xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/test_sock.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun // Copyright (c) 2018 Facebook
3*4882a593Smuzhiyun 
4*4882a593Smuzhiyun #include <stdio.h>
5*4882a593Smuzhiyun #include <unistd.h>
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun #include <arpa/inet.h>
8*4882a593Smuzhiyun #include <sys/types.h>
9*4882a593Smuzhiyun #include <sys/socket.h>
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #include <linux/filter.h>
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun #include <bpf/bpf.h>
14*4882a593Smuzhiyun 
15*4882a593Smuzhiyun #include "cgroup_helpers.h"
16*4882a593Smuzhiyun #include <bpf/bpf_endian.h>
17*4882a593Smuzhiyun #include "bpf_rlimit.h"
18*4882a593Smuzhiyun #include "bpf_util.h"
19*4882a593Smuzhiyun 
20*4882a593Smuzhiyun #define CG_PATH		"/foo"
21*4882a593Smuzhiyun #define MAX_INSNS	512
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun char bpf_log_buf[BPF_LOG_BUF_SIZE];
24*4882a593Smuzhiyun static bool verbose = false;
25*4882a593Smuzhiyun 
26*4882a593Smuzhiyun struct sock_test {
27*4882a593Smuzhiyun 	const char *descr;
28*4882a593Smuzhiyun 	/* BPF prog properties */
29*4882a593Smuzhiyun 	struct bpf_insn	insns[MAX_INSNS];
30*4882a593Smuzhiyun 	enum bpf_attach_type expected_attach_type;
31*4882a593Smuzhiyun 	enum bpf_attach_type attach_type;
32*4882a593Smuzhiyun 	/* Socket properties */
33*4882a593Smuzhiyun 	int domain;
34*4882a593Smuzhiyun 	int type;
35*4882a593Smuzhiyun 	/* Endpoint to bind() to */
36*4882a593Smuzhiyun 	const char *ip;
37*4882a593Smuzhiyun 	unsigned short port;
38*4882a593Smuzhiyun 	/* Expected test result */
39*4882a593Smuzhiyun 	enum {
40*4882a593Smuzhiyun 		LOAD_REJECT,
41*4882a593Smuzhiyun 		ATTACH_REJECT,
42*4882a593Smuzhiyun 		BIND_REJECT,
43*4882a593Smuzhiyun 		SUCCESS,
44*4882a593Smuzhiyun 	} result;
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun static struct sock_test tests[] = {
48*4882a593Smuzhiyun 	{
49*4882a593Smuzhiyun 		"bind4 load with invalid access: src_ip6",
50*4882a593Smuzhiyun 		.insns = {
51*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
52*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
53*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_ip6[0])),
54*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
55*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
56*4882a593Smuzhiyun 		},
57*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
58*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
59*4882a593Smuzhiyun 		0,
60*4882a593Smuzhiyun 		0,
61*4882a593Smuzhiyun 		NULL,
62*4882a593Smuzhiyun 		0,
63*4882a593Smuzhiyun 		LOAD_REJECT,
64*4882a593Smuzhiyun 	},
65*4882a593Smuzhiyun 	{
66*4882a593Smuzhiyun 		"bind4 load with invalid access: mark",
67*4882a593Smuzhiyun 		.insns = {
68*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
69*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
70*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, mark)),
71*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
72*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
73*4882a593Smuzhiyun 		},
74*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
75*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
76*4882a593Smuzhiyun 		0,
77*4882a593Smuzhiyun 		0,
78*4882a593Smuzhiyun 		NULL,
79*4882a593Smuzhiyun 		0,
80*4882a593Smuzhiyun 		LOAD_REJECT,
81*4882a593Smuzhiyun 	},
82*4882a593Smuzhiyun 	{
83*4882a593Smuzhiyun 		"bind6 load with invalid access: src_ip4",
84*4882a593Smuzhiyun 		.insns = {
85*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
86*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
87*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_ip4)),
88*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
89*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
90*4882a593Smuzhiyun 		},
91*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
92*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
93*4882a593Smuzhiyun 		0,
94*4882a593Smuzhiyun 		0,
95*4882a593Smuzhiyun 		NULL,
96*4882a593Smuzhiyun 		0,
97*4882a593Smuzhiyun 		LOAD_REJECT,
98*4882a593Smuzhiyun 	},
99*4882a593Smuzhiyun 	{
100*4882a593Smuzhiyun 		"sock_create load with invalid access: src_port",
101*4882a593Smuzhiyun 		.insns = {
102*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
103*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
104*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_port)),
105*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
106*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
107*4882a593Smuzhiyun 		},
108*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
109*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
110*4882a593Smuzhiyun 		0,
111*4882a593Smuzhiyun 		0,
112*4882a593Smuzhiyun 		NULL,
113*4882a593Smuzhiyun 		0,
114*4882a593Smuzhiyun 		LOAD_REJECT,
115*4882a593Smuzhiyun 	},
116*4882a593Smuzhiyun 	{
117*4882a593Smuzhiyun 		"sock_create load w/o expected_attach_type (compat mode)",
118*4882a593Smuzhiyun 		.insns = {
119*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
120*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
121*4882a593Smuzhiyun 		},
122*4882a593Smuzhiyun 		0,
123*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
124*4882a593Smuzhiyun 		AF_INET,
125*4882a593Smuzhiyun 		SOCK_STREAM,
126*4882a593Smuzhiyun 		"127.0.0.1",
127*4882a593Smuzhiyun 		8097,
128*4882a593Smuzhiyun 		SUCCESS,
129*4882a593Smuzhiyun 	},
130*4882a593Smuzhiyun 	{
131*4882a593Smuzhiyun 		"sock_create load w/ expected_attach_type",
132*4882a593Smuzhiyun 		.insns = {
133*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
134*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
135*4882a593Smuzhiyun 		},
136*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
137*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
138*4882a593Smuzhiyun 		AF_INET,
139*4882a593Smuzhiyun 		SOCK_STREAM,
140*4882a593Smuzhiyun 		"127.0.0.1",
141*4882a593Smuzhiyun 		8097,
142*4882a593Smuzhiyun 		SUCCESS,
143*4882a593Smuzhiyun 	},
144*4882a593Smuzhiyun 	{
145*4882a593Smuzhiyun 		"attach type mismatch bind4 vs bind6",
146*4882a593Smuzhiyun 		.insns = {
147*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
148*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
149*4882a593Smuzhiyun 		},
150*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
151*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
152*4882a593Smuzhiyun 		0,
153*4882a593Smuzhiyun 		0,
154*4882a593Smuzhiyun 		NULL,
155*4882a593Smuzhiyun 		0,
156*4882a593Smuzhiyun 		ATTACH_REJECT,
157*4882a593Smuzhiyun 	},
158*4882a593Smuzhiyun 	{
159*4882a593Smuzhiyun 		"attach type mismatch bind6 vs bind4",
160*4882a593Smuzhiyun 		.insns = {
161*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
162*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
163*4882a593Smuzhiyun 		},
164*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
165*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
166*4882a593Smuzhiyun 		0,
167*4882a593Smuzhiyun 		0,
168*4882a593Smuzhiyun 		NULL,
169*4882a593Smuzhiyun 		0,
170*4882a593Smuzhiyun 		ATTACH_REJECT,
171*4882a593Smuzhiyun 	},
172*4882a593Smuzhiyun 	{
173*4882a593Smuzhiyun 		"attach type mismatch default vs bind4",
174*4882a593Smuzhiyun 		.insns = {
175*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
176*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
177*4882a593Smuzhiyun 		},
178*4882a593Smuzhiyun 		0,
179*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
180*4882a593Smuzhiyun 		0,
181*4882a593Smuzhiyun 		0,
182*4882a593Smuzhiyun 		NULL,
183*4882a593Smuzhiyun 		0,
184*4882a593Smuzhiyun 		ATTACH_REJECT,
185*4882a593Smuzhiyun 	},
186*4882a593Smuzhiyun 	{
187*4882a593Smuzhiyun 		"attach type mismatch bind6 vs sock_create",
188*4882a593Smuzhiyun 		.insns = {
189*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
190*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
191*4882a593Smuzhiyun 		},
192*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
193*4882a593Smuzhiyun 		BPF_CGROUP_INET_SOCK_CREATE,
194*4882a593Smuzhiyun 		0,
195*4882a593Smuzhiyun 		0,
196*4882a593Smuzhiyun 		NULL,
197*4882a593Smuzhiyun 		0,
198*4882a593Smuzhiyun 		ATTACH_REJECT,
199*4882a593Smuzhiyun 	},
200*4882a593Smuzhiyun 	{
201*4882a593Smuzhiyun 		"bind4 reject all",
202*4882a593Smuzhiyun 		.insns = {
203*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 0),
204*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
205*4882a593Smuzhiyun 		},
206*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
207*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
208*4882a593Smuzhiyun 		AF_INET,
209*4882a593Smuzhiyun 		SOCK_STREAM,
210*4882a593Smuzhiyun 		"0.0.0.0",
211*4882a593Smuzhiyun 		0,
212*4882a593Smuzhiyun 		BIND_REJECT,
213*4882a593Smuzhiyun 	},
214*4882a593Smuzhiyun 	{
215*4882a593Smuzhiyun 		"bind6 reject all",
216*4882a593Smuzhiyun 		.insns = {
217*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 0),
218*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
219*4882a593Smuzhiyun 		},
220*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
221*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
222*4882a593Smuzhiyun 		AF_INET6,
223*4882a593Smuzhiyun 		SOCK_STREAM,
224*4882a593Smuzhiyun 		"::",
225*4882a593Smuzhiyun 		0,
226*4882a593Smuzhiyun 		BIND_REJECT,
227*4882a593Smuzhiyun 	},
228*4882a593Smuzhiyun 	{
229*4882a593Smuzhiyun 		"bind6 deny specific IP & port",
230*4882a593Smuzhiyun 		.insns = {
231*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
232*4882a593Smuzhiyun 
233*4882a593Smuzhiyun 			/* if (ip == expected && port == expected) */
234*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
235*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_ip6[3])),
236*4882a593Smuzhiyun 			BPF_JMP_IMM(BPF_JNE, BPF_REG_7,
237*4882a593Smuzhiyun 				    __bpf_constant_ntohl(0x00000001), 4),
238*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
239*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_port)),
240*4882a593Smuzhiyun 			BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x2001, 2),
241*4882a593Smuzhiyun 
242*4882a593Smuzhiyun 			/* return DENY; */
243*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 0),
244*4882a593Smuzhiyun 			BPF_JMP_A(1),
245*4882a593Smuzhiyun 
246*4882a593Smuzhiyun 			/* else return ALLOW; */
247*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
248*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
249*4882a593Smuzhiyun 		},
250*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
251*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
252*4882a593Smuzhiyun 		AF_INET6,
253*4882a593Smuzhiyun 		SOCK_STREAM,
254*4882a593Smuzhiyun 		"::1",
255*4882a593Smuzhiyun 		8193,
256*4882a593Smuzhiyun 		BIND_REJECT,
257*4882a593Smuzhiyun 	},
258*4882a593Smuzhiyun 	{
259*4882a593Smuzhiyun 		"bind4 allow specific IP & port",
260*4882a593Smuzhiyun 		.insns = {
261*4882a593Smuzhiyun 			BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
262*4882a593Smuzhiyun 
263*4882a593Smuzhiyun 			/* if (ip == expected && port == expected) */
264*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
265*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_ip4)),
266*4882a593Smuzhiyun 			BPF_JMP_IMM(BPF_JNE, BPF_REG_7,
267*4882a593Smuzhiyun 				    __bpf_constant_ntohl(0x7F000001), 4),
268*4882a593Smuzhiyun 			BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
269*4882a593Smuzhiyun 				    offsetof(struct bpf_sock, src_port)),
270*4882a593Smuzhiyun 			BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x1002, 2),
271*4882a593Smuzhiyun 
272*4882a593Smuzhiyun 			/* return ALLOW; */
273*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
274*4882a593Smuzhiyun 			BPF_JMP_A(1),
275*4882a593Smuzhiyun 
276*4882a593Smuzhiyun 			/* else return DENY; */
277*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 0),
278*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
279*4882a593Smuzhiyun 		},
280*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
281*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
282*4882a593Smuzhiyun 		AF_INET,
283*4882a593Smuzhiyun 		SOCK_STREAM,
284*4882a593Smuzhiyun 		"127.0.0.1",
285*4882a593Smuzhiyun 		4098,
286*4882a593Smuzhiyun 		SUCCESS,
287*4882a593Smuzhiyun 	},
288*4882a593Smuzhiyun 	{
289*4882a593Smuzhiyun 		"bind4 allow all",
290*4882a593Smuzhiyun 		.insns = {
291*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
292*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
293*4882a593Smuzhiyun 		},
294*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
295*4882a593Smuzhiyun 		BPF_CGROUP_INET4_POST_BIND,
296*4882a593Smuzhiyun 		AF_INET,
297*4882a593Smuzhiyun 		SOCK_STREAM,
298*4882a593Smuzhiyun 		"0.0.0.0",
299*4882a593Smuzhiyun 		0,
300*4882a593Smuzhiyun 		SUCCESS,
301*4882a593Smuzhiyun 	},
302*4882a593Smuzhiyun 	{
303*4882a593Smuzhiyun 		"bind6 allow all",
304*4882a593Smuzhiyun 		.insns = {
305*4882a593Smuzhiyun 			BPF_MOV64_IMM(BPF_REG_0, 1),
306*4882a593Smuzhiyun 			BPF_EXIT_INSN(),
307*4882a593Smuzhiyun 		},
308*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
309*4882a593Smuzhiyun 		BPF_CGROUP_INET6_POST_BIND,
310*4882a593Smuzhiyun 		AF_INET6,
311*4882a593Smuzhiyun 		SOCK_STREAM,
312*4882a593Smuzhiyun 		"::",
313*4882a593Smuzhiyun 		0,
314*4882a593Smuzhiyun 		SUCCESS,
315*4882a593Smuzhiyun 	},
316*4882a593Smuzhiyun };
317*4882a593Smuzhiyun 
probe_prog_length(const struct bpf_insn * fp)318*4882a593Smuzhiyun static size_t probe_prog_length(const struct bpf_insn *fp)
319*4882a593Smuzhiyun {
320*4882a593Smuzhiyun 	size_t len;
321*4882a593Smuzhiyun 
322*4882a593Smuzhiyun 	for (len = MAX_INSNS - 1; len > 0; --len)
323*4882a593Smuzhiyun 		if (fp[len].code != 0 || fp[len].imm != 0)
324*4882a593Smuzhiyun 			break;
325*4882a593Smuzhiyun 	return len + 1;
326*4882a593Smuzhiyun }
327*4882a593Smuzhiyun 
load_sock_prog(const struct bpf_insn * prog,enum bpf_attach_type attach_type)328*4882a593Smuzhiyun static int load_sock_prog(const struct bpf_insn *prog,
329*4882a593Smuzhiyun 			  enum bpf_attach_type attach_type)
330*4882a593Smuzhiyun {
331*4882a593Smuzhiyun 	struct bpf_load_program_attr attr;
332*4882a593Smuzhiyun 	int ret;
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun 	memset(&attr, 0, sizeof(struct bpf_load_program_attr));
335*4882a593Smuzhiyun 	attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK;
336*4882a593Smuzhiyun 	attr.expected_attach_type = attach_type;
337*4882a593Smuzhiyun 	attr.insns = prog;
338*4882a593Smuzhiyun 	attr.insns_cnt = probe_prog_length(attr.insns);
339*4882a593Smuzhiyun 	attr.license = "GPL";
340*4882a593Smuzhiyun 	attr.log_level = 2;
341*4882a593Smuzhiyun 
342*4882a593Smuzhiyun 	ret = bpf_load_program_xattr(&attr, bpf_log_buf, BPF_LOG_BUF_SIZE);
343*4882a593Smuzhiyun 	if (verbose && ret < 0)
344*4882a593Smuzhiyun 		fprintf(stderr, "%s\n", bpf_log_buf);
345*4882a593Smuzhiyun 
346*4882a593Smuzhiyun 	return ret;
347*4882a593Smuzhiyun }
348*4882a593Smuzhiyun 
attach_sock_prog(int cgfd,int progfd,enum bpf_attach_type attach_type)349*4882a593Smuzhiyun static int attach_sock_prog(int cgfd, int progfd,
350*4882a593Smuzhiyun 			    enum bpf_attach_type attach_type)
351*4882a593Smuzhiyun {
352*4882a593Smuzhiyun 	return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE);
353*4882a593Smuzhiyun }
354*4882a593Smuzhiyun 
bind_sock(int domain,int type,const char * ip,unsigned short port)355*4882a593Smuzhiyun static int bind_sock(int domain, int type, const char *ip, unsigned short port)
356*4882a593Smuzhiyun {
357*4882a593Smuzhiyun 	struct sockaddr_storage addr;
358*4882a593Smuzhiyun 	struct sockaddr_in6 *addr6;
359*4882a593Smuzhiyun 	struct sockaddr_in *addr4;
360*4882a593Smuzhiyun 	int sockfd = -1;
361*4882a593Smuzhiyun 	socklen_t len;
362*4882a593Smuzhiyun 	int err = 0;
363*4882a593Smuzhiyun 
364*4882a593Smuzhiyun 	sockfd = socket(domain, type, 0);
365*4882a593Smuzhiyun 	if (sockfd < 0)
366*4882a593Smuzhiyun 		goto err;
367*4882a593Smuzhiyun 
368*4882a593Smuzhiyun 	memset(&addr, 0, sizeof(addr));
369*4882a593Smuzhiyun 
370*4882a593Smuzhiyun 	if (domain == AF_INET) {
371*4882a593Smuzhiyun 		len = sizeof(struct sockaddr_in);
372*4882a593Smuzhiyun 		addr4 = (struct sockaddr_in *)&addr;
373*4882a593Smuzhiyun 		addr4->sin_family = domain;
374*4882a593Smuzhiyun 		addr4->sin_port = htons(port);
375*4882a593Smuzhiyun 		if (inet_pton(domain, ip, (void *)&addr4->sin_addr) != 1)
376*4882a593Smuzhiyun 			goto err;
377*4882a593Smuzhiyun 	} else if (domain == AF_INET6) {
378*4882a593Smuzhiyun 		len = sizeof(struct sockaddr_in6);
379*4882a593Smuzhiyun 		addr6 = (struct sockaddr_in6 *)&addr;
380*4882a593Smuzhiyun 		addr6->sin6_family = domain;
381*4882a593Smuzhiyun 		addr6->sin6_port = htons(port);
382*4882a593Smuzhiyun 		if (inet_pton(domain, ip, (void *)&addr6->sin6_addr) != 1)
383*4882a593Smuzhiyun 			goto err;
384*4882a593Smuzhiyun 	} else {
385*4882a593Smuzhiyun 		goto err;
386*4882a593Smuzhiyun 	}
387*4882a593Smuzhiyun 
388*4882a593Smuzhiyun 	if (bind(sockfd, (const struct sockaddr *)&addr, len) == -1)
389*4882a593Smuzhiyun 		goto err;
390*4882a593Smuzhiyun 
391*4882a593Smuzhiyun 	goto out;
392*4882a593Smuzhiyun err:
393*4882a593Smuzhiyun 	err = -1;
394*4882a593Smuzhiyun out:
395*4882a593Smuzhiyun 	close(sockfd);
396*4882a593Smuzhiyun 	return err;
397*4882a593Smuzhiyun }
398*4882a593Smuzhiyun 
run_test_case(int cgfd,const struct sock_test * test)399*4882a593Smuzhiyun static int run_test_case(int cgfd, const struct sock_test *test)
400*4882a593Smuzhiyun {
401*4882a593Smuzhiyun 	int progfd = -1;
402*4882a593Smuzhiyun 	int err = 0;
403*4882a593Smuzhiyun 
404*4882a593Smuzhiyun 	printf("Test case: %s .. ", test->descr);
405*4882a593Smuzhiyun 	progfd = load_sock_prog(test->insns, test->expected_attach_type);
406*4882a593Smuzhiyun 	if (progfd < 0) {
407*4882a593Smuzhiyun 		if (test->result == LOAD_REJECT)
408*4882a593Smuzhiyun 			goto out;
409*4882a593Smuzhiyun 		else
410*4882a593Smuzhiyun 			goto err;
411*4882a593Smuzhiyun 	}
412*4882a593Smuzhiyun 
413*4882a593Smuzhiyun 	if (attach_sock_prog(cgfd, progfd, test->attach_type) == -1) {
414*4882a593Smuzhiyun 		if (test->result == ATTACH_REJECT)
415*4882a593Smuzhiyun 			goto out;
416*4882a593Smuzhiyun 		else
417*4882a593Smuzhiyun 			goto err;
418*4882a593Smuzhiyun 	}
419*4882a593Smuzhiyun 
420*4882a593Smuzhiyun 	if (bind_sock(test->domain, test->type, test->ip, test->port) == -1) {
421*4882a593Smuzhiyun 		/* sys_bind() may fail for different reasons, errno has to be
422*4882a593Smuzhiyun 		 * checked to confirm that BPF program rejected it.
423*4882a593Smuzhiyun 		 */
424*4882a593Smuzhiyun 		if (test->result == BIND_REJECT && errno == EPERM)
425*4882a593Smuzhiyun 			goto out;
426*4882a593Smuzhiyun 		else
427*4882a593Smuzhiyun 			goto err;
428*4882a593Smuzhiyun 	}
429*4882a593Smuzhiyun 
430*4882a593Smuzhiyun 
431*4882a593Smuzhiyun 	if (test->result != SUCCESS)
432*4882a593Smuzhiyun 		goto err;
433*4882a593Smuzhiyun 
434*4882a593Smuzhiyun 	goto out;
435*4882a593Smuzhiyun err:
436*4882a593Smuzhiyun 	err = -1;
437*4882a593Smuzhiyun out:
438*4882a593Smuzhiyun 	/* Detaching w/o checking return code: best effort attempt. */
439*4882a593Smuzhiyun 	if (progfd != -1)
440*4882a593Smuzhiyun 		bpf_prog_detach(cgfd, test->attach_type);
441*4882a593Smuzhiyun 	close(progfd);
442*4882a593Smuzhiyun 	printf("[%s]\n", err ? "FAIL" : "PASS");
443*4882a593Smuzhiyun 	return err;
444*4882a593Smuzhiyun }
445*4882a593Smuzhiyun 
run_tests(int cgfd)446*4882a593Smuzhiyun static int run_tests(int cgfd)
447*4882a593Smuzhiyun {
448*4882a593Smuzhiyun 	int passes = 0;
449*4882a593Smuzhiyun 	int fails = 0;
450*4882a593Smuzhiyun 	int i;
451*4882a593Smuzhiyun 
452*4882a593Smuzhiyun 	for (i = 0; i < ARRAY_SIZE(tests); ++i) {
453*4882a593Smuzhiyun 		if (run_test_case(cgfd, &tests[i]))
454*4882a593Smuzhiyun 			++fails;
455*4882a593Smuzhiyun 		else
456*4882a593Smuzhiyun 			++passes;
457*4882a593Smuzhiyun 	}
458*4882a593Smuzhiyun 	printf("Summary: %d PASSED, %d FAILED\n", passes, fails);
459*4882a593Smuzhiyun 	return fails ? -1 : 0;
460*4882a593Smuzhiyun }
461*4882a593Smuzhiyun 
main(int argc,char ** argv)462*4882a593Smuzhiyun int main(int argc, char **argv)
463*4882a593Smuzhiyun {
464*4882a593Smuzhiyun 	int cgfd = -1;
465*4882a593Smuzhiyun 	int err = 0;
466*4882a593Smuzhiyun 
467*4882a593Smuzhiyun 	cgfd = cgroup_setup_and_join(CG_PATH);
468*4882a593Smuzhiyun 	if (cgfd < 0)
469*4882a593Smuzhiyun 		goto err;
470*4882a593Smuzhiyun 
471*4882a593Smuzhiyun 	if (run_tests(cgfd))
472*4882a593Smuzhiyun 		goto err;
473*4882a593Smuzhiyun 
474*4882a593Smuzhiyun 	goto out;
475*4882a593Smuzhiyun err:
476*4882a593Smuzhiyun 	err = -1;
477*4882a593Smuzhiyun out:
478*4882a593Smuzhiyun 	close(cgfd);
479*4882a593Smuzhiyun 	cleanup_cgroup_environment();
480*4882a593Smuzhiyun 	return err;
481*4882a593Smuzhiyun }
482