test_run.c 29.1 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-only
2 3 4
/* Copyright (c) 2017 Facebook
 */
#include <linux/bpf.h>
5
#include <linux/btf.h>
6
#include <linux/btf_ids.h>
7
#include <linux/slab.h>
8
#include <linux/init.h>
9 10 11
#include <linux/vmalloc.h>
#include <linux/etherdevice.h>
#include <linux/filter.h>
12
#include <linux/rcupdate_trace.h>
13
#include <linux/sched/signal.h>
14
#include <net/bpf_sk_storage.h>
15 16
#include <net/sock.h>
#include <net/tcp.h>
17
#include <net/net_namespace.h>
18
#include <linux/error-injection.h>
19
#include <linux/smp.h>
20
#include <linux/sock_diag.h>
21
#include <net/xdp.h>
22

23 24 25
#define CREATE_TRACE_POINTS
#include <trace/events/bpf_test_run.h>

26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
struct bpf_test_timer {
	enum { NO_PREEMPT, NO_MIGRATE } mode;
	u32 i;
	u64 time_start, time_spent;
};

static void bpf_test_timer_enter(struct bpf_test_timer *t)
	__acquires(rcu)
{
	rcu_read_lock();
	if (t->mode == NO_PREEMPT)
		preempt_disable();
	else
		migrate_disable();

	t->time_start = ktime_get_ns();
}

static void bpf_test_timer_leave(struct bpf_test_timer *t)
	__releases(rcu)
{
	t->time_start = 0;

	if (t->mode == NO_PREEMPT)
		preempt_enable();
	else
		migrate_enable();
	rcu_read_unlock();
}

static bool bpf_test_timer_continue(struct bpf_test_timer *t, u32 repeat, int *err, u32 *duration)
	__must_hold(rcu)
{
	t->i++;
	if (t->i >= repeat) {
		/* We're done. */
		t->time_spent += ktime_get_ns() - t->time_start;
		do_div(t->time_spent, t->i);
		*duration = t->time_spent > U32_MAX ? U32_MAX : (u32)t->time_spent;
		*err = 0;
		goto reset;
	}

	if (signal_pending(current)) {
		/* During iteration: we've been cancelled, abort. */
		*err = -EINTR;
		goto reset;
	}

	if (need_resched()) {
		/* During iteration: we need to reschedule between runs. */
		t->time_spent += ktime_get_ns() - t->time_start;
		bpf_test_timer_leave(t);
		cond_resched();
		bpf_test_timer_enter(t);
	}

	/* Do another round. */
	return true;

reset:
	t->i = 0;
	return false;
}

91
static int bpf_test_run(struct bpf_prog *prog, void *ctx, u32 repeat,
92
			u32 *retval, u32 *time, bool xdp)
93
{
94 95 96
	struct bpf_prog_array_item item = {.prog = prog};
	struct bpf_run_ctx *old_ctx;
	struct bpf_cg_run_ctx run_ctx;
97
	struct bpf_test_timer t = { NO_MIGRATE };
98
	enum bpf_cgroup_storage_type stype;
99
	int ret;
100

101
	for_each_cgroup_storage_type(stype) {
102 103 104
		item.cgroup_storage[stype] = bpf_cgroup_storage_alloc(prog, stype);
		if (IS_ERR(item.cgroup_storage[stype])) {
			item.cgroup_storage[stype] = NULL;
105
			for_each_cgroup_storage_type(stype)
106
				bpf_cgroup_storage_free(item.cgroup_storage[stype]);
107 108 109
			return -ENOMEM;
		}
	}
110

111 112
	if (!repeat)
		repeat = 1;
113

114
	bpf_test_timer_enter(&t);
115
	old_ctx = bpf_set_run_ctx(&run_ctx.run_ctx);
116
	do {
117
		run_ctx.prog_item = &item;
118 119 120
		if (xdp)
			*retval = bpf_prog_run_xdp(prog, ctx);
		else
121
			*retval = bpf_prog_run(prog, ctx);
122
	} while (bpf_test_timer_continue(&t, repeat, &ret, time));
123
	bpf_reset_run_ctx(old_ctx);
124
	bpf_test_timer_leave(&t);
125

126
	for_each_cgroup_storage_type(stype)
127
		bpf_cgroup_storage_free(item.cgroup_storage[stype]);
128

129
	return ret;
130 131
}

132 133
static int bpf_test_finish(const union bpf_attr *kattr,
			   union bpf_attr __user *uattr, const void *data,
134 135
			   struct skb_shared_info *sinfo, u32 size,
			   u32 retval, u32 duration)
136
{
137
	void __user *data_out = u64_to_user_ptr(kattr->test.data_out);
138
	int err = -EFAULT;
139
	u32 copy_size = size;
140

141 142 143 144 145 146 147 148 149
	/* Clamp copy if the user has provided a size hint, but copy the full
	 * buffer if not to retain old behaviour.
	 */
	if (kattr->test.data_size_out &&
	    copy_size > kattr->test.data_size_out) {
		copy_size = kattr->test.data_size_out;
		err = -ENOSPC;
	}

150 151 152
	if (data_out) {
		int len = sinfo ? copy_size - sinfo->xdp_frags_size : copy_size;

153 154 155 156 157
		if (len < 0) {
			err = -ENOSPC;
			goto out;
		}

158 159 160 161
		if (copy_to_user(data_out, data, len))
			goto out;

		if (sinfo) {
162 163
			int i, offset = len;
			u32 data_len;
164 165 166 167 168 169 170 171 172

			for (i = 0; i < sinfo->nr_frags; i++) {
				skb_frag_t *frag = &sinfo->frags[i];

				if (offset >= copy_size) {
					err = -ENOSPC;
					break;
				}

173
				data_len = min_t(u32, copy_size - offset,
174 175 176 177 178 179 180 181 182 183 184 185
						 skb_frag_size(frag));

				if (copy_to_user(data_out + offset,
						 skb_frag_address(frag),
						 data_len))
					goto out;

				offset += data_len;
			}
		}
	}

186 187 188 189 190 191
	if (copy_to_user(&uattr->test.data_size_out, &size, sizeof(size)))
		goto out;
	if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval)))
		goto out;
	if (copy_to_user(&uattr->test.duration, &duration, sizeof(duration)))
		goto out;
192 193
	if (err != -ENOSPC)
		err = 0;
194
out:
195
	trace_bpf_test_finish(&err);
196 197 198
	return err;
}

199 200 201 202
/* Integer types of various sizes and pointer combinations cover variety of
 * architecture dependent calling conventions. 7+ can be supported in the
 * future.
 */
203
__diag_push();
204 205
__diag_ignore_all("-Wmissing-prototypes",
		  "Global functions as their definitions will be in vmlinux BTF");
206 207 208 209
int noinline bpf_fentry_test1(int a)
{
	return a + 1;
}
210 211
EXPORT_SYMBOL_GPL(bpf_fentry_test1);
ALLOW_ERROR_INJECTION(bpf_fentry_test1, ERRNO);
212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237

int noinline bpf_fentry_test2(int a, u64 b)
{
	return a + b;
}

int noinline bpf_fentry_test3(char a, int b, u64 c)
{
	return a + b + c;
}

int noinline bpf_fentry_test4(void *a, char b, int c, u64 d)
{
	return (long)a + b + c + d;
}

int noinline bpf_fentry_test5(u64 a, void *b, short c, int d, u64 e)
{
	return a + (long)b + c + d + e;
}

int noinline bpf_fentry_test6(u64 a, void *b, short c, int d, void *e, u64 f)
{
	return a + (long)b + c + d + (long)e + f;
}

238 239 240 241 242 243 244 245 246 247 248 249 250 251
struct bpf_fentry_test_t {
	struct bpf_fentry_test_t *a;
};

int noinline bpf_fentry_test7(struct bpf_fentry_test_t *arg)
{
	return (long)arg;
}

int noinline bpf_fentry_test8(struct bpf_fentry_test_t *arg)
{
	return (long)arg->a;
}

252 253 254 255 256
int noinline bpf_modify_return_test(int a, int *b)
{
	*b += 1;
	return a + *b;
}
257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272

u64 noinline bpf_kfunc_call_test1(struct sock *sk, u32 a, u64 b, u32 c, u64 d)
{
	return a + b + c + d;
}

int noinline bpf_kfunc_call_test2(struct sock *sk, u32 a, u32 b)
{
	return a + b;
}

struct sock * noinline bpf_kfunc_call_test3(struct sock *sk)
{
	return sk;
}

273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332
struct prog_test_ref_kfunc {
	int a;
	int b;
	struct prog_test_ref_kfunc *next;
};

static struct prog_test_ref_kfunc prog_test_struct = {
	.a = 42,
	.b = 108,
	.next = &prog_test_struct,
};

noinline struct prog_test_ref_kfunc *
bpf_kfunc_call_test_acquire(unsigned long *scalar_ptr)
{
	/* randomly return NULL */
	if (get_jiffies_64() % 2)
		return NULL;
	return &prog_test_struct;
}

noinline void bpf_kfunc_call_test_release(struct prog_test_ref_kfunc *p)
{
}

struct prog_test_pass1 {
	int x0;
	struct {
		int x1;
		struct {
			int x2;
			struct {
				int x3;
			};
		};
	};
};

struct prog_test_pass2 {
	int len;
	short arr1[4];
	struct {
		char arr2[4];
		unsigned long arr3[8];
	} x;
};

struct prog_test_fail1 {
	void *p;
	int x;
};

struct prog_test_fail2 {
	int x8;
	struct prog_test_pass1 x;
};

struct prog_test_fail3 {
	int len;
	char arr1[2];
333
	char arr2[];
334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371
};

noinline void bpf_kfunc_call_test_pass_ctx(struct __sk_buff *skb)
{
}

noinline void bpf_kfunc_call_test_pass1(struct prog_test_pass1 *p)
{
}

noinline void bpf_kfunc_call_test_pass2(struct prog_test_pass2 *p)
{
}

noinline void bpf_kfunc_call_test_fail1(struct prog_test_fail1 *p)
{
}

noinline void bpf_kfunc_call_test_fail2(struct prog_test_fail2 *p)
{
}

noinline void bpf_kfunc_call_test_fail3(struct prog_test_fail3 *p)
{
}

noinline void bpf_kfunc_call_test_mem_len_pass1(void *mem, int mem__sz)
{
}

noinline void bpf_kfunc_call_test_mem_len_fail1(void *mem, int len)
{
}

noinline void bpf_kfunc_call_test_mem_len_fail2(u64 *mem, int len)
{
}

372
__diag_pop();
373 374 375

ALLOW_ERROR_INJECTION(bpf_modify_return_test, ERRNO);

376
BTF_SET_START(test_sk_check_kfunc_ids)
377 378 379
BTF_ID(func, bpf_kfunc_call_test1)
BTF_ID(func, bpf_kfunc_call_test2)
BTF_ID(func, bpf_kfunc_call_test3)
380 381 382 383 384 385 386 387 388 389 390
BTF_ID(func, bpf_kfunc_call_test_acquire)
BTF_ID(func, bpf_kfunc_call_test_release)
BTF_ID(func, bpf_kfunc_call_test_pass_ctx)
BTF_ID(func, bpf_kfunc_call_test_pass1)
BTF_ID(func, bpf_kfunc_call_test_pass2)
BTF_ID(func, bpf_kfunc_call_test_fail1)
BTF_ID(func, bpf_kfunc_call_test_fail2)
BTF_ID(func, bpf_kfunc_call_test_fail3)
BTF_ID(func, bpf_kfunc_call_test_mem_len_pass1)
BTF_ID(func, bpf_kfunc_call_test_mem_len_fail1)
BTF_ID(func, bpf_kfunc_call_test_mem_len_fail2)
391
BTF_SET_END(test_sk_check_kfunc_ids)
392

393 394 395 396 397 398 399 400 401 402 403 404
BTF_SET_START(test_sk_acquire_kfunc_ids)
BTF_ID(func, bpf_kfunc_call_test_acquire)
BTF_SET_END(test_sk_acquire_kfunc_ids)

BTF_SET_START(test_sk_release_kfunc_ids)
BTF_ID(func, bpf_kfunc_call_test_release)
BTF_SET_END(test_sk_release_kfunc_ids)

BTF_SET_START(test_sk_ret_null_kfunc_ids)
BTF_ID(func, bpf_kfunc_call_test_acquire)
BTF_SET_END(test_sk_ret_null_kfunc_ids)

405 406
static void *bpf_test_init(const union bpf_attr *kattr, u32 user_size,
			   u32 size, u32 headroom, u32 tailroom)
407 408 409 410 411 412 413
{
	void __user *data_in = u64_to_user_ptr(kattr->test.data_in);
	void *data;

	if (size < ETH_HLEN || size > PAGE_SIZE - headroom - tailroom)
		return ERR_PTR(-EINVAL);

414 415 416
	if (user_size > size)
		return ERR_PTR(-EMSGSIZE);

417 418 419 420
	data = kzalloc(size + headroom + tailroom, GFP_USER);
	if (!data)
		return ERR_PTR(-ENOMEM);

421
	if (copy_from_user(data + headroom, data_in, user_size)) {
422 423 424
		kfree(data);
		return ERR_PTR(-EFAULT);
	}
425

426 427 428
	return data;
}

429 430 431 432
int bpf_prog_test_run_tracing(struct bpf_prog *prog,
			      const union bpf_attr *kattr,
			      union bpf_attr __user *uattr)
{
433
	struct bpf_fentry_test_t arg = {};
434 435 436
	u16 side_effect = 0, ret = 0;
	int b = 2, err = -EFAULT;
	u32 retval = 0;
437

438 439 440
	if (kattr->test.flags || kattr->test.cpu)
		return -EINVAL;

441 442 443 444 445 446 447 448
	switch (prog->expected_attach_type) {
	case BPF_TRACE_FENTRY:
	case BPF_TRACE_FEXIT:
		if (bpf_fentry_test1(1) != 2 ||
		    bpf_fentry_test2(2, 3) != 5 ||
		    bpf_fentry_test3(4, 5, 6) != 15 ||
		    bpf_fentry_test4((void *)7, 8, 9, 10) != 34 ||
		    bpf_fentry_test5(11, (void *)12, 13, 14, 15) != 65 ||
449 450 451
		    bpf_fentry_test6(16, (void *)17, 18, 19, (void *)20, 21) != 111 ||
		    bpf_fentry_test7((struct bpf_fentry_test_t *)0) != 0 ||
		    bpf_fentry_test8(&arg) != 0)
452 453
			goto out;
		break;
454 455 456 457 458
	case BPF_MODIFY_RETURN:
		ret = bpf_modify_return_test(1, &b);
		if (b != 2)
			side_effect = 1;
		break;
459 460 461 462
	default:
		goto out;
	}

463 464 465 466
	retval = ((u32)side_effect << 16) | ret;
	if (copy_to_user(&uattr->test.retval, &retval, sizeof(retval)))
		goto out;

467 468 469 470 471 472
	err = 0;
out:
	trace_bpf_test_finish(&err);
	return err;
}

473 474 475 476 477 478 479 480 481 482 483 484
struct bpf_raw_tp_test_run_info {
	struct bpf_prog *prog;
	void *ctx;
	u32 retval;
};

static void
__bpf_prog_test_run_raw_tp(void *data)
{
	struct bpf_raw_tp_test_run_info *info = data;

	rcu_read_lock();
485
	info->retval = bpf_prog_run(info->prog, info->ctx);
486 487 488 489 490 491 492 493 494 495 496
	rcu_read_unlock();
}

int bpf_prog_test_run_raw_tp(struct bpf_prog *prog,
			     const union bpf_attr *kattr,
			     union bpf_attr __user *uattr)
{
	void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in);
	__u32 ctx_size_in = kattr->test.ctx_size_in;
	struct bpf_raw_tp_test_run_info info;
	int cpu = kattr->test.cpu, err = 0;
497
	int current_cpu;
498 499 500 501 502 503 504

	/* doesn't support data_in/out, ctx_out, duration, or repeat */
	if (kattr->test.data_in || kattr->test.data_out ||
	    kattr->test.ctx_out || kattr->test.duration ||
	    kattr->test.repeat)
		return -EINVAL;

505 506
	if (ctx_size_in < prog->aux->max_ctx_offset ||
	    ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64))
507 508 509 510 511 512
		return -EINVAL;

	if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 && cpu != 0)
		return -EINVAL;

	if (ctx_size_in) {
Q
Qing Wang 已提交
513 514 515
		info.ctx = memdup_user(ctx_in, ctx_size_in);
		if (IS_ERR(info.ctx))
			return PTR_ERR(info.ctx);
516 517 518 519 520 521
	} else {
		info.ctx = NULL;
	}

	info.prog = prog;

522
	current_cpu = get_cpu();
523
	if ((kattr->test.flags & BPF_F_TEST_RUN_ON_CPU) == 0 ||
524
	    cpu == current_cpu) {
525
		__bpf_prog_test_run_raw_tp(&info);
526
	} else if (cpu >= nr_cpu_ids || !cpu_online(cpu)) {
527 528 529 530 531
		/* smp_call_function_single() also checks cpu_online()
		 * after csd_lock(). However, since cpu is from user
		 * space, let's do an extra quick check to filter out
		 * invalid value before smp_call_function_single().
		 */
532 533
		err = -ENXIO;
	} else {
534 535 536
		err = smp_call_function_single(cpu, __bpf_prog_test_run_raw_tp,
					       &info, 1);
	}
537
	put_cpu();
538

539 540
	if (!err &&
	    copy_to_user(&uattr->test.retval, &info.retval, sizeof(u32)))
541 542 543 544 545 546
		err = -EFAULT;

	kfree(info.ctx);
	return err;
}

547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562
static void *bpf_ctx_init(const union bpf_attr *kattr, u32 max_size)
{
	void __user *data_in = u64_to_user_ptr(kattr->test.ctx_in);
	void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out);
	u32 size = kattr->test.ctx_size_in;
	void *data;
	int err;

	if (!data_in && !data_out)
		return NULL;

	data = kzalloc(max_size, GFP_USER);
	if (!data)
		return ERR_PTR(-ENOMEM);

	if (data_in) {
563
		err = bpf_check_uarg_tail_zero(USER_BPFPTR(data_in), max_size, size);
564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625
		if (err) {
			kfree(data);
			return ERR_PTR(err);
		}

		size = min_t(u32, max_size, size);
		if (copy_from_user(data, data_in, size)) {
			kfree(data);
			return ERR_PTR(-EFAULT);
		}
	}
	return data;
}

static int bpf_ctx_finish(const union bpf_attr *kattr,
			  union bpf_attr __user *uattr, const void *data,
			  u32 size)
{
	void __user *data_out = u64_to_user_ptr(kattr->test.ctx_out);
	int err = -EFAULT;
	u32 copy_size = size;

	if (!data || !data_out)
		return 0;

	if (copy_size > kattr->test.ctx_size_out) {
		copy_size = kattr->test.ctx_size_out;
		err = -ENOSPC;
	}

	if (copy_to_user(data_out, data, copy_size))
		goto out;
	if (copy_to_user(&uattr->test.ctx_size_out, &size, sizeof(size)))
		goto out;
	if (err != -ENOSPC)
		err = 0;
out:
	return err;
}

/**
 * range_is_zero - test whether buffer is initialized
 * @buf: buffer to check
 * @from: check from this position
 * @to: check up until (excluding) this position
 *
 * This function returns true if the there is a non-zero byte
 * in the buf in the range [from,to).
 */
static inline bool range_is_zero(void *buf, size_t from, size_t to)
{
	return !memchr_inv((u8 *)buf + from, 0, to - from);
}

static int convert___skb_to_skb(struct sk_buff *skb, struct __sk_buff *__skb)
{
	struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb;

	if (!__skb)
		return 0;

	/* make sure the fields we don't use are zeroed */
626 627 628 629 630 631 632
	if (!range_is_zero(__skb, 0, offsetof(struct __sk_buff, mark)))
		return -EINVAL;

	/* mark is allowed */

	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, mark),
			   offsetof(struct __sk_buff, priority)))
633 634 635
		return -EINVAL;

	/* priority is allowed */
636
	/* ingress_ifindex is allowed */
637 638 639
	/* ifindex is allowed */

	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, ifindex),
640 641 642 643 644
			   offsetof(struct __sk_buff, cb)))
		return -EINVAL;

	/* cb is allowed */

645
	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, cb),
646 647 648 649
			   offsetof(struct __sk_buff, tstamp)))
		return -EINVAL;

	/* tstamp is allowed */
650 651
	/* wire_len is allowed */
	/* gso_segs is allowed */
652

653
	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_segs),
654 655 656 657 658 659
			   offsetof(struct __sk_buff, gso_size)))
		return -EINVAL;

	/* gso_size is allowed */

	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, gso_size),
660 661 662 663 664 665
			   offsetof(struct __sk_buff, hwtstamp)))
		return -EINVAL;

	/* hwtstamp is allowed */

	if (!range_is_zero(__skb, offsetofend(struct __sk_buff, hwtstamp),
666 667 668
			   sizeof(struct __sk_buff)))
		return -EINVAL;

669
	skb->mark = __skb->mark;
670
	skb->priority = __skb->priority;
671
	skb->skb_iif = __skb->ingress_ifindex;
672
	skb->tstamp = __skb->tstamp;
673 674
	memcpy(&cb->data, __skb->cb, QDISC_CB_PRIV_LEN);

675 676 677 678 679 680 681 682 683 684 685 686
	if (__skb->wire_len == 0) {
		cb->pkt_len = skb->len;
	} else {
		if (__skb->wire_len < skb->len ||
		    __skb->wire_len > GSO_MAX_SIZE)
			return -EINVAL;
		cb->pkt_len = __skb->wire_len;
	}

	if (__skb->gso_segs > GSO_MAX_SEGS)
		return -EINVAL;
	skb_shinfo(skb)->gso_segs = __skb->gso_segs;
687
	skb_shinfo(skb)->gso_size = __skb->gso_size;
688
	skb_shinfo(skb)->hwtstamps.hwtstamp = __skb->hwtstamp;
689

690 691 692 693 694 695 696 697 698 699
	return 0;
}

static void convert_skb_to___skb(struct sk_buff *skb, struct __sk_buff *__skb)
{
	struct qdisc_skb_cb *cb = (struct qdisc_skb_cb *)skb->cb;

	if (!__skb)
		return;

700
	__skb->mark = skb->mark;
701
	__skb->priority = skb->priority;
702
	__skb->ingress_ifindex = skb->skb_iif;
703
	__skb->ifindex = skb->dev->ifindex;
704
	__skb->tstamp = skb->tstamp;
705
	memcpy(__skb->cb, &cb->data, QDISC_CB_PRIV_LEN);
706 707
	__skb->wire_len = cb->pkt_len;
	__skb->gso_segs = skb_shinfo(skb)->gso_segs;
708
	__skb->hwtstamp = skb_shinfo(skb)->hwtstamps.hwtstamp;
709 710
}

711 712 713 714 715 716
static struct proto bpf_dummy_proto = {
	.name   = "bpf_dummy",
	.owner  = THIS_MODULE,
	.obj_size = sizeof(struct sock),
};

717 718 719 720
int bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr,
			  union bpf_attr __user *uattr)
{
	bool is_l2 = false, is_direct_pkt_access = false;
721 722
	struct net *net = current->nsproxy->net_ns;
	struct net_device *dev = net->loopback_dev;
723 724
	u32 size = kattr->test.data_size_in;
	u32 repeat = kattr->test.repeat;
725
	struct __sk_buff *ctx = NULL;
726
	u32 retval, duration;
727
	int hh_len = ETH_HLEN;
728
	struct sk_buff *skb;
729
	struct sock *sk;
730 731 732
	void *data;
	int ret;

733 734 735
	if (kattr->test.flags || kattr->test.cpu)
		return -EINVAL;

736 737
	data = bpf_test_init(kattr, kattr->test.data_size_in,
			     size, NET_SKB_PAD + NET_IP_ALIGN,
738 739 740 741
			     SKB_DATA_ALIGN(sizeof(struct skb_shared_info)));
	if (IS_ERR(data))
		return PTR_ERR(data);

742 743 744 745 746 747
	ctx = bpf_ctx_init(kattr, sizeof(struct __sk_buff));
	if (IS_ERR(ctx)) {
		kfree(data);
		return PTR_ERR(ctx);
	}

748 749 750 751
	switch (prog->type) {
	case BPF_PROG_TYPE_SCHED_CLS:
	case BPF_PROG_TYPE_SCHED_ACT:
		is_l2 = true;
752
		fallthrough;
753 754 755 756 757 758 759 760 761
	case BPF_PROG_TYPE_LWT_IN:
	case BPF_PROG_TYPE_LWT_OUT:
	case BPF_PROG_TYPE_LWT_XMIT:
		is_direct_pkt_access = true;
		break;
	default:
		break;
	}

762
	sk = sk_alloc(net, AF_UNSPEC, GFP_USER, &bpf_dummy_proto, 1);
763 764
	if (!sk) {
		kfree(data);
765
		kfree(ctx);
766 767 768 769
		return -ENOMEM;
	}
	sock_init_data(NULL, sk);

770 771 772
	skb = build_skb(data, 0);
	if (!skb) {
		kfree(data);
773
		kfree(ctx);
774
		sk_free(sk);
775 776
		return -ENOMEM;
	}
777
	skb->sk = sk;
778

779
	skb_reserve(skb, NET_SKB_PAD + NET_IP_ALIGN);
780
	__skb_put(skb, size);
781 782 783 784 785 786 787 788
	if (ctx && ctx->ifindex > 1) {
		dev = dev_get_by_index(net, ctx->ifindex);
		if (!dev) {
			ret = -ENODEV;
			goto out;
		}
	}
	skb->protocol = eth_type_trans(skb, dev);
789 790
	skb_reset_network_header(skb);

791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811
	switch (skb->protocol) {
	case htons(ETH_P_IP):
		sk->sk_family = AF_INET;
		if (sizeof(struct iphdr) <= skb_headlen(skb)) {
			sk->sk_rcv_saddr = ip_hdr(skb)->saddr;
			sk->sk_daddr = ip_hdr(skb)->daddr;
		}
		break;
#if IS_ENABLED(CONFIG_IPV6)
	case htons(ETH_P_IPV6):
		sk->sk_family = AF_INET6;
		if (sizeof(struct ipv6hdr) <= skb_headlen(skb)) {
			sk->sk_v6_rcv_saddr = ipv6_hdr(skb)->saddr;
			sk->sk_v6_daddr = ipv6_hdr(skb)->daddr;
		}
		break;
#endif
	default:
		break;
	}

812
	if (is_l2)
813
		__skb_push(skb, hh_len);
814
	if (is_direct_pkt_access)
815
		bpf_compute_data_pointers(skb);
816 817 818
	ret = convert___skb_to_skb(skb, ctx);
	if (ret)
		goto out;
819
	ret = bpf_test_run(prog, skb, repeat, &retval, &duration, false);
820 821
	if (ret)
		goto out;
822 823 824 825 826
	if (!is_l2) {
		if (skb_headroom(skb) < hh_len) {
			int nhead = HH_DATA_ALIGN(hh_len - skb_headroom(skb));

			if (pskb_expand_head(skb, nhead, 0, GFP_USER)) {
827 828
				ret = -ENOMEM;
				goto out;
829 830 831 832
			}
		}
		memset(__skb_push(skb, hh_len), 0, hh_len);
	}
833
	convert_skb_to___skb(skb, ctx);
834

835 836 837 838
	size = skb->len;
	/* bpf program can never convert linear skb to non-linear */
	if (WARN_ON_ONCE(skb_is_nonlinear(skb)))
		size = skb_headlen(skb);
839 840
	ret = bpf_test_finish(kattr, uattr, skb->data, NULL, size, retval,
			      duration);
841 842 843 844
	if (!ret)
		ret = bpf_ctx_finish(kattr, uattr, ctx,
				     sizeof(struct __sk_buff));
out:
845 846
	if (dev && dev != net->loopback_dev)
		dev_put(dev);
847
	kfree_skb(skb);
848
	sk_free(sk);
849
	kfree(ctx);
850 851 852
	return ret;
}

853 854
static int xdp_convert_md_to_buff(struct xdp_md *xdp_md, struct xdp_buff *xdp)
{
855 856 857 858
	unsigned int ingress_ifindex, rx_queue_index;
	struct netdev_rx_queue *rxqueue;
	struct net_device *device;

859 860 861 862 863 864
	if (!xdp_md)
		return 0;

	if (xdp_md->egress_ifindex != 0)
		return -EINVAL;

865 866 867 868
	ingress_ifindex = xdp_md->ingress_ifindex;
	rx_queue_index = xdp_md->rx_queue_index;

	if (!ingress_ifindex && rx_queue_index)
869 870
		return -EINVAL;

871 872 873 874 875 876 877 878 879 880
	if (ingress_ifindex) {
		device = dev_get_by_index(current->nsproxy->net_ns,
					  ingress_ifindex);
		if (!device)
			return -ENODEV;

		if (rx_queue_index >= device->real_num_rx_queues)
			goto free_dev;

		rxqueue = __netif_get_rx_queue(device, rx_queue_index);
881

882 883 884 885 886 887 888 889 890 891
		if (!xdp_rxq_info_is_reg(&rxqueue->xdp_rxq))
			goto free_dev;

		xdp->rxq = &rxqueue->xdp_rxq;
		/* The device is now tracked in the xdp->rxq for later
		 * dev_put()
		 */
	}

	xdp->data = xdp->data_meta + xdp_md->data;
892
	return 0;
893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908

free_dev:
	dev_put(device);
	return -EINVAL;
}

static void xdp_convert_buff_to_md(struct xdp_buff *xdp, struct xdp_md *xdp_md)
{
	if (!xdp_md)
		return;

	xdp_md->data = xdp->data - xdp->data_meta;
	xdp_md->data_end = xdp->data_end - xdp->data_meta;

	if (xdp_md->ingress_ifindex)
		dev_put(xdp->rxq->dev);
909 910
}

911 912 913
int bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr,
			  union bpf_attr __user *uattr)
{
914
	u32 tailroom = SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
915
	u32 size = kattr->test.data_size_in;
916 917
	u32 headroom = XDP_PACKET_HEADROOM;
	u32 retval, duration, max_data_sz;
918
	u32 repeat = kattr->test.repeat;
919
	struct netdev_rx_queue *rxqueue;
920
	struct skb_shared_info *sinfo;
921
	struct xdp_buff xdp = {};
922
	int i, ret = -EINVAL;
923
	struct xdp_md *ctx;
924 925
	void *data;

926 927 928
	if (prog->expected_attach_type == BPF_XDP_DEVMAP ||
	    prog->expected_attach_type == BPF_XDP_CPUMAP)
		return -EINVAL;
929

930 931 932 933 934 935 936 937 938 939 940 941 942
	ctx = bpf_ctx_init(kattr, sizeof(struct xdp_md));
	if (IS_ERR(ctx))
		return PTR_ERR(ctx);

	if (ctx) {
		/* There can't be user provided data before the meta data */
		if (ctx->data_meta || ctx->data_end != size ||
		    ctx->data > ctx->data_end ||
		    unlikely(xdp_metalen_invalid(ctx->data)))
			goto free_ctx;
		/* Meta data is allocated from the headroom */
		headroom -= ctx->data;
	}
943

944
	max_data_sz = 4096 - headroom - tailroom;
945
	size = min_t(u32, size, max_data_sz);
946

947
	data = bpf_test_init(kattr, size, max_data_sz, headroom, tailroom);
948 949 950 951
	if (IS_ERR(data)) {
		ret = PTR_ERR(data);
		goto free_ctx;
	}
952

953
	rxqueue = __netif_get_rx_queue(current->nsproxy->net_ns->loopback_dev, 0);
954 955
	rxqueue->xdp_rxq.frag_size = headroom + max_data_sz + tailroom;
	xdp_init_buff(&xdp, rxqueue->xdp_rxq.frag_size, &rxqueue->xdp_rxq);
956
	xdp_prepare_buff(&xdp, data, headroom, size, true);
957
	sinfo = xdp_get_shared_info_from_buff(&xdp);
958

959 960 961 962
	ret = xdp_convert_md_to_buff(ctx, &xdp);
	if (ret)
		goto free_data;

963 964 965 966 967 968
	if (unlikely(kattr->test.data_size_in > size)) {
		void __user *data_in = u64_to_user_ptr(kattr->test.data_in);

		while (size < kattr->test.data_size_in) {
			struct page *page;
			skb_frag_t *frag;
969
			u32 data_len;
970

971 972 973 974 975
			if (sinfo->nr_frags == MAX_SKB_FRAGS) {
				ret = -ENOMEM;
				goto out;
			}

976 977 978 979 980 981 982 983 984
			page = alloc_page(GFP_KERNEL);
			if (!page) {
				ret = -ENOMEM;
				goto out;
			}

			frag = &sinfo->frags[sinfo->nr_frags++];
			__skb_frag_set_page(frag, page);

985
			data_len = min_t(u32, kattr->test.data_size_in - size,
986 987 988 989 990 991 992 993 994 995 996 997 998 999
					 PAGE_SIZE);
			skb_frag_size_set(frag, data_len);

			if (copy_from_user(page_address(page), data_in + size,
					   data_len)) {
				ret = -EFAULT;
				goto out;
			}
			sinfo->xdp_frags_size += data_len;
			size += data_len;
		}
		xdp_buff_set_frags_flag(&xdp);
	}

1000 1001
	if (repeat > 1)
		bpf_prog_change_xdp(NULL, prog);
1002

1003
	ret = bpf_test_run(prog, &xdp, repeat, &retval, &duration, true);
1004 1005 1006 1007 1008
	/* We convert the xdp_buff back to an xdp_md before checking the return
	 * code so the reference count of any held netdevice will be decremented
	 * even if the test run failed.
	 */
	xdp_convert_buff_to_md(&xdp, ctx);
1009 1010
	if (ret)
		goto out;
1011

1012
	size = xdp.data_end - xdp.data_meta + sinfo->xdp_frags_size;
1013 1014
	ret = bpf_test_finish(kattr, uattr, xdp.data_meta, sinfo, size,
			      retval, duration);
1015 1016 1017 1018
	if (!ret)
		ret = bpf_ctx_finish(kattr, uattr, ctx,
				     sizeof(struct xdp_md));

1019
out:
1020 1021
	if (repeat > 1)
		bpf_prog_change_xdp(prog, NULL);
1022
free_data:
1023 1024
	for (i = 0; i < sinfo->nr_frags; i++)
		__free_page(skb_frag_page(&sinfo->frags[i]));
1025
	kfree(data);
1026 1027
free_ctx:
	kfree(ctx);
1028 1029
	return ret;
}
1030

1031 1032 1033 1034 1035 1036 1037 1038
static int verify_user_bpf_flow_keys(struct bpf_flow_keys *ctx)
{
	/* make sure the fields we don't use are zeroed */
	if (!range_is_zero(ctx, 0, offsetof(struct bpf_flow_keys, flags)))
		return -EINVAL;

	/* flags is allowed */

1039
	if (!range_is_zero(ctx, offsetofend(struct bpf_flow_keys, flags),
1040 1041 1042 1043 1044 1045
			   sizeof(struct bpf_flow_keys)))
		return -EINVAL;

	return 0;
}

1046 1047 1048 1049
int bpf_prog_test_run_flow_dissector(struct bpf_prog *prog,
				     const union bpf_attr *kattr,
				     union bpf_attr __user *uattr)
{
1050
	struct bpf_test_timer t = { NO_PREEMPT };
1051
	u32 size = kattr->test.data_size_in;
1052
	struct bpf_flow_dissector ctx = {};
1053
	u32 repeat = kattr->test.repeat;
1054
	struct bpf_flow_keys *user_ctx;
1055
	struct bpf_flow_keys flow_keys;
1056
	const struct ethhdr *eth;
1057
	unsigned int flags = 0;
1058 1059 1060 1061 1062 1063 1064
	u32 retval, duration;
	void *data;
	int ret;

	if (prog->type != BPF_PROG_TYPE_FLOW_DISSECTOR)
		return -EINVAL;

1065 1066 1067
	if (kattr->test.flags || kattr->test.cpu)
		return -EINVAL;

1068 1069 1070
	if (size < ETH_HLEN)
		return -EINVAL;

1071
	data = bpf_test_init(kattr, kattr->test.data_size_in, size, 0, 0);
1072 1073 1074
	if (IS_ERR(data))
		return PTR_ERR(data);

1075
	eth = (struct ethhdr *)data;
1076 1077 1078 1079

	if (!repeat)
		repeat = 1;

1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091
	user_ctx = bpf_ctx_init(kattr, sizeof(struct bpf_flow_keys));
	if (IS_ERR(user_ctx)) {
		kfree(data);
		return PTR_ERR(user_ctx);
	}
	if (user_ctx) {
		ret = verify_user_bpf_flow_keys(user_ctx);
		if (ret)
			goto out;
		flags = user_ctx->flags;
	}

1092 1093 1094 1095
	ctx.flow_keys = &flow_keys;
	ctx.data = data;
	ctx.data_end = (__u8 *)data + size;

1096 1097
	bpf_test_timer_enter(&t);
	do {
1098
		retval = bpf_flow_dissect(prog, &ctx, eth->h_proto, ETH_HLEN,
1099
					  size, flags);
1100 1101
	} while (bpf_test_timer_continue(&t, repeat, &ret, &duration));
	bpf_test_timer_leave(&t);
1102

1103 1104
	if (ret < 0)
		goto out;
1105

1106 1107
	ret = bpf_test_finish(kattr, uattr, &flow_keys, NULL,
			      sizeof(flow_keys), retval, duration);
1108 1109 1110
	if (!ret)
		ret = bpf_ctx_finish(kattr, uattr, user_ctx,
				     sizeof(struct bpf_flow_keys));
1111

1112
out:
1113
	kfree(user_ctx);
1114
	kfree(data);
1115 1116
	return ret;
}
1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154

int bpf_prog_test_run_sk_lookup(struct bpf_prog *prog, const union bpf_attr *kattr,
				union bpf_attr __user *uattr)
{
	struct bpf_test_timer t = { NO_PREEMPT };
	struct bpf_prog_array *progs = NULL;
	struct bpf_sk_lookup_kern ctx = {};
	u32 repeat = kattr->test.repeat;
	struct bpf_sk_lookup *user_ctx;
	u32 retval, duration;
	int ret = -EINVAL;

	if (prog->type != BPF_PROG_TYPE_SK_LOOKUP)
		return -EINVAL;

	if (kattr->test.flags || kattr->test.cpu)
		return -EINVAL;

	if (kattr->test.data_in || kattr->test.data_size_in || kattr->test.data_out ||
	    kattr->test.data_size_out)
		return -EINVAL;

	if (!repeat)
		repeat = 1;

	user_ctx = bpf_ctx_init(kattr, sizeof(*user_ctx));
	if (IS_ERR(user_ctx))
		return PTR_ERR(user_ctx);

	if (!user_ctx)
		return -EINVAL;

	if (user_ctx->sk)
		goto out;

	if (!range_is_zero(user_ctx, offsetofend(typeof(*user_ctx), local_port), sizeof(*user_ctx)))
		goto out;

1155
	if (user_ctx->local_port > U16_MAX) {
1156 1157 1158 1159 1160 1161 1162
		ret = -ERANGE;
		goto out;
	}

	ctx.family = (u16)user_ctx->family;
	ctx.protocol = (u16)user_ctx->protocol;
	ctx.dport = (u16)user_ctx->local_port;
1163
	ctx.sport = user_ctx->remote_port;
1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193

	switch (ctx.family) {
	case AF_INET:
		ctx.v4.daddr = (__force __be32)user_ctx->local_ip4;
		ctx.v4.saddr = (__force __be32)user_ctx->remote_ip4;
		break;

#if IS_ENABLED(CONFIG_IPV6)
	case AF_INET6:
		ctx.v6.daddr = (struct in6_addr *)user_ctx->local_ip6;
		ctx.v6.saddr = (struct in6_addr *)user_ctx->remote_ip6;
		break;
#endif

	default:
		ret = -EAFNOSUPPORT;
		goto out;
	}

	progs = bpf_prog_array_alloc(1, GFP_KERNEL);
	if (!progs) {
		ret = -ENOMEM;
		goto out;
	}

	progs->items[0].prog = prog;

	bpf_test_timer_enter(&t);
	do {
		ctx.selected_sk = NULL;
1194
		retval = BPF_PROG_SK_LOOKUP_RUN_ARRAY(progs, ctx, bpf_prog_run);
1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210
	} while (bpf_test_timer_continue(&t, repeat, &ret, &duration));
	bpf_test_timer_leave(&t);

	if (ret < 0)
		goto out;

	user_ctx->cookie = 0;
	if (ctx.selected_sk) {
		if (ctx.selected_sk->sk_reuseport && !ctx.no_reuseport) {
			ret = -EOPNOTSUPP;
			goto out;
		}

		user_ctx->cookie = sock_gen_cookie(ctx.selected_sk);
	}

1211
	ret = bpf_test_finish(kattr, uattr, NULL, NULL, 0, retval, duration);
1212 1213 1214 1215 1216 1217 1218 1219
	if (!ret)
		ret = bpf_ctx_finish(kattr, uattr, user_ctx, sizeof(*user_ctx));

out:
	bpf_prog_array_free(progs);
	kfree(user_ctx);
	return ret;
}
1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241

int bpf_prog_test_run_syscall(struct bpf_prog *prog,
			      const union bpf_attr *kattr,
			      union bpf_attr __user *uattr)
{
	void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in);
	__u32 ctx_size_in = kattr->test.ctx_size_in;
	void *ctx = NULL;
	u32 retval;
	int err = 0;

	/* doesn't support data_in/out, ctx_out, duration, or repeat or flags */
	if (kattr->test.data_in || kattr->test.data_out ||
	    kattr->test.ctx_out || kattr->test.duration ||
	    kattr->test.repeat || kattr->test.flags)
		return -EINVAL;

	if (ctx_size_in < prog->aux->max_ctx_offset ||
	    ctx_size_in > U16_MAX)
		return -EINVAL;

	if (ctx_size_in) {
Q
Qing Wang 已提交
1242 1243 1244
		ctx = memdup_user(ctx_in, ctx_size_in);
		if (IS_ERR(ctx))
			return PTR_ERR(ctx);
1245
	}
1246 1247

	rcu_read_lock_trace();
1248
	retval = bpf_prog_run_pin_on_cpu(prog, ctx);
1249
	rcu_read_unlock_trace();
1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261

	if (copy_to_user(&uattr->test.retval, &retval, sizeof(u32))) {
		err = -EFAULT;
		goto out;
	}
	if (ctx_size_in)
		if (copy_to_user(ctx_in, ctx, ctx_size_in))
			err = -EFAULT;
out:
	kfree(ctx);
	return err;
}
1262 1263

static const struct btf_kfunc_id_set bpf_prog_test_kfunc_set = {
1264 1265 1266 1267 1268
	.owner        = THIS_MODULE,
	.check_set    = &test_sk_check_kfunc_ids,
	.acquire_set  = &test_sk_acquire_kfunc_ids,
	.release_set  = &test_sk_release_kfunc_ids,
	.ret_null_set = &test_sk_ret_null_kfunc_ids,
1269 1270 1271 1272 1273 1274 1275
};

static int __init bpf_prog_test_run_init(void)
{
	return register_btf_kfunc_id_set(BPF_PROG_TYPE_SCHED_CLS, &bpf_prog_test_kfunc_set);
}
late_initcall(bpf_prog_test_run_init);