// SPDX-License-Identifier: GPL-2.0
|
/* Copyright (c) 2020 Facebook */
|
|
#define _GNU_SOURCE
|
#include <netinet/in.h>
|
#include <arpa/inet.h>
|
#include <unistd.h>
|
#include <stdlib.h>
|
#include <string.h>
|
#include <errno.h>
|
#include <sched.h>
|
#include <linux/compiler.h>
|
#include <bpf/libbpf.h>
|
|
#include "network_helpers.h"
|
#include "test_progs.h"
|
#include "test_btf_skc_cls_ingress.skel.h"
|
|
static struct test_btf_skc_cls_ingress *skel;
|
struct sockaddr_in6 srv_sa6;
|
static __u32 duration;
|
|
#define PROG_PIN_FILE "/sys/fs/bpf/btf_skc_cls_ingress"
|
|
static int write_sysctl(const char *sysctl, const char *value)
|
{
|
int fd, err, len;
|
|
fd = open(sysctl, O_WRONLY);
|
if (CHECK(fd == -1, "open sysctl", "open(%s): %s (%d)\n",
|
sysctl, strerror(errno), errno))
|
return -1;
|
|
len = strlen(value);
|
err = write(fd, value, len);
|
close(fd);
|
if (CHECK(err != len, "write sysctl",
|
"write(%s, %s, %d): err:%d %s (%d)\n",
|
sysctl, value, len, err, strerror(errno), errno))
|
return -1;
|
|
return 0;
|
}
|
|
static int prepare_netns(void)
|
{
|
if (CHECK(unshare(CLONE_NEWNET), "create netns",
|
"unshare(CLONE_NEWNET): %s (%d)",
|
strerror(errno), errno))
|
return -1;
|
|
if (CHECK(system("ip link set dev lo up"),
|
"ip link set dev lo up", "failed\n"))
|
return -1;
|
|
if (CHECK(system("tc qdisc add dev lo clsact"),
|
"tc qdisc add dev lo clsact", "failed\n"))
|
return -1;
|
|
if (CHECK(system("tc filter add dev lo ingress bpf direct-action object-pinned " PROG_PIN_FILE),
|
"install tc cls-prog at ingress", "failed\n"))
|
return -1;
|
|
/* Ensure 20 bytes options (i.e. in total 40 bytes tcp header) for the
|
* bpf_tcp_gen_syncookie() helper.
|
*/
|
if (write_sysctl("/proc/sys/net/ipv4/tcp_window_scaling", "1") ||
|
write_sysctl("/proc/sys/net/ipv4/tcp_timestamps", "1") ||
|
write_sysctl("/proc/sys/net/ipv4/tcp_sack", "1"))
|
return -1;
|
|
return 0;
|
}
|
|
static void reset_test(void)
|
{
|
memset(&skel->bss->srv_sa6, 0, sizeof(skel->bss->srv_sa6));
|
skel->bss->listen_tp_sport = 0;
|
skel->bss->req_sk_sport = 0;
|
skel->bss->recv_cookie = 0;
|
skel->bss->gen_cookie = 0;
|
skel->bss->linum = 0;
|
}
|
|
static void print_err_line(void)
|
{
|
if (skel->bss->linum)
|
printf("bpf prog error at line %u\n", skel->bss->linum);
|
}
|
|
static void test_conn(void)
|
{
|
int listen_fd = -1, cli_fd = -1, srv_fd = -1, err;
|
socklen_t addrlen = sizeof(srv_sa6);
|
int srv_port;
|
|
if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "1"))
|
return;
|
|
listen_fd = start_server(AF_INET6, SOCK_STREAM, "::1", 0, 0);
|
if (CHECK_FAIL(listen_fd == -1))
|
return;
|
|
err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen);
|
if (CHECK(err, "getsockname(listen_fd)", "err:%d errno:%d\n", err,
|
errno))
|
goto done;
|
memcpy(&skel->bss->srv_sa6, &srv_sa6, sizeof(srv_sa6));
|
srv_port = ntohs(srv_sa6.sin6_port);
|
|
cli_fd = connect_to_fd(listen_fd, 0);
|
if (CHECK_FAIL(cli_fd == -1))
|
goto done;
|
|
srv_fd = accept(listen_fd, NULL, NULL);
|
if (CHECK_FAIL(srv_fd == -1))
|
goto done;
|
|
if (CHECK(skel->bss->listen_tp_sport != srv_port ||
|
skel->bss->req_sk_sport != srv_port,
|
"Unexpected sk src port",
|
"listen_tp_sport:%u req_sk_sport:%u expected:%u\n",
|
skel->bss->listen_tp_sport, skel->bss->req_sk_sport,
|
srv_port))
|
goto done;
|
|
if (CHECK(skel->bss->gen_cookie || skel->bss->recv_cookie,
|
"Unexpected syncookie states",
|
"gen_cookie:%u recv_cookie:%u\n",
|
skel->bss->gen_cookie, skel->bss->recv_cookie))
|
goto done;
|
|
CHECK(skel->bss->linum, "bpf prog detected error", "at line %u\n",
|
skel->bss->linum);
|
|
done:
|
if (listen_fd != -1)
|
close(listen_fd);
|
if (cli_fd != -1)
|
close(cli_fd);
|
if (srv_fd != -1)
|
close(srv_fd);
|
}
|
|
static void test_syncookie(void)
|
{
|
int listen_fd = -1, cli_fd = -1, srv_fd = -1, err;
|
socklen_t addrlen = sizeof(srv_sa6);
|
int srv_port;
|
|
/* Enforce syncookie mode */
|
if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "2"))
|
return;
|
|
listen_fd = start_server(AF_INET6, SOCK_STREAM, "::1", 0, 0);
|
if (CHECK_FAIL(listen_fd == -1))
|
return;
|
|
err = getsockname(listen_fd, (struct sockaddr *)&srv_sa6, &addrlen);
|
if (CHECK(err, "getsockname(listen_fd)", "err:%d errno:%d\n", err,
|
errno))
|
goto done;
|
memcpy(&skel->bss->srv_sa6, &srv_sa6, sizeof(srv_sa6));
|
srv_port = ntohs(srv_sa6.sin6_port);
|
|
cli_fd = connect_to_fd(listen_fd, 0);
|
if (CHECK_FAIL(cli_fd == -1))
|
goto done;
|
|
srv_fd = accept(listen_fd, NULL, NULL);
|
if (CHECK_FAIL(srv_fd == -1))
|
goto done;
|
|
if (CHECK(skel->bss->listen_tp_sport != srv_port,
|
"Unexpected tp src port",
|
"listen_tp_sport:%u expected:%u\n",
|
skel->bss->listen_tp_sport, srv_port))
|
goto done;
|
|
if (CHECK(skel->bss->req_sk_sport,
|
"Unexpected req_sk src port",
|
"req_sk_sport:%u expected:0\n",
|
skel->bss->req_sk_sport))
|
goto done;
|
|
if (CHECK(!skel->bss->gen_cookie ||
|
skel->bss->gen_cookie != skel->bss->recv_cookie,
|
"Unexpected syncookie states",
|
"gen_cookie:%u recv_cookie:%u\n",
|
skel->bss->gen_cookie, skel->bss->recv_cookie))
|
goto done;
|
|
CHECK(skel->bss->linum, "bpf prog detected error", "at line %u\n",
|
skel->bss->linum);
|
|
done:
|
if (listen_fd != -1)
|
close(listen_fd);
|
if (cli_fd != -1)
|
close(cli_fd);
|
if (srv_fd != -1)
|
close(srv_fd);
|
}
|
|
struct test {
|
const char *desc;
|
void (*run)(void);
|
};
|
|
#define DEF_TEST(name) { #name, test_##name }
|
static struct test tests[] = {
|
DEF_TEST(conn),
|
DEF_TEST(syncookie),
|
};
|
|
void test_btf_skc_cls_ingress(void)
|
{
|
int i, err;
|
|
skel = test_btf_skc_cls_ingress__open_and_load();
|
if (CHECK(!skel, "test_btf_skc_cls_ingress__open_and_load", "failed\n"))
|
return;
|
|
err = bpf_program__pin(skel->progs.cls_ingress, PROG_PIN_FILE);
|
if (CHECK(err, "bpf_program__pin",
|
"cannot pin bpf prog to %s. err:%d\n", PROG_PIN_FILE, err)) {
|
test_btf_skc_cls_ingress__destroy(skel);
|
return;
|
}
|
|
for (i = 0; i < ARRAY_SIZE(tests); i++) {
|
if (!test__start_subtest(tests[i].desc))
|
continue;
|
|
if (prepare_netns())
|
break;
|
|
tests[i].run();
|
|
print_err_line();
|
reset_test();
|
}
|
|
bpf_program__unpin(skel->progs.cls_ingress, PROG_PIN_FILE);
|
test_btf_skc_cls_ingress__destroy(skel);
|
}
|