Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
Pull networking updates from David Miller: "Reasonably busy this cycle, but perhaps not as busy as in the 4.12 merge window: 1) Several optimizations for UDP processing under high load from Paolo Abeni. 2) Support pacing internally in TCP when using the sch_fq packet scheduler for this is not practical. From Eric Dumazet. 3) Support mutliple filter chains per qdisc, from Jiri Pirko. 4) Move to 1ms TCP timestamp clock, from Eric Dumazet. 5) Add batch dequeueing to vhost_net, from Jason Wang. 6) Flesh out more completely SCTP checksum offload support, from Davide Caratti. 7) More plumbing of extended netlink ACKs, from David Ahern, Pablo Neira Ayuso, and Matthias Schiffer. 8) Add devlink support to nfp driver, from Simon Horman. 9) Add RTM_F_FIB_MATCH flag to RTM_GETROUTE queries, from Roopa Prabhu. 10) Add stack depth tracking to BPF verifier and use this information in the various eBPF JITs. From Alexei Starovoitov. 11) Support XDP on qed device VFs, from Yuval Mintz. 12) Introduce BPF PROG ID for better introspection of installed BPF programs. From Martin KaFai Lau. 13) Add bpf_set_hash helper for TC bpf programs, from Daniel Borkmann. 14) For loads, allow narrower accesses in bpf verifier checking, from Yonghong Song. 15) Support MIPS in the BPF selftests and samples infrastructure, the MIPS eBPF JIT will be merged in via the MIPS GIT tree. From David Daney. 16) Support kernel based TLS, from Dave Watson and others. 17) Remove completely DST garbage collection, from Wei Wang. 18) Allow installing TCP MD5 rules using prefixes, from Ivan Delalande. 19) Add XDP support to Intel i40e driver, from Björn Töpel 20) Add support for TC flower offload in nfp driver, from Simon Horman, Pieter Jansen van Vuuren, Benjamin LaHaise, Jakub Kicinski, and Bert van Leeuwen. 21) IPSEC offloading support in mlx5, from Ilan Tayari. 22) Add HW PTP support to macb driver, from Rafal Ozieblo. 23) Networking refcount_t conversions, From Elena Reshetova. 24) Add sock_ops support to BPF, from Lawrence Brako. This is useful for tuning the TCP sockopt settings of a group of applications, currently via CGROUPs" * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1899 commits) net: phy: dp83867: add workaround for incorrect RX_CTRL pin strap dt-bindings: phy: dp83867: provide a workaround for incorrect RX_CTRL pin strap cxgb4: Support for get_ts_info ethtool method cxgb4: Add PTP Hardware Clock (PHC) support cxgb4: time stamping interface for PTP nfp: default to chained metadata prepend format nfp: remove legacy MAC address lookup nfp: improve order of interfaces in breakout mode net: macb: remove extraneous return when MACB_EXT_DESC is defined bpf: add missing break in for the TCP_BPF_SNDCWND_CLAMP case bpf: fix return in load_bpf_file mpls: fix rtm policy in mpls_getroute net, ax25: convert ax25_cb.refcount from atomic_t to refcount_t net, ax25: convert ax25_route.refcount from atomic_t to refcount_t net, ax25: convert ax25_uid_assoc.refcount from atomic_t to refcount_t net, sctp: convert sctp_ep_common.refcnt from atomic_t to refcount_t net, sctp: convert sctp_transport.refcnt from atomic_t to refcount_t net, sctp: convert sctp_chunk.refcnt from atomic_t to refcount_t net, sctp: convert sctp_datamsg.refcnt from atomic_t to refcount_t net, sctp: convert sctp_auth_bytes.refcnt from atomic_t to refcount_t ...
This commit is contained in:
@@ -14,7 +14,8 @@ LDLIBS += -lcap -lelf
|
||||
TEST_GEN_PROGS = test_verifier test_tag test_maps test_lru_map test_lpm_map test_progs \
|
||||
test_align
|
||||
|
||||
TEST_GEN_FILES = test_pkt_access.o test_xdp.o test_l4lb.o test_tcp_estats.o
|
||||
TEST_GEN_FILES = test_pkt_access.o test_xdp.o test_l4lb.o test_tcp_estats.o test_obj_id.o \
|
||||
test_pkt_md_access.o
|
||||
|
||||
TEST_PROGS := test_kmod.sh
|
||||
|
||||
|
@@ -9,6 +9,8 @@
|
||||
#include <stddef.h>
|
||||
#include <stdbool.h>
|
||||
|
||||
#include <sys/resource.h>
|
||||
|
||||
#include <linux/unistd.h>
|
||||
#include <linux/filter.h>
|
||||
#include <linux/bpf_perf_event.h>
|
||||
@@ -426,12 +428,15 @@ static int do_test(unsigned int from, unsigned int to)
|
||||
}
|
||||
printf("Results: %d pass %d fail\n",
|
||||
all_pass, all_fail);
|
||||
return 0;
|
||||
return all_fail ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
unsigned int from = 0, to = ARRAY_SIZE(tests);
|
||||
struct rlimit rinf = { RLIM_INFINITY, RLIM_INFINITY };
|
||||
|
||||
setrlimit(RLIMIT_MEMLOCK, &rinf);
|
||||
|
||||
if (argc == 3) {
|
||||
unsigned int l = atoi(argv[argc - 2]);
|
||||
|
@@ -239,6 +239,54 @@ static void test_hashmap_percpu(int task, void *data)
|
||||
close(fd);
|
||||
}
|
||||
|
||||
static void test_hashmap_walk(int task, void *data)
|
||||
{
|
||||
int fd, i, max_entries = 100000;
|
||||
long long key, value, next_key;
|
||||
bool next_key_valid = true;
|
||||
|
||||
fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
|
||||
max_entries, map_flags);
|
||||
if (fd < 0) {
|
||||
printf("Failed to create hashmap '%s'!\n", strerror(errno));
|
||||
exit(1);
|
||||
}
|
||||
|
||||
for (i = 0; i < max_entries; i++) {
|
||||
key = i; value = key;
|
||||
assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == 0);
|
||||
}
|
||||
|
||||
for (i = 0; bpf_map_get_next_key(fd, !i ? NULL : &key,
|
||||
&next_key) == 0; i++) {
|
||||
key = next_key;
|
||||
assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
|
||||
}
|
||||
|
||||
assert(i == max_entries);
|
||||
|
||||
assert(bpf_map_get_next_key(fd, NULL, &key) == 0);
|
||||
for (i = 0; next_key_valid; i++) {
|
||||
next_key_valid = bpf_map_get_next_key(fd, &key, &next_key) == 0;
|
||||
assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
|
||||
value++;
|
||||
assert(bpf_map_update_elem(fd, &key, &value, BPF_EXIST) == 0);
|
||||
key = next_key;
|
||||
}
|
||||
|
||||
assert(i == max_entries);
|
||||
|
||||
for (i = 0; bpf_map_get_next_key(fd, !i ? NULL : &key,
|
||||
&next_key) == 0; i++) {
|
||||
key = next_key;
|
||||
assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
|
||||
assert(value - 1 == key);
|
||||
}
|
||||
|
||||
assert(i == max_entries);
|
||||
close(fd);
|
||||
}
|
||||
|
||||
static void test_arraymap(int task, void *data)
|
||||
{
|
||||
int key, next_key, fd;
|
||||
@@ -464,6 +512,7 @@ static void test_map_stress(void)
|
||||
run_parallel(100, test_hashmap, NULL);
|
||||
run_parallel(100, test_hashmap_percpu, NULL);
|
||||
run_parallel(100, test_hashmap_sizes, NULL);
|
||||
run_parallel(100, test_hashmap_walk, NULL);
|
||||
|
||||
run_parallel(100, test_arraymap, NULL);
|
||||
run_parallel(100, test_arraymap_percpu, NULL);
|
||||
@@ -549,6 +598,7 @@ static void run_all_tests(void)
|
||||
{
|
||||
test_hashmap(0, NULL);
|
||||
test_hashmap_percpu(0, NULL);
|
||||
test_hashmap_walk(0, NULL);
|
||||
|
||||
test_arraymap(0, NULL);
|
||||
test_arraymap_percpu(0, NULL);
|
||||
|
35
tools/testing/selftests/bpf/test_obj_id.c
Normal file
35
tools/testing/selftests/bpf/test_obj_id.c
Normal file
@@ -0,0 +1,35 @@
|
||||
/* Copyright (c) 2017 Facebook
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of version 2 of the GNU General Public
|
||||
* License as published by the Free Software Foundation.
|
||||
*/
|
||||
#include <stddef.h>
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/pkt_cls.h>
|
||||
#include "bpf_helpers.h"
|
||||
|
||||
/* It is a dumb bpf program such that it must have no
|
||||
* issue to be loaded since testing the verifier is
|
||||
* not the focus here.
|
||||
*/
|
||||
|
||||
int _version SEC("version") = 1;
|
||||
|
||||
struct bpf_map_def SEC("maps") test_map_id = {
|
||||
.type = BPF_MAP_TYPE_ARRAY,
|
||||
.key_size = sizeof(__u32),
|
||||
.value_size = sizeof(__u64),
|
||||
.max_entries = 1,
|
||||
};
|
||||
|
||||
SEC("test_obj_id_dummy")
|
||||
int test_obj_id(struct __sk_buff *skb)
|
||||
{
|
||||
__u32 key = 0;
|
||||
__u64 *value;
|
||||
|
||||
value = bpf_map_lookup_elem(&test_map_id, &key);
|
||||
|
||||
return TC_ACT_OK;
|
||||
}
|
35
tools/testing/selftests/bpf/test_pkt_md_access.c
Normal file
35
tools/testing/selftests/bpf/test_pkt_md_access.c
Normal file
@@ -0,0 +1,35 @@
|
||||
/* Copyright (c) 2017 Facebook
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of version 2 of the GNU General Public
|
||||
* License as published by the Free Software Foundation.
|
||||
*/
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/pkt_cls.h>
|
||||
#include "bpf_helpers.h"
|
||||
|
||||
int _version SEC("version") = 1;
|
||||
|
||||
#define TEST_FIELD(TYPE, FIELD, MASK) \
|
||||
{ \
|
||||
TYPE tmp = *(volatile TYPE *)&skb->FIELD; \
|
||||
if (tmp != ((*(volatile __u32 *)&skb->FIELD) & MASK)) \
|
||||
return TC_ACT_SHOT; \
|
||||
}
|
||||
|
||||
SEC("test1")
|
||||
int process(struct __sk_buff *skb)
|
||||
{
|
||||
TEST_FIELD(__u8, len, 0xFF);
|
||||
TEST_FIELD(__u16, len, 0xFFFF);
|
||||
TEST_FIELD(__u32, len, 0xFFFFFFFF);
|
||||
TEST_FIELD(__u16, protocol, 0xFFFF);
|
||||
TEST_FIELD(__u32, protocol, 0xFFFFFFFF);
|
||||
TEST_FIELD(__u8, hash, 0xFF);
|
||||
TEST_FIELD(__u16, hash, 0xFFFF);
|
||||
TEST_FIELD(__u32, hash, 0xFFFFFFFF);
|
||||
|
||||
return TC_ACT_OK;
|
||||
}
|
@@ -22,6 +22,8 @@ typedef __u16 __sum16;
|
||||
|
||||
#include <sys/wait.h>
|
||||
#include <sys/resource.h>
|
||||
#include <sys/types.h>
|
||||
#include <fcntl.h>
|
||||
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/err.h>
|
||||
@@ -70,6 +72,7 @@ static struct {
|
||||
pass_cnt++; \
|
||||
printf("%s:PASS:%s %d nsec\n", __func__, tag, duration);\
|
||||
} \
|
||||
__ret; \
|
||||
})
|
||||
|
||||
static int bpf_prog_load(const char *file, enum bpf_prog_type type,
|
||||
@@ -283,6 +286,224 @@ static void test_tcp_estats(void)
|
||||
bpf_object__close(obj);
|
||||
}
|
||||
|
||||
static inline __u64 ptr_to_u64(const void *ptr)
|
||||
{
|
||||
return (__u64) (unsigned long) ptr;
|
||||
}
|
||||
|
||||
static void test_bpf_obj_id(void)
|
||||
{
|
||||
const __u64 array_magic_value = 0xfaceb00c;
|
||||
const __u32 array_key = 0;
|
||||
const int nr_iters = 2;
|
||||
const char *file = "./test_obj_id.o";
|
||||
const char *jit_sysctl = "/proc/sys/net/core/bpf_jit_enable";
|
||||
|
||||
struct bpf_object *objs[nr_iters];
|
||||
int prog_fds[nr_iters], map_fds[nr_iters];
|
||||
/* +1 to test for the info_len returned by kernel */
|
||||
struct bpf_prog_info prog_infos[nr_iters + 1];
|
||||
struct bpf_map_info map_infos[nr_iters + 1];
|
||||
char jited_insns[128], xlated_insns[128];
|
||||
__u32 i, next_id, info_len, nr_id_found, duration = 0;
|
||||
int sysctl_fd, jit_enabled = 0, err = 0;
|
||||
__u64 array_value;
|
||||
|
||||
sysctl_fd = open(jit_sysctl, 0, O_RDONLY);
|
||||
if (sysctl_fd != -1) {
|
||||
char tmpc;
|
||||
|
||||
if (read(sysctl_fd, &tmpc, sizeof(tmpc)) == 1)
|
||||
jit_enabled = (tmpc != '0');
|
||||
close(sysctl_fd);
|
||||
}
|
||||
|
||||
err = bpf_prog_get_fd_by_id(0);
|
||||
CHECK(err >= 0 || errno != ENOENT,
|
||||
"get-fd-by-notexist-prog-id", "err %d errno %d\n", err, errno);
|
||||
|
||||
err = bpf_map_get_fd_by_id(0);
|
||||
CHECK(err >= 0 || errno != ENOENT,
|
||||
"get-fd-by-notexist-map-id", "err %d errno %d\n", err, errno);
|
||||
|
||||
for (i = 0; i < nr_iters; i++)
|
||||
objs[i] = NULL;
|
||||
|
||||
/* Check bpf_obj_get_info_by_fd() */
|
||||
for (i = 0; i < nr_iters; i++) {
|
||||
err = bpf_prog_load(file, BPF_PROG_TYPE_SOCKET_FILTER,
|
||||
&objs[i], &prog_fds[i]);
|
||||
/* test_obj_id.o is a dumb prog. It should never fail
|
||||
* to load.
|
||||
*/
|
||||
assert(!err);
|
||||
|
||||
/* Check getting prog info */
|
||||
info_len = sizeof(struct bpf_prog_info) * 2;
|
||||
prog_infos[i].jited_prog_insns = ptr_to_u64(jited_insns);
|
||||
prog_infos[i].jited_prog_len = sizeof(jited_insns);
|
||||
prog_infos[i].xlated_prog_insns = ptr_to_u64(xlated_insns);
|
||||
prog_infos[i].xlated_prog_len = sizeof(xlated_insns);
|
||||
err = bpf_obj_get_info_by_fd(prog_fds[i], &prog_infos[i],
|
||||
&info_len);
|
||||
if (CHECK(err ||
|
||||
prog_infos[i].type != BPF_PROG_TYPE_SOCKET_FILTER ||
|
||||
info_len != sizeof(struct bpf_prog_info) ||
|
||||
(jit_enabled && !prog_infos[i].jited_prog_len) ||
|
||||
!prog_infos[i].xlated_prog_len,
|
||||
"get-prog-info(fd)",
|
||||
"err %d errno %d i %d type %d(%d) info_len %u(%lu) jit_enabled %d jited_prog_len %u xlated_prog_len %u\n",
|
||||
err, errno, i,
|
||||
prog_infos[i].type, BPF_PROG_TYPE_SOCKET_FILTER,
|
||||
info_len, sizeof(struct bpf_prog_info),
|
||||
jit_enabled,
|
||||
prog_infos[i].jited_prog_len,
|
||||
prog_infos[i].xlated_prog_len))
|
||||
goto done;
|
||||
|
||||
map_fds[i] = bpf_find_map(__func__, objs[i], "test_map_id");
|
||||
assert(map_fds[i] >= 0);
|
||||
err = bpf_map_update_elem(map_fds[i], &array_key,
|
||||
&array_magic_value, 0);
|
||||
assert(!err);
|
||||
|
||||
/* Check getting map info */
|
||||
info_len = sizeof(struct bpf_map_info) * 2;
|
||||
err = bpf_obj_get_info_by_fd(map_fds[i], &map_infos[i],
|
||||
&info_len);
|
||||
if (CHECK(err ||
|
||||
map_infos[i].type != BPF_MAP_TYPE_ARRAY ||
|
||||
map_infos[i].key_size != sizeof(__u32) ||
|
||||
map_infos[i].value_size != sizeof(__u64) ||
|
||||
map_infos[i].max_entries != 1 ||
|
||||
map_infos[i].map_flags != 0 ||
|
||||
info_len != sizeof(struct bpf_map_info),
|
||||
"get-map-info(fd)",
|
||||
"err %d errno %d type %d(%d) info_len %u(%lu) key_size %u value_size %u max_entries %u map_flags %X\n",
|
||||
err, errno,
|
||||
map_infos[i].type, BPF_MAP_TYPE_ARRAY,
|
||||
info_len, sizeof(struct bpf_map_info),
|
||||
map_infos[i].key_size,
|
||||
map_infos[i].value_size,
|
||||
map_infos[i].max_entries,
|
||||
map_infos[i].map_flags))
|
||||
goto done;
|
||||
}
|
||||
|
||||
/* Check bpf_prog_get_next_id() */
|
||||
nr_id_found = 0;
|
||||
next_id = 0;
|
||||
while (!bpf_prog_get_next_id(next_id, &next_id)) {
|
||||
struct bpf_prog_info prog_info;
|
||||
int prog_fd;
|
||||
|
||||
info_len = sizeof(prog_info);
|
||||
|
||||
prog_fd = bpf_prog_get_fd_by_id(next_id);
|
||||
if (prog_fd < 0 && errno == ENOENT)
|
||||
/* The bpf_prog is in the dead row */
|
||||
continue;
|
||||
if (CHECK(prog_fd < 0, "get-prog-fd(next_id)",
|
||||
"prog_fd %d next_id %d errno %d\n",
|
||||
prog_fd, next_id, errno))
|
||||
break;
|
||||
|
||||
for (i = 0; i < nr_iters; i++)
|
||||
if (prog_infos[i].id == next_id)
|
||||
break;
|
||||
|
||||
if (i == nr_iters)
|
||||
continue;
|
||||
|
||||
nr_id_found++;
|
||||
|
||||
err = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &info_len);
|
||||
CHECK(err || info_len != sizeof(struct bpf_prog_info) ||
|
||||
memcmp(&prog_info, &prog_infos[i], info_len),
|
||||
"get-prog-info(next_id->fd)",
|
||||
"err %d errno %d info_len %u(%lu) memcmp %d\n",
|
||||
err, errno, info_len, sizeof(struct bpf_prog_info),
|
||||
memcmp(&prog_info, &prog_infos[i], info_len));
|
||||
|
||||
close(prog_fd);
|
||||
}
|
||||
CHECK(nr_id_found != nr_iters,
|
||||
"check total prog id found by get_next_id",
|
||||
"nr_id_found %u(%u)\n",
|
||||
nr_id_found, nr_iters);
|
||||
|
||||
/* Check bpf_map_get_next_id() */
|
||||
nr_id_found = 0;
|
||||
next_id = 0;
|
||||
while (!bpf_map_get_next_id(next_id, &next_id)) {
|
||||
struct bpf_map_info map_info;
|
||||
int map_fd;
|
||||
|
||||
info_len = sizeof(map_info);
|
||||
|
||||
map_fd = bpf_map_get_fd_by_id(next_id);
|
||||
if (map_fd < 0 && errno == ENOENT)
|
||||
/* The bpf_map is in the dead row */
|
||||
continue;
|
||||
if (CHECK(map_fd < 0, "get-map-fd(next_id)",
|
||||
"map_fd %d next_id %u errno %d\n",
|
||||
map_fd, next_id, errno))
|
||||
break;
|
||||
|
||||
for (i = 0; i < nr_iters; i++)
|
||||
if (map_infos[i].id == next_id)
|
||||
break;
|
||||
|
||||
if (i == nr_iters)
|
||||
continue;
|
||||
|
||||
nr_id_found++;
|
||||
|
||||
err = bpf_map_lookup_elem(map_fd, &array_key, &array_value);
|
||||
assert(!err);
|
||||
|
||||
err = bpf_obj_get_info_by_fd(map_fd, &map_info, &info_len);
|
||||
CHECK(err || info_len != sizeof(struct bpf_map_info) ||
|
||||
memcmp(&map_info, &map_infos[i], info_len) ||
|
||||
array_value != array_magic_value,
|
||||
"check get-map-info(next_id->fd)",
|
||||
"err %d errno %d info_len %u(%lu) memcmp %d array_value %llu(%llu)\n",
|
||||
err, errno, info_len, sizeof(struct bpf_map_info),
|
||||
memcmp(&map_info, &map_infos[i], info_len),
|
||||
array_value, array_magic_value);
|
||||
|
||||
close(map_fd);
|
||||
}
|
||||
CHECK(nr_id_found != nr_iters,
|
||||
"check total map id found by get_next_id",
|
||||
"nr_id_found %u(%u)\n",
|
||||
nr_id_found, nr_iters);
|
||||
|
||||
done:
|
||||
for (i = 0; i < nr_iters; i++)
|
||||
bpf_object__close(objs[i]);
|
||||
}
|
||||
|
||||
static void test_pkt_md_access(void)
|
||||
{
|
||||
const char *file = "./test_pkt_md_access.o";
|
||||
struct bpf_object *obj;
|
||||
__u32 duration, retval;
|
||||
int err, prog_fd;
|
||||
|
||||
err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
||||
if (err)
|
||||
return;
|
||||
|
||||
err = bpf_prog_test_run(prog_fd, 10, &pkt_v4, sizeof(pkt_v4),
|
||||
NULL, NULL, &retval, &duration);
|
||||
CHECK(err || retval, "",
|
||||
"err %d errno %d retval %d duration %d\n",
|
||||
err, errno, retval, duration);
|
||||
|
||||
bpf_object__close(obj);
|
||||
}
|
||||
|
||||
int main(void)
|
||||
{
|
||||
struct rlimit rinf = { RLIM_INFINITY, RLIM_INFINITY };
|
||||
@@ -293,7 +514,9 @@ int main(void)
|
||||
test_xdp();
|
||||
test_l4lb();
|
||||
test_tcp_estats();
|
||||
test_bpf_obj_id();
|
||||
test_pkt_md_access();
|
||||
|
||||
printf("Summary: %d PASSED, %d FAILED\n", pass_cnt, error_cnt);
|
||||
return 0;
|
||||
return error_cnt ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||
}
|
||||
|
@@ -1073,44 +1073,75 @@ static struct bpf_test tests[] = {
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"check cb access: byte, oob 1",
|
||||
"__sk_buff->hash, offset 0, byte store not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[4]) + 4),
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: byte, oob 2",
|
||||
"__sk_buff->tc_index, offset 3, byte store not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[0]) - 1),
|
||||
offsetof(struct __sk_buff, tc_index) + 3),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: byte, oob 3",
|
||||
"check skb->hash byte load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash) + 3),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"check skb->hash byte load not permitted 1",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[4]) + 4),
|
||||
offsetof(struct __sk_buff, hash) + 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: byte, oob 4",
|
||||
"check skb->hash byte load not permitted 2",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[0]) - 1),
|
||||
offsetof(struct __sk_buff, hash) + 2),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check skb->hash byte load not permitted 3",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash) + 3),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
@@ -1188,44 +1219,53 @@ static struct bpf_test tests[] = {
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: half, oob 1",
|
||||
"check __sk_buff->hash, offset 0, half store not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[4]) + 4),
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: half, oob 2",
|
||||
"check __sk_buff->tc_index, offset 2, half store not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[0]) - 2),
|
||||
offsetof(struct __sk_buff, tc_index) + 2),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: half, oob 3",
|
||||
"check skb->hash half load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[4]) + 4),
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash) + 2),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"check cb access: half, oob 4",
|
||||
"check skb->hash half load not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[0]) - 2),
|
||||
offsetof(struct __sk_buff, hash) + 2),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, hash)),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
@@ -1366,28 +1406,6 @@ static struct bpf_test tests[] = {
|
||||
},
|
||||
{
|
||||
"check cb access: double, oob 2",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[4]) + 8),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: double, oob 3",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, cb[0]) - 8),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: double, oob 4",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
|
||||
@@ -1398,22 +1416,22 @@ static struct bpf_test tests[] = {
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: double, oob 5",
|
||||
"check __sk_buff->ifindex dw store not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[4]) + 8),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
|
||||
offsetof(struct __sk_buff, ifindex)),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
.result = REJECT,
|
||||
},
|
||||
{
|
||||
"check cb access: double, oob 6",
|
||||
"check __sk_buff->ifindex dw load not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, cb[0]) - 8),
|
||||
offsetof(struct __sk_buff, ifindex)),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.errstr = "invalid bpf_context access",
|
||||
@@ -2639,6 +2657,171 @@ static struct bpf_test tests[] = {
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.flags = F_LOAD_WITH_STRICT_ALIGNMENT,
|
||||
},
|
||||
{
|
||||
"direct packet access: test18 (imm += pkt_ptr, 1)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 8),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
|
||||
BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
},
|
||||
{
|
||||
"direct packet access: test19 (imm += pkt_ptr, 2)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
|
||||
BPF_MOV64_IMM(BPF_REG_4, 4),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
|
||||
BPF_STX_MEM(BPF_B, BPF_REG_4, BPF_REG_4, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
},
|
||||
{
|
||||
"direct packet access: test20 (x += pkt_ptr, 1)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
|
||||
BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffff),
|
||||
BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
|
||||
BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0xffff - 1),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_4, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"direct packet access: test21 (x += pkt_ptr, 2)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 9),
|
||||
BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -8),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
|
||||
BPF_ALU64_IMM(BPF_AND, BPF_REG_4, 0xffff),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
|
||||
BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0xffff - 1),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_4, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"direct packet access: test22 (x += pkt_ptr, 3)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -8),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_3, -16),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_10, -16),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 11),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
|
||||
BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
|
||||
BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_4, -8),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
|
||||
BPF_ALU64_IMM(BPF_RSH, BPF_REG_4, 48),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
|
||||
BPF_MOV64_REG(BPF_REG_0, BPF_REG_4),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 2),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
|
||||
BPF_MOV64_IMM(BPF_REG_2, 1),
|
||||
BPF_STX_MEM(BPF_H, BPF_REG_4, BPF_REG_2, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"direct packet access: test23 (x += pkt_ptr, 4)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
|
||||
BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffff),
|
||||
BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 31),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_4),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
|
||||
BPF_MOV64_REG(BPF_REG_5, BPF_REG_0),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0xffff - 1),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_0, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.result = REJECT,
|
||||
.errstr = "cannot add integer value with 47 upper zero bits to ptr_to_packet",
|
||||
},
|
||||
{
|
||||
"direct packet access: test24 (x += pkt_ptr, 5)",
|
||||
.insns = {
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data_end)),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
|
||||
BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xff),
|
||||
BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 64),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_4),
|
||||
BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
|
||||
BPF_MOV64_REG(BPF_REG_5, BPF_REG_0),
|
||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0xffff - 1),
|
||||
BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
|
||||
BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_0, 0),
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.prog_type = BPF_PROG_TYPE_SCHED_CLS,
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"helper access to packet: test1, valid packet_ptr range",
|
||||
.insns = {
|
||||
@@ -5235,6 +5418,98 @@ static struct bpf_test tests[] = {
|
||||
},
|
||||
.result = ACCEPT,
|
||||
},
|
||||
{
|
||||
"check bpf_perf_event_data->sample_period byte load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period) + 7),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_PERF_EVENT,
|
||||
},
|
||||
{
|
||||
"check bpf_perf_event_data->sample_period half load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period) + 6),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_PERF_EVENT,
|
||||
},
|
||||
{
|
||||
"check bpf_perf_event_data->sample_period word load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period) + 4),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_PERF_EVENT,
|
||||
},
|
||||
{
|
||||
"check bpf_perf_event_data->sample_period dword load permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct bpf_perf_event_data, sample_period)),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.prog_type = BPF_PROG_TYPE_PERF_EVENT,
|
||||
},
|
||||
{
|
||||
"check skb->data half load not permitted",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, data) + 2),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = REJECT,
|
||||
.errstr = "invalid bpf_context access",
|
||||
},
|
||||
{
|
||||
"check skb->tc_classid half load not permitted for lwt prog",
|
||||
.insns = {
|
||||
BPF_MOV64_IMM(BPF_REG_0, 0),
|
||||
#ifdef __LITTLE_ENDIAN
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, tc_classid)),
|
||||
#else
|
||||
BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
|
||||
offsetof(struct __sk_buff, tc_classid) + 2),
|
||||
#endif
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = REJECT,
|
||||
.errstr = "invalid bpf_context access",
|
||||
.prog_type = BPF_PROG_TYPE_LWT_IN,
|
||||
},
|
||||
};
|
||||
|
||||
static int probe_filter_length(const struct bpf_insn *fp)
|
||||
@@ -5484,7 +5759,7 @@ static int do_test(bool unpriv, unsigned int from, unsigned int to)
|
||||
}
|
||||
|
||||
printf("Summary: %d PASSED, %d FAILED\n", passes, errors);
|
||||
return errors ? -errors : 0;
|
||||
return errors ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
|
1
tools/testing/selftests/tc-testing/.gitignore
vendored
Normal file
1
tools/testing/selftests/tc-testing/.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
__pycache__/
|
102
tools/testing/selftests/tc-testing/README
Normal file
102
tools/testing/selftests/tc-testing/README
Normal file
@@ -0,0 +1,102 @@
|
||||
tdc - Linux Traffic Control (tc) unit testing suite
|
||||
|
||||
Author: Lucas Bates - lucasb@mojatatu.com
|
||||
|
||||
tdc is a Python script to load tc unit tests from a separate JSON file and
|
||||
execute them inside a network namespace dedicated to the task.
|
||||
|
||||
|
||||
REQUIREMENTS
|
||||
------------
|
||||
|
||||
* Minimum Python version of 3.4. Earlier 3.X versions may work but are not
|
||||
guaranteed.
|
||||
|
||||
* The kernel must have network namespace support
|
||||
|
||||
* The kernel must have veth support available, as a veth pair is created
|
||||
prior to running the tests.
|
||||
|
||||
* All tc-related features must be built in or available as modules.
|
||||
To check what is required in current setup run:
|
||||
./tdc.py -c
|
||||
|
||||
Note:
|
||||
In the current release, tdc run will abort due to a failure in setup or
|
||||
teardown commands - which includes not being able to run a test simply
|
||||
because the kernel did not support a specific feature. (This will be
|
||||
handled in a future version - the current workaround is to run the tests
|
||||
on specific test categories that your kernel supports)
|
||||
|
||||
|
||||
BEFORE YOU RUN
|
||||
--------------
|
||||
|
||||
The path to the tc executable that will be most commonly tested can be defined
|
||||
in the tdc_config.py file. Find the 'TC' entry in the NAMES dictionary and
|
||||
define the path.
|
||||
|
||||
If you need to test a different tc executable on the fly, you can do so by
|
||||
using the -p option when running tdc:
|
||||
./tdc.py -p /path/to/tc
|
||||
|
||||
|
||||
RUNNING TDC
|
||||
-----------
|
||||
|
||||
To use tdc, root privileges are required. tdc will not run otherwise.
|
||||
|
||||
All tests are executed inside a network namespace to prevent conflicts
|
||||
within the host.
|
||||
|
||||
Running tdc without any arguments will run all tests. Refer to the section
|
||||
on command line arguments for more information, or run:
|
||||
./tdc.py -h
|
||||
|
||||
tdc will list the test names as they are being run, and print a summary in
|
||||
TAP (Test Anything Protocol) format when they are done. If tests fail,
|
||||
output captured from the failing test will be printed immediately following
|
||||
the failed test in the TAP output.
|
||||
|
||||
|
||||
USER-DEFINED CONSTANTS
|
||||
----------------------
|
||||
|
||||
The tdc_config.py file contains multiple values that can be altered to suit
|
||||
your needs. Any value in the NAMES dictionary can be altered without affecting
|
||||
the tests to be run. These values are used in the tc commands that will be
|
||||
executed as part of the test. More will be added as test cases require.
|
||||
|
||||
Example:
|
||||
$TC qdisc add dev $DEV1 ingress
|
||||
|
||||
|
||||
COMMAND LINE ARGUMENTS
|
||||
----------------------
|
||||
|
||||
Run tdc.py -h to see the full list of available arguments.
|
||||
|
||||
-p PATH Specify the tc executable located at PATH to be used on this
|
||||
test run
|
||||
-c Show the available test case categories in this test file
|
||||
-c CATEGORY Run only tests that belong to CATEGORY
|
||||
-f FILE Read test cases from the JSON file named FILE
|
||||
-l [CATEGORY] List all test cases in the JSON file. If CATEGORY is
|
||||
specified, list test cases matching that category.
|
||||
-s ID Show the test case matching ID
|
||||
-e ID Execute the test case identified by ID
|
||||
-i Generate unique ID numbers for test cases with no existing
|
||||
ID number
|
||||
|
||||
|
||||
ACKNOWLEDGEMENTS
|
||||
----------------
|
||||
|
||||
Thanks to:
|
||||
|
||||
Jamal Hadi Salim, for providing valuable test cases
|
||||
Keara Leibovitz, who wrote the CLI test driver that I used as a base for the
|
||||
first version of the tc testing suite. This work was presented at
|
||||
Netdev 1.2 Tokyo in October 2016.
|
||||
Samir Hussain, for providing help while I dove into Python for the first time
|
||||
and being a second eye for this code.
|
10
tools/testing/selftests/tc-testing/TODO.txt
Normal file
10
tools/testing/selftests/tc-testing/TODO.txt
Normal file
@@ -0,0 +1,10 @@
|
||||
tc Testing Suite To-Do list:
|
||||
|
||||
- Determine what tc features are supported in the kernel. If features are not
|
||||
present, prevent the related categories from running.
|
||||
|
||||
- Add support for multiple versions of tc to run successively
|
||||
|
||||
- Improve error messages when tdc aborts its run
|
||||
|
||||
- Allow tdc to write its results to file
|
@@ -0,0 +1,69 @@
|
||||
tdc - Adding test cases for tdc
|
||||
|
||||
Author: Lucas Bates - lucasb@mojatatu.com
|
||||
|
||||
ADDING TEST CASES
|
||||
-----------------
|
||||
|
||||
User-defined tests should be added by defining a separate JSON file. This
|
||||
will help prevent conflicts when updating the repository. Refer to
|
||||
template.json for the required JSON format for test cases.
|
||||
|
||||
Include the 'id' field, but do not assign a value. Running tdc with the -i
|
||||
option will generate a unique ID for that test case.
|
||||
|
||||
tdc will recursively search the 'tc' subdirectory for .json files. Any
|
||||
test case files you create in these directories will automatically be included.
|
||||
If you wish to store your custom test cases elsewhere, be sure to run tdc
|
||||
with the -f argument and the path to your file.
|
||||
|
||||
Be aware of required escape characters in the JSON data - particularly when
|
||||
defining the match pattern. Refer to the tctests.json file for examples when
|
||||
in doubt.
|
||||
|
||||
|
||||
TEST CASE STRUCTURE
|
||||
-------------------
|
||||
|
||||
Each test case has required data:
|
||||
|
||||
id: A unique alphanumeric value to identify a particular test case
|
||||
name: Descriptive name that explains the command under test
|
||||
category: A list of single-word descriptions covering what the command
|
||||
under test is testing. Example: filter, actions, u32, gact, etc.
|
||||
setup: The list of commands required to ensure the command under test
|
||||
succeeds. For example: if testing a filter, the command to create
|
||||
the qdisc would appear here.
|
||||
cmdUnderTest: The tc command being tested itself.
|
||||
expExitCode: The code returned by the command under test upon its termination.
|
||||
tdc will compare this value against the actual returned value.
|
||||
verifyCmd: The tc command to be run to verify successful execution.
|
||||
For example: if the command under test creates a gact action,
|
||||
verifyCmd should be "$TC actions show action gact"
|
||||
matchPattern: A regular expression to be applied against the output of the
|
||||
verifyCmd to prove the command under test succeeded. This pattern
|
||||
should be as specific as possible so that a false positive is not
|
||||
matched.
|
||||
matchCount: How many times the regex in matchPattern should match. A value
|
||||
of 0 is acceptable.
|
||||
teardown: The list of commands to clean up after the test is completed.
|
||||
The environment should be returned to the same state as when
|
||||
this test was started: qdiscs deleted, actions flushed, etc.
|
||||
|
||||
|
||||
SETUP/TEARDOWN ERRORS
|
||||
---------------------
|
||||
|
||||
If an error is detected during the setup/teardown process, execution of the
|
||||
tests will immediately stop with an error message and the namespace in which
|
||||
the tests are run will be destroyed. This is to prevent inaccurate results
|
||||
in the test cases.
|
||||
|
||||
Repeated failures of the setup/teardown may indicate a problem with the test
|
||||
case, or possibly even a bug in one of the commands that are not being tested.
|
||||
|
||||
It's possible to include acceptable exit codes with the setup/teardown command
|
||||
so that it doesn't halt the script for an error that doesn't matter. Turn the
|
||||
individual command into a list, with the command being first, followed by all
|
||||
acceptable exit codes for the command.
|
||||
|
@@ -0,0 +1,40 @@
|
||||
[
|
||||
{
|
||||
"id": "",
|
||||
"name": "",
|
||||
"category": [
|
||||
"",
|
||||
""
|
||||
],
|
||||
"setup": [
|
||||
""
|
||||
],
|
||||
"cmdUnderTest": "",
|
||||
"expExitCode": "",
|
||||
"verifyCmd": "",
|
||||
"matchPattern": "",
|
||||
"matchCount": "",
|
||||
"teardown": [
|
||||
""
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "",
|
||||
"name": "",
|
||||
"category": [
|
||||
"",
|
||||
""
|
||||
],
|
||||
"setup": [
|
||||
""
|
||||
],
|
||||
"cmdUnderTest": "",
|
||||
"expExitCode": "",
|
||||
"verifyCmd": "",
|
||||
"matchPattern": "",
|
||||
"matchCount": "",
|
||||
"teardown": [
|
||||
""
|
||||
]
|
||||
}
|
||||
]
|
1115
tools/testing/selftests/tc-testing/tc-tests/actions/tests.json
Normal file
1115
tools/testing/selftests/tc-testing/tc-tests/actions/tests.json
Normal file
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1,21 @@
|
||||
[
|
||||
{
|
||||
"id": "e9a3",
|
||||
"name": "Add u32 with source match",
|
||||
"category": [
|
||||
"filter",
|
||||
"u32"
|
||||
],
|
||||
"setup": [
|
||||
"$TC qdisc add dev $DEV1 ingress"
|
||||
],
|
||||
"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 1 u32 match ip src 127.0.0.1/32 flowid 1:1 action ok",
|
||||
"expExitCode": "0",
|
||||
"verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
|
||||
"matchPattern": "match 7f000002/ffffffff at 12",
|
||||
"matchCount": "0",
|
||||
"teardown": [
|
||||
"$TC qdisc del dev $DEV1 ingress"
|
||||
]
|
||||
}
|
||||
]
|
413
tools/testing/selftests/tc-testing/tdc.py
Executable file
413
tools/testing/selftests/tc-testing/tdc.py
Executable file
@@ -0,0 +1,413 @@
|
||||
#!/usr/bin/env python3
|
||||
|
||||
"""
|
||||
tdc.py - Linux tc (Traffic Control) unit test driver
|
||||
|
||||
Copyright (C) 2017 Lucas Bates <lucasb@mojatatu.com>
|
||||
"""
|
||||
|
||||
import re
|
||||
import os
|
||||
import sys
|
||||
import argparse
|
||||
import json
|
||||
import subprocess
|
||||
from collections import OrderedDict
|
||||
from string import Template
|
||||
|
||||
from tdc_config import *
|
||||
from tdc_helper import *
|
||||
|
||||
|
||||
USE_NS = True
|
||||
|
||||
|
||||
def replace_keywords(cmd):
|
||||
"""
|
||||
For a given executable command, substitute any known
|
||||
variables contained within NAMES with the correct values
|
||||
"""
|
||||
tcmd = Template(cmd)
|
||||
subcmd = tcmd.safe_substitute(NAMES)
|
||||
return subcmd
|
||||
|
||||
|
||||
def exec_cmd(command, nsonly=True):
|
||||
"""
|
||||
Perform any required modifications on an executable command, then run
|
||||
it in a subprocess and return the results.
|
||||
"""
|
||||
if (USE_NS and nsonly):
|
||||
command = 'ip netns exec $NS ' + command
|
||||
|
||||
if '$' in command:
|
||||
command = replace_keywords(command)
|
||||
|
||||
proc = subprocess.Popen(command,
|
||||
shell=True,
|
||||
stdout=subprocess.PIPE,
|
||||
stderr=subprocess.PIPE)
|
||||
(rawout, serr) = proc.communicate()
|
||||
|
||||
if proc.returncode != 0:
|
||||
foutput = serr.decode("utf-8")
|
||||
else:
|
||||
foutput = rawout.decode("utf-8")
|
||||
|
||||
proc.stdout.close()
|
||||
proc.stderr.close()
|
||||
return proc, foutput
|
||||
|
||||
|
||||
def prepare_env(cmdlist):
|
||||
"""
|
||||
Execute the setup/teardown commands for a test case. Optionally
|
||||
terminate test execution if the command fails.
|
||||
"""
|
||||
for cmdinfo in cmdlist:
|
||||
if (type(cmdinfo) == list):
|
||||
exit_codes = cmdinfo[1:]
|
||||
cmd = cmdinfo[0]
|
||||
else:
|
||||
exit_codes = [0]
|
||||
cmd = cmdinfo
|
||||
|
||||
if (len(cmd) == 0):
|
||||
continue
|
||||
|
||||
(proc, foutput) = exec_cmd(cmd)
|
||||
|
||||
if proc.returncode not in exit_codes:
|
||||
print
|
||||
print("Could not execute:")
|
||||
print(cmd)
|
||||
print("\nError message:")
|
||||
print(foutput)
|
||||
print("\nAborting test run.")
|
||||
ns_destroy()
|
||||
exit(1)
|
||||
|
||||
|
||||
def test_runner(filtered_tests):
|
||||
"""
|
||||
Driver function for the unit tests.
|
||||
|
||||
Prints information about the tests being run, executes the setup and
|
||||
teardown commands and the command under test itself. Also determines
|
||||
success/failure based on the information in the test case and generates
|
||||
TAP output accordingly.
|
||||
"""
|
||||
testlist = filtered_tests
|
||||
tcount = len(testlist)
|
||||
index = 1
|
||||
tap = str(index) + ".." + str(tcount) + "\n"
|
||||
|
||||
for tidx in testlist:
|
||||
result = True
|
||||
tresult = ""
|
||||
print("Test " + tidx["id"] + ": " + tidx["name"])
|
||||
prepare_env(tidx["setup"])
|
||||
(p, procout) = exec_cmd(tidx["cmdUnderTest"])
|
||||
exit_code = p.returncode
|
||||
|
||||
if (exit_code != int(tidx["expExitCode"])):
|
||||
result = False
|
||||
print("exit:", exit_code, int(tidx["expExitCode"]))
|
||||
print(procout)
|
||||
else:
|
||||
match_pattern = re.compile(str(tidx["matchPattern"]), re.DOTALL)
|
||||
(p, procout) = exec_cmd(tidx["verifyCmd"])
|
||||
match_index = re.findall(match_pattern, procout)
|
||||
if len(match_index) != int(tidx["matchCount"]):
|
||||
result = False
|
||||
|
||||
if result == True:
|
||||
tresult += "ok "
|
||||
else:
|
||||
tresult += "not ok "
|
||||
tap += tresult + str(index) + " " + tidx["id"] + " " + tidx["name"] + "\n"
|
||||
|
||||
if result == False:
|
||||
tap += procout
|
||||
|
||||
prepare_env(tidx["teardown"])
|
||||
index += 1
|
||||
|
||||
return tap
|
||||
|
||||
|
||||
def ns_create():
|
||||
"""
|
||||
Create the network namespace in which the tests will be run and set up
|
||||
the required network devices for it.
|
||||
"""
|
||||
if (USE_NS):
|
||||
cmd = 'ip netns add $NS'
|
||||
exec_cmd(cmd, False)
|
||||
cmd = 'ip link add $DEV0 type veth peer name $DEV1'
|
||||
exec_cmd(cmd, False)
|
||||
cmd = 'ip link set $DEV1 netns $NS'
|
||||
exec_cmd(cmd, False)
|
||||
cmd = 'ip link set $DEV0 up'
|
||||
exec_cmd(cmd, False)
|
||||
cmd = 'ip -s $NS link set $DEV1 up'
|
||||
exec_cmd(cmd, False)
|
||||
|
||||
|
||||
def ns_destroy():
|
||||
"""
|
||||
Destroy the network namespace for testing (and any associated network
|
||||
devices as well)
|
||||
"""
|
||||
if (USE_NS):
|
||||
cmd = 'ip netns delete $NS'
|
||||
exec_cmd(cmd, False)
|
||||
|
||||
|
||||
def has_blank_ids(idlist):
|
||||
"""
|
||||
Search the list for empty ID fields and return true/false accordingly.
|
||||
"""
|
||||
return not(all(k for k in idlist))
|
||||
|
||||
|
||||
def load_from_file(filename):
|
||||
"""
|
||||
Open the JSON file containing the test cases and return them as an
|
||||
ordered dictionary object.
|
||||
"""
|
||||
with open(filename) as test_data:
|
||||
testlist = json.load(test_data, object_pairs_hook=OrderedDict)
|
||||
idlist = get_id_list(testlist)
|
||||
if (has_blank_ids(idlist)):
|
||||
for k in testlist:
|
||||
k['filename'] = filename
|
||||
return testlist
|
||||
|
||||
|
||||
def args_parse():
|
||||
"""
|
||||
Create the argument parser.
|
||||
"""
|
||||
parser = argparse.ArgumentParser(description='Linux TC unit tests')
|
||||
return parser
|
||||
|
||||
|
||||
def set_args(parser):
|
||||
"""
|
||||
Set the command line arguments for tdc.
|
||||
"""
|
||||
parser.add_argument('-p', '--path', type=str,
|
||||
help='The full path to the tc executable to use')
|
||||
parser.add_argument('-c', '--category', type=str, nargs='?', const='+c',
|
||||
help='Run tests only from the specified category, or if no category is specified, list known categories.')
|
||||
parser.add_argument('-f', '--file', type=str,
|
||||
help='Run tests from the specified file')
|
||||
parser.add_argument('-l', '--list', type=str, nargs='?', const="", metavar='CATEGORY',
|
||||
help='List all test cases, or those only within the specified category')
|
||||
parser.add_argument('-s', '--show', type=str, nargs=1, metavar='ID', dest='showID',
|
||||
help='Display the test case with specified id')
|
||||
parser.add_argument('-e', '--execute', type=str, nargs=1, metavar='ID',
|
||||
help='Execute the single test case with specified ID')
|
||||
parser.add_argument('-i', '--id', action='store_true', dest='gen_id',
|
||||
help='Generate ID numbers for new test cases')
|
||||
return parser
|
||||
return parser
|
||||
|
||||
|
||||
def check_default_settings(args):
|
||||
"""
|
||||
Process any arguments overriding the default settings, and ensure the
|
||||
settings are correct.
|
||||
"""
|
||||
# Allow for overriding specific settings
|
||||
global NAMES
|
||||
|
||||
if args.path != None:
|
||||
NAMES['TC'] = args.path
|
||||
if not os.path.isfile(NAMES['TC']):
|
||||
print("The specified tc path " + NAMES['TC'] + " does not exist.")
|
||||
exit(1)
|
||||
|
||||
|
||||
def get_id_list(alltests):
|
||||
"""
|
||||
Generate a list of all IDs in the test cases.
|
||||
"""
|
||||
return [x["id"] for x in alltests]
|
||||
|
||||
|
||||
def check_case_id(alltests):
|
||||
"""
|
||||
Check for duplicate test case IDs.
|
||||
"""
|
||||
idl = get_id_list(alltests)
|
||||
return [x for x in idl if idl.count(x) > 1]
|
||||
|
||||
|
||||
def does_id_exist(alltests, newid):
|
||||
"""
|
||||
Check if a given ID already exists in the list of test cases.
|
||||
"""
|
||||
idl = get_id_list(alltests)
|
||||
return (any(newid == x for x in idl))
|
||||
|
||||
|
||||
def generate_case_ids(alltests):
|
||||
"""
|
||||
If a test case has a blank ID field, generate a random hex ID for it
|
||||
and then write the test cases back to disk.
|
||||
"""
|
||||
import random
|
||||
for c in alltests:
|
||||
if (c["id"] == ""):
|
||||
while True:
|
||||
newid = str('%04x' % random.randrange(16**4))
|
||||
if (does_id_exist(alltests, newid)):
|
||||
continue
|
||||
else:
|
||||
c['id'] = newid
|
||||
break
|
||||
|
||||
ufilename = []
|
||||
for c in alltests:
|
||||
if ('filename' in c):
|
||||
ufilename.append(c['filename'])
|
||||
ufilename = get_unique_item(ufilename)
|
||||
for f in ufilename:
|
||||
testlist = []
|
||||
for t in alltests:
|
||||
if 'filename' in t:
|
||||
if t['filename'] == f:
|
||||
del t['filename']
|
||||
testlist.append(t)
|
||||
outfile = open(f, "w")
|
||||
json.dump(testlist, outfile, indent=4)
|
||||
outfile.close()
|
||||
|
||||
|
||||
def get_test_cases(args):
|
||||
"""
|
||||
If a test case file is specified, retrieve tests from that file.
|
||||
Otherwise, glob for all json files in subdirectories and load from
|
||||
each one.
|
||||
"""
|
||||
import fnmatch
|
||||
if args.file != None:
|
||||
if not os.path.isfile(args.file):
|
||||
print("The specified test case file " + args.file + " does not exist.")
|
||||
exit(1)
|
||||
flist = [args.file]
|
||||
else:
|
||||
flist = []
|
||||
for root, dirnames, filenames in os.walk('tc-tests'):
|
||||
for filename in fnmatch.filter(filenames, '*.json'):
|
||||
flist.append(os.path.join(root, filename))
|
||||
alltests = list()
|
||||
for casefile in flist:
|
||||
alltests = alltests + (load_from_file(casefile))
|
||||
return alltests
|
||||
|
||||
|
||||
def set_operation_mode(args):
|
||||
"""
|
||||
Load the test case data and process remaining arguments to determine
|
||||
what the script should do for this run, and call the appropriate
|
||||
function.
|
||||
"""
|
||||
alltests = get_test_cases(args)
|
||||
|
||||
if args.gen_id:
|
||||
idlist = get_id_list(alltests)
|
||||
if (has_blank_ids(idlist)):
|
||||
alltests = generate_case_ids(alltests)
|
||||
else:
|
||||
print("No empty ID fields found in test files.")
|
||||
exit(0)
|
||||
|
||||
duplicate_ids = check_case_id(alltests)
|
||||
if (len(duplicate_ids) > 0):
|
||||
print("The following test case IDs are not unique:")
|
||||
print(str(set(duplicate_ids)))
|
||||
print("Please correct them before continuing.")
|
||||
exit(1)
|
||||
|
||||
ucat = get_test_categories(alltests)
|
||||
|
||||
if args.showID:
|
||||
show_test_case_by_id(alltests, args.showID[0])
|
||||
exit(0)
|
||||
|
||||
if args.execute:
|
||||
target_id = args.execute[0]
|
||||
else:
|
||||
target_id = ""
|
||||
|
||||
if args.category:
|
||||
if (args.category == '+c'):
|
||||
print("Available categories:")
|
||||
print_sll(ucat)
|
||||
exit(0)
|
||||
else:
|
||||
target_category = args.category
|
||||
else:
|
||||
target_category = ""
|
||||
|
||||
|
||||
testcases = get_categorized_testlist(alltests, ucat)
|
||||
|
||||
if args.list:
|
||||
if (len(args.list) == 0):
|
||||
list_test_cases(alltests)
|
||||
exit(0)
|
||||
elif(len(args.list > 0)):
|
||||
if (args.list not in ucat):
|
||||
print("Unknown category " + args.list)
|
||||
print("Available categories:")
|
||||
print_sll(ucat)
|
||||
exit(1)
|
||||
list_test_cases(testcases[args.list])
|
||||
exit(0)
|
||||
|
||||
if (os.geteuid() != 0):
|
||||
print("This script must be run with root privileges.\n")
|
||||
exit(1)
|
||||
|
||||
ns_create()
|
||||
|
||||
if (len(target_category) == 0):
|
||||
if (len(target_id) > 0):
|
||||
alltests = list(filter(lambda x: target_id in x['id'], alltests))
|
||||
if (len(alltests) == 0):
|
||||
print("Cannot find a test case with ID matching " + target_id)
|
||||
exit(1)
|
||||
catresults = test_runner(alltests)
|
||||
print("All test results: " + "\n\n" + catresults)
|
||||
elif (len(target_category) > 0):
|
||||
if (target_category not in ucat):
|
||||
print("Specified category is not present in this file.")
|
||||
exit(1)
|
||||
else:
|
||||
catresults = test_runner(testcases[target_category])
|
||||
print("Category " + target_category + "\n\n" + catresults)
|
||||
|
||||
ns_destroy()
|
||||
|
||||
|
||||
def main():
|
||||
"""
|
||||
Start of execution; set up argument parser and get the arguments,
|
||||
and start operations.
|
||||
"""
|
||||
parser = args_parse()
|
||||
parser = set_args(parser)
|
||||
(args, remaining) = parser.parse_known_args()
|
||||
check_default_settings(args)
|
||||
|
||||
set_operation_mode(args)
|
||||
|
||||
exit(0)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
17
tools/testing/selftests/tc-testing/tdc_config.py
Normal file
17
tools/testing/selftests/tc-testing/tdc_config.py
Normal file
@@ -0,0 +1,17 @@
|
||||
"""
|
||||
tdc_config.py - tdc user-specified values
|
||||
|
||||
Copyright (C) 2017 Lucas Bates <lucasb@mojatatu.com>
|
||||
"""
|
||||
|
||||
# Dictionary containing all values that can be substituted in executable
|
||||
# commands.
|
||||
NAMES = {
|
||||
# Substitute your own tc path here
|
||||
'TC': '/sbin/tc',
|
||||
# Name of veth devices to be created for the namespace
|
||||
'DEV0': 'v0p0',
|
||||
'DEV1': 'v0p1',
|
||||
# Name of the namespace to use
|
||||
'NS': 'tcut'
|
||||
}
|
75
tools/testing/selftests/tc-testing/tdc_helper.py
Normal file
75
tools/testing/selftests/tc-testing/tdc_helper.py
Normal file
@@ -0,0 +1,75 @@
|
||||
"""
|
||||
tdc_helper.py - tdc helper functions
|
||||
|
||||
Copyright (C) 2017 Lucas Bates <lucasb@mojatatu.com>
|
||||
"""
|
||||
|
||||
def get_categorized_testlist(alltests, ucat):
|
||||
""" Sort the master test list into categories. """
|
||||
testcases = dict()
|
||||
|
||||
for category in ucat:
|
||||
testcases[category] = list(filter(lambda x: category in x['category'], alltests))
|
||||
|
||||
return(testcases)
|
||||
|
||||
|
||||
def get_unique_item(lst):
|
||||
""" For a list, return a set of the unique items in the list. """
|
||||
return list(set(lst))
|
||||
|
||||
|
||||
def get_test_categories(alltests):
|
||||
""" Discover all unique test categories present in the test case file. """
|
||||
ucat = []
|
||||
for t in alltests:
|
||||
ucat.extend(get_unique_item(t['category']))
|
||||
ucat = get_unique_item(ucat)
|
||||
return ucat
|
||||
|
||||
def list_test_cases(testlist):
|
||||
""" Print IDs and names of all test cases. """
|
||||
for curcase in testlist:
|
||||
print(curcase['id'] + ': (' + ', '.join(curcase['category']) + ") " + curcase['name'])
|
||||
|
||||
|
||||
def list_categories(testlist):
|
||||
""" Show all categories that are present in a test case file. """
|
||||
categories = set(map(lambda x: x['category'], testlist))
|
||||
print("Available categories:")
|
||||
print(", ".join(str(s) for s in categories))
|
||||
print("")
|
||||
|
||||
|
||||
def print_list(cmdlist):
|
||||
""" Print a list of strings prepended with a tab. """
|
||||
for l in cmdlist:
|
||||
if (type(l) == list):
|
||||
print("\t" + str(l[0]))
|
||||
else:
|
||||
print("\t" + str(l))
|
||||
|
||||
|
||||
def print_sll(items):
|
||||
print("\n".join(str(s) for s in items))
|
||||
|
||||
|
||||
def print_test_case(tcase):
|
||||
""" Pretty-printing of a given test case. """
|
||||
for k in tcase.keys():
|
||||
if (type(tcase[k]) == list):
|
||||
print(k + ":")
|
||||
print_list(tcase[k])
|
||||
else:
|
||||
print(k + ": " + tcase[k])
|
||||
|
||||
|
||||
def show_test_case_by_id(testlist, caseID):
|
||||
""" Find the specified test case to pretty-print. """
|
||||
if not any(d.get('id', None) == caseID for d in testlist):
|
||||
print("That ID does not exist.")
|
||||
exit(1)
|
||||
else:
|
||||
print_test_case(next((d for d in testlist if d['id'] == caseID)))
|
||||
|
||||
|
Reference in New Issue
Block a user