Commit | Line | Data |
---|---|---|
55108621 EZ |
1 | // SPDX-License-Identifier: GPL-2.0-only |
2 | ||
3 | #include <test_progs.h> | |
4 | ||
5 | #include "cap_helpers.h" | |
9d0f1568 | 6 | #include "verifier_and.skel.h" |
a3c830ae | 7 | #include "verifier_array_access.skel.h" |
0ccbe495 | 8 | #include "verifier_basic_stack.skel.h" |
c9233655 | 9 | #include "verifier_bounds.skel.h" |
7605f94b | 10 | #include "verifier_bounds_deduction.skel.h" |
aec08d67 | 11 | #include "verifier_bounds_deduction_non_const.skel.h" |
b14a702a | 12 | #include "verifier_bounds_mix_sign_unsign.skel.h" |
965a3f91 | 13 | #include "verifier_bpf_get_stack.skel.h" |
79dbabc1 | 14 | #include "verifier_bswap.skel.h" |
37467c79 | 15 | #include "verifier_btf_ctx_access.skel.h" |
2f2047c2 | 16 | #include "verifier_cfg.skel.h" |
047687a7 | 17 | #include "verifier_cgroup_inv_retcode.skel.h" |
b1b63725 | 18 | #include "verifier_cgroup_skb.skel.h" |
8f16f3c0 | 19 | #include "verifier_cgroup_storage.skel.h" |
a2777eaa | 20 | #include "verifier_const_or.skel.h" |
fcd36964 | 21 | #include "verifier_ctx.skel.h" |
a58475a9 | 22 | #include "verifier_ctx_sk_msg.skel.h" |
60802802 | 23 | #include "verifier_d_path.skel.h" |
0a372c9c | 24 | #include "verifier_direct_packet_access.skel.h" |
84988478 | 25 | #include "verifier_direct_stack_access_wraparound.skel.h" |
01a09255 | 26 | #include "verifier_div0.skel.h" |
9553de70 | 27 | #include "verifier_div_overflow.skel.h" |
b37d776b | 28 | #include "verifier_helper_access_var_len.skel.h" |
fb179fe6 | 29 | #include "verifier_helper_packet_access.skel.h" |
77aa2563 | 30 | #include "verifier_helper_restricted.skel.h" |
ecc42482 | 31 | #include "verifier_helper_value_access.skel.h" |
01481e67 | 32 | #include "verifier_int_ptr.skel.h" |
a5828e31 | 33 | #include "verifier_jeq_infer_not_null.skel.h" |
e2978755 | 34 | #include "verifier_ld_ind.skel.h" |
147c8f44 | 35 | #include "verifier_ldsx.skel.h" |
583c7ce5 | 36 | #include "verifier_leak_ptr.skel.h" |
a6fc14dc | 37 | #include "verifier_loops1.skel.h" |
b427ca57 | 38 | #include "verifier_lwt.skel.h" |
4a400ef9 | 39 | #include "verifier_map_in_map.skel.h" |
caf345cf | 40 | #include "verifier_map_ptr.skel.h" |
aee1779f | 41 | #include "verifier_map_ptr_mixing.skel.h" |
05e474ec | 42 | #include "verifier_map_ret_val.skel.h" |
ade3f08f | 43 | #include "verifier_masking.skel.h" |
65428312 | 44 | #include "verifier_meta_access.skel.h" |
f02ec3ff | 45 | #include "verifier_movsx.skel.h" |
006c0e44 FW |
46 | #include "verifier_netfilter_ctx.skel.h" |
47 | #include "verifier_netfilter_retcode.skel.h" | |
35150203 | 48 | #include "verifier_prevent_map_lookup.skel.h" |
5a77a01f | 49 | #include "verifier_raw_stack.skel.h" |
18cdc2b5 | 50 | #include "verifier_raw_tp_writable.skel.h" |
49859de9 | 51 | #include "verifier_reg_equal.skel.h" |
8be63279 | 52 | #include "verifier_ref_tracking.skel.h" |
16a42573 | 53 | #include "verifier_regalloc.skel.h" |
b7e42030 | 54 | #include "verifier_ringbuf.skel.h" |
65222842 | 55 | #include "verifier_runtime_jit.skel.h" |
dec02028 | 56 | #include "verifier_scalar_ids.skel.h" |
de1c2680 | 57 | #include "verifier_sdiv.skel.h" |
034d9ad2 | 58 | #include "verifier_search_pruning.skel.h" |
426fc0e3 | 59 | #include "verifier_sock.skel.h" |
f4fe3cfe | 60 | #include "verifier_spill_fill.skel.h" |
f323a818 | 61 | #include "verifier_spin_lock.skel.h" |
edff37b2 | 62 | #include "verifier_stack_ptr.skel.h" |
3ef3d217 | 63 | #include "verifier_subprog_precision.skel.h" |
81d1d6dd | 64 | #include "verifier_subreg.skel.h" |
2597a25c | 65 | #include "verifier_typedef.skel.h" |
ab839a58 | 66 | #include "verifier_uninit.skel.h" |
82887c25 EZ |
67 | #include "verifier_unpriv.skel.h" |
68 | #include "verifier_unpriv_perf.skel.h" | |
03391494 | 69 | #include "verifier_value_adj_spill.skel.h" |
8f59e87a | 70 | #include "verifier_value.skel.h" |
efe25a33 | 71 | #include "verifier_value_illegal_alu.skel.h" |
d3305286 | 72 | #include "verifier_value_or_null.skel.h" |
4db10a82 | 73 | #include "verifier_value_ptr_arith.skel.h" |
d15f5b68 | 74 | #include "verifier_var_off.skel.h" |
a8036aea | 75 | #include "verifier_xadd.skel.h" |
ffb515c9 | 76 | #include "verifier_xdp.skel.h" |
6e9e141a | 77 | #include "verifier_xdp_direct_packet_access.skel.h" |
55108621 | 78 | |
cbb110bc EZ |
79 | #define MAX_ENTRIES 11 |
80 | ||
81 | struct test_val { | |
82 | unsigned int index; | |
83 | int foo[MAX_ENTRIES]; | |
84 | }; | |
85 | ||
55108621 | 86 | __maybe_unused |
cbb110bc EZ |
87 | static void run_tests_aux(const char *skel_name, |
88 | skel_elf_bytes_fn elf_bytes_factory, | |
89 | pre_execution_cb pre_execution_cb) | |
55108621 EZ |
90 | { |
91 | struct test_loader tester = {}; | |
92 | __u64 old_caps; | |
93 | int err; | |
94 | ||
95 | /* test_verifier tests are executed w/o CAP_SYS_ADMIN, do the same here */ | |
96 | err = cap_disable_effective(1ULL << CAP_SYS_ADMIN, &old_caps); | |
97 | if (err) { | |
98 | PRINT_FAIL("failed to drop CAP_SYS_ADMIN: %i, %s\n", err, strerror(err)); | |
99 | return; | |
100 | } | |
101 | ||
cbb110bc | 102 | test_loader__set_pre_execution_cb(&tester, pre_execution_cb); |
55108621 EZ |
103 | test_loader__run_subtests(&tester, skel_name, elf_bytes_factory); |
104 | test_loader_fini(&tester); | |
105 | ||
106 | err = cap_enable_effective(old_caps, NULL); | |
107 | if (err) | |
108 | PRINT_FAIL("failed to restore CAP_SYS_ADMIN: %i, %s\n", err, strerror(err)); | |
109 | } | |
110 | ||
cbb110bc | 111 | #define RUN(skel) run_tests_aux(#skel, skel##__elf_bytes, NULL) |
9d0f1568 EZ |
112 | |
113 | void test_verifier_and(void) { RUN(verifier_and); } | |
0ccbe495 | 114 | void test_verifier_basic_stack(void) { RUN(verifier_basic_stack); } |
c9233655 | 115 | void test_verifier_bounds(void) { RUN(verifier_bounds); } |
7605f94b | 116 | void test_verifier_bounds_deduction(void) { RUN(verifier_bounds_deduction); } |
aec08d67 | 117 | void test_verifier_bounds_deduction_non_const(void) { RUN(verifier_bounds_deduction_non_const); } |
b14a702a | 118 | void test_verifier_bounds_mix_sign_unsign(void) { RUN(verifier_bounds_mix_sign_unsign); } |
965a3f91 | 119 | void test_verifier_bpf_get_stack(void) { RUN(verifier_bpf_get_stack); } |
79dbabc1 | 120 | void test_verifier_bswap(void) { RUN(verifier_bswap); } |
37467c79 | 121 | void test_verifier_btf_ctx_access(void) { RUN(verifier_btf_ctx_access); } |
2f2047c2 | 122 | void test_verifier_cfg(void) { RUN(verifier_cfg); } |
047687a7 | 123 | void test_verifier_cgroup_inv_retcode(void) { RUN(verifier_cgroup_inv_retcode); } |
b1b63725 | 124 | void test_verifier_cgroup_skb(void) { RUN(verifier_cgroup_skb); } |
8f16f3c0 | 125 | void test_verifier_cgroup_storage(void) { RUN(verifier_cgroup_storage); } |
a2777eaa | 126 | void test_verifier_const_or(void) { RUN(verifier_const_or); } |
fcd36964 | 127 | void test_verifier_ctx(void) { RUN(verifier_ctx); } |
a58475a9 | 128 | void test_verifier_ctx_sk_msg(void) { RUN(verifier_ctx_sk_msg); } |
60802802 | 129 | void test_verifier_d_path(void) { RUN(verifier_d_path); } |
0a372c9c | 130 | void test_verifier_direct_packet_access(void) { RUN(verifier_direct_packet_access); } |
84988478 | 131 | void test_verifier_direct_stack_access_wraparound(void) { RUN(verifier_direct_stack_access_wraparound); } |
01a09255 | 132 | void test_verifier_div0(void) { RUN(verifier_div0); } |
9553de70 | 133 | void test_verifier_div_overflow(void) { RUN(verifier_div_overflow); } |
b37d776b | 134 | void test_verifier_helper_access_var_len(void) { RUN(verifier_helper_access_var_len); } |
fb179fe6 | 135 | void test_verifier_helper_packet_access(void) { RUN(verifier_helper_packet_access); } |
77aa2563 | 136 | void test_verifier_helper_restricted(void) { RUN(verifier_helper_restricted); } |
ecc42482 | 137 | void test_verifier_helper_value_access(void) { RUN(verifier_helper_value_access); } |
01481e67 | 138 | void test_verifier_int_ptr(void) { RUN(verifier_int_ptr); } |
a5828e31 | 139 | void test_verifier_jeq_infer_not_null(void) { RUN(verifier_jeq_infer_not_null); } |
e2978755 | 140 | void test_verifier_ld_ind(void) { RUN(verifier_ld_ind); } |
147c8f44 | 141 | void test_verifier_ldsx(void) { RUN(verifier_ldsx); } |
583c7ce5 | 142 | void test_verifier_leak_ptr(void) { RUN(verifier_leak_ptr); } |
a6fc14dc | 143 | void test_verifier_loops1(void) { RUN(verifier_loops1); } |
b427ca57 | 144 | void test_verifier_lwt(void) { RUN(verifier_lwt); } |
4a400ef9 | 145 | void test_verifier_map_in_map(void) { RUN(verifier_map_in_map); } |
caf345cf | 146 | void test_verifier_map_ptr(void) { RUN(verifier_map_ptr); } |
aee1779f | 147 | void test_verifier_map_ptr_mixing(void) { RUN(verifier_map_ptr_mixing); } |
05e474ec | 148 | void test_verifier_map_ret_val(void) { RUN(verifier_map_ret_val); } |
ade3f08f | 149 | void test_verifier_masking(void) { RUN(verifier_masking); } |
65428312 | 150 | void test_verifier_meta_access(void) { RUN(verifier_meta_access); } |
f02ec3ff | 151 | void test_verifier_movsx(void) { RUN(verifier_movsx); } |
006c0e44 FW |
152 | void test_verifier_netfilter_ctx(void) { RUN(verifier_netfilter_ctx); } |
153 | void test_verifier_netfilter_retcode(void) { RUN(verifier_netfilter_retcode); } | |
35150203 | 154 | void test_verifier_prevent_map_lookup(void) { RUN(verifier_prevent_map_lookup); } |
5a77a01f | 155 | void test_verifier_raw_stack(void) { RUN(verifier_raw_stack); } |
18cdc2b5 | 156 | void test_verifier_raw_tp_writable(void) { RUN(verifier_raw_tp_writable); } |
49859de9 | 157 | void test_verifier_reg_equal(void) { RUN(verifier_reg_equal); } |
8be63279 | 158 | void test_verifier_ref_tracking(void) { RUN(verifier_ref_tracking); } |
16a42573 | 159 | void test_verifier_regalloc(void) { RUN(verifier_regalloc); } |
b7e42030 | 160 | void test_verifier_ringbuf(void) { RUN(verifier_ringbuf); } |
65222842 | 161 | void test_verifier_runtime_jit(void) { RUN(verifier_runtime_jit); } |
dec02028 | 162 | void test_verifier_scalar_ids(void) { RUN(verifier_scalar_ids); } |
de1c2680 | 163 | void test_verifier_sdiv(void) { RUN(verifier_sdiv); } |
034d9ad2 | 164 | void test_verifier_search_pruning(void) { RUN(verifier_search_pruning); } |
426fc0e3 | 165 | void test_verifier_sock(void) { RUN(verifier_sock); } |
f4fe3cfe | 166 | void test_verifier_spill_fill(void) { RUN(verifier_spill_fill); } |
f323a818 | 167 | void test_verifier_spin_lock(void) { RUN(verifier_spin_lock); } |
edff37b2 | 168 | void test_verifier_stack_ptr(void) { RUN(verifier_stack_ptr); } |
3ef3d217 | 169 | void test_verifier_subprog_precision(void) { RUN(verifier_subprog_precision); } |
81d1d6dd | 170 | void test_verifier_subreg(void) { RUN(verifier_subreg); } |
2597a25c | 171 | void test_verifier_typedef(void) { RUN(verifier_typedef); } |
ab839a58 | 172 | void test_verifier_uninit(void) { RUN(verifier_uninit); } |
82887c25 EZ |
173 | void test_verifier_unpriv(void) { RUN(verifier_unpriv); } |
174 | void test_verifier_unpriv_perf(void) { RUN(verifier_unpriv_perf); } | |
03391494 | 175 | void test_verifier_value_adj_spill(void) { RUN(verifier_value_adj_spill); } |
8f59e87a | 176 | void test_verifier_value(void) { RUN(verifier_value); } |
efe25a33 | 177 | void test_verifier_value_illegal_alu(void) { RUN(verifier_value_illegal_alu); } |
d3305286 | 178 | void test_verifier_value_or_null(void) { RUN(verifier_value_or_null); } |
d15f5b68 | 179 | void test_verifier_var_off(void) { RUN(verifier_var_off); } |
a8036aea | 180 | void test_verifier_xadd(void) { RUN(verifier_xadd); } |
ffb515c9 | 181 | void test_verifier_xdp(void) { RUN(verifier_xdp); } |
6e9e141a | 182 | void test_verifier_xdp_direct_packet_access(void) { RUN(verifier_xdp_direct_packet_access); } |
cbb110bc | 183 | |
4db10a82 | 184 | static int init_test_val_map(struct bpf_object *obj, char *map_name) |
cbb110bc | 185 | { |
cbb110bc EZ |
186 | struct test_val value = { |
187 | .index = (6 + 1) * sizeof(int), | |
188 | .foo[6] = 0xabcdef12, | |
189 | }; | |
4db10a82 | 190 | struct bpf_map *map; |
cbb110bc EZ |
191 | int err, key = 0; |
192 | ||
4db10a82 EZ |
193 | map = bpf_object__find_map_by_name(obj, map_name); |
194 | if (!map) { | |
195 | PRINT_FAIL("Can't find map '%s'\n", map_name); | |
cbb110bc | 196 | return -EINVAL; |
4db10a82 | 197 | } |
cbb110bc | 198 | |
4db10a82 EZ |
199 | err = bpf_map_update_elem(bpf_map__fd(map), &key, &value, 0); |
200 | if (err) { | |
201 | PRINT_FAIL("Error while updating map '%s': %d\n", map_name, err); | |
cbb110bc | 202 | return err; |
4db10a82 | 203 | } |
cbb110bc EZ |
204 | |
205 | return 0; | |
206 | } | |
207 | ||
4db10a82 EZ |
208 | static int init_array_access_maps(struct bpf_object *obj) |
209 | { | |
210 | return init_test_val_map(obj, "map_array_ro"); | |
211 | } | |
212 | ||
cbb110bc EZ |
213 | void test_verifier_array_access(void) |
214 | { | |
215 | run_tests_aux("verifier_array_access", | |
216 | verifier_array_access__elf_bytes, | |
217 | init_array_access_maps); | |
218 | } | |
4db10a82 EZ |
219 | |
220 | static int init_value_ptr_arith_maps(struct bpf_object *obj) | |
221 | { | |
222 | return init_test_val_map(obj, "map_array_48b"); | |
223 | } | |
224 | ||
225 | void test_verifier_value_ptr_arith(void) | |
226 | { | |
227 | run_tests_aux("verifier_value_ptr_arith", | |
228 | verifier_value_ptr_arith__elf_bytes, | |
229 | init_value_ptr_arith_maps); | |
230 | } |