selftests/bpf: Ensure no task storage failure for bpf_lsm.s prog due to deadlock detection
This patch adds a test to check for deadlock failure in bpf_task_storage_{get,delete} when called by a sleepable bpf_lsm prog. It also checks if the prog_info.recursion_misses is non zero. The test starts with 32 threads and they are affinitized to one cpu. In my qemu setup, with CONFIG_PREEMPT=y, I can reproduce it within one second if it is run without the previous patches of this set. Here is the test error message before adding the no deadlock detection version of the bpf_task_storage_{get,delete}: test_nodeadlock:FAIL:bpf_task_storage_get busy unexpected bpf_task_storage_get busy: actual 2 != expected 0 test_nodeadlock:FAIL:bpf_task_storage_delete busy unexpected bpf_task_storage_delete busy: actual 2 != expected 0 Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Link: https://lore.kernel.org/r/20221025184524.3526117-9-martin.lau@linux.dev Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
8a7dac37f2
commit
0334b4d882
@ -3,12 +3,15 @@
|
||||
|
||||
#define _GNU_SOURCE /* See feature_test_macros(7) */
|
||||
#include <unistd.h>
|
||||
#include <sched.h>
|
||||
#include <pthread.h>
|
||||
#include <sys/syscall.h> /* For SYS_xxx definitions */
|
||||
#include <sys/types.h>
|
||||
#include <test_progs.h>
|
||||
#include "task_local_storage.skel.h"
|
||||
#include "task_local_storage_exit_creds.skel.h"
|
||||
#include "task_ls_recursion.skel.h"
|
||||
#include "task_storage_nodeadlock.skel.h"
|
||||
|
||||
static void test_sys_enter_exit(void)
|
||||
{
|
||||
@ -93,6 +96,99 @@ out:
|
||||
task_ls_recursion__destroy(skel);
|
||||
}
|
||||
|
||||
static bool stop;
|
||||
|
||||
static void waitall(const pthread_t *tids, int nr)
|
||||
{
|
||||
int i;
|
||||
|
||||
stop = true;
|
||||
for (i = 0; i < nr; i++)
|
||||
pthread_join(tids[i], NULL);
|
||||
}
|
||||
|
||||
static void *sock_create_loop(void *arg)
|
||||
{
|
||||
struct task_storage_nodeadlock *skel = arg;
|
||||
int fd;
|
||||
|
||||
while (!stop) {
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
close(fd);
|
||||
if (skel->bss->nr_get_errs || skel->bss->nr_del_errs)
|
||||
stop = true;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void test_nodeadlock(void)
|
||||
{
|
||||
struct task_storage_nodeadlock *skel;
|
||||
struct bpf_prog_info info = {};
|
||||
__u32 info_len = sizeof(info);
|
||||
const int nr_threads = 32;
|
||||
pthread_t tids[nr_threads];
|
||||
int i, prog_fd, err;
|
||||
cpu_set_t old, new;
|
||||
|
||||
/* Pin all threads to one cpu to increase the chance of preemption
|
||||
* in a sleepable bpf prog.
|
||||
*/
|
||||
CPU_ZERO(&new);
|
||||
CPU_SET(0, &new);
|
||||
err = sched_getaffinity(getpid(), sizeof(old), &old);
|
||||
if (!ASSERT_OK(err, "getaffinity"))
|
||||
return;
|
||||
err = sched_setaffinity(getpid(), sizeof(new), &new);
|
||||
if (!ASSERT_OK(err, "setaffinity"))
|
||||
return;
|
||||
|
||||
skel = task_storage_nodeadlock__open_and_load();
|
||||
if (!ASSERT_OK_PTR(skel, "open_and_load"))
|
||||
goto done;
|
||||
|
||||
/* Unnecessary recursion and deadlock detection are reproducible
|
||||
* in the preemptible kernel.
|
||||
*/
|
||||
if (!skel->kconfig->CONFIG_PREEMPT) {
|
||||
test__skip();
|
||||
goto done;
|
||||
}
|
||||
|
||||
err = task_storage_nodeadlock__attach(skel);
|
||||
ASSERT_OK(err, "attach prog");
|
||||
|
||||
for (i = 0; i < nr_threads; i++) {
|
||||
err = pthread_create(&tids[i], NULL, sock_create_loop, skel);
|
||||
if (err) {
|
||||
/* Only assert once here to avoid excessive
|
||||
* PASS printing during test failure.
|
||||
*/
|
||||
ASSERT_OK(err, "pthread_create");
|
||||
waitall(tids, i);
|
||||
goto done;
|
||||
}
|
||||
}
|
||||
|
||||
/* With 32 threads, 1s is enough to reproduce the issue */
|
||||
sleep(1);
|
||||
waitall(tids, nr_threads);
|
||||
|
||||
info_len = sizeof(info);
|
||||
prog_fd = bpf_program__fd(skel->progs.socket_post_create);
|
||||
err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len);
|
||||
ASSERT_OK(err, "get prog info");
|
||||
ASSERT_EQ(info.recursion_misses, 0, "prog recursion");
|
||||
|
||||
ASSERT_EQ(skel->bss->nr_get_errs, 0, "bpf_task_storage_get busy");
|
||||
ASSERT_EQ(skel->bss->nr_del_errs, 0, "bpf_task_storage_delete busy");
|
||||
|
||||
done:
|
||||
task_storage_nodeadlock__destroy(skel);
|
||||
sched_setaffinity(getpid(), sizeof(old), &old);
|
||||
}
|
||||
|
||||
void test_task_local_storage(void)
|
||||
{
|
||||
if (test__start_subtest("sys_enter_exit"))
|
||||
@ -101,4 +197,6 @@ void test_task_local_storage(void)
|
||||
test_exit_creds();
|
||||
if (test__start_subtest("recursion"))
|
||||
test_recursion();
|
||||
if (test__start_subtest("nodeadlock"))
|
||||
test_nodeadlock();
|
||||
}
|
||||
|
47
tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c
Normal file
47
tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c
Normal file
@ -0,0 +1,47 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
|
||||
#include "vmlinux.h"
|
||||
#include <bpf/bpf_helpers.h>
|
||||
#include <bpf/bpf_tracing.h>
|
||||
|
||||
char _license[] SEC("license") = "GPL";
|
||||
|
||||
#ifndef EBUSY
|
||||
#define EBUSY 16
|
||||
#endif
|
||||
|
||||
extern bool CONFIG_PREEMPT __kconfig __weak;
|
||||
int nr_get_errs = 0;
|
||||
int nr_del_errs = 0;
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_TASK_STORAGE);
|
||||
__uint(map_flags, BPF_F_NO_PREALLOC);
|
||||
__type(key, int);
|
||||
__type(value, int);
|
||||
} task_storage SEC(".maps");
|
||||
|
||||
SEC("lsm.s/socket_post_create")
|
||||
int BPF_PROG(socket_post_create, struct socket *sock, int family, int type,
|
||||
int protocol, int kern)
|
||||
{
|
||||
struct task_struct *task;
|
||||
int ret, zero = 0;
|
||||
int *value;
|
||||
|
||||
if (!CONFIG_PREEMPT)
|
||||
return 0;
|
||||
|
||||
task = bpf_get_current_task_btf();
|
||||
value = bpf_task_storage_get(&task_storage, task, &zero,
|
||||
BPF_LOCAL_STORAGE_GET_F_CREATE);
|
||||
if (!value)
|
||||
__sync_fetch_and_add(&nr_get_errs, 1);
|
||||
|
||||
ret = bpf_task_storage_delete(&task_storage,
|
||||
bpf_get_current_task_btf());
|
||||
if (ret == -EBUSY)
|
||||
__sync_fetch_and_add(&nr_del_errs, 1);
|
||||
|
||||
return 0;
|
||||
}
|
Loading…
Reference in New Issue
Block a user