~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/bpf/progs/bind4_prog.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 
  3 #include <string.h>
  4 
  5 #include <linux/stddef.h>
  6 #include <linux/bpf.h>
  7 #include <linux/in.h>
  8 #include <linux/in6.h>
  9 #include <linux/if.h>
 10 #include <errno.h>
 11 
 12 #include <bpf/bpf_helpers.h>
 13 #include <bpf/bpf_endian.h>
 14 
 15 #include "bind_prog.h"
 16 
 17 #define SERV4_IP                0xc0a801feU /* 192.168.1.254 */
 18 #define SERV4_PORT              4040
 19 #define SERV4_REWRITE_IP        0x7f000001U /* 127.0.0.1 */
 20 #define SERV4_REWRITE_PORT      4444
 21 
 22 #ifndef IFNAMSIZ
 23 #define IFNAMSIZ 16
 24 #endif
 25 
 26 static __inline int bind_to_device(struct bpf_sock_addr *ctx)
 27 {
 28         char veth1[IFNAMSIZ] = "test_sock_addr1";
 29         char veth2[IFNAMSIZ] = "test_sock_addr2";
 30         char missing[IFNAMSIZ] = "nonexistent_dev";
 31         char del_bind[IFNAMSIZ] = "";
 32         int veth1_idx, veth2_idx;
 33 
 34         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 35                            &veth1, sizeof(veth1)))
 36                 return 1;
 37         if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 38                            &veth1_idx, sizeof(veth1_idx)) || !veth1_idx)
 39                 return 1;
 40         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 41                            &veth2, sizeof(veth2)))
 42                 return 1;
 43         if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 44                            &veth2_idx, sizeof(veth2_idx)) || !veth2_idx ||
 45             veth1_idx == veth2_idx)
 46                 return 1;
 47         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 48                            &missing, sizeof(missing)) != -ENODEV)
 49                 return 1;
 50         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 51                            &veth1_idx, sizeof(veth1_idx)))
 52                 return 1;
 53         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 54                            &del_bind, sizeof(del_bind)))
 55                 return 1;
 56 
 57         return 0;
 58 }
 59 
 60 static __inline int bind_reuseport(struct bpf_sock_addr *ctx)
 61 {
 62         int val = 1;
 63 
 64         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_REUSEPORT,
 65                            &val, sizeof(val)))
 66                 return 1;
 67         if (bpf_getsockopt(ctx, SOL_SOCKET, SO_REUSEPORT,
 68                            &val, sizeof(val)) || !val)
 69                 return 1;
 70         val = 0;
 71         if (bpf_setsockopt(ctx, SOL_SOCKET, SO_REUSEPORT,
 72                            &val, sizeof(val)))
 73                 return 1;
 74         if (bpf_getsockopt(ctx, SOL_SOCKET, SO_REUSEPORT,
 75                            &val, sizeof(val)) || val)
 76                 return 1;
 77 
 78         return 0;
 79 }
 80 
 81 static __inline int misc_opts(struct bpf_sock_addr *ctx, int opt)
 82 {
 83         int old, tmp, new = 0xeb9f;
 84 
 85         /* Socket in test case has guarantee that old never equals to new. */
 86         if (bpf_getsockopt(ctx, SOL_SOCKET, opt, &old, sizeof(old)) ||
 87             old == new)
 88                 return 1;
 89         if (bpf_setsockopt(ctx, SOL_SOCKET, opt, &new, sizeof(new)))
 90                 return 1;
 91         if (bpf_getsockopt(ctx, SOL_SOCKET, opt, &tmp, sizeof(tmp)) ||
 92             tmp != new)
 93                 return 1;
 94         if (bpf_setsockopt(ctx, SOL_SOCKET, opt, &old, sizeof(old)))
 95                 return 1;
 96 
 97         return 0;
 98 }
 99 
100 SEC("cgroup/bind4")
101 int bind_v4_prog(struct bpf_sock_addr *ctx)
102 {
103         struct bpf_sock *sk;
104         __u32 user_ip4;
105         __u16 user_port;
106 
107         sk = ctx->sk;
108         if (!sk)
109                 return 0;
110 
111         if (sk->family != AF_INET)
112                 return 0;
113 
114         if (ctx->type != SOCK_STREAM && ctx->type != SOCK_DGRAM)
115                 return 0;
116 
117         if (ctx->user_ip4 != bpf_htonl(SERV4_IP) ||
118             ctx->user_port != bpf_htons(SERV4_PORT))
119                 return 0;
120 
121         // u8 narrow loads:
122         user_ip4 = 0;
123         user_ip4 |= load_byte(ctx->user_ip4, 0, sizeof(user_ip4));
124         user_ip4 |= load_byte(ctx->user_ip4, 1, sizeof(user_ip4));
125         user_ip4 |= load_byte(ctx->user_ip4, 2, sizeof(user_ip4));
126         user_ip4 |= load_byte(ctx->user_ip4, 3, sizeof(user_ip4));
127         if (ctx->user_ip4 != user_ip4)
128                 return 0;
129 
130         user_port = 0;
131         user_port |= load_byte(ctx->user_port, 0, sizeof(user_port));
132         user_port |= load_byte(ctx->user_port, 1, sizeof(user_port));
133         if (ctx->user_port != user_port)
134                 return 0;
135 
136         // u16 narrow loads:
137         user_ip4 = 0;
138         user_ip4 |= load_word(ctx->user_ip4, 0, sizeof(user_ip4));
139         user_ip4 |= load_word(ctx->user_ip4, 1, sizeof(user_ip4));
140         if (ctx->user_ip4 != user_ip4)
141                 return 0;
142 
143         /* Bind to device and unbind it. */
144         if (bind_to_device(ctx))
145                 return 0;
146 
147         /* Test for misc socket options. */
148         if (misc_opts(ctx, SO_MARK) || misc_opts(ctx, SO_PRIORITY))
149                 return 0;
150 
151         /* Set reuseport and unset */
152         if (bind_reuseport(ctx))
153                 return 0;
154 
155         ctx->user_ip4 = bpf_htonl(SERV4_REWRITE_IP);
156         ctx->user_port = bpf_htons(SERV4_REWRITE_PORT);
157 
158         return 1;
159 }
160 
161 SEC("cgroup/bind4")
162 int bind_v4_deny_prog(struct bpf_sock_addr *ctx)
163 {
164         return 0;
165 }
166 
167 char _license[] SEC("license") = "GPL";
168 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php