Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp298613pxu; Fri, 4 Dec 2020 03:41:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJwDQsvmTxZS+JokL7GECW8UkWlAPYNDU1iFvAzY4r34i+7kwsU7TgHEnovIUse8+EIPHKlX X-Received: by 2002:a17:907:94c6:: with SMTP id dn6mr6747442ejc.13.1607082069200; Fri, 04 Dec 2020 03:41:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607082069; cv=none; d=google.com; s=arc-20160816; b=krqgPQaXR93eHRcsBbvzenfyLQ6TMh1Nnb4S3AtpsbMtpGU9gf+6qCQW9JgpeAcLdR 6DNajUWxokzWJII3GkwZLj71mc4AVZ14gQhZGvIeIm+AltBfqa3VkK1FI2KLYZeGg8PF sBbu3xvVrSq8qxJmfEM9bp0xR/57CNTAEhcsspRrSkVFL9UnqCsbKMo3OA5uNHMcQOHz Qo3IXE3l3SPooRsnG5jDlOSn+jaaV6VKQZQF6NS6mrP4OniYlWZCNmhZF7hu4E4SqdcG b0Rzt4EoHEJVEuLt1HFeFJXAphpsPO5ZCw0jAECNxHCuK1g1cyQP3JrsJe9zE2n0joBM g8+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Em/8NeYdIzugho+SO5PV0hSPwS01qcpVUL59QlZehwE=; b=CzybNEr3ZFsGJb+11SUKPWOcKgeM/PNZ6vZBmt7lurw8mcFco+NAW3Pidsym/CO8aF ixiz1l0iDNN6OQ6zSFP0jMzAP2D3VCSisKQFnsfE5Y6I2BS2stlIBTvTxcTenChmoJv/ bneZGrpdIqlRKX89ezzgx65lENAl/6Xq8GFmTnsm/od5AfQbiQ9rya95CgEaOoBjpImJ g/17DlUtymmOu9UPoLAqVVp2azCeO1/DZ+yedOWY7bPDzb8KQfsLpZdxuTjp5R3Fm83v XlYio1Q19wkFaPYP5t2ZXNE5FQFxHdwvlETQD/k1rAvTUxVWhiMSjno8fjGxGZlOUGyb oxeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="FA0Up1Q/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g32si2839689ede.551.2020.12.04.03.40.46; Fri, 04 Dec 2020 03:41:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="FA0Up1Q/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729956AbgLDLhq (ORCPT + 99 others); Fri, 4 Dec 2020 06:37:46 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726031AbgLDLhp (ORCPT ); Fri, 4 Dec 2020 06:37:45 -0500 Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C4F7EC08E85E for ; Fri, 4 Dec 2020 03:36:22 -0800 (PST) Received: by mail-wm1-x343.google.com with SMTP id g185so6728345wmf.3 for ; Fri, 04 Dec 2020 03:36:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Em/8NeYdIzugho+SO5PV0hSPwS01qcpVUL59QlZehwE=; b=FA0Up1Q/OH+bmpxDC/uqJL/qEaa7qDtgdffIxChpU+o3rYAc10p7f+lGl4VkGWudxX z4CHTUkHsB+/atpvlkLXLrjKc5jHuciOurEZYq5TpA9inCbpfOznypijwQNxoxQTk72m 67JqVKqE7x16SqlLIQucKu2Xq1+qrujqtHn9A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Em/8NeYdIzugho+SO5PV0hSPwS01qcpVUL59QlZehwE=; b=Y0O2jC16kzzKj0SI5HQuGRtUlFmtFLh7lo5ukbAjOZ0MJQwuGqfWY98j+qeDqdfXAN ZWdvRWCDjxyupZ47MhVdCqSecZMAnn2jWOQ4vmPQSIncmX/mu1FlHdR5GCjG8vokFkSP OR4dRZqi/nBUHuIOuV7zOkjgAigdnXcgpbBjFVaaRrWW59jCocAvuUPgJjw1JRy9AiC6 aUDdnvSCereR1xG6KLsAuYcQF6gT4VUG2xy/6xsItRNgQaIsZEC/yAYoooC/9KoX+7l/ 8Idee1T627cma10oTGRVYAfdBp602+P9uzsbG8p1spJIIXoyPS8kockpG+UZHJJ8zMfi oY9w== X-Gm-Message-State: AOAM5312MUpvsxLSZjBl60SVFIsFB5QEMseI9HTiHrmld98Pan6gmZaw XUQg3N+BZcYXJeiCJaGwapikyw== X-Received: by 2002:a1c:4684:: with SMTP id t126mr3688952wma.165.1607081781503; Fri, 04 Dec 2020 03:36:21 -0800 (PST) Received: from revest.zrh.corp.google.com ([2a00:79e0:42:204:f693:9fff:fef4:a569]) by smtp.gmail.com with ESMTPSA id j6sm3202750wrq.38.2020.12.04.03.36.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Dec 2020 03:36:20 -0800 (PST) From: Florent Revest X-Google-Original-From: Florent Revest To: bpf@vger.kernel.org Cc: viro@zeniv.linux.org.uk, davem@davemloft.net, kuba@kernel.org, ast@kernel.org, daniel@iogearbox.net, kafai@fb.com, yhs@fb.com, andrii@kernel.org, kpsingh@chromium.org, revest@google.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH bpf-next v5 4/6] selftests/bpf: Add an iterator selftest for bpf_sk_storage_delete Date: Fri, 4 Dec 2020 12:36:07 +0100 Message-Id: <20201204113609.1850150-4-revest@google.com> X-Mailer: git-send-email 2.29.2.576.ga3fc446d84-goog In-Reply-To: <20201204113609.1850150-1-revest@google.com> References: <20201204113609.1850150-1-revest@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The eBPF program iterates over all entries (well, only one) of a socket local storage map and deletes them all. The test makes sure that the entry is indeed deleted. Signed-off-by: Florent Revest Acked-by: Martin KaFai Lau --- .../selftests/bpf/prog_tests/bpf_iter.c | 64 +++++++++++++++++++ .../progs/bpf_iter_bpf_sk_storage_helpers.c | 23 +++++++ 2 files changed, 87 insertions(+) create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_sk_storage_helpers.c diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_iter.c b/tools/testing/selftests/bpf/prog_tests/bpf_iter.c index 448885b95eed..bb4a638f2e6f 100644 --- a/tools/testing/selftests/bpf/prog_tests/bpf_iter.c +++ b/tools/testing/selftests/bpf/prog_tests/bpf_iter.c @@ -20,6 +20,7 @@ #include "bpf_iter_bpf_percpu_hash_map.skel.h" #include "bpf_iter_bpf_array_map.skel.h" #include "bpf_iter_bpf_percpu_array_map.skel.h" +#include "bpf_iter_bpf_sk_storage_helpers.skel.h" #include "bpf_iter_bpf_sk_storage_map.skel.h" #include "bpf_iter_test_kern5.skel.h" #include "bpf_iter_test_kern6.skel.h" @@ -913,6 +914,67 @@ static void test_bpf_percpu_array_map(void) bpf_iter_bpf_percpu_array_map__destroy(skel); } +/* An iterator program deletes all local storage in a map. */ +static void test_bpf_sk_storage_delete(void) +{ + DECLARE_LIBBPF_OPTS(bpf_iter_attach_opts, opts); + struct bpf_iter_bpf_sk_storage_helpers *skel; + union bpf_iter_link_info linfo; + int err, len, map_fd, iter_fd; + struct bpf_link *link; + int sock_fd = -1; + __u32 val = 42; + char buf[64]; + + skel = bpf_iter_bpf_sk_storage_helpers__open_and_load(); + if (CHECK(!skel, "bpf_iter_bpf_sk_storage_helpers__open_and_load", + "skeleton open_and_load failed\n")) + return; + + map_fd = bpf_map__fd(skel->maps.sk_stg_map); + + sock_fd = socket(AF_INET6, SOCK_STREAM, 0); + if (CHECK(sock_fd < 0, "socket", "errno: %d\n", errno)) + goto out; + err = bpf_map_update_elem(map_fd, &sock_fd, &val, BPF_NOEXIST); + if (CHECK(err, "map_update", "map_update failed\n")) + goto out; + + memset(&linfo, 0, sizeof(linfo)); + linfo.map.map_fd = map_fd; + opts.link_info = &linfo; + opts.link_info_len = sizeof(linfo); + link = bpf_program__attach_iter(skel->progs.delete_bpf_sk_storage_map, + &opts); + if (CHECK(IS_ERR(link), "attach_iter", "attach_iter failed\n")) + goto out; + + iter_fd = bpf_iter_create(bpf_link__fd(link)); + if (CHECK(iter_fd < 0, "create_iter", "create_iter failed\n")) + goto free_link; + + /* do some tests */ + while ((len = read(iter_fd, buf, sizeof(buf))) > 0) + ; + if (CHECK(len < 0, "read", "read failed: %s\n", strerror(errno))) + goto close_iter; + + /* test results */ + err = bpf_map_lookup_elem(map_fd, &sock_fd, &val); + if (CHECK(!err || errno != ENOENT, "bpf_map_lookup_elem", + "map value wasn't deleted (err=%d, errno=%d)\n", err, errno)) + goto close_iter; + +close_iter: + close(iter_fd); +free_link: + bpf_link__destroy(link); +out: + if (sock_fd >= 0) + close(sock_fd); + bpf_iter_bpf_sk_storage_helpers__destroy(skel); +} + static void test_bpf_sk_storage_map(void) { DECLARE_LIBBPF_OPTS(bpf_iter_attach_opts, opts); @@ -1067,6 +1129,8 @@ void test_bpf_iter(void) test_bpf_percpu_array_map(); if (test__start_subtest("bpf_sk_storage_map")) test_bpf_sk_storage_map(); + if (test__start_subtest("bpf_sk_storage_delete")) + test_bpf_sk_storage_delete(); if (test__start_subtest("rdonly-buf-out-of-bound")) test_rdonly_buf_out_of_bound(); if (test__start_subtest("buf-neg-offset")) diff --git a/tools/testing/selftests/bpf/progs/bpf_iter_bpf_sk_storage_helpers.c b/tools/testing/selftests/bpf/progs/bpf_iter_bpf_sk_storage_helpers.c new file mode 100644 index 000000000000..01ff3235e413 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/bpf_iter_bpf_sk_storage_helpers.c @@ -0,0 +1,23 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Copyright (c) 2020 Google LLC. */ +#include "bpf_iter.h" +#include +#include + +char _license[] SEC("license") = "GPL"; + +struct { + __uint(type, BPF_MAP_TYPE_SK_STORAGE); + __uint(map_flags, BPF_F_NO_PREALLOC); + __type(key, int); + __type(value, int); +} sk_stg_map SEC(".maps"); + +SEC("iter/bpf_sk_storage_map") +int delete_bpf_sk_storage_map(struct bpf_iter__bpf_sk_storage_map *ctx) +{ + if (ctx->sk) + bpf_sk_storage_delete(&sk_stg_map, ctx->sk); + + return 0; +} -- 2.29.2.576.ga3fc446d84-goog