| #!/bin/bash |
| # SPDX-License-Identifier: GPL-2.0 |
| # Copyright (C) 2018 Joe Lawrence <joe.lawrence@redhat.com> |
| |
| # Shell functions for the rest of the scripts. |
| |
| MAX_RETRIES=600 |
| RETRY_INTERVAL=".1" # seconds |
| KLP_SYSFS_DIR="/sys/kernel/livepatch" |
| |
| # Kselftest framework requirement - SKIP code is 4 |
| ksft_skip=4 |
| |
| # log(msg) - write message to kernel log |
| # msg - insightful words |
| function log() { |
| echo "$1" > /dev/kmsg |
| } |
| |
| # skip(msg) - testing can't proceed |
| # msg - explanation |
| function skip() { |
| log "SKIP: $1" |
| echo "SKIP: $1" >&2 |
| exit $ksft_skip |
| } |
| |
| # root test |
| function is_root() { |
| uid=$(id -u) |
| if [ $uid -ne 0 ]; then |
| echo "skip all tests: must be run as root" >&2 |
| exit $ksft_skip |
| fi |
| } |
| |
| # die(msg) - game over, man |
| # msg - dying words |
| function die() { |
| log "ERROR: $1" |
| echo "ERROR: $1" >&2 |
| exit 1 |
| } |
| |
| # save existing dmesg so we can detect new content |
| function save_dmesg() { |
| SAVED_DMESG=$(mktemp --tmpdir -t klp-dmesg-XXXXXX) |
| dmesg > "$SAVED_DMESG" |
| } |
| |
| # cleanup temporary dmesg file from save_dmesg() |
| function cleanup_dmesg_file() { |
| rm -f "$SAVED_DMESG" |
| } |
| |
| function push_config() { |
| DYNAMIC_DEBUG=$(grep '^kernel/livepatch' /sys/kernel/debug/dynamic_debug/control | \ |
| awk -F'[: ]' '{print "file " $1 " line " $2 " " $4}') |
| FTRACE_ENABLED=$(sysctl --values kernel.ftrace_enabled) |
| } |
| |
| function pop_config() { |
| if [[ -n "$DYNAMIC_DEBUG" ]]; then |
| echo -n "$DYNAMIC_DEBUG" > /sys/kernel/debug/dynamic_debug/control |
| fi |
| if [[ -n "$FTRACE_ENABLED" ]]; then |
| sysctl kernel.ftrace_enabled="$FTRACE_ENABLED" &> /dev/null |
| fi |
| } |
| |
| function set_dynamic_debug() { |
| cat <<-EOF > /sys/kernel/debug/dynamic_debug/control |
| file kernel/livepatch/* +p |
| func klp_try_switch_task -p |
| EOF |
| } |
| |
| function set_ftrace_enabled() { |
| local can_fail=0 |
| if [[ "$1" == "--fail" ]] ; then |
| can_fail=1 |
| shift |
| fi |
| |
| local err=$(sysctl -q kernel.ftrace_enabled="$1" 2>&1) |
| local result=$(sysctl --values kernel.ftrace_enabled) |
| |
| if [[ "$result" != "$1" ]] ; then |
| if [[ $can_fail -eq 1 ]] ; then |
| echo "livepatch: $err" | sed 's#/proc/sys/kernel/#kernel.#' > /dev/kmsg |
| return |
| fi |
| |
| skip "failed to set kernel.ftrace_enabled = $1" |
| fi |
| |
| echo "livepatch: kernel.ftrace_enabled = $result" > /dev/kmsg |
| } |
| |
| function cleanup() { |
| pop_config |
| cleanup_dmesg_file |
| } |
| |
| # setup_config - save the current config and set a script exit trap that |
| # restores the original config. Setup the dynamic debug |
| # for verbose livepatching output and turn on |
| # the ftrace_enabled sysctl. |
| function setup_config() { |
| is_root |
| push_config |
| set_dynamic_debug |
| set_ftrace_enabled 1 |
| trap cleanup EXIT INT TERM HUP |
| } |
| |
| # loop_until(cmd) - loop a command until it is successful or $MAX_RETRIES, |
| # sleep $RETRY_INTERVAL between attempts |
| # cmd - command and its arguments to run |
| function loop_until() { |
| local cmd="$*" |
| local i=0 |
| while true; do |
| eval "$cmd" && return 0 |
| [[ $((i++)) -eq $MAX_RETRIES ]] && return 1 |
| sleep $RETRY_INTERVAL |
| done |
| } |
| |
| function assert_mod() { |
| local mod="$1" |
| |
| modprobe --dry-run "$mod" &>/dev/null |
| } |
| |
| function is_livepatch_mod() { |
| local mod="$1" |
| |
| if [[ $(modinfo "$mod" | awk '/^livepatch:/{print $NF}') == "Y" ]]; then |
| return 0 |
| fi |
| |
| return 1 |
| } |
| |
| function __load_mod() { |
| local mod="$1"; shift |
| |
| local msg="% modprobe $mod $*" |
| log "${msg%% }" |
| ret=$(modprobe "$mod" "$@" 2>&1) |
| if [[ "$ret" != "" ]]; then |
| die "$ret" |
| fi |
| |
| # Wait for module in sysfs ... |
| loop_until '[[ -e "/sys/module/$mod" ]]' || |
| die "failed to load module $mod" |
| } |
| |
| |
| # load_mod(modname, params) - load a kernel module |
| # modname - module name to load |
| # params - module parameters to pass to modprobe |
| function load_mod() { |
| local mod="$1"; shift |
| |
| assert_mod "$mod" || |
| skip "unable to load module ${mod}, verify CONFIG_TEST_LIVEPATCH=m and run self-tests as root" |
| |
| is_livepatch_mod "$mod" && |
| die "use load_lp() to load the livepatch module $mod" |
| |
| __load_mod "$mod" "$@" |
| } |
| |
| # load_lp_nowait(modname, params) - load a kernel module with a livepatch |
| # but do not wait on until the transition finishes |
| # modname - module name to load |
| # params - module parameters to pass to modprobe |
| function load_lp_nowait() { |
| local mod="$1"; shift |
| |
| assert_mod "$mod" || |
| skip "unable to load module ${mod}, verify CONFIG_TEST_LIVEPATCH=m and run self-tests as root" |
| |
| is_livepatch_mod "$mod" || |
| die "module $mod is not a livepatch" |
| |
| __load_mod "$mod" "$@" |
| |
| # Wait for livepatch in sysfs ... |
| loop_until '[[ -e "/sys/kernel/livepatch/$mod" ]]' || |
| die "failed to load module $mod (sysfs)" |
| } |
| |
| # load_lp(modname, params) - load a kernel module with a livepatch |
| # modname - module name to load |
| # params - module parameters to pass to modprobe |
| function load_lp() { |
| local mod="$1"; shift |
| |
| load_lp_nowait "$mod" "$@" |
| |
| # Wait until the transition finishes ... |
| loop_until 'grep -q '^0$' /sys/kernel/livepatch/$mod/transition' || |
| die "failed to complete transition" |
| } |
| |
| # load_failing_mod(modname, params) - load a kernel module, expect to fail |
| # modname - module name to load |
| # params - module parameters to pass to modprobe |
| function load_failing_mod() { |
| local mod="$1"; shift |
| |
| local msg="% modprobe $mod $*" |
| log "${msg%% }" |
| ret=$(modprobe "$mod" "$@" 2>&1) |
| if [[ "$ret" == "" ]]; then |
| die "$mod unexpectedly loaded" |
| fi |
| log "$ret" |
| } |
| |
| # unload_mod(modname) - unload a kernel module |
| # modname - module name to unload |
| function unload_mod() { |
| local mod="$1" |
| |
| # Wait for module reference count to clear ... |
| loop_until '[[ $(cat "/sys/module/$mod/refcnt") == "0" ]]' || |
| die "failed to unload module $mod (refcnt)" |
| |
| log "% rmmod $mod" |
| ret=$(rmmod "$mod" 2>&1) |
| if [[ "$ret" != "" ]]; then |
| die "$ret" |
| fi |
| |
| # Wait for module in sysfs ... |
| loop_until '[[ ! -e "/sys/module/$mod" ]]' || |
| die "failed to unload module $mod (/sys/module)" |
| } |
| |
| # unload_lp(modname) - unload a kernel module with a livepatch |
| # modname - module name to unload |
| function unload_lp() { |
| unload_mod "$1" |
| } |
| |
| # disable_lp(modname) - disable a livepatch |
| # modname - module name to unload |
| function disable_lp() { |
| local mod="$1" |
| |
| log "% echo 0 > /sys/kernel/livepatch/$mod/enabled" |
| echo 0 > /sys/kernel/livepatch/"$mod"/enabled |
| |
| # Wait until the transition finishes and the livepatch gets |
| # removed from sysfs... |
| loop_until '[[ ! -e "/sys/kernel/livepatch/$mod" ]]' || |
| die "failed to disable livepatch $mod" |
| } |
| |
| # set_pre_patch_ret(modname, pre_patch_ret) |
| # modname - module name to set |
| # pre_patch_ret - new pre_patch_ret value |
| function set_pre_patch_ret { |
| local mod="$1"; shift |
| local ret="$1" |
| |
| log "% echo $ret > /sys/module/$mod/parameters/pre_patch_ret" |
| echo "$ret" > /sys/module/"$mod"/parameters/pre_patch_ret |
| |
| # Wait for sysfs value to hold ... |
| loop_until '[[ $(cat "/sys/module/$mod/parameters/pre_patch_ret") == "$ret" ]]' || |
| die "failed to set pre_patch_ret parameter for $mod module" |
| } |
| |
| function start_test { |
| local test="$1" |
| |
| save_dmesg |
| echo -n "TEST: $test ... " |
| log "===== TEST: $test =====" |
| } |
| |
| # check_result() - verify dmesg output |
| # TODO - better filter, out of order msgs, etc? |
| function check_result { |
| local expect="$*" |
| local result |
| |
| # Note: when comparing dmesg output, the kernel log timestamps |
| # help differentiate repeated testing runs. Remove them with a |
| # post-comparison sed filter. |
| |
| result=$(dmesg | comm --nocheck-order -13 "$SAVED_DMESG" - | \ |
| grep -e 'livepatch:' -e 'test_klp' | \ |
| grep -v '\(tainting\|taints\) kernel' | \ |
| sed 's/^\[[ 0-9.]*\] //') |
| |
| if [[ "$expect" == "$result" ]] ; then |
| echo "ok" |
| else |
| echo -e "not ok\n\n$(diff -upr --label expected --label result <(echo "$expect") <(echo "$result"))\n" |
| die "livepatch kselftest(s) failed" |
| fi |
| |
| cleanup_dmesg_file |
| } |
| |
| # check_sysfs_rights(modname, rel_path, expected_rights) - check sysfs |
| # path permissions |
| # modname - livepatch module creating the sysfs interface |
| # rel_path - relative path of the sysfs interface |
| # expected_rights - expected access rights |
| function check_sysfs_rights() { |
| local mod="$1"; shift |
| local rel_path="$1"; shift |
| local expected_rights="$1"; shift |
| |
| local path="$KLP_SYSFS_DIR/$mod/$rel_path" |
| local rights=$(/bin/stat --format '%A' "$path") |
| if test "$rights" != "$expected_rights" ; then |
| die "Unexpected access rights of $path: $expected_rights vs. $rights" |
| fi |
| } |
| |
| # check_sysfs_value(modname, rel_path, expected_value) - check sysfs value |
| # modname - livepatch module creating the sysfs interface |
| # rel_path - relative path of the sysfs interface |
| # expected_value - expected value read from the file |
| function check_sysfs_value() { |
| local mod="$1"; shift |
| local rel_path="$1"; shift |
| local expected_value="$1"; shift |
| |
| local path="$KLP_SYSFS_DIR/$mod/$rel_path" |
| local value=`cat $path` |
| if test "$value" != "$expected_value" ; then |
| die "Unexpected value in $path: $expected_value vs. $value" |
| fi |
| } |