[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzY0=Hh3O6qeD=2sMWpQRpHpizxH+nEA0hD0khPf3VAbhA@mail.gmail.com>
Date: Mon, 1 Jun 2020 13:29:33 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: KP Singh <kpsingh@...omium.org>
Cc: open list <linux-kernel@...r.kernel.org>,
linux-fsdevel@...r.kernel.org, bpf <bpf@...r.kernel.org>,
linux-security-module@...r.kernel.org,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
James Morris <jmorris@...ei.org>,
Alexander Viro <viro@...iv.linux.org.uk>,
Martin KaFai Lau <kafai@...com>,
Florent Revest <revest@...omium.org>
Subject: Re: [PATCH bpf-next 4/4] bpf: Add selftests for local_storage
On Tue, May 26, 2020 at 9:34 AM KP Singh <kpsingh@...omium.org> wrote:
>
> From: KP Singh <kpsingh@...gle.com>
>
> inode_local_storage:
>
> * Hook to the file_open and inode_unlink LSM hooks.
> * Create and unlink a temporary file.
> * Store some information in the inode's bpf_local_storage during
> file_open.
> * Verify that this information exists when the file is unlinked.
>
> sk_local_storage:
>
> * Hook to the socket_post_create and socket_bind LSM hooks.
> * Open and bind a socket and set the sk_storage in the
> socket_post_create hook using the start_server helper.
> * Verify if the information is set in the socket_bind hook.
>
> Signed-off-by: KP Singh <kpsingh@...gle.com>
> ---
> .../bpf/prog_tests/test_local_storage.c | 60 ++++++++
> .../selftests/bpf/progs/local_storage.c | 139 ++++++++++++++++++
> 2 files changed, 199 insertions(+)
> create mode 100644 tools/testing/selftests/bpf/prog_tests/test_local_storage.c
> create mode 100644 tools/testing/selftests/bpf/progs/local_storage.c
>
[...]
> +struct dummy_storage {
> + __u32 value;
> +};
> +
> +struct {
> + __uint(type, BPF_MAP_TYPE_INODE_STORAGE);
> + __uint(map_flags, BPF_F_NO_PREALLOC);
> + __type(key, int);
> + __type(value, struct dummy_storage);
> +} inode_storage_map SEC(".maps");
> +
> +struct {
> + __uint(type, BPF_MAP_TYPE_SK_STORAGE);
> + __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
> + __type(key, int);
> + __type(value, struct dummy_storage);
> +} sk_storage_map SEC(".maps");
> +
> +/* Using vmlinux.h causes the generated BTF to be so big that the object
> + * load fails at btf__load.
> + */
That's first time I hear about such issue. Do you have an error log
from verifier?
Clang is smart enough to trim down used types to only those that are
actually necessary, so too big BTF shouldn't be a thing. But let's try
to dig into this and fix whatever issue it is, before giving up :)
> +struct sock {} __attribute__((preserve_access_index));
> +struct sockaddr {} __attribute__((preserve_access_index));
> +struct socket {
> + struct sock *sk;
> +} __attribute__((preserve_access_index));
> +
> +struct inode {} __attribute__((preserve_access_index));
> +struct dentry {
> + struct inode *d_inode;
> +} __attribute__((preserve_access_index));
> +struct file {
> + struct inode *f_inode;
> +} __attribute__((preserve_access_index));
> +
> +
[...]
Powered by blists - more mailing lists