xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/test_tcpnotify_user.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun #define _GNU_SOURCE
3*4882a593Smuzhiyun #include <pthread.h>
4*4882a593Smuzhiyun #include <inttypes.h>
5*4882a593Smuzhiyun #include <stdio.h>
6*4882a593Smuzhiyun #include <stdlib.h>
7*4882a593Smuzhiyun #include <unistd.h>
8*4882a593Smuzhiyun #include <asm/types.h>
9*4882a593Smuzhiyun #include <sys/syscall.h>
10*4882a593Smuzhiyun #include <errno.h>
11*4882a593Smuzhiyun #include <string.h>
12*4882a593Smuzhiyun #include <linux/bpf.h>
13*4882a593Smuzhiyun #include <sys/socket.h>
14*4882a593Smuzhiyun #include <bpf/bpf.h>
15*4882a593Smuzhiyun #include <bpf/libbpf.h>
16*4882a593Smuzhiyun #include <sys/ioctl.h>
17*4882a593Smuzhiyun #include <linux/rtnetlink.h>
18*4882a593Smuzhiyun #include <signal.h>
19*4882a593Smuzhiyun #include <linux/perf_event.h>
20*4882a593Smuzhiyun #include <linux/err.h>
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #include "bpf_rlimit.h"
23*4882a593Smuzhiyun #include "bpf_util.h"
24*4882a593Smuzhiyun #include "cgroup_helpers.h"
25*4882a593Smuzhiyun 
26*4882a593Smuzhiyun #include "test_tcpnotify.h"
27*4882a593Smuzhiyun #include "trace_helpers.h"
28*4882a593Smuzhiyun 
29*4882a593Smuzhiyun #define SOCKET_BUFFER_SIZE (getpagesize() < 8192L ? getpagesize() : 8192L)
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun pthread_t tid;
32*4882a593Smuzhiyun int rx_callbacks;
33*4882a593Smuzhiyun 
dummyfn(void * ctx,int cpu,void * data,__u32 size)34*4882a593Smuzhiyun static void dummyfn(void *ctx, int cpu, void *data, __u32 size)
35*4882a593Smuzhiyun {
36*4882a593Smuzhiyun 	struct tcp_notifier *t = data;
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun 	if (t->type != 0xde || t->subtype != 0xad ||
39*4882a593Smuzhiyun 	    t->source != 0xbe || t->hash != 0xef)
40*4882a593Smuzhiyun 		return;
41*4882a593Smuzhiyun 	rx_callbacks++;
42*4882a593Smuzhiyun }
43*4882a593Smuzhiyun 
tcp_notifier_poller(struct perf_buffer * pb)44*4882a593Smuzhiyun void tcp_notifier_poller(struct perf_buffer *pb)
45*4882a593Smuzhiyun {
46*4882a593Smuzhiyun 	int err;
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun 	while (1) {
49*4882a593Smuzhiyun 		err = perf_buffer__poll(pb, 100);
50*4882a593Smuzhiyun 		if (err < 0 && err != -EINTR) {
51*4882a593Smuzhiyun 			printf("failed perf_buffer__poll: %d\n", err);
52*4882a593Smuzhiyun 			return;
53*4882a593Smuzhiyun 		}
54*4882a593Smuzhiyun 	}
55*4882a593Smuzhiyun }
56*4882a593Smuzhiyun 
poller_thread(void * arg)57*4882a593Smuzhiyun static void *poller_thread(void *arg)
58*4882a593Smuzhiyun {
59*4882a593Smuzhiyun 	struct perf_buffer *pb = arg;
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 	tcp_notifier_poller(pb);
62*4882a593Smuzhiyun 	return arg;
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun 
verify_result(const struct tcpnotify_globals * result)65*4882a593Smuzhiyun int verify_result(const struct tcpnotify_globals *result)
66*4882a593Smuzhiyun {
67*4882a593Smuzhiyun 	return (result->ncalls > 0 && result->ncalls == rx_callbacks ? 0 : 1);
68*4882a593Smuzhiyun }
69*4882a593Smuzhiyun 
main(int argc,char ** argv)70*4882a593Smuzhiyun int main(int argc, char **argv)
71*4882a593Smuzhiyun {
72*4882a593Smuzhiyun 	const char *file = "test_tcpnotify_kern.o";
73*4882a593Smuzhiyun 	struct bpf_map *perf_map, *global_map;
74*4882a593Smuzhiyun 	struct perf_buffer_opts pb_opts = {};
75*4882a593Smuzhiyun 	struct tcpnotify_globals g = {0};
76*4882a593Smuzhiyun 	struct perf_buffer *pb = NULL;
77*4882a593Smuzhiyun 	const char *cg_path = "/foo";
78*4882a593Smuzhiyun 	int prog_fd, rv, cg_fd = -1;
79*4882a593Smuzhiyun 	int error = EXIT_FAILURE;
80*4882a593Smuzhiyun 	struct bpf_object *obj;
81*4882a593Smuzhiyun 	char test_script[80];
82*4882a593Smuzhiyun 	cpu_set_t cpuset;
83*4882a593Smuzhiyun 	__u32 key = 0;
84*4882a593Smuzhiyun 
85*4882a593Smuzhiyun 	CPU_ZERO(&cpuset);
86*4882a593Smuzhiyun 	CPU_SET(0, &cpuset);
87*4882a593Smuzhiyun 	pthread_setaffinity_np(pthread_self(), sizeof(cpu_set_t), &cpuset);
88*4882a593Smuzhiyun 
89*4882a593Smuzhiyun 	cg_fd = cgroup_setup_and_join(cg_path);
90*4882a593Smuzhiyun 	if (cg_fd < 0)
91*4882a593Smuzhiyun 		goto err;
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun 	if (bpf_prog_load(file, BPF_PROG_TYPE_SOCK_OPS, &obj, &prog_fd)) {
94*4882a593Smuzhiyun 		printf("FAILED: load_bpf_file failed for: %s\n", file);
95*4882a593Smuzhiyun 		goto err;
96*4882a593Smuzhiyun 	}
97*4882a593Smuzhiyun 
98*4882a593Smuzhiyun 	rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0);
99*4882a593Smuzhiyun 	if (rv) {
100*4882a593Smuzhiyun 		printf("FAILED: bpf_prog_attach: %d (%s)\n",
101*4882a593Smuzhiyun 		       error, strerror(errno));
102*4882a593Smuzhiyun 		goto err;
103*4882a593Smuzhiyun 	}
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun 	perf_map = bpf_object__find_map_by_name(obj, "perf_event_map");
106*4882a593Smuzhiyun 	if (!perf_map) {
107*4882a593Smuzhiyun 		printf("FAIL:map '%s' not found\n", "perf_event_map");
108*4882a593Smuzhiyun 		goto err;
109*4882a593Smuzhiyun 	}
110*4882a593Smuzhiyun 
111*4882a593Smuzhiyun 	global_map = bpf_object__find_map_by_name(obj, "global_map");
112*4882a593Smuzhiyun 	if (!global_map) {
113*4882a593Smuzhiyun 		printf("FAIL:map '%s' not found\n", "global_map");
114*4882a593Smuzhiyun 		return -1;
115*4882a593Smuzhiyun 	}
116*4882a593Smuzhiyun 
117*4882a593Smuzhiyun 	pb_opts.sample_cb = dummyfn;
118*4882a593Smuzhiyun 	pb = perf_buffer__new(bpf_map__fd(perf_map), 8, &pb_opts);
119*4882a593Smuzhiyun 	if (IS_ERR(pb))
120*4882a593Smuzhiyun 		goto err;
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun 	pthread_create(&tid, NULL, poller_thread, pb);
123*4882a593Smuzhiyun 
124*4882a593Smuzhiyun 	sprintf(test_script,
125*4882a593Smuzhiyun 		"iptables -A INPUT -p tcp --dport %d -j DROP",
126*4882a593Smuzhiyun 		TESTPORT);
127*4882a593Smuzhiyun 	if (system(test_script)) {
128*4882a593Smuzhiyun 		printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
129*4882a593Smuzhiyun 		goto err;
130*4882a593Smuzhiyun 	}
131*4882a593Smuzhiyun 
132*4882a593Smuzhiyun 	sprintf(test_script,
133*4882a593Smuzhiyun 		"nc 127.0.0.1 %d < /etc/passwd > /dev/null 2>&1 ",
134*4882a593Smuzhiyun 		TESTPORT);
135*4882a593Smuzhiyun 	if (system(test_script))
136*4882a593Smuzhiyun 		printf("execute command: %s, err %d\n", test_script, -errno);
137*4882a593Smuzhiyun 
138*4882a593Smuzhiyun 	sprintf(test_script,
139*4882a593Smuzhiyun 		"iptables -D INPUT -p tcp --dport %d -j DROP",
140*4882a593Smuzhiyun 		TESTPORT);
141*4882a593Smuzhiyun 	if (system(test_script)) {
142*4882a593Smuzhiyun 		printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
143*4882a593Smuzhiyun 		goto err;
144*4882a593Smuzhiyun 	}
145*4882a593Smuzhiyun 
146*4882a593Smuzhiyun 	rv = bpf_map_lookup_elem(bpf_map__fd(global_map), &key, &g);
147*4882a593Smuzhiyun 	if (rv != 0) {
148*4882a593Smuzhiyun 		printf("FAILED: bpf_map_lookup_elem returns %d\n", rv);
149*4882a593Smuzhiyun 		goto err;
150*4882a593Smuzhiyun 	}
151*4882a593Smuzhiyun 
152*4882a593Smuzhiyun 	sleep(10);
153*4882a593Smuzhiyun 
154*4882a593Smuzhiyun 	if (verify_result(&g)) {
155*4882a593Smuzhiyun 		printf("FAILED: Wrong stats Expected %d calls, got %d\n",
156*4882a593Smuzhiyun 			g.ncalls, rx_callbacks);
157*4882a593Smuzhiyun 		goto err;
158*4882a593Smuzhiyun 	}
159*4882a593Smuzhiyun 
160*4882a593Smuzhiyun 	printf("PASSED!\n");
161*4882a593Smuzhiyun 	error = 0;
162*4882a593Smuzhiyun err:
163*4882a593Smuzhiyun 	bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS);
164*4882a593Smuzhiyun 	close(cg_fd);
165*4882a593Smuzhiyun 	cleanup_cgroup_environment();
166*4882a593Smuzhiyun 	if (!IS_ERR_OR_NULL(pb))
167*4882a593Smuzhiyun 		perf_buffer__free(pb);
168*4882a593Smuzhiyun 	return error;
169*4882a593Smuzhiyun }
170