||
|
const char *s;
|
||
|
|
||
|
t = btf__type_by_id(btf, i);
|
||
|
if (!btf_is_decl_tag(t))
|
||
|
continue;
|
||
|
|
||
|
if (t->type != func_id || btf_decl_tag(t)->component_idx != -1)
|
||
|
continue;
|
||
|
|
||
|
s = btf__str_by_offset(btf, t->name_off);
|
||
|
if (strcmp(s, TEST_TAG_EXPECT_FAILURE) == 0) {
|
||
|
spec->expect_failure = true;
|
||
|
} else if (strcmp(s, TEST_TAG_EXPECT_SUCCESS) == 0) {
|
||
|
spec->expect_failure = false;
|
||
|
} else if (str_has_pfx(s, TEST_TAG_EXPECT_MSG_PFX)) {
|
||
|
spec->expect_msg = s + sizeof(TEST_TAG_EXPECT_MSG_PFX) - 1;
|
||
|
} else if (str_has_pfx(s, TEST_TAG_LOG_LEVEL_PFX)) {
|
||
|
errno = 0;
|
||
|
spec->log_level = strtol(s + sizeof(TEST_TAG_LOG_LEVEL_PFX) - 1, NULL, 0);
|
||
|
if (errno) {
|
||
|
ASSERT_FAIL("failed to parse test log level from '%s'", s);
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static void prepare_case(struct test_loader *tester,
|
||
|
struct test_spec *spec,
|
||
|
struct bpf_object *obj,
|
||
|
struct bpf_program *prog)
|
||
|
{
|
||
|
int min_log_level = 0;
|
||
|
|
||
|
if (env.verbosity > VERBOSE_NONE)
|
||
|
min_log_level = 1;
|
||
|
if (env.verbosity > VERBOSE_VERY)
|
||
|
min_log_level = 2;
|
||
|
|
||
|
bpf_program__set_log_buf(prog, tester->log_buf, tester->log_buf_sz);
|
||
|
|
||
|
/* Make sure we set at least minimal log level, unless test requirest
|
||
|
* even higher level already. Make sure to preserve independent log
|
||
|
* level 4 (verifier stats), though.
|
||
|
*/
|
||
|
if ((spec->log_level & 3) < min_log_level)
|
||
|
bpf_program__set_log_level(prog, (spec->log_level & 4) | min_log_level);
|
||
|
else
|
||
|
bpf_program__set_log_level(prog, spec->log_level);
|
||
|
|
||
|
tester->log_buf[0] = '\0';
|
||
|
}
|
||
|
|
||
|
static void emit_verifier_log(const char *log_buf, bool force)
|
||
|
{
|
||
|
if (!force && env.verbosity == VERBOSE_NONE)
|
||
|
return;
|
||
|
fprintf(stdout, "VERIFIER LOG:\n=============\n%s=============\n", log_buf);
|
||
|
}
|
||
|
|
||
|
static void validate_case(struct test_loader *tester,
|
||
|
struct test_spec *spec,
|
||
|
struct bpf_object *obj,
|
||
|
struct bpf_program *prog,
|
||
|
int load_err)
|
||
|
{
|
||
|
if (spec->expect_msg) {
|
||
|
char *match;
|
||
|
|
||
|
match = strstr(tester->log_buf, spec->expect_msg);
|
||
|
if (!ASSERT_OK_PTR(match, "expect_msg")) {
|
||
|
/* if we are in verbose mode, we've already emitted log */
|
||
|
if (env.verbosity == VERBOSE_NONE)
|
||
|
emit_verifier_log(tester->log_buf, true /*force*/);
|
||
|
fprintf(stderr, "EXPECTED MSG: '%s'\n", spec->expect_msg);
|
||
|
return;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* this function is forced noinline and has short generic name to look better
|
||
|
* in test_progs output (in case of a failure)
|
||
|
*/
|
||
|
static noinline
|
||
|
void run_subtest(struct test_loader *tester,
|
||
|
const char *skel_name,
|
||
|
skel_elf_bytes_fn elf_bytes_factory)
|
||
|
{
|
||
|
LIBBPF_OPTS(bpf_object_open_opts, open_opts, .object_name = skel_name);
|
||
|
struct bpf_object *obj = NULL, *tobj;
|
||
|
struct bpf_program *prog, *tprog;
|
||
|
const void *obj_bytes;
|
||
|
size_t obj_byte_cnt;
|
||
|
int err;
|
||
|
|
||
|
if (tester_init(tester) < 0)
|
||
|
return; /* failed to initialize tester */
|
||
|
|
||
|
obj_bytes = elf_bytes_factory(&obj_byte_cnt);
|
||
|
obj = bpf_object__open_mem(obj_bytes, obj_byte_cnt, &open_opts);
|
||
|
if (!ASSERT_OK_PTR(obj, "obj_open_mem"))
|
||
|
return;
|
||
|
|
||
|
bpf_object__for_each_program(prog, obj) {
|
||
|
const char *prog_name = bpf_program__name(prog);
|
||
|
struct test_spec spec;
|
||
|
|
||
|
if (!test__start_subtest(prog_name))
|
||
|
continue;
|
||
|
|
||
|
/* if we can't derive test specification, go to the next test */
|
||
|
err = parse_test_spec(tester, obj, prog, &spec);
|
||
|
if (!ASSERT_OK(err, "parse_test_spec"))
|
||
|
continue;
|
||
|
|
||
|
tobj = bpf_object__open_mem(obj_bytes, obj_byte_cnt, &open_opts);
|
||
|
if (!ASSERT_OK_PTR(tobj, "obj_open_mem")) /* shouldn't happen */
|
||
|
continue;
|
||
|
|
||
|
bpf_object__for_each_program(tprog, tobj)
|
||
|
bpf_program__set_autoload(tprog, false);
|
||
|
|
||
|
bpf_object__for_each_program(tprog, tobj) {
|
||
|
/* only load specified program */
|
||
|
if (strcmp(bpf_program__name(tprog), prog_name) == 0) {
|
||
|
bpf_program__set_autoload(tprog, true);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
prepare_case(tester, &spec, tobj, tprog);
|
||
|
|
||
|
err = bpf_object__load(tobj);
|
||
|
if (spec.expect_failure) {
|
||
|
if (!ASSERT_ERR(err, "unexpected_load_success")) {
|
||
|
emit_verifier_log(tester->log_buf, false /*force*/);
|
||
|
goto tobj_cleanup;
|
||
|
}
|
||
|
} else {
|
||
|
if (!ASSERT_OK(err, "unexpected_load_failure")) {
|
||
|
emit_verifier_log(tester->log_buf, true /*force*/);
|
||
|
goto tobj_cleanup;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
emit_verifier_log(tester->log_buf, false /*force*/);
|
||
|
validate_case(tester, &spec, tobj, tprog, err);
|
||
|
|
||
|
tobj_cleanup:
|
||
|
bpf_object__close(tobj);
|
||
|
}
|
||
|
|
||
|
bpf_object__close(obj);
|
||
|
}
|
||
|
|
||
|
void test_loader__run_subtests(struct test_loader *tester,
|
||
|
const char *skel_name,
|
||
|
skel_elf_bytes_fn elf_bytes_factory)
|
||
|
{
|
||
|
/* see comment in run_subtest() for why we do this function nesting */
|
||
|
run_subtest(tester, skel_name, elf_bytes_factory);
|
||
|
}
|