1 // SPDX-License-Identifier: GPL-2.0
4 #include <netinet/in.h>
6 #include <linux/if_ether.h>
7 #include <linux/if_packet.h>
9 #include <linux/ipv6.h>
10 #include <linux/types.h>
11 #include <linux/socket.h>
12 #include <linux/tcp.h>
13 #include <bpf/bpf_helpers.h>
14 #include <bpf/bpf_endian.h>
15 #include "test_tcpbpf.h"
18 __uint(type, BPF_MAP_TYPE_ARRAY);
19 __uint(max_entries, 4);
21 __type(value, struct tcpbpf_globals);
22 } global_map SEC(".maps");
25 __uint(type, BPF_MAP_TYPE_ARRAY);
26 __uint(max_entries, 2);
29 } sockopt_results SEC(".maps");
31 static inline void update_event_map(int event)
34 struct tcpbpf_globals g, *gp;
36 gp = bpf_map_lookup_elem(&global_map, &key);
38 struct tcpbpf_globals g = {0};
40 g.event_map |= (1 << event);
41 bpf_map_update_elem(&global_map, &key, &g,
45 g.event_map |= (1 << event);
46 bpf_map_update_elem(&global_map, &key, &g,
51 int _version SEC("version") = 1;
54 int bpf_testcb(struct bpf_sock_ops *skops)
56 char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
57 struct bpf_sock_ops *reuse = skops;
66 /* Test reading fields in bpf_sock_ops using single register */
68 "%[reuse] = *(u32 *)(%[reuse] +96)"
73 "%[op] = *(u32 *)(%[skops] +96)"
80 "r8 = *(u32 *)(r9 +164);\n"
81 "*(u32 *)(r9 +164) = r8;\n"
87 "r1 = *(u64 *)(r1 +184);\n"
88 "if r1 == 0 goto +1;\n"
89 "r1 = *(u32 *)(r1 +4);\n"
90 :: [skops] "r"(skops):"r1");
94 "r9 = *(u64 *)(r9 +184);\n"
95 "if r9 == 0 goto +1;\n"
96 "r9 = *(u32 *)(r9 +4);\n"
97 :: [skops] "r"(skops):"r9");
101 "r2 = *(u64 *)(r1 +184);\n"
102 "if r2 == 0 goto +1;\n"
103 "r2 = *(u32 *)(r2 +4);\n"
104 :: [skops] "r"(skops):"r1", "r2");
106 op = (int) skops->op;
108 update_event_map(op);
111 case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
112 /* Test failure to set largest cb flag (assumes not defined) */
113 bad_call_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
115 good_call_rv = bpf_sock_ops_cb_flags_set(skops,
116 BPF_SOCK_OPS_STATE_CB_FLAG);
120 struct tcpbpf_globals g, *gp;
122 gp = bpf_map_lookup_elem(&global_map, &key);
126 g.bad_cb_test_rv = bad_call_rv;
127 g.good_cb_test_rv = good_call_rv;
128 bpf_map_update_elem(&global_map, &key, &g,
132 case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
133 skops->sk_txhash = 0x12345f;
135 rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
137 if (skops->family == AF_INET6) {
138 v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
139 header, (sizeof(struct ipv6hdr) +
140 sizeof(struct tcphdr)));
142 int offset = sizeof(struct ipv6hdr);
144 thdr = (struct tcphdr *)(header + offset);
148 bpf_map_update_elem(&sockopt_results, &key, &v,
153 case BPF_SOCK_OPS_RTO_CB:
155 case BPF_SOCK_OPS_RETRANS_CB:
157 case BPF_SOCK_OPS_STATE_CB:
158 if (skops->args[1] == BPF_TCP_CLOSE) {
160 struct tcpbpf_globals g, *gp;
162 gp = bpf_map_lookup_elem(&global_map, &key);
166 if (skops->args[0] == BPF_TCP_LISTEN) {
169 g.total_retrans = skops->total_retrans;
170 g.data_segs_in = skops->data_segs_in;
171 g.data_segs_out = skops->data_segs_out;
172 g.bytes_received = skops->bytes_received;
173 g.bytes_acked = skops->bytes_acked;
175 g.num_close_events++;
176 bpf_map_update_elem(&global_map, &key, &g,
180 case BPF_SOCK_OPS_TCP_LISTEN_CB:
181 bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
182 v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
183 &save_syn, sizeof(save_syn));
184 /* Update global map w/ result of setsock opt */
187 bpf_map_update_elem(&sockopt_results, &key, &v, BPF_ANY);
195 char _license[] SEC("license") = "GPL";