Commit b7ea631b authored by Martin KaFai Lau's avatar Martin KaFai Lau

Merge branch 'selftests/bpf: convert test_dev_cgroup to test_progs'

Alexis Lothoré (eBPF Foundation) says:

====================
Hello,
this small series aims to integrate test_dev_cgroup in test_progs so it
could be run automatically in CI. The new version brings a few differences
with the current one:
- test now uses directly syscalls instead of wrapping commandline tools
  into system() calls
- test_progs manipulates /dev/null (eg: redirecting test logs into it), so
  disabling access to it in the bpf program confuses the tests. To fix this,
  the first commit modifies the bpf program to allow access to char devices
  1:3 (/dev/null), and disable access to char devices 1:5 (/dev/zero)
- once test is converted, add a small subtest to also check for device type
  interpretation (char or block)
- paths used in mknod tests are now in /dev instead of /tmp: due to the CI
  runner organisation and mountpoints manipulations, trying to create nodes
  in /tmp leads to errors unrelated to the test (ie, mknod calls refused by
  kernel, not the bpf program). I don't understand exactly the root cause
  at the deepest point (all I see in CI is an -ENXIO error on mknod when trying to
  create the node in tmp, and I can not make sense out of it neither
  replicate it locally), so I would gladly take inputs from anyone more
  educated than me about this.

The new test_progs part has been tested in a local qemu environment as well
as in upstream CI:

  ./test_progs -a cgroup_dev
  47/1    cgroup_dev/allow-mknod:OK
  47/2    cgroup_dev/allow-read:OK
  47/3    cgroup_dev/allow-write:OK
  47/4    cgroup_dev/deny-mknod:OK
  47/5    cgroup_dev/deny-read:OK
  47/6    cgroup_dev/deny-write:OK
  47/7    cgroup_dev/deny-mknod-wrong-type:OK
  47      cgroup_dev:OK
  Summary: 1/7 PASSED, 0 SKIPPED, 0 FAILED
---
Changes in v4:
- Fix mixup between ret and errno by testing both
- Properly apply ack tag from Stanislas
- Link to v3: https://lore.kernel.org/r/20240730-convert_dev_cgroup-v3-0-93e573b74357@bootlin.com

Changes in v3:
- delete mknod file only if it has been created
- use bpf_program__attach_cgroup() instead of bpf_prog_attach
- reorganize subtests order
- collect review/ack tags from Alan and Stanislas
- Link to v2: https://lore.kernel.org/r/20240729-convert_dev_cgroup-v2-0-4c1fc0520545@bootlin.com

Changes in v2:
- directly pass expected ret code to subtests instead of boolean pass/not
  pass
- fix faulty fd check in subtest expected to fail on open
- fix wrong subtest name
- pass test buffer and corresponding size to read/write subtests
- use correct series prefix
- Link to v1: https://lore.kernel.org/r/20240725-convert_dev_cgroup-v1-0-2c8cbd487c44@bootlin.com
====================
Signed-off-by: default avatarMartin KaFai Lau <martin.lau@kernel.org>
parents 92cc2456 84cdbff4
...@@ -9,7 +9,6 @@ test_lpm_map ...@@ -9,7 +9,6 @@ test_lpm_map
test_tag test_tag
FEATURE-DUMP.libbpf FEATURE-DUMP.libbpf
fixdep fixdep
test_dev_cgroup
/test_progs /test_progs
/test_progs-no_alu32 /test_progs-no_alu32
/test_progs-bpf_gcc /test_progs-bpf_gcc
......
...@@ -67,7 +67,6 @@ endif ...@@ -67,7 +67,6 @@ endif
# Order correspond to 'make run_tests' order # Order correspond to 'make run_tests' order
TEST_GEN_PROGS = test_verifier test_tag test_maps test_lru_map test_lpm_map test_progs \ TEST_GEN_PROGS = test_verifier test_tag test_maps test_lru_map test_lpm_map test_progs \
test_dev_cgroup \
test_sock test_sockmap get_cgroup_id_user \ test_sock test_sockmap get_cgroup_id_user \
test_cgroup_storage \ test_cgroup_storage \
test_tcpnotify_user test_sysctl \ test_tcpnotify_user test_sysctl \
...@@ -292,7 +291,6 @@ JSON_WRITER := $(OUTPUT)/json_writer.o ...@@ -292,7 +291,6 @@ JSON_WRITER := $(OUTPUT)/json_writer.o
CAP_HELPERS := $(OUTPUT)/cap_helpers.o CAP_HELPERS := $(OUTPUT)/cap_helpers.o
NETWORK_HELPERS := $(OUTPUT)/network_helpers.o NETWORK_HELPERS := $(OUTPUT)/network_helpers.o
$(OUTPUT)/test_dev_cgroup: $(CGROUP_HELPERS) $(TESTING_HELPERS)
$(OUTPUT)/test_skb_cgroup_id_user: $(CGROUP_HELPERS) $(TESTING_HELPERS) $(OUTPUT)/test_skb_cgroup_id_user: $(CGROUP_HELPERS) $(TESTING_HELPERS)
$(OUTPUT)/test_sock: $(CGROUP_HELPERS) $(TESTING_HELPERS) $(OUTPUT)/test_sock: $(CGROUP_HELPERS) $(TESTING_HELPERS)
$(OUTPUT)/test_sockmap: $(CGROUP_HELPERS) $(TESTING_HELPERS) $(OUTPUT)/test_sockmap: $(CGROUP_HELPERS) $(TESTING_HELPERS)
......
// SPDX-License-Identifier: GPL-2.0
#include <sys/stat.h>
#include <sys/sysmacros.h>
#include <errno.h>
#include "test_progs.h"
#include "cgroup_helpers.h"
#include "dev_cgroup.skel.h"
#define TEST_CGROUP "/test-bpf-based-device-cgroup/"
#define TEST_BUFFER_SIZE 64
static void test_mknod(const char *path, mode_t mode, int dev_major,
int dev_minor, int expected_ret, int expected_errno)
{
int ret;
unlink(path);
ret = mknod(path, mode, makedev(dev_major, dev_minor));
ASSERT_EQ(ret, expected_ret, "mknod");
if (expected_ret)
ASSERT_EQ(errno, expected_errno, "mknod errno");
else
unlink(path);
}
static void test_read(const char *path, char *buf, int buf_size,
int expected_ret, int expected_errno)
{
int ret, fd;
fd = open(path, O_RDONLY);
/* A bare open on unauthorized device should fail */
if (expected_ret < 0) {
ASSERT_EQ(fd, expected_ret, "open ret for read");
ASSERT_EQ(errno, expected_errno, "open errno for read");
if (fd >= 0)
close(fd);
return;
}
if (!ASSERT_OK_FD(fd, "open ret for read"))
return;
ret = read(fd, buf, buf_size);
ASSERT_EQ(ret, expected_ret, "read");
close(fd);
}
static void test_write(const char *path, char *buf, int buf_size,
int expected_ret, int expected_errno)
{
int ret, fd;
fd = open(path, O_WRONLY);
/* A bare open on unauthorized device should fail */
if (expected_ret < 0) {
ASSERT_EQ(fd, expected_ret, "open ret for write");
ASSERT_EQ(errno, expected_errno, "open errno for write");
if (fd >= 0)
close(fd);
return;
}
if (!ASSERT_OK_FD(fd, "open ret for write"))
return;
ret = write(fd, buf, buf_size);
ASSERT_EQ(ret, expected_ret, "write");
close(fd);
}
void test_cgroup_dev(void)
{
char buf[TEST_BUFFER_SIZE] = "some random test data";
struct dev_cgroup *skel;
int cgroup_fd;
cgroup_fd = cgroup_setup_and_join(TEST_CGROUP);
if (!ASSERT_OK_FD(cgroup_fd, "cgroup switch"))
return;
skel = dev_cgroup__open_and_load();
if (!ASSERT_OK_PTR(skel, "load program"))
goto cleanup_cgroup;
skel->links.bpf_prog1 =
bpf_program__attach_cgroup(skel->progs.bpf_prog1, cgroup_fd);
if (!ASSERT_OK_PTR(skel->links.bpf_prog1, "attach_program"))
goto cleanup_progs;
if (test__start_subtest("allow-mknod"))
test_mknod("/dev/test_dev_cgroup_null", S_IFCHR, 1, 3, 0, 0);
if (test__start_subtest("allow-read"))
test_read("/dev/urandom", buf, TEST_BUFFER_SIZE,
TEST_BUFFER_SIZE, 0);
if (test__start_subtest("allow-write"))
test_write("/dev/null", buf, TEST_BUFFER_SIZE,
TEST_BUFFER_SIZE, 0);
if (test__start_subtest("deny-mknod"))
test_mknod("/dev/test_dev_cgroup_zero", S_IFCHR, 1, 5, -1,
EPERM);
if (test__start_subtest("deny-read"))
test_read("/dev/random", buf, TEST_BUFFER_SIZE, -1, EPERM);
if (test__start_subtest("deny-write"))
test_write("/dev/zero", buf, TEST_BUFFER_SIZE, -1, EPERM);
if (test__start_subtest("deny-mknod-wrong-type"))
test_mknod("/dev/test_dev_cgroup_block", S_IFBLK, 1, 3, -1,
EPERM);
cleanup_progs:
dev_cgroup__destroy(skel);
cleanup_cgroup:
cleanup_cgroup_environment();
}
...@@ -41,14 +41,14 @@ int bpf_prog1(struct bpf_cgroup_dev_ctx *ctx) ...@@ -41,14 +41,14 @@ int bpf_prog1(struct bpf_cgroup_dev_ctx *ctx)
bpf_trace_printk(fmt, sizeof(fmt), ctx->major, ctx->minor); bpf_trace_printk(fmt, sizeof(fmt), ctx->major, ctx->minor);
#endif #endif
/* Allow access to /dev/zero and /dev/random. /* Allow access to /dev/null and /dev/urandom.
* Forbid everything else. * Forbid everything else.
*/ */
if (ctx->major != 1 || type != BPF_DEVCG_DEV_CHAR) if (ctx->major != 1 || type != BPF_DEVCG_DEV_CHAR)
return 0; return 0;
switch (ctx->minor) { switch (ctx->minor) {
case 5: /* 1:5 /dev/zero */ case 3: /* 1:3 /dev/null */
case 9: /* 1:9 /dev/urandom */ case 9: /* 1:9 /dev/urandom */
return 1; return 1;
} }
......
// SPDX-License-Identifier: GPL-2.0-only
/* Copyright (c) 2017 Facebook
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <assert.h>
#include <sys/time.h>
#include <linux/bpf.h>
#include <bpf/bpf.h>
#include <bpf/libbpf.h>
#include "cgroup_helpers.h"
#include "testing_helpers.h"
#define DEV_CGROUP_PROG "./dev_cgroup.bpf.o"
#define TEST_CGROUP "/test-bpf-based-device-cgroup/"
int main(int argc, char **argv)
{
struct bpf_object *obj;
int error = EXIT_FAILURE;
int prog_fd, cgroup_fd;
__u32 prog_cnt;
/* Use libbpf 1.0 API mode */
libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
if (bpf_prog_test_load(DEV_CGROUP_PROG, BPF_PROG_TYPE_CGROUP_DEVICE,
&obj, &prog_fd)) {
printf("Failed to load DEV_CGROUP program\n");
goto out;
}
cgroup_fd = cgroup_setup_and_join(TEST_CGROUP);
if (cgroup_fd < 0) {
printf("Failed to create test cgroup\n");
goto out;
}
/* Attach bpf program */
if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) {
printf("Failed to attach DEV_CGROUP program");
goto err;
}
if (bpf_prog_query(cgroup_fd, BPF_CGROUP_DEVICE, 0, NULL, NULL,
&prog_cnt)) {
printf("Failed to query attached programs");
goto err;
}
/* All operations with /dev/zero and and /dev/urandom are allowed,
* everything else is forbidden.
*/
assert(system("rm -f /tmp/test_dev_cgroup_null") == 0);
assert(system("mknod /tmp/test_dev_cgroup_null c 1 3"));
assert(system("rm -f /tmp/test_dev_cgroup_null") == 0);
/* /dev/zero is whitelisted */
assert(system("rm -f /tmp/test_dev_cgroup_zero") == 0);
assert(system("mknod /tmp/test_dev_cgroup_zero c 1 5") == 0);
assert(system("rm -f /tmp/test_dev_cgroup_zero") == 0);
assert(system("dd if=/dev/urandom of=/dev/zero count=64") == 0);
/* src is allowed, target is forbidden */
assert(system("dd if=/dev/urandom of=/dev/full count=64"));
/* src is forbidden, target is allowed */
assert(system("dd if=/dev/random of=/dev/zero count=64"));
error = 0;
printf("test_dev_cgroup:PASS\n");
err:
cleanup_cgroup_environment();
out:
return error;
}
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment