linux/tools/testing/selftests/bpf/test_tcpnotify_user.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2#define _GNU_SOURCE
   3#include <pthread.h>
   4#include <inttypes.h>
   5#include <stdio.h>
   6#include <stdlib.h>
   7#include <unistd.h>
   8#include <asm/types.h>
   9#include <sys/syscall.h>
  10#include <errno.h>
  11#include <string.h>
  12#include <linux/bpf.h>
  13#include <sys/socket.h>
  14#include <bpf/bpf.h>
  15#include <bpf/libbpf.h>
  16#include <sys/ioctl.h>
  17#include <linux/rtnetlink.h>
  18#include <signal.h>
  19#include <linux/perf_event.h>
  20#include <linux/err.h>
  21
  22#include "bpf_rlimit.h"
  23#include "bpf_util.h"
  24#include "cgroup_helpers.h"
  25
  26#include "test_tcpnotify.h"
  27#include "trace_helpers.h"
  28
  29#define SOCKET_BUFFER_SIZE (getpagesize() < 8192L ? getpagesize() : 8192L)
  30
  31pthread_t tid;
  32int rx_callbacks;
  33
  34static void dummyfn(void *ctx, int cpu, void *data, __u32 size)
  35{
  36        struct tcp_notifier *t = data;
  37
  38        if (t->type != 0xde || t->subtype != 0xad ||
  39            t->source != 0xbe || t->hash != 0xef)
  40                return;
  41        rx_callbacks++;
  42}
  43
  44void tcp_notifier_poller(struct perf_buffer *pb)
  45{
  46        int err;
  47
  48        while (1) {
  49                err = perf_buffer__poll(pb, 100);
  50                if (err < 0 && err != -EINTR) {
  51                        printf("failed perf_buffer__poll: %d\n", err);
  52                        return;
  53                }
  54        }
  55}
  56
  57static void *poller_thread(void *arg)
  58{
  59        struct perf_buffer *pb = arg;
  60
  61        tcp_notifier_poller(pb);
  62        return arg;
  63}
  64
  65int verify_result(const struct tcpnotify_globals *result)
  66{
  67        return (result->ncalls > 0 && result->ncalls == rx_callbacks ? 0 : 1);
  68}
  69
  70int main(int argc, char **argv)
  71{
  72        const char *file = "test_tcpnotify_kern.o";
  73        struct bpf_map *perf_map, *global_map;
  74        struct perf_buffer_opts pb_opts = {};
  75        struct tcpnotify_globals g = {0};
  76        struct perf_buffer *pb = NULL;
  77        const char *cg_path = "/foo";
  78        int prog_fd, rv, cg_fd = -1;
  79        int error = EXIT_FAILURE;
  80        struct bpf_object *obj;
  81        char test_script[80];
  82        cpu_set_t cpuset;
  83        __u32 key = 0;
  84
  85        libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
  86
  87        CPU_ZERO(&cpuset);
  88        CPU_SET(0, &cpuset);
  89        pthread_setaffinity_np(pthread_self(), sizeof(cpu_set_t), &cpuset);
  90
  91        cg_fd = cgroup_setup_and_join(cg_path);
  92        if (cg_fd < 0)
  93                goto err;
  94
  95        if (bpf_prog_load(file, BPF_PROG_TYPE_SOCK_OPS, &obj, &prog_fd)) {
  96                printf("FAILED: load_bpf_file failed for: %s\n", file);
  97                goto err;
  98        }
  99
 100        rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0);
 101        if (rv) {
 102                printf("FAILED: bpf_prog_attach: %d (%s)\n",
 103                       error, strerror(errno));
 104                goto err;
 105        }
 106
 107        perf_map = bpf_object__find_map_by_name(obj, "perf_event_map");
 108        if (!perf_map) {
 109                printf("FAIL:map '%s' not found\n", "perf_event_map");
 110                goto err;
 111        }
 112
 113        global_map = bpf_object__find_map_by_name(obj, "global_map");
 114        if (!global_map) {
 115                printf("FAIL:map '%s' not found\n", "global_map");
 116                return -1;
 117        }
 118
 119        pb_opts.sample_cb = dummyfn;
 120        pb = perf_buffer__new(bpf_map__fd(perf_map), 8, &pb_opts);
 121        if (!pb)
 122                goto err;
 123
 124        pthread_create(&tid, NULL, poller_thread, pb);
 125
 126        sprintf(test_script,
 127                "iptables -A INPUT -p tcp --dport %d -j DROP",
 128                TESTPORT);
 129        if (system(test_script)) {
 130                printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
 131                goto err;
 132        }
 133
 134        sprintf(test_script,
 135                "nc 127.0.0.1 %d < /etc/passwd > /dev/null 2>&1 ",
 136                TESTPORT);
 137        if (system(test_script))
 138                printf("execute command: %s, err %d\n", test_script, -errno);
 139
 140        sprintf(test_script,
 141                "iptables -D INPUT -p tcp --dport %d -j DROP",
 142                TESTPORT);
 143        if (system(test_script)) {
 144                printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
 145                goto err;
 146        }
 147
 148        rv = bpf_map_lookup_elem(bpf_map__fd(global_map), &key, &g);
 149        if (rv != 0) {
 150                printf("FAILED: bpf_map_lookup_elem returns %d\n", rv);
 151                goto err;
 152        }
 153
 154        sleep(10);
 155
 156        if (verify_result(&g)) {
 157                printf("FAILED: Wrong stats Expected %d calls, got %d\n",
 158                        g.ncalls, rx_callbacks);
 159                goto err;
 160        }
 161
 162        printf("PASSED!\n");
 163        error = 0;
 164err:
 165        bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS);
 166        close(cg_fd);
 167        cleanup_cgroup_environment();
 168        perf_buffer__free(pb);
 169        return error;
 170}
 171