~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/bpf/prog_tests/vrf_socket_lookup.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
  2 
  3 /*
  4  * Topology:
  5  * ---------
  6  *     NS0 namespace         |   NS1 namespace
  7  *                           |
  8  *     +--------------+      |   +--------------+
  9  *     |    veth01    |----------|    veth10    |
 10  *     | 172.16.1.100 |      |   | 172.16.1.200 |
 11  *     |     bpf      |      |   +--------------+
 12  *     +--------------+      |
 13  *      server(UDP/TCP)      |
 14  *  +-------------------+    |
 15  *  |        vrf1       |    |
 16  *  |  +--------------+ |    |   +--------------+
 17  *  |  |    veth02    |----------|    veth20    |
 18  *  |  | 172.16.2.100 | |    |   | 172.16.2.200 |
 19  *  |  |     bpf      | |    |   +--------------+
 20  *  |  +--------------+ |    |
 21  *  |   server(UDP/TCP) |    |
 22  *  +-------------------+    |
 23  *
 24  * Test flow
 25  * -----------
 26  *  The tests verifies that socket lookup via TC is VRF aware:
 27  *  1) Creates two veth pairs between NS0 and NS1:
 28  *     a) veth01 <-> veth10 outside the VRF
 29  *     b) veth02 <-> veth20 in the VRF
 30  *  2) Attaches to veth01 and veth02 a program that calls:
 31  *     a) bpf_skc_lookup_tcp() with TCP and tcp_skc is true
 32  *     b) bpf_sk_lookup_tcp() with TCP and tcp_skc is false
 33  *     c) bpf_sk_lookup_udp() with UDP
 34  *     The program stores the lookup result in bss->lookup_status.
 35  *  3) Creates a socket TCP/UDP server in/outside the VRF.
 36  *  4) The test expects lookup_status to be:
 37  *     a) 0 from device in VRF to server outside VRF
 38  *     b) 0 from device outside VRF to server in VRF
 39  *     c) 1 from device in VRF to server in VRF
 40  *     d) 1 from device outside VRF to server outside VRF
 41  */
 42 
 43 #include <net/if.h>
 44 
 45 #include "test_progs.h"
 46 #include "network_helpers.h"
 47 #include "vrf_socket_lookup.skel.h"
 48 
 49 #define NS0 "vrf_socket_lookup_0"
 50 #define NS1 "vrf_socket_lookup_1"
 51 
 52 #define IP4_ADDR_VETH01 "172.16.1.100"
 53 #define IP4_ADDR_VETH10 "172.16.1.200"
 54 #define IP4_ADDR_VETH02 "172.16.2.100"
 55 #define IP4_ADDR_VETH20 "172.16.2.200"
 56 
 57 #define NON_VRF_PORT 5000
 58 #define IN_VRF_PORT 5001
 59 
 60 #define TIMEOUT_MS 3000
 61 
 62 static int make_socket(int sotype, const char *ip, int port,
 63                        struct sockaddr_storage *addr)
 64 {
 65         int err, fd;
 66 
 67         err = make_sockaddr(AF_INET, ip, port, addr, NULL);
 68         if (!ASSERT_OK(err, "make_address"))
 69                 return -1;
 70 
 71         fd = socket(AF_INET, sotype, 0);
 72         if (!ASSERT_GE(fd, 0, "socket"))
 73                 return -1;
 74 
 75         if (!ASSERT_OK(settimeo(fd, TIMEOUT_MS), "settimeo"))
 76                 goto fail;
 77 
 78         return fd;
 79 fail:
 80         close(fd);
 81         return -1;
 82 }
 83 
 84 static int make_server(int sotype, const char *ip, int port, const char *ifname)
 85 {
 86         int err, fd = -1;
 87 
 88         fd = start_server(AF_INET, sotype, ip, port, TIMEOUT_MS);
 89         if (!ASSERT_GE(fd, 0, "start_server"))
 90                 return -1;
 91 
 92         if (ifname) {
 93                 err = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE,
 94                                  ifname, strlen(ifname) + 1);
 95                 if (!ASSERT_OK(err, "setsockopt(SO_BINDTODEVICE)"))
 96                         goto fail;
 97         }
 98 
 99         return fd;
100 fail:
101         close(fd);
102         return -1;
103 }
104 
105 static int attach_progs(char *ifname, int tc_prog_fd, int xdp_prog_fd)
106 {
107         LIBBPF_OPTS(bpf_tc_hook, hook, .attach_point = BPF_TC_INGRESS);
108         LIBBPF_OPTS(bpf_tc_opts, opts, .handle = 1, .priority = 1,
109                     .prog_fd = tc_prog_fd);
110         int ret, ifindex;
111 
112         ifindex = if_nametoindex(ifname);
113         if (!ASSERT_NEQ(ifindex, 0, "if_nametoindex"))
114                 return -1;
115         hook.ifindex = ifindex;
116 
117         ret = bpf_tc_hook_create(&hook);
118         if (!ASSERT_OK(ret, "bpf_tc_hook_create"))
119                 return ret;
120 
121         ret = bpf_tc_attach(&hook, &opts);
122         if (!ASSERT_OK(ret, "bpf_tc_attach")) {
123                 bpf_tc_hook_destroy(&hook);
124                 return ret;
125         }
126         ret = bpf_xdp_attach(ifindex, xdp_prog_fd, 0, NULL);
127         if (!ASSERT_OK(ret, "bpf_xdp_attach")) {
128                 bpf_tc_hook_destroy(&hook);
129                 return ret;
130         }
131 
132         return 0;
133 }
134 
135 static void cleanup(void)
136 {
137         SYS_NOFAIL("test -f /var/run/netns/" NS0 " && ip netns delete "
138                    NS0);
139         SYS_NOFAIL("test -f /var/run/netns/" NS1 " && ip netns delete "
140                    NS1);
141 }
142 
143 static int setup(struct vrf_socket_lookup *skel)
144 {
145         int tc_prog_fd, xdp_prog_fd, ret = 0;
146         struct nstoken *nstoken = NULL;
147 
148         SYS(fail, "ip netns add " NS0);
149         SYS(fail, "ip netns add " NS1);
150 
151         /* NS0 <-> NS1 [veth01 <-> veth10] */
152         SYS(fail, "ip link add veth01 netns " NS0 " type veth peer name veth10"
153             " netns " NS1);
154         SYS(fail, "ip -net " NS0 " addr add " IP4_ADDR_VETH01 "/24 dev veth01");
155         SYS(fail, "ip -net " NS0 " link set dev veth01 up");
156         SYS(fail, "ip -net " NS1 " addr add " IP4_ADDR_VETH10 "/24 dev veth10");
157         SYS(fail, "ip -net " NS1 " link set dev veth10 up");
158 
159         /* NS0 <-> NS1 [veth02 <-> veth20] */
160         SYS(fail, "ip link add veth02 netns " NS0 " type veth peer name veth20"
161             " netns " NS1);
162         SYS(fail, "ip -net " NS0 " addr add " IP4_ADDR_VETH02 "/24 dev veth02");
163         SYS(fail, "ip -net " NS0 " link set dev veth02 up");
164         SYS(fail, "ip -net " NS1 " addr add " IP4_ADDR_VETH20 "/24 dev veth20");
165         SYS(fail, "ip -net " NS1 " link set dev veth20 up");
166 
167         /* veth02 -> vrf1  */
168         SYS(fail, "ip -net " NS0 " link add vrf1 type vrf table 11");
169         SYS(fail, "ip -net " NS0 " route add vrf vrf1 unreachable default"
170             " metric 4278198272");
171         SYS(fail, "ip -net " NS0 " link set vrf1 alias vrf");
172         SYS(fail, "ip -net " NS0 " link set vrf1 up");
173         SYS(fail, "ip -net " NS0 " link set veth02 master vrf1");
174 
175         /* Attach TC and XDP progs to veth devices in NS0 */
176         nstoken = open_netns(NS0);
177         if (!ASSERT_OK_PTR(nstoken, "setns " NS0))
178                 goto fail;
179         tc_prog_fd = bpf_program__fd(skel->progs.tc_socket_lookup);
180         if (!ASSERT_GE(tc_prog_fd, 0, "bpf_program__tc_fd"))
181                 goto fail;
182         xdp_prog_fd = bpf_program__fd(skel->progs.xdp_socket_lookup);
183         if (!ASSERT_GE(xdp_prog_fd, 0, "bpf_program__xdp_fd"))
184                 goto fail;
185 
186         if (attach_progs("veth01", tc_prog_fd, xdp_prog_fd))
187                 goto fail;
188 
189         if (attach_progs("veth02", tc_prog_fd, xdp_prog_fd))
190                 goto fail;
191 
192         goto close;
193 fail:
194         ret = -1;
195 close:
196         if (nstoken)
197                 close_netns(nstoken);
198         return ret;
199 }
200 
201 static int test_lookup(struct vrf_socket_lookup *skel, int sotype,
202                        const char *ip, int port, bool test_xdp, bool tcp_skc,
203                        int lookup_status_exp)
204 {
205         static const char msg[] = "Hello Server";
206         struct sockaddr_storage addr = {};
207         int fd, ret = 0;
208 
209         fd = make_socket(sotype, ip, port, &addr);
210         if (fd < 0)
211                 return -1;
212 
213         skel->bss->test_xdp = test_xdp;
214         skel->bss->tcp_skc = tcp_skc;
215         skel->bss->lookup_status = -1;
216 
217         if (sotype == SOCK_STREAM)
218                 connect(fd, (void *)&addr, sizeof(struct sockaddr_in));
219         else
220                 sendto(fd, msg, sizeof(msg), 0, (void *)&addr,
221                        sizeof(struct sockaddr_in));
222 
223         if (!ASSERT_EQ(skel->bss->lookup_status, lookup_status_exp,
224                        "lookup_status"))
225                 goto fail;
226 
227         goto close;
228 
229 fail:
230         ret = -1;
231 close:
232         close(fd);
233         return ret;
234 }
235 
236 static void _test_vrf_socket_lookup(struct vrf_socket_lookup *skel, int sotype,
237                                     bool test_xdp, bool tcp_skc)
238 {
239         int in_vrf_server = -1, non_vrf_server = -1;
240         struct nstoken *nstoken = NULL;
241 
242         nstoken = open_netns(NS0);
243         if (!ASSERT_OK_PTR(nstoken, "setns " NS0))
244                 goto done;
245 
246         /* Open sockets in and outside VRF */
247         non_vrf_server = make_server(sotype, "0.0.0.0", NON_VRF_PORT, NULL);
248         if (!ASSERT_GE(non_vrf_server, 0, "make_server__outside_vrf_fd"))
249                 goto done;
250 
251         in_vrf_server = make_server(sotype, "0.0.0.0", IN_VRF_PORT, "veth02");
252         if (!ASSERT_GE(in_vrf_server, 0, "make_server__in_vrf_fd"))
253                 goto done;
254 
255         /* Perform test from NS1 */
256         close_netns(nstoken);
257         nstoken = open_netns(NS1);
258         if (!ASSERT_OK_PTR(nstoken, "setns " NS1))
259                 goto done;
260 
261         if (!ASSERT_OK(test_lookup(skel, sotype, IP4_ADDR_VETH02, NON_VRF_PORT,
262                                    test_xdp, tcp_skc, 0), "in_to_out"))
263                 goto done;
264         if (!ASSERT_OK(test_lookup(skel, sotype, IP4_ADDR_VETH02, IN_VRF_PORT,
265                                    test_xdp, tcp_skc, 1), "in_to_in"))
266                 goto done;
267         if (!ASSERT_OK(test_lookup(skel, sotype, IP4_ADDR_VETH01, NON_VRF_PORT,
268                                    test_xdp, tcp_skc, 1), "out_to_out"))
269                 goto done;
270         if (!ASSERT_OK(test_lookup(skel, sotype, IP4_ADDR_VETH01, IN_VRF_PORT,
271                                    test_xdp, tcp_skc, 0), "out_to_in"))
272                 goto done;
273 
274 done:
275         if (non_vrf_server >= 0)
276                 close(non_vrf_server);
277         if (in_vrf_server >= 0)
278                 close(in_vrf_server);
279         if (nstoken)
280                 close_netns(nstoken);
281 }
282 
283 void test_vrf_socket_lookup(void)
284 {
285         struct vrf_socket_lookup *skel;
286 
287         cleanup();
288 
289         skel = vrf_socket_lookup__open_and_load();
290         if (!ASSERT_OK_PTR(skel, "vrf_socket_lookup__open_and_load"))
291                 return;
292 
293         if (!ASSERT_OK(setup(skel), "setup"))
294                 goto done;
295 
296         if (test__start_subtest("tc_socket_lookup_tcp"))
297                 _test_vrf_socket_lookup(skel, SOCK_STREAM, false, false);
298         if (test__start_subtest("tc_socket_lookup_tcp_skc"))
299                 _test_vrf_socket_lookup(skel, SOCK_STREAM, false, false);
300         if (test__start_subtest("tc_socket_lookup_udp"))
301                 _test_vrf_socket_lookup(skel, SOCK_STREAM, false, false);
302         if (test__start_subtest("xdp_socket_lookup_tcp"))
303                 _test_vrf_socket_lookup(skel, SOCK_STREAM, true, false);
304         if (test__start_subtest("xdp_socket_lookup_tcp_skc"))
305                 _test_vrf_socket_lookup(skel, SOCK_STREAM, true, false);
306         if (test__start_subtest("xdp_socket_lookup_udp"))
307                 _test_vrf_socket_lookup(skel, SOCK_STREAM, true, false);
308 
309 done:
310         vrf_socket_lookup__destroy(skel);
311         cleanup();
312 }
313 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php