Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | /* SPDX-License-Identifier: GPL-2.0-only */ /* * Copyright 2013 Google Inc. * Author: Willem de Bruijn <willemb@google.com> * Daniel Borkmann <dborkman@redhat.com> */ #ifndef PSOCK_LIB_H #define PSOCK_LIB_H #include <sys/types.h> #include <sys/socket.h> #include <string.h> #include <arpa/inet.h> #include <unistd.h> #define DATA_LEN 100 #define DATA_CHAR 'a' #define DATA_CHAR_1 'b' #define PORT_BASE 8000 #ifndef __maybe_unused # define __maybe_unused __attribute__ ((__unused__)) #endif static __maybe_unused void pair_udp_setfilter(int fd) { /* the filter below checks for all of the following conditions that * are based on the contents of create_payload() * ether type 0x800 and * ip proto udp and * skb->len == DATA_LEN and * udp[38] == 'a' or udp[38] == 'b' * It can be generated from the following bpf_asm input: * ldh [12] * jne #0x800, drop ; ETH_P_IP * ldb [23] * jneq #17, drop ; IPPROTO_UDP * ld len ; ld skb->len * jlt #100, drop ; DATA_LEN * ldb [80] * jeq #97, pass ; DATA_CHAR * jne #98, drop ; DATA_CHAR_1 * pass: * ret #-1 * drop: * ret #0 */ struct sock_filter bpf_filter[] = { { 0x28, 0, 0, 0x0000000c }, { 0x15, 0, 8, 0x00000800 }, { 0x30, 0, 0, 0x00000017 }, { 0x15, 0, 6, 0x00000011 }, { 0x80, 0, 0, 0000000000 }, { 0x35, 0, 4, 0x00000064 }, { 0x30, 0, 0, 0x00000050 }, { 0x15, 1, 0, 0x00000061 }, { 0x15, 0, 1, 0x00000062 }, { 0x06, 0, 0, 0xffffffff }, { 0x06, 0, 0, 0000000000 }, }; struct sock_fprog bpf_prog; bpf_prog.filter = bpf_filter; bpf_prog.len = sizeof(bpf_filter) / sizeof(struct sock_filter); if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &bpf_prog, sizeof(bpf_prog))) { perror("setsockopt SO_ATTACH_FILTER"); exit(1); } } static __maybe_unused void pair_udp_open(int fds[], uint16_t port) { struct sockaddr_in saddr, daddr; fds[0] = socket(PF_INET, SOCK_DGRAM, 0); fds[1] = socket(PF_INET, SOCK_DGRAM, 0); if (fds[0] == -1 || fds[1] == -1) { fprintf(stderr, "ERROR: socket dgram\n"); exit(1); } memset(&saddr, 0, sizeof(saddr)); saddr.sin_family = AF_INET; saddr.sin_port = htons(port); saddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); memset(&daddr, 0, sizeof(daddr)); daddr.sin_family = AF_INET; daddr.sin_port = htons(port + 1); daddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); /* must bind both to get consistent hash result */ if (bind(fds[1], (void *) &daddr, sizeof(daddr))) { perror("bind"); exit(1); } if (bind(fds[0], (void *) &saddr, sizeof(saddr))) { perror("bind"); exit(1); } if (connect(fds[0], (void *) &daddr, sizeof(daddr))) { perror("connect"); exit(1); } } static __maybe_unused void pair_udp_send_char(int fds[], int num, char payload) { char buf[DATA_LEN], rbuf[DATA_LEN]; memset(buf, payload, sizeof(buf)); while (num--) { /* Should really handle EINTR and EAGAIN */ if (write(fds[0], buf, sizeof(buf)) != sizeof(buf)) { fprintf(stderr, "ERROR: send failed left=%d\n", num); exit(1); } if (read(fds[1], rbuf, sizeof(rbuf)) != sizeof(rbuf)) { fprintf(stderr, "ERROR: recv failed left=%d\n", num); exit(1); } if (memcmp(buf, rbuf, sizeof(buf))) { fprintf(stderr, "ERROR: data failed left=%d\n", num); exit(1); } } } static __maybe_unused void pair_udp_send(int fds[], int num) { return pair_udp_send_char(fds, num, DATA_CHAR); } static __maybe_unused void pair_udp_close(int fds[]) { close(fds[0]); close(fds[1]); } #endif /* PSOCK_LIB_H */ |