1 // SPDX-License-Identifier: GPL-2.0-only
2
3 /*
4 * Copyright 2022 Google LLC.
5 */
6
7 #define _GNU_SOURCE
8 #include <sys/mount.h>
9
10 #include "test_progs.h"
11 #include "cgroup_helpers.h"
12 #include "network_helpers.h"
13
14 #include "connect_ping.skel.h"
15
16 /* 2001:db8::1 */
17 #define BINDADDR_V6 { { { 0x20,0x01,0x0d,0xb8,0,0,0,0,0,0,0,0,0,0,0,1 } } }
18 static const struct in6_addr bindaddr_v6 = BINDADDR_V6;
19
subtest(int cgroup_fd,struct connect_ping * skel,int family,int do_bind)20 static void subtest(int cgroup_fd, struct connect_ping *skel,
21 int family, int do_bind)
22 {
23 struct sockaddr_in sa4 = {
24 .sin_family = AF_INET,
25 .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
26 };
27 struct sockaddr_in6 sa6 = {
28 .sin6_family = AF_INET6,
29 .sin6_addr = IN6ADDR_LOOPBACK_INIT,
30 };
31 struct sockaddr *sa = NULL;
32 socklen_t sa_len;
33 int protocol = -1;
34 int sock_fd;
35
36 switch (family) {
37 case AF_INET:
38 sa = (struct sockaddr *)&sa4;
39 sa_len = sizeof(sa4);
40 protocol = IPPROTO_ICMP;
41 break;
42 case AF_INET6:
43 sa = (struct sockaddr *)&sa6;
44 sa_len = sizeof(sa6);
45 protocol = IPPROTO_ICMPV6;
46 break;
47 }
48
49 memset(skel->bss, 0, sizeof(*skel->bss));
50 skel->bss->do_bind = do_bind;
51
52 sock_fd = socket(family, SOCK_DGRAM, protocol);
53 if (!ASSERT_GE(sock_fd, 0, "sock-create"))
54 return;
55
56 if (!ASSERT_OK(connect(sock_fd, sa, sa_len), "connect"))
57 goto close_sock;
58
59 if (!ASSERT_EQ(skel->bss->invocations_v4, family == AF_INET ? 1 : 0,
60 "invocations_v4"))
61 goto close_sock;
62 if (!ASSERT_EQ(skel->bss->invocations_v6, family == AF_INET6 ? 1 : 0,
63 "invocations_v6"))
64 goto close_sock;
65 if (!ASSERT_EQ(skel->bss->has_error, 0, "has_error"))
66 goto close_sock;
67
68 if (!ASSERT_OK(getsockname(sock_fd, sa, &sa_len),
69 "getsockname"))
70 goto close_sock;
71
72 switch (family) {
73 case AF_INET:
74 if (!ASSERT_EQ(sa4.sin_family, family, "sin_family"))
75 goto close_sock;
76 if (!ASSERT_EQ(sa4.sin_addr.s_addr,
77 htonl(do_bind ? 0x01010101 : INADDR_LOOPBACK),
78 "sin_addr"))
79 goto close_sock;
80 break;
81 case AF_INET6:
82 if (!ASSERT_EQ(sa6.sin6_family, AF_INET6, "sin6_family"))
83 goto close_sock;
84 if (!ASSERT_EQ(memcmp(&sa6.sin6_addr,
85 do_bind ? &bindaddr_v6 : &in6addr_loopback,
86 sizeof(sa6.sin6_addr)),
87 0, "sin6_addr"))
88 goto close_sock;
89 break;
90 }
91
92 close_sock:
93 close(sock_fd);
94 }
95
test_connect_ping(void)96 void test_connect_ping(void)
97 {
98 struct connect_ping *skel;
99 int cgroup_fd;
100
101 if (!ASSERT_OK(unshare(CLONE_NEWNET | CLONE_NEWNS), "unshare"))
102 return;
103
104 /* overmount sysfs, and making original sysfs private so overmount
105 * does not propagate to other mntns.
106 */
107 if (!ASSERT_OK(mount("none", "/sys", NULL, MS_PRIVATE, NULL),
108 "remount-private-sys"))
109 return;
110 if (!ASSERT_OK(mount("sysfs", "/sys", "sysfs", 0, NULL),
111 "mount-sys"))
112 return;
113 if (!ASSERT_OK(mount("bpffs", "/sys/fs/bpf", "bpf", 0, NULL),
114 "mount-bpf"))
115 goto clean_mount;
116
117 if (!ASSERT_OK(system("ip link set dev lo up"), "lo-up"))
118 goto clean_mount;
119 if (!ASSERT_OK(system("ip addr add 1.1.1.1 dev lo"), "lo-addr-v4"))
120 goto clean_mount;
121 if (!ASSERT_OK(system("ip -6 addr add 2001:db8::1 dev lo"), "lo-addr-v6"))
122 goto clean_mount;
123 if (write_sysctl("/proc/sys/net/ipv4/ping_group_range", "0 0"))
124 goto clean_mount;
125
126 cgroup_fd = test__join_cgroup("/connect_ping");
127 if (!ASSERT_GE(cgroup_fd, 0, "cg-create"))
128 goto clean_mount;
129
130 skel = connect_ping__open_and_load();
131 if (!ASSERT_OK_PTR(skel, "skel-load"))
132 goto close_cgroup;
133 skel->links.connect_v4_prog =
134 bpf_program__attach_cgroup(skel->progs.connect_v4_prog, cgroup_fd);
135 if (!ASSERT_OK_PTR(skel->links.connect_v4_prog, "cg-attach-v4"))
136 goto skel_destroy;
137 skel->links.connect_v6_prog =
138 bpf_program__attach_cgroup(skel->progs.connect_v6_prog, cgroup_fd);
139 if (!ASSERT_OK_PTR(skel->links.connect_v6_prog, "cg-attach-v6"))
140 goto skel_destroy;
141
142 /* Connect a v4 ping socket to localhost, assert that only v4 is called,
143 * and called exactly once, and that the socket's bound address is
144 * original loopback address.
145 */
146 if (test__start_subtest("ipv4"))
147 subtest(cgroup_fd, skel, AF_INET, 0);
148
149 /* Connect a v4 ping socket to localhost, assert that only v4 is called,
150 * and called exactly once, and that the socket's bound address is
151 * address we explicitly bound.
152 */
153 if (test__start_subtest("ipv4-bind"))
154 subtest(cgroup_fd, skel, AF_INET, 1);
155
156 /* Connect a v6 ping socket to localhost, assert that only v6 is called,
157 * and called exactly once, and that the socket's bound address is
158 * original loopback address.
159 */
160 if (test__start_subtest("ipv6"))
161 subtest(cgroup_fd, skel, AF_INET6, 0);
162
163 /* Connect a v6 ping socket to localhost, assert that only v6 is called,
164 * and called exactly once, and that the socket's bound address is
165 * address we explicitly bound.
166 */
167 if (test__start_subtest("ipv6-bind"))
168 subtest(cgroup_fd, skel, AF_INET6, 1);
169
170 skel_destroy:
171 connect_ping__destroy(skel);
172
173 close_cgroup:
174 close(cgroup_fd);
175
176 clean_mount:
177 umount2("/sys", MNT_DETACH);
178 }
179