test_socket_cookie.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. // SPDX-License-Identifier: GPL-2.0
  2. // Copyright (c) 2018 Facebook
  3. #include <string.h>
  4. #include <unistd.h>
  5. #include <arpa/inet.h>
  6. #include <netinet/in.h>
  7. #include <sys/types.h>
  8. #include <sys/socket.h>
  9. #include <bpf/bpf.h>
  10. #include <bpf/libbpf.h>
  11. #include "bpf_rlimit.h"
  12. #include "cgroup_helpers.h"
  13. #define CG_PATH "/foo"
  14. #define SOCKET_COOKIE_PROG "./socket_cookie_prog.o"
  15. static int start_server(void)
  16. {
  17. struct sockaddr_in6 addr;
  18. int fd;
  19. fd = socket(AF_INET6, SOCK_STREAM, 0);
  20. if (fd == -1) {
  21. log_err("Failed to create server socket");
  22. goto out;
  23. }
  24. memset(&addr, 0, sizeof(addr));
  25. addr.sin6_family = AF_INET6;
  26. addr.sin6_addr = in6addr_loopback;
  27. addr.sin6_port = 0;
  28. if (bind(fd, (const struct sockaddr *)&addr, sizeof(addr)) == -1) {
  29. log_err("Failed to bind server socket");
  30. goto close_out;
  31. }
  32. if (listen(fd, 128) == -1) {
  33. log_err("Failed to listen on server socket");
  34. goto close_out;
  35. }
  36. goto out;
  37. close_out:
  38. close(fd);
  39. fd = -1;
  40. out:
  41. return fd;
  42. }
  43. static int connect_to_server(int server_fd)
  44. {
  45. struct sockaddr_storage addr;
  46. socklen_t len = sizeof(addr);
  47. int fd;
  48. fd = socket(AF_INET6, SOCK_STREAM, 0);
  49. if (fd == -1) {
  50. log_err("Failed to create client socket");
  51. goto out;
  52. }
  53. if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) {
  54. log_err("Failed to get server addr");
  55. goto close_out;
  56. }
  57. if (connect(fd, (const struct sockaddr *)&addr, len) == -1) {
  58. log_err("Fail to connect to server");
  59. goto close_out;
  60. }
  61. goto out;
  62. close_out:
  63. close(fd);
  64. fd = -1;
  65. out:
  66. return fd;
  67. }
  68. static int validate_map(struct bpf_map *map, int client_fd)
  69. {
  70. __u32 cookie_expected_value;
  71. struct sockaddr_in6 addr;
  72. socklen_t len = sizeof(addr);
  73. __u32 cookie_value;
  74. __u64 cookie_key;
  75. int err = 0;
  76. int map_fd;
  77. if (!map) {
  78. log_err("Map not found in BPF object");
  79. goto err;
  80. }
  81. map_fd = bpf_map__fd(map);
  82. err = bpf_map_get_next_key(map_fd, NULL, &cookie_key);
  83. if (err) {
  84. log_err("Can't get cookie key from map");
  85. goto out;
  86. }
  87. err = bpf_map_lookup_elem(map_fd, &cookie_key, &cookie_value);
  88. if (err) {
  89. log_err("Can't get cookie value from map");
  90. goto out;
  91. }
  92. err = getsockname(client_fd, (struct sockaddr *)&addr, &len);
  93. if (err) {
  94. log_err("Can't get client local addr");
  95. goto out;
  96. }
  97. cookie_expected_value = (ntohs(addr.sin6_port) << 8) | 0xFF;
  98. if (cookie_value != cookie_expected_value) {
  99. log_err("Unexpected value in map: %x != %x", cookie_value,
  100. cookie_expected_value);
  101. goto err;
  102. }
  103. goto out;
  104. err:
  105. err = -1;
  106. out:
  107. return err;
  108. }
  109. static int run_test(int cgfd)
  110. {
  111. enum bpf_attach_type attach_type;
  112. struct bpf_prog_load_attr attr;
  113. struct bpf_program *prog;
  114. struct bpf_object *pobj;
  115. const char *prog_name;
  116. int server_fd = -1;
  117. int client_fd = -1;
  118. int prog_fd = -1;
  119. int err = 0;
  120. memset(&attr, 0, sizeof(attr));
  121. attr.file = SOCKET_COOKIE_PROG;
  122. attr.prog_type = BPF_PROG_TYPE_UNSPEC;
  123. err = bpf_prog_load_xattr(&attr, &pobj, &prog_fd);
  124. if (err) {
  125. log_err("Failed to load %s", attr.file);
  126. goto out;
  127. }
  128. bpf_object__for_each_program(prog, pobj) {
  129. prog_name = bpf_program__title(prog, /*needs_copy*/ false);
  130. if (strcmp(prog_name, "cgroup/connect6") == 0) {
  131. attach_type = BPF_CGROUP_INET6_CONNECT;
  132. } else if (strcmp(prog_name, "sockops") == 0) {
  133. attach_type = BPF_CGROUP_SOCK_OPS;
  134. } else {
  135. log_err("Unexpected prog: %s", prog_name);
  136. goto err;
  137. }
  138. err = bpf_prog_attach(bpf_program__fd(prog), cgfd, attach_type,
  139. BPF_F_ALLOW_OVERRIDE);
  140. if (err) {
  141. log_err("Failed to attach prog %s", prog_name);
  142. goto out;
  143. }
  144. }
  145. server_fd = start_server();
  146. if (server_fd == -1)
  147. goto err;
  148. client_fd = connect_to_server(server_fd);
  149. if (client_fd == -1)
  150. goto err;
  151. if (validate_map(bpf_map__next(NULL, pobj), client_fd))
  152. goto err;
  153. goto out;
  154. err:
  155. err = -1;
  156. out:
  157. close(client_fd);
  158. close(server_fd);
  159. bpf_object__close(pobj);
  160. printf("%s\n", err ? "FAILED" : "PASSED");
  161. return err;
  162. }
  163. int main(int argc, char **argv)
  164. {
  165. int cgfd = -1;
  166. int err = 0;
  167. if (setup_cgroup_environment())
  168. goto err;
  169. cgfd = create_and_get_cgroup(CG_PATH);
  170. if (!cgfd)
  171. goto err;
  172. if (join_cgroup(CG_PATH))
  173. goto err;
  174. if (run_test(cgfd))
  175. goto err;
  176. goto out;
  177. err:
  178. err = -1;
  179. out:
  180. close(cgfd);
  181. cleanup_cgroup_environment();
  182. return err;
  183. }