// SPDX-License-Identifier: GPL-2.0 // Copyright (c) 2020 Cloudflare /* * Tests for sockmap/sockhash holding kTLS sockets. */ #include <netinet/tcp.h> #include "test_progs.h" #define MAX_TEST_NAME 80 #define TCP_ULP 31 static int tcp_server(int family) { int err, s; s = socket(family, SOCK_STREAM, 0); if (!ASSERT_GE(s, 0, "socket")) return -1; err = listen(s, SOMAXCONN); if (!ASSERT_OK(err, "listen")) return -1; return s; } static int disconnect(int fd) { struct sockaddr unspec = { AF_UNSPEC }; return connect(fd, &unspec, sizeof(unspec)); } /* Disconnect (unhash) a kTLS socket after removing it from sockmap. */ static void test_sockmap_ktls_disconnect_after_delete(int family, int map) { struct sockaddr_storage addr = {0}; socklen_t len = sizeof(addr); int err, cli, srv, zero = 0; srv = tcp_server(family); if (srv == -1) return; err = getsockname(srv, (struct sockaddr *)&addr, &len); if (!ASSERT_OK(err, "getsockopt")) goto close_srv; cli = socket(family, SOCK_STREAM, 0); if (!ASSERT_GE(cli, 0, "socket")) goto close_srv; err = connect(cli, (struct sockaddr *)&addr, len); if (!ASSERT_OK(err, "connect")) goto close_cli; err = bpf_map_update_elem(map, &zero, &cli, 0); if (!ASSERT_OK(err, "bpf_map_update_elem")) goto close_cli; err = setsockopt(cli, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) goto close_cli; err = bpf_map_delete_elem(map, &zero); if (!ASSERT_OK(err, "bpf_map_delete_elem")) goto close_cli; err = disconnect(cli); ASSERT_OK(err, "disconnect"); close_cli: close(cli); close_srv: close(srv); } static void test_sockmap_ktls_update_fails_when_sock_has_ulp(int family, int map) { struct sockaddr_storage addr = {}; socklen_t len = sizeof(addr); struct sockaddr_in6 *v6; struct sockaddr_in *v4; int err, s, zero = 0; switch (family) { case AF_INET: v4 = (struct sockaddr_in *)&addr; v4->sin_family = AF_INET; break; case AF_INET6: v6 = (struct sockaddr_in6 *)&addr; v6->sin6_family = AF_INET6; break; default: PRINT_FAIL("unsupported socket family %d", family); return; } s = socket(family, SOCK_STREAM, 0); if (!ASSERT_GE(s, 0, "socket")) return; err = bind(s, (struct sockaddr *)&addr, len); if (!ASSERT_OK(err, "bind")) goto close; err = getsockname(s, (struct sockaddr *)&addr, &len); if (!ASSERT_OK(err, "getsockname")) goto close; err = connect(s, (struct sockaddr *)&addr, len); if (!ASSERT_OK(err, "connect")) goto close; /* save sk->sk_prot and set it to tls_prots */ err = setsockopt(s, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls")); if (!ASSERT_OK(err, "setsockopt(TCP_ULP)")) goto close; /* sockmap update should not affect saved sk_prot */ err = bpf_map_update_elem(map, &zero, &s, BPF_ANY); if (!ASSERT_ERR(err, "sockmap update elem")) goto close; /* call sk->sk_prot->setsockopt to dispatch to saved sk_prot */ err = setsockopt(s, IPPROTO_TCP, TCP_NODELAY, &zero, sizeof(zero)); ASSERT_OK(err, "setsockopt(TCP_NODELAY)"); close: close(s); } static const char *fmt_test_name(const char *subtest_name, int family, enum bpf_map_type map_type) { const char *map_type_str = BPF_MAP_TYPE_SOCKMAP ? "SOCKMAP" : "SOCKHASH"; const char *family_str = AF_INET ? "IPv4" : "IPv6"; static char test_name[MAX_TEST_NAME]; snprintf(test_name, MAX_TEST_NAME, "sockmap_ktls %s %s %s", subtest_name, family_str, map_type_str); return test_name; } static void run_tests(int family, enum bpf_map_type map_type) { int map; map = bpf_map_create(map_type, NULL, sizeof(int), sizeof(int), 1, NULL); if (!ASSERT_GE(map, 0, "bpf_map_create")) return; if (test__start_subtest(fmt_test_name("disconnect_after_delete", family, map_type))) test_sockmap_ktls_disconnect_after_delete(family, map); if (test__start_subtest(fmt_test_name("update_fails_when_sock_has_ulp", family, map_type))) test_sockmap_ktls_update_fails_when_sock_has_ulp(family, map); close(map); } void test_sockmap_ktls(void) { run_tests(AF_INET, BPF_MAP_TYPE_SOCKMAP); run_tests(AF_INET, BPF_MAP_TYPE_SOCKHASH); run_tests(AF_INET6, BPF_MAP_TYPE_SOCKMAP); run_tests(AF_INET6, BPF_MAP_TYPE_SOCKHASH); }