396 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			396 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
/* Copyright (c) Meta Platforms, Inc. and affiliates. */
 | 
						|
 | 
						|
#include "vmlinux.h"
 | 
						|
#include "bpf_tracing_net.h"
 | 
						|
#include <bpf/bpf_core_read.h>
 | 
						|
#include <bpf/bpf_helpers.h>
 | 
						|
#include <bpf/bpf_tracing.h>
 | 
						|
 | 
						|
#ifndef ARRAY_SIZE
 | 
						|
#define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
 | 
						|
#endif
 | 
						|
 | 
						|
extern unsigned long CONFIG_HZ __kconfig;
 | 
						|
 | 
						|
const volatile char veth[IFNAMSIZ];
 | 
						|
const volatile int veth_ifindex;
 | 
						|
 | 
						|
int nr_listen;
 | 
						|
int nr_passive;
 | 
						|
int nr_active;
 | 
						|
int nr_connect;
 | 
						|
int nr_binddev;
 | 
						|
int nr_socket_post_create;
 | 
						|
 | 
						|
struct sockopt_test {
 | 
						|
	int opt;
 | 
						|
	int new;
 | 
						|
	int restore;
 | 
						|
	int expected;
 | 
						|
	int tcp_expected;
 | 
						|
	unsigned int flip:1;
 | 
						|
};
 | 
						|
 | 
						|
static const char not_exist_cc[] = "not_exist";
 | 
						|
static const char cubic_cc[] = "cubic";
 | 
						|
static const char reno_cc[] = "reno";
 | 
						|
 | 
						|
static const struct sockopt_test sol_socket_tests[] = {
 | 
						|
	{ .opt = SO_REUSEADDR, .flip = 1, },
 | 
						|
	{ .opt = SO_SNDBUF, .new = 8123, .expected = 8123 * 2, },
 | 
						|
	{ .opt = SO_RCVBUF, .new = 8123, .expected = 8123 * 2, },
 | 
						|
	{ .opt = SO_KEEPALIVE, .flip = 1, },
 | 
						|
	{ .opt = SO_PRIORITY, .new = 0xeb9f, .expected = 0xeb9f, },
 | 
						|
	{ .opt = SO_REUSEPORT, .flip = 1, },
 | 
						|
	{ .opt = SO_RCVLOWAT, .new = 8123, .expected = 8123, },
 | 
						|
	{ .opt = SO_MARK, .new = 0xeb9f, .expected = 0xeb9f, },
 | 
						|
	{ .opt = SO_MAX_PACING_RATE, .new = 0xeb9f, .expected = 0xeb9f, },
 | 
						|
	{ .opt = SO_TXREHASH, .flip = 1, },
 | 
						|
	{ .opt = 0, },
 | 
						|
};
 | 
						|
 | 
						|
static const struct sockopt_test sol_tcp_tests[] = {
 | 
						|
	{ .opt = TCP_NODELAY, .flip = 1, },
 | 
						|
	{ .opt = TCP_KEEPIDLE, .new = 123, .expected = 123, .restore = 321, },
 | 
						|
	{ .opt = TCP_KEEPINTVL, .new = 123, .expected = 123, .restore = 321, },
 | 
						|
	{ .opt = TCP_KEEPCNT, .new = 123, .expected = 123, .restore = 124, },
 | 
						|
	{ .opt = TCP_SYNCNT, .new = 123, .expected = 123, .restore = 124, },
 | 
						|
	{ .opt = TCP_WINDOW_CLAMP, .new = 8123, .expected = 8123, .restore = 8124, },
 | 
						|
	{ .opt = TCP_CONGESTION, },
 | 
						|
	{ .opt = TCP_THIN_LINEAR_TIMEOUTS, .flip = 1, },
 | 
						|
	{ .opt = TCP_USER_TIMEOUT, .new = 123400, .expected = 123400, },
 | 
						|
	{ .opt = TCP_NOTSENT_LOWAT, .new = 1314, .expected = 1314, },
 | 
						|
	{ .opt = 0, },
 | 
						|
};
 | 
						|
 | 
						|
static const struct sockopt_test sol_ip_tests[] = {
 | 
						|
	{ .opt = IP_TOS, .new = 0xe1, .expected = 0xe1, .tcp_expected = 0xe0, },
 | 
						|
	{ .opt = 0, },
 | 
						|
};
 | 
						|
 | 
						|
static const struct sockopt_test sol_ipv6_tests[] = {
 | 
						|
	{ .opt = IPV6_TCLASS, .new = 0xe1, .expected = 0xe1, .tcp_expected = 0xe0, },
 | 
						|
	{ .opt = IPV6_AUTOFLOWLABEL, .flip = 1, },
 | 
						|
	{ .opt = 0, },
 | 
						|
};
 | 
						|
 | 
						|
struct loop_ctx {
 | 
						|
	void *ctx;
 | 
						|
	struct sock *sk;
 | 
						|
};
 | 
						|
 | 
						|
static int bpf_test_sockopt_flip(void *ctx, struct sock *sk,
 | 
						|
				 const struct sockopt_test *t,
 | 
						|
				 int level)
 | 
						|
{
 | 
						|
	int old, tmp, new, opt = t->opt;
 | 
						|
 | 
						|
	opt = t->opt;
 | 
						|
 | 
						|
	if (bpf_getsockopt(ctx, level, opt, &old, sizeof(old)))
 | 
						|
		return 1;
 | 
						|
	/* kernel initialized txrehash to 255 */
 | 
						|
	if (level == SOL_SOCKET && opt == SO_TXREHASH && old != 0 && old != 1)
 | 
						|
		old = 1;
 | 
						|
 | 
						|
	new = !old;
 | 
						|
	if (bpf_setsockopt(ctx, level, opt, &new, sizeof(new)))
 | 
						|
		return 1;
 | 
						|
	if (bpf_getsockopt(ctx, level, opt, &tmp, sizeof(tmp)) ||
 | 
						|
	    tmp != new)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, level, opt, &old, sizeof(old)))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_sockopt_int(void *ctx, struct sock *sk,
 | 
						|
				const struct sockopt_test *t,
 | 
						|
				int level)
 | 
						|
{
 | 
						|
	int old, tmp, new, expected, opt;
 | 
						|
 | 
						|
	opt = t->opt;
 | 
						|
	new = t->new;
 | 
						|
	if (sk->sk_type == SOCK_STREAM && t->tcp_expected)
 | 
						|
		expected = t->tcp_expected;
 | 
						|
	else
 | 
						|
		expected = t->expected;
 | 
						|
 | 
						|
	if (bpf_getsockopt(ctx, level, opt, &old, sizeof(old)) ||
 | 
						|
	    old == new)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, level, opt, &new, sizeof(new)))
 | 
						|
		return 1;
 | 
						|
	if (bpf_getsockopt(ctx, level, opt, &tmp, sizeof(tmp)) ||
 | 
						|
	    tmp != expected)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (t->restore)
 | 
						|
		old = t->restore;
 | 
						|
	if (bpf_setsockopt(ctx, level, opt, &old, sizeof(old)))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_socket_sockopt(__u32 i, struct loop_ctx *lc)
 | 
						|
{
 | 
						|
	const struct sockopt_test *t;
 | 
						|
 | 
						|
	if (i >= ARRAY_SIZE(sol_socket_tests))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	t = &sol_socket_tests[i];
 | 
						|
	if (!t->opt)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (t->flip)
 | 
						|
		return bpf_test_sockopt_flip(lc->ctx, lc->sk, t, SOL_SOCKET);
 | 
						|
 | 
						|
	return bpf_test_sockopt_int(lc->ctx, lc->sk, t, SOL_SOCKET);
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_ip_sockopt(__u32 i, struct loop_ctx *lc)
 | 
						|
{
 | 
						|
	const struct sockopt_test *t;
 | 
						|
 | 
						|
	if (i >= ARRAY_SIZE(sol_ip_tests))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	t = &sol_ip_tests[i];
 | 
						|
	if (!t->opt)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (t->flip)
 | 
						|
		return bpf_test_sockopt_flip(lc->ctx, lc->sk, t, IPPROTO_IP);
 | 
						|
 | 
						|
	return bpf_test_sockopt_int(lc->ctx, lc->sk, t, IPPROTO_IP);
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_ipv6_sockopt(__u32 i, struct loop_ctx *lc)
 | 
						|
{
 | 
						|
	const struct sockopt_test *t;
 | 
						|
 | 
						|
	if (i >= ARRAY_SIZE(sol_ipv6_tests))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	t = &sol_ipv6_tests[i];
 | 
						|
	if (!t->opt)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (t->flip)
 | 
						|
		return bpf_test_sockopt_flip(lc->ctx, lc->sk, t, IPPROTO_IPV6);
 | 
						|
 | 
						|
	return bpf_test_sockopt_int(lc->ctx, lc->sk, t, IPPROTO_IPV6);
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_tcp_sockopt(__u32 i, struct loop_ctx *lc)
 | 
						|
{
 | 
						|
	const struct sockopt_test *t;
 | 
						|
	struct sock *sk;
 | 
						|
	void *ctx;
 | 
						|
 | 
						|
	if (i >= ARRAY_SIZE(sol_tcp_tests))
 | 
						|
		return 1;
 | 
						|
 | 
						|
	t = &sol_tcp_tests[i];
 | 
						|
	if (!t->opt)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	ctx = lc->ctx;
 | 
						|
	sk = lc->sk;
 | 
						|
 | 
						|
	if (t->opt == TCP_CONGESTION) {
 | 
						|
		char old_cc[16], tmp_cc[16];
 | 
						|
		const char *new_cc;
 | 
						|
		int new_cc_len;
 | 
						|
 | 
						|
		if (!bpf_setsockopt(ctx, IPPROTO_TCP, TCP_CONGESTION,
 | 
						|
				    (void *)not_exist_cc, sizeof(not_exist_cc)))
 | 
						|
			return 1;
 | 
						|
		if (bpf_getsockopt(ctx, IPPROTO_TCP, TCP_CONGESTION, old_cc, sizeof(old_cc)))
 | 
						|
			return 1;
 | 
						|
		if (!bpf_strncmp(old_cc, sizeof(old_cc), cubic_cc)) {
 | 
						|
			new_cc = reno_cc;
 | 
						|
			new_cc_len = sizeof(reno_cc);
 | 
						|
		} else {
 | 
						|
			new_cc = cubic_cc;
 | 
						|
			new_cc_len = sizeof(cubic_cc);
 | 
						|
		}
 | 
						|
		if (bpf_setsockopt(ctx, IPPROTO_TCP, TCP_CONGESTION, (void *)new_cc,
 | 
						|
				   new_cc_len))
 | 
						|
			return 1;
 | 
						|
		if (bpf_getsockopt(ctx, IPPROTO_TCP, TCP_CONGESTION, tmp_cc, sizeof(tmp_cc)))
 | 
						|
			return 1;
 | 
						|
		if (bpf_strncmp(tmp_cc, sizeof(tmp_cc), new_cc))
 | 
						|
			return 1;
 | 
						|
		if (bpf_setsockopt(ctx, IPPROTO_TCP, TCP_CONGESTION, old_cc, sizeof(old_cc)))
 | 
						|
			return 1;
 | 
						|
		return 0;
 | 
						|
	}
 | 
						|
 | 
						|
	if (t->flip)
 | 
						|
		return bpf_test_sockopt_flip(ctx, sk, t, IPPROTO_TCP);
 | 
						|
 | 
						|
	return bpf_test_sockopt_int(ctx, sk, t, IPPROTO_TCP);
 | 
						|
}
 | 
						|
 | 
						|
static int bpf_test_sockopt(void *ctx, struct sock *sk)
 | 
						|
{
 | 
						|
	struct loop_ctx lc = { .ctx = ctx, .sk = sk, };
 | 
						|
	__u16 family, proto;
 | 
						|
	int n;
 | 
						|
 | 
						|
	family = sk->sk_family;
 | 
						|
	proto = sk->sk_protocol;
 | 
						|
 | 
						|
	n = bpf_loop(ARRAY_SIZE(sol_socket_tests), bpf_test_socket_sockopt, &lc, 0);
 | 
						|
	if (n != ARRAY_SIZE(sol_socket_tests))
 | 
						|
		return -1;
 | 
						|
 | 
						|
	if (proto == IPPROTO_TCP) {
 | 
						|
		n = bpf_loop(ARRAY_SIZE(sol_tcp_tests), bpf_test_tcp_sockopt, &lc, 0);
 | 
						|
		if (n != ARRAY_SIZE(sol_tcp_tests))
 | 
						|
			return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	if (family == AF_INET) {
 | 
						|
		n = bpf_loop(ARRAY_SIZE(sol_ip_tests), bpf_test_ip_sockopt, &lc, 0);
 | 
						|
		if (n != ARRAY_SIZE(sol_ip_tests))
 | 
						|
			return -1;
 | 
						|
	} else {
 | 
						|
		n = bpf_loop(ARRAY_SIZE(sol_ipv6_tests), bpf_test_ipv6_sockopt, &lc, 0);
 | 
						|
		if (n != ARRAY_SIZE(sol_ipv6_tests))
 | 
						|
			return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int binddev_test(void *ctx)
 | 
						|
{
 | 
						|
	const char empty_ifname[] = "";
 | 
						|
	int ifindex, zero = 0;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 | 
						|
			   (void *)veth, sizeof(veth)))
 | 
						|
		return -1;
 | 
						|
	if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   &ifindex, sizeof(int)) ||
 | 
						|
	    ifindex != veth_ifindex)
 | 
						|
		return -1;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTODEVICE,
 | 
						|
			   (void *)empty_ifname, sizeof(empty_ifname)))
 | 
						|
		return -1;
 | 
						|
	if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   &ifindex, sizeof(int)) ||
 | 
						|
	    ifindex != 0)
 | 
						|
		return -1;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   (void *)&veth_ifindex, sizeof(int)))
 | 
						|
		return -1;
 | 
						|
	if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   &ifindex, sizeof(int)) ||
 | 
						|
	    ifindex != veth_ifindex)
 | 
						|
		return -1;
 | 
						|
 | 
						|
	if (bpf_setsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   &zero, sizeof(int)))
 | 
						|
		return -1;
 | 
						|
	if (bpf_getsockopt(ctx, SOL_SOCKET, SO_BINDTOIFINDEX,
 | 
						|
			   &ifindex, sizeof(int)) ||
 | 
						|
	    ifindex != 0)
 | 
						|
		return -1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int test_tcp_maxseg(void *ctx, struct sock *sk)
 | 
						|
{
 | 
						|
	int val = 1314, tmp;
 | 
						|
 | 
						|
	if (sk->sk_state != TCP_ESTABLISHED)
 | 
						|
		return bpf_setsockopt(ctx, IPPROTO_TCP, TCP_MAXSEG,
 | 
						|
				      &val, sizeof(val));
 | 
						|
 | 
						|
	if (bpf_getsockopt(ctx, IPPROTO_TCP, TCP_MAXSEG, &tmp, sizeof(tmp)) ||
 | 
						|
	    tmp > val)
 | 
						|
		return -1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int test_tcp_saved_syn(void *ctx, struct sock *sk)
 | 
						|
{
 | 
						|
	__u8 saved_syn[20];
 | 
						|
	int one = 1;
 | 
						|
 | 
						|
	if (sk->sk_state == TCP_LISTEN)
 | 
						|
		return bpf_setsockopt(ctx, IPPROTO_TCP, TCP_SAVE_SYN,
 | 
						|
				      &one, sizeof(one));
 | 
						|
 | 
						|
	return bpf_getsockopt(ctx, IPPROTO_TCP, TCP_SAVED_SYN,
 | 
						|
			      saved_syn, sizeof(saved_syn));
 | 
						|
}
 | 
						|
 | 
						|
SEC("lsm_cgroup/socket_post_create")
 | 
						|
int BPF_PROG(socket_post_create, struct socket *sock, int family,
 | 
						|
	     int type, int protocol, int kern)
 | 
						|
{
 | 
						|
	struct sock *sk = sock->sk;
 | 
						|
 | 
						|
	if (!sk)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	nr_socket_post_create += !bpf_test_sockopt(sk, sk);
 | 
						|
	nr_binddev += !binddev_test(sk);
 | 
						|
 | 
						|
	return 1;
 | 
						|
}
 | 
						|
 | 
						|
SEC("sockops")
 | 
						|
int skops_sockopt(struct bpf_sock_ops *skops)
 | 
						|
{
 | 
						|
	struct bpf_sock *bpf_sk = skops->sk;
 | 
						|
	struct sock *sk;
 | 
						|
 | 
						|
	if (!bpf_sk)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	sk = (struct sock *)bpf_skc_to_tcp_sock(bpf_sk);
 | 
						|
	if (!sk)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	switch (skops->op) {
 | 
						|
	case BPF_SOCK_OPS_TCP_LISTEN_CB:
 | 
						|
		nr_listen += !(bpf_test_sockopt(skops, sk) ||
 | 
						|
			       test_tcp_maxseg(skops, sk) ||
 | 
						|
			       test_tcp_saved_syn(skops, sk));
 | 
						|
		break;
 | 
						|
	case BPF_SOCK_OPS_TCP_CONNECT_CB:
 | 
						|
		nr_connect += !(bpf_test_sockopt(skops, sk) ||
 | 
						|
				test_tcp_maxseg(skops, sk));
 | 
						|
		break;
 | 
						|
	case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
 | 
						|
		nr_active += !(bpf_test_sockopt(skops, sk) ||
 | 
						|
			       test_tcp_maxseg(skops, sk));
 | 
						|
		break;
 | 
						|
	case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
 | 
						|
		nr_passive += !(bpf_test_sockopt(skops, sk) ||
 | 
						|
				test_tcp_maxseg(skops, sk) ||
 | 
						|
				test_tcp_saved_syn(skops, sk));
 | 
						|
		break;
 | 
						|
	}
 | 
						|
 | 
						|
	return 1;
 | 
						|
}
 | 
						|
 | 
						|
char _license[] SEC("license") = "GPL";
 |