| // SPDX-License-Identifier: GPL-2.0 |
| // Copyright (c) 2020 Cloudflare |
| /* |
| * Tests for sockmap/sockhash holding kTLS sockets. |
| */ |
| |
| #include <netinet/tcp.h> |
| #include "test_progs.h" |
| |
| #define MAX_TEST_NAME 80 |
| #define TCP_ULP 31 |
| |
| static int tcp_server(int family) |
| { |
| int err, s; |
| |
| s = socket(family, SOCK_STREAM, 0); |
| if (!ASSERT_GE(s, 0, "socket")) |
| return -1; |
| |
| err = listen(s, SOMAXCONN); |
| if (!ASSERT_OK(err, "listen")) |
| return -1; |
| |
| return s; |
| } |
| |
| static int disconnect(int fd) |
| { |
| struct sockaddr unspec = { AF_UNSPEC }; |
| |
| return connect(fd, &unspec, sizeof(unspec)); |
| } |
| |
| /* Disconnect (unhash) a kTLS socket after removing it from sockmap. */ |
| static void test_sockmap_ktls_disconnect_after_delete(int family, int map) |
| { |
| struct sockaddr_storage addr = {0}; |
| socklen_t len = sizeof(addr); |
| int err, cli, srv, zero = 0; |
| |
| srv = tcp_server(family); |
| if (srv == -1) |
| return; |
| |
| err = getsockname(srv, (struct sockaddr *)&addr, &len); |
| if (!ASSERT_OK(err, "getsockopt")) |
| goto close_srv; |
| |
| cli = socket(family, SOCK_STREAM, 0); |
| if (!ASSERT_GE(cli, 0, "socket")) |
| goto close_srv; |
| |
| err = connect(cli, (struct sockaddr *)&addr, len); |
| if (!ASSERT_OK(err, "connect")) |
| goto close_cli; |
| |
| err = bpf_map_update_elem(map, &zero, &cli, 0); |
| if (!ASSERT_OK(err, "bpf_map_update_elem")) |
| goto close_cli; |
| |
| err = setsockopt(cli, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); |
| if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) |
| goto close_cli; |
| |
| err = bpf_map_delete_elem(map, &zero); |
| if (!ASSERT_OK(err, "bpf_map_delete_elem")) |
| goto close_cli; |
| |
| err = disconnect(cli); |
| ASSERT_OK(err, "disconnect"); |
| |
| close_cli: |
| close(cli); |
| close_srv: |
| close(srv); |
| } |
| |
| static void test_sockmap_ktls_update_fails_when_sock_has_ulp(int family, int map) |
| { |
| struct sockaddr_storage addr = {}; |
| socklen_t len = sizeof(addr); |
| struct sockaddr_in6 *v6; |
| struct sockaddr_in *v4; |
| int err, s, zero = 0; |
| |
| switch (family) { |
| case AF_INET: |
| v4 = (struct sockaddr_in *)&addr; |
| v4->sin_family = AF_INET; |
| break; |
| case AF_INET6: |
| v6 = (struct sockaddr_in6 *)&addr; |
| v6->sin6_family = AF_INET6; |
| break; |
| default: |
| PRINT_FAIL("unsupported socket family %d", family); |
| return; |
| } |
| |
| s = socket(family, SOCK_STREAM, 0); |
| if (!ASSERT_GE(s, 0, "socket")) |
| return; |
| |
| err = bind(s, (struct sockaddr *)&addr, len); |
| if (!ASSERT_OK(err, "bind")) |
| goto close; |
| |
| err = getsockname(s, (struct sockaddr *)&addr, &len); |
| if (!ASSERT_OK(err, "getsockname")) |
| goto close; |
| |
| err = connect(s, (struct sockaddr *)&addr, len); |
| if (!ASSERT_OK(err, "connect")) |
| goto close; |
| |
| /* save sk->sk_prot and set it to tls_prots */ |
| err = setsockopt(s, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); |
| if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) |
| goto close; |
| |
| /* sockmap update should not affect saved sk_prot */ |
| err = bpf_map_update_elem(map, &zero, &s, BPF_ANY); |
| if (!ASSERT_ERR(err, "sockmap update elem")) |
| goto close; |
| |
| /* call sk->sk_prot->setsockopt to dispatch to saved sk_prot */ |
| err = setsockopt(s, IPPROTO_TCP, TCP_NODELAY, &zero, sizeof(zero)); |
| ASSERT_OK(err, "setsockopt(TCP_NODELAY)"); |
| |
| close: |
| close(s); |
| } |
| |
| static const char *fmt_test_name(const char *subtest_name, int family, |
| enum bpf_map_type map_type) |
| { |
| const char *map_type_str = BPF_MAP_TYPE_SOCKMAP ? "SOCKMAP" : "SOCKHASH"; |
| const char *family_str = AF_INET ? "IPv4" : "IPv6"; |
| static char test_name[MAX_TEST_NAME]; |
| |
| snprintf(test_name, MAX_TEST_NAME, |
| "sockmap_ktls %s %s %s", |
| subtest_name, family_str, map_type_str); |
| |
| return test_name; |
| } |
| |
| static void run_tests(int family, enum bpf_map_type map_type) |
| { |
| int map; |
| |
| map = bpf_map_create(map_type, NULL, sizeof(int), sizeof(int), 1, NULL); |
| if (!ASSERT_GE(map, 0, "bpf_map_create")) |
| return; |
| |
| if (test__start_subtest(fmt_test_name("disconnect_after_delete", family, map_type))) |
| test_sockmap_ktls_disconnect_after_delete(family, map); |
| if (test__start_subtest(fmt_test_name("update_fails_when_sock_has_ulp", family, map_type))) |
| test_sockmap_ktls_update_fails_when_sock_has_ulp(family, map); |
| |
| close(map); |
| } |
| |
| void test_sockmap_ktls(void) |
| { |
| run_tests(AF_INET, BPF_MAP_TYPE_SOCKMAP); |
| run_tests(AF_INET, BPF_MAP_TYPE_SOCKHASH); |
| run_tests(AF_INET6, BPF_MAP_TYPE_SOCKMAP); |
| run_tests(AF_INET6, BPF_MAP_TYPE_SOCKHASH); |
| } |