1d1ba1204SJakub Sitnicki // SPDX-License-Identifier: GPL-2.0
2d1ba1204SJakub Sitnicki // Copyright (c) 2020 Cloudflare
3d1ba1204SJakub Sitnicki /*
4d1ba1204SJakub Sitnicki * Tests for sockmap/sockhash holding kTLS sockets.
5d1ba1204SJakub Sitnicki */
6d1ba1204SJakub Sitnicki
7935336c1SJakub Sitnicki #include <netinet/tcp.h>
8d1ba1204SJakub Sitnicki #include "test_progs.h"
9d1ba1204SJakub Sitnicki
10d1ba1204SJakub Sitnicki #define MAX_TEST_NAME 80
1150089780SAlexei Starovoitov #define TCP_ULP 31
12d1ba1204SJakub Sitnicki
tcp_server(int family)13d1ba1204SJakub Sitnicki static int tcp_server(int family)
14d1ba1204SJakub Sitnicki {
15d1ba1204SJakub Sitnicki int err, s;
16d1ba1204SJakub Sitnicki
17d1ba1204SJakub Sitnicki s = socket(family, SOCK_STREAM, 0);
18*d155fcb3SWang Yufen if (!ASSERT_GE(s, 0, "socket"))
19d1ba1204SJakub Sitnicki return -1;
20d1ba1204SJakub Sitnicki
21d1ba1204SJakub Sitnicki err = listen(s, SOMAXCONN);
22*d155fcb3SWang Yufen if (!ASSERT_OK(err, "listen"))
23d1ba1204SJakub Sitnicki return -1;
24d1ba1204SJakub Sitnicki
25d1ba1204SJakub Sitnicki return s;
26d1ba1204SJakub Sitnicki }
27d1ba1204SJakub Sitnicki
disconnect(int fd)28d1ba1204SJakub Sitnicki static int disconnect(int fd)
29d1ba1204SJakub Sitnicki {
30d1ba1204SJakub Sitnicki struct sockaddr unspec = { AF_UNSPEC };
31d1ba1204SJakub Sitnicki
32d1ba1204SJakub Sitnicki return connect(fd, &unspec, sizeof(unspec));
33d1ba1204SJakub Sitnicki }
34d1ba1204SJakub Sitnicki
35d1ba1204SJakub Sitnicki /* Disconnect (unhash) a kTLS socket after removing it from sockmap. */
test_sockmap_ktls_disconnect_after_delete(int family,int map)36d1ba1204SJakub Sitnicki static void test_sockmap_ktls_disconnect_after_delete(int family, int map)
37d1ba1204SJakub Sitnicki {
38d1ba1204SJakub Sitnicki struct sockaddr_storage addr = {0};
39d1ba1204SJakub Sitnicki socklen_t len = sizeof(addr);
40d1ba1204SJakub Sitnicki int err, cli, srv, zero = 0;
41d1ba1204SJakub Sitnicki
42d1ba1204SJakub Sitnicki srv = tcp_server(family);
43d1ba1204SJakub Sitnicki if (srv == -1)
44d1ba1204SJakub Sitnicki return;
45d1ba1204SJakub Sitnicki
46d1ba1204SJakub Sitnicki err = getsockname(srv, (struct sockaddr *)&addr, &len);
47*d155fcb3SWang Yufen if (!ASSERT_OK(err, "getsockopt"))
48d1ba1204SJakub Sitnicki goto close_srv;
49d1ba1204SJakub Sitnicki
50d1ba1204SJakub Sitnicki cli = socket(family, SOCK_STREAM, 0);
51*d155fcb3SWang Yufen if (!ASSERT_GE(cli, 0, "socket"))
52d1ba1204SJakub Sitnicki goto close_srv;
53d1ba1204SJakub Sitnicki
54d1ba1204SJakub Sitnicki err = connect(cli, (struct sockaddr *)&addr, len);
55*d155fcb3SWang Yufen if (!ASSERT_OK(err, "connect"))
56d1ba1204SJakub Sitnicki goto close_cli;
57d1ba1204SJakub Sitnicki
58d1ba1204SJakub Sitnicki err = bpf_map_update_elem(map, &zero, &cli, 0);
59*d155fcb3SWang Yufen if (!ASSERT_OK(err, "bpf_map_update_elem"))
60d1ba1204SJakub Sitnicki goto close_cli;
61d1ba1204SJakub Sitnicki
62d1ba1204SJakub Sitnicki err = setsockopt(cli, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls"));
63*d155fcb3SWang Yufen if (!ASSERT_OK(err, "setsockopt(TCP_ULP)"))
64d1ba1204SJakub Sitnicki goto close_cli;
65d1ba1204SJakub Sitnicki
66d1ba1204SJakub Sitnicki err = bpf_map_delete_elem(map, &zero);
67*d155fcb3SWang Yufen if (!ASSERT_OK(err, "bpf_map_delete_elem"))
68d1ba1204SJakub Sitnicki goto close_cli;
69d1ba1204SJakub Sitnicki
70d1ba1204SJakub Sitnicki err = disconnect(cli);
71*d155fcb3SWang Yufen ASSERT_OK(err, "disconnect");
72d1ba1204SJakub Sitnicki
73d1ba1204SJakub Sitnicki close_cli:
74d1ba1204SJakub Sitnicki close(cli);
75d1ba1204SJakub Sitnicki close_srv:
76d1ba1204SJakub Sitnicki close(srv);
77d1ba1204SJakub Sitnicki }
78d1ba1204SJakub Sitnicki
test_sockmap_ktls_update_fails_when_sock_has_ulp(int family,int map)79935336c1SJakub Sitnicki static void test_sockmap_ktls_update_fails_when_sock_has_ulp(int family, int map)
80935336c1SJakub Sitnicki {
81935336c1SJakub Sitnicki struct sockaddr_storage addr = {};
82935336c1SJakub Sitnicki socklen_t len = sizeof(addr);
83935336c1SJakub Sitnicki struct sockaddr_in6 *v6;
84935336c1SJakub Sitnicki struct sockaddr_in *v4;
85935336c1SJakub Sitnicki int err, s, zero = 0;
86935336c1SJakub Sitnicki
87935336c1SJakub Sitnicki switch (family) {
88935336c1SJakub Sitnicki case AF_INET:
89935336c1SJakub Sitnicki v4 = (struct sockaddr_in *)&addr;
90935336c1SJakub Sitnicki v4->sin_family = AF_INET;
91935336c1SJakub Sitnicki break;
92935336c1SJakub Sitnicki case AF_INET6:
93935336c1SJakub Sitnicki v6 = (struct sockaddr_in6 *)&addr;
94935336c1SJakub Sitnicki v6->sin6_family = AF_INET6;
95935336c1SJakub Sitnicki break;
96935336c1SJakub Sitnicki default:
97935336c1SJakub Sitnicki PRINT_FAIL("unsupported socket family %d", family);
98935336c1SJakub Sitnicki return;
99935336c1SJakub Sitnicki }
100935336c1SJakub Sitnicki
101935336c1SJakub Sitnicki s = socket(family, SOCK_STREAM, 0);
102935336c1SJakub Sitnicki if (!ASSERT_GE(s, 0, "socket"))
103935336c1SJakub Sitnicki return;
104935336c1SJakub Sitnicki
105935336c1SJakub Sitnicki err = bind(s, (struct sockaddr *)&addr, len);
106935336c1SJakub Sitnicki if (!ASSERT_OK(err, "bind"))
107935336c1SJakub Sitnicki goto close;
108935336c1SJakub Sitnicki
109935336c1SJakub Sitnicki err = getsockname(s, (struct sockaddr *)&addr, &len);
110935336c1SJakub Sitnicki if (!ASSERT_OK(err, "getsockname"))
111935336c1SJakub Sitnicki goto close;
112935336c1SJakub Sitnicki
113935336c1SJakub Sitnicki err = connect(s, (struct sockaddr *)&addr, len);
114935336c1SJakub Sitnicki if (!ASSERT_OK(err, "connect"))
115935336c1SJakub Sitnicki goto close;
116935336c1SJakub Sitnicki
117935336c1SJakub Sitnicki /* save sk->sk_prot and set it to tls_prots */
118935336c1SJakub Sitnicki err = setsockopt(s, IPPROTO_TCP, TCP_ULP, "tls", strlen("tls"));
119935336c1SJakub Sitnicki if (!ASSERT_OK(err, "setsockopt(TCP_ULP)"))
120935336c1SJakub Sitnicki goto close;
121935336c1SJakub Sitnicki
122935336c1SJakub Sitnicki /* sockmap update should not affect saved sk_prot */
123935336c1SJakub Sitnicki err = bpf_map_update_elem(map, &zero, &s, BPF_ANY);
124935336c1SJakub Sitnicki if (!ASSERT_ERR(err, "sockmap update elem"))
125935336c1SJakub Sitnicki goto close;
126935336c1SJakub Sitnicki
127935336c1SJakub Sitnicki /* call sk->sk_prot->setsockopt to dispatch to saved sk_prot */
128935336c1SJakub Sitnicki err = setsockopt(s, IPPROTO_TCP, TCP_NODELAY, &zero, sizeof(zero));
129935336c1SJakub Sitnicki ASSERT_OK(err, "setsockopt(TCP_NODELAY)");
130935336c1SJakub Sitnicki
131935336c1SJakub Sitnicki close:
132935336c1SJakub Sitnicki close(s);
133935336c1SJakub Sitnicki }
134935336c1SJakub Sitnicki
fmt_test_name(const char * subtest_name,int family,enum bpf_map_type map_type)135935336c1SJakub Sitnicki static const char *fmt_test_name(const char *subtest_name, int family,
136935336c1SJakub Sitnicki enum bpf_map_type map_type)
137935336c1SJakub Sitnicki {
138935336c1SJakub Sitnicki const char *map_type_str = BPF_MAP_TYPE_SOCKMAP ? "SOCKMAP" : "SOCKHASH";
139935336c1SJakub Sitnicki const char *family_str = AF_INET ? "IPv4" : "IPv6";
140935336c1SJakub Sitnicki static char test_name[MAX_TEST_NAME];
141935336c1SJakub Sitnicki
142935336c1SJakub Sitnicki snprintf(test_name, MAX_TEST_NAME,
143935336c1SJakub Sitnicki "sockmap_ktls %s %s %s",
144935336c1SJakub Sitnicki subtest_name, family_str, map_type_str);
145935336c1SJakub Sitnicki
146935336c1SJakub Sitnicki return test_name;
147935336c1SJakub Sitnicki }
148935336c1SJakub Sitnicki
run_tests(int family,enum bpf_map_type map_type)149d1ba1204SJakub Sitnicki static void run_tests(int family, enum bpf_map_type map_type)
150d1ba1204SJakub Sitnicki {
151d1ba1204SJakub Sitnicki int map;
152d1ba1204SJakub Sitnicki
1532fe256a4SAndrii Nakryiko map = bpf_map_create(map_type, NULL, sizeof(int), sizeof(int), 1, NULL);
154*d155fcb3SWang Yufen if (!ASSERT_GE(map, 0, "bpf_map_create"))
155d1ba1204SJakub Sitnicki return;
156d1ba1204SJakub Sitnicki
157935336c1SJakub Sitnicki if (test__start_subtest(fmt_test_name("disconnect_after_delete", family, map_type)))
158d1ba1204SJakub Sitnicki test_sockmap_ktls_disconnect_after_delete(family, map);
159935336c1SJakub Sitnicki if (test__start_subtest(fmt_test_name("update_fails_when_sock_has_ulp", family, map_type)))
160935336c1SJakub Sitnicki test_sockmap_ktls_update_fails_when_sock_has_ulp(family, map);
161d1ba1204SJakub Sitnicki
162d1ba1204SJakub Sitnicki close(map);
163d1ba1204SJakub Sitnicki }
164d1ba1204SJakub Sitnicki
test_sockmap_ktls(void)165d1ba1204SJakub Sitnicki void test_sockmap_ktls(void)
166d1ba1204SJakub Sitnicki {
167d1ba1204SJakub Sitnicki run_tests(AF_INET, BPF_MAP_TYPE_SOCKMAP);
168d1ba1204SJakub Sitnicki run_tests(AF_INET, BPF_MAP_TYPE_SOCKHASH);
169d1ba1204SJakub Sitnicki run_tests(AF_INET6, BPF_MAP_TYPE_SOCKMAP);
170d1ba1204SJakub Sitnicki run_tests(AF_INET6, BPF_MAP_TYPE_SOCKHASH);
171d1ba1204SJakub Sitnicki }
172