334 lines
7.3 KiB
C
334 lines
7.3 KiB
C
|
// SPDX-License-Identifier: GPL-2.0
|
||
|
#include <test_progs.h>
|
||
|
#include "cgroup_helpers.h"
|
||
|
|
||
|
static int prog_attach(struct bpf_object *obj, int cgroup_fd, const char *title, const char *name)
|
||
|
{
|
||
|
enum bpf_attach_type attach_type;
|
||
|
enum bpf_prog_type prog_type;
|
||
|
struct bpf_program *prog;
|
||
|
int err;
|
||
|
|
||
|
err = libbpf_prog_type_by_name(title, &prog_type, &attach_type);
|
||
|
if (err) {
|
||
|
log_err("Failed to deduct types for %s BPF program", title);
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
prog = bpf_object__find_program_by_name(obj, name);
|
||
|
if (!prog) {
|
||
|
log_err("Failed to find %s BPF program", name);
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd,
|
||
|
attach_type, BPF_F_ALLOW_MULTI);
|
||
|
if (err) {
|
||
|
log_err("Failed to attach %s BPF program", name);
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int prog_detach(struct bpf_object *obj, int cgroup_fd, const char *title, const char *name)
|
||
|
{
|
||
|
enum bpf_attach_type attach_type;
|
||
|
enum bpf_prog_type prog_type;
|
||
|
struct bpf_program *prog;
|
||
|
int err;
|
||
|
|
||
|
err = libbpf_prog_type_by_name(title, &prog_type, &attach_type);
|
||
|
if (err)
|
||
|
return -1;
|
||
|
|
||
|
prog = bpf_object__find_program_by_name(obj, name);
|
||
|
if (!prog)
|
||
|
return -1;
|
||
|
|
||
|
err = bpf_prog_detach2(bpf_program__fd(prog), cgroup_fd,
|
||
|
attach_type);
|
||
|
if (err)
|
||
|
return -1;
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int run_getsockopt_test(struct bpf_object *obj, int cg_parent,
|
||
|
int cg_child, int sock_fd)
|
||
|
{
|
||
|
socklen_t optlen;
|
||
|
__u8 buf;
|
||
|
int err;
|
||
|
|
||
|
/* Set IP_TOS to the expected value (0x80). */
|
||
|
|
||
|
buf = 0x80;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0x80) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0x80 without BPF", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Attach child program and make sure it returns new value:
|
||
|
* - kernel: -> 0x80
|
||
|
* - child: 0x80 -> 0x90
|
||
|
*/
|
||
|
|
||
|
err = prog_attach(obj, cg_child, "cgroup/getsockopt", "_getsockopt_child");
|
||
|
if (err)
|
||
|
goto detach;
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0x90) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0x90", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Attach parent program and make sure it returns new value:
|
||
|
* - kernel: -> 0x80
|
||
|
* - child: 0x80 -> 0x90
|
||
|
* - parent: 0x90 -> 0xA0
|
||
|
*/
|
||
|
|
||
|
err = prog_attach(obj, cg_parent, "cgroup/getsockopt", "_getsockopt_parent");
|
||
|
if (err)
|
||
|
goto detach;
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0xA0) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0xA0", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Setting unexpected initial sockopt should return EPERM:
|
||
|
* - kernel: -> 0x40
|
||
|
* - child: unexpected 0x40, EPERM
|
||
|
* - parent: unexpected 0x40, EPERM
|
||
|
*/
|
||
|
|
||
|
buf = 0x40;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (!err) {
|
||
|
log_err("Unexpected success from getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Detach child program and make sure we still get EPERM:
|
||
|
* - kernel: -> 0x40
|
||
|
* - parent: unexpected 0x40, EPERM
|
||
|
*/
|
||
|
|
||
|
err = prog_detach(obj, cg_child, "cgroup/getsockopt", "_getsockopt_child");
|
||
|
if (err) {
|
||
|
log_err("Failed to detach child program");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (!err) {
|
||
|
log_err("Unexpected success from getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Set initial value to the one the parent program expects:
|
||
|
* - kernel: -> 0x90
|
||
|
* - parent: 0x90 -> 0xA0
|
||
|
*/
|
||
|
|
||
|
buf = 0x90;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0xA0) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0xA0", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
detach:
|
||
|
prog_detach(obj, cg_child, "cgroup/getsockopt", "_getsockopt_child");
|
||
|
prog_detach(obj, cg_parent, "cgroup/getsockopt", "_getsockopt_parent");
|
||
|
|
||
|
return err;
|
||
|
}
|
||
|
|
||
|
static int run_setsockopt_test(struct bpf_object *obj, int cg_parent,
|
||
|
int cg_child, int sock_fd)
|
||
|
{
|
||
|
socklen_t optlen;
|
||
|
__u8 buf;
|
||
|
int err;
|
||
|
|
||
|
/* Set IP_TOS to the expected value (0x80). */
|
||
|
|
||
|
buf = 0x80;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0x80) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0x80 without BPF", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Attach child program and make sure it adds 0x10. */
|
||
|
|
||
|
err = prog_attach(obj, cg_child, "cgroup/setsockopt", "_setsockopt");
|
||
|
if (err)
|
||
|
goto detach;
|
||
|
|
||
|
buf = 0x80;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0x80 + 0x10) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0x80 + 0x10", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
/* Attach parent program and make sure it adds another 0x10. */
|
||
|
|
||
|
err = prog_attach(obj, cg_parent, "cgroup/setsockopt", "_setsockopt");
|
||
|
if (err)
|
||
|
goto detach;
|
||
|
|
||
|
buf = 0x80;
|
||
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
||
|
if (err < 0) {
|
||
|
log_err("Failed to call setsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
buf = 0x00;
|
||
|
optlen = 1;
|
||
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
||
|
if (err) {
|
||
|
log_err("Failed to call getsockopt(IP_TOS)");
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
if (buf != 0x80 + 2 * 0x10) {
|
||
|
log_err("Unexpected getsockopt 0x%x != 0x80 + 2 * 0x10", buf);
|
||
|
err = -1;
|
||
|
goto detach;
|
||
|
}
|
||
|
|
||
|
detach:
|
||
|
prog_detach(obj, cg_child, "cgroup/setsockopt", "_setsockopt");
|
||
|
prog_detach(obj, cg_parent, "cgroup/setsockopt", "_setsockopt");
|
||
|
|
||
|
return err;
|
||
|
}
|
||
|
|
||
|
void test_sockopt_multi(void)
|
||
|
{
|
||
|
int cg_parent = -1, cg_child = -1;
|
||
|
struct bpf_object *obj = NULL;
|
||
|
int sock_fd = -1;
|
||
|
int err = -1;
|
||
|
|
||
|
cg_parent = test__join_cgroup("/parent");
|
||
|
if (!ASSERT_GE(cg_parent, 0, "join_cgroup /parent"))
|
||
|
goto out;
|
||
|
|
||
|
cg_child = test__join_cgroup("/parent/child");
|
||
|
if (!ASSERT_GE(cg_child, 0, "join_cgroup /parent/child"))
|
||
|
goto out;
|
||
|
|
||
|
obj = bpf_object__open_file("sockopt_multi.bpf.o", NULL);
|
||
|
if (!ASSERT_OK_PTR(obj, "obj_load"))
|
||
|
goto out;
|
||
|
|
||
|
err = bpf_object__load(obj);
|
||
|
if (!ASSERT_OK(err, "obj_load"))
|
||
|
goto out;
|
||
|
|
||
|
sock_fd = socket(AF_INET, SOCK_STREAM, 0);
|
||
|
if (!ASSERT_GE(sock_fd, 0, "socket"))
|
||
|
goto out;
|
||
|
|
||
|
ASSERT_OK(run_getsockopt_test(obj, cg_parent, cg_child, sock_fd), "getsockopt_test");
|
||
|
ASSERT_OK(run_setsockopt_test(obj, cg_parent, cg_child, sock_fd), "setsockopt_test");
|
||
|
|
||
|
out:
|
||
|
close(sock_fd);
|
||
|
bpf_object__close(obj);
|
||
|
close(cg_child);
|
||
|
close(cg_parent);
|
||
|
}
|