Back to home page

OSCL-LXR

 
 

    


0001 // SPDX-License-Identifier: GPL-2.0
0002 // Copyright (c) 2020 Facebook
0003 
0004 #include <test_progs.h>
0005 
0006 #include "network_helpers.h"
0007 #include "cgroup_skb_sk_lookup_kern.skel.h"
0008 
0009 static void run_lookup_test(__u16 *g_serv_port, int out_sk)
0010 {
0011     int serv_sk = -1, in_sk = -1, serv_in_sk = -1, err;
0012     struct sockaddr_in6 addr = {};
0013     socklen_t addr_len = sizeof(addr);
0014     __u32 duration = 0;
0015 
0016     serv_sk = start_server(AF_INET6, SOCK_STREAM, NULL, 0, 0);
0017     if (CHECK(serv_sk < 0, "start_server", "failed to start server\n"))
0018         return;
0019 
0020     err = getsockname(serv_sk, (struct sockaddr *)&addr, &addr_len);
0021     if (CHECK(err, "getsockname", "errno %d\n", errno))
0022         goto cleanup;
0023 
0024     *g_serv_port = addr.sin6_port;
0025 
0026     /* Client outside of test cgroup should fail to connect by timeout. */
0027     err = connect_fd_to_fd(out_sk, serv_sk, 1000);
0028     if (CHECK(!err || errno != EINPROGRESS, "connect_fd_to_fd",
0029           "unexpected result err %d errno %d\n", err, errno))
0030         goto cleanup;
0031 
0032     /* Client inside test cgroup should connect just fine. */
0033     in_sk = connect_to_fd(serv_sk, 0);
0034     if (CHECK(in_sk < 0, "connect_to_fd", "errno %d\n", errno))
0035         goto cleanup;
0036 
0037     serv_in_sk = accept(serv_sk, NULL, NULL);
0038     if (CHECK(serv_in_sk < 0, "accept", "errno %d\n", errno))
0039         goto cleanup;
0040 
0041 cleanup:
0042     close(serv_in_sk);
0043     close(in_sk);
0044     close(serv_sk);
0045 }
0046 
0047 static void run_cgroup_bpf_test(const char *cg_path, int out_sk)
0048 {
0049     struct cgroup_skb_sk_lookup_kern *skel;
0050     struct bpf_link *link;
0051     __u32 duration = 0;
0052     int cgfd = -1;
0053 
0054     skel = cgroup_skb_sk_lookup_kern__open_and_load();
0055     if (CHECK(!skel, "skel_open_load", "open_load failed\n"))
0056         return;
0057 
0058     cgfd = test__join_cgroup(cg_path);
0059     if (CHECK(cgfd < 0, "cgroup_join", "cgroup setup failed\n"))
0060         goto cleanup;
0061 
0062     link = bpf_program__attach_cgroup(skel->progs.ingress_lookup, cgfd);
0063     if (!ASSERT_OK_PTR(link, "cgroup_attach"))
0064         goto cleanup;
0065 
0066     run_lookup_test(&skel->bss->g_serv_port, out_sk);
0067 
0068     bpf_link__destroy(link);
0069 
0070 cleanup:
0071     close(cgfd);
0072     cgroup_skb_sk_lookup_kern__destroy(skel);
0073 }
0074 
0075 void test_cgroup_skb_sk_lookup(void)
0076 {
0077     const char *cg_path = "/foo";
0078     int out_sk;
0079 
0080     /* Create a socket before joining testing cgroup so that its cgroup id
0081      * differs from that of testing cgroup. Moving selftests process to
0082      * testing cgroup won't change cgroup id of an already created socket.
0083      */
0084     out_sk = socket(AF_INET6, SOCK_STREAM, 0);
0085     if (CHECK_FAIL(out_sk < 0))
0086         return;
0087 
0088     run_cgroup_bpf_test(cg_path, out_sk);
0089 
0090     close(out_sk);
0091 }