1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2020, Tessares SA. */
3 /* Copyright (c) 2022, SUSE. */
5 #include <test_progs.h>
6 #include "cgroup_helpers.h"
7 #include "network_helpers.h"
8 #include "mptcp_sock.skel.h"
10 struct mptcp_storage {
15 static int verify_sk(int map_fd, int client_fd, __u32 is_mptcp)
17 int err, cfd = client_fd;
18 struct mptcp_storage val;
23 err = bpf_map_lookup_elem(map_fd, &cfd, &val);
24 if (!ASSERT_OK(err, "bpf_map_lookup_elem"))
27 if (!ASSERT_EQ(val.invoked, 1, "unexpected invoked count"))
30 if (!ASSERT_EQ(val.is_mptcp, 0, "unexpected is_mptcp"))
36 static int run_test(int cgroup_fd, int server_fd, bool is_mptcp)
38 int client_fd, prog_fd, map_fd, err;
39 struct mptcp_sock *sock_skel;
41 sock_skel = mptcp_sock__open_and_load();
42 if (!ASSERT_OK_PTR(sock_skel, "skel_open_load"))
45 prog_fd = bpf_program__fd(sock_skel->progs._sockops);
46 if (!ASSERT_GE(prog_fd, 0, "bpf_program__fd")) {
51 map_fd = bpf_map__fd(sock_skel->maps.socket_storage_map);
52 if (!ASSERT_GE(map_fd, 0, "bpf_map__fd")) {
57 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0);
58 if (!ASSERT_OK(err, "bpf_prog_attach"))
61 client_fd = connect_to_fd(server_fd, 0);
62 if (!ASSERT_GE(client_fd, 0, "connect to fd")) {
67 err += is_mptcp ? verify_sk(map_fd, client_fd, 1) :
68 verify_sk(map_fd, client_fd, 0);
73 mptcp_sock__destroy(sock_skel);
77 static void test_base(void)
79 int server_fd, cgroup_fd;
81 cgroup_fd = test__join_cgroup("/mptcp");
82 if (!ASSERT_GE(cgroup_fd, 0, "test__join_cgroup"))
86 server_fd = start_server(AF_INET, SOCK_STREAM, NULL, 0, 0);
87 if (!ASSERT_GE(server_fd, 0, "start_server"))
90 ASSERT_OK(run_test(cgroup_fd, server_fd, false), "run_test tcp");
96 server_fd = start_mptcp_server(AF_INET, NULL, 0, 0);
97 if (!ASSERT_GE(server_fd, 0, "start_mptcp_server"))
100 ASSERT_OK(run_test(cgroup_fd, server_fd, true), "run_test mptcp");
108 void test_mptcp(void)
110 if (test__start_subtest("base"))