1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2022 Meta Platforms, Inc. and affiliates.*/
6 #include <sys/syscall.h>
8 #include <test_progs.h>
10 #include "rcu_read_lock.skel.h"
11 #include "cgroup_helpers.h"
13 static unsigned long long cgroup_id;
15 static void test_success(void)
17 struct rcu_read_lock *skel;
20 skel = rcu_read_lock__open();
21 if (!ASSERT_OK_PTR(skel, "skel_open"))
24 skel->bss->target_pid = syscall(SYS_gettid);
26 bpf_program__set_autoload(skel->progs.get_cgroup_id, true);
27 bpf_program__set_autoload(skel->progs.task_succ, true);
28 bpf_program__set_autoload(skel->progs.no_lock, true);
29 bpf_program__set_autoload(skel->progs.two_regions, true);
30 bpf_program__set_autoload(skel->progs.non_sleepable_1, true);
31 bpf_program__set_autoload(skel->progs.non_sleepable_2, true);
32 err = rcu_read_lock__load(skel);
33 if (!ASSERT_OK(err, "skel_load"))
36 err = rcu_read_lock__attach(skel);
37 if (!ASSERT_OK(err, "skel_attach"))
42 ASSERT_EQ(skel->bss->task_storage_val, 2, "task_storage_val");
43 ASSERT_EQ(skel->bss->cgroup_id, cgroup_id, "cgroup_id");
45 rcu_read_lock__destroy(skel);
48 static void test_rcuptr_acquire(void)
50 struct rcu_read_lock *skel;
53 skel = rcu_read_lock__open();
54 if (!ASSERT_OK_PTR(skel, "skel_open"))
57 skel->bss->target_pid = syscall(SYS_gettid);
59 bpf_program__set_autoload(skel->progs.task_acquire, true);
60 err = rcu_read_lock__load(skel);
61 if (!ASSERT_OK(err, "skel_load"))
64 err = rcu_read_lock__attach(skel);
65 ASSERT_OK(err, "skel_attach");
67 rcu_read_lock__destroy(skel);
70 static const char * const inproper_region_tests[] = {
73 "non_sleepable_rcu_mismatch",
74 "inproper_sleepable_helper",
75 "inproper_sleepable_kfunc",
79 static void test_inproper_region(void)
81 struct rcu_read_lock *skel;
82 struct bpf_program *prog;
85 for (i = 0; i < ARRAY_SIZE(inproper_region_tests); i++) {
86 skel = rcu_read_lock__open();
87 if (!ASSERT_OK_PTR(skel, "skel_open"))
90 prog = bpf_object__find_program_by_name(skel->obj, inproper_region_tests[i]);
91 if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
93 bpf_program__set_autoload(prog, true);
94 err = rcu_read_lock__load(skel);
95 ASSERT_ERR(err, "skel_load");
97 rcu_read_lock__destroy(skel);
101 static const char * const rcuptr_misuse_tests[] = {
102 "task_untrusted_non_rcuptr",
103 "task_untrusted_rcuptr",
107 static void test_rcuptr_misuse(void)
109 struct rcu_read_lock *skel;
110 struct bpf_program *prog;
113 for (i = 0; i < ARRAY_SIZE(rcuptr_misuse_tests); i++) {
114 skel = rcu_read_lock__open();
115 if (!ASSERT_OK_PTR(skel, "skel_open"))
118 prog = bpf_object__find_program_by_name(skel->obj, rcuptr_misuse_tests[i]);
119 if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name"))
121 bpf_program__set_autoload(prog, true);
122 err = rcu_read_lock__load(skel);
123 ASSERT_ERR(err, "skel_load");
125 rcu_read_lock__destroy(skel);
129 void test_rcu_read_lock(void)
131 struct btf *vmlinux_btf;
134 vmlinux_btf = btf__load_vmlinux_btf();
135 if (!ASSERT_OK_PTR(vmlinux_btf, "could not load vmlinux BTF"))
137 if (btf__find_by_name_kind(vmlinux_btf, "rcu", BTF_KIND_TYPE_TAG) < 0) {
142 cgroup_fd = test__join_cgroup("/rcu_read_lock");
143 if (!ASSERT_GE(cgroup_fd, 0, "join_cgroup /rcu_read_lock"))
146 cgroup_id = get_cgroup_id("/rcu_read_lock");
147 if (test__start_subtest("success"))
149 if (test__start_subtest("rcuptr_acquire"))
150 test_rcuptr_acquire();
151 if (test__start_subtest("negative_tests_inproper_region"))
152 test_inproper_region();
153 if (test__start_subtest("negative_tests_rcuptr_misuse"))
154 test_rcuptr_misuse();
157 btf__free(vmlinux_btf);