1 // SPDX-License-Identifier: GPL-2.0 2 #include <stddef.h> 3 #include <string.h> 4 #include <netinet/in.h> 5 #include <linux/bpf.h> 6 #include <linux/if_ether.h> 7 #include <linux/if_packet.h> 8 #include <linux/ip.h> 9 #include <linux/ipv6.h> 10 #include <linux/types.h> 11 #include <linux/socket.h> 12 #include <linux/tcp.h> 13 #include <bpf/bpf_helpers.h> 14 #include <bpf/bpf_endian.h> 15 #include "test_tcpbpf.h" 16 17 struct tcpbpf_globals global = {}; 18 int _version SEC("version") = 1; 19 20 SEC("sockops") 21 int bpf_testcb(struct bpf_sock_ops *skops) 22 { 23 char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)]; 24 struct bpf_sock_ops *reuse = skops; 25 struct tcphdr *thdr; 26 int good_call_rv = 0; 27 int bad_call_rv = 0; 28 int save_syn = 1; 29 int rv = -1; 30 int v = 0; 31 int op; 32 33 /* Test reading fields in bpf_sock_ops using single register */ 34 asm volatile ( 35 "%[reuse] = *(u32 *)(%[reuse] +96)" 36 : [reuse] "+r"(reuse) 37 :); 38 39 asm volatile ( 40 "%[op] = *(u32 *)(%[skops] +96)" 41 : [op] "+r"(op) 42 : [skops] "r"(skops) 43 :); 44 45 asm volatile ( 46 "r9 = %[skops];\n" 47 "r8 = *(u32 *)(r9 +164);\n" 48 "*(u32 *)(r9 +164) = r8;\n" 49 :: [skops] "r"(skops) 50 : "r9", "r8"); 51 52 asm volatile ( 53 "r1 = %[skops];\n" 54 "r1 = *(u64 *)(r1 +184);\n" 55 "if r1 == 0 goto +1;\n" 56 "r1 = *(u32 *)(r1 +4);\n" 57 :: [skops] "r"(skops):"r1"); 58 59 asm volatile ( 60 "r9 = %[skops];\n" 61 "r9 = *(u64 *)(r9 +184);\n" 62 "if r9 == 0 goto +1;\n" 63 "r9 = *(u32 *)(r9 +4);\n" 64 :: [skops] "r"(skops):"r9"); 65 66 asm volatile ( 67 "r1 = %[skops];\n" 68 "r2 = *(u64 *)(r1 +184);\n" 69 "if r2 == 0 goto +1;\n" 70 "r2 = *(u32 *)(r2 +4);\n" 71 :: [skops] "r"(skops):"r1", "r2"); 72 73 op = (int) skops->op; 74 75 global.event_map |= (1 << op); 76 77 switch (op) { 78 case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB: 79 /* Test failure to set largest cb flag (assumes not defined) */ 80 global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80); 81 /* Set callback */ 82 global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 83 BPF_SOCK_OPS_STATE_CB_FLAG); 84 break; 85 case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB: 86 skops->sk_txhash = 0x12345f; 87 v = 0xff; 88 rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v, 89 sizeof(v)); 90 if (skops->family == AF_INET6) { 91 v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN, 92 header, (sizeof(struct ipv6hdr) + 93 sizeof(struct tcphdr))); 94 if (!v) { 95 int offset = sizeof(struct ipv6hdr); 96 97 thdr = (struct tcphdr *)(header + offset); 98 v = thdr->syn; 99 100 global.tcp_saved_syn = v; 101 } 102 } 103 break; 104 case BPF_SOCK_OPS_RTO_CB: 105 break; 106 case BPF_SOCK_OPS_RETRANS_CB: 107 break; 108 case BPF_SOCK_OPS_STATE_CB: 109 if (skops->args[1] == BPF_TCP_CLOSE) { 110 if (skops->args[0] == BPF_TCP_LISTEN) { 111 global.num_listen++; 112 } else { 113 global.total_retrans = skops->total_retrans; 114 global.data_segs_in = skops->data_segs_in; 115 global.data_segs_out = skops->data_segs_out; 116 global.bytes_received = skops->bytes_received; 117 global.bytes_acked = skops->bytes_acked; 118 } 119 global.num_close_events++; 120 } 121 break; 122 case BPF_SOCK_OPS_TCP_LISTEN_CB: 123 bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG); 124 v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN, 125 &save_syn, sizeof(save_syn)); 126 /* Update global map w/ result of setsock opt */ 127 global.tcp_save_syn = v; 128 break; 129 default: 130 rv = -1; 131 } 132 skops->reply = rv; 133 return 1; 134 } 135 char _license[] SEC("license") = "GPL"; 136