selftests/bpf: Add a selftest for the tracing bpf_get_socket_cookie
This builds up on the existing socket cookie test which checks whether the bpf_get_socket_cookie helpers provide the same value in cgroup/connect6 and sockops programs for a socket created by the userspace part of the test. Instead of having an update_cookie sockops program tag a socket local storage with 0xFF, this uses both an update_cookie_sockops program and an update_cookie_tracing program which succesively tag the socket with 0x0F and then 0xF0. Signed-off-by: Florent Revest <revest@chromium.org> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: KP Singh <kpsingh@kernel.org> Link: https://lore.kernel.org/bpf/20210210111406.785541-5-revest@chromium.org
This commit is contained in:
committed by
Alexei Starovoitov
parent
6cd4dcc3fb
commit
6fdd671baa
@@ -35,9 +35,14 @@ void test_socket_cookie(void)
|
|||||||
if (!ASSERT_OK_PTR(skel->links.set_cookie, "prog_attach"))
|
if (!ASSERT_OK_PTR(skel->links.set_cookie, "prog_attach"))
|
||||||
goto close_cgroup_fd;
|
goto close_cgroup_fd;
|
||||||
|
|
||||||
skel->links.update_cookie = bpf_program__attach_cgroup(
|
skel->links.update_cookie_sockops = bpf_program__attach_cgroup(
|
||||||
skel->progs.update_cookie, cgroup_fd);
|
skel->progs.update_cookie_sockops, cgroup_fd);
|
||||||
if (!ASSERT_OK_PTR(skel->links.update_cookie, "prog_attach"))
|
if (!ASSERT_OK_PTR(skel->links.update_cookie_sockops, "prog_attach"))
|
||||||
|
goto close_cgroup_fd;
|
||||||
|
|
||||||
|
skel->links.update_cookie_tracing = bpf_program__attach(
|
||||||
|
skel->progs.update_cookie_tracing);
|
||||||
|
if (!ASSERT_OK_PTR(skel->links.update_cookie_tracing, "prog_attach"))
|
||||||
goto close_cgroup_fd;
|
goto close_cgroup_fd;
|
||||||
|
|
||||||
server_fd = start_server(AF_INET6, SOCK_STREAM, "::1", 0, 0);
|
server_fd = start_server(AF_INET6, SOCK_STREAM, "::1", 0, 0);
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
|
|
||||||
#include <bpf/bpf_helpers.h>
|
#include <bpf/bpf_helpers.h>
|
||||||
#include <bpf/bpf_endian.h>
|
#include <bpf/bpf_endian.h>
|
||||||
|
#include <bpf/bpf_tracing.h>
|
||||||
|
|
||||||
#define AF_INET6 10
|
#define AF_INET6 10
|
||||||
|
|
||||||
@@ -20,6 +21,14 @@ struct {
|
|||||||
__type(value, struct socket_cookie);
|
__type(value, struct socket_cookie);
|
||||||
} socket_cookies SEC(".maps");
|
} socket_cookies SEC(".maps");
|
||||||
|
|
||||||
|
/*
|
||||||
|
* These three programs get executed in a row on connect() syscalls. The
|
||||||
|
* userspace side of the test creates a client socket, issues a connect() on it
|
||||||
|
* and then checks that the local storage associated with this socket has:
|
||||||
|
* cookie_value == local_port << 8 | 0xFF
|
||||||
|
* The different parts of this cookie_value are appended by those hooks if they
|
||||||
|
* all agree on the output of bpf_get_socket_cookie().
|
||||||
|
*/
|
||||||
SEC("cgroup/connect6")
|
SEC("cgroup/connect6")
|
||||||
int set_cookie(struct bpf_sock_addr *ctx)
|
int set_cookie(struct bpf_sock_addr *ctx)
|
||||||
{
|
{
|
||||||
@@ -33,14 +42,14 @@ int set_cookie(struct bpf_sock_addr *ctx)
|
|||||||
if (!p)
|
if (!p)
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
p->cookie_value = 0xFF;
|
p->cookie_value = 0xF;
|
||||||
p->cookie_key = bpf_get_socket_cookie(ctx);
|
p->cookie_key = bpf_get_socket_cookie(ctx);
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
SEC("sockops")
|
SEC("sockops")
|
||||||
int update_cookie(struct bpf_sock_ops *ctx)
|
int update_cookie_sockops(struct bpf_sock_ops *ctx)
|
||||||
{
|
{
|
||||||
struct bpf_sock *sk = ctx->sk;
|
struct bpf_sock *sk = ctx->sk;
|
||||||
struct socket_cookie *p;
|
struct socket_cookie *p;
|
||||||
@@ -61,9 +70,30 @@ int update_cookie(struct bpf_sock_ops *ctx)
|
|||||||
if (p->cookie_key != bpf_get_socket_cookie(ctx))
|
if (p->cookie_key != bpf_get_socket_cookie(ctx))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
p->cookie_value = (ctx->local_port << 8) | p->cookie_value;
|
p->cookie_value |= (ctx->local_port << 8);
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
SEC("fexit/inet_stream_connect")
|
||||||
|
int BPF_PROG(update_cookie_tracing, struct socket *sock,
|
||||||
|
struct sockaddr *uaddr, int addr_len, int flags)
|
||||||
|
{
|
||||||
|
struct socket_cookie *p;
|
||||||
|
|
||||||
|
if (uaddr->sa_family != AF_INET6)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
p = bpf_sk_storage_get(&socket_cookies, sock->sk, 0, 0);
|
||||||
|
if (!p)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (p->cookie_key != bpf_get_socket_cookie(sock->sk))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
p->cookie_value |= 0xF0;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
char _license[] SEC("license") = "GPL";
|
char _license[] SEC("license") = "GPL";
|
||||||
|
|||||||
Reference in New Issue
Block a user