1 // SPDX-License-Identifier: GPL-2.0 2 // Copyright (c) 2020 Cloudflare 3 /* 4 * Tests for sockmap/sockhash holding kTLS sockets. 5 */ 6 7 #include <netinet/tcp.h> 8 #include "test_progs.h" 9 10 #define MAX_TEST_NAME 80 11 #define TCP_ULP 31 12 13 static int tcp_server(int family) 14 { 15 int err, s; 16 17 s = socket(family, SOCK_STREAM, 0); 18 if (!ASSERT_GE(s, 0, "socket")) 19 return -1; 20 21 err = listen(s, SOMAXCONN); 22 if (!ASSERT_OK(err, "listen")) 23 return -1; 24 25 return s; 26 } 27 28 static int disconnect(int fd) 29 { 30 struct sockaddr unspec = { AF_UNSPEC }; 31 32 return connect(fd, &unspec, sizeof(unspec)); 33 } 34 35 /* Disconnect (unhash) a kTLS socket after removing it from sockmap. */ 36 static void test_sockmap_ktls_disconnect_after_delete(int family, int map) 37 { 38 struct sockaddr_storage addr = {0}; 39 socklen_t len = sizeof(addr); 40 int err, cli, srv, zero = 0; 41 42 srv = tcp_server(family); 43 if (srv == -1) 44 return; 45 46 err = getsockname(srv, (struct sockaddr *)&addr, &len); 47 if (!ASSERT_OK(err, "getsockopt")) 48 goto close_srv; 49 50 cli = socket(family, SOCK_STREAM, 0); 51 if (!ASSERT_GE(cli, 0, "socket")) 52 goto close_srv; 53 54 err = connect(cli, (struct sockaddr *)&addr, len); 55 if (!ASSERT_OK(err, "connect")) 56 goto close_cli; 57 58 err = bpf_map_update_elem(map, &zero, &cli, 0); 59 if (!ASSERT_OK(err, "bpf_map_update_elem")) 60 goto close_cli; 61 62 err = setsockopt(cli, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); 63 if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) 64 goto close_cli; 65 66 err = bpf_map_delete_elem(map, &zero); 67 if (!ASSERT_OK(err, "bpf_map_delete_elem")) 68 goto close_cli; 69 70 err = disconnect(cli); 71 ASSERT_OK(err, "disconnect"); 72 73 close_cli: 74 close(cli); 75 close_srv: 76 close(srv); 77 } 78 79 static void test_sockmap_ktls_update_fails_when_sock_has_ulp(int family, int map) 80 { 81 struct sockaddr_storage addr = {}; 82 socklen_t len = sizeof(addr); 83 struct sockaddr_in6 *v6; 84 struct sockaddr_in *v4; 85 int err, s, zero = 0; 86 87 switch (family) { 88 case AF_INET: 89 v4 = (struct sockaddr_in *)&addr; 90 v4->sin_family = AF_INET; 91 break; 92 case AF_INET6: 93 v6 = (struct sockaddr_in6 *)&addr; 94 v6->sin6_family = AF_INET6; 95 break; 96 default: 97 PRINT_FAIL("unsupported socket family %d", family); 98 return; 99 } 100 101 s = socket(family, SOCK_STREAM, 0); 102 if (!ASSERT_GE(s, 0, "socket")) 103 return; 104 105 err = bind(s, (struct sockaddr *)&addr, len); 106 if (!ASSERT_OK(err, "bind")) 107 goto close; 108 109 err = getsockname(s, (struct sockaddr *)&addr, &len); 110 if (!ASSERT_OK(err, "getsockname")) 111 goto close; 112 113 err = connect(s, (struct sockaddr *)&addr, len); 114 if (!ASSERT_OK(err, "connect")) 115 goto close; 116 117 /* save sk->sk_prot and set it to tls_prots */ 118 err = setsockopt(s, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); 119 if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) 120 goto close; 121 122 /* sockmap update should not affect saved sk_prot */ 123 err = bpf_map_update_elem(map, &zero, &s, BPF_ANY); 124 if (!ASSERT_ERR(err, "sockmap update elem")) 125 goto close; 126 127 /* call sk->sk_prot->setsockopt to dispatch to saved sk_prot */ 128 err = setsockopt(s, IPPROTO_TCP, TCP_NODELAY, &zero, sizeof(zero)); 129 ASSERT_OK(err, "setsockopt(TCP_NODELAY)"); 130 131 close: 132 close(s); 133 } 134 135 static const char *fmt_test_name(const char *subtest_name, int family, 136 enum bpf_map_type map_type) 137 { 138 const char *map_type_str = BPF_MAP_TYPE_SOCKMAP ? "SOCKMAP" : "SOCKHASH"; 139 const char *family_str = AF_INET ? "IPv4" : "IPv6"; 140 static char test_name[MAX_TEST_NAME]; 141 142 snprintf(test_name, MAX_TEST_NAME, 143 "sockmap_ktls %s %s %s", 144 subtest_name, family_str, map_type_str); 145 146 return test_name; 147 } 148 149 static void run_tests(int family, enum bpf_map_type map_type) 150 { 151 int map; 152 153 map = bpf_map_create(map_type, NULL, sizeof(int), sizeof(int), 1, NULL); 154 if (!ASSERT_GE(map, 0, "bpf_map_create")) 155 return; 156 157 if (test__start_subtest(fmt_test_name("disconnect_after_delete", family, map_type))) 158 test_sockmap_ktls_disconnect_after_delete(family, map); 159 if (test__start_subtest(fmt_test_name("update_fails_when_sock_has_ulp", family, map_type))) 160 test_sockmap_ktls_update_fails_when_sock_has_ulp(family, map); 161 162 close(map); 163 } 164 165 void test_sockmap_ktls(void) 166 { 167 run_tests(AF_INET, BPF_MAP_TYPE_SOCKMAP); 168 run_tests(AF_INET, BPF_MAP_TYPE_SOCKHASH); 169 run_tests(AF_INET6, BPF_MAP_TYPE_SOCKMAP); 170 run_tests(AF_INET6, BPF_MAP_TYPE_SOCKHASH); 171 } 172