bpf, testing: Add get{peer, sock}name selftests to test_progs
Extend the existing connect_force_port test to assert get{peer,sock}name programs as well. The workflow for e.g. IPv4 is as follows: i) server binds to concrete port, ii) client calls getsockname() on server fd which exposes 1.2.3.4:60000 to client, iii) client connects to service address 1.2.3.4:60000 binds to concrete local address (127.0.0.1:22222) and remaps service address to a concrete backend address (127.0.0.1:60123), iv) client then calls getsockname() on its own fd to verify local address (127.0.0.1:22222) and getpeername() on its own fd which then publishes service address (1.2.3.4:60000) instead of actual backend. Same workflow is done for IPv6 just with different address/port tuples. # ./test_progs -t connect_force_port #14 connect_force_port:OK Summary: 1/0 PASSED, 0 SKIPPED, 0 FAILED Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Andrii Nakryiko <andriin@fb.com> Acked-by: Andrey Ignatov <rdna@fb.com> Link: https://lore.kernel.org/bpf/3343da6ad08df81af715a95d61a84fb4a960f2bf.1589841594.git.daniel@iogearbox.net
This commit is contained in:

committed by
Alexei Starovoitov

parent
05ee19c18c
commit
566fc3f5d1
@@ -4,7 +4,8 @@
|
||||
#include "cgroup_helpers.h"
|
||||
#include "network_helpers.h"
|
||||
|
||||
static int verify_port(int family, int fd, int expected)
|
||||
static int verify_ports(int family, int fd,
|
||||
__u16 expected_local, __u16 expected_peer)
|
||||
{
|
||||
struct sockaddr_storage addr;
|
||||
socklen_t len = sizeof(addr);
|
||||
@@ -20,9 +21,25 @@ static int verify_port(int family, int fd, int expected)
|
||||
else
|
||||
port = ((struct sockaddr_in6 *)&addr)->sin6_port;
|
||||
|
||||
if (ntohs(port) != expected) {
|
||||
log_err("Unexpected port %d, expected %d", ntohs(port),
|
||||
expected);
|
||||
if (ntohs(port) != expected_local) {
|
||||
log_err("Unexpected local port %d, expected %d", ntohs(port),
|
||||
expected_local);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (getpeername(fd, (struct sockaddr *)&addr, &len)) {
|
||||
log_err("Failed to get peer addr");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (family == AF_INET)
|
||||
port = ((struct sockaddr_in *)&addr)->sin_port;
|
||||
else
|
||||
port = ((struct sockaddr_in6 *)&addr)->sin6_port;
|
||||
|
||||
if (ntohs(port) != expected_peer) {
|
||||
log_err("Unexpected peer port %d, expected %d", ntohs(port),
|
||||
expected_peer);
|
||||
return -1;
|
||||
}
|
||||
|
||||
@@ -31,33 +48,67 @@ static int verify_port(int family, int fd, int expected)
|
||||
|
||||
static int run_test(int cgroup_fd, int server_fd, int family, int type)
|
||||
{
|
||||
bool v4 = family == AF_INET;
|
||||
__u16 expected_local_port = v4 ? 22222 : 22223;
|
||||
__u16 expected_peer_port = 60000;
|
||||
struct bpf_prog_load_attr attr = {
|
||||
.prog_type = BPF_PROG_TYPE_CGROUP_SOCK_ADDR,
|
||||
.file = v4 ? "./connect_force_port4.o" :
|
||||
"./connect_force_port6.o",
|
||||
};
|
||||
struct bpf_program *prog;
|
||||
struct bpf_object *obj;
|
||||
int expected_port;
|
||||
int prog_fd;
|
||||
int err;
|
||||
int fd;
|
||||
int xlate_fd, fd, err;
|
||||
__u32 duration = 0;
|
||||
|
||||
if (family == AF_INET) {
|
||||
attr.file = "./connect_force_port4.o";
|
||||
attr.expected_attach_type = BPF_CGROUP_INET4_CONNECT;
|
||||
expected_port = 22222;
|
||||
} else {
|
||||
attr.file = "./connect_force_port6.o";
|
||||
attr.expected_attach_type = BPF_CGROUP_INET6_CONNECT;
|
||||
expected_port = 22223;
|
||||
}
|
||||
|
||||
err = bpf_prog_load_xattr(&attr, &obj, &prog_fd);
|
||||
err = bpf_prog_load_xattr(&attr, &obj, &xlate_fd);
|
||||
if (err) {
|
||||
log_err("Failed to load BPF object");
|
||||
return -1;
|
||||
}
|
||||
|
||||
err = bpf_prog_attach(prog_fd, cgroup_fd, attr.expected_attach_type,
|
||||
0);
|
||||
prog = bpf_object__find_program_by_title(obj, v4 ?
|
||||
"cgroup/connect4" :
|
||||
"cgroup/connect6");
|
||||
if (CHECK(!prog, "find_prog", "connect prog not found\n")) {
|
||||
err = -EIO;
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
||||
BPF_CGROUP_INET4_CONNECT :
|
||||
BPF_CGROUP_INET6_CONNECT, 0);
|
||||
if (err) {
|
||||
log_err("Failed to attach BPF program");
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
prog = bpf_object__find_program_by_title(obj, v4 ?
|
||||
"cgroup/getpeername4" :
|
||||
"cgroup/getpeername6");
|
||||
if (CHECK(!prog, "find_prog", "getpeername prog not found\n")) {
|
||||
err = -EIO;
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
||||
BPF_CGROUP_INET4_GETPEERNAME :
|
||||
BPF_CGROUP_INET6_GETPEERNAME, 0);
|
||||
if (err) {
|
||||
log_err("Failed to attach BPF program");
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
prog = bpf_object__find_program_by_title(obj, v4 ?
|
||||
"cgroup/getsockname4" :
|
||||
"cgroup/getsockname6");
|
||||
if (CHECK(!prog, "find_prog", "getsockname prog not found\n")) {
|
||||
err = -EIO;
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
||||
BPF_CGROUP_INET4_GETSOCKNAME :
|
||||
BPF_CGROUP_INET6_GETSOCKNAME, 0);
|
||||
if (err) {
|
||||
log_err("Failed to attach BPF program");
|
||||
goto close_bpf_object;
|
||||
@@ -69,8 +120,8 @@ static int run_test(int cgroup_fd, int server_fd, int family, int type)
|
||||
goto close_bpf_object;
|
||||
}
|
||||
|
||||
err = verify_port(family, fd, expected_port);
|
||||
|
||||
err = verify_ports(family, fd, expected_local_port,
|
||||
expected_peer_port);
|
||||
close(fd);
|
||||
|
||||
close_bpf_object:
|
||||
@@ -86,25 +137,25 @@ void test_connect_force_port(void)
|
||||
if (CHECK_FAIL(cgroup_fd < 0))
|
||||
return;
|
||||
|
||||
server_fd = start_server(AF_INET, SOCK_STREAM);
|
||||
server_fd = start_server_with_port(AF_INET, SOCK_STREAM, 60123);
|
||||
if (CHECK_FAIL(server_fd < 0))
|
||||
goto close_cgroup_fd;
|
||||
CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET, SOCK_STREAM));
|
||||
close(server_fd);
|
||||
|
||||
server_fd = start_server(AF_INET6, SOCK_STREAM);
|
||||
server_fd = start_server_with_port(AF_INET6, SOCK_STREAM, 60124);
|
||||
if (CHECK_FAIL(server_fd < 0))
|
||||
goto close_cgroup_fd;
|
||||
CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET6, SOCK_STREAM));
|
||||
close(server_fd);
|
||||
|
||||
server_fd = start_server(AF_INET, SOCK_DGRAM);
|
||||
server_fd = start_server_with_port(AF_INET, SOCK_DGRAM, 60123);
|
||||
if (CHECK_FAIL(server_fd < 0))
|
||||
goto close_cgroup_fd;
|
||||
CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET, SOCK_DGRAM));
|
||||
close(server_fd);
|
||||
|
||||
server_fd = start_server(AF_INET6, SOCK_DGRAM);
|
||||
server_fd = start_server_with_port(AF_INET6, SOCK_DGRAM, 60124);
|
||||
if (CHECK_FAIL(server_fd < 0))
|
||||
goto close_cgroup_fd;
|
||||
CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET6, SOCK_DGRAM));
|
||||
|
Reference in New Issue
Block a user