Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include "bpf_tracing_net.h"
3#include <bpf/bpf_helpers.h>
4#include <bpf/bpf_endian.h>
5#include "test_tcpbpf.h"
6
7struct tcpbpf_globals global = {};
8
9/**
10 * SOL_TCP is defined in <netinet/tcp.h> while
11 * TCP_SAVED_SYN is defined in already included <linux/tcp.h>
12 */
13#ifndef SOL_TCP
14#define SOL_TCP 6
15#endif
16
17static __always_inline int get_tp_window_clamp(struct bpf_sock_ops *skops)
18{
19 struct bpf_sock *sk;
20 struct tcp_sock *tp;
21
22 sk = skops->sk;
23 if (!sk)
24 return -1;
25 tp = bpf_skc_to_tcp_sock(sk);
26 if (!tp)
27 return -1;
28 return tp->window_clamp;
29}
30
31SEC("sockops")
32int bpf_testcb(struct bpf_sock_ops *skops)
33{
34 char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
35 struct bpf_sock_ops *reuse = skops;
36 struct tcphdr *thdr;
37 int window_clamp = 9216;
38 int save_syn = 1;
39 int rv = -1;
40 int v = 0;
41 int op;
42
43 /* Test reading fields in bpf_sock_ops using single register */
44 asm volatile (
45 "%[reuse] = *(u32 *)(%[reuse] +96)"
46 : [reuse] "+r"(reuse)
47 :);
48
49 asm volatile (
50 "%[op] = *(u32 *)(%[skops] +96)"
51 : [op] "=r"(op)
52 : [skops] "r"(skops)
53 :);
54
55 asm volatile (
56 "r9 = %[skops];\n"
57 "r8 = *(u32 *)(r9 +164);\n"
58 "*(u32 *)(r9 +164) = r8;\n"
59 :: [skops] "r"(skops)
60 : "r9", "r8");
61
62 asm volatile (
63 "r1 = %[skops];\n"
64 "r1 = *(u64 *)(r1 +184);\n"
65 "if r1 == 0 goto +1;\n"
66 "r1 = *(u32 *)(r1 +4);\n"
67 :: [skops] "r"(skops):"r1");
68
69 asm volatile (
70 "r9 = %[skops];\n"
71 "r9 = *(u64 *)(r9 +184);\n"
72 "if r9 == 0 goto +1;\n"
73 "r9 = *(u32 *)(r9 +4);\n"
74 :: [skops] "r"(skops):"r9");
75
76 asm volatile (
77 "r1 = %[skops];\n"
78 "r2 = *(u64 *)(r1 +184);\n"
79 "if r2 == 0 goto +1;\n"
80 "r2 = *(u32 *)(r2 +4);\n"
81 :: [skops] "r"(skops):"r1", "r2");
82
83 op = (int) skops->op;
84
85 global.event_map |= (1 << op);
86
87 switch (op) {
88 case BPF_SOCK_OPS_TCP_CONNECT_CB:
89 rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
90 &window_clamp, sizeof(window_clamp));
91 global.window_clamp_client = get_tp_window_clamp(skops);
92 break;
93 case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
94 /* Test failure to set largest cb flag (assumes not defined) */
95 global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
96 /* Set callback */
97 global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops,
98 BPF_SOCK_OPS_STATE_CB_FLAG);
99 break;
100 case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
101 skops->sk_txhash = 0x12345f;
102 v = 0xff;
103 rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
104 sizeof(v));
105 if (skops->family == AF_INET6) {
106 v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
107 header, (sizeof(struct ipv6hdr) +
108 sizeof(struct tcphdr)));
109 if (!v) {
110 int offset = sizeof(struct ipv6hdr);
111
112 thdr = (struct tcphdr *)(header + offset);
113 v = thdr->syn;
114
115 global.tcp_saved_syn = v;
116 }
117 }
118 rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
119 &window_clamp, sizeof(window_clamp));
120
121 global.window_clamp_server = get_tp_window_clamp(skops);
122 break;
123 case BPF_SOCK_OPS_RTO_CB:
124 break;
125 case BPF_SOCK_OPS_RETRANS_CB:
126 break;
127 case BPF_SOCK_OPS_STATE_CB:
128 if (skops->args[1] == BPF_TCP_CLOSE) {
129 if (skops->args[0] == BPF_TCP_LISTEN) {
130 global.num_listen++;
131 } else {
132 global.total_retrans = skops->total_retrans;
133 global.data_segs_in = skops->data_segs_in;
134 global.data_segs_out = skops->data_segs_out;
135 global.bytes_received = skops->bytes_received;
136 global.bytes_acked = skops->bytes_acked;
137 }
138 global.num_close_events++;
139 }
140 break;
141 case BPF_SOCK_OPS_TCP_LISTEN_CB:
142 bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
143 v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
144 &save_syn, sizeof(save_syn));
145 /* Update global map w/ result of setsock opt */
146 global.tcp_save_syn = v;
147 break;
148 default:
149 rv = -1;
150 }
151 skops->reply = rv;
152 return 1;
153}
154char _license[] SEC("license") = "GPL";
1// SPDX-License-Identifier: GPL-2.0
2#include <stddef.h>
3#include <string.h>
4#include <netinet/in.h>
5#include <linux/bpf.h>
6#include <linux/if_ether.h>
7#include <linux/if_packet.h>
8#include <linux/ip.h>
9#include <linux/ipv6.h>
10#include <linux/types.h>
11#include <linux/socket.h>
12#include <linux/tcp.h>
13#include <bpf/bpf_helpers.h>
14#include <bpf/bpf_endian.h>
15#include "test_tcpbpf.h"
16
17struct {
18 __uint(type, BPF_MAP_TYPE_ARRAY);
19 __uint(max_entries, 4);
20 __type(key, __u32);
21 __type(value, struct tcpbpf_globals);
22} global_map SEC(".maps");
23
24struct {
25 __uint(type, BPF_MAP_TYPE_ARRAY);
26 __uint(max_entries, 2);
27 __type(key, __u32);
28 __type(value, int);
29} sockopt_results SEC(".maps");
30
31static inline void update_event_map(int event)
32{
33 __u32 key = 0;
34 struct tcpbpf_globals g, *gp;
35
36 gp = bpf_map_lookup_elem(&global_map, &key);
37 if (gp == NULL) {
38 struct tcpbpf_globals g = {0};
39
40 g.event_map |= (1 << event);
41 bpf_map_update_elem(&global_map, &key, &g,
42 BPF_ANY);
43 } else {
44 g = *gp;
45 g.event_map |= (1 << event);
46 bpf_map_update_elem(&global_map, &key, &g,
47 BPF_ANY);
48 }
49}
50
51int _version SEC("version") = 1;
52
53SEC("sockops")
54int bpf_testcb(struct bpf_sock_ops *skops)
55{
56 char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
57 struct bpf_sock_ops *reuse = skops;
58 struct tcphdr *thdr;
59 int good_call_rv = 0;
60 int bad_call_rv = 0;
61 int save_syn = 1;
62 int rv = -1;
63 int v = 0;
64 int op;
65
66 /* Test reading fields in bpf_sock_ops using single register */
67 asm volatile (
68 "%[reuse] = *(u32 *)(%[reuse] +96)"
69 : [reuse] "+r"(reuse)
70 :);
71
72 asm volatile (
73 "%[op] = *(u32 *)(%[skops] +96)"
74 : [op] "+r"(op)
75 : [skops] "r"(skops)
76 :);
77
78 asm volatile (
79 "r9 = %[skops];\n"
80 "r8 = *(u32 *)(r9 +164);\n"
81 "*(u32 *)(r9 +164) = r8;\n"
82 :: [skops] "r"(skops)
83 : "r9", "r8");
84
85 asm volatile (
86 "r1 = %[skops];\n"
87 "r1 = *(u64 *)(r1 +184);\n"
88 "if r1 == 0 goto +1;\n"
89 "r1 = *(u32 *)(r1 +4);\n"
90 :: [skops] "r"(skops):"r1");
91
92 asm volatile (
93 "r9 = %[skops];\n"
94 "r9 = *(u64 *)(r9 +184);\n"
95 "if r9 == 0 goto +1;\n"
96 "r9 = *(u32 *)(r9 +4);\n"
97 :: [skops] "r"(skops):"r9");
98
99 asm volatile (
100 "r1 = %[skops];\n"
101 "r2 = *(u64 *)(r1 +184);\n"
102 "if r2 == 0 goto +1;\n"
103 "r2 = *(u32 *)(r2 +4);\n"
104 :: [skops] "r"(skops):"r1", "r2");
105
106 op = (int) skops->op;
107
108 update_event_map(op);
109
110 switch (op) {
111 case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
112 /* Test failure to set largest cb flag (assumes not defined) */
113 bad_call_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
114 /* Set callback */
115 good_call_rv = bpf_sock_ops_cb_flags_set(skops,
116 BPF_SOCK_OPS_STATE_CB_FLAG);
117 /* Update results */
118 {
119 __u32 key = 0;
120 struct tcpbpf_globals g, *gp;
121
122 gp = bpf_map_lookup_elem(&global_map, &key);
123 if (!gp)
124 break;
125 g = *gp;
126 g.bad_cb_test_rv = bad_call_rv;
127 g.good_cb_test_rv = good_call_rv;
128 bpf_map_update_elem(&global_map, &key, &g,
129 BPF_ANY);
130 }
131 break;
132 case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
133 skops->sk_txhash = 0x12345f;
134 v = 0xff;
135 rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
136 sizeof(v));
137 if (skops->family == AF_INET6) {
138 v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
139 header, (sizeof(struct ipv6hdr) +
140 sizeof(struct tcphdr)));
141 if (!v) {
142 int offset = sizeof(struct ipv6hdr);
143
144 thdr = (struct tcphdr *)(header + offset);
145 v = thdr->syn;
146 __u32 key = 1;
147
148 bpf_map_update_elem(&sockopt_results, &key, &v,
149 BPF_ANY);
150 }
151 }
152 break;
153 case BPF_SOCK_OPS_RTO_CB:
154 break;
155 case BPF_SOCK_OPS_RETRANS_CB:
156 break;
157 case BPF_SOCK_OPS_STATE_CB:
158 if (skops->args[1] == BPF_TCP_CLOSE) {
159 __u32 key = 0;
160 struct tcpbpf_globals g, *gp;
161
162 gp = bpf_map_lookup_elem(&global_map, &key);
163 if (!gp)
164 break;
165 g = *gp;
166 if (skops->args[0] == BPF_TCP_LISTEN) {
167 g.num_listen++;
168 } else {
169 g.total_retrans = skops->total_retrans;
170 g.data_segs_in = skops->data_segs_in;
171 g.data_segs_out = skops->data_segs_out;
172 g.bytes_received = skops->bytes_received;
173 g.bytes_acked = skops->bytes_acked;
174 }
175 g.num_close_events++;
176 bpf_map_update_elem(&global_map, &key, &g,
177 BPF_ANY);
178 }
179 break;
180 case BPF_SOCK_OPS_TCP_LISTEN_CB:
181 bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
182 v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
183 &save_syn, sizeof(save_syn));
184 /* Update global map w/ result of setsock opt */
185 __u32 key = 0;
186
187 bpf_map_update_elem(&sockopt_results, &key, &v, BPF_ANY);
188 break;
189 default:
190 rv = -1;
191 }
192 skops->reply = rv;
193 return 1;
194}
195char _license[] SEC("license") = "GPL";