1 // SPDX-License-Identifier: GPL-2.0
2 #include <stddef.h>
3 #include <string.h>
4 #include <netinet/in.h>
5 #include <linux/bpf.h>
6 #include <linux/if_ether.h>
7 #include <linux/if_packet.h>
8 #include <linux/ip.h>
9 #include <linux/ipv6.h>
10 #include <linux/types.h>
11 #include <linux/socket.h>
12 #include <linux/tcp.h>
13 #include <bpf/bpf_helpers.h>
14 #include <bpf/bpf_endian.h>
15 #include "test_tcpbpf.h"
16 
17 struct tcpbpf_globals global = {};
18 int _version SEC("version") = 1;
19 
20 SEC("sockops")
21 int bpf_testcb(struct bpf_sock_ops *skops)
22 {
23 	char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
24 	struct bpf_sock_ops *reuse = skops;
25 	struct tcphdr *thdr;
26 	int good_call_rv = 0;
27 	int bad_call_rv = 0;
28 	int save_syn = 1;
29 	int rv = -1;
30 	int v = 0;
31 	int op;
32 
33 	/* Test reading fields in bpf_sock_ops using single register */
34 	asm volatile (
35 		"%[reuse] = *(u32 *)(%[reuse] +96)"
36 		: [reuse] "+r"(reuse)
37 		:);
38 
39 	asm volatile (
40 		"%[op] = *(u32 *)(%[skops] +96)"
41 		: [op] "+r"(op)
42 		: [skops] "r"(skops)
43 		:);
44 
45 	asm volatile (
46 		"r9 = %[skops];\n"
47 		"r8 = *(u32 *)(r9 +164);\n"
48 		"*(u32 *)(r9 +164) = r8;\n"
49 		:: [skops] "r"(skops)
50 		: "r9", "r8");
51 
52 	asm volatile (
53 		"r1 = %[skops];\n"
54 		"r1 = *(u64 *)(r1 +184);\n"
55 		"if r1 == 0 goto +1;\n"
56 		"r1 = *(u32 *)(r1 +4);\n"
57 		:: [skops] "r"(skops):"r1");
58 
59 	asm volatile (
60 		"r9 = %[skops];\n"
61 		"r9 = *(u64 *)(r9 +184);\n"
62 		"if r9 == 0 goto +1;\n"
63 		"r9 = *(u32 *)(r9 +4);\n"
64 		:: [skops] "r"(skops):"r9");
65 
66 	asm volatile (
67 		"r1 = %[skops];\n"
68 		"r2 = *(u64 *)(r1 +184);\n"
69 		"if r2 == 0 goto +1;\n"
70 		"r2 = *(u32 *)(r2 +4);\n"
71 		:: [skops] "r"(skops):"r1", "r2");
72 
73 	op = (int) skops->op;
74 
75 	global.event_map |= (1 << op);
76 
77 	switch (op) {
78 	case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
79 		/* Test failure to set largest cb flag (assumes not defined) */
80 		global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
81 		/* Set callback */
82 		global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops,
83 						 BPF_SOCK_OPS_STATE_CB_FLAG);
84 		break;
85 	case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
86 		skops->sk_txhash = 0x12345f;
87 		v = 0xff;
88 		rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
89 				    sizeof(v));
90 		if (skops->family == AF_INET6) {
91 			v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
92 					   header, (sizeof(struct ipv6hdr) +
93 						    sizeof(struct tcphdr)));
94 			if (!v) {
95 				int offset = sizeof(struct ipv6hdr);
96 
97 				thdr = (struct tcphdr *)(header + offset);
98 				v = thdr->syn;
99 
100 				global.tcp_saved_syn = v;
101 			}
102 		}
103 		break;
104 	case BPF_SOCK_OPS_RTO_CB:
105 		break;
106 	case BPF_SOCK_OPS_RETRANS_CB:
107 		break;
108 	case BPF_SOCK_OPS_STATE_CB:
109 		if (skops->args[1] == BPF_TCP_CLOSE) {
110 			if (skops->args[0] == BPF_TCP_LISTEN) {
111 				global.num_listen++;
112 			} else {
113 				global.total_retrans = skops->total_retrans;
114 				global.data_segs_in = skops->data_segs_in;
115 				global.data_segs_out = skops->data_segs_out;
116 				global.bytes_received = skops->bytes_received;
117 				global.bytes_acked = skops->bytes_acked;
118 			}
119 			global.num_close_events++;
120 		}
121 		break;
122 	case BPF_SOCK_OPS_TCP_LISTEN_CB:
123 		bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
124 		v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
125 				   &save_syn, sizeof(save_syn));
126 		/* Update global map w/ result of setsock opt */
127 		global.tcp_save_syn = v;
128 		break;
129 	default:
130 		rv = -1;
131 	}
132 	skops->reply = rv;
133 	return 1;
134 }
135 char _license[] SEC("license") = "GPL";
136