mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-21 15:00:42 +07:00
04b6ab7312
Add selftest for BPF_CGROUP_UDP4_SENDMSG and BPF_CGROUP_UDP6_SENDMSG attach types. Try to sendmsg(2) to specific IP:port and test that: * source IP is overridden as expected. * remote IP:port pair is overridden as expected; Both UDPv4 and UDPv6 are tested. Output: # test_sock_addr.sh 2>/dev/null Wait for testing IPv4/IPv6 to become available ... OK ... pre-existing test-cases skipped ... Test case: sendmsg4: load prog with wrong expected attach type .. [PASS] Test case: sendmsg4: attach prog with wrong attach type .. [PASS] Test case: sendmsg4: rewrite IP & port (asm) .. [PASS] Test case: sendmsg4: rewrite IP & port (C) .. [PASS] Test case: sendmsg4: deny call .. [PASS] Test case: sendmsg6: load prog with wrong expected attach type .. [PASS] Test case: sendmsg6: attach prog with wrong attach type .. [PASS] Test case: sendmsg6: rewrite IP & port (asm) .. [PASS] Test case: sendmsg6: rewrite IP & port (C) .. [PASS] Test case: sendmsg6: IPv4-mapped IPv6 .. [PASS] Test case: sendmsg6: deny call .. [PASS] Summary: 27 PASSED, 0 FAILED Signed-off-by: Andrey Ignatov <rdna@fb.com> Acked-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Martin KaFai Lau <kafai@fb.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
61 lines
1.5 KiB
C
61 lines
1.5 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
// Copyright (c) 2018 Facebook
|
|
|
|
#include <linux/stddef.h>
|
|
#include <linux/bpf.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include "bpf_helpers.h"
|
|
#include "bpf_endian.h"
|
|
|
|
#define SRC_REWRITE_IP6_0 0
|
|
#define SRC_REWRITE_IP6_1 0
|
|
#define SRC_REWRITE_IP6_2 0
|
|
#define SRC_REWRITE_IP6_3 6
|
|
|
|
#define DST_REWRITE_IP6_0 0
|
|
#define DST_REWRITE_IP6_1 0
|
|
#define DST_REWRITE_IP6_2 0
|
|
#define DST_REWRITE_IP6_3 1
|
|
|
|
#define DST_REWRITE_PORT6 6666
|
|
|
|
int _version SEC("version") = 1;
|
|
|
|
SEC("cgroup/sendmsg6")
|
|
int sendmsg_v6_prog(struct bpf_sock_addr *ctx)
|
|
{
|
|
if (ctx->type != SOCK_DGRAM)
|
|
return 0;
|
|
|
|
/* Rewrite source. */
|
|
if (ctx->msg_src_ip6[3] == bpf_htonl(1) ||
|
|
ctx->msg_src_ip6[3] == bpf_htonl(0)) {
|
|
ctx->msg_src_ip6[0] = bpf_htonl(SRC_REWRITE_IP6_0);
|
|
ctx->msg_src_ip6[1] = bpf_htonl(SRC_REWRITE_IP6_1);
|
|
ctx->msg_src_ip6[2] = bpf_htonl(SRC_REWRITE_IP6_2);
|
|
ctx->msg_src_ip6[3] = bpf_htonl(SRC_REWRITE_IP6_3);
|
|
} else {
|
|
/* Unexpected source. Reject sendmsg. */
|
|
return 0;
|
|
}
|
|
|
|
/* Rewrite destination. */
|
|
if ((ctx->user_ip6[0] & 0xFFFF) == bpf_htons(0xFACE) &&
|
|
ctx->user_ip6[0] >> 16 == bpf_htons(0xB00C)) {
|
|
ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0);
|
|
ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1);
|
|
ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2);
|
|
ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3);
|
|
|
|
ctx->user_port = bpf_htons(DST_REWRITE_PORT6);
|
|
} else {
|
|
/* Unexpected destination. Reject sendmsg. */
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|