summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/net/tcp_ao/lib/setup.c
blob: 92276f916f2f30d080ba3e1f5521c492192f8e98 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
// SPDX-License-Identifier: GPL-2.0
#include <fcntl.h>
#include <pthread.h>
#include <sched.h>
#include <signal.h>
#include "aolib.h"

/*
 * Can't be included in the header: it defines static variables which
 * will be unique to every object. Let's include it only once here.
 */
#include "../../../kselftest.h"

/* Prevent overriding of one thread's output by another */
static pthread_mutex_t ksft_print_lock = PTHREAD_MUTEX_INITIALIZER;

void __test_msg(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_print_msg(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}
void __test_ok(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_test_result_pass(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}
void __test_fail(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_test_result_fail(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}
void __test_xfail(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_test_result_xfail(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}
void __test_error(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_test_result_error(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}
void __test_skip(const char *buf)
{
	pthread_mutex_lock(&ksft_print_lock);
	ksft_test_result_skip(buf);
	pthread_mutex_unlock(&ksft_print_lock);
}

static volatile int failed;
static volatile int skipped;

void test_failed(void)
{
	failed = 1;
}

static void test_exit(void)
{
	if (failed) {
		ksft_exit_fail();
	} else if (skipped) {
		/* ksft_exit_skip() is different from ksft_exit_*() */
		ksft_print_cnts();
		exit(KSFT_SKIP);
	} else {
		ksft_exit_pass();
	}
}

struct dlist_t {
	void (*destruct)(void);
	struct dlist_t *next;
};
static struct dlist_t *destructors_list;

void test_add_destructor(void (*d)(void))
{
	struct dlist_t *p;

	p = malloc(sizeof(struct dlist_t));
	if (p == NULL)
		test_error("malloc() failed");

	p->next = destructors_list;
	p->destruct = d;
	destructors_list = p;
}

static void test_destructor(void) __attribute__((destructor));
static void test_destructor(void)
{
	while (destructors_list) {
		struct dlist_t *p = destructors_list->next;

		destructors_list->destruct();
		free(destructors_list);
		destructors_list = p;
	}
	test_exit();
}

static void sig_int(int signo)
{
	test_error("Caught SIGINT - exiting");
}

int open_netns(void)
{
	const char *netns_path = "/proc/self/ns/net";
	int fd;

	fd = open(netns_path, O_RDONLY);
	if (fd < 0)
		test_error("open(%s)", netns_path);
	return fd;
}

int unshare_open_netns(void)
{
	if (unshare(CLONE_NEWNET) != 0)
		test_error("unshare()");

	return open_netns();
}

void switch_ns(int fd)
{
	if (setns(fd, CLONE_NEWNET))
		test_error("setns()");
}

int switch_save_ns(int new_ns)
{
	int ret = open_netns();

	switch_ns(new_ns);
	return ret;
}

static int nsfd_outside	= -1;
static int nsfd_parent	= -1;
static int nsfd_child	= -1;
const char veth_name[]	= "ktst-veth";

static void init_namespaces(void)
{
	nsfd_outside = open_netns();
	nsfd_parent = unshare_open_netns();
	nsfd_child = unshare_open_netns();
}

static void link_init(const char *veth, int family, uint8_t prefix,
		      union tcp_addr addr, union tcp_addr dest)
{
	if (link_set_up(veth))
		test_error("Failed to set link up");
	if (ip_addr_add(veth, family, addr, prefix))
		test_error("Failed to add ip address");
	if (ip_route_add(veth, family, addr, dest))
		test_error("Failed to add route");
}

static unsigned int nr_threads = 1;

static pthread_mutex_t sync_lock = PTHREAD_MUTEX_INITIALIZER;
static pthread_cond_t sync_cond = PTHREAD_COND_INITIALIZER;
static volatile unsigned int stage_threads[2];
static volatile unsigned int stage_nr;

/* synchronize all threads in the same stage */
void synchronize_threads(void)
{
	unsigned int q = stage_nr;

	pthread_mutex_lock(&sync_lock);
	stage_threads[q]++;
	if (stage_threads[q] == nr_threads) {
		stage_nr ^= 1;
		stage_threads[stage_nr] = 0;
		pthread_cond_signal(&sync_cond);
	}
	while (stage_threads[q] < nr_threads)
		pthread_cond_wait(&sync_cond, &sync_lock);
	pthread_mutex_unlock(&sync_lock);
}

__thread union tcp_addr this_ip_addr;
__thread union tcp_addr this_ip_dest;
int test_family;

struct new_pthread_arg {
	thread_fn	func;
	union tcp_addr	my_ip;
	union tcp_addr	dest_ip;
};
static void *new_pthread_entry(void *arg)
{
	struct new_pthread_arg *p = arg;

	this_ip_addr = p->my_ip;
	this_ip_dest = p->dest_ip;
	p->func(NULL); /* shouldn't return */
	exit(KSFT_FAIL);
}

static void __test_skip_all(const char *msg)
{
	ksft_set_plan(1);
	ksft_print_header();
	skipped = 1;
	test_skip("%s", msg);
	exit(KSFT_SKIP);
}

void __test_init(unsigned int ntests, int family, unsigned int prefix,
		 union tcp_addr addr1, union tcp_addr addr2,
		 thread_fn peer1, thread_fn peer2)
{
	struct sigaction sa = {
		.sa_handler = sig_int,
		.sa_flags = SA_RESTART,
	};
	time_t seed = time(NULL);

	sigemptyset(&sa.sa_mask);
	if (sigaction(SIGINT, &sa, NULL))
		test_error("Can't set SIGINT handler");

	test_family = family;
	if (!kernel_config_has(KCONFIG_NET_NS))
		__test_skip_all(tests_skip_reason[KCONFIG_NET_NS]);
	if (!kernel_config_has(KCONFIG_VETH))
		__test_skip_all(tests_skip_reason[KCONFIG_VETH]);
	if (!kernel_config_has(KCONFIG_TCP_AO))
		__test_skip_all(tests_skip_reason[KCONFIG_TCP_AO]);

	ksft_set_plan(ntests);
	test_print("rand seed %u", (unsigned int)seed);
	srand(seed);


	ksft_print_header();
	init_namespaces();

	if (add_veth(veth_name, nsfd_parent, nsfd_child))
		test_error("Failed to add veth");

	switch_ns(nsfd_child);
	link_init(veth_name, family, prefix, addr2, addr1);
	if (peer2) {
		struct new_pthread_arg targ;
		pthread_t t;

		targ.my_ip = addr2;
		targ.dest_ip = addr1;
		targ.func = peer2;
		nr_threads++;
		if (pthread_create(&t, NULL, new_pthread_entry, &targ))
			test_error("Failed to create pthread");
	}
	switch_ns(nsfd_parent);
	link_init(veth_name, family, prefix, addr1, addr2);

	this_ip_addr = addr1;
	this_ip_dest = addr2;
	peer1(NULL);
	if (failed)
		exit(KSFT_FAIL);
	else
		exit(KSFT_PASS);
}

/* /proc/sys/net/core/optmem_max artifically limits the amount of memory
 * that can be allocated with sock_kmalloc() on each socket in the system.
 * It is not virtualized in v6.7, so it has to written outside test
 * namespaces. To be nice a test will revert optmem back to the old value.
 * Keeping it simple without any file lock, which means the tests that
 * need to set/increase optmem value shouldn't run in parallel.
 * Also, not re-entrant.
 * Since commit f5769faeec36 ("net: Namespace-ify sysctl_optmem_max")
 * it is per-namespace, keeping logic for non-virtualized optmem_max
 * for v6.7, which supports TCP-AO.
 */
static const char *optmem_file = "/proc/sys/net/core/optmem_max";
static size_t saved_optmem;
static int optmem_ns = -1;

static bool is_optmem_namespaced(void)
{
	if (optmem_ns == -1) {
		int old_ns = switch_save_ns(nsfd_child);

		optmem_ns = !access(optmem_file, F_OK);
		switch_ns(old_ns);
	}
	return !!optmem_ns;
}

size_t test_get_optmem(void)
{
	int old_ns = 0;
	FILE *foptmem;
	size_t ret;

	if (!is_optmem_namespaced())
		old_ns = switch_save_ns(nsfd_outside);
	foptmem = fopen(optmem_file, "r");
	if (!foptmem)
		test_error("failed to open %s", optmem_file);

	if (fscanf(foptmem, "%zu", &ret) != 1)
		test_error("can't read from %s", optmem_file);
	fclose(foptmem);
	if (!is_optmem_namespaced())
		switch_ns(old_ns);
	return ret;
}

static void __test_set_optmem(size_t new, size_t *old)
{
	int old_ns = 0;
	FILE *foptmem;

	if (old != NULL)
		*old = test_get_optmem();

	if (!is_optmem_namespaced())
		old_ns = switch_save_ns(nsfd_outside);
	foptmem = fopen(optmem_file, "w");
	if (!foptmem)
		test_error("failed to open %s", optmem_file);

	if (fprintf(foptmem, "%zu", new) <= 0)
		test_error("can't write %zu to %s", new, optmem_file);
	fclose(foptmem);
	if (!is_optmem_namespaced())
		switch_ns(old_ns);
}

static void test_revert_optmem(void)
{
	if (saved_optmem == 0)
		return;

	__test_set_optmem(saved_optmem, NULL);
}

void test_set_optmem(size_t value)
{
	if (saved_optmem == 0) {
		__test_set_optmem(value, &saved_optmem);
		test_add_destructor(test_revert_optmem);
	} else {
		__test_set_optmem(value, NULL);
	}
}