From nobody Wed Nov 27 10:46:26 2024 Received: from mail-ot1-f46.google.com (mail-ot1-f46.google.com [209.85.210.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id F3F0D1F9A9D; Fri, 11 Oct 2024 04:49:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.46 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622143; cv=none; b=AjOOdWquCvv7V1tzquVysivAOLUyiZdMqFWQjC20imT/dNRLER0GJcWMn6PnuOCQRf5ylkjuR5TPVePPj2wUgGlDcTp3jtvjKpzSsHD6D/vnpQhSNSn8vlM/YI0YKP78PlqdSEvX0eIbAyas6JY4wSOBSGkc1RU9WRDBapjsl84= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622143; c=relaxed/simple; bh=AQATHK/PV8Tfdyb7cN93ExUjgpXhpm0zBzQn24ocW14=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=LlKgwfAPmnZW9PGZ3/C2RfquCdP5AEUWY+/9dFwsOvK4573e9MVqflpZcyvvubwXm4NSHWJFosVaW0DoTHpYX31RfTCiCy/yMSBQoD8Jue6ZSDwu182SPdCqhFKqxKsXHgGD3BmCBYl+j9iMDx44vkYnGvBLnFKtCIat3JW++v4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=P8nN42MS; arc=none smtp.client-ip=209.85.210.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="P8nN42MS" Received: by mail-ot1-f46.google.com with SMTP id 46e09a7af769-7167af5ead0so888697a34.0; Thu, 10 Oct 2024 21:49:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1728622140; x=1729226940; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=1yWZPLkwxKJjT9XbDV5CM9kU8hB23DKMJ7kKlzBt4Tw=; b=P8nN42MSQI2svdHqZ21GbTq/6NqxloBH8nMyXmeEJ7/dEqtXzTBkox8kmlAoCEs8yD +jarvO8DHHiL3Uz5LwkYPh5N0lI4A9RjdCSaT9HsJVXuROCJG8scouP/ZUWNvif3WZiE BgCNXlRf1NdqOlRWrMWQH2NHHHnkEsBkAgw2nkO489XtL7wanhMC6VLw6MfGa/+AI5B9 Gpbw4/5QqcJMj60aNouY3BVbRiug1zJYmm1Qlixf9RAPLVGZCY4A4R0s74IGp0fBD1KD TmmM+iOjYF4UgYJezSK0EWe0qlt3ffQjD3uQMb3tSLowzUSVVimx6X/ss0P0C9FNHD4y AxaQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728622140; x=1729226940; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1yWZPLkwxKJjT9XbDV5CM9kU8hB23DKMJ7kKlzBt4Tw=; b=tePALz2D6V9j1+TJBF4LLA2PkTvM8e9ENw9eqJR2K1ZoNJITQ1B0t1berTY/0RlHpM 7ybno+89aZeLA2IcWGqDvgBbDYiFpTtYBcJYdxl6apoqB2QU1JGfW/im4rdYiI10OGZr DV4AT+lJ+CzTft6TDgEOjAcSYgBBnxG0fx6pRcxd3+SsPRr84CRclWCfxWTsiGwNHoa7 wduCvCISSK3mSDnuzjU8vTKIrz3Dq7nXlurzjxFdy05KWQZKz5TA8Fkp+lSOypSueX4t lnWCduM2JiVO6iq5juSo4B/c7c1qw/uA23nwZ0rIiRtS4Xd//HCv7G4TB0OAbmMIdGGO uLAw== X-Forwarded-Encrypted: i=1; AJvYcCUOf4ilHSWEksuL/gQxl8/17VfPR/AjaNeFHQ7697NniRcfVJRrzxpLruv4Bcj+duZEEkJo+7j5@vger.kernel.org, AJvYcCUcfNbqwSvR6WMtRLQN5vVnnrVhgHRe7kRbkDafyzlYl8X1G/u/M8usqirXeICFtr1FPSeueOyZbH6lZ5dfrMQl@vger.kernel.org, AJvYcCX87J40pDxn9BdrdUPOnttJvFqNDDSTmU7912kP5WNUJlujlYwFXeMgx6M2k/8LAOPVwVO7kLIiVf+LCl0=@vger.kernel.org X-Gm-Message-State: AOJu0Yx1vlqIfIqI5fEuflsaTv8EyhUWZ27sQu9R3X+VCn/+ER4a++Qu 5ZCzG9w0fy+xwGK1JovivfEFb0/U5vw5VBSDqnzBIaQ/nWcr3onucgJuoeE= X-Google-Smtp-Source: AGHT+IHoiyVXVr2Ir6z2MwQ4oEMUn450owGtoazgxBt5uzgFSJrRCm5FbfZixqQllNd1CzZ/f6j9Kg== X-Received: by 2002:a05:6830:43a0:b0:715:35c8:6412 with SMTP id 46e09a7af769-717d6470d95mr1341258a34.22.1728622139834; Thu, 10 Oct 2024 21:48:59 -0700 (PDT) Received: from vagrant.. ([114.71.48.94]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-71e2ab105f9sm1856692b3a.216.2024.10.10.21.48.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Oct 2024 21:48:59 -0700 (PDT) From: "Daniel T. Lee" To: Daniel Borkmann , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, LKML Subject: [PATCH,bpf-next v3 1/4] selftests/bpf: migrate cgroup sock create test for setting iface/mark/prio Date: Fri, 11 Oct 2024 04:48:44 +0000 Message-ID: <20241011044847.51584-2-danieltimlee@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241011044847.51584-1-danieltimlee@gmail.com> References: <20241011044847.51584-1-danieltimlee@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This patch migrates the old test for cgroup BPF that sets sk_bound_dev_if, mark, and priority when AF_INET{6} sockets are created. The most closely related tests under selftests are 'test_sock' and 'sockopt'. However, these existing tests serve different purposes. 'test_sock' focuses mainly on verifying the socket binding process, while 'sockopt' concentrates on testing the behavior of getsockopt and setsockopt operations for various socket options. Neither of these existing tests directly covers the ability of cgroup BPF to set socket attributes such as sk_bound_dev_if, mark, and priority during socket creation. To address this gap, this patch introduces a migration of the old cgroup socket attribute test, now included as the 'sock_create' test in selftests/bpf. This ensures that the ability to configure these attributes during socket creation is properly tested. Signed-off-by: Daniel T. Lee --- samples/bpf/Makefile | 2 - samples/bpf/test_cgrp2_sock.c | 296 ------------------ samples/bpf/test_cgrp2_sock.sh | 137 -------- .../selftests/bpf/prog_tests/sock_create.c | 256 +++++++++++++++ 4 files changed, 256 insertions(+), 435 deletions(-) delete mode 100644 samples/bpf/test_cgrp2_sock.c delete mode 100755 samples/bpf/test_cgrp2_sock.sh create mode 100644 tools/testing/selftests/bpf/prog_tests/sock_create.c diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index 7afe040cf43b..f514c6fb1ae2 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -27,7 +27,6 @@ tprogs-y +=3D map_perf_test tprogs-y +=3D test_overhead tprogs-y +=3D test_cgrp2_array_pin tprogs-y +=3D test_cgrp2_attach -tprogs-y +=3D test_cgrp2_sock tprogs-y +=3D test_cgrp2_sock2 tprogs-y +=3D xdp_router_ipv4 tprogs-y +=3D test_current_task_under_cgroup @@ -76,7 +75,6 @@ map_perf_test-objs :=3D map_perf_test_user.o test_overhead-objs :=3D test_overhead_user.o test_cgrp2_array_pin-objs :=3D test_cgrp2_array_pin.o test_cgrp2_attach-objs :=3D test_cgrp2_attach.o -test_cgrp2_sock-objs :=3D test_cgrp2_sock.o test_cgrp2_sock2-objs :=3D test_cgrp2_sock2.o test_current_task_under_cgroup-objs :=3D $(CGROUP_HELPERS) \ test_current_task_under_cgroup_user.o diff --git a/samples/bpf/test_cgrp2_sock.c b/samples/bpf/test_cgrp2_sock.c deleted file mode 100644 index 8ca2a445ffa1..000000000000 --- a/samples/bpf/test_cgrp2_sock.c +++ /dev/null @@ -1,296 +0,0 @@ -/* eBPF example program: - * - * - Loads eBPF program - * - * The eBPF program sets the sk_bound_dev_if index in new AF_INET{6} - * sockets opened by processes in the cgroup. - * - * - Attaches the new program to a cgroup using BPF_PROG_ATTACH - */ - -#define _GNU_SOURCE - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#include "bpf_insn.h" - -char bpf_log_buf[BPF_LOG_BUF_SIZE]; - -static int prog_load(__u32 idx, __u32 mark, __u32 prio) -{ - /* save pointer to context */ - struct bpf_insn prog_start[] =3D { - BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), - }; - struct bpf_insn prog_end[] =3D { - BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 =3D verdict */ - BPF_EXIT_INSN(), - }; - - /* set sk_bound_dev_if on socket */ - struct bpf_insn prog_dev[] =3D { - BPF_MOV64_IMM(BPF_REG_3, idx), - BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, bound_dev_if)), - BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, bound= _dev_if)), - }; - - /* set mark on socket */ - struct bpf_insn prog_mark[] =3D { - /* get uid of process */ - BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, - BPF_FUNC_get_current_uid_gid), - BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff), - - /* if uid is 0, use given mark, else use the uid as the mark */ - BPF_MOV64_REG(BPF_REG_3, BPF_REG_0), - BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), - BPF_MOV64_IMM(BPF_REG_3, mark), - - /* set the mark on the new socket */ - BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), - BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)), - BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)= ), - }; - - /* set priority on socket */ - struct bpf_insn prog_prio[] =3D { - BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), - BPF_MOV64_IMM(BPF_REG_3, prio), - BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, priority)), - BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, prior= ity)), - }; - LIBBPF_OPTS(bpf_prog_load_opts, opts, - .log_buf =3D bpf_log_buf, - .log_size =3D BPF_LOG_BUF_SIZE, - ); - - struct bpf_insn *prog; - size_t insns_cnt; - void *p; - int ret; - - insns_cnt =3D sizeof(prog_start) + sizeof(prog_end); - if (idx) - insns_cnt +=3D sizeof(prog_dev); - - if (mark) - insns_cnt +=3D sizeof(prog_mark); - - if (prio) - insns_cnt +=3D sizeof(prog_prio); - - p =3D prog =3D malloc(insns_cnt); - if (!prog) { - fprintf(stderr, "Failed to allocate memory for instructions\n"); - return EXIT_FAILURE; - } - - memcpy(p, prog_start, sizeof(prog_start)); - p +=3D sizeof(prog_start); - - if (idx) { - memcpy(p, prog_dev, sizeof(prog_dev)); - p +=3D sizeof(prog_dev); - } - - if (mark) { - memcpy(p, prog_mark, sizeof(prog_mark)); - p +=3D sizeof(prog_mark); - } - - if (prio) { - memcpy(p, prog_prio, sizeof(prog_prio)); - p +=3D sizeof(prog_prio); - } - - memcpy(p, prog_end, sizeof(prog_end)); - p +=3D sizeof(prog_end); - - insns_cnt /=3D sizeof(struct bpf_insn); - - ret =3D bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCK, NULL, "GPL", - prog, insns_cnt, &opts); - - free(prog); - - return ret; -} - -static int get_bind_to_device(int sd, char *name, size_t len) -{ - socklen_t optlen =3D len; - int rc; - - name[0] =3D '\0'; - rc =3D getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen); - if (rc < 0) - perror("setsockopt(SO_BINDTODEVICE)"); - - return rc; -} - -static unsigned int get_somark(int sd) -{ - unsigned int mark =3D 0; - socklen_t optlen =3D sizeof(mark); - int rc; - - rc =3D getsockopt(sd, SOL_SOCKET, SO_MARK, &mark, &optlen); - if (rc < 0) - perror("getsockopt(SO_MARK)"); - - return mark; -} - -static unsigned int get_priority(int sd) -{ - unsigned int prio =3D 0; - socklen_t optlen =3D sizeof(prio); - int rc; - - rc =3D getsockopt(sd, SOL_SOCKET, SO_PRIORITY, &prio, &optlen); - if (rc < 0) - perror("getsockopt(SO_PRIORITY)"); - - return prio; -} - -static int show_sockopts(int family) -{ - unsigned int mark, prio; - char name[16]; - int sd; - - sd =3D socket(family, SOCK_DGRAM, 17); - if (sd < 0) { - perror("socket"); - return 1; - } - - if (get_bind_to_device(sd, name, sizeof(name)) < 0) { - close(sd); - return 1; - } - - mark =3D get_somark(sd); - prio =3D get_priority(sd); - - close(sd); - - printf("sd %d: dev %s, mark %u, priority %u\n", sd, name, mark, prio); - - return 0; -} - -static int usage(const char *argv0) -{ - printf("Usage:\n"); - printf(" Attach a program\n"); - printf(" %s -b bind-to-dev -m mark -p prio cg-path\n", argv0); - printf("\n"); - printf(" Detach a program\n"); - printf(" %s -d cg-path\n", argv0); - printf("\n"); - printf(" Show inherited socket settings (mark, priority, and device)\n"); - printf(" %s [-6]\n", argv0); - return EXIT_FAILURE; -} - -int main(int argc, char **argv) -{ - __u32 idx =3D 0, mark =3D 0, prio =3D 0; - const char *cgrp_path =3D NULL; - int cg_fd, prog_fd, ret; - int family =3D PF_INET; - int do_attach =3D 1; - int rc; - - while ((rc =3D getopt(argc, argv, "db:m:p:6")) !=3D -1) { - switch (rc) { - case 'd': - do_attach =3D 0; - break; - case 'b': - idx =3D if_nametoindex(optarg); - if (!idx) { - idx =3D strtoumax(optarg, NULL, 0); - if (!idx) { - printf("Invalid device name\n"); - return EXIT_FAILURE; - } - } - break; - case 'm': - mark =3D strtoumax(optarg, NULL, 0); - break; - case 'p': - prio =3D strtoumax(optarg, NULL, 0); - break; - case '6': - family =3D PF_INET6; - break; - default: - return usage(argv[0]); - } - } - - if (optind =3D=3D argc) - return show_sockopts(family); - - cgrp_path =3D argv[optind]; - if (!cgrp_path) { - fprintf(stderr, "cgroup path not given\n"); - return EXIT_FAILURE; - } - - if (do_attach && !idx && !mark && !prio) { - fprintf(stderr, - "One of device, mark or priority must be given\n"); - return EXIT_FAILURE; - } - - cg_fd =3D open(cgrp_path, O_DIRECTORY | O_RDONLY); - if (cg_fd < 0) { - printf("Failed to open cgroup path: '%s'\n", strerror(errno)); - return EXIT_FAILURE; - } - - if (do_attach) { - prog_fd =3D prog_load(idx, mark, prio); - if (prog_fd < 0) { - printf("Failed to load prog: '%s'\n", strerror(errno)); - printf("Output from kernel verifier:\n%s\n-------\n", - bpf_log_buf); - return EXIT_FAILURE; - } - - ret =3D bpf_prog_attach(prog_fd, cg_fd, - BPF_CGROUP_INET_SOCK_CREATE, 0); - if (ret < 0) { - printf("Failed to attach prog to cgroup: '%s'\n", - strerror(errno)); - return EXIT_FAILURE; - } - } else { - ret =3D bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE); - if (ret < 0) { - printf("Failed to detach prog from cgroup: '%s'\n", - strerror(errno)); - return EXIT_FAILURE; - } - } - - close(cg_fd); - return EXIT_SUCCESS; -} diff --git a/samples/bpf/test_cgrp2_sock.sh b/samples/bpf/test_cgrp2_sock.sh deleted file mode 100755 index 36bd7cb46f06..000000000000 --- a/samples/bpf/test_cgrp2_sock.sh +++ /dev/null @@ -1,137 +0,0 @@ -#!/bin/sh -# SPDX-License-Identifier: GPL-2.0 - -# Test various socket options that can be set by attaching programs to cgr= oups. - -MY_DIR=3D$(dirname $0) -TEST=3D$MY_DIR/test_cgrp2_sock -CGRP_MNT=3D"/tmp/cgroupv2-test_cgrp2_sock" - -##########################################################################= ###### -# -print_result() -{ - local rc=3D$1 - local status=3D" OK " - - [ $rc -ne 0 ] && status=3D"FAIL" - - printf "%-50s [%4s]\n" "$2" "$status" -} - -check_sock() -{ - out=3D$($TEST) - echo $out | grep -q "$1" - if [ $? -ne 0 ]; then - print_result 1 "IPv4: $2" - echo " expected: $1" - echo " have: $out" - rc=3D1 - else - print_result 0 "IPv4: $2" - fi -} - -check_sock6() -{ - out=3D$($TEST -6) - echo $out | grep -q "$1" - if [ $? -ne 0 ]; then - print_result 1 "IPv6: $2" - echo " expected: $1" - echo " have: $out" - rc=3D1 - else - print_result 0 "IPv6: $2" - fi -} - -##########################################################################= ###### -# - -cleanup() -{ - echo $$ >> ${CGRP_MNT}/cgroup.procs - rmdir ${CGRP_MNT}/sockopts -} - -cleanup_and_exit() -{ - local rc=3D$1 - local msg=3D"$2" - - [ -n "$msg" ] && echo "ERROR: $msg" - - $TEST -d ${CGRP_MNT}/sockopts - ip li del cgrp2_sock - umount ${CGRP_MNT} - - exit $rc -} - - -##########################################################################= ###### -# main - -rc=3D0 - -ip li add cgrp2_sock type dummy 2>/dev/null - -set -e -mkdir -p ${CGRP_MNT} -mount -t cgroup2 none ${CGRP_MNT} -set +e - - -# make sure we have a known start point -cleanup 2>/dev/null - -mkdir -p ${CGRP_MNT}/sockopts -[ $? -ne 0 ] && cleanup_and_exit 1 "Failed to create cgroup hierarchy" - - -# set pid into cgroup -echo $$ > ${CGRP_MNT}/sockopts/cgroup.procs - -# no bpf program attached, so socket should show no settings -check_sock "dev , mark 0, priority 0" "No programs attached" -check_sock6 "dev , mark 0, priority 0" "No programs attached" - -# verify device is set -# -$TEST -b cgrp2_sock ${CGRP_MNT}/sockopts -if [ $? -ne 0 ]; then - cleanup_and_exit 1 "Failed to install program to set device" -fi -check_sock "dev cgrp2_sock, mark 0, priority 0" "Device set" -check_sock6 "dev cgrp2_sock, mark 0, priority 0" "Device set" - -# verify mark is set -# -$TEST -m 666 ${CGRP_MNT}/sockopts -if [ $? -ne 0 ]; then - cleanup_and_exit 1 "Failed to install program to set mark" -fi -check_sock "dev , mark 666, priority 0" "Mark set" -check_sock6 "dev , mark 666, priority 0" "Mark set" - -# verify priority is set -# -$TEST -p 123 ${CGRP_MNT}/sockopts -if [ $? -ne 0 ]; then - cleanup_and_exit 1 "Failed to install program to set priority" -fi -check_sock "dev , mark 0, priority 123" "Priority set" -check_sock6 "dev , mark 0, priority 123" "Priority set" - -# all 3 at once -# -$TEST -b cgrp2_sock -m 666 -p 123 ${CGRP_MNT}/sockopts -if [ $? -ne 0 ]; then - cleanup_and_exit 1 "Failed to install program to set device, mark and pri= ority" -fi -check_sock "dev cgrp2_sock, mark 666, priority 123" "Priority set" -check_sock6 "dev cgrp2_sock, mark 666, priority 123" "Priority set" - -cleanup_and_exit $rc diff --git a/tools/testing/selftests/bpf/prog_tests/sock_create.c b/tools/t= esting/selftests/bpf/prog_tests/sock_create.c new file mode 100644 index 000000000000..072910c05c99 --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/sock_create.c @@ -0,0 +1,256 @@ +// SPDX-License-Identifier: GPL-2.0 +#include +#include +#include "cgroup_helpers.h" + +static char bpf_log_buf[4096]; +static bool verbose; + +static struct sock_create_test { + const char *descr; + const struct bpf_insn insns[64]; + enum bpf_attach_type attach_type; + enum bpf_attach_type expected_attach_type; + + int domain; + int type; + + int optname; + int optval; +} tests[] =3D { + { + .descr =3D "AF_INET set priority", + .insns =3D { + /* r3 =3D 123 (priority) */ + BPF_MOV64_IMM(BPF_REG_3, 123), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, priority)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET, + .type =3D SOCK_DGRAM, + + .optname =3D SO_PRIORITY, + .optval =3D 123, + }, + { + .descr =3D "AF_INET6 set priority", + .insns =3D { + /* r3 =3D 123 (priority) */ + BPF_MOV64_IMM(BPF_REG_3, 123), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, priority)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET6, + .type =3D SOCK_DGRAM, + + .optname =3D SO_PRIORITY, + .optval =3D 123, + }, + { + .descr =3D "AF_INET set mark", + .insns =3D { + BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), + + /* get uid of process */ + BPF_EMIT_CALL(BPF_FUNC_get_current_uid_gid), + BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff), + + /* if uid is 0, use given mark(666), else use uid as the mark */ + BPF_MOV64_REG(BPF_REG_3, BPF_REG_0), + BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), + BPF_MOV64_IMM(BPF_REG_3, 666), + + BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, mark)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET, + .type =3D SOCK_DGRAM, + + .optname =3D SO_MARK, + .optval =3D 666, + }, + { + .descr =3D "AF_INET6 set mark", + .insns =3D { + BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), + + /* get uid of process */ + BPF_EMIT_CALL(BPF_FUNC_get_current_uid_gid), + BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff), + + /* if uid is 0, use given mark(666), else use uid as the mark */ + BPF_MOV64_REG(BPF_REG_3, BPF_REG_0), + BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), + BPF_MOV64_IMM(BPF_REG_3, 666), + + BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, mark)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET6, + .type =3D SOCK_DGRAM, + + .optname =3D SO_MARK, + .optval =3D 666, + }, + { + .descr =3D "AF_INET bound to iface", + .insns =3D { + /* r3 =3D 1 (lo interface) */ + BPF_MOV64_IMM(BPF_REG_3, 1), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, bound_dev_if)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET, + .type =3D SOCK_DGRAM, + + .optname =3D SO_BINDTOIFINDEX, + .optval =3D 1, + }, + { + .descr =3D "AF_INET6 bound to iface", + .insns =3D { + /* r3 =3D 1 (lo interface) */ + BPF_MOV64_IMM(BPF_REG_3, 1), + BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, + offsetof(struct bpf_sock, bound_dev_if)), + + /* return 1 */ + BPF_MOV64_IMM(BPF_REG_0, 1), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET6, + .type =3D SOCK_DGRAM, + + .optname =3D SO_BINDTOIFINDEX, + .optval =3D 1, + }, +}; + +static int load_prog(const struct bpf_insn *insns, + enum bpf_attach_type expected_attach_type) +{ + LIBBPF_OPTS(bpf_prog_load_opts, opts, + .expected_attach_type =3D expected_attach_type, + .log_level =3D 2, + .log_buf =3D bpf_log_buf, + .log_size =3D sizeof(bpf_log_buf), + ); + int fd, insns_cnt =3D 0; + + for (; + insns[insns_cnt].code !=3D (BPF_JMP | BPF_EXIT); + insns_cnt++) { + } + insns_cnt++; + + fd =3D bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCK, NULL, "GPL", insns, + insns_cnt, &opts); + if (verbose && fd < 0) + fprintf(stderr, "%s\n", bpf_log_buf); + + return fd; +} + +static int run_test(int cgroup_fd, struct sock_create_test *test) +{ + int sock_fd, err, prog_fd, optval, ret =3D -1; + socklen_t optlen =3D sizeof(optval); + + prog_fd =3D load_prog(test->insns, test->expected_attach_type); + if (prog_fd < 0) { + log_err("Failed to load BPF program"); + return -1; + } + + err =3D bpf_prog_attach(prog_fd, cgroup_fd, test->attach_type, 0); + if (err < 0) { + log_err("Failed to attach BPF program"); + goto close_prog_fd; + } + + sock_fd =3D socket(test->domain, test->type, 0); + if (sock_fd < 0) { + log_err("Failed to create socket"); + goto detach_prog; + } + + err =3D getsockopt(sock_fd, SOL_SOCKET, test->optname, &optval, &optlen); + if (err) { + log_err("Failed to call getsockopt"); + goto cleanup; + } + + if (optval !=3D test->optval) { + errno =3D 0; + log_err("getsockopt returned unexpected optval"); + goto cleanup; + } + + ret =3D 0; + +cleanup: + close(sock_fd); +detach_prog: + bpf_prog_detach2(prog_fd, cgroup_fd, test->attach_type); +close_prog_fd: + close(prog_fd); + return ret; +} + +void test_sock_create(void) +{ + int cgroup_fd, i; + + cgroup_fd =3D test__join_cgroup("/sock_create"); + if (!ASSERT_GE(cgroup_fd, 0, "join_cgroup")) + return; + + for (i =3D 0; i < ARRAY_SIZE(tests); i++) { + if (!test__start_subtest(tests[i].descr)) + continue; + + ASSERT_OK(run_test(cgroup_fd, &tests[i]), tests[i].descr); + } + + close(cgroup_fd); +} --=20 2.43.0 From nobody Wed Nov 27 10:46:26 2024 Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3AF6020822A; Fri, 11 Oct 2024 04:49:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.170 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622147; cv=none; b=mAQGaTIuKMl57yhXwmcpqN+QLg31m4tYDRdu7Iva5kiAEWyCItNLI7yGg8tR8fty+w6cYDLfPBkTnKWUC1ORpLwmo60VWEXBgkX/d+xRncfWEXOo1eZFCHElxV9KS02qzDawZ+q5zTRGWk7QVOqfA0Xp2VzmsWXiE6u8jf4U3co= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622147; c=relaxed/simple; bh=/3Csn2iY3ryLsMwggjfJb2+4YBLswERuO5MYki5v2D8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=htruGlT4hR1LfX0IQuel096Ja5griV4737jfXdVybA/1rv872oaFgD9vKxSQsDxAwwm7rbBdHon7mf3H+M7Psr/TmhzdI58pZz4iLhzjxEH9NFia3i0qlIKwased1ptrc3tv8L1Z0qp2EuLvWCU8B6m9ScxitvDDVOlmrC1g6lI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=W041YKwn; arc=none smtp.client-ip=209.85.210.170 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="W041YKwn" Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-71df67c67fcso1258207b3a.2; Thu, 10 Oct 2024 21:49:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1728622144; x=1729226944; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=5yUQ1cgsDr4Qid6tB5yuT/0mp984Wn4HZGfKeix08Lo=; b=W041YKwne47EzuFfT6xMcWdtvv+d1zGfCN5Aw6mhfErd4FI+BKS6LvDRya/fE8ZGC3 5DQ137rCGXi3xFP22GIrZJt9mHX0hjEEcScP69/KCUmbe7zcsJ8P3wrLGLvspvMnf7pH C5QIu3jPKf6tviJ7kWRrnFmXeajgDsYqA8iUIvFpW5zZNGprxRqIl1xFaMKJdh7XyyKe jJIK/mHPtRjOYU+lnCroz+NEajQFxpk3x/ldIgkrOYT0g1fnUH3ieEwyn5Vv69fQnKy0 UmA00ZIXXx+VRILpJ81jNm88Z1zmMO3zL/rTGTfzpBQ67L5j8MsnJ+Dn/OPBVSZrxJiG 2VyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728622144; x=1729226944; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=5yUQ1cgsDr4Qid6tB5yuT/0mp984Wn4HZGfKeix08Lo=; b=cERAZEcPVtf37CV3QCrK5W0nb0oX9T6QjUFyZve2vziWyVnXTPXXqMmSuHLZik+xrp 0XgVsvWy3mui1/7Hf0709zFdXNkTjEId0r+6KNFHpovvGLmKPmXAiMPEByCqHHZ2FO4o B047H3Kex8ukuk3i36WnSVBNvKjoH33ZfobtpGdGdFDhiWvFsVlPsFXwczCjLaQI6y45 SV1AV9PQ0t3KHQPvgi8L9Dtdf0fybXXd2wAHn3yUOVn3icfgypH8O382HF5YaBQlOfoK GPa/mQ+xWcBj/PzmIfondiNGeE52SX6aoNh7SOtx0Jr4UFwApEDUP/HyGEIH5cd4DErU yVWQ== X-Forwarded-Encrypted: i=1; AJvYcCW8EoPILY1hmpX6/k7bn5PYiczHmo4N7YiYHLzYq3IaKyPcYYG3tIISrpH2kIXq0Q1lAkeKTtv3tNSFujze8YuF@vger.kernel.org, AJvYcCWnWagNtry96Exznhgtutg6C6aH8F7Xbe0VU4Lxwjv9GIfRQ5lzP1a4yE8tpSGEf+VDSZFV2CBpxvJat2Y=@vger.kernel.org, AJvYcCXY/sF8nJ/jC3o83T3MCWfmn2L10PAIoNknD996M0jHhzzwjdvBavLGQZITzGAIc4GyXxNDGOHi@vger.kernel.org X-Gm-Message-State: AOJu0YwrBvhF0GMwHjD8b7U1EiO3q5wa7F+HFA8VsxB/tztARYXcIOOG 083fmSgpJ1YUlY1sCO1xBnHXX+/Kr+l8r1l24J/a/XGeoYpr75Q= X-Google-Smtp-Source: AGHT+IFu45YqDrZfeT8CVVQndoifzNI52LINo5uogU4r3h8jkjEUk22aUH9/rOMp+u/IhqSKvFuxrw== X-Received: by 2002:a05:6a00:b83:b0:71e:233:9537 with SMTP id d2e1a72fcca58-71e38099b5cmr2246828b3a.28.1728622144298; Thu, 10 Oct 2024 21:49:04 -0700 (PDT) Received: from vagrant.. ([114.71.48.94]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-71e2ab105f9sm1856692b3a.216.2024.10.10.21.49.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Oct 2024 21:49:03 -0700 (PDT) From: "Daniel T. Lee" To: Daniel Borkmann , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, LKML Subject: [PATCH,bpf-next v3 2/4] selftests/bpf: migrate cgroup sock create test for prohibiting sockets Date: Fri, 11 Oct 2024 04:48:45 +0000 Message-ID: <20241011044847.51584-3-danieltimlee@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241011044847.51584-1-danieltimlee@gmail.com> References: <20241011044847.51584-1-danieltimlee@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This patch continues the migration and removal process for cgroup sock_create tests to selftests. The test being migrated verifies the ability of cgroup BPF to block the creation of specific types of sockets using a verdict. Specifically, the test denies socket creation when the socket is of type AF_INET{6}, SOCK_DGRAM, and IPPROTO_ICMP{V6}. If the requested socket type matches these attributes, the cgroup BPF verdict blocks the socket creation. As with the previous commit, this test currently lacks coverage in selftests, so this patch migrates the functionality into the sock_create tests under selftests. This migration ensures that the socket creation blocking behavior with cgroup bpf program is properly tested within the selftest framework. Signed-off-by: Daniel T. Lee --- Chagnes in V2: - commit message change Changes in v3: - Makefile fix samples/bpf/Makefile | 3 - samples/bpf/sock_flags.bpf.c | 47 -------- samples/bpf/test_cgrp2_sock2.c | 95 ---------------- samples/bpf/test_cgrp2_sock2.sh | 103 ------------------ .../selftests/bpf/prog_tests/sock_create.c | 83 +++++++++++++- 5 files changed, 80 insertions(+), 251 deletions(-) delete mode 100644 samples/bpf/sock_flags.bpf.c delete mode 100644 samples/bpf/test_cgrp2_sock2.c delete mode 100755 samples/bpf/test_cgrp2_sock2.sh diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index f514c6fb1ae2..490833f8706a 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -27,7 +27,6 @@ tprogs-y +=3D map_perf_test tprogs-y +=3D test_overhead tprogs-y +=3D test_cgrp2_array_pin tprogs-y +=3D test_cgrp2_attach -tprogs-y +=3D test_cgrp2_sock2 tprogs-y +=3D xdp_router_ipv4 tprogs-y +=3D test_current_task_under_cgroup tprogs-y +=3D trace_event @@ -75,7 +74,6 @@ map_perf_test-objs :=3D map_perf_test_user.o test_overhead-objs :=3D test_overhead_user.o test_cgrp2_array_pin-objs :=3D test_cgrp2_array_pin.o test_cgrp2_attach-objs :=3D test_cgrp2_attach.o -test_cgrp2_sock2-objs :=3D test_cgrp2_sock2.o test_current_task_under_cgroup-objs :=3D $(CGROUP_HELPERS) \ test_current_task_under_cgroup_user.o trace_event-objs :=3D trace_event_user.o $(TRACE_HELPERS) @@ -106,7 +104,6 @@ always-y +=3D tracex4.bpf.o always-y +=3D tracex5.bpf.o always-y +=3D tracex6.bpf.o always-y +=3D tracex7.bpf.o -always-y +=3D sock_flags.bpf.o always-y +=3D test_probe_write_user.bpf.o always-y +=3D trace_output.bpf.o always-y +=3D tcbpf1_kern.o diff --git a/samples/bpf/sock_flags.bpf.c b/samples/bpf/sock_flags.bpf.c deleted file mode 100644 index 0da749f6a9e1..000000000000 --- a/samples/bpf/sock_flags.bpf.c +++ /dev/null @@ -1,47 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -#include "vmlinux.h" -#include "net_shared.h" -#include - -SEC("cgroup/sock") -int bpf_prog1(struct bpf_sock *sk) -{ - char fmt[] =3D "socket: family %d type %d protocol %d\n"; - char fmt2[] =3D "socket: uid %u gid %u\n"; - __u64 gid_uid =3D bpf_get_current_uid_gid(); - __u32 uid =3D gid_uid & 0xffffffff; - __u32 gid =3D gid_uid >> 32; - - bpf_trace_printk(fmt, sizeof(fmt), sk->family, sk->type, sk->protocol); - bpf_trace_printk(fmt2, sizeof(fmt2), uid, gid); - - /* block AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6 sockets - * ie., make ping6 fail - */ - if (sk->family =3D=3D AF_INET6 && - sk->type =3D=3D SOCK_DGRAM && - sk->protocol =3D=3D IPPROTO_ICMPV6) - return 0; - - return 1; -} - -SEC("cgroup/sock") -int bpf_prog2(struct bpf_sock *sk) -{ - char fmt[] =3D "socket: family %d type %d protocol %d\n"; - - bpf_trace_printk(fmt, sizeof(fmt), sk->family, sk->type, sk->protocol); - - /* block AF_INET, SOCK_DGRAM, IPPROTO_ICMP sockets - * ie., make ping fail - */ - if (sk->family =3D=3D AF_INET && - sk->type =3D=3D SOCK_DGRAM && - sk->protocol =3D=3D IPPROTO_ICMP) - return 0; - - return 1; -} - -char _license[] SEC("license") =3D "GPL"; diff --git a/samples/bpf/test_cgrp2_sock2.c b/samples/bpf/test_cgrp2_sock2.c deleted file mode 100644 index e7060aaa2f5a..000000000000 --- a/samples/bpf/test_cgrp2_sock2.c +++ /dev/null @@ -1,95 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* eBPF example program: - * - * - Loads eBPF program - * - * The eBPF program loads a filter from file and attaches the - * program to a cgroup using BPF_PROG_ATTACH - */ - -#define _GNU_SOURCE - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#include "bpf_insn.h" - -static int usage(const char *argv0) -{ - printf("Usage: %s cg-path filter-path [filter-id]\n", argv0); - return EXIT_FAILURE; -} - -int main(int argc, char **argv) -{ - int cg_fd, err, ret =3D EXIT_FAILURE, filter_id =3D 0, prog_cnt =3D 0; - const char *link_pin_path =3D "/sys/fs/bpf/test_cgrp2_sock2"; - struct bpf_link *link =3D NULL; - struct bpf_program *progs[2]; - struct bpf_program *prog; - struct bpf_object *obj; - - if (argc < 3) - return usage(argv[0]); - - if (argc > 3) - filter_id =3D atoi(argv[3]); - - cg_fd =3D open(argv[1], O_DIRECTORY | O_RDONLY); - if (cg_fd < 0) { - printf("Failed to open cgroup path: '%s'\n", strerror(errno)); - return ret; - } - - obj =3D bpf_object__open_file(argv[2], NULL); - if (libbpf_get_error(obj)) { - printf("ERROR: opening BPF object file failed\n"); - return ret; - } - - bpf_object__for_each_program(prog, obj) { - progs[prog_cnt] =3D prog; - prog_cnt++; - } - - if (filter_id >=3D prog_cnt) { - printf("Invalid program id; program not found in file\n"); - goto cleanup; - } - - /* load BPF program */ - if (bpf_object__load(obj)) { - printf("ERROR: loading BPF object file failed\n"); - goto cleanup; - } - - link =3D bpf_program__attach_cgroup(progs[filter_id], cg_fd); - if (libbpf_get_error(link)) { - printf("ERROR: bpf_program__attach failed\n"); - link =3D NULL; - goto cleanup; - } - - err =3D bpf_link__pin(link, link_pin_path); - if (err < 0) { - printf("ERROR: bpf_link__pin failed: %d\n", err); - goto cleanup; - } - - ret =3D EXIT_SUCCESS; - -cleanup: - bpf_link__destroy(link); - bpf_object__close(obj); - return ret; -} diff --git a/samples/bpf/test_cgrp2_sock2.sh b/samples/bpf/test_cgrp2_sock2= .sh deleted file mode 100755 index 82acff93d739..000000000000 --- a/samples/bpf/test_cgrp2_sock2.sh +++ /dev/null @@ -1,103 +0,0 @@ -#!/bin/bash -# SPDX-License-Identifier: GPL-2.0 - -BPFFS=3D/sys/fs/bpf -MY_DIR=3D$(dirname $0) -TEST=3D$MY_DIR/test_cgrp2_sock2 -LINK_PIN=3D$BPFFS/test_cgrp2_sock2 -BPF_PROG=3D$MY_DIR/sock_flags.bpf.o - -function config_device { - ip netns add at_ns0 - ip link add veth0 type veth peer name veth0b - ip link set veth0 netns at_ns0 - ip netns exec at_ns0 sysctl -q net.ipv6.conf.veth0.disable_ipv6=3D0 - ip netns exec at_ns0 ip addr add 172.16.1.100/24 dev veth0 - ip netns exec at_ns0 ip addr add 2401:db00::1/64 dev veth0 nodad - ip netns exec at_ns0 ip link set dev veth0 up - sysctl -q net.ipv6.conf.veth0b.disable_ipv6=3D0 - ip addr add 172.16.1.101/24 dev veth0b - ip addr add 2401:db00::2/64 dev veth0b nodad - ip link set veth0b up -} - -function config_cgroup { - rm -rf /tmp/cgroupv2 - mkdir -p /tmp/cgroupv2 - mount -t cgroup2 none /tmp/cgroupv2 - mkdir -p /tmp/cgroupv2/foo - echo $$ >> /tmp/cgroupv2/foo/cgroup.procs -} - -function config_bpffs { - if mount | grep $BPFFS > /dev/null; then - echo "bpffs already mounted" - else - echo "bpffs not mounted. Mounting..." - mount -t bpf none $BPFFS - fi -} - -function attach_bpf { - $TEST /tmp/cgroupv2/foo $BPF_PROG $1 - [ $? -ne 0 ] && exit 1 -} - -function cleanup { - rm -rf $LINK_PIN - ip link del veth0b - ip netns delete at_ns0 - umount /tmp/cgroupv2 - rm -rf /tmp/cgroupv2 -} - -cleanup 2>/dev/null - -set -e -config_device -config_cgroup -config_bpffs -set +e - -# -# Test 1 - fail ping6 -# -attach_bpf 0 -ping -c1 -w1 172.16.1.100 -if [ $? -ne 0 ]; then - echo "ping failed when it should succeed" - cleanup - exit 1 -fi - -ping6 -c1 -w1 2401:db00::1 -if [ $? -eq 0 ]; then - echo "ping6 succeeded when it should not" - cleanup - exit 1 -fi - -rm -rf $LINK_PIN -sleep 1 # Wait for link detach - -# -# Test 2 - fail ping -# -attach_bpf 1 -ping6 -c1 -w1 2401:db00::1 -if [ $? -ne 0 ]; then - echo "ping6 failed when it should succeed" - cleanup - exit 1 -fi - -ping -c1 -w1 172.16.1.100 -if [ $? -eq 0 ]; then - echo "ping succeeded when it should not" - cleanup - exit 1 -fi - -cleanup -echo -echo "*** PASS ***" diff --git a/tools/testing/selftests/bpf/prog_tests/sock_create.c b/tools/t= esting/selftests/bpf/prog_tests/sock_create.c index 072910c05c99..17a3713621dd 100644 --- a/tools/testing/selftests/bpf/prog_tests/sock_create.c +++ b/tools/testing/selftests/bpf/prog_tests/sock_create.c @@ -6,6 +6,11 @@ static char bpf_log_buf[4096]; static bool verbose; +enum sock_create_test_error { + OK =3D 0, + DENY_CREATE, +}; + static struct sock_create_test { const char *descr; const struct bpf_insn insns[64]; @@ -14,9 +19,11 @@ static struct sock_create_test { int domain; int type; + int protocol; int optname; int optval; + enum sock_create_test_error error; } tests[] =3D { { .descr =3D "AF_INET set priority", @@ -164,6 +171,72 @@ static struct sock_create_test { .optname =3D SO_BINDTOIFINDEX, .optval =3D 1, }, + { + .descr =3D "block AF_INET, SOCK_DGRAM, IPPROTO_ICMP socket", + .insns =3D { + BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 =3D verdict */ + + /* sock->family =3D=3D AF_INET */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, family)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, AF_INET, 5), + + /* sock->type =3D=3D SOCK_DGRAM */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, type)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, SOCK_DGRAM, 3), + + /* sock->protocol =3D=3D IPPROTO_ICMP */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, protocol)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, IPPROTO_ICMP, 1), + + /* return 0 (block) */ + BPF_MOV64_IMM(BPF_REG_0, 0), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET, + .type =3D SOCK_DGRAM, + .protocol =3D IPPROTO_ICMP, + + .error =3D DENY_CREATE, + }, + { + .descr =3D "block AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6 socket", + .insns =3D { + BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 =3D verdict */ + + /* sock->family =3D=3D AF_INET6 */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, family)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, AF_INET6, 5), + + /* sock->type =3D=3D SOCK_DGRAM */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, type)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, SOCK_DGRAM, 3), + + /* sock->protocol =3D=3D IPPROTO_ICMPV6 */ + BPF_LDX_MEM(BPF_H, BPF_REG_2, BPF_REG_1, + offsetof(struct bpf_sock, protocol)), + BPF_JMP_IMM(BPF_JNE, BPF_REG_2, IPPROTO_ICMPV6, 1), + + /* return 0 (block) */ + BPF_MOV64_IMM(BPF_REG_0, 0), + BPF_EXIT_INSN(), + }, + .expected_attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + .attach_type =3D BPF_CGROUP_INET_SOCK_CREATE, + + .domain =3D AF_INET, + .type =3D SOCK_DGRAM, + .protocol =3D IPPROTO_ICMPV6, + + .error =3D DENY_CREATE, + }, }; static int load_prog(const struct bpf_insn *insns, @@ -208,9 +281,13 @@ static int run_test(int cgroup_fd, struct sock_create_= test *test) goto close_prog_fd; } - sock_fd =3D socket(test->domain, test->type, 0); + sock_fd =3D socket(test->domain, test->type, test->protocol); if (sock_fd < 0) { - log_err("Failed to create socket"); + if (test->error =3D=3D DENY_CREATE) + ret =3D 0; + else + log_err("Failed to create socket"); + goto detach_prog; } @@ -226,7 +303,7 @@ static int run_test(int cgroup_fd, struct sock_create_t= est *test) goto cleanup; } - ret =3D 0; + ret =3D test->error !=3D OK; cleanup: close(sock_fd); -- 2.43.0 From nobody Wed Nov 27 10:46:26 2024 Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D24711F7062; Fri, 11 Oct 2024 04:49:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622152; cv=none; b=tVF1+cjck0PMj1aH9H5h7PU7axSwCLIE4gZ9yYJM7GylV/m/6DOUJYNFnHdFy8XJGuz+QwVAyXfbxKpVsEaoourGNijV8pscHyW3S69pFtBFMh57eh9AXMnnFUAsia7cl7o6ElJLIMKS+qIt+zh/AWxpkJ/iqLVZ+gpymPHTn7E= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622152; c=relaxed/simple; bh=167JpMCkpDmGeoNBE3/6naV2tiAlZk2JG6k6TSsfqV4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=mTwXuqiMwDbxmsFjYf+BeyM8PRO2Rz0/E+PW4zvZwzAwf7ndSona/XZOK7lTTFOU6dlW1rkI21C+ZI4hBcsotBlTidqqnm5Md1QlzWsin20RrJw7baizprWxBSVCV80urDTDuvRhTmKkPyOOJpl9nAvBTUVX/jLczbBKt4LcElc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=HnGd76/k; arc=none smtp.client-ip=209.85.210.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="HnGd76/k" Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-71e427e29c7so15649b3a.3; Thu, 10 Oct 2024 21:49:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1728622149; x=1729226949; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=FRSeyycIx/nZcEWb5U6GtdsSlGk+/AlWewxVSbiWqsA=; b=HnGd76/kxehxBbRj/qxO0aP5l8BYhhe/oBa6BcqbCfhcx6vfcHOI8WmzAa/xufILnN Synqr4khfnvkivQZt6OPg6JfXdTbJswN58gbHaILq3lIbcWEklW6LtdqF5zpQOZSjfTN pHvIryJvGLVU+tE4mgRgaLeW1aC4tCaEmEunc9sXE2rpIHkpN2DqWSgndARmuLemgIHU gHbYYKOqdZSYVR4oMYVnW9wRXXVE4Em/AV6TxfCE6SW2RF5slEwtqUgjOjGHcHvN562O VwndX6sDrBBSTDgrNPzlL+TT6txDJpm5EyeT6oQ+0228HAwkHs5dmxGUJWr6Qciokff7 g6Yg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728622149; x=1729226949; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FRSeyycIx/nZcEWb5U6GtdsSlGk+/AlWewxVSbiWqsA=; b=Uxd6diKOgWtvcPdnynQZVe9zETVHv6LktC7YGJwaeISI36PKuaMv000r2oI8dL8eON jDWiLzpkH7RTC5EPOkCcMvZrG30P79Wc9d2yMnxxu0SBRPwUgwm3XOWi27ifQYyjSBIW OS67WMgd8Ec1Mn7eJOiGF51lJz/+qT6A4cH5Z+RwCDptXxv985PkWdg9q69sxjdK5WH9 Pfo449eT6EP/KqhBy0aDQerHyIqUDpaTGv3NMJk2ct5wwy7iUgASG+jy9rZZlj/Yhccm SmYuHZ7moF1qrMTMSvGvhSm0QPOYmXeO9AyKv0koe82LHpRFLsbK4fOATdsXUdBGBx3Y 6//g== X-Forwarded-Encrypted: i=1; AJvYcCURvWzxeFJNG8fu8viF4xmFAdad0Nf9IT+dL9dtiaz0FnfPTxmp5zQF0WPJ7M2EMqPDKYOcw0WD@vger.kernel.org, AJvYcCUUkQDgU3skQ9sa3joBVLgNUGx6aFocdWqIkHWYE6Qz+19a9PVL4/nyRf5F4dhHMQdTMpMlngRgkiNyp1NkEt6i@vger.kernel.org, AJvYcCWL5Gpi0t4/46RR5t1FzH/NYKIdEZ7Byup0x6BLxROW710WwirIacBxC29Jb2LutF083iBBg+SMFLL5M+0=@vger.kernel.org X-Gm-Message-State: AOJu0YzNoyfxLpo8OJdsezYlQK9ebt5EExj1G3Tvn/0XjtQyNTL3R9r5 6jeSm1YBD/bXgXni9ZG1L9vzTlId5ZlX3TwKneFXO7OfnJg2nec= X-Google-Smtp-Source: AGHT+IFOQBxfJfdgAqaL95TaxaedW9LySKkXzUzQwp+QlWNsz3bZRweglWVgWqnqnH1hI81ywQgg7g== X-Received: by 2002:a05:6a20:e188:b0:1d7:11af:6a with SMTP id adf61e73a8af0-1d8bcf9f221mr1713294637.37.1728622148907; Thu, 10 Oct 2024 21:49:08 -0700 (PDT) Received: from vagrant.. ([114.71.48.94]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-71e2ab105f9sm1856692b3a.216.2024.10.10.21.49.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Oct 2024 21:49:08 -0700 (PDT) From: "Daniel T. Lee" To: Daniel Borkmann , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, LKML Subject: [PATCH,bpf-next v3 3/4] samples/bpf: remove obsolete cgroup related tests Date: Fri, 11 Oct 2024 04:48:46 +0000 Message-ID: <20241011044847.51584-4-danieltimlee@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241011044847.51584-1-danieltimlee@gmail.com> References: <20241011044847.51584-1-danieltimlee@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This patch removes the obsolete cgroup related tests. These tests are now redundant because their functionality is already covered by more modern and comprehensive tests under selftests/bpf. The following files are removed: - test_current_task_under_cgroup: tests bpf_current_task_under_cgroup() to check if a task belongs to a cgroup. Already covered by task_under_cgroup at selftest and other cgroup ID tests. - test_cgrp2_tc: tests bpf_skb_under_cgroup() to filter packets based on cgroup. This behavior is now validated by cgroup_skb_sk_lookup, which uses bpf_skb_cgroup_id, making this test redundant. By removing these outdated tests, this patch helps streamline and modernize the test suite, avoiding duplication of test coverage. Signed-off-by: Daniel T. Lee --- Changes in v3: - Makefile fix samples/bpf/Makefile | 9 - samples/bpf/test_cgrp2_array_pin.c | 106 ---------- samples/bpf/test_cgrp2_attach.c | 177 ----------------- samples/bpf/test_cgrp2_tc.bpf.c | 56 ------ samples/bpf/test_cgrp2_tc.sh | 187 ------------------ .../bpf/test_current_task_under_cgroup.bpf.c | 43 ---- .../bpf/test_current_task_under_cgroup_user.c | 115 ----------- 7 files changed, 693 deletions(-) delete mode 100644 samples/bpf/test_cgrp2_array_pin.c delete mode 100644 samples/bpf/test_cgrp2_attach.c delete mode 100644 samples/bpf/test_cgrp2_tc.bpf.c delete mode 100755 samples/bpf/test_cgrp2_tc.sh delete mode 100644 samples/bpf/test_current_task_under_cgroup.bpf.c delete mode 100644 samples/bpf/test_current_task_under_cgroup_user.c diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index 490833f8706a..e2abfc847389 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -25,10 +25,7 @@ tprogs-y +=3D offwaketime tprogs-y +=3D spintest tprogs-y +=3D map_perf_test tprogs-y +=3D test_overhead -tprogs-y +=3D test_cgrp2_array_pin -tprogs-y +=3D test_cgrp2_attach tprogs-y +=3D xdp_router_ipv4 -tprogs-y +=3D test_current_task_under_cgroup tprogs-y +=3D trace_event tprogs-y +=3D sampleip tprogs-y +=3D tc_l2_redirect @@ -72,10 +69,6 @@ offwaketime-objs :=3D offwaketime_user.o $(TRACE_HELPERS) spintest-objs :=3D spintest_user.o $(TRACE_HELPERS) map_perf_test-objs :=3D map_perf_test_user.o test_overhead-objs :=3D test_overhead_user.o -test_cgrp2_array_pin-objs :=3D test_cgrp2_array_pin.o -test_cgrp2_attach-objs :=3D test_cgrp2_attach.o -test_current_task_under_cgroup-objs :=3D $(CGROUP_HELPERS) \ - test_current_task_under_cgroup_user.o trace_event-objs :=3D trace_event_user.o $(TRACE_HELPERS) sampleip-objs :=3D sampleip_user.o $(TRACE_HELPERS) tc_l2_redirect-objs :=3D tc_l2_redirect_user.o @@ -116,8 +109,6 @@ always-y +=3D test_overhead_tp.bpf.o always-y +=3D test_overhead_raw_tp.bpf.o always-y +=3D test_overhead_kprobe.bpf.o always-y +=3D parse_varlen.o parse_simple.o parse_ldabs.o -always-y +=3D test_cgrp2_tc.bpf.o -always-y +=3D test_current_task_under_cgroup.bpf.o always-y +=3D trace_event_kern.o always-y +=3D sampleip_kern.o always-y +=3D lwt_len_hist.bpf.o diff --git a/samples/bpf/test_cgrp2_array_pin.c b/samples/bpf/test_cgrp2_ar= ray_pin.c deleted file mode 100644 index 05e88aa63009..000000000000 --- a/samples/bpf/test_cgrp2_array_pin.c +++ /dev/null @@ -1,106 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0-only -/* Copyright (c) 2016 Facebook - */ -#include -#include - -#include -#include -#include -#include -#include -#include - -#include - -static void usage(void) -{ - printf("Usage: test_cgrp2_array_pin [...]\n"); - printf(" -F File to pin an BPF cgroup array\n"); - printf(" -U Update an already pinned BPF cgroup array\n"); - printf(" -v Full path of the cgroup2\n"); - printf(" -h Display this help\n"); -} - -int main(int argc, char **argv) -{ - const char *pinned_file =3D NULL, *cg2 =3D NULL; - int create_array =3D 1; - int array_key =3D 0; - int array_fd =3D -1; - int cg2_fd =3D -1; - int ret =3D -1; - int opt; - - while ((opt =3D getopt(argc, argv, "F:U:v:")) !=3D -1) { - switch (opt) { - /* General args */ - case 'F': - pinned_file =3D optarg; - break; - case 'U': - pinned_file =3D optarg; - create_array =3D 0; - break; - case 'v': - cg2 =3D optarg; - break; - default: - usage(); - goto out; - } - } - - if (!cg2 || !pinned_file) { - usage(); - goto out; - } - - cg2_fd =3D open(cg2, O_RDONLY); - if (cg2_fd < 0) { - fprintf(stderr, "open(%s,...): %s(%d)\n", - cg2, strerror(errno), errno); - goto out; - } - - if (create_array) { - array_fd =3D bpf_map_create(BPF_MAP_TYPE_CGROUP_ARRAY, NULL, - sizeof(uint32_t), sizeof(uint32_t), - 1, NULL); - if (array_fd < 0) { - fprintf(stderr, - "bpf_create_map(BPF_MAP_TYPE_CGROUP_ARRAY,...): %s(%d)\n", - strerror(errno), errno); - goto out; - } - } else { - array_fd =3D bpf_obj_get(pinned_file); - if (array_fd < 0) { - fprintf(stderr, "bpf_obj_get(%s): %s(%d)\n", - pinned_file, strerror(errno), errno); - goto out; - } - } - - ret =3D bpf_map_update_elem(array_fd, &array_key, &cg2_fd, 0); - if (ret) { - perror("bpf_map_update_elem"); - goto out; - } - - if (create_array) { - ret =3D bpf_obj_pin(array_fd, pinned_file); - if (ret) { - fprintf(stderr, "bpf_obj_pin(..., %s): %s(%d)\n", - pinned_file, strerror(errno), errno); - goto out; - } - } - -out: - if (array_fd !=3D -1) - close(array_fd); - if (cg2_fd !=3D -1) - close(cg2_fd); - return ret; -} diff --git a/samples/bpf/test_cgrp2_attach.c b/samples/bpf/test_cgrp2_attac= h.c deleted file mode 100644 index 68ce69457afe..000000000000 --- a/samples/bpf/test_cgrp2_attach.c +++ /dev/null @@ -1,177 +0,0 @@ -/* eBPF example program: - * - * - Creates arraymap in kernel with 4 bytes keys and 8 byte values - * - * - Loads eBPF program - * - * The eBPF program accesses the map passed in to store two pieces of - * information. The number of invocations of the program, which maps - * to the number of packets received, is stored to key 0. Key 1 is - * incremented on each iteration by the number of bytes stored in - * the skb. - * - * - Attaches the new program to a cgroup using BPF_PROG_ATTACH - * - * - Every second, reads map[0] and map[1] to see how many bytes and - * packets were seen on any socket of tasks in the given cgroup. - */ - -#define _GNU_SOURCE - -#include -#include -#include -#include -#include -#include -#include -#include - -#include -#include - -#include "bpf_insn.h" -#include "bpf_util.h" - -enum { - MAP_KEY_PACKETS, - MAP_KEY_BYTES, -}; - -char bpf_log_buf[BPF_LOG_BUF_SIZE]; - -static int prog_load(int map_fd, int verdict) -{ - struct bpf_insn prog[] =3D { - BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), /* save r6 so it's not clobbered by= BPF_CALL */ - - /* Count packets */ - BPF_MOV64_IMM(BPF_REG_0, MAP_KEY_PACKETS), /* r0 =3D 0 */ - BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -4), /* *(u32 *)(fp - 4) =3D r= 0 */ - BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), - BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4), /* r2 =3D fp - 4 */ - BPF_LD_MAP_FD(BPF_REG_1, map_fd), /* load map fd to r1 */ - BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), - BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2), - BPF_MOV64_IMM(BPF_REG_1, 1), /* r1 =3D 1 */ - BPF_ATOMIC_OP(BPF_DW, BPF_ADD, BPF_REG_0, BPF_REG_1, 0), - - /* Count bytes */ - BPF_MOV64_IMM(BPF_REG_0, MAP_KEY_BYTES), /* r0 =3D 1 */ - BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -4), /* *(u32 *)(fp - 4) =3D r= 0 */ - BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), - BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4), /* r2 =3D fp - 4 */ - BPF_LD_MAP_FD(BPF_REG_1, map_fd), - BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), - BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2), - BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_6, offsetof(struct __sk_buff, len)= ), /* r1 =3D skb->len */ - - BPF_ATOMIC_OP(BPF_DW, BPF_ADD, BPF_REG_0, BPF_REG_1, 0), - - BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 =3D verdict */ - BPF_EXIT_INSN(), - }; - size_t insns_cnt =3D ARRAY_SIZE(prog); - LIBBPF_OPTS(bpf_prog_load_opts, opts, - .log_buf =3D bpf_log_buf, - .log_size =3D BPF_LOG_BUF_SIZE, - ); - - return bpf_prog_load(BPF_PROG_TYPE_CGROUP_SKB, NULL, "GPL", - prog, insns_cnt, &opts); -} - -static int usage(const char *argv0) -{ - printf("Usage: %s [-d] [-D] \n", argv0); - printf(" -d Drop Traffic\n"); - printf(" -D Detach filter, and exit\n"); - return EXIT_FAILURE; -} - -static int attach_filter(int cg_fd, int type, int verdict) -{ - int prog_fd, map_fd, ret, key; - long long pkt_cnt, byte_cnt; - - map_fd =3D bpf_map_create(BPF_MAP_TYPE_ARRAY, NULL, - sizeof(key), sizeof(byte_cnt), - 256, NULL); - if (map_fd < 0) { - printf("Failed to create map: '%s'\n", strerror(errno)); - return EXIT_FAILURE; - } - - prog_fd =3D prog_load(map_fd, verdict); - printf("Output from kernel verifier:\n%s\n-------\n", bpf_log_buf); - - if (prog_fd < 0) { - printf("Failed to load prog: '%s'\n", strerror(errno)); - return EXIT_FAILURE; - } - - ret =3D bpf_prog_attach(prog_fd, cg_fd, type, 0); - if (ret < 0) { - printf("Failed to attach prog to cgroup: '%s'\n", - strerror(errno)); - return EXIT_FAILURE; - } - while (1) { - key =3D MAP_KEY_PACKETS; - assert(bpf_map_lookup_elem(map_fd, &key, &pkt_cnt) =3D=3D 0); - - key =3D MAP_KEY_BYTES; - assert(bpf_map_lookup_elem(map_fd, &key, &byte_cnt) =3D=3D 0); - - printf("cgroup received %lld packets, %lld bytes\n", - pkt_cnt, byte_cnt); - sleep(1); - } - - return EXIT_SUCCESS; -} - -int main(int argc, char **argv) -{ - int detach_only =3D 0, verdict =3D 1; - enum bpf_attach_type type; - int opt, cg_fd, ret; - - while ((opt =3D getopt(argc, argv, "Dd")) !=3D -1) { - switch (opt) { - case 'd': - verdict =3D 0; - break; - case 'D': - detach_only =3D 1; - break; - default: - return usage(argv[0]); - } - } - - if (argc - optind < 2) - return usage(argv[0]); - - if (strcmp(argv[optind + 1], "ingress") =3D=3D 0) - type =3D BPF_CGROUP_INET_INGRESS; - else if (strcmp(argv[optind + 1], "egress") =3D=3D 0) - type =3D BPF_CGROUP_INET_EGRESS; - else - return usage(argv[0]); - - cg_fd =3D open(argv[optind], O_DIRECTORY | O_RDONLY); - if (cg_fd < 0) { - printf("Failed to open cgroup path: '%s'\n", strerror(errno)); - return EXIT_FAILURE; - } - - if (detach_only) { - ret =3D bpf_prog_detach(cg_fd, type); - printf("bpf_prog_detach() returned '%s' (%d)\n", - strerror(errno), errno); - } else - ret =3D attach_filter(cg_fd, type, verdict); - - return ret; -} diff --git a/samples/bpf/test_cgrp2_tc.bpf.c b/samples/bpf/test_cgrp2_tc.bp= f.c deleted file mode 100644 index c7d2291d676f..000000000000 --- a/samples/bpf/test_cgrp2_tc.bpf.c +++ /dev/null @@ -1,56 +0,0 @@ -/* Copyright (c) 2016 Facebook - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. - */ -#define KBUILD_MODNAME "foo" -#include "vmlinux.h" -#include "net_shared.h" -#include - -/* copy of 'struct ethhdr' without __packed */ -struct eth_hdr { - unsigned char h_dest[ETH_ALEN]; - unsigned char h_source[ETH_ALEN]; - unsigned short h_proto; -}; - -struct { - __uint(type, BPF_MAP_TYPE_CGROUP_ARRAY); - __type(key, u32); - __type(value, u32); - __uint(pinning, LIBBPF_PIN_BY_NAME); - __uint(max_entries, 1); -} test_cgrp2_array_pin SEC(".maps"); - -SEC("filter") -int handle_egress(struct __sk_buff *skb) -{ - void *data =3D (void *)(long)skb->data; - struct eth_hdr *eth =3D data; - struct ipv6hdr *ip6h =3D data + sizeof(*eth); - void *data_end =3D (void *)(long)skb->data_end; - char dont_care_msg[] =3D "dont care %04x %d\n"; - char pass_msg[] =3D "pass\n"; - char reject_msg[] =3D "reject\n"; - - /* single length check */ - if (data + sizeof(*eth) + sizeof(*ip6h) > data_end) - return TC_ACT_OK; - - if (eth->h_proto !=3D bpf_htons(ETH_P_IPV6) || - ip6h->nexthdr !=3D IPPROTO_ICMPV6) { - bpf_trace_printk(dont_care_msg, sizeof(dont_care_msg), - eth->h_proto, ip6h->nexthdr); - return TC_ACT_OK; - } else if (bpf_skb_under_cgroup(skb, &test_cgrp2_array_pin, 0) !=3D 1) { - bpf_trace_printk(pass_msg, sizeof(pass_msg)); - return TC_ACT_OK; - } else { - bpf_trace_printk(reject_msg, sizeof(reject_msg)); - return TC_ACT_SHOT; - } -} - -char _license[] SEC("license") =3D "GPL"; diff --git a/samples/bpf/test_cgrp2_tc.sh b/samples/bpf/test_cgrp2_tc.sh deleted file mode 100755 index 38e8dbc9d16e..000000000000 --- a/samples/bpf/test_cgrp2_tc.sh +++ /dev/null @@ -1,187 +0,0 @@ -#!/bin/bash -# SPDX-License-Identifier: GPL-2.0 - -MY_DIR=3D$(dirname $0) -# Details on the bpf prog -BPF_CGRP2_ARRAY_NAME=3D'test_cgrp2_array_pin' -BPF_PROG=3D"$MY_DIR/test_cgrp2_tc.bpf.o" -BPF_SECTION=3D'filter' - -[ -z "$TC" ] && TC=3D'tc' -[ -z "$IP" ] && IP=3D'ip' - -# Names of the veth interface, net namespace...etc. -HOST_IFC=3D've' -NS_IFC=3D'vens' -NS=3D'ns' - -find_mnt() { - cat /proc/mounts | \ - awk '{ if ($3 =3D=3D "'$1'" && mnt =3D=3D "") { mnt =3D $2 }} END { print= mnt }' -} - -# Init cgroup2 vars -init_cgrp2_vars() { - CGRP2_ROOT=3D$(find_mnt cgroup2) - if [ -z "$CGRP2_ROOT" ] - then - CGRP2_ROOT=3D'/mnt/cgroup2' - MOUNT_CGRP2=3D"yes" - fi - CGRP2_TC=3D"$CGRP2_ROOT/tc" - CGRP2_TC_LEAF=3D"$CGRP2_TC/leaf" -} - -# Init bpf fs vars -init_bpf_fs_vars() { - local bpf_fs_root=3D$(find_mnt bpf) - [ -n "$bpf_fs_root" ] || return -1 - BPF_FS_TC_SHARE=3D"$bpf_fs_root/tc/globals" -} - -setup_cgrp2() { - case $1 in - start) - if [ "$MOUNT_CGRP2" =3D=3D 'yes' ] - then - [ -d $CGRP2_ROOT ] || mkdir -p $CGRP2_ROOT - mount -t cgroup2 none $CGRP2_ROOT || return $? - fi - mkdir -p $CGRP2_TC_LEAF - ;; - *) - rmdir $CGRP2_TC_LEAF && rmdir $CGRP2_TC - [ "$MOUNT_CGRP2" =3D=3D 'yes' ] && umount $CGRP2_ROOT - ;; - esac -} - -setup_bpf_cgrp2_array() { - local bpf_cgrp2_array=3D"$BPF_FS_TC_SHARE/$BPF_CGRP2_ARRAY_NAME" - case $1 in - start) - $MY_DIR/test_cgrp2_array_pin -U $bpf_cgrp2_array -v $CGRP2_TC - ;; - *) - [ -d "$BPF_FS_TC_SHARE" ] && rm -f $bpf_cgrp2_array - ;; - esac -} - -setup_net() { - case $1 in - start) - $IP link add $HOST_IFC type veth peer name $NS_IFC || return $? - $IP link set dev $HOST_IFC up || return $? - sysctl -q net.ipv6.conf.$HOST_IFC.disable_ipv6=3D0 - sysctl -q net.ipv6.conf.$HOST_IFC.accept_dad=3D0 - - $IP netns add $NS || return $? - $IP link set dev $NS_IFC netns $NS || return $? - $IP -n $NS link set dev $NS_IFC up || return $? - $IP netns exec $NS sysctl -q net.ipv6.conf.$NS_IFC.disable_ipv6=3D0 - $IP netns exec $NS sysctl -q net.ipv6.conf.$NS_IFC.accept_dad=3D0 - $TC qdisc add dev $HOST_IFC clsact || return $? - $TC filter add dev $HOST_IFC egress bpf da obj $BPF_PROG sec $BPF_SEC= TION || return $? - ;; - *) - $IP netns del $NS - $IP link del $HOST_IFC - ;; - esac -} - -run_in_cgrp() { - # Fork another bash and move it under the specified cgroup. - # It makes the cgroup cleanup easier at the end of the test. - cmd=3D'echo $$ > ' - cmd=3D"$cmd $1/cgroup.procs; exec $2" - bash -c "$cmd" -} - -do_test() { - run_in_cgrp $CGRP2_TC_LEAF "ping -6 -c3 ff02::1%$HOST_IFC >& /dev/null" - local dropped=3D$($TC -s qdisc show dev $HOST_IFC | tail -3 | \ - awk '/drop/{print substr($7, 0, index($7, ",")-1)}') - if [[ $dropped -eq 0 ]] - then - echo "FAIL" - return 1 - else - echo "Successfully filtered $dropped packets" - return 0 - fi -} - -do_exit() { - if [ "$DEBUG" =3D=3D "yes" ] && [ "$MODE" !=3D 'cleanuponly' ] - then - echo "------ DEBUG ------" - echo "mount: "; mount | grep -E '(cgroup2|bpf)'; echo - echo "$CGRP2_TC_LEAF: "; ls -l $CGRP2_TC_LEAF; echo - if [ -d "$BPF_FS_TC_SHARE" ] - then - echo "$BPF_FS_TC_SHARE: "; ls -l $BPF_FS_TC_SHARE; echo - fi - echo "Host net:" - $IP netns - $IP link show dev $HOST_IFC - $IP -6 a show dev $HOST_IFC - $TC -s qdisc show dev $HOST_IFC - echo - echo "$NS net:" - $IP -n $NS link show dev $NS_IFC - $IP -n $NS -6 link show dev $NS_IFC - echo "------ DEBUG ------" - echo - fi - - if [ "$MODE" !=3D 'nocleanup' ] - then - setup_net stop - setup_bpf_cgrp2_array stop - setup_cgrp2 stop - fi -} - -init_cgrp2_vars -init_bpf_fs_vars - -while [[ $# -ge 1 ]] -do - a=3D"$1" - case $a in - debug) - DEBUG=3D'yes' - shift 1 - ;; - cleanup-only) - MODE=3D'cleanuponly' - shift 1 - ;; - no-cleanup) - MODE=3D'nocleanup' - shift 1 - ;; - *) - echo "test_cgrp2_tc [debug] [cleanup-only | no-cleanup]" - echo " debug: Print cgrp and network setup details at the end of the= test" - echo " cleanup-only: Try to cleanup things from last test. No test = will be run" - echo " no-cleanup: Run the test but don't do cleanup at the end" - echo "[Note: If no arg is given, it will run the test and do cleanup = at the end]" - echo - exit -1 - ;; - esac -done - -trap do_exit 0 - -[ "$MODE" =3D=3D 'cleanuponly' ] && exit - -setup_cgrp2 start || exit $? -setup_net start || exit $? -init_bpf_fs_vars || exit $? -setup_bpf_cgrp2_array start || exit $? -do_test -echo diff --git a/samples/bpf/test_current_task_under_cgroup.bpf.c b/samples/bpf= /test_current_task_under_cgroup.bpf.c deleted file mode 100644 index 58b9cf7ed659..000000000000 --- a/samples/bpf/test_current_task_under_cgroup.bpf.c +++ /dev/null @@ -1,43 +0,0 @@ -/* Copyright (c) 2016 Sargun Dhillon - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. - */ - -#include "vmlinux.h" -#include -#include -#include -#include - -struct { - __uint(type, BPF_MAP_TYPE_CGROUP_ARRAY); - __uint(key_size, sizeof(u32)); - __uint(value_size, sizeof(u32)); - __uint(max_entries, 1); -} cgroup_map SEC(".maps"); - -struct { - __uint(type, BPF_MAP_TYPE_ARRAY); - __type(key, u32); - __type(value, u64); - __uint(max_entries, 1); -} perf_map SEC(".maps"); - -/* Writes the last PID that called sync to a map at index 0 */ -SEC("ksyscall/sync") -int BPF_KSYSCALL(bpf_prog1) -{ - u64 pid =3D bpf_get_current_pid_tgid(); - int idx =3D 0; - - if (!bpf_current_task_under_cgroup(&cgroup_map, 0)) - return 0; - - bpf_map_update_elem(&perf_map, &idx, &pid, BPF_ANY); - return 0; -} - -char _license[] SEC("license") =3D "GPL"; -u32 _version SEC("version") =3D LINUX_VERSION_CODE; diff --git a/samples/bpf/test_current_task_under_cgroup_user.c b/samples/bp= f/test_current_task_under_cgroup_user.c deleted file mode 100644 index 9726ed2a8a8b..000000000000 --- a/samples/bpf/test_current_task_under_cgroup_user.c +++ /dev/null @@ -1,115 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0-only -/* Copyright (c) 2016 Sargun Dhillon - */ - -#define _GNU_SOURCE -#include -#include -#include -#include -#include "cgroup_helpers.h" - -#define CGROUP_PATH "/my-cgroup" - -int main(int argc, char **argv) -{ - pid_t remote_pid, local_pid =3D getpid(); - int cg2 =3D -1, idx =3D 0, rc =3D 1; - struct bpf_link *link =3D NULL; - struct bpf_program *prog; - struct bpf_object *obj; - char filename[256]; - int map_fd[2]; - - snprintf(filename, sizeof(filename), "%s.bpf.o", argv[0]); - obj =3D bpf_object__open_file(filename, NULL); - if (libbpf_get_error(obj)) { - fprintf(stderr, "ERROR: opening BPF object file failed\n"); - return 0; - } - - prog =3D bpf_object__find_program_by_name(obj, "bpf_prog1"); - if (!prog) { - printf("finding a prog in obj file failed\n"); - goto cleanup; - } - - /* load BPF program */ - if (bpf_object__load(obj)) { - fprintf(stderr, "ERROR: loading BPF object file failed\n"); - goto cleanup; - } - - map_fd[0] =3D bpf_object__find_map_fd_by_name(obj, "cgroup_map"); - map_fd[1] =3D bpf_object__find_map_fd_by_name(obj, "perf_map"); - if (map_fd[0] < 0 || map_fd[1] < 0) { - fprintf(stderr, "ERROR: finding a map in obj file failed\n"); - goto cleanup; - } - - link =3D bpf_program__attach(prog); - if (libbpf_get_error(link)) { - fprintf(stderr, "ERROR: bpf_program__attach failed\n"); - link =3D NULL; - goto cleanup; - } - - if (setup_cgroup_environment()) - goto err; - - cg2 =3D create_and_get_cgroup(CGROUP_PATH); - - if (cg2 < 0) - goto err; - - if (bpf_map_update_elem(map_fd[0], &idx, &cg2, BPF_ANY)) { - log_err("Adding target cgroup to map"); - goto err; - } - - if (join_cgroup(CGROUP_PATH)) - goto err; - - /* - * The installed helper program catched the sync call, and should - * write it to the map. - */ - - sync(); - bpf_map_lookup_elem(map_fd[1], &idx, &remote_pid); - - if (local_pid !=3D remote_pid) { - fprintf(stderr, - "BPF Helper didn't write correct PID to map, but: %d\n", - remote_pid); - goto err; - } - - /* Verify the negative scenario; leave the cgroup */ - if (join_cgroup("/")) - goto err; - - remote_pid =3D 0; - bpf_map_update_elem(map_fd[1], &idx, &remote_pid, BPF_ANY); - - sync(); - bpf_map_lookup_elem(map_fd[1], &idx, &remote_pid); - - if (local_pid =3D=3D remote_pid) { - fprintf(stderr, "BPF cgroup negative test did not work\n"); - goto err; - } - - rc =3D 0; - -err: - if (cg2 !=3D -1) - close(cg2); - - cleanup_cgroup_environment(); - -cleanup: - bpf_link__destroy(link); - bpf_object__close(obj); - return rc; -} -- 2.43.0 From nobody Wed Nov 27 10:46:26 2024 Received: from mail-pg1-f174.google.com (mail-pg1-f174.google.com [209.85.215.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 37A10209F28; Fri, 11 Oct 2024 04:49:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.174 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622156; cv=none; b=aOOAtBBFy5qM4DqlTOvYxrpxca+zCifemX5+ahKD2J/Po5X8ig9M+XC4NHKSMI/Mhls04qW2a4eSAtmYBijGiWB00ugtyPSoxmsFSy5Le7HwImNIvgO9SRmX1AWyF910WmCq08RWc6qXAKoIlcFI8PApdQ8xZSpUvisSZILoJ9g= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728622156; c=relaxed/simple; bh=Da4d8pxi6L+f5aEqaoLtt+qX+82o5XH0RiBtMtuGd1s=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=nbRfMEFuzhsBXfSDlUNBcuNKKkih3NrFYRqytufjuPePecxwRwGZk3oklxFZr44Gzs66xFRlv0FTxSzCu3AkIyGxko/IMCU47lkN4uyE2q1amUzQtt7twz1sPmrWvEmB9pcwI4P7vyOO6xgE93fhKa+Gv8LE6C4uPb0fSicfn+A= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Q0jrgRCG; arc=none smtp.client-ip=209.85.215.174 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Q0jrgRCG" Received: by mail-pg1-f174.google.com with SMTP id 41be03b00d2f7-7ea06275ef2so1132044a12.0; Thu, 10 Oct 2024 21:49:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1728622153; x=1729226953; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=kb13UgZLlG19j0yFKmh4sL7IUNSft//rvJxiI7I7+Yo=; b=Q0jrgRCGiJ8PZ8wDOj4KB7emRv8nfR8q+EmvsMOLyrEDMSzK/1/c+PIVsGejNwh56e R61KZh62t+oLAJA7e/r46XNGNlB+HTO9Yhm6pNJB/bs8yxVRAXXJqqhF9WUw5eTxaWL2 ByBJm5DVxudWRMZ7GiAK2WyPklS6NMnfzwpVvIi7d0cFf1C4lKW1TT+ZMgJHjEJB6t5M YkHCss8WRH30ZWUbI81jFDF9nxDQg7TFt6hyTN7YhS573Ii6rLe0lA16l36KkR77GgOY LNFbTj1iTtlJT3bN3oBVq+4G4I0er2PMJNwiVfkavDYf3A0qVnCtAykh2NcTzgFc7erk NvWw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728622153; x=1729226953; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=kb13UgZLlG19j0yFKmh4sL7IUNSft//rvJxiI7I7+Yo=; b=tWXePqbtkI94xyD0keabAkKCiHWm/tAbLACailowtxFZIViSydQLB8BwpFCLgd/2DT DyJr0edTwIDJYkJIyklAJGSHOYnjOzJln+8XGE+ZQdgt27m5aOgVtjOcw2bhgrv/KODM j8pK01QPq3P+bazAhEidTEDZT4459YngZdXLoY+HbzMR6Y/7u+o9hfg5oUtxmQGdrwa9 1Ga4pL6Qog7J1O3Uyed5AbS/6N0z4zPCaOxDVsT1avvMLwVNtm/iTmhA8c1WbJR9xOJZ PyOHwSphJEQB6LI+Q6TZqZLVPN1qEAAXQgYzCoNZlEGS68zMv4j/Yo1GvXvcOZ6DVNOa Iyzg== X-Forwarded-Encrypted: i=1; AJvYcCVjKDcZ2N3fJdo8gPHSzx7RFKXbOxRosOLVC2XgVth8FjqQdGedGj0apQ0mUKeLhqPeDTRr3ie1ff0HkJhTkvhA@vger.kernel.org, AJvYcCXV78gfGlAHbHQgXtF+ykIK2QdiIeliHwBiMPQ/Oz3gc5GgD5Q/oLIUspqh7r5lU4G+43/vNYgc@vger.kernel.org, AJvYcCXkRC2wniZbFK36uw3pchw1o7CVxwcSjm5bTPMnnQpczEhOd8QpMZerQd79LpDmYi+pEDo8KFO7XpSPGSA=@vger.kernel.org X-Gm-Message-State: AOJu0YzpEu3aTV5O6licO/AIlKeS7kQhoF0FfWCAtLF/Hj818iKQqBfQ UpqwEBbey23KFepAWxpqtbZbV5zSpf/vmm4nDwBAuXXoaMeR1aE= X-Google-Smtp-Source: AGHT+IFA9wymQYcGafgVvzTM1hsfU8vVEMF8r++KW7N7JGn7f+rv//DUPf40eICbzhW7MjvVfIV+5g== X-Received: by 2002:a05:6a21:181a:b0:1d2:f0e2:4ad6 with SMTP id adf61e73a8af0-1d8bcf18450mr2118741637.18.1728622153380; Thu, 10 Oct 2024 21:49:13 -0700 (PDT) Received: from vagrant.. ([114.71.48.94]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-71e2ab105f9sm1856692b3a.216.2024.10.10.21.49.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Oct 2024 21:49:12 -0700 (PDT) From: "Daniel T. Lee" To: Daniel Borkmann , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, LKML Subject: [PATCH,bpf-next v3 4/4] samples/bpf: remove obsolete tracing related tests Date: Fri, 11 Oct 2024 04:48:47 +0000 Message-ID: <20241011044847.51584-5-danieltimlee@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241011044847.51584-1-danieltimlee@gmail.com> References: <20241011044847.51584-1-danieltimlee@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The samples/bpf has become outdated and often does not follow up with the latest. This commit removes obsolete tracing-related tests. Specifically, 'test_overhead' is duplicate with selftests (and bench), and 'test_override_return', 'test_probe_write_user' tests are obsolete since they have been replaced by kprobe_multi_override and probe_user from selftests respectively. The following files are removed: - test_overhead: tests the overhead of BPF programs with task_rename, now covered by selftests and benchmark tests (rename-*). [1] - test_override_return: tests the return override functionality, now handled by kprobe_multi_override in selftests. - test_probe_write_user: tests the probe_write_user functionality, now replaced by the probe_user test in selftests. This cleanup will help to streamline the testing framework by removing redundant tests. [1]: https://patchwork.kernel.org/cover/13759916 Signed-off-by: Daniel T. Lee --- Changes in V3: - Makefile fix samples/bpf/Makefile | 11 -- samples/bpf/test_overhead_kprobe.bpf.c | 41 ----- samples/bpf/test_overhead_raw_tp.bpf.c | 17 -- samples/bpf/test_overhead_tp.bpf.c | 23 --- samples/bpf/test_overhead_user.c | 225 ----------------------- samples/bpf/test_override_return.sh | 16 -- samples/bpf/test_probe_write_user.bpf.c | 52 ------ samples/bpf/test_probe_write_user_user.c | 108 ----------- samples/bpf/tracex7.bpf.c | 15 -- samples/bpf/tracex7_user.c | 56 ------ 10 files changed, 564 deletions(-) delete mode 100644 samples/bpf/test_overhead_kprobe.bpf.c delete mode 100644 samples/bpf/test_overhead_raw_tp.bpf.c delete mode 100644 samples/bpf/test_overhead_tp.bpf.c delete mode 100644 samples/bpf/test_overhead_user.c delete mode 100755 samples/bpf/test_override_return.sh delete mode 100644 samples/bpf/test_probe_write_user.bpf.c delete mode 100644 samples/bpf/test_probe_write_user_user.c delete mode 100644 samples/bpf/tracex7.bpf.c delete mode 100644 samples/bpf/tracex7_user.c diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index e2abfc847389..bcf103a4c14f 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -17,14 +17,11 @@ tprogs-y +=3D tracex3 tprogs-y +=3D tracex4 tprogs-y +=3D tracex5 tprogs-y +=3D tracex6 -tprogs-y +=3D tracex7 -tprogs-y +=3D test_probe_write_user tprogs-y +=3D trace_output tprogs-y +=3D lathist tprogs-y +=3D offwaketime tprogs-y +=3D spintest tprogs-y +=3D map_perf_test -tprogs-y +=3D test_overhead tprogs-y +=3D xdp_router_ipv4 tprogs-y +=3D trace_event tprogs-y +=3D sampleip @@ -61,8 +58,6 @@ tracex3-objs :=3D tracex3_user.o tracex4-objs :=3D tracex4_user.o tracex5-objs :=3D tracex5_user.o $(TRACE_HELPERS) tracex6-objs :=3D tracex6_user.o -tracex7-objs :=3D tracex7_user.o -test_probe_write_user-objs :=3D test_probe_write_user_user.o trace_output-objs :=3D trace_output_user.o lathist-objs :=3D lathist_user.o offwaketime-objs :=3D offwaketime_user.o $(TRACE_HELPERS) @@ -96,8 +91,6 @@ always-y +=3D tracex3.bpf.o always-y +=3D tracex4.bpf.o always-y +=3D tracex5.bpf.o always-y +=3D tracex6.bpf.o -always-y +=3D tracex7.bpf.o -always-y +=3D test_probe_write_user.bpf.o always-y +=3D trace_output.bpf.o always-y +=3D tcbpf1_kern.o always-y +=3D tc_l2_redirect_kern.o @@ -105,9 +98,6 @@ always-y +=3D lathist_kern.o always-y +=3D offwaketime.bpf.o always-y +=3D spintest.bpf.o always-y +=3D map_perf_test.bpf.o -always-y +=3D test_overhead_tp.bpf.o -always-y +=3D test_overhead_raw_tp.bpf.o -always-y +=3D test_overhead_kprobe.bpf.o always-y +=3D parse_varlen.o parse_simple.o parse_ldabs.o always-y +=3D trace_event_kern.o always-y +=3D sampleip_kern.o @@ -181,7 +171,6 @@ TPROGLDLIBS_xdp_router_ipv4 +=3D -lm -pthread TPROGLDLIBS_tracex4 +=3D -lrt TPROGLDLIBS_trace_output +=3D -lrt TPROGLDLIBS_map_perf_test +=3D -lrt -TPROGLDLIBS_test_overhead +=3D -lrt # Allows pointing LLC/CLANG to a LLVM backend with bpf support, redefine o= n cmdline: # make M=3Dsamples/bpf LLC=3D~/git/llvm-project/llvm/build/bin/llc CLANG= =3D~/git/llvm-project/llvm/build/bin/clang diff --git a/samples/bpf/test_overhead_kprobe.bpf.c b/samples/bpf/test_over= head_kprobe.bpf.c deleted file mode 100644 index 668cf5259c60..000000000000 --- a/samples/bpf/test_overhead_kprobe.bpf.c +++ /dev/null @@ -1,41 +0,0 @@ -/* Copyright (c) 2016 Facebook - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. - */ -#include "vmlinux.h" -#include -#include -#include -#include - -SEC("kprobe/__set_task_comm") -int prog(struct pt_regs *ctx) -{ - struct signal_struct *signal; - struct task_struct *tsk; - char oldcomm[TASK_COMM_LEN] =3D {}; - char newcomm[TASK_COMM_LEN] =3D {}; - u16 oom_score_adj; - u32 pid; - - tsk =3D (void *)PT_REGS_PARM1_CORE(ctx); - - pid =3D BPF_CORE_READ(tsk, pid); - bpf_core_read_str(oldcomm, sizeof(oldcomm), &tsk->comm); - bpf_core_read_str(newcomm, sizeof(newcomm), - (void *)PT_REGS_PARM2(ctx)); - signal =3D BPF_CORE_READ(tsk, signal); - oom_score_adj =3D BPF_CORE_READ(signal, oom_score_adj); - return 0; -} - -SEC("kprobe/fib_table_lookup") -int prog2(struct pt_regs *ctx) -{ - return 0; -} - -char _license[] SEC("license") =3D "GPL"; -u32 _version SEC("version") =3D LINUX_VERSION_CODE; diff --git a/samples/bpf/test_overhead_raw_tp.bpf.c b/samples/bpf/test_over= head_raw_tp.bpf.c deleted file mode 100644 index 6af39fe3f8dd..000000000000 --- a/samples/bpf/test_overhead_raw_tp.bpf.c +++ /dev/null @@ -1,17 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* Copyright (c) 2018 Facebook */ -#include "vmlinux.h" -#include - -SEC("raw_tracepoint/task_rename") -int prog(struct bpf_raw_tracepoint_args *ctx) -{ - return 0; -} - -SEC("raw_tracepoint/fib_table_lookup") -int prog2(struct bpf_raw_tracepoint_args *ctx) -{ - return 0; -} -char _license[] SEC("license") =3D "GPL"; diff --git a/samples/bpf/test_overhead_tp.bpf.c b/samples/bpf/test_overhead= _tp.bpf.c deleted file mode 100644 index 5dc08b587978..000000000000 --- a/samples/bpf/test_overhead_tp.bpf.c +++ /dev/null @@ -1,23 +0,0 @@ -/* Copyright (c) 2016 Facebook - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. - */ -#include "vmlinux.h" -#include - -/* from /sys/kernel/tracing/events/task/task_rename/format */ -SEC("tracepoint/task/task_rename") -int prog(struct trace_event_raw_task_rename *ctx) -{ - return 0; -} - -/* from /sys/kernel/tracing/events/fib/fib_table_lookup/format */ -SEC("tracepoint/fib/fib_table_lookup") -int prog2(struct trace_event_raw_fib_table_lookup *ctx) -{ - return 0; -} -char _license[] SEC("license") =3D "GPL"; diff --git a/samples/bpf/test_overhead_user.c b/samples/bpf/test_overhead_u= ser.c deleted file mode 100644 index dbd86f7b1473..000000000000 --- a/samples/bpf/test_overhead_user.c +++ /dev/null @@ -1,225 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0-only -/* Copyright (c) 2016 Facebook - */ -#define _GNU_SOURCE -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#define MAX_CNT 1000000 -#define DUMMY_IP "127.0.0.1" -#define DUMMY_PORT 80 - -static struct bpf_link *links[2]; -static struct bpf_object *obj; -static int cnt; - -static __u64 time_get_ns(void) -{ - struct timespec ts; - - clock_gettime(CLOCK_MONOTONIC, &ts); - return ts.tv_sec * 1000000000ull + ts.tv_nsec; -} - -static void test_task_rename(int cpu) -{ - char buf[] =3D "test\n"; - __u64 start_time; - int i, fd; - - fd =3D open("/proc/self/comm", O_WRONLY|O_TRUNC); - if (fd < 0) { - printf("couldn't open /proc\n"); - exit(1); - } - start_time =3D time_get_ns(); - for (i =3D 0; i < MAX_CNT; i++) { - if (write(fd, buf, sizeof(buf)) < 0) { - printf("task rename failed: %s\n", strerror(errno)); - close(fd); - return; - } - } - printf("task_rename:%d: %lld events per sec\n", - cpu, MAX_CNT * 1000000000ll / (time_get_ns() - start_time)); - close(fd); -} - -static void test_fib_table_lookup(int cpu) -{ - struct sockaddr_in addr; - char buf[] =3D "test\n"; - __u64 start_time; - int i, fd; - - fd =3D socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); - if (fd < 0) { - printf("couldn't open socket\n"); - exit(1); - } - memset((char *)&addr, 0, sizeof(addr)); - addr.sin_addr.s_addr =3D inet_addr(DUMMY_IP); - addr.sin_port =3D htons(DUMMY_PORT); - addr.sin_family =3D AF_INET; - start_time =3D time_get_ns(); - for (i =3D 0; i < MAX_CNT; i++) { - if (sendto(fd, buf, strlen(buf), 0, - (struct sockaddr *)&addr, sizeof(addr)) < 0) { - printf("failed to start ping: %s\n", strerror(errno)); - close(fd); - return; - } - } - printf("fib_table_lookup:%d: %lld events per sec\n", - cpu, MAX_CNT * 1000000000ll / (time_get_ns() - start_time)); - close(fd); -} - -static void loop(int cpu, int flags) -{ - cpu_set_t cpuset; - - CPU_ZERO(&cpuset); - CPU_SET(cpu, &cpuset); - sched_setaffinity(0, sizeof(cpuset), &cpuset); - - if (flags & 1) - test_task_rename(cpu); - if (flags & 2) - test_fib_table_lookup(cpu); -} - -static void run_perf_test(int tasks, int flags) -{ - pid_t pid[tasks]; - int i; - - for (i =3D 0; i < tasks; i++) { - pid[i] =3D fork(); - if (pid[i] =3D=3D 0) { - loop(i, flags); - exit(0); - } else if (pid[i] =3D=3D -1) { - printf("couldn't spawn #%d process\n", i); - exit(1); - } - } - for (i =3D 0; i < tasks; i++) { - int status; - - assert(waitpid(pid[i], &status, 0) =3D=3D pid[i]); - assert(status =3D=3D 0); - } -} - -static int load_progs(char *filename) -{ - struct bpf_program *prog; - int err =3D 0; - - obj =3D bpf_object__open_file(filename, NULL); - err =3D libbpf_get_error(obj); - if (err < 0) { - fprintf(stderr, "ERROR: opening BPF object file failed\n"); - return err; - } - - /* load BPF program */ - err =3D bpf_object__load(obj); - if (err < 0) { - fprintf(stderr, "ERROR: loading BPF object file failed\n"); - return err; - } - - bpf_object__for_each_program(prog, obj) { - links[cnt] =3D bpf_program__attach(prog); - err =3D libbpf_get_error(links[cnt]); - if (err < 0) { - fprintf(stderr, "ERROR: bpf_program__attach failed\n"); - links[cnt] =3D NULL; - return err; - } - cnt++; - } - - return err; -} - -static void unload_progs(void) -{ - while (cnt) - bpf_link__destroy(links[--cnt]); - - bpf_object__close(obj); -} - -int main(int argc, char **argv) -{ - int num_cpu =3D sysconf(_SC_NPROCESSORS_ONLN); - int test_flags =3D ~0; - char filename[256]; - int err =3D 0; - - - if (argc > 1) - test_flags =3D atoi(argv[1]) ? : test_flags; - if (argc > 2) - num_cpu =3D atoi(argv[2]) ? : num_cpu; - - if (test_flags & 0x3) { - printf("BASE\n"); - run_perf_test(num_cpu, test_flags); - } - - if (test_flags & 0xC) { - snprintf(filename, sizeof(filename), - "%s_kprobe.bpf.o", argv[0]); - - printf("w/KPROBE\n"); - err =3D load_progs(filename); - if (!err) - run_perf_test(num_cpu, test_flags >> 2); - - unload_progs(); - } - - if (test_flags & 0x30) { - snprintf(filename, sizeof(filename), - "%s_tp.bpf.o", argv[0]); - printf("w/TRACEPOINT\n"); - err =3D load_progs(filename); - if (!err) - run_perf_test(num_cpu, test_flags >> 4); - - unload_progs(); - } - - if (test_flags & 0xC0) { - snprintf(filename, sizeof(filename), - "%s_raw_tp.bpf.o", argv[0]); - printf("w/RAW_TRACEPOINT\n"); - err =3D load_progs(filename); - if (!err) - run_perf_test(num_cpu, test_flags >> 6); - - unload_progs(); - } - - return err; -} diff --git a/samples/bpf/test_override_return.sh b/samples/bpf/test_overrid= e_return.sh deleted file mode 100755 index 35db26f736b9..000000000000 --- a/samples/bpf/test_override_return.sh +++ /dev/null @@ -1,16 +0,0 @@ -#!/bin/bash - -rm -r tmpmnt -rm -f testfile.img -dd if=3D/dev/zero of=3Dtestfile.img bs=3D1M seek=3D1000 count=3D1 -DEVICE=3D$(losetup --show -f testfile.img) -mkfs.btrfs -f $DEVICE -mkdir tmpmnt -./tracex7 $DEVICE -if [ $? -eq 0 ] -then - echo "SUCCESS!" -else - echo "FAILED!" -fi -losetup -d $DEVICE diff --git a/samples/bpf/test_probe_write_user.bpf.c b/samples/bpf/test_pro= be_write_user.bpf.c deleted file mode 100644 index a4f3798b7fb0..000000000000 --- a/samples/bpf/test_probe_write_user.bpf.c +++ /dev/null @@ -1,52 +0,0 @@ -/* Copyright (c) 2016 Sargun Dhillon - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. - */ -#include "vmlinux.h" -#include -#include -#include -#include -#include - -struct { - __uint(type, BPF_MAP_TYPE_HASH); - __type(key, struct sockaddr_in); - __type(value, struct sockaddr_in); - __uint(max_entries, 256); -} dnat_map SEC(".maps"); - -/* kprobe is NOT a stable ABI - * kernel functions can be removed, renamed or completely change semantics. - * Number of arguments and their positions can change, etc. - * In such case this bpf+kprobe example will no longer be meaningful - * - * This example sits on a syscall, and the syscall ABI is relatively stable - * of course, across platforms, and over time, the ABI may change. - */ -SEC("ksyscall/connect") -int BPF_KSYSCALL(bpf_prog1, int fd, struct sockaddr_in *uservaddr, - int addrlen) -{ - struct sockaddr_in new_addr, orig_addr =3D {}; - struct sockaddr_in *mapped_addr; - - if (addrlen > sizeof(orig_addr)) - return 0; - - if (bpf_probe_read_user(&orig_addr, sizeof(orig_addr), uservaddr) !=3D 0) - return 0; - - mapped_addr =3D bpf_map_lookup_elem(&dnat_map, &orig_addr); - if (mapped_addr !=3D NULL) { - memcpy(&new_addr, mapped_addr, sizeof(new_addr)); - bpf_probe_write_user(uservaddr, &new_addr, - sizeof(new_addr)); - } - return 0; -} - -char _license[] SEC("license") =3D "GPL"; -u32 _version SEC("version") =3D LINUX_VERSION_CODE; diff --git a/samples/bpf/test_probe_write_user_user.c b/samples/bpf/test_pr= obe_write_user_user.c deleted file mode 100644 index 2a539aec4116..000000000000 --- a/samples/bpf/test_probe_write_user_user.c +++ /dev/null @@ -1,108 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -#include -#include -#include -#include -#include -#include -#include -#include - -int main(int ac, char **argv) -{ - struct sockaddr_in *serv_addr_in, *mapped_addr_in, *tmp_addr_in; - struct sockaddr serv_addr, mapped_addr, tmp_addr; - int serverfd, serverconnfd, clientfd, map_fd; - struct bpf_link *link =3D NULL; - struct bpf_program *prog; - struct bpf_object *obj; - socklen_t sockaddr_len; - char filename[256]; - char *ip; - - serv_addr_in =3D (struct sockaddr_in *)&serv_addr; - mapped_addr_in =3D (struct sockaddr_in *)&mapped_addr; - tmp_addr_in =3D (struct sockaddr_in *)&tmp_addr; - - snprintf(filename, sizeof(filename), "%s.bpf.o", argv[0]); - obj =3D bpf_object__open_file(filename, NULL); - if (libbpf_get_error(obj)) { - fprintf(stderr, "ERROR: opening BPF object file failed\n"); - return 0; - } - - prog =3D bpf_object__find_program_by_name(obj, "bpf_prog1"); - if (libbpf_get_error(prog)) { - fprintf(stderr, "ERROR: finding a prog in obj file failed\n"); - goto cleanup; - } - - /* load BPF program */ - if (bpf_object__load(obj)) { - fprintf(stderr, "ERROR: loading BPF object file failed\n"); - goto cleanup; - } - - map_fd =3D bpf_object__find_map_fd_by_name(obj, "dnat_map"); - if (map_fd < 0) { - fprintf(stderr, "ERROR: finding a map in obj file failed\n"); - goto cleanup; - } - - link =3D bpf_program__attach(prog); - if (libbpf_get_error(link)) { - fprintf(stderr, "ERROR: bpf_program__attach failed\n"); - link =3D NULL; - goto cleanup; - } - - assert((serverfd =3D socket(AF_INET, SOCK_STREAM, 0)) > 0); - assert((clientfd =3D socket(AF_INET, SOCK_STREAM, 0)) > 0); - - /* Bind server to ephemeral port on lo */ - memset(&serv_addr, 0, sizeof(serv_addr)); - serv_addr_in->sin_family =3D AF_INET; - serv_addr_in->sin_port =3D 0; - serv_addr_in->sin_addr.s_addr =3D htonl(INADDR_LOOPBACK); - - assert(bind(serverfd, &serv_addr, sizeof(serv_addr)) =3D=3D 0); - - sockaddr_len =3D sizeof(serv_addr); - assert(getsockname(serverfd, &serv_addr, &sockaddr_len) =3D=3D 0); - ip =3D inet_ntoa(serv_addr_in->sin_addr); - printf("Server bound to: %s:%d\n", ip, ntohs(serv_addr_in->sin_port)); - - memset(&mapped_addr, 0, sizeof(mapped_addr)); - mapped_addr_in->sin_family =3D AF_INET; - mapped_addr_in->sin_port =3D htons(5555); - mapped_addr_in->sin_addr.s_addr =3D inet_addr("255.255.255.255"); - - assert(!bpf_map_update_elem(map_fd, &mapped_addr, &serv_addr, BPF_ANY)); - - assert(listen(serverfd, 5) =3D=3D 0); - - ip =3D inet_ntoa(mapped_addr_in->sin_addr); - printf("Client connecting to: %s:%d\n", - ip, ntohs(mapped_addr_in->sin_port)); - assert(connect(clientfd, &mapped_addr, sizeof(mapped_addr)) =3D=3D 0); - - sockaddr_len =3D sizeof(tmp_addr); - ip =3D inet_ntoa(tmp_addr_in->sin_addr); - assert((serverconnfd =3D accept(serverfd, &tmp_addr, &sockaddr_len)) > 0); - printf("Server received connection from: %s:%d\n", - ip, ntohs(tmp_addr_in->sin_port)); - - sockaddr_len =3D sizeof(tmp_addr); - assert(getpeername(clientfd, &tmp_addr, &sockaddr_len) =3D=3D 0); - ip =3D inet_ntoa(tmp_addr_in->sin_addr); - printf("Client's peer address: %s:%d\n", - ip, ntohs(tmp_addr_in->sin_port)); - - /* Is the server's getsockname =3D the socket getpeername */ - assert(memcmp(&serv_addr, &tmp_addr, sizeof(struct sockaddr_in)) =3D=3D 0= ); - -cleanup: - bpf_link__destroy(link); - bpf_object__close(obj); - return 0; -} diff --git a/samples/bpf/tracex7.bpf.c b/samples/bpf/tracex7.bpf.c deleted file mode 100644 index ab8d6704a5a4..000000000000 --- a/samples/bpf/tracex7.bpf.c +++ /dev/null @@ -1,15 +0,0 @@ -#include "vmlinux.h" -#include -#include - -SEC("kprobe/open_ctree") -int bpf_prog1(struct pt_regs *ctx) -{ - unsigned long rc =3D -12; - - bpf_override_return(ctx, rc); - return 0; -} - -char _license[] SEC("license") =3D "GPL"; -u32 _version SEC("version") =3D LINUX_VERSION_CODE; diff --git a/samples/bpf/tracex7_user.c b/samples/bpf/tracex7_user.c deleted file mode 100644 index b10b5e03a226..000000000000 --- a/samples/bpf/tracex7_user.c +++ /dev/null @@ -1,56 +0,0 @@ -#define _GNU_SOURCE - -#include -#include -#include - -int main(int argc, char **argv) -{ - struct bpf_link *link =3D NULL; - struct bpf_program *prog; - struct bpf_object *obj; - char filename[256]; - char command[256]; - int ret =3D 0; - FILE *f; - - if (!argv[1]) { - fprintf(stderr, "ERROR: Run with the btrfs device argument!\n"); - return 0; - } - - snprintf(filename, sizeof(filename), "%s.bpf.o", argv[0]); - obj =3D bpf_object__open_file(filename, NULL); - if (libbpf_get_error(obj)) { - fprintf(stderr, "ERROR: opening BPF object file failed\n"); - return 0; - } - - prog =3D bpf_object__find_program_by_name(obj, "bpf_prog1"); - if (!prog) { - fprintf(stderr, "ERROR: finding a prog in obj file failed\n"); - goto cleanup; - } - - /* load BPF program */ - if (bpf_object__load(obj)) { - fprintf(stderr, "ERROR: loading BPF object file failed\n"); - goto cleanup; - } - - link =3D bpf_program__attach(prog); - if (libbpf_get_error(link)) { - fprintf(stderr, "ERROR: bpf_program__attach failed\n"); - link =3D NULL; - goto cleanup; - } - - snprintf(command, 256, "mount %s tmpmnt/", argv[1]); - f =3D popen(command, "r"); - ret =3D pclose(f); - -cleanup: - bpf_link__destroy(link); - bpf_object__close(obj); - return ret ? 0 : 1; -} -- 2.43.0