Linux Audio

Check our new training course

Loading...
Note: File does not exist in v3.5.6.
  1// SPDX-License-Identifier: GPL-2.0
  2#include <test_progs.h>
  3#include "cgroup_helpers.h"
  4
  5static char bpf_log_buf[4096];
  6static bool verbose;
  7
  8enum sockopt_test_error {
  9	OK = 0,
 10	DENY_LOAD,
 11	DENY_ATTACH,
 12	EPERM_GETSOCKOPT,
 13	EFAULT_GETSOCKOPT,
 14	EPERM_SETSOCKOPT,
 15	EFAULT_SETSOCKOPT,
 16};
 17
 18static struct sockopt_test {
 19	const char			*descr;
 20	const struct bpf_insn		insns[64];
 21	enum bpf_attach_type		attach_type;
 22	enum bpf_attach_type		expected_attach_type;
 23
 24	int				set_optname;
 25	int				set_level;
 26	const char			set_optval[64];
 27	socklen_t			set_optlen;
 28
 29	int				get_optname;
 30	int				get_level;
 31	const char			get_optval[64];
 32	socklen_t			get_optlen;
 33	socklen_t			get_optlen_ret;
 34
 35	enum sockopt_test_error		error;
 36} tests[] = {
 37
 38	/* ==================== getsockopt ====================  */
 39
 40	{
 41		.descr = "getsockopt: no expected_attach_type",
 42		.insns = {
 43			/* return 1 */
 44			BPF_MOV64_IMM(BPF_REG_0, 1),
 45			BPF_EXIT_INSN(),
 46
 47		},
 48		.attach_type = BPF_CGROUP_GETSOCKOPT,
 49		.expected_attach_type = 0,
 50		.error = DENY_LOAD,
 51	},
 52	{
 53		.descr = "getsockopt: wrong expected_attach_type",
 54		.insns = {
 55			/* return 1 */
 56			BPF_MOV64_IMM(BPF_REG_0, 1),
 57			BPF_EXIT_INSN(),
 58
 59		},
 60		.attach_type = BPF_CGROUP_GETSOCKOPT,
 61		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
 62		.error = DENY_ATTACH,
 63	},
 64	{
 65		.descr = "getsockopt: bypass bpf hook",
 66		.insns = {
 67			/* return 1 */
 68			BPF_MOV64_IMM(BPF_REG_0, 1),
 69			BPF_EXIT_INSN(),
 70		},
 71		.attach_type = BPF_CGROUP_GETSOCKOPT,
 72		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
 73
 74		.get_level = SOL_IP,
 75		.set_level = SOL_IP,
 76
 77		.get_optname = IP_TOS,
 78		.set_optname = IP_TOS,
 79
 80		.set_optval = { 1 << 3 },
 81		.set_optlen = 1,
 82
 83		.get_optval = { 1 << 3 },
 84		.get_optlen = 1,
 85	},
 86	{
 87		.descr = "getsockopt: return EPERM from bpf hook",
 88		.insns = {
 89			BPF_MOV64_IMM(BPF_REG_0, 0),
 90			BPF_EXIT_INSN(),
 91		},
 92		.attach_type = BPF_CGROUP_GETSOCKOPT,
 93		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
 94
 95		.get_level = SOL_IP,
 96		.get_optname = IP_TOS,
 97
 98		.get_optlen = 1,
 99		.error = EPERM_GETSOCKOPT,
100	},
101	{
102		.descr = "getsockopt: no optval bounds check, deny loading",
103		.insns = {
104			/* r6 = ctx->optval */
105			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
106				    offsetof(struct bpf_sockopt, optval)),
107
108			/* ctx->optval[0] = 0x80 */
109			BPF_MOV64_IMM(BPF_REG_0, 0x80),
110			BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_0, 0),
111
112			/* return 1 */
113			BPF_MOV64_IMM(BPF_REG_0, 1),
114			BPF_EXIT_INSN(),
115		},
116		.attach_type = BPF_CGROUP_GETSOCKOPT,
117		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
118		.error = DENY_LOAD,
119	},
120	{
121		.descr = "getsockopt: read ctx->level",
122		.insns = {
123			/* r6 = ctx->level */
124			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
125				    offsetof(struct bpf_sockopt, level)),
126
127			/* if (ctx->level == 123) { */
128			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 123, 4),
129			/* ctx->retval = 0 */
130			BPF_MOV64_IMM(BPF_REG_0, 0),
131			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
132				    offsetof(struct bpf_sockopt, retval)),
133			/* return 1 */
134			BPF_MOV64_IMM(BPF_REG_0, 1),
135			BPF_JMP_A(1),
136			/* } else { */
137			/* return 0 */
138			BPF_MOV64_IMM(BPF_REG_0, 0),
139			/* } */
140			BPF_EXIT_INSN(),
141		},
142		.attach_type = BPF_CGROUP_GETSOCKOPT,
143		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
144
145		.get_level = 123,
146
147		.get_optlen = 1,
148	},
149	{
150		.descr = "getsockopt: deny writing to ctx->level",
151		.insns = {
152			/* ctx->level = 1 */
153			BPF_MOV64_IMM(BPF_REG_0, 1),
154			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
155				    offsetof(struct bpf_sockopt, level)),
156			BPF_EXIT_INSN(),
157		},
158		.attach_type = BPF_CGROUP_GETSOCKOPT,
159		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
160
161		.error = DENY_LOAD,
162	},
163	{
164		.descr = "getsockopt: read ctx->optname",
165		.insns = {
166			/* r6 = ctx->optname */
167			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
168				    offsetof(struct bpf_sockopt, optname)),
169
170			/* if (ctx->optname == 123) { */
171			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 123, 4),
172			/* ctx->retval = 0 */
173			BPF_MOV64_IMM(BPF_REG_0, 0),
174			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
175				    offsetof(struct bpf_sockopt, retval)),
176			/* return 1 */
177			BPF_MOV64_IMM(BPF_REG_0, 1),
178			BPF_JMP_A(1),
179			/* } else { */
180			/* return 0 */
181			BPF_MOV64_IMM(BPF_REG_0, 0),
182			/* } */
183			BPF_EXIT_INSN(),
184		},
185		.attach_type = BPF_CGROUP_GETSOCKOPT,
186		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
187
188		.get_optname = 123,
189
190		.get_optlen = 1,
191	},
192	{
193		.descr = "getsockopt: read ctx->retval",
194		.insns = {
195			/* r6 = ctx->retval */
196			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
197				    offsetof(struct bpf_sockopt, retval)),
198
199			/* return 1 */
200			BPF_MOV64_IMM(BPF_REG_0, 1),
201			BPF_EXIT_INSN(),
202		},
203		.attach_type = BPF_CGROUP_GETSOCKOPT,
204		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
205
206		.get_level = SOL_IP,
207		.get_optname = IP_TOS,
208		.get_optlen = 1,
209	},
210	{
211		.descr = "getsockopt: deny writing to ctx->optname",
212		.insns = {
213			/* ctx->optname = 1 */
214			BPF_MOV64_IMM(BPF_REG_0, 1),
215			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
216				    offsetof(struct bpf_sockopt, optname)),
217			BPF_EXIT_INSN(),
218		},
219		.attach_type = BPF_CGROUP_GETSOCKOPT,
220		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
221
222		.error = DENY_LOAD,
223	},
224	{
225		.descr = "getsockopt: read ctx->optlen",
226		.insns = {
227			/* r6 = ctx->optlen */
228			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
229				    offsetof(struct bpf_sockopt, optlen)),
230
231			/* if (ctx->optlen == 64) { */
232			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 64, 4),
233			/* ctx->retval = 0 */
234			BPF_MOV64_IMM(BPF_REG_0, 0),
235			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
236				    offsetof(struct bpf_sockopt, retval)),
237			/* return 1 */
238			BPF_MOV64_IMM(BPF_REG_0, 1),
239			BPF_JMP_A(1),
240			/* } else { */
241			/* return 0 */
242			BPF_MOV64_IMM(BPF_REG_0, 0),
243			/* } */
244			BPF_EXIT_INSN(),
245		},
246		.attach_type = BPF_CGROUP_GETSOCKOPT,
247		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
248
249		.get_optlen = 64,
250	},
251	{
252		.descr = "getsockopt: deny bigger ctx->optlen",
253		.insns = {
254			/* ctx->optlen = 65 */
255			BPF_MOV64_IMM(BPF_REG_0, 65),
256			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
257				    offsetof(struct bpf_sockopt, optlen)),
258
259			/* ctx->retval = 0 */
260			BPF_MOV64_IMM(BPF_REG_0, 0),
261			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
262				    offsetof(struct bpf_sockopt, retval)),
263
264			/* return 1 */
265			BPF_MOV64_IMM(BPF_REG_0, 1),
266			BPF_EXIT_INSN(),
267		},
268		.attach_type = BPF_CGROUP_GETSOCKOPT,
269		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
270
271		.get_optlen = 64,
272
273		.error = EFAULT_GETSOCKOPT,
274	},
275	{
276		.descr = "getsockopt: deny arbitrary ctx->retval",
277		.insns = {
278			/* ctx->retval = 123 */
279			BPF_MOV64_IMM(BPF_REG_0, 123),
280			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
281				    offsetof(struct bpf_sockopt, retval)),
282
283			/* return 1 */
284			BPF_MOV64_IMM(BPF_REG_0, 1),
285			BPF_EXIT_INSN(),
286		},
287		.attach_type = BPF_CGROUP_GETSOCKOPT,
288		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
289
290		.get_optlen = 64,
291
292		.error = EFAULT_GETSOCKOPT,
293	},
294	{
295		.descr = "getsockopt: support smaller ctx->optlen",
296		.insns = {
297			/* ctx->optlen = 32 */
298			BPF_MOV64_IMM(BPF_REG_0, 32),
299			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
300				    offsetof(struct bpf_sockopt, optlen)),
301			/* ctx->retval = 0 */
302			BPF_MOV64_IMM(BPF_REG_0, 0),
303			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
304				    offsetof(struct bpf_sockopt, retval)),
305			/* return 1 */
306			BPF_MOV64_IMM(BPF_REG_0, 1),
307			BPF_EXIT_INSN(),
308		},
309		.attach_type = BPF_CGROUP_GETSOCKOPT,
310		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
311
312		.get_optlen = 64,
313		.get_optlen_ret = 32,
314	},
315	{
316		.descr = "getsockopt: deny writing to ctx->optval",
317		.insns = {
318			/* ctx->optval = 1 */
319			BPF_MOV64_IMM(BPF_REG_0, 1),
320			BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
321				    offsetof(struct bpf_sockopt, optval)),
322			BPF_EXIT_INSN(),
323		},
324		.attach_type = BPF_CGROUP_GETSOCKOPT,
325		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
326
327		.error = DENY_LOAD,
328	},
329	{
330		.descr = "getsockopt: deny writing to ctx->optval_end",
331		.insns = {
332			/* ctx->optval_end = 1 */
333			BPF_MOV64_IMM(BPF_REG_0, 1),
334			BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
335				    offsetof(struct bpf_sockopt, optval_end)),
336			BPF_EXIT_INSN(),
337		},
338		.attach_type = BPF_CGROUP_GETSOCKOPT,
339		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
340
341		.error = DENY_LOAD,
342	},
343	{
344		.descr = "getsockopt: rewrite value",
345		.insns = {
346			/* r6 = ctx->optval */
347			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
348				    offsetof(struct bpf_sockopt, optval)),
349			/* r2 = ctx->optval */
350			BPF_MOV64_REG(BPF_REG_2, BPF_REG_6),
351			/* r6 = ctx->optval + 1 */
352			BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
353
354			/* r7 = ctx->optval_end */
355			BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_1,
356				    offsetof(struct bpf_sockopt, optval_end)),
357
358			/* if (ctx->optval + 1 <= ctx->optval_end) { */
359			BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_7, 1),
360			/* ctx->optval[0] = 0xF0 */
361			BPF_ST_MEM(BPF_B, BPF_REG_2, 0, 0xF0),
362			/* } */
363
364			/* ctx->retval = 0 */
365			BPF_MOV64_IMM(BPF_REG_0, 0),
366			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
367				    offsetof(struct bpf_sockopt, retval)),
368
369			/* return 1*/
370			BPF_MOV64_IMM(BPF_REG_0, 1),
371			BPF_EXIT_INSN(),
372		},
373		.attach_type = BPF_CGROUP_GETSOCKOPT,
374		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
375
376		.get_level = SOL_IP,
377		.get_optname = IP_TOS,
378
379		.get_optval = { 0xF0 },
380		.get_optlen = 1,
381	},
382
383	/* ==================== setsockopt ====================  */
384
385	{
386		.descr = "setsockopt: no expected_attach_type",
387		.insns = {
388			/* return 1 */
389			BPF_MOV64_IMM(BPF_REG_0, 1),
390			BPF_EXIT_INSN(),
391
392		},
393		.attach_type = BPF_CGROUP_SETSOCKOPT,
394		.expected_attach_type = 0,
395		.error = DENY_LOAD,
396	},
397	{
398		.descr = "setsockopt: wrong expected_attach_type",
399		.insns = {
400			/* return 1 */
401			BPF_MOV64_IMM(BPF_REG_0, 1),
402			BPF_EXIT_INSN(),
403
404		},
405		.attach_type = BPF_CGROUP_SETSOCKOPT,
406		.expected_attach_type = BPF_CGROUP_GETSOCKOPT,
407		.error = DENY_ATTACH,
408	},
409	{
410		.descr = "setsockopt: bypass bpf hook",
411		.insns = {
412			/* return 1 */
413			BPF_MOV64_IMM(BPF_REG_0, 1),
414			BPF_EXIT_INSN(),
415		},
416		.attach_type = BPF_CGROUP_SETSOCKOPT,
417		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
418
419		.get_level = SOL_IP,
420		.set_level = SOL_IP,
421
422		.get_optname = IP_TOS,
423		.set_optname = IP_TOS,
424
425		.set_optval = { 1 << 3 },
426		.set_optlen = 1,
427
428		.get_optval = { 1 << 3 },
429		.get_optlen = 1,
430	},
431	{
432		.descr = "setsockopt: return EPERM from bpf hook",
433		.insns = {
434			/* return 0 */
435			BPF_MOV64_IMM(BPF_REG_0, 0),
436			BPF_EXIT_INSN(),
437		},
438		.attach_type = BPF_CGROUP_SETSOCKOPT,
439		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
440
441		.set_level = SOL_IP,
442		.set_optname = IP_TOS,
443
444		.set_optlen = 1,
445		.error = EPERM_SETSOCKOPT,
446	},
447	{
448		.descr = "setsockopt: no optval bounds check, deny loading",
449		.insns = {
450			/* r6 = ctx->optval */
451			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
452				    offsetof(struct bpf_sockopt, optval)),
453
454			/* r0 = ctx->optval[0] */
455			BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, 0),
456
457			/* return 1 */
458			BPF_MOV64_IMM(BPF_REG_0, 1),
459			BPF_EXIT_INSN(),
460		},
461		.attach_type = BPF_CGROUP_SETSOCKOPT,
462		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
463		.error = DENY_LOAD,
464	},
465	{
466		.descr = "setsockopt: read ctx->level",
467		.insns = {
468			/* r6 = ctx->level */
469			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
470				    offsetof(struct bpf_sockopt, level)),
471
472			/* if (ctx->level == 123) { */
473			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 123, 4),
474			/* ctx->optlen = -1 */
475			BPF_MOV64_IMM(BPF_REG_0, -1),
476			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
477				    offsetof(struct bpf_sockopt, optlen)),
478			/* return 1 */
479			BPF_MOV64_IMM(BPF_REG_0, 1),
480			BPF_JMP_A(1),
481			/* } else { */
482			/* return 0 */
483			BPF_MOV64_IMM(BPF_REG_0, 0),
484			/* } */
485			BPF_EXIT_INSN(),
486		},
487		.attach_type = BPF_CGROUP_SETSOCKOPT,
488		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
489
490		.set_level = 123,
491
492		.set_optlen = 1,
493	},
494	{
495		.descr = "setsockopt: allow changing ctx->level",
496		.insns = {
497			/* ctx->level = SOL_IP */
498			BPF_MOV64_IMM(BPF_REG_0, SOL_IP),
499			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
500				    offsetof(struct bpf_sockopt, level)),
501			/* return 1 */
502			BPF_MOV64_IMM(BPF_REG_0, 1),
503			BPF_EXIT_INSN(),
504		},
505		.attach_type = BPF_CGROUP_SETSOCKOPT,
506		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
507
508		.get_level = SOL_IP,
509		.set_level = 234, /* should be rewritten to SOL_IP */
510
511		.get_optname = IP_TOS,
512		.set_optname = IP_TOS,
513
514		.set_optval = { 1 << 3 },
515		.set_optlen = 1,
516		.get_optval = { 1 << 3 },
517		.get_optlen = 1,
518	},
519	{
520		.descr = "setsockopt: read ctx->optname",
521		.insns = {
522			/* r6 = ctx->optname */
523			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
524				    offsetof(struct bpf_sockopt, optname)),
525
526			/* if (ctx->optname == 123) { */
527			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 123, 4),
528			/* ctx->optlen = -1 */
529			BPF_MOV64_IMM(BPF_REG_0, -1),
530			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
531				    offsetof(struct bpf_sockopt, optlen)),
532			/* return 1 */
533			BPF_MOV64_IMM(BPF_REG_0, 1),
534			BPF_JMP_A(1),
535			/* } else { */
536			/* return 0 */
537			BPF_MOV64_IMM(BPF_REG_0, 0),
538			/* } */
539			BPF_EXIT_INSN(),
540		},
541		.attach_type = BPF_CGROUP_SETSOCKOPT,
542		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
543
544		.set_optname = 123,
545
546		.set_optlen = 1,
547	},
548	{
549		.descr = "setsockopt: allow changing ctx->optname",
550		.insns = {
551			/* ctx->optname = IP_TOS */
552			BPF_MOV64_IMM(BPF_REG_0, IP_TOS),
553			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
554				    offsetof(struct bpf_sockopt, optname)),
555			/* return 1 */
556			BPF_MOV64_IMM(BPF_REG_0, 1),
557			BPF_EXIT_INSN(),
558		},
559		.attach_type = BPF_CGROUP_SETSOCKOPT,
560		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
561
562		.get_level = SOL_IP,
563		.set_level = SOL_IP,
564
565		.get_optname = IP_TOS,
566		.set_optname = 456, /* should be rewritten to IP_TOS */
567
568		.set_optval = { 1 << 3 },
569		.set_optlen = 1,
570		.get_optval = { 1 << 3 },
571		.get_optlen = 1,
572	},
573	{
574		.descr = "setsockopt: read ctx->optlen",
575		.insns = {
576			/* r6 = ctx->optlen */
577			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
578				    offsetof(struct bpf_sockopt, optlen)),
579
580			/* if (ctx->optlen == 64) { */
581			BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 64, 4),
582			/* ctx->optlen = -1 */
583			BPF_MOV64_IMM(BPF_REG_0, -1),
584			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
585				    offsetof(struct bpf_sockopt, optlen)),
586			/* return 1 */
587			BPF_MOV64_IMM(BPF_REG_0, 1),
588			BPF_JMP_A(1),
589			/* } else { */
590			/* return 0 */
591			BPF_MOV64_IMM(BPF_REG_0, 0),
592			/* } */
593			BPF_EXIT_INSN(),
594		},
595		.attach_type = BPF_CGROUP_SETSOCKOPT,
596		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
597
598		.set_optlen = 64,
599	},
600	{
601		.descr = "setsockopt: ctx->optlen == -1 is ok",
602		.insns = {
603			/* ctx->optlen = -1 */
604			BPF_MOV64_IMM(BPF_REG_0, -1),
605			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
606				    offsetof(struct bpf_sockopt, optlen)),
607			/* return 1 */
608			BPF_MOV64_IMM(BPF_REG_0, 1),
609			BPF_EXIT_INSN(),
610		},
611		.attach_type = BPF_CGROUP_SETSOCKOPT,
612		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
613
614		.set_optlen = 64,
615	},
616	{
617		.descr = "setsockopt: deny ctx->optlen < 0 (except -1)",
618		.insns = {
619			/* ctx->optlen = -2 */
620			BPF_MOV64_IMM(BPF_REG_0, -2),
621			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
622				    offsetof(struct bpf_sockopt, optlen)),
623			/* return 1 */
624			BPF_MOV64_IMM(BPF_REG_0, 1),
625			BPF_EXIT_INSN(),
626		},
627		.attach_type = BPF_CGROUP_SETSOCKOPT,
628		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
629
630		.set_optlen = 4,
631
632		.error = EFAULT_SETSOCKOPT,
633	},
634	{
635		.descr = "setsockopt: deny ctx->optlen > input optlen",
636		.insns = {
637			/* ctx->optlen = 65 */
638			BPF_MOV64_IMM(BPF_REG_0, 65),
639			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
640				    offsetof(struct bpf_sockopt, optlen)),
641			BPF_MOV64_IMM(BPF_REG_0, 1),
642			BPF_EXIT_INSN(),
643		},
644		.attach_type = BPF_CGROUP_SETSOCKOPT,
645		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
646
647		.set_optlen = 64,
648
649		.error = EFAULT_SETSOCKOPT,
650	},
651	{
652		.descr = "setsockopt: allow changing ctx->optlen within bounds",
653		.insns = {
654			/* r6 = ctx->optval */
655			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
656				    offsetof(struct bpf_sockopt, optval)),
657			/* r2 = ctx->optval */
658			BPF_MOV64_REG(BPF_REG_2, BPF_REG_6),
659			/* r6 = ctx->optval + 1 */
660			BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
661
662			/* r7 = ctx->optval_end */
663			BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_1,
664				    offsetof(struct bpf_sockopt, optval_end)),
665
666			/* if (ctx->optval + 1 <= ctx->optval_end) { */
667			BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_7, 1),
668			/* ctx->optval[0] = 1 << 3 */
669			BPF_ST_MEM(BPF_B, BPF_REG_2, 0, 1 << 3),
670			/* } */
671
672			/* ctx->optlen = 1 */
673			BPF_MOV64_IMM(BPF_REG_0, 1),
674			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
675				    offsetof(struct bpf_sockopt, optlen)),
676
677			/* return 1*/
678			BPF_MOV64_IMM(BPF_REG_0, 1),
679			BPF_EXIT_INSN(),
680		},
681		.attach_type = BPF_CGROUP_SETSOCKOPT,
682		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
683
684		.get_level = SOL_IP,
685		.set_level = SOL_IP,
686
687		.get_optname = IP_TOS,
688		.set_optname = IP_TOS,
689
690		.set_optval = { 1, 1, 1, 1 },
691		.set_optlen = 4,
692		.get_optval = { 1 << 3 },
693		.get_optlen = 1,
694	},
695	{
696		.descr = "setsockopt: deny write ctx->retval",
697		.insns = {
698			/* ctx->retval = 0 */
699			BPF_MOV64_IMM(BPF_REG_0, 0),
700			BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
701				    offsetof(struct bpf_sockopt, retval)),
702
703			/* return 1 */
704			BPF_MOV64_IMM(BPF_REG_0, 1),
705			BPF_EXIT_INSN(),
706		},
707		.attach_type = BPF_CGROUP_SETSOCKOPT,
708		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
709
710		.error = DENY_LOAD,
711	},
712	{
713		.descr = "setsockopt: deny read ctx->retval",
714		.insns = {
715			/* r6 = ctx->retval */
716			BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
717				    offsetof(struct bpf_sockopt, retval)),
718
719			/* return 1 */
720			BPF_MOV64_IMM(BPF_REG_0, 1),
721			BPF_EXIT_INSN(),
722		},
723		.attach_type = BPF_CGROUP_SETSOCKOPT,
724		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
725
726		.error = DENY_LOAD,
727	},
728	{
729		.descr = "setsockopt: deny writing to ctx->optval",
730		.insns = {
731			/* ctx->optval = 1 */
732			BPF_MOV64_IMM(BPF_REG_0, 1),
733			BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
734				    offsetof(struct bpf_sockopt, optval)),
735			BPF_EXIT_INSN(),
736		},
737		.attach_type = BPF_CGROUP_SETSOCKOPT,
738		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
739
740		.error = DENY_LOAD,
741	},
742	{
743		.descr = "setsockopt: deny writing to ctx->optval_end",
744		.insns = {
745			/* ctx->optval_end = 1 */
746			BPF_MOV64_IMM(BPF_REG_0, 1),
747			BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
748				    offsetof(struct bpf_sockopt, optval_end)),
749			BPF_EXIT_INSN(),
750		},
751		.attach_type = BPF_CGROUP_SETSOCKOPT,
752		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
753
754		.error = DENY_LOAD,
755	},
756	{
757		.descr = "setsockopt: allow IP_TOS <= 128",
758		.insns = {
759			/* r6 = ctx->optval */
760			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
761				    offsetof(struct bpf_sockopt, optval)),
762			/* r7 = ctx->optval + 1 */
763			BPF_MOV64_REG(BPF_REG_7, BPF_REG_6),
764			BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, 1),
765
766			/* r8 = ctx->optval_end */
767			BPF_LDX_MEM(BPF_DW, BPF_REG_8, BPF_REG_1,
768				    offsetof(struct bpf_sockopt, optval_end)),
769
770			/* if (ctx->optval + 1 <= ctx->optval_end) { */
771			BPF_JMP_REG(BPF_JGT, BPF_REG_7, BPF_REG_8, 4),
772
773			/* r9 = ctx->optval[0] */
774			BPF_LDX_MEM(BPF_B, BPF_REG_9, BPF_REG_6, 0),
775
776			/* if (ctx->optval[0] < 128) */
777			BPF_JMP_IMM(BPF_JGT, BPF_REG_9, 128, 2),
778			BPF_MOV64_IMM(BPF_REG_0, 1),
779			BPF_JMP_A(1),
780			/* } */
781
782			/* } else { */
783			BPF_MOV64_IMM(BPF_REG_0, 0),
784			/* } */
785
786			BPF_EXIT_INSN(),
787		},
788		.attach_type = BPF_CGROUP_SETSOCKOPT,
789		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
790
791		.get_level = SOL_IP,
792		.set_level = SOL_IP,
793
794		.get_optname = IP_TOS,
795		.set_optname = IP_TOS,
796
797		.set_optval = { 0x80 },
798		.set_optlen = 1,
799		.get_optval = { 0x80 },
800		.get_optlen = 1,
801	},
802	{
803		.descr = "setsockopt: deny IP_TOS > 128",
804		.insns = {
805			/* r6 = ctx->optval */
806			BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1,
807				    offsetof(struct bpf_sockopt, optval)),
808			/* r7 = ctx->optval + 1 */
809			BPF_MOV64_REG(BPF_REG_7, BPF_REG_6),
810			BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, 1),
811
812			/* r8 = ctx->optval_end */
813			BPF_LDX_MEM(BPF_DW, BPF_REG_8, BPF_REG_1,
814				    offsetof(struct bpf_sockopt, optval_end)),
815
816			/* if (ctx->optval + 1 <= ctx->optval_end) { */
817			BPF_JMP_REG(BPF_JGT, BPF_REG_7, BPF_REG_8, 4),
818
819			/* r9 = ctx->optval[0] */
820			BPF_LDX_MEM(BPF_B, BPF_REG_9, BPF_REG_6, 0),
821
822			/* if (ctx->optval[0] < 128) */
823			BPF_JMP_IMM(BPF_JGT, BPF_REG_9, 128, 2),
824			BPF_MOV64_IMM(BPF_REG_0, 1),
825			BPF_JMP_A(1),
826			/* } */
827
828			/* } else { */
829			BPF_MOV64_IMM(BPF_REG_0, 0),
830			/* } */
831
832			BPF_EXIT_INSN(),
833		},
834		.attach_type = BPF_CGROUP_SETSOCKOPT,
835		.expected_attach_type = BPF_CGROUP_SETSOCKOPT,
836
837		.get_level = SOL_IP,
838		.set_level = SOL_IP,
839
840		.get_optname = IP_TOS,
841		.set_optname = IP_TOS,
842
843		.set_optval = { 0x81 },
844		.set_optlen = 1,
845		.get_optval = { 0x00 },
846		.get_optlen = 1,
847
848		.error = EPERM_SETSOCKOPT,
849	},
850};
851
852static int load_prog(const struct bpf_insn *insns,
853		     enum bpf_attach_type expected_attach_type)
854{
855	LIBBPF_OPTS(bpf_prog_load_opts, opts,
856		.expected_attach_type = expected_attach_type,
857		.log_level = 2,
858		.log_buf = bpf_log_buf,
859		.log_size = sizeof(bpf_log_buf),
860	);
861	int fd, insns_cnt = 0;
862
863	for (;
864	     insns[insns_cnt].code != (BPF_JMP | BPF_EXIT);
865	     insns_cnt++) {
866	}
867	insns_cnt++;
868
869	fd = bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCKOPT, NULL, "GPL", insns, insns_cnt, &opts);
870	if (verbose && fd < 0)
871		fprintf(stderr, "%s\n", bpf_log_buf);
872
873	return fd;
874}
875
876static int run_test(int cgroup_fd, struct sockopt_test *test)
877{
878	int sock_fd, err, prog_fd;
879	void *optval = NULL;
880	int ret = 0;
881
882	prog_fd = load_prog(test->insns, test->expected_attach_type);
883	if (prog_fd < 0) {
884		if (test->error == DENY_LOAD)
885			return 0;
886
887		log_err("Failed to load BPF program");
888		return -1;
889	}
890
891	err = bpf_prog_attach(prog_fd, cgroup_fd, test->attach_type, 0);
892	if (err < 0) {
893		if (test->error == DENY_ATTACH)
894			goto close_prog_fd;
895
896		log_err("Failed to attach BPF program");
897		ret = -1;
898		goto close_prog_fd;
899	}
900
901	sock_fd = socket(AF_INET, SOCK_STREAM, 0);
902	if (sock_fd < 0) {
903		log_err("Failed to create AF_INET socket");
904		ret = -1;
905		goto detach_prog;
906	}
907
908	if (test->set_optlen) {
909		err = setsockopt(sock_fd, test->set_level, test->set_optname,
910				 test->set_optval, test->set_optlen);
911		if (err) {
912			if (errno == EPERM && test->error == EPERM_SETSOCKOPT)
913				goto close_sock_fd;
914			if (errno == EFAULT && test->error == EFAULT_SETSOCKOPT)
915				goto free_optval;
916
917			log_err("Failed to call setsockopt");
918			ret = -1;
919			goto close_sock_fd;
920		}
921	}
922
923	if (test->get_optlen) {
924		optval = malloc(test->get_optlen);
925		socklen_t optlen = test->get_optlen;
926		socklen_t expected_get_optlen = test->get_optlen_ret ?:
927			test->get_optlen;
928
929		err = getsockopt(sock_fd, test->get_level, test->get_optname,
930				 optval, &optlen);
931		if (err) {
932			if (errno == EPERM && test->error == EPERM_GETSOCKOPT)
933				goto free_optval;
934			if (errno == EFAULT && test->error == EFAULT_GETSOCKOPT)
935				goto free_optval;
936
937			log_err("Failed to call getsockopt");
938			ret = -1;
939			goto free_optval;
940		}
941
942		if (optlen != expected_get_optlen) {
943			errno = 0;
944			log_err("getsockopt returned unexpected optlen");
945			ret = -1;
946			goto free_optval;
947		}
948
949		if (memcmp(optval, test->get_optval, optlen) != 0) {
950			errno = 0;
951			log_err("getsockopt returned unexpected optval");
952			ret = -1;
953			goto free_optval;
954		}
955	}
956
957	ret = test->error != OK;
958
959free_optval:
960	free(optval);
961close_sock_fd:
962	close(sock_fd);
963detach_prog:
964	bpf_prog_detach2(prog_fd, cgroup_fd, test->attach_type);
965close_prog_fd:
966	close(prog_fd);
967	return ret;
968}
969
970void test_sockopt(void)
971{
972	int cgroup_fd, i;
973
974	cgroup_fd = test__join_cgroup("/sockopt");
975	if (!ASSERT_GE(cgroup_fd, 0, "join_cgroup"))
976		return;
977
978	for (i = 0; i < ARRAY_SIZE(tests); i++) {
979		test__start_subtest(tests[i].descr);
980		ASSERT_OK(run_test(cgroup_fd, &tests[i]), tests[i].descr);
981	}
982
983	close(cgroup_fd);
984}