286 lines
6.3 KiB
C
286 lines
6.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <test_progs.h>
|
|
#include "cgroup_helpers.h"
|
|
|
|
#include "sockopt_multi.skel.h"
|
|
|
|
static int run_getsockopt_test(struct sockopt_multi *obj, int cg_parent,
|
|
int cg_child, int sock_fd)
|
|
{
|
|
struct bpf_link *link_parent = NULL;
|
|
struct bpf_link *link_child = NULL;
|
|
socklen_t optlen;
|
|
__u8 buf;
|
|
int err;
|
|
|
|
/* Set IP_TOS to the expected value (0x80). */
|
|
|
|
buf = 0x80;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0x80) {
|
|
log_err("Unexpected getsockopt 0x%x != 0x80 without BPF", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
/* Attach child program and make sure it returns new value:
|
|
* - kernel: -> 0x80
|
|
* - child: 0x80 -> 0x90
|
|
*/
|
|
|
|
link_child = bpf_program__attach_cgroup(obj->progs._getsockopt_child,
|
|
cg_child);
|
|
if (!ASSERT_OK_PTR(link_child, "cg-attach-getsockopt_child"))
|
|
goto detach;
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0x90) {
|
|
log_err("Unexpected getsockopt 0x%x != 0x90", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
/* Attach parent program and make sure it returns new value:
|
|
* - kernel: -> 0x80
|
|
* - child: 0x80 -> 0x90
|
|
* - parent: 0x90 -> 0xA0
|
|
*/
|
|
|
|
link_parent = bpf_program__attach_cgroup(obj->progs._getsockopt_parent,
|
|
cg_parent);
|
|
if (!ASSERT_OK_PTR(link_parent, "cg-attach-getsockopt_parent"))
|
|
goto detach;
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0xA0) {
|
|
log_err("Unexpected getsockopt 0x%x != 0xA0", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
/* Setting unexpected initial sockopt should return EPERM:
|
|
* - kernel: -> 0x40
|
|
* - child: unexpected 0x40, EPERM
|
|
* - parent: unexpected 0x40, EPERM
|
|
*/
|
|
|
|
buf = 0x40;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (!err) {
|
|
log_err("Unexpected success from getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
/* Detach child program and make sure we still get EPERM:
|
|
* - kernel: -> 0x40
|
|
* - parent: unexpected 0x40, EPERM
|
|
*/
|
|
|
|
bpf_link__destroy(link_child);
|
|
link_child = NULL;
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (!err) {
|
|
log_err("Unexpected success from getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
/* Set initial value to the one the parent program expects:
|
|
* - kernel: -> 0x90
|
|
* - parent: 0x90 -> 0xA0
|
|
*/
|
|
|
|
buf = 0x90;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0xA0) {
|
|
log_err("Unexpected getsockopt 0x%x != 0xA0", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
detach:
|
|
bpf_link__destroy(link_child);
|
|
bpf_link__destroy(link_parent);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int run_setsockopt_test(struct sockopt_multi *obj, int cg_parent,
|
|
int cg_child, int sock_fd)
|
|
{
|
|
struct bpf_link *link_parent = NULL;
|
|
struct bpf_link *link_child = NULL;
|
|
socklen_t optlen;
|
|
__u8 buf;
|
|
int err;
|
|
|
|
/* Set IP_TOS to the expected value (0x80). */
|
|
|
|
buf = 0x80;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0x80) {
|
|
log_err("Unexpected getsockopt 0x%x != 0x80 without BPF", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
/* Attach child program and make sure it adds 0x10. */
|
|
|
|
link_child = bpf_program__attach_cgroup(obj->progs._setsockopt,
|
|
cg_child);
|
|
if (!ASSERT_OK_PTR(link_child, "cg-attach-setsockopt_child"))
|
|
goto detach;
|
|
|
|
buf = 0x80;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0x80 + 0x10) {
|
|
log_err("Unexpected getsockopt 0x%x != 0x80 + 0x10", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
/* Attach parent program and make sure it adds another 0x10. */
|
|
|
|
link_parent = bpf_program__attach_cgroup(obj->progs._setsockopt,
|
|
cg_parent);
|
|
if (!ASSERT_OK_PTR(link_parent, "cg-attach-setsockopt_parent"))
|
|
goto detach;
|
|
|
|
buf = 0x80;
|
|
err = setsockopt(sock_fd, SOL_IP, IP_TOS, &buf, 1);
|
|
if (err < 0) {
|
|
log_err("Failed to call setsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
buf = 0x00;
|
|
optlen = 1;
|
|
err = getsockopt(sock_fd, SOL_IP, IP_TOS, &buf, &optlen);
|
|
if (err) {
|
|
log_err("Failed to call getsockopt(IP_TOS)");
|
|
goto detach;
|
|
}
|
|
|
|
if (buf != 0x80 + 2 * 0x10) {
|
|
log_err("Unexpected getsockopt 0x%x != 0x80 + 2 * 0x10", buf);
|
|
err = -1;
|
|
goto detach;
|
|
}
|
|
|
|
detach:
|
|
bpf_link__destroy(link_child);
|
|
bpf_link__destroy(link_parent);
|
|
|
|
return err;
|
|
}
|
|
|
|
void test_sockopt_multi(void)
|
|
{
|
|
int cg_parent = -1, cg_child = -1;
|
|
struct sockopt_multi *obj = NULL;
|
|
int sock_fd = -1;
|
|
|
|
cg_parent = test__join_cgroup("/parent");
|
|
if (!ASSERT_GE(cg_parent, 0, "join_cgroup /parent"))
|
|
goto out;
|
|
|
|
cg_child = test__join_cgroup("/parent/child");
|
|
if (!ASSERT_GE(cg_child, 0, "join_cgroup /parent/child"))
|
|
goto out;
|
|
|
|
obj = sockopt_multi__open_and_load();
|
|
if (!ASSERT_OK_PTR(obj, "skel-load"))
|
|
goto out;
|
|
|
|
obj->bss->page_size = sysconf(_SC_PAGESIZE);
|
|
|
|
sock_fd = socket(AF_INET, SOCK_STREAM, 0);
|
|
if (!ASSERT_GE(sock_fd, 0, "socket"))
|
|
goto out;
|
|
|
|
ASSERT_OK(run_getsockopt_test(obj, cg_parent, cg_child, sock_fd), "getsockopt_test");
|
|
ASSERT_OK(run_setsockopt_test(obj, cg_parent, cg_child, sock_fd), "setsockopt_test");
|
|
|
|
out:
|
|
close(sock_fd);
|
|
sockopt_multi__destroy(obj);
|
|
close(cg_child);
|
|
close(cg_parent);
|
|
}
|