1 // SPDX-License-Identifier: GPL-2.0
9 #include <sys/syscall.h>
12 #include <linux/bpf.h>
13 #include <sys/socket.h>
15 #include <bpf/libbpf.h>
16 #include <sys/ioctl.h>
17 #include <linux/rtnetlink.h>
19 #include <linux/perf_event.h>
20 #include <linux/err.h>
23 #include "cgroup_helpers.h"
25 #include "test_tcpnotify.h"
26 #include "trace_helpers.h"
27 #include "testing_helpers.h"
29 #define SOCKET_BUFFER_SIZE (getpagesize() < 8192L ? getpagesize() : 8192L)
34 static void dummyfn(void *ctx, int cpu, void *data, __u32 size)
36 struct tcp_notifier *t = data;
38 if (t->type != 0xde || t->subtype != 0xad ||
39 t->source != 0xbe || t->hash != 0xef)
44 void tcp_notifier_poller(struct perf_buffer *pb)
49 err = perf_buffer__poll(pb, 100);
50 if (err < 0 && err != -EINTR) {
51 printf("failed perf_buffer__poll: %d\n", err);
57 static void *poller_thread(void *arg)
59 struct perf_buffer *pb = arg;
61 tcp_notifier_poller(pb);
65 int verify_result(const struct tcpnotify_globals *result)
67 return (result->ncalls > 0 && result->ncalls == rx_callbacks ? 0 : 1);
70 int main(int argc, char **argv)
72 const char *file = "test_tcpnotify_kern.bpf.o";
73 struct bpf_map *perf_map, *global_map;
74 struct tcpnotify_globals g = {0};
75 struct perf_buffer *pb = NULL;
76 const char *cg_path = "/foo";
77 int prog_fd, rv, cg_fd = -1;
78 int error = EXIT_FAILURE;
79 struct bpf_object *obj;
84 libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
88 pthread_setaffinity_np(pthread_self(), sizeof(cpu_set_t), &cpuset);
90 cg_fd = cgroup_setup_and_join(cg_path);
94 if (bpf_prog_test_load(file, BPF_PROG_TYPE_SOCK_OPS, &obj, &prog_fd)) {
95 printf("FAILED: load_bpf_file failed for: %s\n", file);
99 rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0);
101 printf("FAILED: bpf_prog_attach: %d (%s)\n",
102 error, strerror(errno));
106 perf_map = bpf_object__find_map_by_name(obj, "perf_event_map");
108 printf("FAIL:map '%s' not found\n", "perf_event_map");
112 global_map = bpf_object__find_map_by_name(obj, "global_map");
114 printf("FAIL:map '%s' not found\n", "global_map");
118 pb = perf_buffer__new(bpf_map__fd(perf_map), 8, dummyfn, NULL, NULL, NULL);
122 pthread_create(&tid, NULL, poller_thread, pb);
125 "iptables -A INPUT -p tcp --dport %d -j DROP",
127 if (system(test_script)) {
128 printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
133 "nc 127.0.0.1 %d < /etc/passwd > /dev/null 2>&1 ",
135 if (system(test_script))
136 printf("execute command: %s, err %d\n", test_script, -errno);
139 "iptables -D INPUT -p tcp --dport %d -j DROP",
141 if (system(test_script)) {
142 printf("FAILED: execute command: %s, err %d\n", test_script, -errno);
146 rv = bpf_map_lookup_elem(bpf_map__fd(global_map), &key, &g);
148 printf("FAILED: bpf_map_lookup_elem returns %d\n", rv);
154 if (verify_result(&g)) {
155 printf("FAILED: Wrong stats Expected %d calls, got %d\n",
156 g.ncalls, rx_callbacks);
163 bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS);
165 cleanup_cgroup_environment();
166 perf_buffer__free(pb);