test_tcpbpf_kern.c 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <stddef.h>
  3. #include <string.h>
  4. #include <linux/bpf.h>
  5. #include <linux/if_ether.h>
  6. #include <linux/if_packet.h>
  7. #include <linux/ip.h>
  8. #include <linux/types.h>
  9. #include <linux/socket.h>
  10. #include <linux/tcp.h>
  11. #include <netinet/in.h>
  12. #include "bpf_helpers.h"
  13. #include "bpf_endian.h"
  14. #include "test_tcpbpf.h"
  15. struct bpf_map_def SEC("maps") global_map = {
  16. .type = BPF_MAP_TYPE_ARRAY,
  17. .key_size = sizeof(__u32),
  18. .value_size = sizeof(struct tcpbpf_globals),
  19. .max_entries = 2,
  20. };
  21. static inline void update_event_map(int event)
  22. {
  23. __u32 key = 0;
  24. struct tcpbpf_globals g, *gp;
  25. gp = bpf_map_lookup_elem(&global_map, &key);
  26. if (gp == NULL) {
  27. struct tcpbpf_globals g = {0};
  28. g.event_map |= (1 << event);
  29. bpf_map_update_elem(&global_map, &key, &g,
  30. BPF_ANY);
  31. } else {
  32. g = *gp;
  33. g.event_map |= (1 << event);
  34. bpf_map_update_elem(&global_map, &key, &g,
  35. BPF_ANY);
  36. }
  37. }
  38. int _version SEC("version") = 1;
  39. SEC("sockops")
  40. int bpf_testcb(struct bpf_sock_ops *skops)
  41. {
  42. int rv = -1;
  43. int bad_call_rv = 0;
  44. int good_call_rv = 0;
  45. int op;
  46. int v = 0;
  47. op = (int) skops->op;
  48. update_event_map(op);
  49. switch (op) {
  50. case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
  51. /* Test failure to set largest cb flag (assumes not defined) */
  52. bad_call_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
  53. /* Set callback */
  54. good_call_rv = bpf_sock_ops_cb_flags_set(skops,
  55. BPF_SOCK_OPS_STATE_CB_FLAG);
  56. /* Update results */
  57. {
  58. __u32 key = 0;
  59. struct tcpbpf_globals g, *gp;
  60. gp = bpf_map_lookup_elem(&global_map, &key);
  61. if (!gp)
  62. break;
  63. g = *gp;
  64. g.bad_cb_test_rv = bad_call_rv;
  65. g.good_cb_test_rv = good_call_rv;
  66. bpf_map_update_elem(&global_map, &key, &g,
  67. BPF_ANY);
  68. }
  69. break;
  70. case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
  71. skops->sk_txhash = 0x12345f;
  72. v = 0xff;
  73. rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
  74. sizeof(v));
  75. break;
  76. case BPF_SOCK_OPS_RTO_CB:
  77. break;
  78. case BPF_SOCK_OPS_RETRANS_CB:
  79. break;
  80. case BPF_SOCK_OPS_STATE_CB:
  81. if (skops->args[1] == BPF_TCP_CLOSE) {
  82. __u32 key = 0;
  83. struct tcpbpf_globals g, *gp;
  84. gp = bpf_map_lookup_elem(&global_map, &key);
  85. if (!gp)
  86. break;
  87. g = *gp;
  88. if (skops->args[0] == BPF_TCP_LISTEN) {
  89. g.num_listen++;
  90. } else {
  91. g.total_retrans = skops->total_retrans;
  92. g.data_segs_in = skops->data_segs_in;
  93. g.data_segs_out = skops->data_segs_out;
  94. g.bytes_received = skops->bytes_received;
  95. g.bytes_acked = skops->bytes_acked;
  96. }
  97. bpf_map_update_elem(&global_map, &key, &g,
  98. BPF_ANY);
  99. }
  100. break;
  101. case BPF_SOCK_OPS_TCP_LISTEN_CB:
  102. bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
  103. break;
  104. default:
  105. rv = -1;
  106. }
  107. skops->reply = rv;
  108. return 1;
  109. }
  110. char _license[] SEC("license") = "GPL";