aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
diff options
context:
space:
mode:
authorLinus Torvalds <[email protected]>2025-07-30 16:58:50 +0000
committerLinus Torvalds <[email protected]>2025-07-30 16:58:50 +0000
commitd9104cec3e8fe4b458b74709853231385779001f (patch)
tree1ffc3baa0e963d3301765a5d6cbd5410c8796ee4 /tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
parentMerge tag 'net-next-6.17' of git://git.kernel.org/pub/scm/linux/kernel/git/ne... (diff)
parentMerge branch 'bpf-show-precise-rejected-function-when-attaching-to-__noreturn... (diff)
downloadkernel-d9104cec3e8fe4b458b74709853231385779001f.tar.gz
kernel-d9104cec3e8fe4b458b74709853231385779001f.zip
Merge tag 'bpf-next-6.17' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next
Pull bpf updates from Alexei Starovoitov: - Remove usermode driver (UMD) framework (Thomas Weißschuh) - Introduce Strongly Connected Component (SCC) in the verifier to detect loops and refine register liveness (Eduard Zingerman) - Allow 'void *' cast using bpf_rdonly_cast() and corresponding '__arg_untrusted' for global function parameters (Eduard Zingerman) - Improve precision for BPF_ADD and BPF_SUB operations in the verifier (Harishankar Vishwanathan) - Teach the verifier that constant pointer to a map cannot be NULL (Ihor Solodrai) - Introduce BPF streams for error reporting of various conditions detected by BPF runtime (Kumar Kartikeya Dwivedi) - Teach the verifier to insert runtime speculation barrier (lfence on x86) to mitigate speculative execution instead of rejecting the programs (Luis Gerhorst) - Various improvements for 'veristat' (Mykyta Yatsenko) - For CONFIG_DEBUG_KERNEL config warn on internal verifier errors to improve bug detection by syzbot (Paul Chaignon) - Support BPF private stack on arm64 (Puranjay Mohan) - Introduce bpf_cgroup_read_xattr() kfunc to read xattr of cgroup's node (Song Liu) - Introduce kfuncs for read-only string opreations (Viktor Malik) - Implement show_fdinfo() for bpf_links (Tao Chen) - Reduce verifier's stack consumption (Yonghong Song) - Implement mprog API for cgroup-bpf programs (Yonghong Song) * tag 'bpf-next-6.17' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next: (192 commits) selftests/bpf: Migrate fexit_noreturns case into tracing_failure test suite selftests/bpf: Add selftest for attaching tracing programs to functions in deny list bpf: Add log for attaching tracing programs to functions in deny list bpf: Show precise rejected function when attaching fexit/fmod_ret to __noreturn functions bpf: Fix various typos in verifier.c comments bpf: Add third round of bounds deduction selftests/bpf: Test invariants on JSLT crossing sign selftests/bpf: Test cross-sign 64bits range refinement selftests/bpf: Update reg_bound range refinement logic bpf: Improve bounds when s64 crosses sign boundary bpf: Simplify bounds refinement from s32 selftests/bpf: Enable private stack tests for arm64 bpf, arm64: JIT support for private stack bpf: Move bpf_jit_get_prog_name() to core.c bpf, arm64: Fix fp initialization for exception boundary umd: Remove usermode driver framework bpf/preload: Don't select USERMODE_DRIVER selftests/bpf: Fix test dynptr/test_dynptr_memset_xdp_chunks failure selftests/bpf: Fix test dynptr/test_dynptr_copy_xdp failure selftests/bpf: Increase xdp data size for arm64 64K page size ...
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c')
-rw-r--r--tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c117
1 files changed, 22 insertions, 95 deletions
diff --git a/tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c b/tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
index 87978a0f7eb7..e0dd966e4a3e 100644
--- a/tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
+++ b/tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
@@ -7,133 +7,60 @@
#include <string.h>
#include <unistd.h>
#include <sys/socket.h>
-#include <sys/xattr.h>
-
#include <test_progs.h>
+#include "cgroup_helpers.h"
#include "read_cgroupfs_xattr.skel.h"
#include "cgroup_read_xattr.skel.h"
-#define CGROUP_FS_ROOT "/sys/fs/cgroup/"
-#define CGROUP_FS_PARENT CGROUP_FS_ROOT "foo/"
+#define CGROUP_FS_PARENT "foo/"
#define CGROUP_FS_CHILD CGROUP_FS_PARENT "bar/"
-
-static int move_pid_to_cgroup(const char *cgroup_folder, pid_t pid)
-{
- char filename[128];
- char pid_str[64];
- int procs_fd;
- int ret;
-
- snprintf(filename, sizeof(filename), "%scgroup.procs", cgroup_folder);
- snprintf(pid_str, sizeof(pid_str), "%d", pid);
-
- procs_fd = open(filename, O_WRONLY | O_APPEND);
- if (!ASSERT_OK_FD(procs_fd, "open"))
- return -1;
-
- ret = write(procs_fd, pid_str, strlen(pid_str));
- close(procs_fd);
- if (!ASSERT_GT(ret, 0, "write cgroup.procs"))
- return -1;
- return 0;
-}
-
-static void reset_cgroups_and_lo(void)
-{
- rmdir(CGROUP_FS_CHILD);
- rmdir(CGROUP_FS_PARENT);
- system("ip addr del 1.1.1.1/32 dev lo");
- system("ip link set dev lo down");
-}
+#define TMP_FILE "/tmp/selftests_cgroup_xattr"
static const char xattr_value_a[] = "bpf_selftest_value_a";
static const char xattr_value_b[] = "bpf_selftest_value_b";
static const char xattr_name[] = "user.bpf_test";
-static int setup_cgroups_and_lo(void)
-{
- int err;
-
- err = mkdir(CGROUP_FS_PARENT, 0755);
- if (!ASSERT_OK(err, "mkdir 1"))
- goto error;
- err = mkdir(CGROUP_FS_CHILD, 0755);
- if (!ASSERT_OK(err, "mkdir 2"))
- goto error;
-
- err = setxattr(CGROUP_FS_PARENT, xattr_name, xattr_value_a,
- strlen(xattr_value_a) + 1, 0);
- if (!ASSERT_OK(err, "setxattr 1"))
- goto error;
-
- err = setxattr(CGROUP_FS_CHILD, xattr_name, xattr_value_b,
- strlen(xattr_value_b) + 1, 0);
- if (!ASSERT_OK(err, "setxattr 2"))
- goto error;
-
- err = system("ip link set dev lo up");
- if (!ASSERT_OK(err, "lo up"))
- goto error;
-
- err = system("ip addr add 1.1.1.1 dev lo");
- if (!ASSERT_OK(err, "lo addr v4"))
- goto error;
-
- err = write_sysctl("/proc/sys/net/ipv4/ping_group_range", "0 0");
- if (!ASSERT_OK(err, "write_sysctl"))
- goto error;
-
- return 0;
-error:
- reset_cgroups_and_lo();
- return err;
-}
-
static void test_read_cgroup_xattr(void)
{
- struct sockaddr_in sa4 = {
- .sin_family = AF_INET,
- .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
- };
+ int tmp_fd, parent_cgroup_fd = -1, child_cgroup_fd = -1;
struct read_cgroupfs_xattr *skel = NULL;
- pid_t pid = gettid();
- int sock_fd = -1;
- int connect_fd = -1;
- if (!ASSERT_OK(setup_cgroups_and_lo(), "setup_cgroups_and_lo"))
+ parent_cgroup_fd = test__join_cgroup(CGROUP_FS_PARENT);
+ if (!ASSERT_OK_FD(parent_cgroup_fd, "create parent cgroup"))
return;
- if (!ASSERT_OK(move_pid_to_cgroup(CGROUP_FS_CHILD, pid),
- "move_pid_to_cgroup"))
+ if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_PARENT, xattr_name, xattr_value_a),
+ "set parent xattr"))
+ goto out;
+
+ child_cgroup_fd = test__join_cgroup(CGROUP_FS_CHILD);
+ if (!ASSERT_OK_FD(child_cgroup_fd, "create child cgroup"))
+ goto out;
+ if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_CHILD, xattr_name, xattr_value_b),
+ "set child xattr"))
goto out;
skel = read_cgroupfs_xattr__open_and_load();
if (!ASSERT_OK_PTR(skel, "read_cgroupfs_xattr__open_and_load"))
goto out;
- skel->bss->target_pid = pid;
+ skel->bss->target_pid = gettid();
if (!ASSERT_OK(read_cgroupfs_xattr__attach(skel), "read_cgroupfs_xattr__attach"))
goto out;
- sock_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP);
- if (!ASSERT_OK_FD(sock_fd, "sock create"))
- goto out;
-
- connect_fd = connect(sock_fd, &sa4, sizeof(sa4));
- if (!ASSERT_OK_FD(connect_fd, "connect 1"))
- goto out;
- close(connect_fd);
+ tmp_fd = open(TMP_FILE, O_RDONLY | O_CREAT);
+ ASSERT_OK_FD(tmp_fd, "open tmp file");
+ close(tmp_fd);
ASSERT_TRUE(skel->bss->found_value_a, "found_value_a");
ASSERT_TRUE(skel->bss->found_value_b, "found_value_b");
out:
- close(connect_fd);
- close(sock_fd);
+ close(child_cgroup_fd);
+ close(parent_cgroup_fd);
read_cgroupfs_xattr__destroy(skel);
- move_pid_to_cgroup(CGROUP_FS_ROOT, pid);
- reset_cgroups_and_lo();
+ unlink(TMP_FILE);
}
void test_cgroup_xattr(void)