Blame view

lib/test_blackhole_dev.c 2.52 KB
509e56b37   Mahesh Bandewar   blackhole_dev: ad...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
  // SPDX-License-Identifier: GPL-2.0
  /*
   * This module tests the blackhole_dev that is created during the
   * net subsystem initialization. The test this module performs is
   * by injecting an skb into the stack with skb->dev as the
   * blackhole_dev and expects kernel to behave in a sane manner
   * (in other words, *not crash*)!
   *
   * Copyright (c) 2018, Mahesh Bandewar <maheshb@google.com>
   */
  
  #include <linux/init.h>
  #include <linux/module.h>
  #include <linux/printk.h>
  #include <linux/skbuff.h>
  #include <linux/netdevice.h>
  #include <linux/udp.h>
  #include <linux/ipv6.h>
  
  #include <net/dst.h>
  
  #define SKB_SIZE  256
  #define HEAD_SIZE (14+40+8)	/* Ether + IPv6 + UDP */
  #define TAIL_SIZE 32		/* random tail-room */
  
  #define UDP_PORT 1234
  
  static int __init test_blackholedev_init(void)
  {
  	struct ipv6hdr *ip6h;
  	struct sk_buff *skb;
  	struct ethhdr *ethh;
  	struct udphdr *uh;
  	int data_len;
  	int ret;
  
  	skb = alloc_skb(SKB_SIZE, GFP_KERNEL);
  	if (!skb)
  		return -ENOMEM;
  
  	/* Reserve head-room for the headers */
  	skb_reserve(skb, HEAD_SIZE);
  
  	/* Add data to the skb */
  	data_len = SKB_SIZE - (HEAD_SIZE + TAIL_SIZE);
  	memset(__skb_put(skb, data_len), 0xf, data_len);
  
  	/* Add protocol data */
  	/* (Transport) UDP */
  	uh = (struct udphdr *)skb_push(skb, sizeof(struct udphdr));
  	skb_set_transport_header(skb, 0);
  	uh->source = uh->dest = htons(UDP_PORT);
  	uh->len = htons(data_len);
  	uh->check = 0;
  	/* (Network) IPv6 */
  	ip6h = (struct ipv6hdr *)skb_push(skb, sizeof(struct ipv6hdr));
  	skb_set_network_header(skb, 0);
  	ip6h->hop_limit = 32;
  	ip6h->payload_len = data_len + sizeof(struct udphdr);
  	ip6h->nexthdr = IPPROTO_UDP;
  	ip6h->saddr = in6addr_loopback;
  	ip6h->daddr = in6addr_loopback;
  	/* Ether */
  	ethh = (struct ethhdr *)skb_push(skb, sizeof(struct ethhdr));
  	skb_set_mac_header(skb, 0);
  
  	skb->protocol = htons(ETH_P_IPV6);
  	skb->pkt_type = PACKET_HOST;
  	skb->dev = blackhole_netdev;
  
  	/* Now attempt to send the packet */
  	ret = dev_queue_xmit(skb);
  
  	switch (ret) {
  	case NET_XMIT_SUCCESS:
  		pr_warn("dev_queue_xmit() returned NET_XMIT_SUCCESS
  ");
  		break;
  	case NET_XMIT_DROP:
  		pr_warn("dev_queue_xmit() returned NET_XMIT_DROP
  ");
  		break;
  	case NET_XMIT_CN:
  		pr_warn("dev_queue_xmit() returned NET_XMIT_CN
  ");
  		break;
  	default:
  		pr_err("dev_queue_xmit() returned UNKNOWN(%d)
  ", ret);
  	}
  
  	return 0;
  }
  
  static void __exit test_blackholedev_exit(void)
  {
  	pr_warn("test_blackholedev module terminating.
  ");
  }
  
  module_init(test_blackholedev_init);
  module_exit(test_blackholedev_exit);
  
  MODULE_AUTHOR("Mahesh Bandewar <maheshb@google.com>");
  MODULE_LICENSE("GPL");