[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <345fbce9b67e4f287a771c497e8bd1bccff50b58.1662058674.git.zhuyifei@google.com>
Date: Thu, 1 Sep 2022 19:15:10 +0000
From: YiFei Zhu <zhuyifei@...gle.com>
To: bpf@...r.kernel.org
Cc: netdev@...r.kernel.org, Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
Stanislav Fomichev <sdf@...gle.com>,
Martin KaFai Lau <martin.lau@...ux.dev>,
John Fastabend <john.fastabend@...il.com>,
Jiri Olsa <jolsa@...nel.org>,
"David S. Miller" <davem@...emloft.net>,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
David Ahern <dsahern@...nel.org>,
Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>,
Paolo Abeni <pabeni@...hat.com>
Subject: [PATCH bpf-next 2/2] selftests/bpf: Ensure cgroup/connect{4,6}
programs can bind unpriv ICMP ping
This tests that when an unprivileged ICMP ping socket connects,
the hooks are actually invoked. We also ensure that if the hook does
not call bpf_bind(), the bound address is unmodified, and if the
hook calls bpf_bind(), the bound address is exactly what we provided
to the helper.
A new netns is used to enable ping_group_range in the test without
affecting ouside of the test, because by default, not even root is
permitted to use unprivileged ICMP ping...
Signed-off-by: YiFei Zhu <zhuyifei@...gle.com>
---
.../selftests/bpf/prog_tests/connect_ping.c | 318 ++++++++++++++++++
.../selftests/bpf/progs/connect_ping.c | 53 +++
2 files changed, 371 insertions(+)
create mode 100644 tools/testing/selftests/bpf/prog_tests/connect_ping.c
create mode 100644 tools/testing/selftests/bpf/progs/connect_ping.c
diff --git a/tools/testing/selftests/bpf/prog_tests/connect_ping.c b/tools/testing/selftests/bpf/prog_tests/connect_ping.c
new file mode 100644
index 0000000000000..99b1a2f0c4921
--- /dev/null
+++ b/tools/testing/selftests/bpf/prog_tests/connect_ping.c
@@ -0,0 +1,318 @@
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2022 Google LLC.
+ */
+
+#define _GNU_SOURCE
+#include <sys/mount.h>
+
+#include <test_progs.h>
+#include <cgroup_helpers.h>
+#include <network_helpers.h>
+
+#include "connect_ping.skel.h"
+
+/* 2001:db8::1 */
+#define BINDADDR_V6 { { { 0x20,0x01,0x0d,0xb8,0,0,0,0,0,0,0,0,0,0,0,1 } } }
+const struct in6_addr bindaddr_v6 = BINDADDR_V6;
+
+static bool write_sysctl(const char *sysctl, const char *value)
+{
+ int fd, err, len;
+
+ fd = open(sysctl, O_WRONLY);
+ if (!ASSERT_GE(fd, 0, "open-sysctl"))
+ return false;
+
+ len = strlen(value);
+ err = write(fd, value, len);
+ close(fd);
+ if (!ASSERT_EQ(err, len, "write-sysctl"))
+ return false;
+
+ return true;
+}
+
+static void test_ipv4(int cgroup_fd)
+{
+ struct sockaddr_in sa = {
+ .sin_family = AF_INET,
+ .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
+ };
+ socklen_t sa_len = sizeof(sa);
+ struct connect_ping *obj;
+ int sock_fd;
+
+ sock_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP);
+ if (!ASSERT_GE(sock_fd, 0, "sock-create"))
+ return;
+
+ obj = connect_ping__open_and_load();
+ if (!ASSERT_OK_PTR(obj, "skel-load"))
+ goto close_sock;
+
+ obj->bss->do_bind = 0;
+
+ /* Attach connect v4 and connect v6 progs, connect a v4 ping socket to
+ * localhost, assert that only v4 is called, and called exactly once,
+ * and that the socket's bound address is original loopback address.
+ */
+ obj->links.connect_v4_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v4_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v4_prog, "cg-attach-v4"))
+ goto close_bpf_object;
+ obj->links.connect_v6_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v6_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v6_prog, "cg-attach-v6"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(connect(sock_fd, (struct sockaddr *)&sa, sa_len),
+ "connect"))
+ goto close_bpf_object;
+
+ if (!ASSERT_EQ(obj->bss->invocations_v4, 1, "invocations_v4"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->invocations_v6, 0, "invocations_v6"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->has_error, 0, "has_error"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(getsockname(sock_fd, (struct sockaddr *)&sa, &sa_len),
+ "getsockname"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin_family, AF_INET, "sin_family"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin_addr.s_addr, htonl(INADDR_LOOPBACK), "sin_addr"))
+ goto close_bpf_object;
+
+close_bpf_object:
+ connect_ping__destroy(obj);
+close_sock:
+ close(sock_fd);
+}
+
+static void test_ipv4_bind(int cgroup_fd)
+{
+ struct sockaddr_in sa = {
+ .sin_family = AF_INET,
+ .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
+ };
+ socklen_t sa_len = sizeof(sa);
+ struct connect_ping *obj;
+ int sock_fd;
+
+ sock_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP);
+ if (!ASSERT_GE(sock_fd, 0, "sock-create"))
+ return;
+
+ obj = connect_ping__open_and_load();
+ if (!ASSERT_OK_PTR(obj, "skel-load"))
+ goto close_sock;
+
+ obj->bss->do_bind = 1;
+
+ /* Attach connect v4 and connect v6 progs, connect a v4 ping socket to
+ * localhost, assert that only v4 is called, and called exactly once,
+ * and that the socket's bound address is address we explicitly bound.
+ */
+ obj->links.connect_v4_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v4_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v4_prog, "cg-attach-v4"))
+ goto close_bpf_object;
+ obj->links.connect_v6_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v6_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v6_prog, "cg-attach-v6"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(connect(sock_fd, (struct sockaddr *)&sa, sa_len),
+ "connect"))
+ goto close_bpf_object;
+
+ if (!ASSERT_EQ(obj->bss->invocations_v4, 1, "invocations_v4"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->invocations_v6, 0, "invocations_v6"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->has_error, 0, "has_error"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(getsockname(sock_fd, (struct sockaddr *)&sa, &sa_len),
+ "getsockname"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin_family, AF_INET, "sin_family"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin_addr.s_addr, htonl(0x01010101), "sin_addr"))
+ goto close_bpf_object;
+
+close_bpf_object:
+ connect_ping__destroy(obj);
+close_sock:
+ close(sock_fd);
+}
+
+static void test_ipv6(int cgroup_fd)
+{
+ struct sockaddr_in6 sa = {
+ .sin6_family = AF_INET6,
+ .sin6_addr = IN6ADDR_LOOPBACK_INIT,
+ };
+ socklen_t sa_len = sizeof(sa);
+ struct connect_ping *obj;
+ int sock_fd;
+
+ sock_fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);
+ if (!ASSERT_GE(sock_fd, 0, "sock-create"))
+ return;
+
+ obj = connect_ping__open_and_load();
+ if (!ASSERT_OK_PTR(obj, "skel-load"))
+ goto close_sock;
+
+ obj->bss->do_bind = 0;
+
+ /* Attach connect v4 and connect v6 progs, connect a v6 ping socket to
+ * localhost, assert that only v6 is called, and called exactly once,
+ * and that the socket's bound address is original loopback address.
+ */
+ obj->links.connect_v4_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v4_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v4_prog, "cg-attach-v4"))
+ goto close_bpf_object;
+ obj->links.connect_v6_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v6_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v6_prog, "cg-attach-v6"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(connect(sock_fd, (struct sockaddr *)&sa, sa_len),
+ "connect"))
+ goto close_bpf_object;
+
+ if (!ASSERT_EQ(obj->bss->invocations_v4, 0, "invocations_v4"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->invocations_v6, 1, "invocations_v6"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->has_error, 0, "has_error"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(getsockname(sock_fd, (struct sockaddr *)&sa, &sa_len),
+ "getsockname"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin6_family, AF_INET6, "sin6_family"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(memcmp(&sa.sin6_addr, &in6addr_loopback, sizeof(in6addr_loopback)),
+ 0, "sin_addr"))
+ goto close_bpf_object;
+
+close_bpf_object:
+ connect_ping__destroy(obj);
+close_sock:
+ close(sock_fd);
+}
+
+static void test_ipv6_bind(int cgroup_fd)
+{
+ struct sockaddr_in6 sa = {
+ .sin6_family = AF_INET6,
+ .sin6_addr = IN6ADDR_LOOPBACK_INIT,
+ };
+ socklen_t sa_len = sizeof(sa);
+ struct connect_ping *obj;
+ int sock_fd;
+
+ sock_fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);
+ if (!ASSERT_GE(sock_fd, 0, "sock-create"))
+ return;
+
+ obj = connect_ping__open_and_load();
+ if (!ASSERT_OK_PTR(obj, "skel-load"))
+ goto close_sock;
+
+ obj->bss->do_bind = 1;
+
+ /* Attach connect v4 and connect v6 progs, connect a v6 ping socket to
+ * localhost, assert that only v6 is called, and called exactly once,
+ * and that the socket's bound address is address we explicitly bound.
+ */
+ obj->links.connect_v4_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v4_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v4_prog, "cg-attach-v4"))
+ goto close_bpf_object;
+ obj->links.connect_v6_prog =
+ bpf_program__attach_cgroup(obj->progs.connect_v6_prog, cgroup_fd);
+ if (!ASSERT_OK_PTR(obj->links.connect_v6_prog, "cg-attach-v6"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(connect(sock_fd, (struct sockaddr *)&sa, sa_len),
+ "connect"))
+ goto close_bpf_object;
+
+ if (!ASSERT_EQ(obj->bss->invocations_v4, 0, "invocations_v4"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->invocations_v6, 1, "invocations_v6"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(obj->bss->has_error, 0, "has_error"))
+ goto close_bpf_object;
+
+ if (!ASSERT_OK(getsockname(sock_fd, (struct sockaddr *)&sa, &sa_len),
+ "getsockname"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(sa.sin6_family, AF_INET6, "sin6_family"))
+ goto close_bpf_object;
+ if (!ASSERT_EQ(memcmp(&sa.sin6_addr, &bindaddr_v6, sizeof(bindaddr_v6)),
+ 0, "sin_addr"))
+ goto close_bpf_object;
+
+close_bpf_object:
+ connect_ping__destroy(obj);
+close_sock:
+ close(sock_fd);
+}
+
+void test_connect_ping(void)
+{
+ int cgroup_fd;
+
+ if (!ASSERT_OK(unshare(CLONE_NEWNET | CLONE_NEWNS), "unshare"))
+ return;
+
+ /* overmount sysfs, and making original sysfs private so overmount
+ * does not propagate to other mntns.
+ */
+ if (!ASSERT_OK(mount("none", "/sys", NULL, MS_PRIVATE, NULL),
+ "remount-private-sys"))
+ return;
+ if (!ASSERT_OK(mount("sysfs", "/sys", "sysfs", 0, NULL),
+ "mount-sys"))
+ return;
+ if (!ASSERT_OK(mount("bpffs", "/sys/fs/bpf", "bpf", 0, NULL),
+ "mount-bpf"))
+ goto clean_mount;
+
+ if (!ASSERT_OK(system("ip link set dev lo up"), "lo-up"))
+ goto clean_mount;
+ if (!ASSERT_OK(system("ip addr add 1.1.1.1 dev lo"), "lo-addr-v4"))
+ goto clean_mount;
+ if (!ASSERT_OK(system("ip -6 addr add 2001:db8::1 dev lo"), "lo-addr-v6"))
+ goto clean_mount;
+ if (!write_sysctl("/proc/sys/net/ipv4/ping_group_range", "0 0"))
+ goto clean_mount;
+
+ cgroup_fd = test__join_cgroup("/connect_ping");
+ if (!ASSERT_GE(cgroup_fd, 0, "cg-create"))
+ goto clean_mount;
+
+ if (test__start_subtest("ipv4"))
+ test_ipv4(cgroup_fd);
+ if (test__start_subtest("ipv4-bind"))
+ test_ipv4_bind(cgroup_fd);
+
+ if (test__start_subtest("ipv6"))
+ test_ipv6(cgroup_fd);
+ if (test__start_subtest("ipv6-bind"))
+ test_ipv6_bind(cgroup_fd);
+
+ close(cgroup_fd);
+
+clean_mount:
+ umount2("/sys", MNT_DETACH);
+}
diff --git a/tools/testing/selftests/bpf/progs/connect_ping.c b/tools/testing/selftests/bpf/progs/connect_ping.c
new file mode 100644
index 0000000000000..60178192b672f
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/connect_ping.c
@@ -0,0 +1,53 @@
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2022 Google LLC.
+ */
+
+#include <linux/bpf.h>
+#include <bpf/bpf_helpers.h>
+#include <bpf/bpf_endian.h>
+#include <netinet/in.h>
+#include <sys/socket.h>
+
+/* 2001:db8::1 */
+#define BINDADDR_V6 { { { 0x20,0x01,0x0d,0xb8,0,0,0,0,0,0,0,0,0,0,0,1 } } }
+
+__u32 do_bind = 0;
+__u32 has_error = 0;
+__u32 invocations_v4 = 0;
+__u32 invocations_v6 = 0;
+
+SEC("cgroup/connect4")
+int connect_v4_prog(struct bpf_sock_addr *ctx)
+{
+ struct sockaddr_in sa = {
+ .sin_family = AF_INET,
+ .sin_addr.s_addr = bpf_htonl(0x01010101),
+ };
+
+ __sync_fetch_and_add(&invocations_v4, 1);
+
+ if (do_bind && bpf_bind(ctx, (struct sockaddr *)&sa, sizeof(sa)))
+ has_error = 1;
+
+ return 1;
+}
+
+SEC("cgroup/connect6")
+int connect_v6_prog(struct bpf_sock_addr *ctx)
+{
+ struct sockaddr_in6 sa = {
+ .sin6_family = AF_INET6,
+ .sin6_addr = BINDADDR_V6,
+ };
+
+ __sync_fetch_and_add(&invocations_v6, 1);
+
+ if (do_bind && bpf_bind(ctx, (struct sockaddr *)&sa, sizeof(sa)))
+ has_error = 1;
+
+ return 1;
+}
+
+char _license[] SEC("license") = "GPL";
--
2.37.2.789.g6183377224-goog
Powered by blists - more mailing lists