xref: /kernel/linux/linux-6.6/net/bpf/test_run.c (revision 62306a36)
162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/* Copyright (c) 2017 Facebook
362306a36Sopenharmony_ci */
462306a36Sopenharmony_ci#include <linux/bpf.h>
562306a36Sopenharmony_ci#include <linux/btf.h>
662306a36Sopenharmony_ci#include <linux/btf_ids.h>
762306a36Sopenharmony_ci#include <linux/slab.h>
862306a36Sopenharmony_ci#include <linux/init.h>
962306a36Sopenharmony_ci#include <linux/vmalloc.h>
1062306a36Sopenharmony_ci#include <linux/etherdevice.h>
1162306a36Sopenharmony_ci#include <linux/filter.h>
1262306a36Sopenharmony_ci#include <linux/rcupdate_trace.h>
1362306a36Sopenharmony_ci#include <linux/sched/signal.h>
1462306a36Sopenharmony_ci#include <net/bpf_sk_storage.h>
1562306a36Sopenharmony_ci#include <net/sock.h>
1662306a36Sopenharmony_ci#include <net/tcp.h>
1762306a36Sopenharmony_ci#include <net/net_namespace.h>
1862306a36Sopenharmony_ci#include <net/page_pool/helpers.h>
1962306a36Sopenharmony_ci#include <linux/error-injection.h>
2062306a36Sopenharmony_ci#include <linux/smp.h>
2162306a36Sopenharmony_ci#include <linux/sock_diag.h>
2262306a36Sopenharmony_ci#include <linux/netfilter.h>
2362306a36Sopenharmony_ci#include <net/netdev_rx_queue.h>
2462306a36Sopenharmony_ci#include <net/xdp.h>
2562306a36Sopenharmony_ci#include <net/netfilter/nf_bpf_link.h>
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_ci#define CREATE_TRACE_POINTS
2862306a36Sopenharmony_ci#include <trace/events/bpf_test_run.h>
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_cistruct bpf_test_timer {
3162306a36Sopenharmony_ci	enum { NO_PREEMPT, NO_MIGRATE } mode;
3262306a36Sopenharmony_ci	u32 i;
3362306a36Sopenharmony_ci	u64 time_start, time_spent;
3462306a36Sopenharmony_ci};
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_cistatic void bpf_test_timer_enter(struct bpf_test_timer *t)
3762306a36Sopenharmony_ci	__acquires(rcu)
3862306a36Sopenharmony_ci{
3962306a36Sopenharmony_ci	rcu_read_lock();
4062306a36Sopenharmony_ci	if (t->mode == NO_PREEMPT)
4162306a36Sopenharmony_ci		preempt_disable();
4262306a36Sopenharmony_ci	else
4362306a36Sopenharmony_ci		migrate_disable();
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	t->time_start = ktime_get_ns();
4662306a36Sopenharmony_ci}
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_cistatic void bpf_test_timer_leave(struct bpf_test_timer *t)
4962306a36Sopenharmony_ci	__releases(rcu)
5062306a36Sopenharmony_ci{
5162306a36Sopenharmony_ci	t->time_start = 0;
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_ci	if (t->mode == NO_PREEMPT)
5462306a36Sopenharmony_ci		preempt_enable();
5562306a36Sopenharmony_ci	else
5662306a36Sopenharmony_ci		migrate_enable();
5762306a36Sopenharmony_ci	rcu_read_unlock();
5862306a36Sopenharmony_ci}
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_cistatic bool bpf_test_timer_continue(struct bpf_test_timer *t, int iterations,
6162306a36Sopenharmony_ci				    u32 repeat, int *err, u32 *duration)
6262306a36Sopenharmony_ci	__must_hold(rcu)
6362306a36Sopenharmony_ci{
6462306a36Sopenharmony_ci	t->i += iterations;
6562306a36Sopenharmony_ci	if (t->i >= repeat) {
6662306a36Sopenharmony_ci		/* We're done. */
6762306a36Sopenharmony_ci		t->time_spent += ktime_get_ns() - t->time_start;
6862306a36Sopenharmony_ci		do_div(t->time_spent, t->i);
6962306a36Sopenharmony_ci		*duration = t->time_spent > U32_MAX ? U32_MAX : (u32)t->time_spent;
7062306a36Sopenharmony_ci		*err = 0;
7162306a36Sopenharmony_ci		goto reset;
7262306a36Sopenharmony_ci	}
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci	if (signal_pending(current)) {
7562306a36Sopenharmony_ci		/* During iteration: we've been cancelled, abort. */
7662306a36Sopenharmony_ci		*err = -EINTR;
7762306a36Sopenharmony_ci		goto reset;
7862306a36Sopenharmony_ci	}
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	if (need_resched()) {
8162306a36Sopenharmony_ci		/* During iteration: we need to reschedule between runs. */
8262306a36Sopenharmony_ci		t->time_spent += ktime_get_ns() - t->time_start;
8362306a36Sopenharmony_ci		bpf_test_timer_leave(t);
8462306a36Sopenharmony_ci		cond_resched();
8562306a36Sopenharmony_ci		bpf_test_timer_enter(t);
8662306a36Sopenharmony_ci	}
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	/* Do another round. */
8962306a36Sopenharmony_ci	return true;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_cireset:
9262306a36Sopenharmony_ci	t->i = 0;
9362306a36Sopenharmony_ci	return false;
9462306a36Sopenharmony_ci}
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci/* We put this struct at the head of each page with a context and frame
9762306a36Sopenharmony_ci * initialised when the page is allocated, so we don't have to do this on each
9862306a36Sopenharmony_ci * repetition of the test run.
9962306a36Sopenharmony_ci */
10062306a36Sopenharmony_cistruct xdp_page_head {
10162306a36Sopenharmony_ci	struct xdp_buff orig_ctx;
10262306a36Sopenharmony_ci	struct xdp_buff ctx;
10362306a36Sopenharmony_ci	union {
10462306a36Sopenharmony_ci		/* ::data_hard_start starts here */
10562306a36Sopenharmony_ci		DECLARE_FLEX_ARRAY(struct xdp_frame, frame);
10662306a36Sopenharmony_ci		DECLARE_FLEX_ARRAY(u8, data);
10762306a36Sopenharmony_ci	};
10862306a36Sopenharmony_ci};
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_cistruct xdp_test_data {
11162306a36Sopenharmony_ci	struct xdp_buff *orig_ctx;
11262306a36Sopenharmony_ci	struct xdp_rxq_info rxq;
11362306a36Sopenharmony_ci	struct net_device *dev;
11462306a36Sopenharmony_ci	struct page_pool *pp;
11562306a36Sopenharmony_ci	struct xdp_frame **frames;
11662306a36Sopenharmony_ci	struct sk_buff **skbs;
11762306a36Sopenharmony_ci	struct xdp_mem_info mem;
11862306a36Sopenharmony_ci	u32 batch_size;
11962306a36Sopenharmony_ci	u32 frame_cnt;
12062306a36Sopenharmony_ci};
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ci/* tools/testing/selftests/bpf/prog_tests/xdp_do_redirect.c:%MAX_PKT_SIZE
12362306a36Sopenharmony_ci * must be updated accordingly this gets changed, otherwise BPF selftests
12462306a36Sopenharmony_ci * will fail.
12562306a36Sopenharmony_ci */
12662306a36Sopenharmony_ci#define TEST_XDP_FRAME_SIZE (PAGE_SIZE - sizeof(struct xdp_page_head))
12762306a36Sopenharmony_ci#define TEST_XDP_MAX_BATCH 256
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_cistatic void xdp_test_run_init_page(struct page *page, void *arg)
13062306a36Sopenharmony_ci{
13162306a36Sopenharmony_ci	struct xdp_page_head *head = phys_to_virt(page_to_phys(page));
13262306a36Sopenharmony_ci	struct xdp_buff *new_ctx, *orig_ctx;
13362306a36Sopenharmony_ci	u32 headroom = XDP_PACKET_HEADROOM;
13462306a36Sopenharmony_ci	struct xdp_test_data *xdp = arg;
13562306a36Sopenharmony_ci	size_t frm_len, meta_len;
13662306a36Sopenharmony_ci	struct xdp_frame *frm;
13762306a36Sopenharmony_ci	void *data;
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_ci	orig_ctx = xdp->orig_ctx;
14062306a36Sopenharmony_ci	frm_len = orig_ctx->data_end - orig_ctx->data_meta;
14162306a36Sopenharmony_ci	meta_len = orig_ctx->data - orig_ctx->data_meta;
14262306a36Sopenharmony_ci	headroom -= meta_len;
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	new_ctx = &head->ctx;
14562306a36Sopenharmony_ci	frm = head->frame;
14662306a36Sopenharmony_ci	data = head->data;
14762306a36Sopenharmony_ci	memcpy(data + headroom, orig_ctx->data_meta, frm_len);
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci	xdp_init_buff(new_ctx, TEST_XDP_FRAME_SIZE, &xdp->rxq);
15062306a36Sopenharmony_ci	xdp_prepare_buff(new_ctx, data, headroom, frm_len, true);
15162306a36Sopenharmony_ci	new_ctx->data = new_ctx->data_meta + meta_len;
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci	xdp_update_frame_from_buff(new_ctx, frm);
15462306a36Sopenharmony_ci	frm->mem = new_ctx->rxq->mem;
15562306a36Sopenharmony_ci
15662306a36Sopenharmony_ci	memcpy(&head->orig_ctx, new_ctx, sizeof(head->orig_ctx));
15762306a36Sopenharmony_ci}
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_cistatic int xdp_test_run_setup(struct xdp_test_data *xdp, struct xdp_buff *orig_ctx)
16062306a36Sopenharmony_ci{
16162306a36Sopenharmony_ci	struct page_pool *pp;
16262306a36Sopenharmony_ci	int err = -ENOMEM;
16362306a36Sopenharmony_ci	struct page_pool_params pp_params = {
16462306a36Sopenharmony_ci		.order = 0,
16562306a36Sopenharmony_ci		.flags = 0,
16662306a36Sopenharmony_ci		.pool_size = xdp->batch_size,
16762306a36Sopenharmony_ci		.nid = NUMA_NO_NODE,
16862306a36Sopenharmony_ci		.init_callback = xdp_test_run_init_page,
16962306a36Sopenharmony_ci		.init_arg = xdp,
17062306a36Sopenharmony_ci	};
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	xdp->frames = kvmalloc_array(xdp->batch_size, sizeof(void *), GFP_KERNEL);
17362306a36Sopenharmony_ci	if (!xdp->frames)
17462306a36Sopenharmony_ci		return -ENOMEM;
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_ci	xdp->skbs = kvmalloc_array(xdp->batch_size, sizeof(void *), GFP_KERNEL);
17762306a36Sopenharmony_ci	if (!xdp->skbs)
17862306a36Sopenharmony_ci		goto err_skbs;
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci	pp = page_pool_create(&pp_params);
18162306a36Sopenharmony_ci	if (IS_ERR(pp)) {
18262306a36Sopenharmony_ci		err = PTR_ERR(pp);
18362306a36Sopenharmony_ci		goto err_pp;
18462306a36Sopenharmony_ci	}
18562306a36Sopenharmony_ci
18662306a36Sopenharmony_ci	/* will copy 'mem.id' into pp->xdp_mem_id */
18762306a36Sopenharmony_ci	err = xdp_reg_mem_model(&xdp->mem, MEM_TYPE_PAGE_POOL, pp);
18862306a36Sopenharmony_ci	if (err)
18962306a36Sopenharmony_ci		goto err_mmodel;
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_ci	xdp->pp = pp;
19262306a36Sopenharmony_ci
19362306a36Sopenharmony_ci	/* We create a 'fake' RXQ referencing the original dev, but with an
19462306a36Sopenharmony_ci	 * xdp_mem_info pointing to our page_pool
19562306a36Sopenharmony_ci	 */
19662306a36Sopenharmony_ci	xdp_rxq_info_reg(&xdp->rxq, orig_ctx->rxq->dev, 0, 0);
19762306a36Sopenharmony_ci	xdp->rxq.mem.type = MEM_TYPE_PAGE_POOL;
19862306a36Sopenharmony_ci	xdp->rxq.mem.id = pp->xdp_mem_id;
19962306a36Sopenharmony_ci	xdp->dev = orig_ctx->rxq->dev;
20062306a36Sopenharmony_ci	xdp->orig_ctx = orig_ctx;
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	return 0;
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_cierr_mmodel:
20562306a36Sopenharmony_ci	page_pool_destroy(pp);
20662306a36Sopenharmony_cierr_pp:
20762306a36Sopenharmony_ci	kvfree(xdp->skbs);
20862306a36Sopenharmony_cierr_skbs:
20962306a36Sopenharmony_ci	kvfree(xdp->frames);
21062306a36Sopenharmony_ci	return err;
21162306a36Sopenharmony_ci}
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_cistatic void xdp_test_run_teardown(struct xdp_test_data *xdp)
21462306a36Sopenharmony_ci{
21562306a36Sopenharmony_ci	xdp_unreg_mem_model(&xdp->mem);
21662306a36Sopenharmony_ci	page_pool_destroy(xdp->pp);
21762306a36Sopenharmony_ci	kfree(xdp->frames);
21862306a36Sopenharmony_ci	kfree(xdp->skbs);
21962306a36Sopenharmony_ci}
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_cistatic bool frame_was_changed(const struct xdp_page_head *head)
22262306a36Sopenharmony_ci{
22362306a36Sopenharmony_ci	/* xdp_scrub_frame() zeroes the data pointer, flags is the last field,
22462306a36Sopenharmony_ci	 * i.e. has the highest chances to be overwritten. If those two are
22562306a36Sopenharmony_ci	 * untouched, it's most likely safe to skip the context reset.
22662306a36Sopenharmony_ci	 */
22762306a36Sopenharmony_ci	return head->frame->data != head->orig_ctx.data ||
22862306a36Sopenharmony_ci	       head->frame->flags != head->orig_ctx.flags;
22962306a36Sopenharmony_ci}
23062306a36Sopenharmony_ci
23162306a36Sopenharmony_cistatic bool ctx_was_changed(struct xdp_page_head *head)
23262306a36Sopenharmony_ci{
23362306a36Sopenharmony_ci	return head->orig_ctx.data != head->ctx.data ||
23462306a36Sopenharmony_ci		head->orig_ctx.data_meta != head->ctx.data_meta ||
23562306a36Sopenharmony_ci		head->orig_ctx.data_end != head->ctx.data_end;
23662306a36Sopenharmony_ci}
23762306a36Sopenharmony_ci
23862306a36Sopenharmony_cistatic void reset_ctx(struct xdp_page_head *head)
23962306a36Sopenharmony_ci{
24062306a36Sopenharmony_ci	if (likely(!frame_was_changed(head) && !ctx_was_changed(head)))
24162306a36Sopenharmony_ci		return;
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci	head->ctx.data = head->orig_ctx.data;
24462306a36Sopenharmony_ci	head->ctx.data_meta = head->orig_ctx.data_meta;
24562306a36Sopenharmony_ci	head->ctx.data_end = head->orig_ctx.data_end;
24662306a36Sopenharmony_ci	xdp_update_frame_from_buff(&head->ctx, head->frame);
24762306a36Sopenharmony_ci}
24862306a36Sopenharmony_ci
24962306a36Sopenharmony_cistatic int xdp_recv_frames(struct xdp_frame **frames, int nframes,
25062306a36Sopenharmony_ci			   struct sk_buff **skbs,
25162306a36Sopenharmony_ci			   struct net_device *dev)
25262306a36Sopenharmony_ci{
25362306a36Sopenharmony_ci	gfp_t gfp = __GFP_ZERO | GFP_ATOMIC;
25462306a36Sopenharmony_ci	int i, n;
25562306a36Sopenharmony_ci	LIST_HEAD(list);
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	n = kmem_cache_alloc_bulk(skbuff_cache, gfp, nframes, (void **)skbs);
25862306a36Sopenharmony_ci	if (unlikely(n == 0)) {
25962306a36Sopenharmony_ci		for (i = 0; i < nframes; i++)
26062306a36Sopenharmony_ci			xdp_return_frame(frames[i]);
26162306a36Sopenharmony_ci		return -ENOMEM;
26262306a36Sopenharmony_ci	}
26362306a36Sopenharmony_ci
26462306a36Sopenharmony_ci	for (i = 0; i < nframes; i++) {
26562306a36Sopenharmony_ci		struct xdp_frame *xdpf = frames[i];
26662306a36Sopenharmony_ci		struct sk_buff *skb = skbs[i];
26762306a36Sopenharmony_ci
26862306a36Sopenharmony_ci		skb = __xdp_build_skb_from_frame(xdpf, skb, dev);
26962306a36Sopenharmony_ci		if (!skb) {
27062306a36Sopenharmony_ci			xdp_return_frame(xdpf);
27162306a36Sopenharmony_ci			continue;
27262306a36Sopenharmony_ci		}
27362306a36Sopenharmony_ci
27462306a36Sopenharmony_ci		list_add_tail(&skb->list, &list);
27562306a36Sopenharmony_ci	}
27662306a36Sopenharmony_ci	netif_receive_skb_list(&list);
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ci	return 0;
27962306a36Sopenharmony_ci}
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_cistatic int xdp_test_run_batch(struct xdp_test_data *xdp, struct bpf_prog *prog,
28262306a36Sopenharmony_ci			      u32 repeat)
28362306a36Sopenharmony_ci{
28462306a36Sopenharmony_ci	struct bpf_redirect_info *ri = this_cpu_ptr(&bpf_redirect_info);
28562306a36Sopenharmony_ci	int err = 0, act, ret, i, nframes = 0, batch_sz;
28662306a36Sopenharmony_ci	struct xdp_frame **frames = xdp->frames;
28762306a36Sopenharmony_ci	struct xdp_page_head *head;
28862306a36Sopenharmony_ci	struct xdp_frame *frm;
28962306a36Sopenharmony_ci	bool redirect = false;
29062306a36Sopenharmony_ci	struct xdp_buff *ctx;
29162306a36Sopenharmony_ci	struct page *page;
29262306a36Sopenharmony_ci
29362306a36Sopenharmony_ci	batch_sz = min_t(u32, repeat, xdp->batch_size);
29462306a36Sopenharmony_ci
29562306a36Sopenharmony_ci	local_bh_disable();
29662306a36Sopenharmony_ci	xdp_set_return_frame_no_direct();
29762306a36Sopenharmony_ci
29862306a36Sopenharmony_ci	for (i = 0; i < batch_sz; i++) {
29962306a36Sopenharmony_ci		page = page_pool_dev_alloc_pages(xdp->pp);
30062306a36Sopenharmony_ci		if (!page) {
30162306a36Sopenharmony_ci			err = -ENOMEM;
30262306a36Sopenharmony_ci			goto out;
30362306a36Sopenharmony_ci		}
30462306a36Sopenharmony_ci
30562306a36Sopenharmony_ci		head = phys_to_virt(page_to_phys(page));
30662306a36Sopenharmony_ci		reset_ctx(head);
30762306a36Sopenharmony_ci		ctx = &head->ctx;
30862306a36Sopenharmony_ci		frm = head->frame;
30962306a36Sopenharmony_ci		xdp->frame_cnt++;
31062306a36Sopenharmony_ci
31162306a36Sopenharmony_ci		act = bpf_prog_run_xdp(prog, ctx);
31262306a36Sopenharmony_ci
31362306a36Sopenharmony_ci		/* if program changed pkt bounds we need to update the xdp_frame */
31462306a36Sopenharmony_ci		if (unlikely(ctx_was_changed(head))) {
31562306a36Sopenharmony_ci			ret = xdp_update_frame_from_buff(ctx, frm);
31662306a36Sopenharmony_ci			if (ret) {
31762306a36Sopenharmony_ci				xdp_return_buff(ctx);
31862306a36Sopenharmony_ci				continue;
31962306a36Sopenharmony_ci			}
32062306a36Sopenharmony_ci		}
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_ci		switch (act) {
32362306a36Sopenharmony_ci		case XDP_TX:
32462306a36Sopenharmony_ci			/* we can't do a real XDP_TX since we're not in the
32562306a36Sopenharmony_ci			 * driver, so turn it into a REDIRECT back to the same
32662306a36Sopenharmony_ci			 * index
32762306a36Sopenharmony_ci			 */
32862306a36Sopenharmony_ci			ri->tgt_index = xdp->dev->ifindex;
32962306a36Sopenharmony_ci			ri->map_id = INT_MAX;
33062306a36Sopenharmony_ci			ri->map_type = BPF_MAP_TYPE_UNSPEC;
33162306a36Sopenharmony_ci			fallthrough;
33262306a36Sopenharmony_ci		case XDP_REDIRECT:
33362306a36Sopenharmony_ci			redirect = true;
33462306a36Sopenharmony_ci			ret = xdp_do_redirect_frame(xdp->dev, ctx, frm, prog);
33562306a36Sopenharmony_ci			if (ret)
33662306a36Sopenharmony_ci				xdp_return_buff(ctx);
33762306a36Sopenharmony_ci			break;
33862306a36Sopenharmony_ci		case XDP_PASS:
33962306a36Sopenharmony_ci			frames[nframes++] = frm;
34062306a36Sopenharmony_ci			break;
34162306a36Sopenharmony_ci		default:
34262306a36Sopenharmony_ci			bpf_warn_invalid_xdp_action(NULL, prog, act);
34362306a36Sopenharmony_ci			fallthrough;
34462306a36Sopenharmony_ci		case XDP_DROP:
34562306a36Sopenharmony_ci			xdp_return_buff(ctx);
34662306a36Sopenharmony_ci			break;
34762306a36Sopenharmony_ci		}
34862306a36Sopenharmony_ci	}
34962306a36Sopenharmony_ci
35062306a36Sopenharmony_ciout:
35162306a36Sopenharmony_ci	if (redirect)
35262306a36Sopenharmony_ci		xdp_do_flush();
35362306a36Sopenharmony_ci	if (nframes) {
35462306a36Sopenharmony_ci		ret = xdp_recv_frames(frames, nframes, xdp->skbs, xdp->dev);
35562306a36Sopenharmony_ci		if (ret)
35662306a36Sopenharmony_ci			err = ret;
35762306a36Sopenharmony_ci	}
35862306a36Sopenharmony_ci
35962306a36Sopenharmony_ci	xdp_clear_return_frame_no_direct();
36062306a36Sopenharmony_ci	local_bh_enable();
36162306a36Sopenharmony_ci	return err;
36262306a36Sopenharmony_ci}
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_cistatic int bpf_test_run_xdp_live(struct bpf_prog *prog, struct xdp_buff *ctx,
36562306a36Sopenharmony_ci				 u32 repeat, u32 batch_size, u32 *time)
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci{
36862306a36Sopenharmony_ci	struct xdp_test_data xdp = { .batch_size = batch_size };
36962306a36Sopenharmony_ci	struct bpf_test_timer t = { .mode = NO_MIGRATE };
37062306a36Sopenharmony_ci	int ret;
37162306a36Sopenharmony_ci
37262306a36Sopenharmony_ci	if (!repeat)
37362306a36Sopenharmony_ci		repeat = 1;
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_ci	ret = xdp_test_run_setup(&xdp, ctx);
37662306a36Sopenharmony_ci	if (ret)
37762306a36Sopenharmony_ci		return ret;
37862306a36Sopenharmony_ci
37962306a36Sopenharmony_ci	bpf_test_timer_enter(&t);
38062306a36Sopenharmony_ci	do {
38162306a36Sopenharmony_ci		xdp.frame_cnt = 0;
38262306a36Sopenharmony_ci		ret = xdp_test_run_batch(&xdp, prog, repeat - t.i);
38362306a36Sopenharmony_ci		if (unlikely(ret < 0))
38462306a36Sopenharmony_ci			break;
38562306a36Sopenharmony_ci	} while (bpf_test_timer_continue(&t, xdp.frame_cnt, repeat, &ret, time));
38662306a36Sopenharmony_ci	bpf_test_timer_leave(&t);
38762306a36Sopenharmony_ci
38862306a36Sopenharmony_ci	xdp_test_run_teardown(&xdp);
38962306a36Sopenharmony_ci	return ret;
39062306a36Sopenharmony_ci}
39162306a36Sopenharmony_ci
39262306a36Sopenharmony_cistatic int bpf_test_run(struct bpf_prog *prog, void *ctx, u32 repeat,
39362306a36Sopenharmony_ci			u32 *retval, u32 *time, bool xdp)
39462306a36Sopenharmony_ci{
39562306a36Sopenharmony_ci	struct bpf_prog_array_item item = {.prog = prog};
39662306a36Sopenharmony_ci	struct bpf_run_ctx *old_ctx;
39762306a36Sopenharmony_ci	struct bpf_cg_run_ctx run_ctx;
39862306a36Sopenharmony_ci	struct bpf_test_timer t = { NO_MIGRATE };
39962306a36Sopenharmony_ci	enum bpf_cgroup_storage_type stype;
40062306a36Sopenharmony_ci	int ret;
40162306a36Sopenharmony_ci
40262306a36Sopenharmony_ci	for_each_cgroup_storage_type(stype) {
40362306a36Sopenharmony_ci		item.cgroup_storage[stype] = bpf_cgroup_storage_alloc(prog, stype);
40462306a36Sopenharmony_ci		if (IS_ERR(item.cgroup_storage[stype])) {
40562306a36Sopenharmony_ci			item.cgroup_storage[stype] = NULL;
40662306a36Sopenharmony_ci			for_each_cgroup_storage_type(stype)
40762306a36Sopenharmony_ci				bpf_cgroup_storage_free(item.cgroup_storage[stype]);
40862306a36Sopenharmony_ci			return -ENOMEM;
40962306a36Sopenharmony_ci		}
41062306a36Sopenharmony_ci	}
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_ci	if (!repeat)
41362306a36Sopenharmony_ci		repeat = 1;
41462306a36Sopenharmony_ci
41562306a36Sopenharmony_ci	bpf_test_timer_enter(&t);
41662306a36Sopenharmony_ci	old_ctx = bpf_set_run_ctx(&run_ctx.run_ctx);
41762306a36Sopenharmony_ci	do {
41862306a36Sopenharmony_ci		run_ctx.prog_item = &item;
41962306a36Sopenharmony_ci		local_bh_disable();
42062306a36Sopenharmony_ci		if (xdp)
42162306a36Sopenharmony_ci			*retval = bpf_prog_run_xdp(prog, ctx);
42262306a36Sopenharmony_ci		else
42362306a36Sopenharmony_ci			*retval = bpf_prog_run(prog, ctx);
42462306a36Sopenharmony_ci		local_bh_enable();
42562306a36Sopenharmony_ci	} while (bpf_test_timer_continue(&t, 1, repeat, &ret, time));
42662306a36Sopenharmony_ci	bpf_reset_run_ctx(old_ctx);
42762306a36Sopenharmony_ci	bpf_test_timer_leave(&t);
42862306a36Sopenharmony_ci
42962306a36Sopenharmony_ci	for_each_cgroup_storage_type(stype)
43062306a36Sopenharmony_ci		bpf_cgroup_storage_free(item.cgroup_storage[stype]);
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_ci	return ret;
43362306a36Sopenharmony_ci}
43462306a36Sopenharmony_ci
43562306a36Sopenharmony_cistatic int bpf_test_finish(const union bpf_attr *kattr,
43662306a36Sopenharmony_ci			   union bpf_attr __user *uattr, const void *data,
43762306a36Sopenharmony_ci			   struct skb_shared_info *sinfo, u32 size,
43862306a36Sopenharmony_ci			   u32 retval, u32 duration)
43962306a36Sopenharmony_ci{
44062306a36Sopenharmony_ci	void __user *data_out = u64_to_user_ptr(kattr->test.data_out);
44162306a36Sopenharmony_ci	int err = -EFAULT;
44262306a36Sopenharmony_ci	u32 copy_size = size;
44362306a36Sopenharmony_ci
44462306a36Sopenharmony_ci	/* Clamp copy if the user has provided a size hint, but copy the full
44562306a36Sopenharmony_ci	 * buffer if not to retain old behaviour.
44662306a36Sopenharmony_ci	 */
44762306a36Sopenharmony_ci	if (kattr->test.data_size_out &&
44862306a36Sopenharmony_ci	    copy_size > kattr->test.data_size_out) {
44962306a36Sopenharmony_ci		copy_size = kattr->test.data_size_out;
45062306a36Sopenharmony_ci		err = -ENOSPC;
45162306a36Sopenharmony_ci	}
45262306a36Sopenharmony_ci
45362306a36Sopenharmony_ci	if (data_out) {
45462306a36Sopenharmony_ci		int len = sinfo ? copy_size - sinfo->xdp_frags_size : copy_size;
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci		if (len < 0) {
45762306a36Sopenharmony_ci			err = -ENOSPC;
45862306a36Sopenharmony_ci			goto out;
45962306a36Sopenharmony_ci		}
46062306a36Sopenharmony_ci
46162306a36Sopenharmony_ci		if (copy_to_user(data_out, data, len))
46262306a36Sopenharmony_ci			goto out;
46362306a36Sopenharmony_ci
46462306a36Sopenharmony_ci		if (sinfo) {
46562306a36Sopenharmony_ci			int i, offset = len;
46662306a36Sopenharmony_ci			u32 data_len;
46762306a36Sopenharmony_ci
46862306a36Sopenharmony_ci			for (i = 0; i < sinfo->nr_frags; i++) {
46962306a36Sopenharmony_ci				skb_frag_t *frag = &sinfo->frags[i];
47062306a36Sopenharmony_ci
47162306a36Sopenharmony_ci				if (offset >= copy_size) {
47262306a36Sopenharmony_ci					err = -ENOSPC;
47362306a36Sopenharmony_ci					break;
47462306a36Sopenharmony_ci				}
47562306a36Sopenharmony_ci
47662306a36Sopenharmony_ci				data_len = min_t(u32, copy_size - offset,
47762306a36Sopenharmony_ci						 skb_frag_size(frag));
47862306a36Sopenharmony_ci
47962306a36Sopenharmony_ci				if (copy_to_user(data_out + offset,
48062306a36Sopenharmony_ci						 skb_frag_address(frag),
48162306a36Sopenharmony_ci						 data_len))
48262306a36Sopenharmony_ci					goto out;
48362306a36Sopenharmony_ci
48462306a36Sopenharmony_ci				offset += data_len;
48562306a36Sopenharmony_ci			}
48662306a36Sopenharmony_ci		}
48762306a36Sopenharmony_ci	}
48862306a36Sopenharmony_ci
48962306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.data_size_out, &size, sizeof(size)))
49062306a36Sopenharmony_ci		goto out;
49162306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval)))
49262306a36Sopenharmony_ci		goto out;
49362306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.duration, &duration, sizeof(duration)))
49462306a36Sopenharmony_ci		goto out;
49562306a36Sopenharmony_ci	if (err != -ENOSPC)
49662306a36Sopenharmony_ci		err = 0;
49762306a36Sopenharmony_ciout:
49862306a36Sopenharmony_ci	trace_bpf_test_finish(&err);
49962306a36Sopenharmony_ci	return err;
50062306a36Sopenharmony_ci}
50162306a36Sopenharmony_ci
50262306a36Sopenharmony_ci/* Integer types of various sizes and pointer combinations cover variety of
50362306a36Sopenharmony_ci * architecture dependent calling conventions. 7+ can be supported in the
50462306a36Sopenharmony_ci * future.
50562306a36Sopenharmony_ci */
50662306a36Sopenharmony_ci__diag_push();
50762306a36Sopenharmony_ci__diag_ignore_all("-Wmissing-prototypes",
50862306a36Sopenharmony_ci		  "Global functions as their definitions will be in vmlinux BTF");
50962306a36Sopenharmony_ci__bpf_kfunc int bpf_fentry_test1(int a)
51062306a36Sopenharmony_ci{
51162306a36Sopenharmony_ci	return a + 1;
51262306a36Sopenharmony_ci}
51362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(bpf_fentry_test1);
51462306a36Sopenharmony_ci
51562306a36Sopenharmony_ciint noinline bpf_fentry_test2(int a, u64 b)
51662306a36Sopenharmony_ci{
51762306a36Sopenharmony_ci	return a + b;
51862306a36Sopenharmony_ci}
51962306a36Sopenharmony_ci
52062306a36Sopenharmony_ciint noinline bpf_fentry_test3(char a, int b, u64 c)
52162306a36Sopenharmony_ci{
52262306a36Sopenharmony_ci	return a + b + c;
52362306a36Sopenharmony_ci}
52462306a36Sopenharmony_ci
52562306a36Sopenharmony_ciint noinline bpf_fentry_test4(void *a, char b, int c, u64 d)
52662306a36Sopenharmony_ci{
52762306a36Sopenharmony_ci	return (long)a + b + c + d;
52862306a36Sopenharmony_ci}
52962306a36Sopenharmony_ci
53062306a36Sopenharmony_ciint noinline bpf_fentry_test5(u64 a, void *b, short c, int d, u64 e)
53162306a36Sopenharmony_ci{
53262306a36Sopenharmony_ci	return a + (long)b + c + d + e;
53362306a36Sopenharmony_ci}
53462306a36Sopenharmony_ci
53562306a36Sopenharmony_ciint noinline bpf_fentry_test6(u64 a, void *b, short c, int d, void *e, u64 f)
53662306a36Sopenharmony_ci{
53762306a36Sopenharmony_ci	return a + (long)b + c + d + (long)e + f;
53862306a36Sopenharmony_ci}
53962306a36Sopenharmony_ci
54062306a36Sopenharmony_cistruct bpf_fentry_test_t {
54162306a36Sopenharmony_ci	struct bpf_fentry_test_t *a;
54262306a36Sopenharmony_ci};
54362306a36Sopenharmony_ci
54462306a36Sopenharmony_ciint noinline bpf_fentry_test7(struct bpf_fentry_test_t *arg)
54562306a36Sopenharmony_ci{
54662306a36Sopenharmony_ci	asm volatile ("": "+r"(arg));
54762306a36Sopenharmony_ci	return (long)arg;
54862306a36Sopenharmony_ci}
54962306a36Sopenharmony_ci
55062306a36Sopenharmony_ciint noinline bpf_fentry_test8(struct bpf_fentry_test_t *arg)
55162306a36Sopenharmony_ci{
55262306a36Sopenharmony_ci	return (long)arg->a;
55362306a36Sopenharmony_ci}
55462306a36Sopenharmony_ci
55562306a36Sopenharmony_ci__bpf_kfunc u32 bpf_fentry_test9(u32 *a)
55662306a36Sopenharmony_ci{
55762306a36Sopenharmony_ci	return *a;
55862306a36Sopenharmony_ci}
55962306a36Sopenharmony_ci
56062306a36Sopenharmony_civoid noinline bpf_fentry_test_sinfo(struct skb_shared_info *sinfo)
56162306a36Sopenharmony_ci{
56262306a36Sopenharmony_ci}
56362306a36Sopenharmony_ci
56462306a36Sopenharmony_ci__bpf_kfunc int bpf_modify_return_test(int a, int *b)
56562306a36Sopenharmony_ci{
56662306a36Sopenharmony_ci	*b += 1;
56762306a36Sopenharmony_ci	return a + *b;
56862306a36Sopenharmony_ci}
56962306a36Sopenharmony_ci
57062306a36Sopenharmony_ci__bpf_kfunc int bpf_modify_return_test2(int a, int *b, short c, int d,
57162306a36Sopenharmony_ci					void *e, char f, int g)
57262306a36Sopenharmony_ci{
57362306a36Sopenharmony_ci	*b += 1;
57462306a36Sopenharmony_ci	return a + *b + c + d + (long)e + f + g;
57562306a36Sopenharmony_ci}
57662306a36Sopenharmony_ci
57762306a36Sopenharmony_ciint noinline bpf_fentry_shadow_test(int a)
57862306a36Sopenharmony_ci{
57962306a36Sopenharmony_ci	return a + 1;
58062306a36Sopenharmony_ci}
58162306a36Sopenharmony_ci
58262306a36Sopenharmony_cistruct prog_test_member1 {
58362306a36Sopenharmony_ci	int a;
58462306a36Sopenharmony_ci};
58562306a36Sopenharmony_ci
58662306a36Sopenharmony_cistruct prog_test_member {
58762306a36Sopenharmony_ci	struct prog_test_member1 m;
58862306a36Sopenharmony_ci	int c;
58962306a36Sopenharmony_ci};
59062306a36Sopenharmony_ci
59162306a36Sopenharmony_cistruct prog_test_ref_kfunc {
59262306a36Sopenharmony_ci	int a;
59362306a36Sopenharmony_ci	int b;
59462306a36Sopenharmony_ci	struct prog_test_member memb;
59562306a36Sopenharmony_ci	struct prog_test_ref_kfunc *next;
59662306a36Sopenharmony_ci	refcount_t cnt;
59762306a36Sopenharmony_ci};
59862306a36Sopenharmony_ci
59962306a36Sopenharmony_ci__bpf_kfunc void bpf_kfunc_call_test_release(struct prog_test_ref_kfunc *p)
60062306a36Sopenharmony_ci{
60162306a36Sopenharmony_ci	refcount_dec(&p->cnt);
60262306a36Sopenharmony_ci}
60362306a36Sopenharmony_ci
60462306a36Sopenharmony_ci__bpf_kfunc void bpf_kfunc_call_memb_release(struct prog_test_member *p)
60562306a36Sopenharmony_ci{
60662306a36Sopenharmony_ci}
60762306a36Sopenharmony_ci
60862306a36Sopenharmony_ci__diag_pop();
60962306a36Sopenharmony_ci
61062306a36Sopenharmony_ciBTF_SET8_START(bpf_test_modify_return_ids)
61162306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_modify_return_test)
61262306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_modify_return_test2)
61362306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_fentry_test1, KF_SLEEPABLE)
61462306a36Sopenharmony_ciBTF_SET8_END(bpf_test_modify_return_ids)
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_cistatic const struct btf_kfunc_id_set bpf_test_modify_return_set = {
61762306a36Sopenharmony_ci	.owner = THIS_MODULE,
61862306a36Sopenharmony_ci	.set   = &bpf_test_modify_return_ids,
61962306a36Sopenharmony_ci};
62062306a36Sopenharmony_ci
62162306a36Sopenharmony_ciBTF_SET8_START(test_sk_check_kfunc_ids)
62262306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_kfunc_call_test_release, KF_RELEASE)
62362306a36Sopenharmony_ciBTF_ID_FLAGS(func, bpf_kfunc_call_memb_release, KF_RELEASE)
62462306a36Sopenharmony_ciBTF_SET8_END(test_sk_check_kfunc_ids)
62562306a36Sopenharmony_ci
62662306a36Sopenharmony_cistatic void *bpf_test_init(const union bpf_attr *kattr, u32 user_size,
62762306a36Sopenharmony_ci			   u32 size, u32 headroom, u32 tailroom)
62862306a36Sopenharmony_ci{
62962306a36Sopenharmony_ci	void __user *data_in = u64_to_user_ptr(kattr->test.data_in);
63062306a36Sopenharmony_ci	void *data;
63162306a36Sopenharmony_ci
63262306a36Sopenharmony_ci	if (size < ETH_HLEN || size > PAGE_SIZE - headroom - tailroom)
63362306a36Sopenharmony_ci		return ERR_PTR(-EINVAL);
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_ci	if (user_size > size)
63662306a36Sopenharmony_ci		return ERR_PTR(-EMSGSIZE);
63762306a36Sopenharmony_ci
63862306a36Sopenharmony_ci	size = SKB_DATA_ALIGN(size);
63962306a36Sopenharmony_ci	data = kzalloc(size + headroom + tailroom, GFP_USER);
64062306a36Sopenharmony_ci	if (!data)
64162306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
64262306a36Sopenharmony_ci
64362306a36Sopenharmony_ci	if (copy_from_user(data + headroom, data_in, user_size)) {
64462306a36Sopenharmony_ci		kfree(data);
64562306a36Sopenharmony_ci		return ERR_PTR(-EFAULT);
64662306a36Sopenharmony_ci	}
64762306a36Sopenharmony_ci
64862306a36Sopenharmony_ci	return data;
64962306a36Sopenharmony_ci}
65062306a36Sopenharmony_ci
65162306a36Sopenharmony_ciint bpf_prog_test_run_tracing(struct bpf_prog *prog,
65262306a36Sopenharmony_ci			      const union bpf_attr *kattr,
65362306a36Sopenharmony_ci			      union bpf_attr __user *uattr)
65462306a36Sopenharmony_ci{
65562306a36Sopenharmony_ci	struct bpf_fentry_test_t arg = {};
65662306a36Sopenharmony_ci	u16 side_effect = 0, ret = 0;
65762306a36Sopenharmony_ci	int b = 2, err = -EFAULT;
65862306a36Sopenharmony_ci	u32 retval = 0;
65962306a36Sopenharmony_ci
66062306a36Sopenharmony_ci	if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
66162306a36Sopenharmony_ci		return -EINVAL;
66262306a36Sopenharmony_ci
66362306a36Sopenharmony_ci	switch (prog->expected_attach_type) {
66462306a36Sopenharmony_ci	case BPF_TRACE_FENTRY:
66562306a36Sopenharmony_ci	case BPF_TRACE_FEXIT:
66662306a36Sopenharmony_ci		if (bpf_fentry_test1(1) != 2 ||
66762306a36Sopenharmony_ci		    bpf_fentry_test2(2, 3) != 5 ||
66862306a36Sopenharmony_ci		    bpf_fentry_test3(4, 5, 6) != 15 ||
66962306a36Sopenharmony_ci		    bpf_fentry_test4((void *)7, 8, 9, 10) != 34 ||
67062306a36Sopenharmony_ci		    bpf_fentry_test5(11, (void *)12, 13, 14, 15) != 65 ||
67162306a36Sopenharmony_ci		    bpf_fentry_test6(16, (void *)17, 18, 19, (void *)20, 21) != 111 ||
67262306a36Sopenharmony_ci		    bpf_fentry_test7((struct bpf_fentry_test_t *)0) != 0 ||
67362306a36Sopenharmony_ci		    bpf_fentry_test8(&arg) != 0 ||
67462306a36Sopenharmony_ci		    bpf_fentry_test9(&retval) != 0)
67562306a36Sopenharmony_ci			goto out;
67662306a36Sopenharmony_ci		break;
67762306a36Sopenharmony_ci	case BPF_MODIFY_RETURN:
67862306a36Sopenharmony_ci		ret = bpf_modify_return_test(1, &b);
67962306a36Sopenharmony_ci		if (b != 2)
68062306a36Sopenharmony_ci			side_effect++;
68162306a36Sopenharmony_ci		b = 2;
68262306a36Sopenharmony_ci		ret += bpf_modify_return_test2(1, &b, 3, 4, (void *)5, 6, 7);
68362306a36Sopenharmony_ci		if (b != 2)
68462306a36Sopenharmony_ci			side_effect++;
68562306a36Sopenharmony_ci		break;
68662306a36Sopenharmony_ci	default:
68762306a36Sopenharmony_ci		goto out;
68862306a36Sopenharmony_ci	}
68962306a36Sopenharmony_ci
69062306a36Sopenharmony_ci	retval = ((u32)side_effect << 16) | ret;
69162306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval)))
69262306a36Sopenharmony_ci		goto out;
69362306a36Sopenharmony_ci
69462306a36Sopenharmony_ci	err = 0;
69562306a36Sopenharmony_ciout:
69662306a36Sopenharmony_ci	trace_bpf_test_finish(&err);
69762306a36Sopenharmony_ci	return err;
69862306a36Sopenharmony_ci}
69962306a36Sopenharmony_ci
70062306a36Sopenharmony_cistruct bpf_raw_tp_test_run_info {
70162306a36Sopenharmony_ci	struct bpf_prog *prog;
70262306a36Sopenharmony_ci	void *ctx;
70362306a36Sopenharmony_ci	u32 retval;
70462306a36Sopenharmony_ci};
70562306a36Sopenharmony_ci
70662306a36Sopenharmony_cistatic void
70762306a36Sopenharmony_ci__bpf_prog_test_run_raw_tp(void *data)
70862306a36Sopenharmony_ci{
70962306a36Sopenharmony_ci	struct bpf_raw_tp_test_run_info *info = data;
71062306a36Sopenharmony_ci
71162306a36Sopenharmony_ci	rcu_read_lock();
71262306a36Sopenharmony_ci	info->retval = bpf_prog_run(info->prog, info->ctx);
71362306a36Sopenharmony_ci	rcu_read_unlock();
71462306a36Sopenharmony_ci}
71562306a36Sopenharmony_ci
71662306a36Sopenharmony_ciint bpf_prog_test_run_raw_tp(struct bpf_prog *prog,
71762306a36Sopenharmony_ci			     const union bpf_attr *kattr,
71862306a36Sopenharmony_ci			     union bpf_attr __user *uattr)
71962306a36Sopenharmony_ci{
72062306a36Sopenharmony_ci	void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in);
72162306a36Sopenharmony_ci	__u32 ctx_size_in = kattr->test.ctx_size_in;
72262306a36Sopenharmony_ci	struct bpf_raw_tp_test_run_info info;
72362306a36Sopenharmony_ci	int cpu = kattr->test.cpu, err = 0;
72462306a36Sopenharmony_ci	int current_cpu;
72562306a36Sopenharmony_ci
72662306a36Sopenharmony_ci	/* doesn't support data_in/out, ctx_out, duration, or repeat */
72762306a36Sopenharmony_ci	if (kattr->test.data_in || kattr->test.data_out ||
72862306a36Sopenharmony_ci	    kattr->test.ctx_out || kattr->test.duration ||
72962306a36Sopenharmony_ci	    kattr->test.repeat || kattr->test.batch_size)
73062306a36Sopenharmony_ci		return -EINVAL;
73162306a36Sopenharmony_ci
73262306a36Sopenharmony_ci	if (ctx_size_in < prog->aux->max_ctx_offset ||
73362306a36Sopenharmony_ci	    ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64))
73462306a36Sopenharmony_ci		return -EINVAL;
73562306a36Sopenharmony_ci
73662306a36Sopenharmony_ci	if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 && cpu != 0)
73762306a36Sopenharmony_ci		return -EINVAL;
73862306a36Sopenharmony_ci
73962306a36Sopenharmony_ci	if (ctx_size_in) {
74062306a36Sopenharmony_ci		info.ctx = memdup_user(ctx_in, ctx_size_in);
74162306a36Sopenharmony_ci		if (IS_ERR(info.ctx))
74262306a36Sopenharmony_ci			return PTR_ERR(info.ctx);
74362306a36Sopenharmony_ci	} else {
74462306a36Sopenharmony_ci		info.ctx = NULL;
74562306a36Sopenharmony_ci	}
74662306a36Sopenharmony_ci
74762306a36Sopenharmony_ci	info.prog = prog;
74862306a36Sopenharmony_ci
74962306a36Sopenharmony_ci	current_cpu = get_cpu();
75062306a36Sopenharmony_ci	if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 ||
75162306a36Sopenharmony_ci	    cpu == current_cpu) {
75262306a36Sopenharmony_ci		__bpf_prog_test_run_raw_tp(&info);
75362306a36Sopenharmony_ci	} else if (cpu >= nr_cpu_ids || !cpu_online(cpu)) {
75462306a36Sopenharmony_ci		/* smp_call_function_single() also checks cpu_online()
75562306a36Sopenharmony_ci		 * after csd_lock(). However, since cpu is from user
75662306a36Sopenharmony_ci		 * space, let's do an extra quick check to filter out
75762306a36Sopenharmony_ci		 * invalid value before smp_call_function_single().
75862306a36Sopenharmony_ci		 */
75962306a36Sopenharmony_ci		err = -ENXIO;
76062306a36Sopenharmony_ci	} else {
76162306a36Sopenharmony_ci		err = smp_call_function_single(cpu, __bpf_prog_test_run_raw_tp,
76262306a36Sopenharmony_ci					       &info, 1);
76362306a36Sopenharmony_ci	}
76462306a36Sopenharmony_ci	put_cpu();
76562306a36Sopenharmony_ci
76662306a36Sopenharmony_ci	if (!err &&
76762306a36Sopenharmony_ci	    copy_to_user(&uattr->test.retval, &info.retval, sizeof(u32)))
76862306a36Sopenharmony_ci		err = -EFAULT;
76962306a36Sopenharmony_ci
77062306a36Sopenharmony_ci	kfree(info.ctx);
77162306a36Sopenharmony_ci	return err;
77262306a36Sopenharmony_ci}
77362306a36Sopenharmony_ci
77462306a36Sopenharmony_cistatic void *bpf_ctx_init(const union bpf_attr *kattr, u32 max_size)
77562306a36Sopenharmony_ci{
77662306a36Sopenharmony_ci	void __user *data_in = u64_to_user_ptr(kattr->test.ctx_in);
77762306a36Sopenharmony_ci	void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out);
77862306a36Sopenharmony_ci	u32 size = kattr->test.ctx_size_in;
77962306a36Sopenharmony_ci	void *data;
78062306a36Sopenharmony_ci	int err;
78162306a36Sopenharmony_ci
78262306a36Sopenharmony_ci	if (!data_in && !data_out)
78362306a36Sopenharmony_ci		return NULL;
78462306a36Sopenharmony_ci
78562306a36Sopenharmony_ci	data = kzalloc(max_size, GFP_USER);
78662306a36Sopenharmony_ci	if (!data)
78762306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
78862306a36Sopenharmony_ci
78962306a36Sopenharmony_ci	if (data_in) {
79062306a36Sopenharmony_ci		err = bpf_check_uarg_tail_zero(USER_BPFPTR(data_in), max_size, size);
79162306a36Sopenharmony_ci		if (err) {
79262306a36Sopenharmony_ci			kfree(data);
79362306a36Sopenharmony_ci			return ERR_PTR(err);
79462306a36Sopenharmony_ci		}
79562306a36Sopenharmony_ci
79662306a36Sopenharmony_ci		size = min_t(u32, max_size, size);
79762306a36Sopenharmony_ci		if (copy_from_user(data, data_in, size)) {
79862306a36Sopenharmony_ci			kfree(data);
79962306a36Sopenharmony_ci			return ERR_PTR(-EFAULT);
80062306a36Sopenharmony_ci		}
80162306a36Sopenharmony_ci	}
80262306a36Sopenharmony_ci	return data;
80362306a36Sopenharmony_ci}
80462306a36Sopenharmony_ci
80562306a36Sopenharmony_cistatic int bpf_ctx_finish(const union bpf_attr *kattr,
80662306a36Sopenharmony_ci			  union bpf_attr __user *uattr, const void *data,
80762306a36Sopenharmony_ci			  u32 size)
80862306a36Sopenharmony_ci{
80962306a36Sopenharmony_ci	void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out);
81062306a36Sopenharmony_ci	int err = -EFAULT;
81162306a36Sopenharmony_ci	u32 copy_size = size;
81262306a36Sopenharmony_ci
81362306a36Sopenharmony_ci	if (!data || !data_out)
81462306a36Sopenharmony_ci		return 0;
81562306a36Sopenharmony_ci
81662306a36Sopenharmony_ci	if (copy_size > kattr->test.ctx_size_out) {
81762306a36Sopenharmony_ci		copy_size = kattr->test.ctx_size_out;
81862306a36Sopenharmony_ci		err = -ENOSPC;
81962306a36Sopenharmony_ci	}
82062306a36Sopenharmony_ci
82162306a36Sopenharmony_ci	if (copy_to_user(data_out, data, copy_size))
82262306a36Sopenharmony_ci		goto out;
82362306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.ctx_size_out, &size, sizeof(size)))
82462306a36Sopenharmony_ci		goto out;
82562306a36Sopenharmony_ci	if (err != -ENOSPC)
82662306a36Sopenharmony_ci		err = 0;
82762306a36Sopenharmony_ciout:
82862306a36Sopenharmony_ci	return err;
82962306a36Sopenharmony_ci}
83062306a36Sopenharmony_ci
83162306a36Sopenharmony_ci/**
83262306a36Sopenharmony_ci * range_is_zero - test whether buffer is initialized
83362306a36Sopenharmony_ci * @buf: buffer to check
83462306a36Sopenharmony_ci * @from: check from this position
83562306a36Sopenharmony_ci * @to: check up until (excluding) this position
83662306a36Sopenharmony_ci *
83762306a36Sopenharmony_ci * This function returns true if the there is a non-zero byte
83862306a36Sopenharmony_ci * in the buf in the range [from,to).
83962306a36Sopenharmony_ci */
84062306a36Sopenharmony_cistatic inline bool range_is_zero(void *buf, size_t from, size_t to)
84162306a36Sopenharmony_ci{
84262306a36Sopenharmony_ci	return !memchr_inv((u8 *)buf + from, 0, to - from);
84362306a36Sopenharmony_ci}
84462306a36Sopenharmony_ci
84562306a36Sopenharmony_cistatic int convert___skb_to_skb(struct sk_buff *skb, struct __sk_buff *__skb)
84662306a36Sopenharmony_ci{
84762306a36Sopenharmony_ci	struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb;
84862306a36Sopenharmony_ci
84962306a36Sopenharmony_ci	if (!__skb)
85062306a36Sopenharmony_ci		return 0;
85162306a36Sopenharmony_ci
85262306a36Sopenharmony_ci	/* make sure the fields we don't use are zeroed */
85362306a36Sopenharmony_ci	if (!range_is_zero(__skb, 0, offsetof(struct __sk_buff, mark)))
85462306a36Sopenharmony_ci		return -EINVAL;
85562306a36Sopenharmony_ci
85662306a36Sopenharmony_ci	/* mark is allowed */
85762306a36Sopenharmony_ci
85862306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, mark),
85962306a36Sopenharmony_ci			   offsetof(struct __sk_buff, priority)))
86062306a36Sopenharmony_ci		return -EINVAL;
86162306a36Sopenharmony_ci
86262306a36Sopenharmony_ci	/* priority is allowed */
86362306a36Sopenharmony_ci	/* ingress_ifindex is allowed */
86462306a36Sopenharmony_ci	/* ifindex is allowed */
86562306a36Sopenharmony_ci
86662306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, ifindex),
86762306a36Sopenharmony_ci			   offsetof(struct __sk_buff, cb)))
86862306a36Sopenharmony_ci		return -EINVAL;
86962306a36Sopenharmony_ci
87062306a36Sopenharmony_ci	/* cb is allowed */
87162306a36Sopenharmony_ci
87262306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, cb),
87362306a36Sopenharmony_ci			   offsetof(struct __sk_buff, tstamp)))
87462306a36Sopenharmony_ci		return -EINVAL;
87562306a36Sopenharmony_ci
87662306a36Sopenharmony_ci	/* tstamp is allowed */
87762306a36Sopenharmony_ci	/* wire_len is allowed */
87862306a36Sopenharmony_ci	/* gso_segs is allowed */
87962306a36Sopenharmony_ci
88062306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_segs),
88162306a36Sopenharmony_ci			   offsetof(struct __sk_buff, gso_size)))
88262306a36Sopenharmony_ci		return -EINVAL;
88362306a36Sopenharmony_ci
88462306a36Sopenharmony_ci	/* gso_size is allowed */
88562306a36Sopenharmony_ci
88662306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_size),
88762306a36Sopenharmony_ci			   offsetof(struct __sk_buff, hwtstamp)))
88862306a36Sopenharmony_ci		return -EINVAL;
88962306a36Sopenharmony_ci
89062306a36Sopenharmony_ci	/* hwtstamp is allowed */
89162306a36Sopenharmony_ci
89262306a36Sopenharmony_ci	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, hwtstamp),
89362306a36Sopenharmony_ci			   sizeof(struct __sk_buff)))
89462306a36Sopenharmony_ci		return -EINVAL;
89562306a36Sopenharmony_ci
89662306a36Sopenharmony_ci	skb->mark = __skb->mark;
89762306a36Sopenharmony_ci	skb->priority = __skb->priority;
89862306a36Sopenharmony_ci	skb->skb_iif = __skb->ingress_ifindex;
89962306a36Sopenharmony_ci	skb->tstamp = __skb->tstamp;
90062306a36Sopenharmony_ci	memcpy(&cb->data, __skb->cb, QDISC_CB_PRIV_LEN);
90162306a36Sopenharmony_ci
90262306a36Sopenharmony_ci	if (__skb->wire_len == 0) {
90362306a36Sopenharmony_ci		cb->pkt_len = skb->len;
90462306a36Sopenharmony_ci	} else {
90562306a36Sopenharmony_ci		if (__skb->wire_len < skb->len ||
90662306a36Sopenharmony_ci		    __skb->wire_len > GSO_LEGACY_MAX_SIZE)
90762306a36Sopenharmony_ci			return -EINVAL;
90862306a36Sopenharmony_ci		cb->pkt_len = __skb->wire_len;
90962306a36Sopenharmony_ci	}
91062306a36Sopenharmony_ci
91162306a36Sopenharmony_ci	if (__skb->gso_segs > GSO_MAX_SEGS)
91262306a36Sopenharmony_ci		return -EINVAL;
91362306a36Sopenharmony_ci	skb_shinfo(skb)->gso_segs = __skb->gso_segs;
91462306a36Sopenharmony_ci	skb_shinfo(skb)->gso_size = __skb->gso_size;
91562306a36Sopenharmony_ci	skb_shinfo(skb)->hwtstamps.hwtstamp = __skb->hwtstamp;
91662306a36Sopenharmony_ci
91762306a36Sopenharmony_ci	return 0;
91862306a36Sopenharmony_ci}
91962306a36Sopenharmony_ci
92062306a36Sopenharmony_cistatic void convert_skb_to___skb(struct sk_buff *skb, struct __sk_buff *__skb)
92162306a36Sopenharmony_ci{
92262306a36Sopenharmony_ci	struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb;
92362306a36Sopenharmony_ci
92462306a36Sopenharmony_ci	if (!__skb)
92562306a36Sopenharmony_ci		return;
92662306a36Sopenharmony_ci
92762306a36Sopenharmony_ci	__skb->mark = skb->mark;
92862306a36Sopenharmony_ci	__skb->priority = skb->priority;
92962306a36Sopenharmony_ci	__skb->ingress_ifindex = skb->skb_iif;
93062306a36Sopenharmony_ci	__skb->ifindex = skb->dev->ifindex;
93162306a36Sopenharmony_ci	__skb->tstamp = skb->tstamp;
93262306a36Sopenharmony_ci	memcpy(__skb->cb, &cb->data, QDISC_CB_PRIV_LEN);
93362306a36Sopenharmony_ci	__skb->wire_len = cb->pkt_len;
93462306a36Sopenharmony_ci	__skb->gso_segs = skb_shinfo(skb)->gso_segs;
93562306a36Sopenharmony_ci	__skb->hwtstamp = skb_shinfo(skb)->hwtstamps.hwtstamp;
93662306a36Sopenharmony_ci}
93762306a36Sopenharmony_ci
93862306a36Sopenharmony_cistatic struct proto bpf_dummy_proto = {
93962306a36Sopenharmony_ci	.name   = "bpf_dummy",
94062306a36Sopenharmony_ci	.owner  = THIS_MODULE,
94162306a36Sopenharmony_ci	.obj_size = sizeof(struct sock),
94262306a36Sopenharmony_ci};
94362306a36Sopenharmony_ci
94462306a36Sopenharmony_ciint bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr,
94562306a36Sopenharmony_ci			  union bpf_attr __user *uattr)
94662306a36Sopenharmony_ci{
94762306a36Sopenharmony_ci	bool is_l2 = false, is_direct_pkt_access = false;
94862306a36Sopenharmony_ci	struct net *net = current->nsproxy->net_ns;
94962306a36Sopenharmony_ci	struct net_device *dev = net->loopback_dev;
95062306a36Sopenharmony_ci	u32 size = kattr->test.data_size_in;
95162306a36Sopenharmony_ci	u32 repeat = kattr->test.repeat;
95262306a36Sopenharmony_ci	struct __sk_buff *ctx = NULL;
95362306a36Sopenharmony_ci	u32 retval, duration;
95462306a36Sopenharmony_ci	int hh_len = ETH_HLEN;
95562306a36Sopenharmony_ci	struct sk_buff *skb;
95662306a36Sopenharmony_ci	struct sock *sk;
95762306a36Sopenharmony_ci	void *data;
95862306a36Sopenharmony_ci	int ret;
95962306a36Sopenharmony_ci
96062306a36Sopenharmony_ci	if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
96162306a36Sopenharmony_ci		return -EINVAL;
96262306a36Sopenharmony_ci
96362306a36Sopenharmony_ci	data = bpf_test_init(kattr, kattr->test.data_size_in,
96462306a36Sopenharmony_ci			     size, NET_SKB_PAD + NET_IP_ALIGN,
96562306a36Sopenharmony_ci			     SKB_DATA_ALIGN(sizeof(struct skb_shared_info)));
96662306a36Sopenharmony_ci	if (IS_ERR(data))
96762306a36Sopenharmony_ci		return PTR_ERR(data);
96862306a36Sopenharmony_ci
96962306a36Sopenharmony_ci	ctx = bpf_ctx_init(kattr, sizeof(struct __sk_buff));
97062306a36Sopenharmony_ci	if (IS_ERR(ctx)) {
97162306a36Sopenharmony_ci		kfree(data);
97262306a36Sopenharmony_ci		return PTR_ERR(ctx);
97362306a36Sopenharmony_ci	}
97462306a36Sopenharmony_ci
97562306a36Sopenharmony_ci	switch (prog->type) {
97662306a36Sopenharmony_ci	case BPF_PROG_TYPE_SCHED_CLS:
97762306a36Sopenharmony_ci	case BPF_PROG_TYPE_SCHED_ACT:
97862306a36Sopenharmony_ci		is_l2 = true;
97962306a36Sopenharmony_ci		fallthrough;
98062306a36Sopenharmony_ci	case BPF_PROG_TYPE_LWT_IN:
98162306a36Sopenharmony_ci	case BPF_PROG_TYPE_LWT_OUT:
98262306a36Sopenharmony_ci	case BPF_PROG_TYPE_LWT_XMIT:
98362306a36Sopenharmony_ci		is_direct_pkt_access = true;
98462306a36Sopenharmony_ci		break;
98562306a36Sopenharmony_ci	default:
98662306a36Sopenharmony_ci		break;
98762306a36Sopenharmony_ci	}
98862306a36Sopenharmony_ci
98962306a36Sopenharmony_ci	sk = sk_alloc(net, AF_UNSPEC, GFP_USER, &bpf_dummy_proto, 1);
99062306a36Sopenharmony_ci	if (!sk) {
99162306a36Sopenharmony_ci		kfree(data);
99262306a36Sopenharmony_ci		kfree(ctx);
99362306a36Sopenharmony_ci		return -ENOMEM;
99462306a36Sopenharmony_ci	}
99562306a36Sopenharmony_ci	sock_init_data(NULL, sk);
99662306a36Sopenharmony_ci
99762306a36Sopenharmony_ci	skb = slab_build_skb(data);
99862306a36Sopenharmony_ci	if (!skb) {
99962306a36Sopenharmony_ci		kfree(data);
100062306a36Sopenharmony_ci		kfree(ctx);
100162306a36Sopenharmony_ci		sk_free(sk);
100262306a36Sopenharmony_ci		return -ENOMEM;
100362306a36Sopenharmony_ci	}
100462306a36Sopenharmony_ci	skb->sk = sk;
100562306a36Sopenharmony_ci
100662306a36Sopenharmony_ci	skb_reserve(skb, NET_SKB_PAD + NET_IP_ALIGN);
100762306a36Sopenharmony_ci	__skb_put(skb, size);
100862306a36Sopenharmony_ci	if (ctx && ctx->ifindex > 1) {
100962306a36Sopenharmony_ci		dev = dev_get_by_index(net, ctx->ifindex);
101062306a36Sopenharmony_ci		if (!dev) {
101162306a36Sopenharmony_ci			ret = -ENODEV;
101262306a36Sopenharmony_ci			goto out;
101362306a36Sopenharmony_ci		}
101462306a36Sopenharmony_ci	}
101562306a36Sopenharmony_ci	skb->protocol = eth_type_trans(skb, dev);
101662306a36Sopenharmony_ci	skb_reset_network_header(skb);
101762306a36Sopenharmony_ci
101862306a36Sopenharmony_ci	switch (skb->protocol) {
101962306a36Sopenharmony_ci	case htons(ETH_P_IP):
102062306a36Sopenharmony_ci		sk->sk_family = AF_INET;
102162306a36Sopenharmony_ci		if (sizeof(struct iphdr) <= skb_headlen(skb)) {
102262306a36Sopenharmony_ci			sk->sk_rcv_saddr = ip_hdr(skb)->saddr;
102362306a36Sopenharmony_ci			sk->sk_daddr = ip_hdr(skb)->daddr;
102462306a36Sopenharmony_ci		}
102562306a36Sopenharmony_ci		break;
102662306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6)
102762306a36Sopenharmony_ci	case htons(ETH_P_IPV6):
102862306a36Sopenharmony_ci		sk->sk_family = AF_INET6;
102962306a36Sopenharmony_ci		if (sizeof(struct ipv6hdr) <= skb_headlen(skb)) {
103062306a36Sopenharmony_ci			sk->sk_v6_rcv_saddr = ipv6_hdr(skb)->saddr;
103162306a36Sopenharmony_ci			sk->sk_v6_daddr = ipv6_hdr(skb)->daddr;
103262306a36Sopenharmony_ci		}
103362306a36Sopenharmony_ci		break;
103462306a36Sopenharmony_ci#endif
103562306a36Sopenharmony_ci	default:
103662306a36Sopenharmony_ci		break;
103762306a36Sopenharmony_ci	}
103862306a36Sopenharmony_ci
103962306a36Sopenharmony_ci	if (is_l2)
104062306a36Sopenharmony_ci		__skb_push(skb, hh_len);
104162306a36Sopenharmony_ci	if (is_direct_pkt_access)
104262306a36Sopenharmony_ci		bpf_compute_data_pointers(skb);
104362306a36Sopenharmony_ci	ret = convert___skb_to_skb(skb, ctx);
104462306a36Sopenharmony_ci	if (ret)
104562306a36Sopenharmony_ci		goto out;
104662306a36Sopenharmony_ci	ret = bpf_test_run(prog, skb, repeat, &retval, &duration, false);
104762306a36Sopenharmony_ci	if (ret)
104862306a36Sopenharmony_ci		goto out;
104962306a36Sopenharmony_ci	if (!is_l2) {
105062306a36Sopenharmony_ci		if (skb_headroom(skb) < hh_len) {
105162306a36Sopenharmony_ci			int nhead = HH_DATA_ALIGN(hh_len - skb_headroom(skb));
105262306a36Sopenharmony_ci
105362306a36Sopenharmony_ci			if (pskb_expand_head(skb, nhead, 0, GFP_USER)) {
105462306a36Sopenharmony_ci				ret = -ENOMEM;
105562306a36Sopenharmony_ci				goto out;
105662306a36Sopenharmony_ci			}
105762306a36Sopenharmony_ci		}
105862306a36Sopenharmony_ci		memset(__skb_push(skb, hh_len), 0, hh_len);
105962306a36Sopenharmony_ci	}
106062306a36Sopenharmony_ci	convert_skb_to___skb(skb, ctx);
106162306a36Sopenharmony_ci
106262306a36Sopenharmony_ci	size = skb->len;
106362306a36Sopenharmony_ci	/* bpf program can never convert linear skb to non-linear */
106462306a36Sopenharmony_ci	if (WARN_ON_ONCE(skb_is_nonlinear(skb)))
106562306a36Sopenharmony_ci		size = skb_headlen(skb);
106662306a36Sopenharmony_ci	ret = bpf_test_finish(kattr, uattr, skb->data, NULL, size, retval,
106762306a36Sopenharmony_ci			      duration);
106862306a36Sopenharmony_ci	if (!ret)
106962306a36Sopenharmony_ci		ret = bpf_ctx_finish(kattr, uattr, ctx,
107062306a36Sopenharmony_ci				     sizeof(struct __sk_buff));
107162306a36Sopenharmony_ciout:
107262306a36Sopenharmony_ci	if (dev && dev != net->loopback_dev)
107362306a36Sopenharmony_ci		dev_put(dev);
107462306a36Sopenharmony_ci	kfree_skb(skb);
107562306a36Sopenharmony_ci	sk_free(sk);
107662306a36Sopenharmony_ci	kfree(ctx);
107762306a36Sopenharmony_ci	return ret;
107862306a36Sopenharmony_ci}
107962306a36Sopenharmony_ci
108062306a36Sopenharmony_cistatic int xdp_convert_md_to_buff(struct xdp_md *xdp_md, struct xdp_buff *xdp)
108162306a36Sopenharmony_ci{
108262306a36Sopenharmony_ci	unsigned int ingress_ifindex, rx_queue_index;
108362306a36Sopenharmony_ci	struct netdev_rx_queue *rxqueue;
108462306a36Sopenharmony_ci	struct net_device *device;
108562306a36Sopenharmony_ci
108662306a36Sopenharmony_ci	if (!xdp_md)
108762306a36Sopenharmony_ci		return 0;
108862306a36Sopenharmony_ci
108962306a36Sopenharmony_ci	if (xdp_md->egress_ifindex != 0)
109062306a36Sopenharmony_ci		return -EINVAL;
109162306a36Sopenharmony_ci
109262306a36Sopenharmony_ci	ingress_ifindex = xdp_md->ingress_ifindex;
109362306a36Sopenharmony_ci	rx_queue_index = xdp_md->rx_queue_index;
109462306a36Sopenharmony_ci
109562306a36Sopenharmony_ci	if (!ingress_ifindex && rx_queue_index)
109662306a36Sopenharmony_ci		return -EINVAL;
109762306a36Sopenharmony_ci
109862306a36Sopenharmony_ci	if (ingress_ifindex) {
109962306a36Sopenharmony_ci		device = dev_get_by_index(current->nsproxy->net_ns,
110062306a36Sopenharmony_ci					  ingress_ifindex);
110162306a36Sopenharmony_ci		if (!device)
110262306a36Sopenharmony_ci			return -ENODEV;
110362306a36Sopenharmony_ci
110462306a36Sopenharmony_ci		if (rx_queue_index >= device->real_num_rx_queues)
110562306a36Sopenharmony_ci			goto free_dev;
110662306a36Sopenharmony_ci
110762306a36Sopenharmony_ci		rxqueue = __netif_get_rx_queue(device, rx_queue_index);
110862306a36Sopenharmony_ci
110962306a36Sopenharmony_ci		if (!xdp_rxq_info_is_reg(&rxqueue->xdp_rxq))
111062306a36Sopenharmony_ci			goto free_dev;
111162306a36Sopenharmony_ci
111262306a36Sopenharmony_ci		xdp->rxq = &rxqueue->xdp_rxq;
111362306a36Sopenharmony_ci		/* The device is now tracked in the xdp->rxq for later
111462306a36Sopenharmony_ci		 * dev_put()
111562306a36Sopenharmony_ci		 */
111662306a36Sopenharmony_ci	}
111762306a36Sopenharmony_ci
111862306a36Sopenharmony_ci	xdp->data = xdp->data_meta + xdp_md->data;
111962306a36Sopenharmony_ci	return 0;
112062306a36Sopenharmony_ci
112162306a36Sopenharmony_cifree_dev:
112262306a36Sopenharmony_ci	dev_put(device);
112362306a36Sopenharmony_ci	return -EINVAL;
112462306a36Sopenharmony_ci}
112562306a36Sopenharmony_ci
112662306a36Sopenharmony_cistatic void xdp_convert_buff_to_md(struct xdp_buff *xdp, struct xdp_md *xdp_md)
112762306a36Sopenharmony_ci{
112862306a36Sopenharmony_ci	if (!xdp_md)
112962306a36Sopenharmony_ci		return;
113062306a36Sopenharmony_ci
113162306a36Sopenharmony_ci	xdp_md->data = xdp->data - xdp->data_meta;
113262306a36Sopenharmony_ci	xdp_md->data_end = xdp->data_end - xdp->data_meta;
113362306a36Sopenharmony_ci
113462306a36Sopenharmony_ci	if (xdp_md->ingress_ifindex)
113562306a36Sopenharmony_ci		dev_put(xdp->rxq->dev);
113662306a36Sopenharmony_ci}
113762306a36Sopenharmony_ci
113862306a36Sopenharmony_ciint bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr,
113962306a36Sopenharmony_ci			  union bpf_attr __user *uattr)
114062306a36Sopenharmony_ci{
114162306a36Sopenharmony_ci	bool do_live = (kattr->test.flags & BPF_F_TEST_XDP_LIVE_FRAMES);
114262306a36Sopenharmony_ci	u32 tailroom = SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
114362306a36Sopenharmony_ci	u32 batch_size = kattr->test.batch_size;
114462306a36Sopenharmony_ci	u32 retval = 0, duration, max_data_sz;
114562306a36Sopenharmony_ci	u32 size = kattr->test.data_size_in;
114662306a36Sopenharmony_ci	u32 headroom = XDP_PACKET_HEADROOM;
114762306a36Sopenharmony_ci	u32 repeat = kattr->test.repeat;
114862306a36Sopenharmony_ci	struct netdev_rx_queue *rxqueue;
114962306a36Sopenharmony_ci	struct skb_shared_info *sinfo;
115062306a36Sopenharmony_ci	struct xdp_buff xdp = {};
115162306a36Sopenharmony_ci	int i, ret = -EINVAL;
115262306a36Sopenharmony_ci	struct xdp_md *ctx;
115362306a36Sopenharmony_ci	void *data;
115462306a36Sopenharmony_ci
115562306a36Sopenharmony_ci	if (prog->expected_attach_type == BPF_XDP_DEVMAP ||
115662306a36Sopenharmony_ci	    prog->expected_attach_type == BPF_XDP_CPUMAP)
115762306a36Sopenharmony_ci		return -EINVAL;
115862306a36Sopenharmony_ci
115962306a36Sopenharmony_ci	if (kattr->test.flags & ~BPF_F_TEST_XDP_LIVE_FRAMES)
116062306a36Sopenharmony_ci		return -EINVAL;
116162306a36Sopenharmony_ci
116262306a36Sopenharmony_ci	if (bpf_prog_is_dev_bound(prog->aux))
116362306a36Sopenharmony_ci		return -EINVAL;
116462306a36Sopenharmony_ci
116562306a36Sopenharmony_ci	if (do_live) {
116662306a36Sopenharmony_ci		if (!batch_size)
116762306a36Sopenharmony_ci			batch_size = NAPI_POLL_WEIGHT;
116862306a36Sopenharmony_ci		else if (batch_size > TEST_XDP_MAX_BATCH)
116962306a36Sopenharmony_ci			return -E2BIG;
117062306a36Sopenharmony_ci
117162306a36Sopenharmony_ci		headroom += sizeof(struct xdp_page_head);
117262306a36Sopenharmony_ci	} else if (batch_size) {
117362306a36Sopenharmony_ci		return -EINVAL;
117462306a36Sopenharmony_ci	}
117562306a36Sopenharmony_ci
117662306a36Sopenharmony_ci	ctx = bpf_ctx_init(kattr, sizeof(struct xdp_md));
117762306a36Sopenharmony_ci	if (IS_ERR(ctx))
117862306a36Sopenharmony_ci		return PTR_ERR(ctx);
117962306a36Sopenharmony_ci
118062306a36Sopenharmony_ci	if (ctx) {
118162306a36Sopenharmony_ci		/* There can't be user provided data before the meta data */
118262306a36Sopenharmony_ci		if (ctx->data_meta || ctx->data_end != size ||
118362306a36Sopenharmony_ci		    ctx->data > ctx->data_end ||
118462306a36Sopenharmony_ci		    unlikely(xdp_metalen_invalid(ctx->data)) ||
118562306a36Sopenharmony_ci		    (do_live && (kattr->test.data_out || kattr->test.ctx_out)))
118662306a36Sopenharmony_ci			goto free_ctx;
118762306a36Sopenharmony_ci		/* Meta data is allocated from the headroom */
118862306a36Sopenharmony_ci		headroom -= ctx->data;
118962306a36Sopenharmony_ci	}
119062306a36Sopenharmony_ci
119162306a36Sopenharmony_ci	max_data_sz = 4096 - headroom - tailroom;
119262306a36Sopenharmony_ci	if (size > max_data_sz) {
119362306a36Sopenharmony_ci		/* disallow live data mode for jumbo frames */
119462306a36Sopenharmony_ci		if (do_live)
119562306a36Sopenharmony_ci			goto free_ctx;
119662306a36Sopenharmony_ci		size = max_data_sz;
119762306a36Sopenharmony_ci	}
119862306a36Sopenharmony_ci
119962306a36Sopenharmony_ci	data = bpf_test_init(kattr, size, max_data_sz, headroom, tailroom);
120062306a36Sopenharmony_ci	if (IS_ERR(data)) {
120162306a36Sopenharmony_ci		ret = PTR_ERR(data);
120262306a36Sopenharmony_ci		goto free_ctx;
120362306a36Sopenharmony_ci	}
120462306a36Sopenharmony_ci
120562306a36Sopenharmony_ci	rxqueue = __netif_get_rx_queue(current->nsproxy->net_ns->loopback_dev, 0);
120662306a36Sopenharmony_ci	rxqueue->xdp_rxq.frag_size = headroom + max_data_sz + tailroom;
120762306a36Sopenharmony_ci	xdp_init_buff(&xdp, rxqueue->xdp_rxq.frag_size, &rxqueue->xdp_rxq);
120862306a36Sopenharmony_ci	xdp_prepare_buff(&xdp, data, headroom, size, true);
120962306a36Sopenharmony_ci	sinfo = xdp_get_shared_info_from_buff(&xdp);
121062306a36Sopenharmony_ci
121162306a36Sopenharmony_ci	ret = xdp_convert_md_to_buff(ctx, &xdp);
121262306a36Sopenharmony_ci	if (ret)
121362306a36Sopenharmony_ci		goto free_data;
121462306a36Sopenharmony_ci
121562306a36Sopenharmony_ci	if (unlikely(kattr->test.data_size_in > size)) {
121662306a36Sopenharmony_ci		void __user *data_in = u64_to_user_ptr(kattr->test.data_in);
121762306a36Sopenharmony_ci
121862306a36Sopenharmony_ci		while (size < kattr->test.data_size_in) {
121962306a36Sopenharmony_ci			struct page *page;
122062306a36Sopenharmony_ci			skb_frag_t *frag;
122162306a36Sopenharmony_ci			u32 data_len;
122262306a36Sopenharmony_ci
122362306a36Sopenharmony_ci			if (sinfo->nr_frags == MAX_SKB_FRAGS) {
122462306a36Sopenharmony_ci				ret = -ENOMEM;
122562306a36Sopenharmony_ci				goto out;
122662306a36Sopenharmony_ci			}
122762306a36Sopenharmony_ci
122862306a36Sopenharmony_ci			page = alloc_page(GFP_KERNEL);
122962306a36Sopenharmony_ci			if (!page) {
123062306a36Sopenharmony_ci				ret = -ENOMEM;
123162306a36Sopenharmony_ci				goto out;
123262306a36Sopenharmony_ci			}
123362306a36Sopenharmony_ci
123462306a36Sopenharmony_ci			frag = &sinfo->frags[sinfo->nr_frags++];
123562306a36Sopenharmony_ci
123662306a36Sopenharmony_ci			data_len = min_t(u32, kattr->test.data_size_in - size,
123762306a36Sopenharmony_ci					 PAGE_SIZE);
123862306a36Sopenharmony_ci			skb_frag_fill_page_desc(frag, page, 0, data_len);
123962306a36Sopenharmony_ci
124062306a36Sopenharmony_ci			if (copy_from_user(page_address(page), data_in + size,
124162306a36Sopenharmony_ci					   data_len)) {
124262306a36Sopenharmony_ci				ret = -EFAULT;
124362306a36Sopenharmony_ci				goto out;
124462306a36Sopenharmony_ci			}
124562306a36Sopenharmony_ci			sinfo->xdp_frags_size += data_len;
124662306a36Sopenharmony_ci			size += data_len;
124762306a36Sopenharmony_ci		}
124862306a36Sopenharmony_ci		xdp_buff_set_frags_flag(&xdp);
124962306a36Sopenharmony_ci	}
125062306a36Sopenharmony_ci
125162306a36Sopenharmony_ci	if (repeat > 1)
125262306a36Sopenharmony_ci		bpf_prog_change_xdp(NULL, prog);
125362306a36Sopenharmony_ci
125462306a36Sopenharmony_ci	if (do_live)
125562306a36Sopenharmony_ci		ret = bpf_test_run_xdp_live(prog, &xdp, repeat, batch_size, &duration);
125662306a36Sopenharmony_ci	else
125762306a36Sopenharmony_ci		ret = bpf_test_run(prog, &xdp, repeat, &retval, &duration, true);
125862306a36Sopenharmony_ci	/* We convert the xdp_buff back to an xdp_md before checking the return
125962306a36Sopenharmony_ci	 * code so the reference count of any held netdevice will be decremented
126062306a36Sopenharmony_ci	 * even if the test run failed.
126162306a36Sopenharmony_ci	 */
126262306a36Sopenharmony_ci	xdp_convert_buff_to_md(&xdp, ctx);
126362306a36Sopenharmony_ci	if (ret)
126462306a36Sopenharmony_ci		goto out;
126562306a36Sopenharmony_ci
126662306a36Sopenharmony_ci	size = xdp.data_end - xdp.data_meta + sinfo->xdp_frags_size;
126762306a36Sopenharmony_ci	ret = bpf_test_finish(kattr, uattr, xdp.data_meta, sinfo, size,
126862306a36Sopenharmony_ci			      retval, duration);
126962306a36Sopenharmony_ci	if (!ret)
127062306a36Sopenharmony_ci		ret = bpf_ctx_finish(kattr, uattr, ctx,
127162306a36Sopenharmony_ci				     sizeof(struct xdp_md));
127262306a36Sopenharmony_ci
127362306a36Sopenharmony_ciout:
127462306a36Sopenharmony_ci	if (repeat > 1)
127562306a36Sopenharmony_ci		bpf_prog_change_xdp(prog, NULL);
127662306a36Sopenharmony_cifree_data:
127762306a36Sopenharmony_ci	for (i = 0; i < sinfo->nr_frags; i++)
127862306a36Sopenharmony_ci		__free_page(skb_frag_page(&sinfo->frags[i]));
127962306a36Sopenharmony_ci	kfree(data);
128062306a36Sopenharmony_cifree_ctx:
128162306a36Sopenharmony_ci	kfree(ctx);
128262306a36Sopenharmony_ci	return ret;
128362306a36Sopenharmony_ci}
128462306a36Sopenharmony_ci
128562306a36Sopenharmony_cistatic int verify_user_bpf_flow_keys(struct bpf_flow_keys *ctx)
128662306a36Sopenharmony_ci{
128762306a36Sopenharmony_ci	/* make sure the fields we don't use are zeroed */
128862306a36Sopenharmony_ci	if (!range_is_zero(ctx, 0, offsetof(struct bpf_flow_keys, flags)))
128962306a36Sopenharmony_ci		return -EINVAL;
129062306a36Sopenharmony_ci
129162306a36Sopenharmony_ci	/* flags is allowed */
129262306a36Sopenharmony_ci
129362306a36Sopenharmony_ci	if (!range_is_zero(ctx, offsetofend(struct bpf_flow_keys, flags),
129462306a36Sopenharmony_ci			   sizeof(struct bpf_flow_keys)))
129562306a36Sopenharmony_ci		return -EINVAL;
129662306a36Sopenharmony_ci
129762306a36Sopenharmony_ci	return 0;
129862306a36Sopenharmony_ci}
129962306a36Sopenharmony_ci
130062306a36Sopenharmony_ciint bpf_prog_test_run_flow_dissector(struct bpf_prog *prog,
130162306a36Sopenharmony_ci				     const union bpf_attr *kattr,
130262306a36Sopenharmony_ci				     union bpf_attr __user *uattr)
130362306a36Sopenharmony_ci{
130462306a36Sopenharmony_ci	struct bpf_test_timer t = { NO_PREEMPT };
130562306a36Sopenharmony_ci	u32 size = kattr->test.data_size_in;
130662306a36Sopenharmony_ci	struct bpf_flow_dissector ctx = {};
130762306a36Sopenharmony_ci	u32 repeat = kattr->test.repeat;
130862306a36Sopenharmony_ci	struct bpf_flow_keys *user_ctx;
130962306a36Sopenharmony_ci	struct bpf_flow_keys flow_keys;
131062306a36Sopenharmony_ci	const struct ethhdr *eth;
131162306a36Sopenharmony_ci	unsigned int flags = 0;
131262306a36Sopenharmony_ci	u32 retval, duration;
131362306a36Sopenharmony_ci	void *data;
131462306a36Sopenharmony_ci	int ret;
131562306a36Sopenharmony_ci
131662306a36Sopenharmony_ci	if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
131762306a36Sopenharmony_ci		return -EINVAL;
131862306a36Sopenharmony_ci
131962306a36Sopenharmony_ci	if (size < ETH_HLEN)
132062306a36Sopenharmony_ci		return -EINVAL;
132162306a36Sopenharmony_ci
132262306a36Sopenharmony_ci	data = bpf_test_init(kattr, kattr->test.data_size_in, size, 0, 0);
132362306a36Sopenharmony_ci	if (IS_ERR(data))
132462306a36Sopenharmony_ci		return PTR_ERR(data);
132562306a36Sopenharmony_ci
132662306a36Sopenharmony_ci	eth = (struct ethhdr *)data;
132762306a36Sopenharmony_ci
132862306a36Sopenharmony_ci	if (!repeat)
132962306a36Sopenharmony_ci		repeat = 1;
133062306a36Sopenharmony_ci
133162306a36Sopenharmony_ci	user_ctx = bpf_ctx_init(kattr, sizeof(struct bpf_flow_keys));
133262306a36Sopenharmony_ci	if (IS_ERR(user_ctx)) {
133362306a36Sopenharmony_ci		kfree(data);
133462306a36Sopenharmony_ci		return PTR_ERR(user_ctx);
133562306a36Sopenharmony_ci	}
133662306a36Sopenharmony_ci	if (user_ctx) {
133762306a36Sopenharmony_ci		ret = verify_user_bpf_flow_keys(user_ctx);
133862306a36Sopenharmony_ci		if (ret)
133962306a36Sopenharmony_ci			goto out;
134062306a36Sopenharmony_ci		flags = user_ctx->flags;
134162306a36Sopenharmony_ci	}
134262306a36Sopenharmony_ci
134362306a36Sopenharmony_ci	ctx.flow_keys = &flow_keys;
134462306a36Sopenharmony_ci	ctx.data = data;
134562306a36Sopenharmony_ci	ctx.data_end = (__u8 *)data + size;
134662306a36Sopenharmony_ci
134762306a36Sopenharmony_ci	bpf_test_timer_enter(&t);
134862306a36Sopenharmony_ci	do {
134962306a36Sopenharmony_ci		retval = bpf_flow_dissect(prog, &ctx, eth->h_proto, ETH_HLEN,
135062306a36Sopenharmony_ci					  size, flags);
135162306a36Sopenharmony_ci	} while (bpf_test_timer_continue(&t, 1, repeat, &ret, &duration));
135262306a36Sopenharmony_ci	bpf_test_timer_leave(&t);
135362306a36Sopenharmony_ci
135462306a36Sopenharmony_ci	if (ret < 0)
135562306a36Sopenharmony_ci		goto out;
135662306a36Sopenharmony_ci
135762306a36Sopenharmony_ci	ret = bpf_test_finish(kattr, uattr, &flow_keys, NULL,
135862306a36Sopenharmony_ci			      sizeof(flow_keys), retval, duration);
135962306a36Sopenharmony_ci	if (!ret)
136062306a36Sopenharmony_ci		ret = bpf_ctx_finish(kattr, uattr, user_ctx,
136162306a36Sopenharmony_ci				     sizeof(struct bpf_flow_keys));
136262306a36Sopenharmony_ci
136362306a36Sopenharmony_ciout:
136462306a36Sopenharmony_ci	kfree(user_ctx);
136562306a36Sopenharmony_ci	kfree(data);
136662306a36Sopenharmony_ci	return ret;
136762306a36Sopenharmony_ci}
136862306a36Sopenharmony_ci
136962306a36Sopenharmony_ciint bpf_prog_test_run_sk_lookup(struct bpf_prog *prog, const union bpf_attr *kattr,
137062306a36Sopenharmony_ci				union bpf_attr __user *uattr)
137162306a36Sopenharmony_ci{
137262306a36Sopenharmony_ci	struct bpf_test_timer t = { NO_PREEMPT };
137362306a36Sopenharmony_ci	struct bpf_prog_array *progs = NULL;
137462306a36Sopenharmony_ci	struct bpf_sk_lookup_kern ctx = {};
137562306a36Sopenharmony_ci	u32 repeat = kattr->test.repeat;
137662306a36Sopenharmony_ci	struct bpf_sk_lookup *user_ctx;
137762306a36Sopenharmony_ci	u32 retval, duration;
137862306a36Sopenharmony_ci	int ret = -EINVAL;
137962306a36Sopenharmony_ci
138062306a36Sopenharmony_ci	if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
138162306a36Sopenharmony_ci		return -EINVAL;
138262306a36Sopenharmony_ci
138362306a36Sopenharmony_ci	if (kattr->test.data_in || kattr->test.data_size_in || kattr->test.data_out ||
138462306a36Sopenharmony_ci	    kattr->test.data_size_out)
138562306a36Sopenharmony_ci		return -EINVAL;
138662306a36Sopenharmony_ci
138762306a36Sopenharmony_ci	if (!repeat)
138862306a36Sopenharmony_ci		repeat = 1;
138962306a36Sopenharmony_ci
139062306a36Sopenharmony_ci	user_ctx = bpf_ctx_init(kattr, sizeof(*user_ctx));
139162306a36Sopenharmony_ci	if (IS_ERR(user_ctx))
139262306a36Sopenharmony_ci		return PTR_ERR(user_ctx);
139362306a36Sopenharmony_ci
139462306a36Sopenharmony_ci	if (!user_ctx)
139562306a36Sopenharmony_ci		return -EINVAL;
139662306a36Sopenharmony_ci
139762306a36Sopenharmony_ci	if (user_ctx->sk)
139862306a36Sopenharmony_ci		goto out;
139962306a36Sopenharmony_ci
140062306a36Sopenharmony_ci	if (!range_is_zero(user_ctx, offsetofend(typeof(*user_ctx), local_port), sizeof(*user_ctx)))
140162306a36Sopenharmony_ci		goto out;
140262306a36Sopenharmony_ci
140362306a36Sopenharmony_ci	if (user_ctx->local_port > U16_MAX) {
140462306a36Sopenharmony_ci		ret = -ERANGE;
140562306a36Sopenharmony_ci		goto out;
140662306a36Sopenharmony_ci	}
140762306a36Sopenharmony_ci
140862306a36Sopenharmony_ci	ctx.family = (u16)user_ctx->family;
140962306a36Sopenharmony_ci	ctx.protocol = (u16)user_ctx->protocol;
141062306a36Sopenharmony_ci	ctx.dport = (u16)user_ctx->local_port;
141162306a36Sopenharmony_ci	ctx.sport = user_ctx->remote_port;
141262306a36Sopenharmony_ci
141362306a36Sopenharmony_ci	switch (ctx.family) {
141462306a36Sopenharmony_ci	case AF_INET:
141562306a36Sopenharmony_ci		ctx.v4.daddr = (__force __be32)user_ctx->local_ip4;
141662306a36Sopenharmony_ci		ctx.v4.saddr = (__force __be32)user_ctx->remote_ip4;
141762306a36Sopenharmony_ci		break;
141862306a36Sopenharmony_ci
141962306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6)
142062306a36Sopenharmony_ci	case AF_INET6:
142162306a36Sopenharmony_ci		ctx.v6.daddr = (struct in6_addr *)user_ctx->local_ip6;
142262306a36Sopenharmony_ci		ctx.v6.saddr = (struct in6_addr *)user_ctx->remote_ip6;
142362306a36Sopenharmony_ci		break;
142462306a36Sopenharmony_ci#endif
142562306a36Sopenharmony_ci
142662306a36Sopenharmony_ci	default:
142762306a36Sopenharmony_ci		ret = -EAFNOSUPPORT;
142862306a36Sopenharmony_ci		goto out;
142962306a36Sopenharmony_ci	}
143062306a36Sopenharmony_ci
143162306a36Sopenharmony_ci	progs = bpf_prog_array_alloc(1, GFP_KERNEL);
143262306a36Sopenharmony_ci	if (!progs) {
143362306a36Sopenharmony_ci		ret = -ENOMEM;
143462306a36Sopenharmony_ci		goto out;
143562306a36Sopenharmony_ci	}
143662306a36Sopenharmony_ci
143762306a36Sopenharmony_ci	progs->items[0].prog = prog;
143862306a36Sopenharmony_ci
143962306a36Sopenharmony_ci	bpf_test_timer_enter(&t);
144062306a36Sopenharmony_ci	do {
144162306a36Sopenharmony_ci		ctx.selected_sk = NULL;
144262306a36Sopenharmony_ci		retval = BPF_PROG_SK_LOOKUP_RUN_ARRAY(progs, ctx, bpf_prog_run);
144362306a36Sopenharmony_ci	} while (bpf_test_timer_continue(&t, 1, repeat, &ret, &duration));
144462306a36Sopenharmony_ci	bpf_test_timer_leave(&t);
144562306a36Sopenharmony_ci
144662306a36Sopenharmony_ci	if (ret < 0)
144762306a36Sopenharmony_ci		goto out;
144862306a36Sopenharmony_ci
144962306a36Sopenharmony_ci	user_ctx->cookie = 0;
145062306a36Sopenharmony_ci	if (ctx.selected_sk) {
145162306a36Sopenharmony_ci		if (ctx.selected_sk->sk_reuseport && !ctx.no_reuseport) {
145262306a36Sopenharmony_ci			ret = -EOPNOTSUPP;
145362306a36Sopenharmony_ci			goto out;
145462306a36Sopenharmony_ci		}
145562306a36Sopenharmony_ci
145662306a36Sopenharmony_ci		user_ctx->cookie = sock_gen_cookie(ctx.selected_sk);
145762306a36Sopenharmony_ci	}
145862306a36Sopenharmony_ci
145962306a36Sopenharmony_ci	ret = bpf_test_finish(kattr, uattr, NULL, NULL, 0, retval, duration);
146062306a36Sopenharmony_ci	if (!ret)
146162306a36Sopenharmony_ci		ret = bpf_ctx_finish(kattr, uattr, user_ctx, sizeof(*user_ctx));
146262306a36Sopenharmony_ci
146362306a36Sopenharmony_ciout:
146462306a36Sopenharmony_ci	bpf_prog_array_free(progs);
146562306a36Sopenharmony_ci	kfree(user_ctx);
146662306a36Sopenharmony_ci	return ret;
146762306a36Sopenharmony_ci}
146862306a36Sopenharmony_ci
146962306a36Sopenharmony_ciint bpf_prog_test_run_syscall(struct bpf_prog *prog,
147062306a36Sopenharmony_ci			      const union bpf_attr *kattr,
147162306a36Sopenharmony_ci			      union bpf_attr __user *uattr)
147262306a36Sopenharmony_ci{
147362306a36Sopenharmony_ci	void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in);
147462306a36Sopenharmony_ci	__u32 ctx_size_in = kattr->test.ctx_size_in;
147562306a36Sopenharmony_ci	void *ctx = NULL;
147662306a36Sopenharmony_ci	u32 retval;
147762306a36Sopenharmony_ci	int err = 0;
147862306a36Sopenharmony_ci
147962306a36Sopenharmony_ci	/* doesn't support data_in/out, ctx_out, duration, or repeat or flags */
148062306a36Sopenharmony_ci	if (kattr->test.data_in || kattr->test.data_out ||
148162306a36Sopenharmony_ci	    kattr->test.ctx_out || kattr->test.duration ||
148262306a36Sopenharmony_ci	    kattr->test.repeat || kattr->test.flags ||
148362306a36Sopenharmony_ci	    kattr->test.batch_size)
148462306a36Sopenharmony_ci		return -EINVAL;
148562306a36Sopenharmony_ci
148662306a36Sopenharmony_ci	if (ctx_size_in < prog->aux->max_ctx_offset ||
148762306a36Sopenharmony_ci	    ctx_size_in > U16_MAX)
148862306a36Sopenharmony_ci		return -EINVAL;
148962306a36Sopenharmony_ci
149062306a36Sopenharmony_ci	if (ctx_size_in) {
149162306a36Sopenharmony_ci		ctx = memdup_user(ctx_in, ctx_size_in);
149262306a36Sopenharmony_ci		if (IS_ERR(ctx))
149362306a36Sopenharmony_ci			return PTR_ERR(ctx);
149462306a36Sopenharmony_ci	}
149562306a36Sopenharmony_ci
149662306a36Sopenharmony_ci	rcu_read_lock_trace();
149762306a36Sopenharmony_ci	retval = bpf_prog_run_pin_on_cpu(prog, ctx);
149862306a36Sopenharmony_ci	rcu_read_unlock_trace();
149962306a36Sopenharmony_ci
150062306a36Sopenharmony_ci	if (copy_to_user(&uattr->test.retval, &retval, sizeof(u32))) {
150162306a36Sopenharmony_ci		err = -EFAULT;
150262306a36Sopenharmony_ci		goto out;
150362306a36Sopenharmony_ci	}
150462306a36Sopenharmony_ci	if (ctx_size_in)
150562306a36Sopenharmony_ci		if (copy_to_user(ctx_in, ctx, ctx_size_in))
150662306a36Sopenharmony_ci			err = -EFAULT;
150762306a36Sopenharmony_ciout:
150862306a36Sopenharmony_ci	kfree(ctx);
150962306a36Sopenharmony_ci	return err;
151062306a36Sopenharmony_ci}
151162306a36Sopenharmony_ci
151262306a36Sopenharmony_cistatic int verify_and_copy_hook_state(struct nf_hook_state *state,
151362306a36Sopenharmony_ci				      const struct nf_hook_state *user,
151462306a36Sopenharmony_ci				      struct net_device *dev)
151562306a36Sopenharmony_ci{
151662306a36Sopenharmony_ci	if (user->in || user->out)
151762306a36Sopenharmony_ci		return -EINVAL;
151862306a36Sopenharmony_ci
151962306a36Sopenharmony_ci	if (user->net || user->sk || user->okfn)
152062306a36Sopenharmony_ci		return -EINVAL;
152162306a36Sopenharmony_ci
152262306a36Sopenharmony_ci	switch (user->pf) {
152362306a36Sopenharmony_ci	case NFPROTO_IPV4:
152462306a36Sopenharmony_ci	case NFPROTO_IPV6:
152562306a36Sopenharmony_ci		switch (state->hook) {
152662306a36Sopenharmony_ci		case NF_INET_PRE_ROUTING:
152762306a36Sopenharmony_ci			state->in = dev;
152862306a36Sopenharmony_ci			break;
152962306a36Sopenharmony_ci		case NF_INET_LOCAL_IN:
153062306a36Sopenharmony_ci			state->in = dev;
153162306a36Sopenharmony_ci			break;
153262306a36Sopenharmony_ci		case NF_INET_FORWARD:
153362306a36Sopenharmony_ci			state->in = dev;
153462306a36Sopenharmony_ci			state->out = dev;
153562306a36Sopenharmony_ci			break;
153662306a36Sopenharmony_ci		case NF_INET_LOCAL_OUT:
153762306a36Sopenharmony_ci			state->out = dev;
153862306a36Sopenharmony_ci			break;
153962306a36Sopenharmony_ci		case NF_INET_POST_ROUTING:
154062306a36Sopenharmony_ci			state->out = dev;
154162306a36Sopenharmony_ci			break;
154262306a36Sopenharmony_ci		}
154362306a36Sopenharmony_ci
154462306a36Sopenharmony_ci		break;
154562306a36Sopenharmony_ci	default:
154662306a36Sopenharmony_ci		return -EINVAL;
154762306a36Sopenharmony_ci	}
154862306a36Sopenharmony_ci
154962306a36Sopenharmony_ci	state->pf = user->pf;
155062306a36Sopenharmony_ci	state->hook = user->hook;
155162306a36Sopenharmony_ci
155262306a36Sopenharmony_ci	return 0;
155362306a36Sopenharmony_ci}
155462306a36Sopenharmony_ci
155562306a36Sopenharmony_cistatic __be16 nfproto_eth(int nfproto)
155662306a36Sopenharmony_ci{
155762306a36Sopenharmony_ci	switch (nfproto) {
155862306a36Sopenharmony_ci	case NFPROTO_IPV4:
155962306a36Sopenharmony_ci		return htons(ETH_P_IP);
156062306a36Sopenharmony_ci	case NFPROTO_IPV6:
156162306a36Sopenharmony_ci		break;
156262306a36Sopenharmony_ci	}
156362306a36Sopenharmony_ci
156462306a36Sopenharmony_ci	return htons(ETH_P_IPV6);
156562306a36Sopenharmony_ci}
156662306a36Sopenharmony_ci
156762306a36Sopenharmony_ciint bpf_prog_test_run_nf(struct bpf_prog *prog,
156862306a36Sopenharmony_ci			 const union bpf_attr *kattr,
156962306a36Sopenharmony_ci			 union bpf_attr __user *uattr)
157062306a36Sopenharmony_ci{
157162306a36Sopenharmony_ci	struct net *net = current->nsproxy->net_ns;
157262306a36Sopenharmony_ci	struct net_device *dev = net->loopback_dev;
157362306a36Sopenharmony_ci	struct nf_hook_state *user_ctx, hook_state = {
157462306a36Sopenharmony_ci		.pf = NFPROTO_IPV4,
157562306a36Sopenharmony_ci		.hook = NF_INET_LOCAL_OUT,
157662306a36Sopenharmony_ci	};
157762306a36Sopenharmony_ci	u32 size = kattr->test.data_size_in;
157862306a36Sopenharmony_ci	u32 repeat = kattr->test.repeat;
157962306a36Sopenharmony_ci	struct bpf_nf_ctx ctx = {
158062306a36Sopenharmony_ci		.state = &hook_state,
158162306a36Sopenharmony_ci	};
158262306a36Sopenharmony_ci	struct sk_buff *skb = NULL;
158362306a36Sopenharmony_ci	u32 retval, duration;
158462306a36Sopenharmony_ci	void *data;
158562306a36Sopenharmony_ci	int ret;
158662306a36Sopenharmony_ci
158762306a36Sopenharmony_ci	if (kattr->test.flags || kattr->test.cpu || kattr->test.batch_size)
158862306a36Sopenharmony_ci		return -EINVAL;
158962306a36Sopenharmony_ci
159062306a36Sopenharmony_ci	if (size < sizeof(struct iphdr))
159162306a36Sopenharmony_ci		return -EINVAL;
159262306a36Sopenharmony_ci
159362306a36Sopenharmony_ci	data = bpf_test_init(kattr, kattr->test.data_size_in, size,
159462306a36Sopenharmony_ci			     NET_SKB_PAD + NET_IP_ALIGN,
159562306a36Sopenharmony_ci			     SKB_DATA_ALIGN(sizeof(struct skb_shared_info)));
159662306a36Sopenharmony_ci	if (IS_ERR(data))
159762306a36Sopenharmony_ci		return PTR_ERR(data);
159862306a36Sopenharmony_ci
159962306a36Sopenharmony_ci	if (!repeat)
160062306a36Sopenharmony_ci		repeat = 1;
160162306a36Sopenharmony_ci
160262306a36Sopenharmony_ci	user_ctx = bpf_ctx_init(kattr, sizeof(struct nf_hook_state));
160362306a36Sopenharmony_ci	if (IS_ERR(user_ctx)) {
160462306a36Sopenharmony_ci		kfree(data);
160562306a36Sopenharmony_ci		return PTR_ERR(user_ctx);
160662306a36Sopenharmony_ci	}
160762306a36Sopenharmony_ci
160862306a36Sopenharmony_ci	if (user_ctx) {
160962306a36Sopenharmony_ci		ret = verify_and_copy_hook_state(&hook_state, user_ctx, dev);
161062306a36Sopenharmony_ci		if (ret)
161162306a36Sopenharmony_ci			goto out;
161262306a36Sopenharmony_ci	}
161362306a36Sopenharmony_ci
161462306a36Sopenharmony_ci	skb = slab_build_skb(data);
161562306a36Sopenharmony_ci	if (!skb) {
161662306a36Sopenharmony_ci		ret = -ENOMEM;
161762306a36Sopenharmony_ci		goto out;
161862306a36Sopenharmony_ci	}
161962306a36Sopenharmony_ci
162062306a36Sopenharmony_ci	data = NULL; /* data released via kfree_skb */
162162306a36Sopenharmony_ci
162262306a36Sopenharmony_ci	skb_reserve(skb, NET_SKB_PAD + NET_IP_ALIGN);
162362306a36Sopenharmony_ci	__skb_put(skb, size);
162462306a36Sopenharmony_ci
162562306a36Sopenharmony_ci	ret = -EINVAL;
162662306a36Sopenharmony_ci
162762306a36Sopenharmony_ci	if (hook_state.hook != NF_INET_LOCAL_OUT) {
162862306a36Sopenharmony_ci		if (size < ETH_HLEN + sizeof(struct iphdr))
162962306a36Sopenharmony_ci			goto out;
163062306a36Sopenharmony_ci
163162306a36Sopenharmony_ci		skb->protocol = eth_type_trans(skb, dev);
163262306a36Sopenharmony_ci		switch (skb->protocol) {
163362306a36Sopenharmony_ci		case htons(ETH_P_IP):
163462306a36Sopenharmony_ci			if (hook_state.pf == NFPROTO_IPV4)
163562306a36Sopenharmony_ci				break;
163662306a36Sopenharmony_ci			goto out;
163762306a36Sopenharmony_ci		case htons(ETH_P_IPV6):
163862306a36Sopenharmony_ci			if (size < ETH_HLEN + sizeof(struct ipv6hdr))
163962306a36Sopenharmony_ci				goto out;
164062306a36Sopenharmony_ci			if (hook_state.pf == NFPROTO_IPV6)
164162306a36Sopenharmony_ci				break;
164262306a36Sopenharmony_ci			goto out;
164362306a36Sopenharmony_ci		default:
164462306a36Sopenharmony_ci			ret = -EPROTO;
164562306a36Sopenharmony_ci			goto out;
164662306a36Sopenharmony_ci		}
164762306a36Sopenharmony_ci
164862306a36Sopenharmony_ci		skb_reset_network_header(skb);
164962306a36Sopenharmony_ci	} else {
165062306a36Sopenharmony_ci		skb->protocol = nfproto_eth(hook_state.pf);
165162306a36Sopenharmony_ci	}
165262306a36Sopenharmony_ci
165362306a36Sopenharmony_ci	ctx.skb = skb;
165462306a36Sopenharmony_ci
165562306a36Sopenharmony_ci	ret = bpf_test_run(prog, &ctx, repeat, &retval, &duration, false);
165662306a36Sopenharmony_ci	if (ret)
165762306a36Sopenharmony_ci		goto out;
165862306a36Sopenharmony_ci
165962306a36Sopenharmony_ci	ret = bpf_test_finish(kattr, uattr, NULL, NULL, 0, retval, duration);
166062306a36Sopenharmony_ci
166162306a36Sopenharmony_ciout:
166262306a36Sopenharmony_ci	kfree(user_ctx);
166362306a36Sopenharmony_ci	kfree_skb(skb);
166462306a36Sopenharmony_ci	kfree(data);
166562306a36Sopenharmony_ci	return ret;
166662306a36Sopenharmony_ci}
166762306a36Sopenharmony_ci
166862306a36Sopenharmony_cistatic const struct btf_kfunc_id_set bpf_prog_test_kfunc_set = {
166962306a36Sopenharmony_ci	.owner = THIS_MODULE,
167062306a36Sopenharmony_ci	.set   = &test_sk_check_kfunc_ids,
167162306a36Sopenharmony_ci};
167262306a36Sopenharmony_ci
167362306a36Sopenharmony_ciBTF_ID_LIST(bpf_prog_test_dtor_kfunc_ids)
167462306a36Sopenharmony_ciBTF_ID(struct, prog_test_ref_kfunc)
167562306a36Sopenharmony_ciBTF_ID(func, bpf_kfunc_call_test_release)
167662306a36Sopenharmony_ciBTF_ID(struct, prog_test_member)
167762306a36Sopenharmony_ciBTF_ID(func, bpf_kfunc_call_memb_release)
167862306a36Sopenharmony_ci
167962306a36Sopenharmony_cistatic int __init bpf_prog_test_run_init(void)
168062306a36Sopenharmony_ci{
168162306a36Sopenharmony_ci	const struct btf_id_dtor_kfunc bpf_prog_test_dtor_kfunc[] = {
168262306a36Sopenharmony_ci		{
168362306a36Sopenharmony_ci		  .btf_id       = bpf_prog_test_dtor_kfunc_ids[0],
168462306a36Sopenharmony_ci		  .kfunc_btf_id = bpf_prog_test_dtor_kfunc_ids[1]
168562306a36Sopenharmony_ci		},
168662306a36Sopenharmony_ci		{
168762306a36Sopenharmony_ci		  .btf_id	= bpf_prog_test_dtor_kfunc_ids[2],
168862306a36Sopenharmony_ci		  .kfunc_btf_id = bpf_prog_test_dtor_kfunc_ids[3],
168962306a36Sopenharmony_ci		},
169062306a36Sopenharmony_ci	};
169162306a36Sopenharmony_ci	int ret;
169262306a36Sopenharmony_ci
169362306a36Sopenharmony_ci	ret = register_btf_fmodret_id_set(&bpf_test_modify_return_set);
169462306a36Sopenharmony_ci	ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SCHED_CLS, &bpf_prog_test_kfunc_set);
169562306a36Sopenharmony_ci	ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &bpf_prog_test_kfunc_set);
169662306a36Sopenharmony_ci	ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_prog_test_kfunc_set);
169762306a36Sopenharmony_ci	return ret ?: register_btf_id_dtor_kfuncs(bpf_prog_test_dtor_kfunc,
169862306a36Sopenharmony_ci						  ARRAY_SIZE(bpf_prog_test_dtor_kfunc),
169962306a36Sopenharmony_ci						  THIS_MODULE);
170062306a36Sopenharmony_ci}
170162306a36Sopenharmony_cilate_initcall(bpf_prog_test_run_init);
1702