1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun // Copyright (c) 2018 Facebook
3*4882a593Smuzhiyun
4*4882a593Smuzhiyun #include <stdio.h>
5*4882a593Smuzhiyun #include <unistd.h>
6*4882a593Smuzhiyun
7*4882a593Smuzhiyun #include <arpa/inet.h>
8*4882a593Smuzhiyun #include <sys/types.h>
9*4882a593Smuzhiyun #include <sys/socket.h>
10*4882a593Smuzhiyun
11*4882a593Smuzhiyun #include <linux/filter.h>
12*4882a593Smuzhiyun
13*4882a593Smuzhiyun #include <bpf/bpf.h>
14*4882a593Smuzhiyun
15*4882a593Smuzhiyun #include "cgroup_helpers.h"
16*4882a593Smuzhiyun #include <bpf/bpf_endian.h>
17*4882a593Smuzhiyun #include "bpf_rlimit.h"
18*4882a593Smuzhiyun #include "bpf_util.h"
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun #define CG_PATH "/foo"
21*4882a593Smuzhiyun #define MAX_INSNS 512
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun char bpf_log_buf[BPF_LOG_BUF_SIZE];
24*4882a593Smuzhiyun static bool verbose = false;
25*4882a593Smuzhiyun
26*4882a593Smuzhiyun struct sock_test {
27*4882a593Smuzhiyun const char *descr;
28*4882a593Smuzhiyun /* BPF prog properties */
29*4882a593Smuzhiyun struct bpf_insn insns[MAX_INSNS];
30*4882a593Smuzhiyun enum bpf_attach_type expected_attach_type;
31*4882a593Smuzhiyun enum bpf_attach_type attach_type;
32*4882a593Smuzhiyun /* Socket properties */
33*4882a593Smuzhiyun int domain;
34*4882a593Smuzhiyun int type;
35*4882a593Smuzhiyun /* Endpoint to bind() to */
36*4882a593Smuzhiyun const char *ip;
37*4882a593Smuzhiyun unsigned short port;
38*4882a593Smuzhiyun /* Expected test result */
39*4882a593Smuzhiyun enum {
40*4882a593Smuzhiyun LOAD_REJECT,
41*4882a593Smuzhiyun ATTACH_REJECT,
42*4882a593Smuzhiyun BIND_REJECT,
43*4882a593Smuzhiyun SUCCESS,
44*4882a593Smuzhiyun } result;
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun
47*4882a593Smuzhiyun static struct sock_test tests[] = {
48*4882a593Smuzhiyun {
49*4882a593Smuzhiyun "bind4 load with invalid access: src_ip6",
50*4882a593Smuzhiyun .insns = {
51*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
52*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
53*4882a593Smuzhiyun offsetof(struct bpf_sock, src_ip6[0])),
54*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
55*4882a593Smuzhiyun BPF_EXIT_INSN(),
56*4882a593Smuzhiyun },
57*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
58*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
59*4882a593Smuzhiyun 0,
60*4882a593Smuzhiyun 0,
61*4882a593Smuzhiyun NULL,
62*4882a593Smuzhiyun 0,
63*4882a593Smuzhiyun LOAD_REJECT,
64*4882a593Smuzhiyun },
65*4882a593Smuzhiyun {
66*4882a593Smuzhiyun "bind4 load with invalid access: mark",
67*4882a593Smuzhiyun .insns = {
68*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
69*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
70*4882a593Smuzhiyun offsetof(struct bpf_sock, mark)),
71*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
72*4882a593Smuzhiyun BPF_EXIT_INSN(),
73*4882a593Smuzhiyun },
74*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
75*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
76*4882a593Smuzhiyun 0,
77*4882a593Smuzhiyun 0,
78*4882a593Smuzhiyun NULL,
79*4882a593Smuzhiyun 0,
80*4882a593Smuzhiyun LOAD_REJECT,
81*4882a593Smuzhiyun },
82*4882a593Smuzhiyun {
83*4882a593Smuzhiyun "bind6 load with invalid access: src_ip4",
84*4882a593Smuzhiyun .insns = {
85*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
86*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
87*4882a593Smuzhiyun offsetof(struct bpf_sock, src_ip4)),
88*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
89*4882a593Smuzhiyun BPF_EXIT_INSN(),
90*4882a593Smuzhiyun },
91*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
92*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
93*4882a593Smuzhiyun 0,
94*4882a593Smuzhiyun 0,
95*4882a593Smuzhiyun NULL,
96*4882a593Smuzhiyun 0,
97*4882a593Smuzhiyun LOAD_REJECT,
98*4882a593Smuzhiyun },
99*4882a593Smuzhiyun {
100*4882a593Smuzhiyun "sock_create load with invalid access: src_port",
101*4882a593Smuzhiyun .insns = {
102*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
103*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
104*4882a593Smuzhiyun offsetof(struct bpf_sock, src_port)),
105*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
106*4882a593Smuzhiyun BPF_EXIT_INSN(),
107*4882a593Smuzhiyun },
108*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
109*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
110*4882a593Smuzhiyun 0,
111*4882a593Smuzhiyun 0,
112*4882a593Smuzhiyun NULL,
113*4882a593Smuzhiyun 0,
114*4882a593Smuzhiyun LOAD_REJECT,
115*4882a593Smuzhiyun },
116*4882a593Smuzhiyun {
117*4882a593Smuzhiyun "sock_create load w/o expected_attach_type (compat mode)",
118*4882a593Smuzhiyun .insns = {
119*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
120*4882a593Smuzhiyun BPF_EXIT_INSN(),
121*4882a593Smuzhiyun },
122*4882a593Smuzhiyun 0,
123*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
124*4882a593Smuzhiyun AF_INET,
125*4882a593Smuzhiyun SOCK_STREAM,
126*4882a593Smuzhiyun "127.0.0.1",
127*4882a593Smuzhiyun 8097,
128*4882a593Smuzhiyun SUCCESS,
129*4882a593Smuzhiyun },
130*4882a593Smuzhiyun {
131*4882a593Smuzhiyun "sock_create load w/ expected_attach_type",
132*4882a593Smuzhiyun .insns = {
133*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
134*4882a593Smuzhiyun BPF_EXIT_INSN(),
135*4882a593Smuzhiyun },
136*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
137*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
138*4882a593Smuzhiyun AF_INET,
139*4882a593Smuzhiyun SOCK_STREAM,
140*4882a593Smuzhiyun "127.0.0.1",
141*4882a593Smuzhiyun 8097,
142*4882a593Smuzhiyun SUCCESS,
143*4882a593Smuzhiyun },
144*4882a593Smuzhiyun {
145*4882a593Smuzhiyun "attach type mismatch bind4 vs bind6",
146*4882a593Smuzhiyun .insns = {
147*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
148*4882a593Smuzhiyun BPF_EXIT_INSN(),
149*4882a593Smuzhiyun },
150*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
151*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
152*4882a593Smuzhiyun 0,
153*4882a593Smuzhiyun 0,
154*4882a593Smuzhiyun NULL,
155*4882a593Smuzhiyun 0,
156*4882a593Smuzhiyun ATTACH_REJECT,
157*4882a593Smuzhiyun },
158*4882a593Smuzhiyun {
159*4882a593Smuzhiyun "attach type mismatch bind6 vs bind4",
160*4882a593Smuzhiyun .insns = {
161*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
162*4882a593Smuzhiyun BPF_EXIT_INSN(),
163*4882a593Smuzhiyun },
164*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
165*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
166*4882a593Smuzhiyun 0,
167*4882a593Smuzhiyun 0,
168*4882a593Smuzhiyun NULL,
169*4882a593Smuzhiyun 0,
170*4882a593Smuzhiyun ATTACH_REJECT,
171*4882a593Smuzhiyun },
172*4882a593Smuzhiyun {
173*4882a593Smuzhiyun "attach type mismatch default vs bind4",
174*4882a593Smuzhiyun .insns = {
175*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
176*4882a593Smuzhiyun BPF_EXIT_INSN(),
177*4882a593Smuzhiyun },
178*4882a593Smuzhiyun 0,
179*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
180*4882a593Smuzhiyun 0,
181*4882a593Smuzhiyun 0,
182*4882a593Smuzhiyun NULL,
183*4882a593Smuzhiyun 0,
184*4882a593Smuzhiyun ATTACH_REJECT,
185*4882a593Smuzhiyun },
186*4882a593Smuzhiyun {
187*4882a593Smuzhiyun "attach type mismatch bind6 vs sock_create",
188*4882a593Smuzhiyun .insns = {
189*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
190*4882a593Smuzhiyun BPF_EXIT_INSN(),
191*4882a593Smuzhiyun },
192*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
193*4882a593Smuzhiyun BPF_CGROUP_INET_SOCK_CREATE,
194*4882a593Smuzhiyun 0,
195*4882a593Smuzhiyun 0,
196*4882a593Smuzhiyun NULL,
197*4882a593Smuzhiyun 0,
198*4882a593Smuzhiyun ATTACH_REJECT,
199*4882a593Smuzhiyun },
200*4882a593Smuzhiyun {
201*4882a593Smuzhiyun "bind4 reject all",
202*4882a593Smuzhiyun .insns = {
203*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 0),
204*4882a593Smuzhiyun BPF_EXIT_INSN(),
205*4882a593Smuzhiyun },
206*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
207*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
208*4882a593Smuzhiyun AF_INET,
209*4882a593Smuzhiyun SOCK_STREAM,
210*4882a593Smuzhiyun "0.0.0.0",
211*4882a593Smuzhiyun 0,
212*4882a593Smuzhiyun BIND_REJECT,
213*4882a593Smuzhiyun },
214*4882a593Smuzhiyun {
215*4882a593Smuzhiyun "bind6 reject all",
216*4882a593Smuzhiyun .insns = {
217*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 0),
218*4882a593Smuzhiyun BPF_EXIT_INSN(),
219*4882a593Smuzhiyun },
220*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
221*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
222*4882a593Smuzhiyun AF_INET6,
223*4882a593Smuzhiyun SOCK_STREAM,
224*4882a593Smuzhiyun "::",
225*4882a593Smuzhiyun 0,
226*4882a593Smuzhiyun BIND_REJECT,
227*4882a593Smuzhiyun },
228*4882a593Smuzhiyun {
229*4882a593Smuzhiyun "bind6 deny specific IP & port",
230*4882a593Smuzhiyun .insns = {
231*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
232*4882a593Smuzhiyun
233*4882a593Smuzhiyun /* if (ip == expected && port == expected) */
234*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
235*4882a593Smuzhiyun offsetof(struct bpf_sock, src_ip6[3])),
236*4882a593Smuzhiyun BPF_JMP_IMM(BPF_JNE, BPF_REG_7,
237*4882a593Smuzhiyun __bpf_constant_ntohl(0x00000001), 4),
238*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
239*4882a593Smuzhiyun offsetof(struct bpf_sock, src_port)),
240*4882a593Smuzhiyun BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x2001, 2),
241*4882a593Smuzhiyun
242*4882a593Smuzhiyun /* return DENY; */
243*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 0),
244*4882a593Smuzhiyun BPF_JMP_A(1),
245*4882a593Smuzhiyun
246*4882a593Smuzhiyun /* else return ALLOW; */
247*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
248*4882a593Smuzhiyun BPF_EXIT_INSN(),
249*4882a593Smuzhiyun },
250*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
251*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
252*4882a593Smuzhiyun AF_INET6,
253*4882a593Smuzhiyun SOCK_STREAM,
254*4882a593Smuzhiyun "::1",
255*4882a593Smuzhiyun 8193,
256*4882a593Smuzhiyun BIND_REJECT,
257*4882a593Smuzhiyun },
258*4882a593Smuzhiyun {
259*4882a593Smuzhiyun "bind4 allow specific IP & port",
260*4882a593Smuzhiyun .insns = {
261*4882a593Smuzhiyun BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
262*4882a593Smuzhiyun
263*4882a593Smuzhiyun /* if (ip == expected && port == expected) */
264*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
265*4882a593Smuzhiyun offsetof(struct bpf_sock, src_ip4)),
266*4882a593Smuzhiyun BPF_JMP_IMM(BPF_JNE, BPF_REG_7,
267*4882a593Smuzhiyun __bpf_constant_ntohl(0x7F000001), 4),
268*4882a593Smuzhiyun BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6,
269*4882a593Smuzhiyun offsetof(struct bpf_sock, src_port)),
270*4882a593Smuzhiyun BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x1002, 2),
271*4882a593Smuzhiyun
272*4882a593Smuzhiyun /* return ALLOW; */
273*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
274*4882a593Smuzhiyun BPF_JMP_A(1),
275*4882a593Smuzhiyun
276*4882a593Smuzhiyun /* else return DENY; */
277*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 0),
278*4882a593Smuzhiyun BPF_EXIT_INSN(),
279*4882a593Smuzhiyun },
280*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
281*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
282*4882a593Smuzhiyun AF_INET,
283*4882a593Smuzhiyun SOCK_STREAM,
284*4882a593Smuzhiyun "127.0.0.1",
285*4882a593Smuzhiyun 4098,
286*4882a593Smuzhiyun SUCCESS,
287*4882a593Smuzhiyun },
288*4882a593Smuzhiyun {
289*4882a593Smuzhiyun "bind4 allow all",
290*4882a593Smuzhiyun .insns = {
291*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
292*4882a593Smuzhiyun BPF_EXIT_INSN(),
293*4882a593Smuzhiyun },
294*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
295*4882a593Smuzhiyun BPF_CGROUP_INET4_POST_BIND,
296*4882a593Smuzhiyun AF_INET,
297*4882a593Smuzhiyun SOCK_STREAM,
298*4882a593Smuzhiyun "0.0.0.0",
299*4882a593Smuzhiyun 0,
300*4882a593Smuzhiyun SUCCESS,
301*4882a593Smuzhiyun },
302*4882a593Smuzhiyun {
303*4882a593Smuzhiyun "bind6 allow all",
304*4882a593Smuzhiyun .insns = {
305*4882a593Smuzhiyun BPF_MOV64_IMM(BPF_REG_0, 1),
306*4882a593Smuzhiyun BPF_EXIT_INSN(),
307*4882a593Smuzhiyun },
308*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
309*4882a593Smuzhiyun BPF_CGROUP_INET6_POST_BIND,
310*4882a593Smuzhiyun AF_INET6,
311*4882a593Smuzhiyun SOCK_STREAM,
312*4882a593Smuzhiyun "::",
313*4882a593Smuzhiyun 0,
314*4882a593Smuzhiyun SUCCESS,
315*4882a593Smuzhiyun },
316*4882a593Smuzhiyun };
317*4882a593Smuzhiyun
probe_prog_length(const struct bpf_insn * fp)318*4882a593Smuzhiyun static size_t probe_prog_length(const struct bpf_insn *fp)
319*4882a593Smuzhiyun {
320*4882a593Smuzhiyun size_t len;
321*4882a593Smuzhiyun
322*4882a593Smuzhiyun for (len = MAX_INSNS - 1; len > 0; --len)
323*4882a593Smuzhiyun if (fp[len].code != 0 || fp[len].imm != 0)
324*4882a593Smuzhiyun break;
325*4882a593Smuzhiyun return len + 1;
326*4882a593Smuzhiyun }
327*4882a593Smuzhiyun
load_sock_prog(const struct bpf_insn * prog,enum bpf_attach_type attach_type)328*4882a593Smuzhiyun static int load_sock_prog(const struct bpf_insn *prog,
329*4882a593Smuzhiyun enum bpf_attach_type attach_type)
330*4882a593Smuzhiyun {
331*4882a593Smuzhiyun struct bpf_load_program_attr attr;
332*4882a593Smuzhiyun int ret;
333*4882a593Smuzhiyun
334*4882a593Smuzhiyun memset(&attr, 0, sizeof(struct bpf_load_program_attr));
335*4882a593Smuzhiyun attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK;
336*4882a593Smuzhiyun attr.expected_attach_type = attach_type;
337*4882a593Smuzhiyun attr.insns = prog;
338*4882a593Smuzhiyun attr.insns_cnt = probe_prog_length(attr.insns);
339*4882a593Smuzhiyun attr.license = "GPL";
340*4882a593Smuzhiyun attr.log_level = 2;
341*4882a593Smuzhiyun
342*4882a593Smuzhiyun ret = bpf_load_program_xattr(&attr, bpf_log_buf, BPF_LOG_BUF_SIZE);
343*4882a593Smuzhiyun if (verbose && ret < 0)
344*4882a593Smuzhiyun fprintf(stderr, "%s\n", bpf_log_buf);
345*4882a593Smuzhiyun
346*4882a593Smuzhiyun return ret;
347*4882a593Smuzhiyun }
348*4882a593Smuzhiyun
attach_sock_prog(int cgfd,int progfd,enum bpf_attach_type attach_type)349*4882a593Smuzhiyun static int attach_sock_prog(int cgfd, int progfd,
350*4882a593Smuzhiyun enum bpf_attach_type attach_type)
351*4882a593Smuzhiyun {
352*4882a593Smuzhiyun return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE);
353*4882a593Smuzhiyun }
354*4882a593Smuzhiyun
bind_sock(int domain,int type,const char * ip,unsigned short port)355*4882a593Smuzhiyun static int bind_sock(int domain, int type, const char *ip, unsigned short port)
356*4882a593Smuzhiyun {
357*4882a593Smuzhiyun struct sockaddr_storage addr;
358*4882a593Smuzhiyun struct sockaddr_in6 *addr6;
359*4882a593Smuzhiyun struct sockaddr_in *addr4;
360*4882a593Smuzhiyun int sockfd = -1;
361*4882a593Smuzhiyun socklen_t len;
362*4882a593Smuzhiyun int err = 0;
363*4882a593Smuzhiyun
364*4882a593Smuzhiyun sockfd = socket(domain, type, 0);
365*4882a593Smuzhiyun if (sockfd < 0)
366*4882a593Smuzhiyun goto err;
367*4882a593Smuzhiyun
368*4882a593Smuzhiyun memset(&addr, 0, sizeof(addr));
369*4882a593Smuzhiyun
370*4882a593Smuzhiyun if (domain == AF_INET) {
371*4882a593Smuzhiyun len = sizeof(struct sockaddr_in);
372*4882a593Smuzhiyun addr4 = (struct sockaddr_in *)&addr;
373*4882a593Smuzhiyun addr4->sin_family = domain;
374*4882a593Smuzhiyun addr4->sin_port = htons(port);
375*4882a593Smuzhiyun if (inet_pton(domain, ip, (void *)&addr4->sin_addr) != 1)
376*4882a593Smuzhiyun goto err;
377*4882a593Smuzhiyun } else if (domain == AF_INET6) {
378*4882a593Smuzhiyun len = sizeof(struct sockaddr_in6);
379*4882a593Smuzhiyun addr6 = (struct sockaddr_in6 *)&addr;
380*4882a593Smuzhiyun addr6->sin6_family = domain;
381*4882a593Smuzhiyun addr6->sin6_port = htons(port);
382*4882a593Smuzhiyun if (inet_pton(domain, ip, (void *)&addr6->sin6_addr) != 1)
383*4882a593Smuzhiyun goto err;
384*4882a593Smuzhiyun } else {
385*4882a593Smuzhiyun goto err;
386*4882a593Smuzhiyun }
387*4882a593Smuzhiyun
388*4882a593Smuzhiyun if (bind(sockfd, (const struct sockaddr *)&addr, len) == -1)
389*4882a593Smuzhiyun goto err;
390*4882a593Smuzhiyun
391*4882a593Smuzhiyun goto out;
392*4882a593Smuzhiyun err:
393*4882a593Smuzhiyun err = -1;
394*4882a593Smuzhiyun out:
395*4882a593Smuzhiyun close(sockfd);
396*4882a593Smuzhiyun return err;
397*4882a593Smuzhiyun }
398*4882a593Smuzhiyun
run_test_case(int cgfd,const struct sock_test * test)399*4882a593Smuzhiyun static int run_test_case(int cgfd, const struct sock_test *test)
400*4882a593Smuzhiyun {
401*4882a593Smuzhiyun int progfd = -1;
402*4882a593Smuzhiyun int err = 0;
403*4882a593Smuzhiyun
404*4882a593Smuzhiyun printf("Test case: %s .. ", test->descr);
405*4882a593Smuzhiyun progfd = load_sock_prog(test->insns, test->expected_attach_type);
406*4882a593Smuzhiyun if (progfd < 0) {
407*4882a593Smuzhiyun if (test->result == LOAD_REJECT)
408*4882a593Smuzhiyun goto out;
409*4882a593Smuzhiyun else
410*4882a593Smuzhiyun goto err;
411*4882a593Smuzhiyun }
412*4882a593Smuzhiyun
413*4882a593Smuzhiyun if (attach_sock_prog(cgfd, progfd, test->attach_type) == -1) {
414*4882a593Smuzhiyun if (test->result == ATTACH_REJECT)
415*4882a593Smuzhiyun goto out;
416*4882a593Smuzhiyun else
417*4882a593Smuzhiyun goto err;
418*4882a593Smuzhiyun }
419*4882a593Smuzhiyun
420*4882a593Smuzhiyun if (bind_sock(test->domain, test->type, test->ip, test->port) == -1) {
421*4882a593Smuzhiyun /* sys_bind() may fail for different reasons, errno has to be
422*4882a593Smuzhiyun * checked to confirm that BPF program rejected it.
423*4882a593Smuzhiyun */
424*4882a593Smuzhiyun if (test->result == BIND_REJECT && errno == EPERM)
425*4882a593Smuzhiyun goto out;
426*4882a593Smuzhiyun else
427*4882a593Smuzhiyun goto err;
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun
430*4882a593Smuzhiyun
431*4882a593Smuzhiyun if (test->result != SUCCESS)
432*4882a593Smuzhiyun goto err;
433*4882a593Smuzhiyun
434*4882a593Smuzhiyun goto out;
435*4882a593Smuzhiyun err:
436*4882a593Smuzhiyun err = -1;
437*4882a593Smuzhiyun out:
438*4882a593Smuzhiyun /* Detaching w/o checking return code: best effort attempt. */
439*4882a593Smuzhiyun if (progfd != -1)
440*4882a593Smuzhiyun bpf_prog_detach(cgfd, test->attach_type);
441*4882a593Smuzhiyun close(progfd);
442*4882a593Smuzhiyun printf("[%s]\n", err ? "FAIL" : "PASS");
443*4882a593Smuzhiyun return err;
444*4882a593Smuzhiyun }
445*4882a593Smuzhiyun
run_tests(int cgfd)446*4882a593Smuzhiyun static int run_tests(int cgfd)
447*4882a593Smuzhiyun {
448*4882a593Smuzhiyun int passes = 0;
449*4882a593Smuzhiyun int fails = 0;
450*4882a593Smuzhiyun int i;
451*4882a593Smuzhiyun
452*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(tests); ++i) {
453*4882a593Smuzhiyun if (run_test_case(cgfd, &tests[i]))
454*4882a593Smuzhiyun ++fails;
455*4882a593Smuzhiyun else
456*4882a593Smuzhiyun ++passes;
457*4882a593Smuzhiyun }
458*4882a593Smuzhiyun printf("Summary: %d PASSED, %d FAILED\n", passes, fails);
459*4882a593Smuzhiyun return fails ? -1 : 0;
460*4882a593Smuzhiyun }
461*4882a593Smuzhiyun
main(int argc,char ** argv)462*4882a593Smuzhiyun int main(int argc, char **argv)
463*4882a593Smuzhiyun {
464*4882a593Smuzhiyun int cgfd = -1;
465*4882a593Smuzhiyun int err = 0;
466*4882a593Smuzhiyun
467*4882a593Smuzhiyun cgfd = cgroup_setup_and_join(CG_PATH);
468*4882a593Smuzhiyun if (cgfd < 0)
469*4882a593Smuzhiyun goto err;
470*4882a593Smuzhiyun
471*4882a593Smuzhiyun if (run_tests(cgfd))
472*4882a593Smuzhiyun goto err;
473*4882a593Smuzhiyun
474*4882a593Smuzhiyun goto out;
475*4882a593Smuzhiyun err:
476*4882a593Smuzhiyun err = -1;
477*4882a593Smuzhiyun out:
478*4882a593Smuzhiyun close(cgfd);
479*4882a593Smuzhiyun cleanup_cgroup_environment();
480*4882a593Smuzhiyun return err;
481*4882a593Smuzhiyun }
482