162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* Copyright (c) 2017 Facebook 362306a36Sopenharmony_ci */ 462306a36Sopenharmony_ci#include <linux/bpf.h> 562306a36Sopenharmony_ci#include <linux/btf.h> 662306a36Sopenharmony_ci#include <linux/btf_ids.h> 762306a36Sopenharmony_ci#include <linux/slab.h> 862306a36Sopenharmony_ci#include <linux/init.h> 962306a36Sopenharmony_ci#include <linux/vmalloc.h> 1062306a36Sopenharmony_ci#include <linux/etherdevice.h> 1162306a36Sopenharmony_ci#include <linux/filter.h> 1262306a36Sopenharmony_ci#include <linux/rcupdate_trace.h> 1362306a36Sopenharmony_ci#include <linux/sched/signal.h> 1462306a36Sopenharmony_ci#include <net/bpf_sk_storage.h> 1562306a36Sopenharmony_ci#include <net/sock.h> 1662306a36Sopenharmony_ci#include <net/tcp.h> 1762306a36Sopenharmony_ci#include <net/net_namespace.h> 1862306a36Sopenharmony_ci#include <net/page_pool/helpers.h> 1962306a36Sopenharmony_ci#include <linux/error-injection.h> 2062306a36Sopenharmony_ci#include <linux/smp.h> 2162306a36Sopenharmony_ci#include <linux/sock_diag.h> 2262306a36Sopenharmony_ci#include <linux/netfilter.h> 2362306a36Sopenharmony_ci#include <net/netdev_rx_queue.h> 2462306a36Sopenharmony_ci#include <net/xdp.h> 2562306a36Sopenharmony_ci#include <net/netfilter/nf_bpf_link.h> 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci#define CREATE_TRACE_POINTS 2862306a36Sopenharmony_ci#include <trace/events/bpf_test_run.h> 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_cistruct bpf_test_timer { 3162306a36Sopenharmony_ci enum { NO_PREEMPT, NO_MIGRATE } mode; 3262306a36Sopenharmony_ci u32 i; 3362306a36Sopenharmony_ci u64 time_start, time_spent; 3462306a36Sopenharmony_ci}; 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_cistatic void bpf_test_timer_enter(struct bpf_test_timer *t) 3762306a36Sopenharmony_ci __acquires(rcu) 3862306a36Sopenharmony_ci{ 3962306a36Sopenharmony_ci rcu_read_lock(); 4062306a36Sopenharmony_ci if (t->mode == NO_PREEMPT) 4162306a36Sopenharmony_ci preempt_disable(); 4262306a36Sopenharmony_ci else 4362306a36Sopenharmony_ci migrate_disable(); 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci t->time_start = ktime_get_ns(); 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic void bpf_test_timer_leave(struct bpf_test_timer *t) 4962306a36Sopenharmony_ci __releases(rcu) 5062306a36Sopenharmony_ci{ 5162306a36Sopenharmony_ci t->time_start = 0; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci if (t->mode == NO_PREEMPT) 5462306a36Sopenharmony_ci preempt_enable(); 5562306a36Sopenharmony_ci else 5662306a36Sopenharmony_ci migrate_enable(); 5762306a36Sopenharmony_ci rcu_read_unlock(); 5862306a36Sopenharmony_ci} 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_cistatic bool bpf_test_timer_continue(struct bpf_test_timer *t, int iterations, 6162306a36Sopenharmony_ci u32 repeat, int *err, u32 *duration) 6262306a36Sopenharmony_ci __must_hold(rcu) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci t->i += iterations; 6562306a36Sopenharmony_ci if (t->i >= repeat) { 6662306a36Sopenharmony_ci /* We're done. */ 6762306a36Sopenharmony_ci t->time_spent += ktime_get_ns() - t->time_start; 6862306a36Sopenharmony_ci do_div(t->time_spent, t->i); 6962306a36Sopenharmony_ci *duration = t->time_spent > U32_MAX ? U32_MAX : (u32)t->time_spent; 7062306a36Sopenharmony_ci *err = 0; 7162306a36Sopenharmony_ci goto reset; 7262306a36Sopenharmony_ci } 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci if (signal_pending(current)) { 7562306a36Sopenharmony_ci /* During iteration: we've been cancelled, abort. */ 7662306a36Sopenharmony_ci *err = -EINTR; 7762306a36Sopenharmony_ci goto reset; 7862306a36Sopenharmony_ci } 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci if (need_resched()) { 8162306a36Sopenharmony_ci /* During iteration: we need to reschedule between runs. */ 8262306a36Sopenharmony_ci t->time_spent += ktime_get_ns() - t->time_start; 8362306a36Sopenharmony_ci bpf_test_timer_leave(t); 8462306a36Sopenharmony_ci cond_resched(); 8562306a36Sopenharmony_ci bpf_test_timer_enter(t); 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci /* Do another round. */ 8962306a36Sopenharmony_ci return true; 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_cireset: 9262306a36Sopenharmony_ci t->i = 0; 9362306a36Sopenharmony_ci return false; 9462306a36Sopenharmony_ci} 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci/* We put this struct at the head of each page with a context and frame 9762306a36Sopenharmony_ci * initialised when the page is allocated, so we don't have to do this on each 9862306a36Sopenharmony_ci * repetition of the test run. 9962306a36Sopenharmony_ci */ 10062306a36Sopenharmony_cistruct xdp_page_head { 10162306a36Sopenharmony_ci struct xdp_buff orig_ctx; 10262306a36Sopenharmony_ci struct xdp_buff ctx; 10362306a36Sopenharmony_ci union { 10462306a36Sopenharmony_ci /* ::data_hard_start starts here */ 10562306a36Sopenharmony_ci DECLARE_FLEX_ARRAY(struct xdp_frame, frame); 10662306a36Sopenharmony_ci DECLARE_FLEX_ARRAY(u8, data); 10762306a36Sopenharmony_ci }; 10862306a36Sopenharmony_ci}; 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_cistruct xdp_test_data { 11162306a36Sopenharmony_ci struct xdp_buff *orig_ctx; 11262306a36Sopenharmony_ci struct xdp_rxq_info rxq; 11362306a36Sopenharmony_ci struct net_device *dev; 11462306a36Sopenharmony_ci struct page_pool *pp; 11562306a36Sopenharmony_ci struct xdp_frame **frames; 11662306a36Sopenharmony_ci struct sk_buff **skbs; 11762306a36Sopenharmony_ci struct xdp_mem_info mem; 11862306a36Sopenharmony_ci u32 batch_size; 11962306a36Sopenharmony_ci u32 frame_cnt; 12062306a36Sopenharmony_ci}; 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci/* tools/testing/selftests/bpf/prog_tests/xdp_do_redirect.c:%MAX_PKT_SIZE 12362306a36Sopenharmony_ci * must be updated accordingly this gets changed, otherwise BPF selftests 12462306a36Sopenharmony_ci * will fail. 12562306a36Sopenharmony_ci */ 12662306a36Sopenharmony_ci#define TEST_XDP_FRAME_SIZE (PAGE_SIZE - sizeof(struct xdp_page_head)) 12762306a36Sopenharmony_ci#define TEST_XDP_MAX_BATCH 256 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_cistatic void xdp_test_run_init_page(struct page *page, void *arg) 13062306a36Sopenharmony_ci{ 13162306a36Sopenharmony_ci struct xdp_page_head *head = phys_to_virt(page_to_phys(page)); 13262306a36Sopenharmony_ci struct xdp_buff *new_ctx, *orig_ctx; 13362306a36Sopenharmony_ci u32 headroom = XDP_PACKET_HEADROOM; 13462306a36Sopenharmony_ci struct xdp_test_data *xdp = arg; 13562306a36Sopenharmony_ci size_t frm_len, meta_len; 13662306a36Sopenharmony_ci struct xdp_frame *frm; 13762306a36Sopenharmony_ci void *data; 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ci orig_ctx = xdp->orig_ctx; 14062306a36Sopenharmony_ci frm_len = orig_ctx->data_end - orig_ctx->data_meta; 14162306a36Sopenharmony_ci meta_len = orig_ctx->data - orig_ctx->data_meta; 14262306a36Sopenharmony_ci headroom -= meta_len; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci new_ctx = &head->ctx; 14562306a36Sopenharmony_ci frm = head->frame; 14662306a36Sopenharmony_ci data = head->data; 14762306a36Sopenharmony_ci memcpy(data + headroom, orig_ctx->data_meta, frm_len); 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci xdp_init_buff(new_ctx, TEST_XDP_FRAME_SIZE, &xdp->rxq); 15062306a36Sopenharmony_ci xdp_prepare_buff(new_ctx, data, headroom, frm_len, true); 15162306a36Sopenharmony_ci new_ctx->data = new_ctx->data_meta + meta_len; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci xdp_update_frame_from_buff(new_ctx, frm); 15462306a36Sopenharmony_ci frm->mem = new_ctx->rxq->mem; 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci memcpy(&head->orig_ctx, new_ctx, sizeof(head->orig_ctx)); 15762306a36Sopenharmony_ci} 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_cistatic int xdp_test_run_setup(struct xdp_test_data *xdp, struct xdp_buff *orig_ctx) 16062306a36Sopenharmony_ci{ 16162306a36Sopenharmony_ci struct page_pool *pp; 16262306a36Sopenharmony_ci int err = -ENOMEM; 16362306a36Sopenharmony_ci struct page_pool_params pp_params = { 16462306a36Sopenharmony_ci .order = 0, 16562306a36Sopenharmony_ci .flags = 0, 16662306a36Sopenharmony_ci .pool_size = xdp->batch_size, 16762306a36Sopenharmony_ci .nid = NUMA_NO_NODE, 16862306a36Sopenharmony_ci .init_callback = xdp_test_run_init_page, 16962306a36Sopenharmony_ci .init_arg = xdp, 17062306a36Sopenharmony_ci }; 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci xdp->frames = kvmalloc_array(xdp->batch_size, sizeof(void *), GFP_KERNEL); 17362306a36Sopenharmony_ci if (!xdp->frames) 17462306a36Sopenharmony_ci return -ENOMEM; 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci xdp->skbs = kvmalloc_array(xdp->batch_size, sizeof(void *), GFP_KERNEL); 17762306a36Sopenharmony_ci if (!xdp->skbs) 17862306a36Sopenharmony_ci goto err_skbs; 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci pp = page_pool_create(&pp_params); 18162306a36Sopenharmony_ci if (IS_ERR(pp)) { 18262306a36Sopenharmony_ci err = PTR_ERR(pp); 18362306a36Sopenharmony_ci goto err_pp; 18462306a36Sopenharmony_ci } 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_ci /* will copy 'mem.id' into pp->xdp_mem_id */ 18762306a36Sopenharmony_ci err = xdp_reg_mem_model(&xdp->mem, MEM_TYPE_PAGE_POOL, pp); 18862306a36Sopenharmony_ci if (err) 18962306a36Sopenharmony_ci goto err_mmodel; 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci xdp->pp = pp; 19262306a36Sopenharmony_ci 19362306a36Sopenharmony_ci /* We create a 'fake' RXQ referencing the original dev, but with an 19462306a36Sopenharmony_ci * xdp_mem_info pointing to our page_pool 19562306a36Sopenharmony_ci */ 19662306a36Sopenharmony_ci xdp_rxq_info_reg(&xdp->rxq, orig_ctx->rxq->dev, 0, 0); 19762306a36Sopenharmony_ci xdp->rxq.mem.type = MEM_TYPE_PAGE_POOL; 19862306a36Sopenharmony_ci xdp->rxq.mem.id = pp->xdp_mem_id; 19962306a36Sopenharmony_ci xdp->dev = orig_ctx->rxq->dev; 20062306a36Sopenharmony_ci xdp->orig_ctx = orig_ctx; 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci return 0; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_cierr_mmodel: 20562306a36Sopenharmony_ci page_pool_destroy(pp); 20662306a36Sopenharmony_cierr_pp: 20762306a36Sopenharmony_ci kvfree(xdp->skbs); 20862306a36Sopenharmony_cierr_skbs: 20962306a36Sopenharmony_ci kvfree(xdp->frames); 21062306a36Sopenharmony_ci return err; 21162306a36Sopenharmony_ci} 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_cistatic void xdp_test_run_teardown(struct xdp_test_data *xdp) 21462306a36Sopenharmony_ci{ 21562306a36Sopenharmony_ci xdp_unreg_mem_model(&xdp->mem); 21662306a36Sopenharmony_ci page_pool_destroy(xdp->pp); 21762306a36Sopenharmony_ci kfree(xdp->frames); 21862306a36Sopenharmony_ci kfree(xdp->skbs); 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_cistatic bool frame_was_changed(const struct xdp_page_head *head) 22262306a36Sopenharmony_ci{ 22362306a36Sopenharmony_ci /* xdp_scrub_frame() zeroes the data pointer, flags is the last field, 22462306a36Sopenharmony_ci * i.e. has the highest chances to be overwritten. If those two are 22562306a36Sopenharmony_ci * untouched, it's most likely safe to skip the context reset. 22662306a36Sopenharmony_ci */ 22762306a36Sopenharmony_ci return head->frame->data != head->orig_ctx.data || 22862306a36Sopenharmony_ci head->frame->flags != head->orig_ctx.flags; 22962306a36Sopenharmony_ci} 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_cistatic bool ctx_was_changed(struct xdp_page_head *head) 23262306a36Sopenharmony_ci{ 23362306a36Sopenharmony_ci return head->orig_ctx.data != head->ctx.data || 23462306a36Sopenharmony_ci head->orig_ctx.data_meta != head->ctx.data_meta || 23562306a36Sopenharmony_ci head->orig_ctx.data_end != head->ctx.data_end; 23662306a36Sopenharmony_ci} 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_cistatic void reset_ctx(struct xdp_page_head *head) 23962306a36Sopenharmony_ci{ 24062306a36Sopenharmony_ci if (likely(!frame_was_changed(head) && !ctx_was_changed(head))) 24162306a36Sopenharmony_ci return; 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci head->ctx.data = head->orig_ctx.data; 24462306a36Sopenharmony_ci head->ctx.data_meta = head->orig_ctx.data_meta; 24562306a36Sopenharmony_ci head->ctx.data_end = head->orig_ctx.data_end; 24662306a36Sopenharmony_ci xdp_update_frame_from_buff(&head->ctx, head->frame); 24762306a36Sopenharmony_ci} 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_cistatic int xdp_recv_frames(struct xdp_frame **frames, int nframes, 25062306a36Sopenharmony_ci struct sk_buff **skbs, 25162306a36Sopenharmony_ci struct net_device *dev) 25262306a36Sopenharmony_ci{ 25362306a36Sopenharmony_ci gfp_t gfp = __GFP_ZERO | GFP_ATOMIC; 25462306a36Sopenharmony_ci int i, n; 25562306a36Sopenharmony_ci LIST_HEAD(list); 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci n = kmem_cache_alloc_bulk(skbuff_cache, gfp, nframes, (void **)skbs); 25862306a36Sopenharmony_ci if (unlikely(n == 0)) { 25962306a36Sopenharmony_ci for (i = 0; i < nframes; i++) 26062306a36Sopenharmony_ci xdp_return_frame(frames[i]); 26162306a36Sopenharmony_ci return -ENOMEM; 26262306a36Sopenharmony_ci } 26362306a36Sopenharmony_ci 26462306a36Sopenharmony_ci for (i = 0; i < nframes; i++) { 26562306a36Sopenharmony_ci struct xdp_frame *xdpf = frames[i]; 26662306a36Sopenharmony_ci struct sk_buff *skb = skbs[i]; 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci skb = __xdp_build_skb_from_frame(xdpf, skb, dev); 26962306a36Sopenharmony_ci if (!skb) { 27062306a36Sopenharmony_ci xdp_return_frame(xdpf); 27162306a36Sopenharmony_ci continue; 27262306a36Sopenharmony_ci } 27362306a36Sopenharmony_ci 27462306a36Sopenharmony_ci list_add_tail(&skb->list, &list); 27562306a36Sopenharmony_ci } 27662306a36Sopenharmony_ci netif_receive_skb_list(&list); 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_ci return 0; 27962306a36Sopenharmony_ci} 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_cistatic int xdp_test_run_batch(struct xdp_test_data *xdp, struct bpf_prog *prog, 28262306a36Sopenharmony_ci u32 repeat) 28362306a36Sopenharmony_ci{ 28462306a36Sopenharmony_ci struct bpf_redirect_info *ri = this_cpu_ptr(&bpf_redirect_info); 28562306a36Sopenharmony_ci int err = 0, act, ret, i, nframes = 0, batch_sz; 28662306a36Sopenharmony_ci struct xdp_frame **frames = xdp->frames; 28762306a36Sopenharmony_ci struct xdp_page_head *head; 28862306a36Sopenharmony_ci struct xdp_frame *frm; 28962306a36Sopenharmony_ci bool redirect = false; 29062306a36Sopenharmony_ci struct xdp_buff *ctx; 29162306a36Sopenharmony_ci struct page *page; 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci batch_sz = min_t(u32, repeat, xdp->batch_size); 29462306a36Sopenharmony_ci 29562306a36Sopenharmony_ci local_bh_disable(); 29662306a36Sopenharmony_ci xdp_set_return_frame_no_direct(); 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci for (i = 0; i < batch_sz; i++) { 29962306a36Sopenharmony_ci page = page_pool_dev_alloc_pages(xdp->pp); 30062306a36Sopenharmony_ci if (!page) { 30162306a36Sopenharmony_ci err = -ENOMEM; 30262306a36Sopenharmony_ci goto out; 30362306a36Sopenharmony_ci } 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_ci head = phys_to_virt(page_to_phys(page)); 30662306a36Sopenharmony_ci reset_ctx(head); 30762306a36Sopenharmony_ci ctx = &head->ctx; 30862306a36Sopenharmony_ci frm = head->frame; 30962306a36Sopenharmony_ci xdp->frame_cnt++; 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci act = bpf_prog_run_xdp(prog, ctx); 31262306a36Sopenharmony_ci 31362306a36Sopenharmony_ci /* if program changed pkt bounds we need to update the xdp_frame */ 31462306a36Sopenharmony_ci if (unlikely(ctx_was_changed(head))) { 31562306a36Sopenharmony_ci ret = xdp_update_frame_from_buff(ctx, frm); 31662306a36Sopenharmony_ci if (ret) { 31762306a36Sopenharmony_ci xdp_return_buff(ctx); 31862306a36Sopenharmony_ci continue; 31962306a36Sopenharmony_ci } 32062306a36Sopenharmony_ci } 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ci switch (act) { 32362306a36Sopenharmony_ci case XDP_TX: 32462306a36Sopenharmony_ci /* we can't do a real XDP_TX since we're not in the 32562306a36Sopenharmony_ci * driver, so turn it into a REDIRECT back to the same 32662306a36Sopenharmony_ci * index 32762306a36Sopenharmony_ci */ 32862306a36Sopenharmony_ci ri->tgt_index = xdp->dev->ifindex; 32962306a36Sopenharmony_ci ri->map_id = INT_MAX; 33062306a36Sopenharmony_ci ri->map_type = BPF_MAP_TYPE_UNSPEC; 33162306a36Sopenharmony_ci fallthrough; 33262306a36Sopenharmony_ci case XDP_REDIRECT: 33362306a36Sopenharmony_ci redirect = true; 33462306a36Sopenharmony_ci ret = xdp_do_redirect_frame(xdp->dev, ctx, frm, prog); 33562306a36Sopenharmony_ci if (ret) 33662306a36Sopenharmony_ci xdp_return_buff(ctx); 33762306a36Sopenharmony_ci break; 33862306a36Sopenharmony_ci case XDP_PASS: 33962306a36Sopenharmony_ci frames[nframes++] = frm; 34062306a36Sopenharmony_ci break; 34162306a36Sopenharmony_ci default: 34262306a36Sopenharmony_ci bpf_warn_invalid_xdp_action(NULL, prog, act); 34362306a36Sopenharmony_ci fallthrough; 34462306a36Sopenharmony_ci case XDP_DROP: 34562306a36Sopenharmony_ci xdp_return_buff(ctx); 34662306a36Sopenharmony_ci break; 34762306a36Sopenharmony_ci } 34862306a36Sopenharmony_ci } 34962306a36Sopenharmony_ci 35062306a36Sopenharmony_ciout: 35162306a36Sopenharmony_ci if (redirect) 35262306a36Sopenharmony_ci xdp_do_flush(); 35362306a36Sopenharmony_ci if (nframes) { 35462306a36Sopenharmony_ci ret = xdp_recv_frames(frames, nframes, xdp->skbs, xdp->dev); 35562306a36Sopenharmony_ci if (ret) 35662306a36Sopenharmony_ci err = ret; 35762306a36Sopenharmony_ci } 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_ci xdp_clear_return_frame_no_direct(); 36062306a36Sopenharmony_ci local_bh_enable(); 36162306a36Sopenharmony_ci return err; 36262306a36Sopenharmony_ci} 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_cistatic int bpf_test_run_xdp_live(struct bpf_prog *prog, struct xdp_buff *ctx, 36562306a36Sopenharmony_ci u32 repeat, u32 batch_size, u32 *time) 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci{ 36862306a36Sopenharmony_ci struct xdp_test_data xdp = { .batch_size = batch_size }; 36962306a36Sopenharmony_ci struct bpf_test_timer t = { .mode = NO_MIGRATE }; 37062306a36Sopenharmony_ci int ret; 37162306a36Sopenharmony_ci 37262306a36Sopenharmony_ci if (!repeat) 37362306a36Sopenharmony_ci repeat = 1; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci ret = xdp_test_run_setup(&xdp, ctx); 37662306a36Sopenharmony_ci if (ret) 37762306a36Sopenharmony_ci return ret; 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_ci bpf_test_timer_enter(&t); 38062306a36Sopenharmony_ci do { 38162306a36Sopenharmony_ci xdp.frame_cnt = 0; 38262306a36Sopenharmony_ci ret = xdp_test_run_batch(&xdp, prog, repeat - t.i); 38362306a36Sopenharmony_ci if (unlikely(ret < 0)) 38462306a36Sopenharmony_ci break; 38562306a36Sopenharmony_ci } while (bpf_test_timer_continue(&t, xdp.frame_cnt, repeat, &ret, time)); 38662306a36Sopenharmony_ci bpf_test_timer_leave(&t); 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_ci xdp_test_run_teardown(&xdp); 38962306a36Sopenharmony_ci return ret; 39062306a36Sopenharmony_ci} 39162306a36Sopenharmony_ci 39262306a36Sopenharmony_cistatic int bpf_test_run(struct bpf_prog *prog, void *ctx, u32 repeat, 39362306a36Sopenharmony_ci u32 *retval, u32 *time, bool xdp) 39462306a36Sopenharmony_ci{ 39562306a36Sopenharmony_ci struct bpf_prog_array_item item = {.prog = prog}; 39662306a36Sopenharmony_ci struct bpf_run_ctx *old_ctx; 39762306a36Sopenharmony_ci struct bpf_cg_run_ctx run_ctx; 39862306a36Sopenharmony_ci struct bpf_test_timer t = { NO_MIGRATE }; 39962306a36Sopenharmony_ci enum bpf_cgroup_storage_type stype; 40062306a36Sopenharmony_ci int ret; 40162306a36Sopenharmony_ci 40262306a36Sopenharmony_ci for_each_cgroup_storage_type(stype) { 40362306a36Sopenharmony_ci item.cgroup_storage[stype] = bpf_cgroup_storage_alloc(prog, stype); 40462306a36Sopenharmony_ci if (IS_ERR(item.cgroup_storage[stype])) { 40562306a36Sopenharmony_ci item.cgroup_storage[stype] = NULL; 40662306a36Sopenharmony_ci for_each_cgroup_storage_type(stype) 40762306a36Sopenharmony_ci bpf_cgroup_storage_free(item.cgroup_storage[stype]); 40862306a36Sopenharmony_ci return -ENOMEM; 40962306a36Sopenharmony_ci } 41062306a36Sopenharmony_ci } 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci if (!repeat) 41362306a36Sopenharmony_ci repeat = 1; 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci bpf_test_timer_enter(&t); 41662306a36Sopenharmony_ci old_ctx = bpf_set_run_ctx(&run_ctx.run_ctx); 41762306a36Sopenharmony_ci do { 41862306a36Sopenharmony_ci run_ctx.prog_item = &item; 41962306a36Sopenharmony_ci local_bh_disable(); 42062306a36Sopenharmony_ci if (xdp) 42162306a36Sopenharmony_ci *retval = bpf_prog_run_xdp(prog, ctx); 42262306a36Sopenharmony_ci else 42362306a36Sopenharmony_ci *retval = bpf_prog_run(prog, ctx); 42462306a36Sopenharmony_ci local_bh_enable(); 42562306a36Sopenharmony_ci } while (bpf_test_timer_continue(&t, 1, repeat, &ret, time)); 42662306a36Sopenharmony_ci bpf_reset_run_ctx(old_ctx); 42762306a36Sopenharmony_ci bpf_test_timer_leave(&t); 42862306a36Sopenharmony_ci 42962306a36Sopenharmony_ci for_each_cgroup_storage_type(stype) 43062306a36Sopenharmony_ci bpf_cgroup_storage_free(item.cgroup_storage[stype]); 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci return ret; 43362306a36Sopenharmony_ci} 43462306a36Sopenharmony_ci 43562306a36Sopenharmony_cistatic int bpf_test_finish(const union bpf_attr *kattr, 43662306a36Sopenharmony_ci union bpf_attr __user *uattr, const void *data, 43762306a36Sopenharmony_ci struct skb_shared_info *sinfo, u32 size, 43862306a36Sopenharmony_ci u32 retval, u32 duration) 43962306a36Sopenharmony_ci{ 44062306a36Sopenharmony_ci void __user *data_out = u64_to_user_ptr(kattr->test.data_out); 44162306a36Sopenharmony_ci int err = -EFAULT; 44262306a36Sopenharmony_ci u32 copy_size = size; 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_ci /* Clamp copy if the user has provided a size hint, but copy the full 44562306a36Sopenharmony_ci * buffer if not to retain old behaviour. 44662306a36Sopenharmony_ci */ 44762306a36Sopenharmony_ci if (kattr->test.data_size_out && 44862306a36Sopenharmony_ci copy_size > kattr->test.data_size_out) { 44962306a36Sopenharmony_ci copy_size = kattr->test.data_size_out; 45062306a36Sopenharmony_ci err = -ENOSPC; 45162306a36Sopenharmony_ci } 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ci if (data_out) { 45462306a36Sopenharmony_ci int len = sinfo ? copy_size - sinfo->xdp_frags_size : copy_size; 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_ci if (len < 0) { 45762306a36Sopenharmony_ci err = -ENOSPC; 45862306a36Sopenharmony_ci goto out; 45962306a36Sopenharmony_ci } 46062306a36Sopenharmony_ci 46162306a36Sopenharmony_ci if (copy_to_user(data_out, data, len)) 46262306a36Sopenharmony_ci goto out; 46362306a36Sopenharmony_ci 46462306a36Sopenharmony_ci if (sinfo) { 46562306a36Sopenharmony_ci int i, offset = len; 46662306a36Sopenharmony_ci u32 data_len; 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci for (i = 0; i < sinfo->nr_frags; i++) { 46962306a36Sopenharmony_ci skb_frag_t *frag = &sinfo->frags[i]; 47062306a36Sopenharmony_ci 47162306a36Sopenharmony_ci if (offset >= copy_size) { 47262306a36Sopenharmony_ci err = -ENOSPC; 47362306a36Sopenharmony_ci break; 47462306a36Sopenharmony_ci } 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ci data_len = min_t(u32, copy_size - offset, 47762306a36Sopenharmony_ci skb_frag_size(frag)); 47862306a36Sopenharmony_ci 47962306a36Sopenharmony_ci if (copy_to_user(data_out + offset, 48062306a36Sopenharmony_ci skb_frag_address(frag), 48162306a36Sopenharmony_ci data_len)) 48262306a36Sopenharmony_ci goto out; 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_ci offset += data_len; 48562306a36Sopenharmony_ci } 48662306a36Sopenharmony_ci } 48762306a36Sopenharmony_ci } 48862306a36Sopenharmony_ci 48962306a36Sopenharmony_ci if (copy_to_user(&uattr->test.data_size_out, &size, sizeof(size))) 49062306a36Sopenharmony_ci goto out; 49162306a36Sopenharmony_ci if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval))) 49262306a36Sopenharmony_ci goto out; 49362306a36Sopenharmony_ci if (copy_to_user(&uattr->test.duration, &duration, sizeof(duration))) 49462306a36Sopenharmony_ci goto out; 49562306a36Sopenharmony_ci if (err != -ENOSPC) 49662306a36Sopenharmony_ci err = 0; 49762306a36Sopenharmony_ciout: 49862306a36Sopenharmony_ci trace_bpf_test_finish(&err); 49962306a36Sopenharmony_ci return err; 50062306a36Sopenharmony_ci} 50162306a36Sopenharmony_ci 50262306a36Sopenharmony_ci/* Integer types of various sizes and pointer combinations cover variety of 50362306a36Sopenharmony_ci * architecture dependent calling conventions. 7+ can be supported in the 50462306a36Sopenharmony_ci * future. 50562306a36Sopenharmony_ci */ 50662306a36Sopenharmony_ci__diag_push(); 50762306a36Sopenharmony_ci__diag_ignore_all("-Wmissing-prototypes", 50862306a36Sopenharmony_ci "Global functions as their definitions will be in vmlinux BTF"); 50962306a36Sopenharmony_ci__bpf_kfunc int bpf_fentry_test1(int a) 51062306a36Sopenharmony_ci{ 51162306a36Sopenharmony_ci return a + 1; 51262306a36Sopenharmony_ci} 51362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(bpf_fentry_test1); 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ciint noinline bpf_fentry_test2(int a, u64 b) 51662306a36Sopenharmony_ci{ 51762306a36Sopenharmony_ci return a + b; 51862306a36Sopenharmony_ci} 51962306a36Sopenharmony_ci 52062306a36Sopenharmony_ciint noinline bpf_fentry_test3(char a, int b, u64 c) 52162306a36Sopenharmony_ci{ 52262306a36Sopenharmony_ci return a + b + c; 52362306a36Sopenharmony_ci} 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_ciint noinline bpf_fentry_test4(void *a, char b, int c, u64 d) 52662306a36Sopenharmony_ci{ 52762306a36Sopenharmony_ci return (long)a + b + c + d; 52862306a36Sopenharmony_ci} 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_ciint noinline bpf_fentry_test5(u64 a, void *b, short c, int d, u64 e) 53162306a36Sopenharmony_ci{ 53262306a36Sopenharmony_ci return a + (long)b + c + d + e; 53362306a36Sopenharmony_ci} 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ciint noinline bpf_fentry_test6(u64 a, void *b, short c, int d, void *e, u64 f) 53662306a36Sopenharmony_ci{ 53762306a36Sopenharmony_ci return a + (long)b + c + d + (long)e + f; 53862306a36Sopenharmony_ci} 53962306a36Sopenharmony_ci 54062306a36Sopenharmony_cistruct bpf_fentry_test_t { 54162306a36Sopenharmony_ci struct bpf_fentry_test_t *a; 54262306a36Sopenharmony_ci}; 54362306a36Sopenharmony_ci 54462306a36Sopenharmony_ciint noinline bpf_fentry_test7(struct bpf_fentry_test_t *arg) 54562306a36Sopenharmony_ci{ 54662306a36Sopenharmony_ci asm volatile ("": "+r"(arg)); 54762306a36Sopenharmony_ci return (long)arg; 54862306a36Sopenharmony_ci} 54962306a36Sopenharmony_ci 55062306a36Sopenharmony_ciint noinline bpf_fentry_test8(struct bpf_fentry_test_t *arg) 55162306a36Sopenharmony_ci{ 55262306a36Sopenharmony_ci return (long)arg->a; 55362306a36Sopenharmony_ci} 55462306a36Sopenharmony_ci 55562306a36Sopenharmony_ci__bpf_kfunc u32 bpf_fentry_test9(u32 *a) 55662306a36Sopenharmony_ci{ 55762306a36Sopenharmony_ci return *a; 55862306a36Sopenharmony_ci} 55962306a36Sopenharmony_ci 56062306a36Sopenharmony_civoid noinline bpf_fentry_test_sinfo(struct skb_shared_info *sinfo) 56162306a36Sopenharmony_ci{ 56262306a36Sopenharmony_ci} 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_ci__bpf_kfunc int bpf_modify_return_test(int a, int *b) 56562306a36Sopenharmony_ci{ 56662306a36Sopenharmony_ci *b += 1; 56762306a36Sopenharmony_ci return a + *b; 56862306a36Sopenharmony_ci} 56962306a36Sopenharmony_ci 57062306a36Sopenharmony_ci__bpf_kfunc int bpf_modify_return_test2(int a, int *b, short c, int d, 57162306a36Sopenharmony_ci void *e, char f, int g) 57262306a36Sopenharmony_ci{ 57362306a36Sopenharmony_ci *b += 1; 57462306a36Sopenharmony_ci return a + *b + c + d + (long)e + f + g; 57562306a36Sopenharmony_ci} 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_ciint noinline bpf_fentry_shadow_test(int a) 57862306a36Sopenharmony_ci{ 57962306a36Sopenharmony_ci return a + 1; 58062306a36Sopenharmony_ci} 58162306a36Sopenharmony_ci 58262306a36Sopenharmony_cistruct prog_test_member1 { 58362306a36Sopenharmony_ci int a; 58462306a36Sopenharmony_ci}; 58562306a36Sopenharmony_ci 58662306a36Sopenharmony_cistruct prog_test_member { 58762306a36Sopenharmony_ci struct prog_test_member1 m; 58862306a36Sopenharmony_ci int c; 58962306a36Sopenharmony_ci}; 59062306a36Sopenharmony_ci 59162306a36Sopenharmony_cistruct prog_test_ref_kfunc { 59262306a36Sopenharmony_ci int a; 59362306a36Sopenharmony_ci int b; 59462306a36Sopenharmony_ci struct prog_test_member memb; 59562306a36Sopenharmony_ci struct prog_test_ref_kfunc *next; 59662306a36Sopenharmony_ci refcount_t cnt; 59762306a36Sopenharmony_ci}; 59862306a36Sopenharmony_ci 59962306a36Sopenharmony_ci__bpf_kfunc void bpf_kfunc_call_test_release(struct prog_test_ref_kfunc *p) 60062306a36Sopenharmony_ci{ 60162306a36Sopenharmony_ci refcount_dec(&p->cnt); 60262306a36Sopenharmony_ci} 60362306a36Sopenharmony_ci 60462306a36Sopenharmony_ci__bpf_kfunc void bpf_kfunc_call_memb_release(struct prog_test_member *p) 60562306a36Sopenharmony_ci{ 60662306a36Sopenharmony_ci} 60762306a36Sopenharmony_ci 60862306a36Sopenharmony_ci__diag_pop(); 60962306a36Sopenharmony_ci 61062306a36Sopenharmony_ciBTF_SET8_START(bpf_test_modify_return_ids) 61162306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_modify_return_test) 61262306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_modify_return_test2) 61362306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_fentry_test1, KF_SLEEPABLE) 61462306a36Sopenharmony_ciBTF_SET8_END(bpf_test_modify_return_ids) 61562306a36Sopenharmony_ci 61662306a36Sopenharmony_cistatic const struct btf_kfunc_id_set bpf_test_modify_return_set = { 61762306a36Sopenharmony_ci .owner = THIS_MODULE, 61862306a36Sopenharmony_ci .set = &bpf_test_modify_return_ids, 61962306a36Sopenharmony_ci}; 62062306a36Sopenharmony_ci 62162306a36Sopenharmony_ciBTF_SET8_START(test_sk_check_kfunc_ids) 62262306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_kfunc_call_test_release, KF_RELEASE) 62362306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_kfunc_call_memb_release, KF_RELEASE) 62462306a36Sopenharmony_ciBTF_SET8_END(test_sk_check_kfunc_ids) 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_cistatic void *bpf_test_init(const union bpf_attr *kattr, u32 user_size, 62762306a36Sopenharmony_ci u32 size, u32 headroom, u32 tailroom) 62862306a36Sopenharmony_ci{ 62962306a36Sopenharmony_ci void __user *data_in = u64_to_user_ptr(kattr->test.data_in); 63062306a36Sopenharmony_ci void *data; 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci if (size < ETH_HLEN || size > PAGE_SIZE - headroom - tailroom) 63362306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_ci if (user_size > size) 63662306a36Sopenharmony_ci return ERR_PTR(-EMSGSIZE); 63762306a36Sopenharmony_ci 63862306a36Sopenharmony_ci size = SKB_DATA_ALIGN(size); 63962306a36Sopenharmony_ci data = kzalloc(size + headroom + tailroom, GFP_USER); 64062306a36Sopenharmony_ci if (!data) 64162306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 64262306a36Sopenharmony_ci 64362306a36Sopenharmony_ci if (copy_from_user(data + headroom, data_in, user_size)) { 64462306a36Sopenharmony_ci kfree(data); 64562306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 64662306a36Sopenharmony_ci } 64762306a36Sopenharmony_ci 64862306a36Sopenharmony_ci return data; 64962306a36Sopenharmony_ci} 65062306a36Sopenharmony_ci 65162306a36Sopenharmony_ciint bpf_prog_test_run_tracing(struct bpf_prog *prog, 65262306a36Sopenharmony_ci const union bpf_attr *kattr, 65362306a36Sopenharmony_ci union bpf_attr __user *uattr) 65462306a36Sopenharmony_ci{ 65562306a36Sopenharmony_ci struct bpf_fentry_test_t arg = {}; 65662306a36Sopenharmony_ci u16 side_effect = 0, ret = 0; 65762306a36Sopenharmony_ci int b = 2, err = -EFAULT; 65862306a36Sopenharmony_ci u32 retval = 0; 65962306a36Sopenharmony_ci 66062306a36Sopenharmony_ci if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size) 66162306a36Sopenharmony_ci return -EINVAL; 66262306a36Sopenharmony_ci 66362306a36Sopenharmony_ci switch (prog->expected_attach_type) { 66462306a36Sopenharmony_ci case BPF_TRACE_FENTRY: 66562306a36Sopenharmony_ci case BPF_TRACE_FEXIT: 66662306a36Sopenharmony_ci if (bpf_fentry_test1(1) != 2 || 66762306a36Sopenharmony_ci bpf_fentry_test2(2, 3) != 5 || 66862306a36Sopenharmony_ci bpf_fentry_test3(4, 5, 6) != 15 || 66962306a36Sopenharmony_ci bpf_fentry_test4((void *)7, 8, 9, 10) != 34 || 67062306a36Sopenharmony_ci bpf_fentry_test5(11, (void *)12, 13, 14, 15) != 65 || 67162306a36Sopenharmony_ci bpf_fentry_test6(16, (void *)17, 18, 19, (void *)20, 21) != 111 || 67262306a36Sopenharmony_ci bpf_fentry_test7((struct bpf_fentry_test_t *)0) != 0 || 67362306a36Sopenharmony_ci bpf_fentry_test8(&arg) != 0 || 67462306a36Sopenharmony_ci bpf_fentry_test9(&retval) != 0) 67562306a36Sopenharmony_ci goto out; 67662306a36Sopenharmony_ci break; 67762306a36Sopenharmony_ci case BPF_MODIFY_RETURN: 67862306a36Sopenharmony_ci ret = bpf_modify_return_test(1, &b); 67962306a36Sopenharmony_ci if (b != 2) 68062306a36Sopenharmony_ci side_effect++; 68162306a36Sopenharmony_ci b = 2; 68262306a36Sopenharmony_ci ret += bpf_modify_return_test2(1, &b, 3, 4, (void *)5, 6, 7); 68362306a36Sopenharmony_ci if (b != 2) 68462306a36Sopenharmony_ci side_effect++; 68562306a36Sopenharmony_ci break; 68662306a36Sopenharmony_ci default: 68762306a36Sopenharmony_ci goto out; 68862306a36Sopenharmony_ci } 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_ci retval = ((u32)side_effect << 16) | ret; 69162306a36Sopenharmony_ci if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval))) 69262306a36Sopenharmony_ci goto out; 69362306a36Sopenharmony_ci 69462306a36Sopenharmony_ci err = 0; 69562306a36Sopenharmony_ciout: 69662306a36Sopenharmony_ci trace_bpf_test_finish(&err); 69762306a36Sopenharmony_ci return err; 69862306a36Sopenharmony_ci} 69962306a36Sopenharmony_ci 70062306a36Sopenharmony_cistruct bpf_raw_tp_test_run_info { 70162306a36Sopenharmony_ci struct bpf_prog *prog; 70262306a36Sopenharmony_ci void *ctx; 70362306a36Sopenharmony_ci u32 retval; 70462306a36Sopenharmony_ci}; 70562306a36Sopenharmony_ci 70662306a36Sopenharmony_cistatic void 70762306a36Sopenharmony_ci__bpf_prog_test_run_raw_tp(void *data) 70862306a36Sopenharmony_ci{ 70962306a36Sopenharmony_ci struct bpf_raw_tp_test_run_info *info = data; 71062306a36Sopenharmony_ci 71162306a36Sopenharmony_ci rcu_read_lock(); 71262306a36Sopenharmony_ci info->retval = bpf_prog_run(info->prog, info->ctx); 71362306a36Sopenharmony_ci rcu_read_unlock(); 71462306a36Sopenharmony_ci} 71562306a36Sopenharmony_ci 71662306a36Sopenharmony_ciint bpf_prog_test_run_raw_tp(struct bpf_prog *prog, 71762306a36Sopenharmony_ci const union bpf_attr *kattr, 71862306a36Sopenharmony_ci union bpf_attr __user *uattr) 71962306a36Sopenharmony_ci{ 72062306a36Sopenharmony_ci void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in); 72162306a36Sopenharmony_ci __u32 ctx_size_in = kattr->test.ctx_size_in; 72262306a36Sopenharmony_ci struct bpf_raw_tp_test_run_info info; 72362306a36Sopenharmony_ci int cpu = kattr->test.cpu, err = 0; 72462306a36Sopenharmony_ci int current_cpu; 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci /* doesn't support data_in/out, ctx_out, duration, or repeat */ 72762306a36Sopenharmony_ci if (kattr->test.data_in || kattr->test.data_out || 72862306a36Sopenharmony_ci kattr->test.ctx_out || kattr->test.duration || 72962306a36Sopenharmony_ci kattr->test.repeat || kattr->test.batch_size) 73062306a36Sopenharmony_ci return -EINVAL; 73162306a36Sopenharmony_ci 73262306a36Sopenharmony_ci if (ctx_size_in < prog->aux->max_ctx_offset || 73362306a36Sopenharmony_ci ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64)) 73462306a36Sopenharmony_ci return -EINVAL; 73562306a36Sopenharmony_ci 73662306a36Sopenharmony_ci if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 && cpu != 0) 73762306a36Sopenharmony_ci return -EINVAL; 73862306a36Sopenharmony_ci 73962306a36Sopenharmony_ci if (ctx_size_in) { 74062306a36Sopenharmony_ci info.ctx = memdup_user(ctx_in, ctx_size_in); 74162306a36Sopenharmony_ci if (IS_ERR(info.ctx)) 74262306a36Sopenharmony_ci return PTR_ERR(info.ctx); 74362306a36Sopenharmony_ci } else { 74462306a36Sopenharmony_ci info.ctx = NULL; 74562306a36Sopenharmony_ci } 74662306a36Sopenharmony_ci 74762306a36Sopenharmony_ci info.prog = prog; 74862306a36Sopenharmony_ci 74962306a36Sopenharmony_ci current_cpu = get_cpu(); 75062306a36Sopenharmony_ci if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 || 75162306a36Sopenharmony_ci cpu == current_cpu) { 75262306a36Sopenharmony_ci __bpf_prog_test_run_raw_tp(&info); 75362306a36Sopenharmony_ci } else if (cpu >= nr_cpu_ids || !cpu_online(cpu)) { 75462306a36Sopenharmony_ci /* smp_call_function_single() also checks cpu_online() 75562306a36Sopenharmony_ci * after csd_lock(). However, since cpu is from user 75662306a36Sopenharmony_ci * space, let's do an extra quick check to filter out 75762306a36Sopenharmony_ci * invalid value before smp_call_function_single(). 75862306a36Sopenharmony_ci */ 75962306a36Sopenharmony_ci err = -ENXIO; 76062306a36Sopenharmony_ci } else { 76162306a36Sopenharmony_ci err = smp_call_function_single(cpu, __bpf_prog_test_run_raw_tp, 76262306a36Sopenharmony_ci &info, 1); 76362306a36Sopenharmony_ci } 76462306a36Sopenharmony_ci put_cpu(); 76562306a36Sopenharmony_ci 76662306a36Sopenharmony_ci if (!err && 76762306a36Sopenharmony_ci copy_to_user(&uattr->test.retval, &info.retval, sizeof(u32))) 76862306a36Sopenharmony_ci err = -EFAULT; 76962306a36Sopenharmony_ci 77062306a36Sopenharmony_ci kfree(info.ctx); 77162306a36Sopenharmony_ci return err; 77262306a36Sopenharmony_ci} 77362306a36Sopenharmony_ci 77462306a36Sopenharmony_cistatic void *bpf_ctx_init(const union bpf_attr *kattr, u32 max_size) 77562306a36Sopenharmony_ci{ 77662306a36Sopenharmony_ci void __user *data_in = u64_to_user_ptr(kattr->test.ctx_in); 77762306a36Sopenharmony_ci void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out); 77862306a36Sopenharmony_ci u32 size = kattr->test.ctx_size_in; 77962306a36Sopenharmony_ci void *data; 78062306a36Sopenharmony_ci int err; 78162306a36Sopenharmony_ci 78262306a36Sopenharmony_ci if (!data_in && !data_out) 78362306a36Sopenharmony_ci return NULL; 78462306a36Sopenharmony_ci 78562306a36Sopenharmony_ci data = kzalloc(max_size, GFP_USER); 78662306a36Sopenharmony_ci if (!data) 78762306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 78862306a36Sopenharmony_ci 78962306a36Sopenharmony_ci if (data_in) { 79062306a36Sopenharmony_ci err = bpf_check_uarg_tail_zero(USER_BPFPTR(data_in), max_size, size); 79162306a36Sopenharmony_ci if (err) { 79262306a36Sopenharmony_ci kfree(data); 79362306a36Sopenharmony_ci return ERR_PTR(err); 79462306a36Sopenharmony_ci } 79562306a36Sopenharmony_ci 79662306a36Sopenharmony_ci size = min_t(u32, max_size, size); 79762306a36Sopenharmony_ci if (copy_from_user(data, data_in, size)) { 79862306a36Sopenharmony_ci kfree(data); 79962306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 80062306a36Sopenharmony_ci } 80162306a36Sopenharmony_ci } 80262306a36Sopenharmony_ci return data; 80362306a36Sopenharmony_ci} 80462306a36Sopenharmony_ci 80562306a36Sopenharmony_cistatic int bpf_ctx_finish(const union bpf_attr *kattr, 80662306a36Sopenharmony_ci union bpf_attr __user *uattr, const void *data, 80762306a36Sopenharmony_ci u32 size) 80862306a36Sopenharmony_ci{ 80962306a36Sopenharmony_ci void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out); 81062306a36Sopenharmony_ci int err = -EFAULT; 81162306a36Sopenharmony_ci u32 copy_size = size; 81262306a36Sopenharmony_ci 81362306a36Sopenharmony_ci if (!data || !data_out) 81462306a36Sopenharmony_ci return 0; 81562306a36Sopenharmony_ci 81662306a36Sopenharmony_ci if (copy_size > kattr->test.ctx_size_out) { 81762306a36Sopenharmony_ci copy_size = kattr->test.ctx_size_out; 81862306a36Sopenharmony_ci err = -ENOSPC; 81962306a36Sopenharmony_ci } 82062306a36Sopenharmony_ci 82162306a36Sopenharmony_ci if (copy_to_user(data_out, data, copy_size)) 82262306a36Sopenharmony_ci goto out; 82362306a36Sopenharmony_ci if (copy_to_user(&uattr->test.ctx_size_out, &size, sizeof(size))) 82462306a36Sopenharmony_ci goto out; 82562306a36Sopenharmony_ci if (err != -ENOSPC) 82662306a36Sopenharmony_ci err = 0; 82762306a36Sopenharmony_ciout: 82862306a36Sopenharmony_ci return err; 82962306a36Sopenharmony_ci} 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_ci/** 83262306a36Sopenharmony_ci * range_is_zero - test whether buffer is initialized 83362306a36Sopenharmony_ci * @buf: buffer to check 83462306a36Sopenharmony_ci * @from: check from this position 83562306a36Sopenharmony_ci * @to: check up until (excluding) this position 83662306a36Sopenharmony_ci * 83762306a36Sopenharmony_ci * This function returns true if the there is a non-zero byte 83862306a36Sopenharmony_ci * in the buf in the range [from,to). 83962306a36Sopenharmony_ci */ 84062306a36Sopenharmony_cistatic inline bool range_is_zero(void *buf, size_t from, size_t to) 84162306a36Sopenharmony_ci{ 84262306a36Sopenharmony_ci return !memchr_inv((u8 *)buf + from, 0, to - from); 84362306a36Sopenharmony_ci} 84462306a36Sopenharmony_ci 84562306a36Sopenharmony_cistatic int convert___skb_to_skb(struct sk_buff *skb, struct __sk_buff *__skb) 84662306a36Sopenharmony_ci{ 84762306a36Sopenharmony_ci struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb; 84862306a36Sopenharmony_ci 84962306a36Sopenharmony_ci if (!__skb) 85062306a36Sopenharmony_ci return 0; 85162306a36Sopenharmony_ci 85262306a36Sopenharmony_ci /* make sure the fields we don't use are zeroed */ 85362306a36Sopenharmony_ci if (!range_is_zero(__skb, 0, offsetof(struct __sk_buff, mark))) 85462306a36Sopenharmony_ci return -EINVAL; 85562306a36Sopenharmony_ci 85662306a36Sopenharmony_ci /* mark is allowed */ 85762306a36Sopenharmony_ci 85862306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, mark), 85962306a36Sopenharmony_ci offsetof(struct __sk_buff, priority))) 86062306a36Sopenharmony_ci return -EINVAL; 86162306a36Sopenharmony_ci 86262306a36Sopenharmony_ci /* priority is allowed */ 86362306a36Sopenharmony_ci /* ingress_ifindex is allowed */ 86462306a36Sopenharmony_ci /* ifindex is allowed */ 86562306a36Sopenharmony_ci 86662306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, ifindex), 86762306a36Sopenharmony_ci offsetof(struct __sk_buff, cb))) 86862306a36Sopenharmony_ci return -EINVAL; 86962306a36Sopenharmony_ci 87062306a36Sopenharmony_ci /* cb is allowed */ 87162306a36Sopenharmony_ci 87262306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, cb), 87362306a36Sopenharmony_ci offsetof(struct __sk_buff, tstamp))) 87462306a36Sopenharmony_ci return -EINVAL; 87562306a36Sopenharmony_ci 87662306a36Sopenharmony_ci /* tstamp is allowed */ 87762306a36Sopenharmony_ci /* wire_len is allowed */ 87862306a36Sopenharmony_ci /* gso_segs is allowed */ 87962306a36Sopenharmony_ci 88062306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_segs), 88162306a36Sopenharmony_ci offsetof(struct __sk_buff, gso_size))) 88262306a36Sopenharmony_ci return -EINVAL; 88362306a36Sopenharmony_ci 88462306a36Sopenharmony_ci /* gso_size is allowed */ 88562306a36Sopenharmony_ci 88662306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_size), 88762306a36Sopenharmony_ci offsetof(struct __sk_buff, hwtstamp))) 88862306a36Sopenharmony_ci return -EINVAL; 88962306a36Sopenharmony_ci 89062306a36Sopenharmony_ci /* hwtstamp is allowed */ 89162306a36Sopenharmony_ci 89262306a36Sopenharmony_ci if (!range_is_zero(__skb, offsetofend(struct __sk_buff, hwtstamp), 89362306a36Sopenharmony_ci sizeof(struct __sk_buff))) 89462306a36Sopenharmony_ci return -EINVAL; 89562306a36Sopenharmony_ci 89662306a36Sopenharmony_ci skb->mark = __skb->mark; 89762306a36Sopenharmony_ci skb->priority = __skb->priority; 89862306a36Sopenharmony_ci skb->skb_iif = __skb->ingress_ifindex; 89962306a36Sopenharmony_ci skb->tstamp = __skb->tstamp; 90062306a36Sopenharmony_ci memcpy(&cb->data, __skb->cb, QDISC_CB_PRIV_LEN); 90162306a36Sopenharmony_ci 90262306a36Sopenharmony_ci if (__skb->wire_len == 0) { 90362306a36Sopenharmony_ci cb->pkt_len = skb->len; 90462306a36Sopenharmony_ci } else { 90562306a36Sopenharmony_ci if (__skb->wire_len < skb->len || 90662306a36Sopenharmony_ci __skb->wire_len > GSO_LEGACY_MAX_SIZE) 90762306a36Sopenharmony_ci return -EINVAL; 90862306a36Sopenharmony_ci cb->pkt_len = __skb->wire_len; 90962306a36Sopenharmony_ci } 91062306a36Sopenharmony_ci 91162306a36Sopenharmony_ci if (__skb->gso_segs > GSO_MAX_SEGS) 91262306a36Sopenharmony_ci return -EINVAL; 91362306a36Sopenharmony_ci skb_shinfo(skb)->gso_segs = __skb->gso_segs; 91462306a36Sopenharmony_ci skb_shinfo(skb)->gso_size = __skb->gso_size; 91562306a36Sopenharmony_ci skb_shinfo(skb)->hwtstamps.hwtstamp = __skb->hwtstamp; 91662306a36Sopenharmony_ci 91762306a36Sopenharmony_ci return 0; 91862306a36Sopenharmony_ci} 91962306a36Sopenharmony_ci 92062306a36Sopenharmony_cistatic void convert_skb_to___skb(struct sk_buff *skb, struct __sk_buff *__skb) 92162306a36Sopenharmony_ci{ 92262306a36Sopenharmony_ci struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb; 92362306a36Sopenharmony_ci 92462306a36Sopenharmony_ci if (!__skb) 92562306a36Sopenharmony_ci return; 92662306a36Sopenharmony_ci 92762306a36Sopenharmony_ci __skb->mark = skb->mark; 92862306a36Sopenharmony_ci __skb->priority = skb->priority; 92962306a36Sopenharmony_ci __skb->ingress_ifindex = skb->skb_iif; 93062306a36Sopenharmony_ci __skb->ifindex = skb->dev->ifindex; 93162306a36Sopenharmony_ci __skb->tstamp = skb->tstamp; 93262306a36Sopenharmony_ci memcpy(__skb->cb, &cb->data, QDISC_CB_PRIV_LEN); 93362306a36Sopenharmony_ci __skb->wire_len = cb->pkt_len; 93462306a36Sopenharmony_ci __skb->gso_segs = skb_shinfo(skb)->gso_segs; 93562306a36Sopenharmony_ci __skb->hwtstamp = skb_shinfo(skb)->hwtstamps.hwtstamp; 93662306a36Sopenharmony_ci} 93762306a36Sopenharmony_ci 93862306a36Sopenharmony_cistatic struct proto bpf_dummy_proto = { 93962306a36Sopenharmony_ci .name = "bpf_dummy", 94062306a36Sopenharmony_ci .owner = THIS_MODULE, 94162306a36Sopenharmony_ci .obj_size = sizeof(struct sock), 94262306a36Sopenharmony_ci}; 94362306a36Sopenharmony_ci 94462306a36Sopenharmony_ciint bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr, 94562306a36Sopenharmony_ci union bpf_attr __user *uattr) 94662306a36Sopenharmony_ci{ 94762306a36Sopenharmony_ci bool is_l2 = false, is_direct_pkt_access = false; 94862306a36Sopenharmony_ci struct net *net = current->nsproxy->net_ns; 94962306a36Sopenharmony_ci struct net_device *dev = net->loopback_dev; 95062306a36Sopenharmony_ci u32 size = kattr->test.data_size_in; 95162306a36Sopenharmony_ci u32 repeat = kattr->test.repeat; 95262306a36Sopenharmony_ci struct __sk_buff *ctx = NULL; 95362306a36Sopenharmony_ci u32 retval, duration; 95462306a36Sopenharmony_ci int hh_len = ETH_HLEN; 95562306a36Sopenharmony_ci struct sk_buff *skb; 95662306a36Sopenharmony_ci struct sock *sk; 95762306a36Sopenharmony_ci void *data; 95862306a36Sopenharmony_ci int ret; 95962306a36Sopenharmony_ci 96062306a36Sopenharmony_ci if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size) 96162306a36Sopenharmony_ci return -EINVAL; 96262306a36Sopenharmony_ci 96362306a36Sopenharmony_ci data = bpf_test_init(kattr, kattr->test.data_size_in, 96462306a36Sopenharmony_ci size, NET_SKB_PAD + NET_IP_ALIGN, 96562306a36Sopenharmony_ci SKB_DATA_ALIGN(sizeof(struct skb_shared_info))); 96662306a36Sopenharmony_ci if (IS_ERR(data)) 96762306a36Sopenharmony_ci return PTR_ERR(data); 96862306a36Sopenharmony_ci 96962306a36Sopenharmony_ci ctx = bpf_ctx_init(kattr, sizeof(struct __sk_buff)); 97062306a36Sopenharmony_ci if (IS_ERR(ctx)) { 97162306a36Sopenharmony_ci kfree(data); 97262306a36Sopenharmony_ci return PTR_ERR(ctx); 97362306a36Sopenharmony_ci } 97462306a36Sopenharmony_ci 97562306a36Sopenharmony_ci switch (prog->type) { 97662306a36Sopenharmony_ci case BPF_PROG_TYPE_SCHED_CLS: 97762306a36Sopenharmony_ci case BPF_PROG_TYPE_SCHED_ACT: 97862306a36Sopenharmony_ci is_l2 = true; 97962306a36Sopenharmony_ci fallthrough; 98062306a36Sopenharmony_ci case BPF_PROG_TYPE_LWT_IN: 98162306a36Sopenharmony_ci case BPF_PROG_TYPE_LWT_OUT: 98262306a36Sopenharmony_ci case BPF_PROG_TYPE_LWT_XMIT: 98362306a36Sopenharmony_ci is_direct_pkt_access = true; 98462306a36Sopenharmony_ci break; 98562306a36Sopenharmony_ci default: 98662306a36Sopenharmony_ci break; 98762306a36Sopenharmony_ci } 98862306a36Sopenharmony_ci 98962306a36Sopenharmony_ci sk = sk_alloc(net, AF_UNSPEC, GFP_USER, &bpf_dummy_proto, 1); 99062306a36Sopenharmony_ci if (!sk) { 99162306a36Sopenharmony_ci kfree(data); 99262306a36Sopenharmony_ci kfree(ctx); 99362306a36Sopenharmony_ci return -ENOMEM; 99462306a36Sopenharmony_ci } 99562306a36Sopenharmony_ci sock_init_data(NULL, sk); 99662306a36Sopenharmony_ci 99762306a36Sopenharmony_ci skb = slab_build_skb(data); 99862306a36Sopenharmony_ci if (!skb) { 99962306a36Sopenharmony_ci kfree(data); 100062306a36Sopenharmony_ci kfree(ctx); 100162306a36Sopenharmony_ci sk_free(sk); 100262306a36Sopenharmony_ci return -ENOMEM; 100362306a36Sopenharmony_ci } 100462306a36Sopenharmony_ci skb->sk = sk; 100562306a36Sopenharmony_ci 100662306a36Sopenharmony_ci skb_reserve(skb, NET_SKB_PAD + NET_IP_ALIGN); 100762306a36Sopenharmony_ci __skb_put(skb, size); 100862306a36Sopenharmony_ci if (ctx && ctx->ifindex > 1) { 100962306a36Sopenharmony_ci dev = dev_get_by_index(net, ctx->ifindex); 101062306a36Sopenharmony_ci if (!dev) { 101162306a36Sopenharmony_ci ret = -ENODEV; 101262306a36Sopenharmony_ci goto out; 101362306a36Sopenharmony_ci } 101462306a36Sopenharmony_ci } 101562306a36Sopenharmony_ci skb->protocol = eth_type_trans(skb, dev); 101662306a36Sopenharmony_ci skb_reset_network_header(skb); 101762306a36Sopenharmony_ci 101862306a36Sopenharmony_ci switch (skb->protocol) { 101962306a36Sopenharmony_ci case htons(ETH_P_IP): 102062306a36Sopenharmony_ci sk->sk_family = AF_INET; 102162306a36Sopenharmony_ci if (sizeof(struct iphdr) <= skb_headlen(skb)) { 102262306a36Sopenharmony_ci sk->sk_rcv_saddr = ip_hdr(skb)->saddr; 102362306a36Sopenharmony_ci sk->sk_daddr = ip_hdr(skb)->daddr; 102462306a36Sopenharmony_ci } 102562306a36Sopenharmony_ci break; 102662306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6) 102762306a36Sopenharmony_ci case htons(ETH_P_IPV6): 102862306a36Sopenharmony_ci sk->sk_family = AF_INET6; 102962306a36Sopenharmony_ci if (sizeof(struct ipv6hdr) <= skb_headlen(skb)) { 103062306a36Sopenharmony_ci sk->sk_v6_rcv_saddr = ipv6_hdr(skb)->saddr; 103162306a36Sopenharmony_ci sk->sk_v6_daddr = ipv6_hdr(skb)->daddr; 103262306a36Sopenharmony_ci } 103362306a36Sopenharmony_ci break; 103462306a36Sopenharmony_ci#endif 103562306a36Sopenharmony_ci default: 103662306a36Sopenharmony_ci break; 103762306a36Sopenharmony_ci } 103862306a36Sopenharmony_ci 103962306a36Sopenharmony_ci if (is_l2) 104062306a36Sopenharmony_ci __skb_push(skb, hh_len); 104162306a36Sopenharmony_ci if (is_direct_pkt_access) 104262306a36Sopenharmony_ci bpf_compute_data_pointers(skb); 104362306a36Sopenharmony_ci ret = convert___skb_to_skb(skb, ctx); 104462306a36Sopenharmony_ci if (ret) 104562306a36Sopenharmony_ci goto out; 104662306a36Sopenharmony_ci ret = bpf_test_run(prog, skb, repeat, &retval, &duration, false); 104762306a36Sopenharmony_ci if (ret) 104862306a36Sopenharmony_ci goto out; 104962306a36Sopenharmony_ci if (!is_l2) { 105062306a36Sopenharmony_ci if (skb_headroom(skb) < hh_len) { 105162306a36Sopenharmony_ci int nhead = HH_DATA_ALIGN(hh_len - skb_headroom(skb)); 105262306a36Sopenharmony_ci 105362306a36Sopenharmony_ci if (pskb_expand_head(skb, nhead, 0, GFP_USER)) { 105462306a36Sopenharmony_ci ret = -ENOMEM; 105562306a36Sopenharmony_ci goto out; 105662306a36Sopenharmony_ci } 105762306a36Sopenharmony_ci } 105862306a36Sopenharmony_ci memset(__skb_push(skb, hh_len), 0, hh_len); 105962306a36Sopenharmony_ci } 106062306a36Sopenharmony_ci convert_skb_to___skb(skb, ctx); 106162306a36Sopenharmony_ci 106262306a36Sopenharmony_ci size = skb->len; 106362306a36Sopenharmony_ci /* bpf program can never convert linear skb to non-linear */ 106462306a36Sopenharmony_ci if (WARN_ON_ONCE(skb_is_nonlinear(skb))) 106562306a36Sopenharmony_ci size = skb_headlen(skb); 106662306a36Sopenharmony_ci ret = bpf_test_finish(kattr, uattr, skb->data, NULL, size, retval, 106762306a36Sopenharmony_ci duration); 106862306a36Sopenharmony_ci if (!ret) 106962306a36Sopenharmony_ci ret = bpf_ctx_finish(kattr, uattr, ctx, 107062306a36Sopenharmony_ci sizeof(struct __sk_buff)); 107162306a36Sopenharmony_ciout: 107262306a36Sopenharmony_ci if (dev && dev != net->loopback_dev) 107362306a36Sopenharmony_ci dev_put(dev); 107462306a36Sopenharmony_ci kfree_skb(skb); 107562306a36Sopenharmony_ci sk_free(sk); 107662306a36Sopenharmony_ci kfree(ctx); 107762306a36Sopenharmony_ci return ret; 107862306a36Sopenharmony_ci} 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_cistatic int xdp_convert_md_to_buff(struct xdp_md *xdp_md, struct xdp_buff *xdp) 108162306a36Sopenharmony_ci{ 108262306a36Sopenharmony_ci unsigned int ingress_ifindex, rx_queue_index; 108362306a36Sopenharmony_ci struct netdev_rx_queue *rxqueue; 108462306a36Sopenharmony_ci struct net_device *device; 108562306a36Sopenharmony_ci 108662306a36Sopenharmony_ci if (!xdp_md) 108762306a36Sopenharmony_ci return 0; 108862306a36Sopenharmony_ci 108962306a36Sopenharmony_ci if (xdp_md->egress_ifindex != 0) 109062306a36Sopenharmony_ci return -EINVAL; 109162306a36Sopenharmony_ci 109262306a36Sopenharmony_ci ingress_ifindex = xdp_md->ingress_ifindex; 109362306a36Sopenharmony_ci rx_queue_index = xdp_md->rx_queue_index; 109462306a36Sopenharmony_ci 109562306a36Sopenharmony_ci if (!ingress_ifindex && rx_queue_index) 109662306a36Sopenharmony_ci return -EINVAL; 109762306a36Sopenharmony_ci 109862306a36Sopenharmony_ci if (ingress_ifindex) { 109962306a36Sopenharmony_ci device = dev_get_by_index(current->nsproxy->net_ns, 110062306a36Sopenharmony_ci ingress_ifindex); 110162306a36Sopenharmony_ci if (!device) 110262306a36Sopenharmony_ci return -ENODEV; 110362306a36Sopenharmony_ci 110462306a36Sopenharmony_ci if (rx_queue_index >= device->real_num_rx_queues) 110562306a36Sopenharmony_ci goto free_dev; 110662306a36Sopenharmony_ci 110762306a36Sopenharmony_ci rxqueue = __netif_get_rx_queue(device, rx_queue_index); 110862306a36Sopenharmony_ci 110962306a36Sopenharmony_ci if (!xdp_rxq_info_is_reg(&rxqueue->xdp_rxq)) 111062306a36Sopenharmony_ci goto free_dev; 111162306a36Sopenharmony_ci 111262306a36Sopenharmony_ci xdp->rxq = &rxqueue->xdp_rxq; 111362306a36Sopenharmony_ci /* The device is now tracked in the xdp->rxq for later 111462306a36Sopenharmony_ci * dev_put() 111562306a36Sopenharmony_ci */ 111662306a36Sopenharmony_ci } 111762306a36Sopenharmony_ci 111862306a36Sopenharmony_ci xdp->data = xdp->data_meta + xdp_md->data; 111962306a36Sopenharmony_ci return 0; 112062306a36Sopenharmony_ci 112162306a36Sopenharmony_cifree_dev: 112262306a36Sopenharmony_ci dev_put(device); 112362306a36Sopenharmony_ci return -EINVAL; 112462306a36Sopenharmony_ci} 112562306a36Sopenharmony_ci 112662306a36Sopenharmony_cistatic void xdp_convert_buff_to_md(struct xdp_buff *xdp, struct xdp_md *xdp_md) 112762306a36Sopenharmony_ci{ 112862306a36Sopenharmony_ci if (!xdp_md) 112962306a36Sopenharmony_ci return; 113062306a36Sopenharmony_ci 113162306a36Sopenharmony_ci xdp_md->data = xdp->data - xdp->data_meta; 113262306a36Sopenharmony_ci xdp_md->data_end = xdp->data_end - xdp->data_meta; 113362306a36Sopenharmony_ci 113462306a36Sopenharmony_ci if (xdp_md->ingress_ifindex) 113562306a36Sopenharmony_ci dev_put(xdp->rxq->dev); 113662306a36Sopenharmony_ci} 113762306a36Sopenharmony_ci 113862306a36Sopenharmony_ciint bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr, 113962306a36Sopenharmony_ci union bpf_attr __user *uattr) 114062306a36Sopenharmony_ci{ 114162306a36Sopenharmony_ci bool do_live = (kattr->test.flags & BPF_F_TEST_XDP_LIVE_FRAMES); 114262306a36Sopenharmony_ci u32 tailroom = SKB_DATA_ALIGN(sizeof(struct skb_shared_info)); 114362306a36Sopenharmony_ci u32 batch_size = kattr->test.batch_size; 114462306a36Sopenharmony_ci u32 retval = 0, duration, max_data_sz; 114562306a36Sopenharmony_ci u32 size = kattr->test.data_size_in; 114662306a36Sopenharmony_ci u32 headroom = XDP_PACKET_HEADROOM; 114762306a36Sopenharmony_ci u32 repeat = kattr->test.repeat; 114862306a36Sopenharmony_ci struct netdev_rx_queue *rxqueue; 114962306a36Sopenharmony_ci struct skb_shared_info *sinfo; 115062306a36Sopenharmony_ci struct xdp_buff xdp = {}; 115162306a36Sopenharmony_ci int i, ret = -EINVAL; 115262306a36Sopenharmony_ci struct xdp_md *ctx; 115362306a36Sopenharmony_ci void *data; 115462306a36Sopenharmony_ci 115562306a36Sopenharmony_ci if (prog->expected_attach_type == BPF_XDP_DEVMAP || 115662306a36Sopenharmony_ci prog->expected_attach_type == BPF_XDP_CPUMAP) 115762306a36Sopenharmony_ci return -EINVAL; 115862306a36Sopenharmony_ci 115962306a36Sopenharmony_ci if (kattr->test.flags & ~BPF_F_TEST_XDP_LIVE_FRAMES) 116062306a36Sopenharmony_ci return -EINVAL; 116162306a36Sopenharmony_ci 116262306a36Sopenharmony_ci if (bpf_prog_is_dev_bound(prog->aux)) 116362306a36Sopenharmony_ci return -EINVAL; 116462306a36Sopenharmony_ci 116562306a36Sopenharmony_ci if (do_live) { 116662306a36Sopenharmony_ci if (!batch_size) 116762306a36Sopenharmony_ci batch_size = NAPI_POLL_WEIGHT; 116862306a36Sopenharmony_ci else if (batch_size > TEST_XDP_MAX_BATCH) 116962306a36Sopenharmony_ci return -E2BIG; 117062306a36Sopenharmony_ci 117162306a36Sopenharmony_ci headroom += sizeof(struct xdp_page_head); 117262306a36Sopenharmony_ci } else if (batch_size) { 117362306a36Sopenharmony_ci return -EINVAL; 117462306a36Sopenharmony_ci } 117562306a36Sopenharmony_ci 117662306a36Sopenharmony_ci ctx = bpf_ctx_init(kattr, sizeof(struct xdp_md)); 117762306a36Sopenharmony_ci if (IS_ERR(ctx)) 117862306a36Sopenharmony_ci return PTR_ERR(ctx); 117962306a36Sopenharmony_ci 118062306a36Sopenharmony_ci if (ctx) { 118162306a36Sopenharmony_ci /* There can't be user provided data before the meta data */ 118262306a36Sopenharmony_ci if (ctx->data_meta || ctx->data_end != size || 118362306a36Sopenharmony_ci ctx->data > ctx->data_end || 118462306a36Sopenharmony_ci unlikely(xdp_metalen_invalid(ctx->data)) || 118562306a36Sopenharmony_ci (do_live && (kattr->test.data_out || kattr->test.ctx_out))) 118662306a36Sopenharmony_ci goto free_ctx; 118762306a36Sopenharmony_ci /* Meta data is allocated from the headroom */ 118862306a36Sopenharmony_ci headroom -= ctx->data; 118962306a36Sopenharmony_ci } 119062306a36Sopenharmony_ci 119162306a36Sopenharmony_ci max_data_sz = 4096 - headroom - tailroom; 119262306a36Sopenharmony_ci if (size > max_data_sz) { 119362306a36Sopenharmony_ci /* disallow live data mode for jumbo frames */ 119462306a36Sopenharmony_ci if (do_live) 119562306a36Sopenharmony_ci goto free_ctx; 119662306a36Sopenharmony_ci size = max_data_sz; 119762306a36Sopenharmony_ci } 119862306a36Sopenharmony_ci 119962306a36Sopenharmony_ci data = bpf_test_init(kattr, size, max_data_sz, headroom, tailroom); 120062306a36Sopenharmony_ci if (IS_ERR(data)) { 120162306a36Sopenharmony_ci ret = PTR_ERR(data); 120262306a36Sopenharmony_ci goto free_ctx; 120362306a36Sopenharmony_ci } 120462306a36Sopenharmony_ci 120562306a36Sopenharmony_ci rxqueue = __netif_get_rx_queue(current->nsproxy->net_ns->loopback_dev, 0); 120662306a36Sopenharmony_ci rxqueue->xdp_rxq.frag_size = headroom + max_data_sz + tailroom; 120762306a36Sopenharmony_ci xdp_init_buff(&xdp, rxqueue->xdp_rxq.frag_size, &rxqueue->xdp_rxq); 120862306a36Sopenharmony_ci xdp_prepare_buff(&xdp, data, headroom, size, true); 120962306a36Sopenharmony_ci sinfo = xdp_get_shared_info_from_buff(&xdp); 121062306a36Sopenharmony_ci 121162306a36Sopenharmony_ci ret = xdp_convert_md_to_buff(ctx, &xdp); 121262306a36Sopenharmony_ci if (ret) 121362306a36Sopenharmony_ci goto free_data; 121462306a36Sopenharmony_ci 121562306a36Sopenharmony_ci if (unlikely(kattr->test.data_size_in > size)) { 121662306a36Sopenharmony_ci void __user *data_in = u64_to_user_ptr(kattr->test.data_in); 121762306a36Sopenharmony_ci 121862306a36Sopenharmony_ci while (size < kattr->test.data_size_in) { 121962306a36Sopenharmony_ci struct page *page; 122062306a36Sopenharmony_ci skb_frag_t *frag; 122162306a36Sopenharmony_ci u32 data_len; 122262306a36Sopenharmony_ci 122362306a36Sopenharmony_ci if (sinfo->nr_frags == MAX_SKB_FRAGS) { 122462306a36Sopenharmony_ci ret = -ENOMEM; 122562306a36Sopenharmony_ci goto out; 122662306a36Sopenharmony_ci } 122762306a36Sopenharmony_ci 122862306a36Sopenharmony_ci page = alloc_page(GFP_KERNEL); 122962306a36Sopenharmony_ci if (!page) { 123062306a36Sopenharmony_ci ret = -ENOMEM; 123162306a36Sopenharmony_ci goto out; 123262306a36Sopenharmony_ci } 123362306a36Sopenharmony_ci 123462306a36Sopenharmony_ci frag = &sinfo->frags[sinfo->nr_frags++]; 123562306a36Sopenharmony_ci 123662306a36Sopenharmony_ci data_len = min_t(u32, kattr->test.data_size_in - size, 123762306a36Sopenharmony_ci PAGE_SIZE); 123862306a36Sopenharmony_ci skb_frag_fill_page_desc(frag, page, 0, data_len); 123962306a36Sopenharmony_ci 124062306a36Sopenharmony_ci if (copy_from_user(page_address(page), data_in + size, 124162306a36Sopenharmony_ci data_len)) { 124262306a36Sopenharmony_ci ret = -EFAULT; 124362306a36Sopenharmony_ci goto out; 124462306a36Sopenharmony_ci } 124562306a36Sopenharmony_ci sinfo->xdp_frags_size += data_len; 124662306a36Sopenharmony_ci size += data_len; 124762306a36Sopenharmony_ci } 124862306a36Sopenharmony_ci xdp_buff_set_frags_flag(&xdp); 124962306a36Sopenharmony_ci } 125062306a36Sopenharmony_ci 125162306a36Sopenharmony_ci if (repeat > 1) 125262306a36Sopenharmony_ci bpf_prog_change_xdp(NULL, prog); 125362306a36Sopenharmony_ci 125462306a36Sopenharmony_ci if (do_live) 125562306a36Sopenharmony_ci ret = bpf_test_run_xdp_live(prog, &xdp, repeat, batch_size, &duration); 125662306a36Sopenharmony_ci else 125762306a36Sopenharmony_ci ret = bpf_test_run(prog, &xdp, repeat, &retval, &duration, true); 125862306a36Sopenharmony_ci /* We convert the xdp_buff back to an xdp_md before checking the return 125962306a36Sopenharmony_ci * code so the reference count of any held netdevice will be decremented 126062306a36Sopenharmony_ci * even if the test run failed. 126162306a36Sopenharmony_ci */ 126262306a36Sopenharmony_ci xdp_convert_buff_to_md(&xdp, ctx); 126362306a36Sopenharmony_ci if (ret) 126462306a36Sopenharmony_ci goto out; 126562306a36Sopenharmony_ci 126662306a36Sopenharmony_ci size = xdp.data_end - xdp.data_meta + sinfo->xdp_frags_size; 126762306a36Sopenharmony_ci ret = bpf_test_finish(kattr, uattr, xdp.data_meta, sinfo, size, 126862306a36Sopenharmony_ci retval, duration); 126962306a36Sopenharmony_ci if (!ret) 127062306a36Sopenharmony_ci ret = bpf_ctx_finish(kattr, uattr, ctx, 127162306a36Sopenharmony_ci sizeof(struct xdp_md)); 127262306a36Sopenharmony_ci 127362306a36Sopenharmony_ciout: 127462306a36Sopenharmony_ci if (repeat > 1) 127562306a36Sopenharmony_ci bpf_prog_change_xdp(prog, NULL); 127662306a36Sopenharmony_cifree_data: 127762306a36Sopenharmony_ci for (i = 0; i < sinfo->nr_frags; i++) 127862306a36Sopenharmony_ci __free_page(skb_frag_page(&sinfo->frags[i])); 127962306a36Sopenharmony_ci kfree(data); 128062306a36Sopenharmony_cifree_ctx: 128162306a36Sopenharmony_ci kfree(ctx); 128262306a36Sopenharmony_ci return ret; 128362306a36Sopenharmony_ci} 128462306a36Sopenharmony_ci 128562306a36Sopenharmony_cistatic int verify_user_bpf_flow_keys(struct bpf_flow_keys *ctx) 128662306a36Sopenharmony_ci{ 128762306a36Sopenharmony_ci /* make sure the fields we don't use are zeroed */ 128862306a36Sopenharmony_ci if (!range_is_zero(ctx, 0, offsetof(struct bpf_flow_keys, flags))) 128962306a36Sopenharmony_ci return -EINVAL; 129062306a36Sopenharmony_ci 129162306a36Sopenharmony_ci /* flags is allowed */ 129262306a36Sopenharmony_ci 129362306a36Sopenharmony_ci if (!range_is_zero(ctx, offsetofend(struct bpf_flow_keys, flags), 129462306a36Sopenharmony_ci sizeof(struct bpf_flow_keys))) 129562306a36Sopenharmony_ci return -EINVAL; 129662306a36Sopenharmony_ci 129762306a36Sopenharmony_ci return 0; 129862306a36Sopenharmony_ci} 129962306a36Sopenharmony_ci 130062306a36Sopenharmony_ciint bpf_prog_test_run_flow_dissector(struct bpf_prog *prog, 130162306a36Sopenharmony_ci const union bpf_attr *kattr, 130262306a36Sopenharmony_ci union bpf_attr __user *uattr) 130362306a36Sopenharmony_ci{ 130462306a36Sopenharmony_ci struct bpf_test_timer t = { NO_PREEMPT }; 130562306a36Sopenharmony_ci u32 size = kattr->test.data_size_in; 130662306a36Sopenharmony_ci struct bpf_flow_dissector ctx = {}; 130762306a36Sopenharmony_ci u32 repeat = kattr->test.repeat; 130862306a36Sopenharmony_ci struct bpf_flow_keys *user_ctx; 130962306a36Sopenharmony_ci struct bpf_flow_keys flow_keys; 131062306a36Sopenharmony_ci const struct ethhdr *eth; 131162306a36Sopenharmony_ci unsigned int flags = 0; 131262306a36Sopenharmony_ci u32 retval, duration; 131362306a36Sopenharmony_ci void *data; 131462306a36Sopenharmony_ci int ret; 131562306a36Sopenharmony_ci 131662306a36Sopenharmony_ci if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size) 131762306a36Sopenharmony_ci return -EINVAL; 131862306a36Sopenharmony_ci 131962306a36Sopenharmony_ci if (size < ETH_HLEN) 132062306a36Sopenharmony_ci return -EINVAL; 132162306a36Sopenharmony_ci 132262306a36Sopenharmony_ci data = bpf_test_init(kattr, kattr->test.data_size_in, size, 0, 0); 132362306a36Sopenharmony_ci if (IS_ERR(data)) 132462306a36Sopenharmony_ci return PTR_ERR(data); 132562306a36Sopenharmony_ci 132662306a36Sopenharmony_ci eth = (struct ethhdr *)data; 132762306a36Sopenharmony_ci 132862306a36Sopenharmony_ci if (!repeat) 132962306a36Sopenharmony_ci repeat = 1; 133062306a36Sopenharmony_ci 133162306a36Sopenharmony_ci user_ctx = bpf_ctx_init(kattr, sizeof(struct bpf_flow_keys)); 133262306a36Sopenharmony_ci if (IS_ERR(user_ctx)) { 133362306a36Sopenharmony_ci kfree(data); 133462306a36Sopenharmony_ci return PTR_ERR(user_ctx); 133562306a36Sopenharmony_ci } 133662306a36Sopenharmony_ci if (user_ctx) { 133762306a36Sopenharmony_ci ret = verify_user_bpf_flow_keys(user_ctx); 133862306a36Sopenharmony_ci if (ret) 133962306a36Sopenharmony_ci goto out; 134062306a36Sopenharmony_ci flags = user_ctx->flags; 134162306a36Sopenharmony_ci } 134262306a36Sopenharmony_ci 134362306a36Sopenharmony_ci ctx.flow_keys = &flow_keys; 134462306a36Sopenharmony_ci ctx.data = data; 134562306a36Sopenharmony_ci ctx.data_end = (__u8 *)data + size; 134662306a36Sopenharmony_ci 134762306a36Sopenharmony_ci bpf_test_timer_enter(&t); 134862306a36Sopenharmony_ci do { 134962306a36Sopenharmony_ci retval = bpf_flow_dissect(prog, &ctx, eth->h_proto, ETH_HLEN, 135062306a36Sopenharmony_ci size, flags); 135162306a36Sopenharmony_ci } while (bpf_test_timer_continue(&t, 1, repeat, &ret, &duration)); 135262306a36Sopenharmony_ci bpf_test_timer_leave(&t); 135362306a36Sopenharmony_ci 135462306a36Sopenharmony_ci if (ret < 0) 135562306a36Sopenharmony_ci goto out; 135662306a36Sopenharmony_ci 135762306a36Sopenharmony_ci ret = bpf_test_finish(kattr, uattr, &flow_keys, NULL, 135862306a36Sopenharmony_ci sizeof(flow_keys), retval, duration); 135962306a36Sopenharmony_ci if (!ret) 136062306a36Sopenharmony_ci ret = bpf_ctx_finish(kattr, uattr, user_ctx, 136162306a36Sopenharmony_ci sizeof(struct bpf_flow_keys)); 136262306a36Sopenharmony_ci 136362306a36Sopenharmony_ciout: 136462306a36Sopenharmony_ci kfree(user_ctx); 136562306a36Sopenharmony_ci kfree(data); 136662306a36Sopenharmony_ci return ret; 136762306a36Sopenharmony_ci} 136862306a36Sopenharmony_ci 136962306a36Sopenharmony_ciint bpf_prog_test_run_sk_lookup(struct bpf_prog *prog, const union bpf_attr *kattr, 137062306a36Sopenharmony_ci union bpf_attr __user *uattr) 137162306a36Sopenharmony_ci{ 137262306a36Sopenharmony_ci struct bpf_test_timer t = { NO_PREEMPT }; 137362306a36Sopenharmony_ci struct bpf_prog_array *progs = NULL; 137462306a36Sopenharmony_ci struct bpf_sk_lookup_kern ctx = {}; 137562306a36Sopenharmony_ci u32 repeat = kattr->test.repeat; 137662306a36Sopenharmony_ci struct bpf_sk_lookup *user_ctx; 137762306a36Sopenharmony_ci u32 retval, duration; 137862306a36Sopenharmony_ci int ret = -EINVAL; 137962306a36Sopenharmony_ci 138062306a36Sopenharmony_ci if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size) 138162306a36Sopenharmony_ci return -EINVAL; 138262306a36Sopenharmony_ci 138362306a36Sopenharmony_ci if (kattr->test.data_in || kattr->test.data_size_in || kattr->test.data_out || 138462306a36Sopenharmony_ci kattr->test.data_size_out) 138562306a36Sopenharmony_ci return -EINVAL; 138662306a36Sopenharmony_ci 138762306a36Sopenharmony_ci if (!repeat) 138862306a36Sopenharmony_ci repeat = 1; 138962306a36Sopenharmony_ci 139062306a36Sopenharmony_ci user_ctx = bpf_ctx_init(kattr, sizeof(*user_ctx)); 139162306a36Sopenharmony_ci if (IS_ERR(user_ctx)) 139262306a36Sopenharmony_ci return PTR_ERR(user_ctx); 139362306a36Sopenharmony_ci 139462306a36Sopenharmony_ci if (!user_ctx) 139562306a36Sopenharmony_ci return -EINVAL; 139662306a36Sopenharmony_ci 139762306a36Sopenharmony_ci if (user_ctx->sk) 139862306a36Sopenharmony_ci goto out; 139962306a36Sopenharmony_ci 140062306a36Sopenharmony_ci if (!range_is_zero(user_ctx, offsetofend(typeof(*user_ctx), local_port), sizeof(*user_ctx))) 140162306a36Sopenharmony_ci goto out; 140262306a36Sopenharmony_ci 140362306a36Sopenharmony_ci if (user_ctx->local_port > U16_MAX) { 140462306a36Sopenharmony_ci ret = -ERANGE; 140562306a36Sopenharmony_ci goto out; 140662306a36Sopenharmony_ci } 140762306a36Sopenharmony_ci 140862306a36Sopenharmony_ci ctx.family = (u16)user_ctx->family; 140962306a36Sopenharmony_ci ctx.protocol = (u16)user_ctx->protocol; 141062306a36Sopenharmony_ci ctx.dport = (u16)user_ctx->local_port; 141162306a36Sopenharmony_ci ctx.sport = user_ctx->remote_port; 141262306a36Sopenharmony_ci 141362306a36Sopenharmony_ci switch (ctx.family) { 141462306a36Sopenharmony_ci case AF_INET: 141562306a36Sopenharmony_ci ctx.v4.daddr = (__force __be32)user_ctx->local_ip4; 141662306a36Sopenharmony_ci ctx.v4.saddr = (__force __be32)user_ctx->remote_ip4; 141762306a36Sopenharmony_ci break; 141862306a36Sopenharmony_ci 141962306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6) 142062306a36Sopenharmony_ci case AF_INET6: 142162306a36Sopenharmony_ci ctx.v6.daddr = (struct in6_addr *)user_ctx->local_ip6; 142262306a36Sopenharmony_ci ctx.v6.saddr = (struct in6_addr *)user_ctx->remote_ip6; 142362306a36Sopenharmony_ci break; 142462306a36Sopenharmony_ci#endif 142562306a36Sopenharmony_ci 142662306a36Sopenharmony_ci default: 142762306a36Sopenharmony_ci ret = -EAFNOSUPPORT; 142862306a36Sopenharmony_ci goto out; 142962306a36Sopenharmony_ci } 143062306a36Sopenharmony_ci 143162306a36Sopenharmony_ci progs = bpf_prog_array_alloc(1, GFP_KERNEL); 143262306a36Sopenharmony_ci if (!progs) { 143362306a36Sopenharmony_ci ret = -ENOMEM; 143462306a36Sopenharmony_ci goto out; 143562306a36Sopenharmony_ci } 143662306a36Sopenharmony_ci 143762306a36Sopenharmony_ci progs->items[0].prog = prog; 143862306a36Sopenharmony_ci 143962306a36Sopenharmony_ci bpf_test_timer_enter(&t); 144062306a36Sopenharmony_ci do { 144162306a36Sopenharmony_ci ctx.selected_sk = NULL; 144262306a36Sopenharmony_ci retval = BPF_PROG_SK_LOOKUP_RUN_ARRAY(progs, ctx, bpf_prog_run); 144362306a36Sopenharmony_ci } while (bpf_test_timer_continue(&t, 1, repeat, &ret, &duration)); 144462306a36Sopenharmony_ci bpf_test_timer_leave(&t); 144562306a36Sopenharmony_ci 144662306a36Sopenharmony_ci if (ret < 0) 144762306a36Sopenharmony_ci goto out; 144862306a36Sopenharmony_ci 144962306a36Sopenharmony_ci user_ctx->cookie = 0; 145062306a36Sopenharmony_ci if (ctx.selected_sk) { 145162306a36Sopenharmony_ci if (ctx.selected_sk->sk_reuseport && !ctx.no_reuseport) { 145262306a36Sopenharmony_ci ret = -EOPNOTSUPP; 145362306a36Sopenharmony_ci goto out; 145462306a36Sopenharmony_ci } 145562306a36Sopenharmony_ci 145662306a36Sopenharmony_ci user_ctx->cookie = sock_gen_cookie(ctx.selected_sk); 145762306a36Sopenharmony_ci } 145862306a36Sopenharmony_ci 145962306a36Sopenharmony_ci ret = bpf_test_finish(kattr, uattr, NULL, NULL, 0, retval, duration); 146062306a36Sopenharmony_ci if (!ret) 146162306a36Sopenharmony_ci ret = bpf_ctx_finish(kattr, uattr, user_ctx, sizeof(*user_ctx)); 146262306a36Sopenharmony_ci 146362306a36Sopenharmony_ciout: 146462306a36Sopenharmony_ci bpf_prog_array_free(progs); 146562306a36Sopenharmony_ci kfree(user_ctx); 146662306a36Sopenharmony_ci return ret; 146762306a36Sopenharmony_ci} 146862306a36Sopenharmony_ci 146962306a36Sopenharmony_ciint bpf_prog_test_run_syscall(struct bpf_prog *prog, 147062306a36Sopenharmony_ci const union bpf_attr *kattr, 147162306a36Sopenharmony_ci union bpf_attr __user *uattr) 147262306a36Sopenharmony_ci{ 147362306a36Sopenharmony_ci void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in); 147462306a36Sopenharmony_ci __u32 ctx_size_in = kattr->test.ctx_size_in; 147562306a36Sopenharmony_ci void *ctx = NULL; 147662306a36Sopenharmony_ci u32 retval; 147762306a36Sopenharmony_ci int err = 0; 147862306a36Sopenharmony_ci 147962306a36Sopenharmony_ci /* doesn't support data_in/out, ctx_out, duration, or repeat or flags */ 148062306a36Sopenharmony_ci if (kattr->test.data_in || kattr->test.data_out || 148162306a36Sopenharmony_ci kattr->test.ctx_out || kattr->test.duration || 148262306a36Sopenharmony_ci kattr->test.repeat || kattr->test.flags || 148362306a36Sopenharmony_ci kattr->test.batch_size) 148462306a36Sopenharmony_ci return -EINVAL; 148562306a36Sopenharmony_ci 148662306a36Sopenharmony_ci if (ctx_size_in < prog->aux->max_ctx_offset || 148762306a36Sopenharmony_ci ctx_size_in > U16_MAX) 148862306a36Sopenharmony_ci return -EINVAL; 148962306a36Sopenharmony_ci 149062306a36Sopenharmony_ci if (ctx_size_in) { 149162306a36Sopenharmony_ci ctx = memdup_user(ctx_in, ctx_size_in); 149262306a36Sopenharmony_ci if (IS_ERR(ctx)) 149362306a36Sopenharmony_ci return PTR_ERR(ctx); 149462306a36Sopenharmony_ci } 149562306a36Sopenharmony_ci 149662306a36Sopenharmony_ci rcu_read_lock_trace(); 149762306a36Sopenharmony_ci retval = bpf_prog_run_pin_on_cpu(prog, ctx); 149862306a36Sopenharmony_ci rcu_read_unlock_trace(); 149962306a36Sopenharmony_ci 150062306a36Sopenharmony_ci if (copy_to_user(&uattr->test.retval, &retval, sizeof(u32))) { 150162306a36Sopenharmony_ci err = -EFAULT; 150262306a36Sopenharmony_ci goto out; 150362306a36Sopenharmony_ci } 150462306a36Sopenharmony_ci if (ctx_size_in) 150562306a36Sopenharmony_ci if (copy_to_user(ctx_in, ctx, ctx_size_in)) 150662306a36Sopenharmony_ci err = -EFAULT; 150762306a36Sopenharmony_ciout: 150862306a36Sopenharmony_ci kfree(ctx); 150962306a36Sopenharmony_ci return err; 151062306a36Sopenharmony_ci} 151162306a36Sopenharmony_ci 151262306a36Sopenharmony_cistatic int verify_and_copy_hook_state(struct nf_hook_state *state, 151362306a36Sopenharmony_ci const struct nf_hook_state *user, 151462306a36Sopenharmony_ci struct net_device *dev) 151562306a36Sopenharmony_ci{ 151662306a36Sopenharmony_ci if (user->in || user->out) 151762306a36Sopenharmony_ci return -EINVAL; 151862306a36Sopenharmony_ci 151962306a36Sopenharmony_ci if (user->net || user->sk || user->okfn) 152062306a36Sopenharmony_ci return -EINVAL; 152162306a36Sopenharmony_ci 152262306a36Sopenharmony_ci switch (user->pf) { 152362306a36Sopenharmony_ci case NFPROTO_IPV4: 152462306a36Sopenharmony_ci case NFPROTO_IPV6: 152562306a36Sopenharmony_ci switch (state->hook) { 152662306a36Sopenharmony_ci case NF_INET_PRE_ROUTING: 152762306a36Sopenharmony_ci state->in = dev; 152862306a36Sopenharmony_ci break; 152962306a36Sopenharmony_ci case NF_INET_LOCAL_IN: 153062306a36Sopenharmony_ci state->in = dev; 153162306a36Sopenharmony_ci break; 153262306a36Sopenharmony_ci case NF_INET_FORWARD: 153362306a36Sopenharmony_ci state->in = dev; 153462306a36Sopenharmony_ci state->out = dev; 153562306a36Sopenharmony_ci break; 153662306a36Sopenharmony_ci case NF_INET_LOCAL_OUT: 153762306a36Sopenharmony_ci state->out = dev; 153862306a36Sopenharmony_ci break; 153962306a36Sopenharmony_ci case NF_INET_POST_ROUTING: 154062306a36Sopenharmony_ci state->out = dev; 154162306a36Sopenharmony_ci break; 154262306a36Sopenharmony_ci } 154362306a36Sopenharmony_ci 154462306a36Sopenharmony_ci break; 154562306a36Sopenharmony_ci default: 154662306a36Sopenharmony_ci return -EINVAL; 154762306a36Sopenharmony_ci } 154862306a36Sopenharmony_ci 154962306a36Sopenharmony_ci state->pf = user->pf; 155062306a36Sopenharmony_ci state->hook = user->hook; 155162306a36Sopenharmony_ci 155262306a36Sopenharmony_ci return 0; 155362306a36Sopenharmony_ci} 155462306a36Sopenharmony_ci 155562306a36Sopenharmony_cistatic __be16 nfproto_eth(int nfproto) 155662306a36Sopenharmony_ci{ 155762306a36Sopenharmony_ci switch (nfproto) { 155862306a36Sopenharmony_ci case NFPROTO_IPV4: 155962306a36Sopenharmony_ci return htons(ETH_P_IP); 156062306a36Sopenharmony_ci case NFPROTO_IPV6: 156162306a36Sopenharmony_ci break; 156262306a36Sopenharmony_ci } 156362306a36Sopenharmony_ci 156462306a36Sopenharmony_ci return htons(ETH_P_IPV6); 156562306a36Sopenharmony_ci} 156662306a36Sopenharmony_ci 156762306a36Sopenharmony_ciint bpf_prog_test_run_nf(struct bpf_prog *prog, 156862306a36Sopenharmony_ci const union bpf_attr *kattr, 156962306a36Sopenharmony_ci union bpf_attr __user *uattr) 157062306a36Sopenharmony_ci{ 157162306a36Sopenharmony_ci struct net *net = current->nsproxy->net_ns; 157262306a36Sopenharmony_ci struct net_device *dev = net->loopback_dev; 157362306a36Sopenharmony_ci struct nf_hook_state *user_ctx, hook_state = { 157462306a36Sopenharmony_ci .pf = NFPROTO_IPV4, 157562306a36Sopenharmony_ci .hook = NF_INET_LOCAL_OUT, 157662306a36Sopenharmony_ci }; 157762306a36Sopenharmony_ci u32 size = kattr->test.data_size_in; 157862306a36Sopenharmony_ci u32 repeat = kattr->test.repeat; 157962306a36Sopenharmony_ci struct bpf_nf_ctx ctx = { 158062306a36Sopenharmony_ci .state = &hook_state, 158162306a36Sopenharmony_ci }; 158262306a36Sopenharmony_ci struct sk_buff *skb = NULL; 158362306a36Sopenharmony_ci u32 retval, duration; 158462306a36Sopenharmony_ci void *data; 158562306a36Sopenharmony_ci int ret; 158662306a36Sopenharmony_ci 158762306a36Sopenharmony_ci if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size) 158862306a36Sopenharmony_ci return -EINVAL; 158962306a36Sopenharmony_ci 159062306a36Sopenharmony_ci if (size < sizeof(struct iphdr)) 159162306a36Sopenharmony_ci return -EINVAL; 159262306a36Sopenharmony_ci 159362306a36Sopenharmony_ci data = bpf_test_init(kattr, kattr->test.data_size_in, size, 159462306a36Sopenharmony_ci NET_SKB_PAD + NET_IP_ALIGN, 159562306a36Sopenharmony_ci SKB_DATA_ALIGN(sizeof(struct skb_shared_info))); 159662306a36Sopenharmony_ci if (IS_ERR(data)) 159762306a36Sopenharmony_ci return PTR_ERR(data); 159862306a36Sopenharmony_ci 159962306a36Sopenharmony_ci if (!repeat) 160062306a36Sopenharmony_ci repeat = 1; 160162306a36Sopenharmony_ci 160262306a36Sopenharmony_ci user_ctx = bpf_ctx_init(kattr, sizeof(struct nf_hook_state)); 160362306a36Sopenharmony_ci if (IS_ERR(user_ctx)) { 160462306a36Sopenharmony_ci kfree(data); 160562306a36Sopenharmony_ci return PTR_ERR(user_ctx); 160662306a36Sopenharmony_ci } 160762306a36Sopenharmony_ci 160862306a36Sopenharmony_ci if (user_ctx) { 160962306a36Sopenharmony_ci ret = verify_and_copy_hook_state(&hook_state, user_ctx, dev); 161062306a36Sopenharmony_ci if (ret) 161162306a36Sopenharmony_ci goto out; 161262306a36Sopenharmony_ci } 161362306a36Sopenharmony_ci 161462306a36Sopenharmony_ci skb = slab_build_skb(data); 161562306a36Sopenharmony_ci if (!skb) { 161662306a36Sopenharmony_ci ret = -ENOMEM; 161762306a36Sopenharmony_ci goto out; 161862306a36Sopenharmony_ci } 161962306a36Sopenharmony_ci 162062306a36Sopenharmony_ci data = NULL; /* data released via kfree_skb */ 162162306a36Sopenharmony_ci 162262306a36Sopenharmony_ci skb_reserve(skb, NET_SKB_PAD + NET_IP_ALIGN); 162362306a36Sopenharmony_ci __skb_put(skb, size); 162462306a36Sopenharmony_ci 162562306a36Sopenharmony_ci ret = -EINVAL; 162662306a36Sopenharmony_ci 162762306a36Sopenharmony_ci if (hook_state.hook != NF_INET_LOCAL_OUT) { 162862306a36Sopenharmony_ci if (size < ETH_HLEN + sizeof(struct iphdr)) 162962306a36Sopenharmony_ci goto out; 163062306a36Sopenharmony_ci 163162306a36Sopenharmony_ci skb->protocol = eth_type_trans(skb, dev); 163262306a36Sopenharmony_ci switch (skb->protocol) { 163362306a36Sopenharmony_ci case htons(ETH_P_IP): 163462306a36Sopenharmony_ci if (hook_state.pf == NFPROTO_IPV4) 163562306a36Sopenharmony_ci break; 163662306a36Sopenharmony_ci goto out; 163762306a36Sopenharmony_ci case htons(ETH_P_IPV6): 163862306a36Sopenharmony_ci if (size < ETH_HLEN + sizeof(struct ipv6hdr)) 163962306a36Sopenharmony_ci goto out; 164062306a36Sopenharmony_ci if (hook_state.pf == NFPROTO_IPV6) 164162306a36Sopenharmony_ci break; 164262306a36Sopenharmony_ci goto out; 164362306a36Sopenharmony_ci default: 164462306a36Sopenharmony_ci ret = -EPROTO; 164562306a36Sopenharmony_ci goto out; 164662306a36Sopenharmony_ci } 164762306a36Sopenharmony_ci 164862306a36Sopenharmony_ci skb_reset_network_header(skb); 164962306a36Sopenharmony_ci } else { 165062306a36Sopenharmony_ci skb->protocol = nfproto_eth(hook_state.pf); 165162306a36Sopenharmony_ci } 165262306a36Sopenharmony_ci 165362306a36Sopenharmony_ci ctx.skb = skb; 165462306a36Sopenharmony_ci 165562306a36Sopenharmony_ci ret = bpf_test_run(prog, &ctx, repeat, &retval, &duration, false); 165662306a36Sopenharmony_ci if (ret) 165762306a36Sopenharmony_ci goto out; 165862306a36Sopenharmony_ci 165962306a36Sopenharmony_ci ret = bpf_test_finish(kattr, uattr, NULL, NULL, 0, retval, duration); 166062306a36Sopenharmony_ci 166162306a36Sopenharmony_ciout: 166262306a36Sopenharmony_ci kfree(user_ctx); 166362306a36Sopenharmony_ci kfree_skb(skb); 166462306a36Sopenharmony_ci kfree(data); 166562306a36Sopenharmony_ci return ret; 166662306a36Sopenharmony_ci} 166762306a36Sopenharmony_ci 166862306a36Sopenharmony_cistatic const struct btf_kfunc_id_set bpf_prog_test_kfunc_set = { 166962306a36Sopenharmony_ci .owner = THIS_MODULE, 167062306a36Sopenharmony_ci .set = &test_sk_check_kfunc_ids, 167162306a36Sopenharmony_ci}; 167262306a36Sopenharmony_ci 167362306a36Sopenharmony_ciBTF_ID_LIST(bpf_prog_test_dtor_kfunc_ids) 167462306a36Sopenharmony_ciBTF_ID(struct, prog_test_ref_kfunc) 167562306a36Sopenharmony_ciBTF_ID(func, bpf_kfunc_call_test_release) 167662306a36Sopenharmony_ciBTF_ID(struct, prog_test_member) 167762306a36Sopenharmony_ciBTF_ID(func, bpf_kfunc_call_memb_release) 167862306a36Sopenharmony_ci 167962306a36Sopenharmony_cistatic int __init bpf_prog_test_run_init(void) 168062306a36Sopenharmony_ci{ 168162306a36Sopenharmony_ci const struct btf_id_dtor_kfunc bpf_prog_test_dtor_kfunc[] = { 168262306a36Sopenharmony_ci { 168362306a36Sopenharmony_ci .btf_id = bpf_prog_test_dtor_kfunc_ids[0], 168462306a36Sopenharmony_ci .kfunc_btf_id = bpf_prog_test_dtor_kfunc_ids[1] 168562306a36Sopenharmony_ci }, 168662306a36Sopenharmony_ci { 168762306a36Sopenharmony_ci .btf_id = bpf_prog_test_dtor_kfunc_ids[2], 168862306a36Sopenharmony_ci .kfunc_btf_id = bpf_prog_test_dtor_kfunc_ids[3], 168962306a36Sopenharmony_ci }, 169062306a36Sopenharmony_ci }; 169162306a36Sopenharmony_ci int ret; 169262306a36Sopenharmony_ci 169362306a36Sopenharmony_ci ret = register_btf_fmodret_id_set(&bpf_test_modify_return_set); 169462306a36Sopenharmony_ci ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SCHED_CLS, &bpf_prog_test_kfunc_set); 169562306a36Sopenharmony_ci ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &bpf_prog_test_kfunc_set); 169662306a36Sopenharmony_ci ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_prog_test_kfunc_set); 169762306a36Sopenharmony_ci return ret ?: register_btf_id_dtor_kfuncs(bpf_prog_test_dtor_kfunc, 169862306a36Sopenharmony_ci ARRAY_SIZE(bpf_prog_test_dtor_kfunc), 169962306a36Sopenharmony_ci THIS_MODULE); 170062306a36Sopenharmony_ci} 170162306a36Sopenharmony_cilate_initcall(bpf_prog_test_run_init); 1702