Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2#include <test_progs.h>
  3#include "cgroup_helpers.h"
  4
  5#include <linux/tcp.h>
  6#include <linux/netlink.h>
  7#include "sockopt_sk.skel.h"
  8
  9#ifndef SOL_TCP
 10#define SOL_TCP IPPROTO_TCP
 11#endif
 12
 13#define SOL_CUSTOM			0xdeadbeef
 14
 15static int getsetsockopt(void)
 16{
 17	int fd, err;
 18	union {
 19		char u8[4];
 20		__u32 u32;
 21		char cc[16]; /* TCP_CA_NAME_MAX */
 22		struct tcp_zerocopy_receive zc;
 23	} buf = {};
 24	socklen_t optlen;
 25	char *big_buf = NULL;
 26
 27	fd = socket(AF_INET, SOCK_STREAM, 0);
 28	if (fd < 0) {
 29		log_err("Failed to create socket");
 30		return -1;
 31	}
 32
 33	/* IP_TOS - BPF bypass */
 34
 35	optlen = getpagesize() * 2;
 36	big_buf = calloc(1, optlen);
 37	if (!big_buf) {
 38		log_err("Couldn't allocate two pages");
 39		goto err;
 40	}
 41
 42	*(int *)big_buf = 0x08;
 43	err = setsockopt(fd, SOL_IP, IP_TOS, big_buf, optlen);
 44	if (err) {
 45		log_err("Failed to call setsockopt(IP_TOS)");
 46		goto err;
 47	}
 48
 49	memset(big_buf, 0, optlen);
 50	optlen = 1;
 51	err = getsockopt(fd, SOL_IP, IP_TOS, big_buf, &optlen);
 52	if (err) {
 53		log_err("Failed to call getsockopt(IP_TOS)");
 54		goto err;
 55	}
 56
 57	if (*big_buf != 0x08) {
 58		log_err("Unexpected getsockopt(IP_TOS) optval 0x%x != 0x08",
 59			(int)*big_buf);
 60		goto err;
 61	}
 62
 63	/* IP_TTL - EPERM */
 64
 65	buf.u8[0] = 1;
 66	err = setsockopt(fd, SOL_IP, IP_TTL, &buf, 1);
 67	if (!err || errno != EPERM) {
 68		log_err("Unexpected success from setsockopt(IP_TTL)");
 69		goto err;
 70	}
 71
 72	/* SOL_CUSTOM - handled by BPF */
 73
 74	buf.u8[0] = 0x01;
 75	err = setsockopt(fd, SOL_CUSTOM, 0, &buf, 1);
 76	if (err) {
 77		log_err("Failed to call setsockopt");
 78		goto err;
 79	}
 80
 81	buf.u32 = 0x00;
 82	optlen = 4;
 83	err = getsockopt(fd, SOL_CUSTOM, 0, &buf, &optlen);
 84	if (err) {
 85		log_err("Failed to call getsockopt");
 86		goto err;
 87	}
 88
 89	if (optlen != 1) {
 90		log_err("Unexpected optlen %d != 1", optlen);
 91		goto err;
 92	}
 93	if (buf.u8[0] != 0x01) {
 94		log_err("Unexpected buf[0] 0x%02x != 0x01", buf.u8[0]);
 95		goto err;
 96	}
 97
 98	/* IP_FREEBIND - BPF can't access optval past PAGE_SIZE */
 99
100	optlen = getpagesize() * 2;
101	memset(big_buf, 0, optlen);
102
103	err = setsockopt(fd, SOL_IP, IP_FREEBIND, big_buf, optlen);
104	if (err != 0) {
105		log_err("Failed to call setsockopt, ret=%d", err);
106		goto err;
107	}
108
109	err = getsockopt(fd, SOL_IP, IP_FREEBIND, big_buf, &optlen);
110	if (err != 0) {
111		log_err("Failed to call getsockopt, ret=%d", err);
112		goto err;
113	}
114
115	if (optlen != 1 || *(__u8 *)big_buf != 0x55) {
116		log_err("Unexpected IP_FREEBIND getsockopt, optlen=%d, optval=0x%x",
117			optlen, *(__u8 *)big_buf);
118	}
119
120	/* SO_SNDBUF is overwritten */
121
122	buf.u32 = 0x01010101;
123	err = setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &buf, 4);
124	if (err) {
125		log_err("Failed to call setsockopt(SO_SNDBUF)");
126		goto err;
127	}
128
129	buf.u32 = 0x00;
130	optlen = 4;
131	err = getsockopt(fd, SOL_SOCKET, SO_SNDBUF, &buf, &optlen);
132	if (err) {
133		log_err("Failed to call getsockopt(SO_SNDBUF)");
134		goto err;
135	}
136
137	if (buf.u32 != 0x55AA*2) {
138		log_err("Unexpected getsockopt(SO_SNDBUF) 0x%x != 0x55AA*2",
139			buf.u32);
140		goto err;
141	}
142
143	/* TCP_CONGESTION can extend the string */
144
145	strcpy(buf.cc, "nv");
146	err = setsockopt(fd, SOL_TCP, TCP_CONGESTION, &buf, strlen("nv"));
147	if (err) {
148		log_err("Failed to call setsockopt(TCP_CONGESTION)");
149		goto err;
150	}
151
152
153	optlen = sizeof(buf.cc);
154	err = getsockopt(fd, SOL_TCP, TCP_CONGESTION, &buf, &optlen);
155	if (err) {
156		log_err("Failed to call getsockopt(TCP_CONGESTION)");
157		goto err;
158	}
159
160	if (strcmp(buf.cc, "cubic") != 0) {
161		log_err("Unexpected getsockopt(TCP_CONGESTION) %s != %s",
162			buf.cc, "cubic");
163		goto err;
164	}
165
166	/* TCP_ZEROCOPY_RECEIVE triggers */
167	memset(&buf, 0, sizeof(buf));
168	optlen = sizeof(buf.zc);
169	err = getsockopt(fd, SOL_TCP, TCP_ZEROCOPY_RECEIVE, &buf, &optlen);
170	if (err) {
171		log_err("Unexpected getsockopt(TCP_ZEROCOPY_RECEIVE) err=%d errno=%d",
172			err, errno);
173		goto err;
174	}
175
176	memset(&buf, 0, sizeof(buf));
177	buf.zc.address = 12345; /* Not page aligned. Rejected by tcp_zerocopy_receive() */
178	optlen = sizeof(buf.zc);
179	errno = 0;
180	err = getsockopt(fd, SOL_TCP, TCP_ZEROCOPY_RECEIVE, &buf, &optlen);
181	if (errno != EINVAL) {
182		log_err("Unexpected getsockopt(TCP_ZEROCOPY_RECEIVE) err=%d errno=%d",
183			err, errno);
184		goto err;
185	}
186
187	/* optval=NULL case is handled correctly */
 
 
 
 
 
188
189	close(fd);
190	fd = socket(AF_NETLINK, SOCK_RAW, 0);
191	if (fd < 0) {
192		log_err("Failed to create AF_NETLINK socket");
193		return -1;
194	}
195
196	buf.u32 = 1;
197	optlen = sizeof(__u32);
198	err = setsockopt(fd, SOL_NETLINK, NETLINK_ADD_MEMBERSHIP, &buf, optlen);
199	if (err) {
200		log_err("Unexpected getsockopt(NETLINK_ADD_MEMBERSHIP) err=%d errno=%d",
201			err, errno);
202		goto err;
203	}
204
205	optlen = 0;
206	err = getsockopt(fd, SOL_NETLINK, NETLINK_LIST_MEMBERSHIPS, NULL, &optlen);
207	if (err) {
208		log_err("Unexpected getsockopt(NETLINK_LIST_MEMBERSHIPS) err=%d errno=%d",
209			err, errno);
210		goto err;
211	}
212	ASSERT_EQ(optlen, 8, "Unexpected NETLINK_LIST_MEMBERSHIPS value");
213
214	free(big_buf);
215	close(fd);
216	return 0;
217err:
218	free(big_buf);
219	close(fd);
220	return -1;
221}
222
223static void run_test(int cgroup_fd)
224{
225	struct sockopt_sk *skel;
226
227	skel = sockopt_sk__open_and_load();
228	if (!ASSERT_OK_PTR(skel, "skel_load"))
229		goto cleanup;
230
231	skel->bss->page_size = getpagesize();
232
233	skel->links._setsockopt =
234		bpf_program__attach_cgroup(skel->progs._setsockopt, cgroup_fd);
235	if (!ASSERT_OK_PTR(skel->links._setsockopt, "setsockopt_link"))
236		goto cleanup;
237
238	skel->links._getsockopt =
239		bpf_program__attach_cgroup(skel->progs._getsockopt, cgroup_fd);
240	if (!ASSERT_OK_PTR(skel->links._getsockopt, "getsockopt_link"))
241		goto cleanup;
 
242
243	ASSERT_OK(getsetsockopt(), "getsetsockopt");
244
245cleanup:
246	sockopt_sk__destroy(skel);
247}
248
249void test_sockopt_sk(void)
250{
251	int cgroup_fd;
252
253	cgroup_fd = test__join_cgroup("/sockopt_sk");
254	if (!ASSERT_GE(cgroup_fd, 0, "join_cgroup /sockopt_sk"))
255		return;
256
257	run_test(cgroup_fd);
258	close(cgroup_fd);
259}
v5.9
  1// SPDX-License-Identifier: GPL-2.0
  2#include <test_progs.h>
  3#include "cgroup_helpers.h"
  4
 
 
 
 
 
 
 
 
  5#define SOL_CUSTOM			0xdeadbeef
  6
  7static int getsetsockopt(void)
  8{
  9	int fd, err;
 10	union {
 11		char u8[4];
 12		__u32 u32;
 13		char cc[16]; /* TCP_CA_NAME_MAX */
 
 14	} buf = {};
 15	socklen_t optlen;
 16	char *big_buf = NULL;
 17
 18	fd = socket(AF_INET, SOCK_STREAM, 0);
 19	if (fd < 0) {
 20		log_err("Failed to create socket");
 21		return -1;
 22	}
 23
 24	/* IP_TOS - BPF bypass */
 25
 26	optlen = getpagesize() * 2;
 27	big_buf = calloc(1, optlen);
 28	if (!big_buf) {
 29		log_err("Couldn't allocate two pages");
 30		goto err;
 31	}
 32
 33	*(int *)big_buf = 0x08;
 34	err = setsockopt(fd, SOL_IP, IP_TOS, big_buf, optlen);
 35	if (err) {
 36		log_err("Failed to call setsockopt(IP_TOS)");
 37		goto err;
 38	}
 39
 40	memset(big_buf, 0, optlen);
 41	optlen = 1;
 42	err = getsockopt(fd, SOL_IP, IP_TOS, big_buf, &optlen);
 43	if (err) {
 44		log_err("Failed to call getsockopt(IP_TOS)");
 45		goto err;
 46	}
 47
 48	if (*(int *)big_buf != 0x08) {
 49		log_err("Unexpected getsockopt(IP_TOS) optval 0x%x != 0x08",
 50			*(int *)big_buf);
 51		goto err;
 52	}
 53
 54	/* IP_TTL - EPERM */
 55
 56	buf.u8[0] = 1;
 57	err = setsockopt(fd, SOL_IP, IP_TTL, &buf, 1);
 58	if (!err || errno != EPERM) {
 59		log_err("Unexpected success from setsockopt(IP_TTL)");
 60		goto err;
 61	}
 62
 63	/* SOL_CUSTOM - handled by BPF */
 64
 65	buf.u8[0] = 0x01;
 66	err = setsockopt(fd, SOL_CUSTOM, 0, &buf, 1);
 67	if (err) {
 68		log_err("Failed to call setsockopt");
 69		goto err;
 70	}
 71
 72	buf.u32 = 0x00;
 73	optlen = 4;
 74	err = getsockopt(fd, SOL_CUSTOM, 0, &buf, &optlen);
 75	if (err) {
 76		log_err("Failed to call getsockopt");
 77		goto err;
 78	}
 79
 80	if (optlen != 1) {
 81		log_err("Unexpected optlen %d != 1", optlen);
 82		goto err;
 83	}
 84	if (buf.u8[0] != 0x01) {
 85		log_err("Unexpected buf[0] 0x%02x != 0x01", buf.u8[0]);
 86		goto err;
 87	}
 88
 89	/* IP_FREEBIND - BPF can't access optval past PAGE_SIZE */
 90
 91	optlen = getpagesize() * 2;
 92	memset(big_buf, 0, optlen);
 93
 94	err = setsockopt(fd, SOL_IP, IP_FREEBIND, big_buf, optlen);
 95	if (err != 0) {
 96		log_err("Failed to call setsockopt, ret=%d", err);
 97		goto err;
 98	}
 99
100	err = getsockopt(fd, SOL_IP, IP_FREEBIND, big_buf, &optlen);
101	if (err != 0) {
102		log_err("Failed to call getsockopt, ret=%d", err);
103		goto err;
104	}
105
106	if (optlen != 1 || *(__u8 *)big_buf != 0x55) {
107		log_err("Unexpected IP_FREEBIND getsockopt, optlen=%d, optval=0x%x",
108			optlen, *(__u8 *)big_buf);
109	}
110
111	/* SO_SNDBUF is overwritten */
112
113	buf.u32 = 0x01010101;
114	err = setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &buf, 4);
115	if (err) {
116		log_err("Failed to call setsockopt(SO_SNDBUF)");
117		goto err;
118	}
119
120	buf.u32 = 0x00;
121	optlen = 4;
122	err = getsockopt(fd, SOL_SOCKET, SO_SNDBUF, &buf, &optlen);
123	if (err) {
124		log_err("Failed to call getsockopt(SO_SNDBUF)");
125		goto err;
126	}
127
128	if (buf.u32 != 0x55AA*2) {
129		log_err("Unexpected getsockopt(SO_SNDBUF) 0x%x != 0x55AA*2",
130			buf.u32);
131		goto err;
132	}
133
134	/* TCP_CONGESTION can extend the string */
135
136	strcpy(buf.cc, "nv");
137	err = setsockopt(fd, SOL_TCP, TCP_CONGESTION, &buf, strlen("nv"));
138	if (err) {
139		log_err("Failed to call setsockopt(TCP_CONGESTION)");
140		goto err;
141	}
142
143
144	optlen = sizeof(buf.cc);
145	err = getsockopt(fd, SOL_TCP, TCP_CONGESTION, &buf, &optlen);
146	if (err) {
147		log_err("Failed to call getsockopt(TCP_CONGESTION)");
148		goto err;
149	}
150
151	if (strcmp(buf.cc, "cubic") != 0) {
152		log_err("Unexpected getsockopt(TCP_CONGESTION) %s != %s",
153			buf.cc, "cubic");
154		goto err;
155	}
156
157	free(big_buf);
158	close(fd);
159	return 0;
160err:
161	free(big_buf);
162	close(fd);
163	return -1;
164}
 
 
 
 
 
 
 
 
 
 
 
 
165
166static int prog_attach(struct bpf_object *obj, int cgroup_fd, const char *title)
167{
168	enum bpf_attach_type attach_type;
169	enum bpf_prog_type prog_type;
170	struct bpf_program *prog;
171	int err;
172
173	err = libbpf_prog_type_by_name(title, &prog_type, &attach_type);
174	if (err) {
175		log_err("Failed to deduct types for %s BPF program", title);
 
176		return -1;
177	}
178
179	prog = bpf_object__find_program_by_title(obj, title);
180	if (!prog) {
181		log_err("Failed to find %s BPF program", title);
182		return -1;
 
 
 
183	}
184
185	err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd,
186			      attach_type, 0);
187	if (err) {
188		log_err("Failed to attach %s BPF program", title);
189		return -1;
 
190	}
 
191
 
 
192	return 0;
 
 
 
 
193}
194
195static void run_test(int cgroup_fd)
196{
197	struct bpf_prog_load_attr attr = {
198		.file = "./sockopt_sk.o",
199	};
200	struct bpf_object *obj;
201	int ignored;
202	int err;
203
204	err = bpf_prog_load_xattr(&attr, &obj, &ignored);
205	if (CHECK_FAIL(err))
206		return;
207
208	err = prog_attach(obj, cgroup_fd, "cgroup/getsockopt");
209	if (CHECK_FAIL(err))
210		goto close_bpf_object;
211
212	err = prog_attach(obj, cgroup_fd, "cgroup/setsockopt");
213	if (CHECK_FAIL(err))
214		goto close_bpf_object;
215
216	CHECK_FAIL(getsetsockopt());
217
218close_bpf_object:
219	bpf_object__close(obj);
220}
221
222void test_sockopt_sk(void)
223{
224	int cgroup_fd;
225
226	cgroup_fd = test__join_cgroup("/sockopt_sk");
227	if (CHECK_FAIL(cgroup_fd < 0))
228		return;
229
230	run_test(cgroup_fd);
231	close(cgroup_fd);
232}