diff mbox series

[v5,bpf-next,1/5] selftests/bpf: Add test for CGROUP_STORAGE map on multiple attaches

Message ID 46200200d3a12dac05a4f8b8cefebebce06bd6db.1595489786.git.zhuyifei@google.com
State Changes Requested
Delegated to: BPF Maintainers
Headers show
Series Make BPF CGROUP_STORAGE map usable by different programs at once | expand

Commit Message

YiFei Zhu July 23, 2020, 7:40 a.m. UTC
From: YiFei Zhu <zhuyifei@google.com>

This test creates a parent cgroup, and a child of that cgroup.
It attaches a cgroup_skb/egress program that simply counts packets,
to a global variable (ARRAY map), and to a CGROUP_STORAGE map.
The program is first attached to the parent cgroup only, then to
parent and child.

The test cases sends a message within the child cgroup, and because
the program is inherited across parent / child cgroups, it will
trigger the egress program for both the parent and child, if they
exist. The program, when looking up a CGROUP_STORAGE map, uses the
cgroup and attach type of the attachment parameters; therefore,
both attaches uses different cgroup storages.

We assert that all packet counts returns what we expects.

Signed-off-by: YiFei Zhu <zhuyifei@google.com>
---
 .../bpf/prog_tests/cg_storage_multi.c         | 163 ++++++++++++++++++
 .../bpf/progs/cg_storage_multi_egress_only.c  |  30 ++++
 2 files changed, 193 insertions(+)
 create mode 100644 tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
 create mode 100644 tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c

Comments

Martin KaFai Lau July 24, 2020, 12:03 a.m. UTC | #1
On Thu, Jul 23, 2020 at 02:40:54AM -0500, YiFei Zhu wrote:
> From: YiFei Zhu <zhuyifei@google.com>
> 
> This test creates a parent cgroup, and a child of that cgroup.
> It attaches a cgroup_skb/egress program that simply counts packets,
> to a global variable (ARRAY map), and to a CGROUP_STORAGE map.
> The program is first attached to the parent cgroup only, then to
> parent and child.
> 
> The test cases sends a message within the child cgroup, and because
> the program is inherited across parent / child cgroups, it will
> trigger the egress program for both the parent and child, if they
> exist. The program, when looking up a CGROUP_STORAGE map, uses the
> cgroup and attach type of the attachment parameters; therefore,
> both attaches uses different cgroup storages.
> 
> We assert that all packet counts returns what we expects.
> 
> Signed-off-by: YiFei Zhu <zhuyifei@google.com>
> ---
>  .../bpf/prog_tests/cg_storage_multi.c         | 163 ++++++++++++++++++
>  .../bpf/progs/cg_storage_multi_egress_only.c  |  30 ++++
>  2 files changed, 193 insertions(+)
>  create mode 100644 tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
>  create mode 100644 tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c
> 
> diff --git a/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
> new file mode 100644
> index 000000000000..6d5a2194e036
> --- /dev/null
> +++ b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
> @@ -0,0 +1,163 @@
> +// SPDX-License-Identifier: GPL-2.0-only
> +
> +/*
> + * Copyright 2020 Google LLC.
> + */
> +
> +#include <test_progs.h>
> +#include <cgroup_helpers.h>
> +#include <network_helpers.h>
> +
> +#include "cg_storage_multi_egress_only.skel.h"
> +
> +#define PARENT_CGROUP "/cgroup_storage"
> +#define CHILD_CGROUP "/cgroup_storage/child"
> +
> +static int duration;
> +
> +static bool assert_storage(struct bpf_map *map, const char *cgroup_path,
> +			   __u32 expected)
> +{
> +	struct bpf_cgroup_storage_key key = {0};
> +	__u32 value;
> +	int map_fd;
> +
> +	map_fd = bpf_map__fd(map);
> +
> +	key.cgroup_inode_id = get_cgroup_id(cgroup_path);
> +	key.attach_type = BPF_CGROUP_INET_EGRESS;
> +	if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) < 0,
> +		  "map-lookup", "errno %d", errno))
> +		return true;
> +	if (CHECK(value != expected,
> +		  "assert-storage", "got %u expected %u", value, expected))
> +		return true;
> +
> +	return false;
> +}
> +
> +static bool assert_storage_noexist(struct bpf_map *map, const char *cgroup_path)
> +{
> +	struct bpf_cgroup_storage_key key = {0};
> +	__u32 value;
> +	int map_fd;
> +
> +	map_fd = bpf_map__fd(map);
> +
> +	key.cgroup_inode_id = get_cgroup_id(cgroup_path);
> +	key.attach_type = BPF_CGROUP_INET_EGRESS;
> +	if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) == 0,
> +		  "map-lookup", "succeeded, expected ENOENT"))
> +		return true;
> +	if (CHECK(errno != ENOENT,
> +		  "map-lookup", "errno %d, expected ENOENT", errno))
> +		return true;
> +
> +	return false;
> +}
> +
> +static bool connect_send(const char *cgroup_path)
> +{
> +	bool res = true;
> +	int server_fd = -1, client_fd = -1;
> +
> +	if (join_cgroup(cgroup_path))
> +		goto out_clean;
> +
> +	server_fd = start_server(AF_INET, SOCK_DGRAM, NULL, 0, 0);
> +	if (server_fd < 0)
> +		goto out_clean;
> +
> +	client_fd = connect_to_fd(server_fd, 0);
> +	if (client_fd < 0)
> +		goto out_clean;
> +
> +	if (send(client_fd, "message", strlen("message"), 0) < 0)
> +		goto out_clean;
> +
> +	res = false;
> +
> +out_clean:
> +	close(client_fd);
> +	close(server_fd);
> +	return res;
> +}
> +
> +static void test_egress_only(int parent_cgroup_fd, int child_cgroup_fd)
> +{
> +	struct cg_storage_multi_egress_only *obj;
> +	struct bpf_link *parent_link = NULL, *child_link = NULL;
> +	bool err;
> +
> +	obj = cg_storage_multi_egress_only__open_and_load();
> +	if (CHECK(!obj, "skel-load", "errno %d", errno))
> +		return;
> +
> +	/* Attach to parent cgroup, trigger packet from child.
> +	 * Assert that there is only one run and in that run the storage is
> +	 * parent cgroup's storage.
> +	 * Also assert that child cgroup's storage does not exist
> +	 */
> +	parent_link = bpf_program__attach_cgroup(obj->progs.egress,
> +						 parent_cgroup_fd);
> +	if (CHECK(IS_ERR(parent_link), "parent-cg-attach",
> +		  "err %ld", PTR_ERR(parent_link)))
> +		goto close_bpf_object;
> +	err = connect_send(CHILD_CGROUP);
> +	if (CHECK(err, "first-connect-send", "errno %d", errno))
> +		goto close_bpf_object;
> +	if (CHECK(obj->bss->invocations != 1,
> +		  "first-invoke", "invocations=%d", obj->bss->invocations))
> +		goto close_bpf_object;
> +	if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 1))
> +		goto close_bpf_object;
> +	if (assert_storage_noexist(obj->maps.cgroup_storage, CHILD_CGROUP))
> +		goto close_bpf_object;
> +
> +	/* Attach to parent and child cgroup, trigger packet from child.
> +	 * Assert that there are two additional runs, one that run with parent
> +	 * cgroup's storage and one with child cgroup's storage.
> +	 */
> +	child_link = bpf_program__attach_cgroup(obj->progs.egress,
> +						child_cgroup_fd);
> +	if (CHECK(IS_ERR(child_link), "child-cg-attach",
> +		  "err %ld", PTR_ERR(child_link)))
> +		goto close_bpf_object;
> +	err = connect_send(CHILD_CGROUP);
> +	if (CHECK(err, "second-connect-send", "errno %d", errno))
> +		goto close_bpf_object;
> +	if (CHECK(obj->bss->invocations != 3,
> +		  "second-invoke", "invocations=%d", obj->bss->invocations))
> +		goto close_bpf_object;
> +	if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 2))
> +		goto close_bpf_object;
> +	if (assert_storage(obj->maps.cgroup_storage, CHILD_CGROUP, 1))
> +		goto close_bpf_object;
> +
> +close_bpf_object:
> +	if (parent_link)
Nit. I think bpf_link__destroy() is already NULL safe.

> +		bpf_link__destroy(parent_link);
> +	if (child_link)
> +		bpf_link__destroy(child_link);
> +
> +	cg_storage_multi_egress_only__destroy(obj);
> +}
> +
diff mbox series

Patch

diff --git a/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
new file mode 100644
index 000000000000..6d5a2194e036
--- /dev/null
+++ b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
@@ -0,0 +1,163 @@ 
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2020 Google LLC.
+ */
+
+#include <test_progs.h>
+#include <cgroup_helpers.h>
+#include <network_helpers.h>
+
+#include "cg_storage_multi_egress_only.skel.h"
+
+#define PARENT_CGROUP "/cgroup_storage"
+#define CHILD_CGROUP "/cgroup_storage/child"
+
+static int duration;
+
+static bool assert_storage(struct bpf_map *map, const char *cgroup_path,
+			   __u32 expected)
+{
+	struct bpf_cgroup_storage_key key = {0};
+	__u32 value;
+	int map_fd;
+
+	map_fd = bpf_map__fd(map);
+
+	key.cgroup_inode_id = get_cgroup_id(cgroup_path);
+	key.attach_type = BPF_CGROUP_INET_EGRESS;
+	if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) < 0,
+		  "map-lookup", "errno %d", errno))
+		return true;
+	if (CHECK(value != expected,
+		  "assert-storage", "got %u expected %u", value, expected))
+		return true;
+
+	return false;
+}
+
+static bool assert_storage_noexist(struct bpf_map *map, const char *cgroup_path)
+{
+	struct bpf_cgroup_storage_key key = {0};
+	__u32 value;
+	int map_fd;
+
+	map_fd = bpf_map__fd(map);
+
+	key.cgroup_inode_id = get_cgroup_id(cgroup_path);
+	key.attach_type = BPF_CGROUP_INET_EGRESS;
+	if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) == 0,
+		  "map-lookup", "succeeded, expected ENOENT"))
+		return true;
+	if (CHECK(errno != ENOENT,
+		  "map-lookup", "errno %d, expected ENOENT", errno))
+		return true;
+
+	return false;
+}
+
+static bool connect_send(const char *cgroup_path)
+{
+	bool res = true;
+	int server_fd = -1, client_fd = -1;
+
+	if (join_cgroup(cgroup_path))
+		goto out_clean;
+
+	server_fd = start_server(AF_INET, SOCK_DGRAM, NULL, 0, 0);
+	if (server_fd < 0)
+		goto out_clean;
+
+	client_fd = connect_to_fd(server_fd, 0);
+	if (client_fd < 0)
+		goto out_clean;
+
+	if (send(client_fd, "message", strlen("message"), 0) < 0)
+		goto out_clean;
+
+	res = false;
+
+out_clean:
+	close(client_fd);
+	close(server_fd);
+	return res;
+}
+
+static void test_egress_only(int parent_cgroup_fd, int child_cgroup_fd)
+{
+	struct cg_storage_multi_egress_only *obj;
+	struct bpf_link *parent_link = NULL, *child_link = NULL;
+	bool err;
+
+	obj = cg_storage_multi_egress_only__open_and_load();
+	if (CHECK(!obj, "skel-load", "errno %d", errno))
+		return;
+
+	/* Attach to parent cgroup, trigger packet from child.
+	 * Assert that there is only one run and in that run the storage is
+	 * parent cgroup's storage.
+	 * Also assert that child cgroup's storage does not exist
+	 */
+	parent_link = bpf_program__attach_cgroup(obj->progs.egress,
+						 parent_cgroup_fd);
+	if (CHECK(IS_ERR(parent_link), "parent-cg-attach",
+		  "err %ld", PTR_ERR(parent_link)))
+		goto close_bpf_object;
+	err = connect_send(CHILD_CGROUP);
+	if (CHECK(err, "first-connect-send", "errno %d", errno))
+		goto close_bpf_object;
+	if (CHECK(obj->bss->invocations != 1,
+		  "first-invoke", "invocations=%d", obj->bss->invocations))
+		goto close_bpf_object;
+	if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 1))
+		goto close_bpf_object;
+	if (assert_storage_noexist(obj->maps.cgroup_storage, CHILD_CGROUP))
+		goto close_bpf_object;
+
+	/* Attach to parent and child cgroup, trigger packet from child.
+	 * Assert that there are two additional runs, one that run with parent
+	 * cgroup's storage and one with child cgroup's storage.
+	 */
+	child_link = bpf_program__attach_cgroup(obj->progs.egress,
+						child_cgroup_fd);
+	if (CHECK(IS_ERR(child_link), "child-cg-attach",
+		  "err %ld", PTR_ERR(child_link)))
+		goto close_bpf_object;
+	err = connect_send(CHILD_CGROUP);
+	if (CHECK(err, "second-connect-send", "errno %d", errno))
+		goto close_bpf_object;
+	if (CHECK(obj->bss->invocations != 3,
+		  "second-invoke", "invocations=%d", obj->bss->invocations))
+		goto close_bpf_object;
+	if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 2))
+		goto close_bpf_object;
+	if (assert_storage(obj->maps.cgroup_storage, CHILD_CGROUP, 1))
+		goto close_bpf_object;
+
+close_bpf_object:
+	if (parent_link)
+		bpf_link__destroy(parent_link);
+	if (child_link)
+		bpf_link__destroy(child_link);
+
+	cg_storage_multi_egress_only__destroy(obj);
+}
+
+void test_cg_storage_multi(void)
+{
+	int parent_cgroup_fd = -1, child_cgroup_fd = -1;
+
+	parent_cgroup_fd = test__join_cgroup(PARENT_CGROUP);
+	if (CHECK(parent_cgroup_fd < 0, "cg-create-parent", "errno %d", errno))
+		goto close_cgroup_fd;
+	child_cgroup_fd = create_and_get_cgroup(CHILD_CGROUP);
+	if (CHECK(child_cgroup_fd < 0, "cg-create-child", "errno %d", errno))
+		goto close_cgroup_fd;
+
+	if (test__start_subtest("egress_only"))
+		test_egress_only(parent_cgroup_fd, child_cgroup_fd);
+
+close_cgroup_fd:
+	close(child_cgroup_fd);
+	close(parent_cgroup_fd);
+}
diff --git a/tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c b/tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c
new file mode 100644
index 000000000000..ec0165d07105
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c
@@ -0,0 +1,30 @@ 
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2020 Google LLC.
+ */
+
+#include <errno.h>
+#include <linux/bpf.h>
+#include <linux/ip.h>
+#include <linux/udp.h>
+#include <bpf/bpf_helpers.h>
+
+struct {
+	__uint(type, BPF_MAP_TYPE_CGROUP_STORAGE);
+	__type(key, struct bpf_cgroup_storage_key);
+	__type(value, __u32);
+} cgroup_storage SEC(".maps");
+
+__u32 invocations = 0;
+
+SEC("cgroup_skb/egress")
+int egress(struct __sk_buff *skb)
+{
+	__u32 *ptr_cg_storage = bpf_get_local_storage(&cgroup_storage, 0);
+
+	__sync_fetch_and_add(ptr_cg_storage, 1);
+	__sync_fetch_and_add(&invocations, 1);
+
+	return 1;
+}