|
| 1 | +// SPDX-License-Identifier: GPL-2.0 |
| 2 | +// Copyright (c) 2018 Facebook |
| 3 | +// Copyright (c) 2019 Cloudflare |
| 4 | +// Copyright (c) 2020 Isovalent, Inc. |
| 5 | +/* |
| 6 | + * Test that the socket assign program is able to redirect traffic towards a |
| 7 | + * socket, regardless of whether the port or address destination of the traffic |
| 8 | + * matches the port. |
| 9 | + */ |
| 10 | + |
| 11 | +#define _GNU_SOURCE |
| 12 | +#include <fcntl.h> |
| 13 | +#include <signal.h> |
| 14 | +#include <stdlib.h> |
| 15 | +#include <unistd.h> |
| 16 | + |
| 17 | +#include "test_progs.h" |
| 18 | + |
| 19 | +#define BIND_PORT 1234 |
| 20 | +#define CONNECT_PORT 4321 |
| 21 | +#define TEST_DADDR (0xC0A80203) |
| 22 | +#define NS_SELF "/proc/self/ns/net" |
| 23 | + |
| 24 | +static const struct timeval timeo_sec = { .tv_sec = 3 }; |
| 25 | +static const size_t timeo_optlen = sizeof(timeo_sec); |
| 26 | +static int stop, duration; |
| 27 | + |
| 28 | +static bool |
| 29 | +configure_stack(void) |
| 30 | +{ |
| 31 | + char tc_cmd[BUFSIZ]; |
| 32 | + |
| 33 | + /* Move to a new networking namespace */ |
| 34 | + if (CHECK_FAIL(unshare(CLONE_NEWNET))) |
| 35 | + return false; |
| 36 | + |
| 37 | + /* Configure necessary links, routes */ |
| 38 | + if (CHECK_FAIL(system("ip link set dev lo up"))) |
| 39 | + return false; |
| 40 | + if (CHECK_FAIL(system("ip route add local default dev lo"))) |
| 41 | + return false; |
| 42 | + if (CHECK_FAIL(system("ip -6 route add local default dev lo"))) |
| 43 | + return false; |
| 44 | + |
| 45 | + /* Load qdisc, BPF program */ |
| 46 | + if (CHECK_FAIL(system("tc qdisc add dev lo clsact"))) |
| 47 | + return false; |
| 48 | + sprintf(tc_cmd, "%s %s %s %s", "tc filter add dev lo ingress bpf", |
| 49 | + "direct-action object-file ./test_sk_assign.o", |
| 50 | + "section classifier/sk_assign_test", |
| 51 | + (env.verbosity < VERBOSE_VERY) ? " 2>/dev/null" : ""); |
| 52 | + if (CHECK(system(tc_cmd), "BPF load failed;", |
| 53 | + "run with -vv for more info\n")) |
| 54 | + return false; |
| 55 | + |
| 56 | + return true; |
| 57 | +} |
| 58 | + |
| 59 | +static int |
| 60 | +start_server(const struct sockaddr *addr, socklen_t len, int type) |
| 61 | +{ |
| 62 | + int fd; |
| 63 | + |
| 64 | + fd = socket(addr->sa_family, type, 0); |
| 65 | + if (CHECK_FAIL(fd == -1)) |
| 66 | + goto out; |
| 67 | + if (CHECK_FAIL(setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &timeo_sec, |
| 68 | + timeo_optlen))) |
| 69 | + goto close_out; |
| 70 | + if (CHECK_FAIL(bind(fd, addr, len) == -1)) |
| 71 | + goto close_out; |
| 72 | + if (CHECK_FAIL(listen(fd, 128) == -1)) |
| 73 | + goto close_out; |
| 74 | + |
| 75 | + goto out; |
| 76 | +close_out: |
| 77 | + close(fd); |
| 78 | + fd = -1; |
| 79 | +out: |
| 80 | + return fd; |
| 81 | +} |
| 82 | + |
| 83 | +static int |
| 84 | +connect_to_server(const struct sockaddr *addr, socklen_t len, int type) |
| 85 | +{ |
| 86 | + int fd = -1; |
| 87 | + |
| 88 | + fd = socket(addr->sa_family, type, 0); |
| 89 | + if (CHECK_FAIL(fd == -1)) |
| 90 | + goto out; |
| 91 | + if (CHECK_FAIL(setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &timeo_sec, |
| 92 | + timeo_optlen))) |
| 93 | + goto close_out; |
| 94 | + if (CHECK_FAIL(connect(fd, addr, len))) |
| 95 | + goto close_out; |
| 96 | + |
| 97 | + goto out; |
| 98 | +close_out: |
| 99 | + close(fd); |
| 100 | + fd = -1; |
| 101 | +out: |
| 102 | + return fd; |
| 103 | +} |
| 104 | + |
| 105 | +static in_port_t |
| 106 | +get_port(int fd) |
| 107 | +{ |
| 108 | + struct sockaddr_storage ss; |
| 109 | + socklen_t slen = sizeof(ss); |
| 110 | + in_port_t port = 0; |
| 111 | + |
| 112 | + if (CHECK_FAIL(getsockname(fd, (struct sockaddr *)&ss, &slen))) |
| 113 | + return port; |
| 114 | + |
| 115 | + switch (ss.ss_family) { |
| 116 | + case AF_INET: |
| 117 | + port = ((struct sockaddr_in *)&ss)->sin_port; |
| 118 | + break; |
| 119 | + case AF_INET6: |
| 120 | + port = ((struct sockaddr_in6 *)&ss)->sin6_port; |
| 121 | + break; |
| 122 | + default: |
| 123 | + CHECK(1, "Invalid address family", "%d\n", ss.ss_family); |
| 124 | + } |
| 125 | + return port; |
| 126 | +} |
| 127 | + |
| 128 | +static int |
| 129 | +run_test(int server_fd, const struct sockaddr *addr, socklen_t len, int type) |
| 130 | +{ |
| 131 | + int client = -1, srv_client = -1; |
| 132 | + char buf[] = "testing"; |
| 133 | + in_port_t port; |
| 134 | + int ret = 1; |
| 135 | + |
| 136 | + client = connect_to_server(addr, len, type); |
| 137 | + if (client == -1) { |
| 138 | + perror("Cannot connect to server"); |
| 139 | + goto out; |
| 140 | + } |
| 141 | + |
| 142 | + srv_client = accept(server_fd, NULL, NULL); |
| 143 | + if (CHECK_FAIL(srv_client == -1)) { |
| 144 | + perror("Can't accept connection"); |
| 145 | + goto out; |
| 146 | + } |
| 147 | + if (CHECK_FAIL(write(client, buf, sizeof(buf)) != sizeof(buf))) { |
| 148 | + perror("Can't write on client"); |
| 149 | + goto out; |
| 150 | + } |
| 151 | + if (CHECK_FAIL(read(srv_client, &buf, sizeof(buf)) != sizeof(buf))) { |
| 152 | + perror("Can't read on server"); |
| 153 | + goto out; |
| 154 | + } |
| 155 | + |
| 156 | + port = get_port(srv_client); |
| 157 | + if (CHECK_FAIL(!port)) |
| 158 | + goto out; |
| 159 | + if (CHECK(port != htons(CONNECT_PORT), "Expected", "port %u but got %u", |
| 160 | + CONNECT_PORT, ntohs(port))) |
| 161 | + goto out; |
| 162 | + |
| 163 | + ret = 0; |
| 164 | +out: |
| 165 | + close(client); |
| 166 | + if (srv_client != server_fd) |
| 167 | + close(srv_client); |
| 168 | + if (ret) |
| 169 | + WRITE_ONCE(stop, 1); |
| 170 | + return ret; |
| 171 | +} |
| 172 | + |
| 173 | +static void |
| 174 | +prepare_addr(struct sockaddr *addr, int family, __u16 port, bool rewrite_addr) |
| 175 | +{ |
| 176 | + struct sockaddr_in *addr4; |
| 177 | + struct sockaddr_in6 *addr6; |
| 178 | + |
| 179 | + switch (family) { |
| 180 | + case AF_INET: |
| 181 | + addr4 = (struct sockaddr_in *)addr; |
| 182 | + memset(addr4, 0, sizeof(*addr4)); |
| 183 | + addr4->sin_family = family; |
| 184 | + addr4->sin_port = htons(port); |
| 185 | + if (rewrite_addr) |
| 186 | + addr4->sin_addr.s_addr = htonl(TEST_DADDR); |
| 187 | + else |
| 188 | + addr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK); |
| 189 | + break; |
| 190 | + case AF_INET6: |
| 191 | + addr6 = (struct sockaddr_in6 *)addr; |
| 192 | + memset(addr6, 0, sizeof(*addr6)); |
| 193 | + addr6->sin6_family = family; |
| 194 | + addr6->sin6_port = htons(port); |
| 195 | + addr6->sin6_addr = in6addr_loopback; |
| 196 | + if (rewrite_addr) |
| 197 | + addr6->sin6_addr.s6_addr32[3] = htonl(TEST_DADDR); |
| 198 | + break; |
| 199 | + default: |
| 200 | + fprintf(stderr, "Invalid family %d", family); |
| 201 | + } |
| 202 | +} |
| 203 | + |
| 204 | +struct test_sk_cfg { |
| 205 | + const char *name; |
| 206 | + int family; |
| 207 | + struct sockaddr *addr; |
| 208 | + socklen_t len; |
| 209 | + int type; |
| 210 | + bool rewrite_addr; |
| 211 | +}; |
| 212 | + |
| 213 | +#define TEST(NAME, FAMILY, TYPE, REWRITE) \ |
| 214 | +{ \ |
| 215 | + .name = NAME, \ |
| 216 | + .family = FAMILY, \ |
| 217 | + .addr = (FAMILY == AF_INET) ? (struct sockaddr *)&addr4 \ |
| 218 | + : (struct sockaddr *)&addr6, \ |
| 219 | + .len = (FAMILY == AF_INET) ? sizeof(addr4) : sizeof(addr6), \ |
| 220 | + .type = TYPE, \ |
| 221 | + .rewrite_addr = REWRITE, \ |
| 222 | +} |
| 223 | + |
| 224 | +void test_sk_assign(void) |
| 225 | +{ |
| 226 | + struct sockaddr_in addr4; |
| 227 | + struct sockaddr_in6 addr6; |
| 228 | + struct test_sk_cfg tests[] = { |
| 229 | + TEST("ipv4 tcp port redir", AF_INET, SOCK_STREAM, false), |
| 230 | + TEST("ipv4 tcp addr redir", AF_INET, SOCK_STREAM, true), |
| 231 | + TEST("ipv6 tcp port redir", AF_INET6, SOCK_STREAM, false), |
| 232 | + TEST("ipv6 tcp addr redir", AF_INET6, SOCK_STREAM, true), |
| 233 | + }; |
| 234 | + int server = -1; |
| 235 | + int self_net; |
| 236 | + |
| 237 | + self_net = open(NS_SELF, O_RDONLY); |
| 238 | + if (CHECK_FAIL(self_net < 0)) { |
| 239 | + perror("Unable to open "NS_SELF); |
| 240 | + return; |
| 241 | + } |
| 242 | + |
| 243 | + if (!configure_stack()) { |
| 244 | + perror("configure_stack"); |
| 245 | + goto cleanup; |
| 246 | + } |
| 247 | + |
| 248 | + for (int i = 0; i < ARRAY_SIZE(tests) && !READ_ONCE(stop); i++) { |
| 249 | + struct test_sk_cfg *test = &tests[i]; |
| 250 | + const struct sockaddr *addr; |
| 251 | + |
| 252 | + if (!test__start_subtest(test->name)) |
| 253 | + continue; |
| 254 | + prepare_addr(test->addr, test->family, BIND_PORT, false); |
| 255 | + addr = (const struct sockaddr *)test->addr; |
| 256 | + server = start_server(addr, test->len, test->type); |
| 257 | + if (server == -1) |
| 258 | + goto cleanup; |
| 259 | + |
| 260 | + /* connect to unbound ports */ |
| 261 | + prepare_addr(test->addr, test->family, CONNECT_PORT, |
| 262 | + test->rewrite_addr); |
| 263 | + if (run_test(server, addr, test->len, test->type)) |
| 264 | + goto close; |
| 265 | + |
| 266 | + close(server); |
| 267 | + server = -1; |
| 268 | + } |
| 269 | + |
| 270 | +close: |
| 271 | + close(server); |
| 272 | +cleanup: |
| 273 | + if (CHECK_FAIL(setns(self_net, CLONE_NEWNET))) |
| 274 | + perror("Failed to setns("NS_SELF")"); |
| 275 | + close(self_net); |
| 276 | +} |
0 commit comments