Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2#include "bpf_tracing_net.h"
 
 
 
 
 
 
 
 
 
 
  3#include <bpf/bpf_helpers.h>
  4#include <bpf/bpf_endian.h>
 
  5#include "test_tcpbpf.h"
  6
  7struct tcpbpf_globals global = {};
  8
  9/**
 10 * SOL_TCP is defined in <netinet/tcp.h> while
 11 * TCP_SAVED_SYN is defined in already included <linux/tcp.h>
 12 */
 13#ifndef SOL_TCP
 14#define SOL_TCP 6
 15#endif
 16
 17static __always_inline int get_tp_window_clamp(struct bpf_sock_ops *skops)
 18{
 19	struct bpf_sock *sk;
 20	struct tcp_sock *tp;
 21
 22	sk = skops->sk;
 23	if (!sk)
 24		return -1;
 25	tp = bpf_skc_to_tcp_sock(sk);
 26	if (!tp)
 27		return -1;
 28	return tp->window_clamp;
 29}
 30
 31SEC("sockops")
 32int bpf_testcb(struct bpf_sock_ops *skops)
 33{
 34	char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
 35	struct bpf_sock_ops *reuse = skops;
 36	struct tcphdr *thdr;
 37	int window_clamp = 9216;
 38	int save_syn = 1;
 39	int rv = -1;
 40	int v = 0;
 41	int op;
 42
 43	/* Test reading fields in bpf_sock_ops using single register */
 44	asm volatile (
 45		"%[reuse] = *(u32 *)(%[reuse] +96)"
 46		: [reuse] "+r"(reuse)
 47		:);
 48
 49	asm volatile (
 50		"%[op] = *(u32 *)(%[skops] +96)"
 51		: [op] "=r"(op)
 52		: [skops] "r"(skops)
 53		:);
 54
 55	asm volatile (
 56		"r9 = %[skops];\n"
 57		"r8 = *(u32 *)(r9 +164);\n"
 58		"*(u32 *)(r9 +164) = r8;\n"
 59		:: [skops] "r"(skops)
 60		: "r9", "r8");
 61
 62	asm volatile (
 63		"r1 = %[skops];\n"
 64		"r1 = *(u64 *)(r1 +184);\n"
 65		"if r1 == 0 goto +1;\n"
 66		"r1 = *(u32 *)(r1 +4);\n"
 67		:: [skops] "r"(skops):"r1");
 68
 69	asm volatile (
 70		"r9 = %[skops];\n"
 71		"r9 = *(u64 *)(r9 +184);\n"
 72		"if r9 == 0 goto +1;\n"
 73		"r9 = *(u32 *)(r9 +4);\n"
 74		:: [skops] "r"(skops):"r9");
 75
 76	asm volatile (
 77		"r1 = %[skops];\n"
 78		"r2 = *(u64 *)(r1 +184);\n"
 79		"if r2 == 0 goto +1;\n"
 80		"r2 = *(u32 *)(r2 +4);\n"
 81		:: [skops] "r"(skops):"r1", "r2");
 82
 83	op = (int) skops->op;
 84
 85	global.event_map |= (1 << op);
 86
 87	switch (op) {
 88	case BPF_SOCK_OPS_TCP_CONNECT_CB:
 89		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
 90				    &window_clamp, sizeof(window_clamp));
 91		global.window_clamp_client = get_tp_window_clamp(skops);
 92		break;
 93	case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
 94		/* Test failure to set largest cb flag (assumes not defined) */
 95		global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
 96		/* Set callback */
 97		global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops,
 98						 BPF_SOCK_OPS_STATE_CB_FLAG);
 99		break;
100	case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
101		skops->sk_txhash = 0x12345f;
102		v = 0xff;
103		rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
104				    sizeof(v));
105		if (skops->family == AF_INET6) {
106			v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
107					   header, (sizeof(struct ipv6hdr) +
108						    sizeof(struct tcphdr)));
109			if (!v) {
110				int offset = sizeof(struct ipv6hdr);
111
112				thdr = (struct tcphdr *)(header + offset);
113				v = thdr->syn;
114
115				global.tcp_saved_syn = v;
116			}
117		}
118		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
119				    &window_clamp, sizeof(window_clamp));
120
121		global.window_clamp_server = get_tp_window_clamp(skops);
122		break;
123	case BPF_SOCK_OPS_RTO_CB:
124		break;
125	case BPF_SOCK_OPS_RETRANS_CB:
126		break;
127	case BPF_SOCK_OPS_STATE_CB:
128		if (skops->args[1] == BPF_TCP_CLOSE) {
129			if (skops->args[0] == BPF_TCP_LISTEN) {
130				global.num_listen++;
131			} else {
132				global.total_retrans = skops->total_retrans;
133				global.data_segs_in = skops->data_segs_in;
134				global.data_segs_out = skops->data_segs_out;
135				global.bytes_received = skops->bytes_received;
136				global.bytes_acked = skops->bytes_acked;
137			}
138			global.num_close_events++;
139		}
140		break;
141	case BPF_SOCK_OPS_TCP_LISTEN_CB:
142		bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
143		v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
144				   &save_syn, sizeof(save_syn));
145		/* Update global map w/ result of setsock opt */
146		global.tcp_save_syn = v;
147		break;
148	default:
149		rv = -1;
150	}
151	skops->reply = rv;
152	return 1;
153}
154char _license[] SEC("license") = "GPL";
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2#include <stddef.h>
  3#include <string.h>
  4#include <netinet/in.h>
  5#include <linux/bpf.h>
  6#include <linux/if_ether.h>
  7#include <linux/if_packet.h>
  8#include <linux/ip.h>
  9#include <linux/ipv6.h>
 10#include <linux/types.h>
 11#include <linux/socket.h>
 12#include <linux/tcp.h>
 13#include <bpf/bpf_helpers.h>
 14#include <bpf/bpf_endian.h>
 15#include "bpf_tcp_helpers.h"
 16#include "test_tcpbpf.h"
 17
 18struct tcpbpf_globals global = {};
 19
 20/**
 21 * SOL_TCP is defined in <netinet/tcp.h> while
 22 * TCP_SAVED_SYN is defined in already included <linux/tcp.h>
 23 */
 24#ifndef SOL_TCP
 25#define SOL_TCP 6
 26#endif
 27
 28static __always_inline int get_tp_window_clamp(struct bpf_sock_ops *skops)
 29{
 30	struct bpf_sock *sk;
 31	struct tcp_sock *tp;
 32
 33	sk = skops->sk;
 34	if (!sk)
 35		return -1;
 36	tp = bpf_skc_to_tcp_sock(sk);
 37	if (!tp)
 38		return -1;
 39	return tp->window_clamp;
 40}
 41
 42SEC("sockops")
 43int bpf_testcb(struct bpf_sock_ops *skops)
 44{
 45	char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
 46	struct bpf_sock_ops *reuse = skops;
 47	struct tcphdr *thdr;
 48	int window_clamp = 9216;
 49	int save_syn = 1;
 50	int rv = -1;
 51	int v = 0;
 52	int op;
 53
 54	/* Test reading fields in bpf_sock_ops using single register */
 55	asm volatile (
 56		"%[reuse] = *(u32 *)(%[reuse] +96)"
 57		: [reuse] "+r"(reuse)
 58		:);
 59
 60	asm volatile (
 61		"%[op] = *(u32 *)(%[skops] +96)"
 62		: [op] "+r"(op)
 63		: [skops] "r"(skops)
 64		:);
 65
 66	asm volatile (
 67		"r9 = %[skops];\n"
 68		"r8 = *(u32 *)(r9 +164);\n"
 69		"*(u32 *)(r9 +164) = r8;\n"
 70		:: [skops] "r"(skops)
 71		: "r9", "r8");
 72
 73	asm volatile (
 74		"r1 = %[skops];\n"
 75		"r1 = *(u64 *)(r1 +184);\n"
 76		"if r1 == 0 goto +1;\n"
 77		"r1 = *(u32 *)(r1 +4);\n"
 78		:: [skops] "r"(skops):"r1");
 79
 80	asm volatile (
 81		"r9 = %[skops];\n"
 82		"r9 = *(u64 *)(r9 +184);\n"
 83		"if r9 == 0 goto +1;\n"
 84		"r9 = *(u32 *)(r9 +4);\n"
 85		:: [skops] "r"(skops):"r9");
 86
 87	asm volatile (
 88		"r1 = %[skops];\n"
 89		"r2 = *(u64 *)(r1 +184);\n"
 90		"if r2 == 0 goto +1;\n"
 91		"r2 = *(u32 *)(r2 +4);\n"
 92		:: [skops] "r"(skops):"r1", "r2");
 93
 94	op = (int) skops->op;
 95
 96	global.event_map |= (1 << op);
 97
 98	switch (op) {
 99	case BPF_SOCK_OPS_TCP_CONNECT_CB:
100		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
101				    &window_clamp, sizeof(window_clamp));
102		global.window_clamp_client = get_tp_window_clamp(skops);
103		break;
104	case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
105		/* Test failure to set largest cb flag (assumes not defined) */
106		global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
107		/* Set callback */
108		global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops,
109						 BPF_SOCK_OPS_STATE_CB_FLAG);
110		break;
111	case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
112		skops->sk_txhash = 0x12345f;
113		v = 0xff;
114		rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
115				    sizeof(v));
116		if (skops->family == AF_INET6) {
117			v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
118					   header, (sizeof(struct ipv6hdr) +
119						    sizeof(struct tcphdr)));
120			if (!v) {
121				int offset = sizeof(struct ipv6hdr);
122
123				thdr = (struct tcphdr *)(header + offset);
124				v = thdr->syn;
125
126				global.tcp_saved_syn = v;
127			}
128		}
129		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
130				    &window_clamp, sizeof(window_clamp));
131
132		global.window_clamp_server = get_tp_window_clamp(skops);
133		break;
134	case BPF_SOCK_OPS_RTO_CB:
135		break;
136	case BPF_SOCK_OPS_RETRANS_CB:
137		break;
138	case BPF_SOCK_OPS_STATE_CB:
139		if (skops->args[1] == BPF_TCP_CLOSE) {
140			if (skops->args[0] == BPF_TCP_LISTEN) {
141				global.num_listen++;
142			} else {
143				global.total_retrans = skops->total_retrans;
144				global.data_segs_in = skops->data_segs_in;
145				global.data_segs_out = skops->data_segs_out;
146				global.bytes_received = skops->bytes_received;
147				global.bytes_acked = skops->bytes_acked;
148			}
149			global.num_close_events++;
150		}
151		break;
152	case BPF_SOCK_OPS_TCP_LISTEN_CB:
153		bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
154		v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
155				   &save_syn, sizeof(save_syn));
156		/* Update global map w/ result of setsock opt */
157		global.tcp_save_syn = v;
158		break;
159	default:
160		rv = -1;
161	}
162	skops->reply = rv;
163	return 1;
164}
165char _license[] SEC("license") = "GPL";