xref: /linux/tools/testing/selftests/bpf/prog_tests/tcp_hdr_options.c (revision c532de5a67a70f8533d495f8f2aaa9a0491c3ad0)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2020 Facebook */
3 
4 #define _GNU_SOURCE
5 #include <sched.h>
6 #include <stdio.h>
7 #include <stdlib.h>
8 #include <sys/socket.h>
9 #include <linux/compiler.h>
10 
11 #include "test_progs.h"
12 #include "cgroup_helpers.h"
13 #include "network_helpers.h"
14 #include "test_tcp_hdr_options.h"
15 #include "test_tcp_hdr_options.skel.h"
16 #include "test_misc_tcp_hdr_options.skel.h"
17 
18 #define LO_ADDR6 "::1"
19 #define CG_NAME "/tcpbpf-hdr-opt-test"
20 
21 static struct bpf_test_option exp_passive_estab_in;
22 static struct bpf_test_option exp_active_estab_in;
23 static struct bpf_test_option exp_passive_fin_in;
24 static struct bpf_test_option exp_active_fin_in;
25 static struct hdr_stg exp_passive_hdr_stg;
26 static struct hdr_stg exp_active_hdr_stg = { .active = true, };
27 
28 static struct test_misc_tcp_hdr_options *misc_skel;
29 static struct test_tcp_hdr_options *skel;
30 static int lport_linum_map_fd;
31 static int hdr_stg_map_fd;
32 static __u32 duration;
33 static int cg_fd;
34 
35 struct sk_fds {
36 	int srv_fd;
37 	int passive_fd;
38 	int active_fd;
39 	int passive_lport;
40 	int active_lport;
41 };
42 
43 static int create_netns(void)
44 {
45 	if (!ASSERT_OK(unshare(CLONE_NEWNET), "create netns"))
46 		return -1;
47 
48 	if (!ASSERT_OK(system("ip link set dev lo up"), "run ip cmd"))
49 		return -1;
50 
51 	return 0;
52 }
53 
54 static void print_hdr_stg(const struct hdr_stg *hdr_stg, const char *prefix)
55 {
56 	fprintf(stderr, "%s{active:%u, resend_syn:%u, syncookie:%u, fastopen:%u}\n",
57 		prefix ? : "", hdr_stg->active, hdr_stg->resend_syn,
58 		hdr_stg->syncookie, hdr_stg->fastopen);
59 }
60 
61 static void print_option(const struct bpf_test_option *opt, const char *prefix)
62 {
63 	fprintf(stderr, "%s{flags:0x%x, max_delack_ms:%u, rand:0x%x}\n",
64 		prefix ? : "", opt->flags, opt->max_delack_ms, opt->rand);
65 }
66 
67 static void sk_fds_close(struct sk_fds *sk_fds)
68 {
69 	close(sk_fds->srv_fd);
70 	close(sk_fds->passive_fd);
71 	close(sk_fds->active_fd);
72 }
73 
74 static int sk_fds_shutdown(struct sk_fds *sk_fds)
75 {
76 	int ret, abyte;
77 
78 	shutdown(sk_fds->active_fd, SHUT_WR);
79 	ret = read(sk_fds->passive_fd, &abyte, sizeof(abyte));
80 	if (!ASSERT_EQ(ret, 0, "read-after-shutdown(passive_fd):"))
81 		return -1;
82 
83 	shutdown(sk_fds->passive_fd, SHUT_WR);
84 	ret = read(sk_fds->active_fd, &abyte, sizeof(abyte));
85 	if (!ASSERT_EQ(ret, 0, "read-after-shutdown(active_fd):"))
86 		return -1;
87 
88 	return 0;
89 }
90 
91 static int sk_fds_connect(struct sk_fds *sk_fds, bool fast_open)
92 {
93 	const char fast[] = "FAST!!!";
94 	struct sockaddr_in6 addr6;
95 	socklen_t len;
96 
97 	sk_fds->srv_fd = start_server(AF_INET6, SOCK_STREAM, LO_ADDR6, 0, 0);
98 	if (!ASSERT_NEQ(sk_fds->srv_fd, -1, "start_server"))
99 		goto error;
100 
101 	if (fast_open)
102 		sk_fds->active_fd = fastopen_connect(sk_fds->srv_fd, fast,
103 						     sizeof(fast), 0);
104 	else
105 		sk_fds->active_fd = connect_to_fd(sk_fds->srv_fd, 0);
106 
107 	if (!ASSERT_NEQ(sk_fds->active_fd, -1, "")) {
108 		close(sk_fds->srv_fd);
109 		goto error;
110 	}
111 
112 	len = sizeof(addr6);
113 	if (!ASSERT_OK(getsockname(sk_fds->srv_fd, (struct sockaddr *)&addr6,
114 				   &len), "getsockname(srv_fd)"))
115 		goto error_close;
116 	sk_fds->passive_lport = ntohs(addr6.sin6_port);
117 
118 	len = sizeof(addr6);
119 	if (!ASSERT_OK(getsockname(sk_fds->active_fd, (struct sockaddr *)&addr6,
120 				   &len), "getsockname(active_fd)"))
121 		goto error_close;
122 	sk_fds->active_lport = ntohs(addr6.sin6_port);
123 
124 	sk_fds->passive_fd = accept(sk_fds->srv_fd, NULL, 0);
125 	if (!ASSERT_NEQ(sk_fds->passive_fd, -1, "accept(srv_fd)"))
126 		goto error_close;
127 
128 	if (fast_open) {
129 		char bytes_in[sizeof(fast)];
130 		int ret;
131 
132 		ret = read(sk_fds->passive_fd, bytes_in, sizeof(bytes_in));
133 		if (!ASSERT_EQ(ret, sizeof(fast), "read fastopen syn data")) {
134 			close(sk_fds->passive_fd);
135 			goto error_close;
136 		}
137 	}
138 
139 	return 0;
140 
141 error_close:
142 	close(sk_fds->active_fd);
143 	close(sk_fds->srv_fd);
144 
145 error:
146 	memset(sk_fds, -1, sizeof(*sk_fds));
147 	return -1;
148 }
149 
150 static int check_hdr_opt(const struct bpf_test_option *exp,
151 			 const struct bpf_test_option *act,
152 			 const char *hdr_desc)
153 {
154 	if (!ASSERT_EQ(memcmp(exp, act, sizeof(*exp)), 0, hdr_desc)) {
155 		print_option(exp, "expected: ");
156 		print_option(act, "  actual: ");
157 		return -1;
158 	}
159 
160 	return 0;
161 }
162 
163 static int check_hdr_stg(const struct hdr_stg *exp, int fd,
164 			 const char *stg_desc)
165 {
166 	struct hdr_stg act;
167 
168 	if (!ASSERT_OK(bpf_map_lookup_elem(hdr_stg_map_fd, &fd, &act),
169 		  "map_lookup(hdr_stg_map_fd)"))
170 		return -1;
171 
172 	if (!ASSERT_EQ(memcmp(exp, &act, sizeof(*exp)), 0, stg_desc)) {
173 		print_hdr_stg(exp, "expected: ");
174 		print_hdr_stg(&act, "  actual: ");
175 		return -1;
176 	}
177 
178 	return 0;
179 }
180 
181 static int check_error_linum(const struct sk_fds *sk_fds)
182 {
183 	unsigned int nr_errors = 0;
184 	struct linum_err linum_err;
185 	int lport;
186 
187 	lport = sk_fds->passive_lport;
188 	if (!bpf_map_lookup_elem(lport_linum_map_fd, &lport, &linum_err)) {
189 		fprintf(stderr,
190 			"bpf prog error out at lport:passive(%d), linum:%u err:%d\n",
191 			lport, linum_err.linum, linum_err.err);
192 		nr_errors++;
193 	}
194 
195 	lport = sk_fds->active_lport;
196 	if (!bpf_map_lookup_elem(lport_linum_map_fd, &lport, &linum_err)) {
197 		fprintf(stderr,
198 			"bpf prog error out at lport:active(%d), linum:%u err:%d\n",
199 			lport, linum_err.linum, linum_err.err);
200 		nr_errors++;
201 	}
202 
203 	return nr_errors;
204 }
205 
206 static void check_hdr_and_close_fds(struct sk_fds *sk_fds)
207 {
208 	const __u32 expected_inherit_cb_flags =
209 		BPF_SOCK_OPS_PARSE_UNKNOWN_HDR_OPT_CB_FLAG |
210 		BPF_SOCK_OPS_WRITE_HDR_OPT_CB_FLAG |
211 		BPF_SOCK_OPS_STATE_CB_FLAG;
212 
213 	if (sk_fds_shutdown(sk_fds))
214 		goto check_linum;
215 
216 	if (!ASSERT_EQ(expected_inherit_cb_flags, skel->bss->inherit_cb_flags,
217 		       "inherit_cb_flags"))
218 		goto check_linum;
219 
220 	if (check_hdr_stg(&exp_passive_hdr_stg, sk_fds->passive_fd,
221 			  "passive_hdr_stg"))
222 		goto check_linum;
223 
224 	if (check_hdr_stg(&exp_active_hdr_stg, sk_fds->active_fd,
225 			  "active_hdr_stg"))
226 		goto check_linum;
227 
228 	if (check_hdr_opt(&exp_passive_estab_in, &skel->bss->passive_estab_in,
229 			  "passive_estab_in"))
230 		goto check_linum;
231 
232 	if (check_hdr_opt(&exp_active_estab_in, &skel->bss->active_estab_in,
233 			  "active_estab_in"))
234 		goto check_linum;
235 
236 	if (check_hdr_opt(&exp_passive_fin_in, &skel->bss->passive_fin_in,
237 			  "passive_fin_in"))
238 		goto check_linum;
239 
240 	check_hdr_opt(&exp_active_fin_in, &skel->bss->active_fin_in,
241 		      "active_fin_in");
242 
243 check_linum:
244 	ASSERT_FALSE(check_error_linum(sk_fds), "check_error_linum");
245 	sk_fds_close(sk_fds);
246 }
247 
248 static void prepare_out(void)
249 {
250 	skel->bss->active_syn_out = exp_passive_estab_in;
251 	skel->bss->passive_synack_out = exp_active_estab_in;
252 
253 	skel->bss->active_fin_out = exp_passive_fin_in;
254 	skel->bss->passive_fin_out = exp_active_fin_in;
255 }
256 
257 static void reset_test(void)
258 {
259 	size_t optsize = sizeof(struct bpf_test_option);
260 	int lport, err;
261 
262 	memset(&skel->bss->passive_synack_out, 0, optsize);
263 	memset(&skel->bss->passive_fin_out, 0, optsize);
264 
265 	memset(&skel->bss->passive_estab_in, 0, optsize);
266 	memset(&skel->bss->passive_fin_in, 0, optsize);
267 
268 	memset(&skel->bss->active_syn_out, 0, optsize);
269 	memset(&skel->bss->active_fin_out, 0, optsize);
270 
271 	memset(&skel->bss->active_estab_in, 0, optsize);
272 	memset(&skel->bss->active_fin_in, 0, optsize);
273 
274 	skel->bss->inherit_cb_flags = 0;
275 
276 	skel->data->test_kind = TCPOPT_EXP;
277 	skel->data->test_magic = 0xeB9F;
278 
279 	memset(&exp_passive_estab_in, 0, optsize);
280 	memset(&exp_active_estab_in, 0, optsize);
281 	memset(&exp_passive_fin_in, 0, optsize);
282 	memset(&exp_active_fin_in, 0, optsize);
283 
284 	memset(&exp_passive_hdr_stg, 0, sizeof(exp_passive_hdr_stg));
285 	memset(&exp_active_hdr_stg, 0, sizeof(exp_active_hdr_stg));
286 	exp_active_hdr_stg.active = true;
287 
288 	err = bpf_map_get_next_key(lport_linum_map_fd, NULL, &lport);
289 	while (!err) {
290 		bpf_map_delete_elem(lport_linum_map_fd, &lport);
291 		err = bpf_map_get_next_key(lport_linum_map_fd, &lport, &lport);
292 	}
293 }
294 
295 static void fastopen_estab(void)
296 {
297 	struct bpf_link *link;
298 	struct sk_fds sk_fds;
299 
300 	hdr_stg_map_fd = bpf_map__fd(skel->maps.hdr_stg_map);
301 	lport_linum_map_fd = bpf_map__fd(skel->maps.lport_linum_map);
302 
303 	exp_passive_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS;
304 	exp_passive_estab_in.rand = 0xfa;
305 	exp_passive_estab_in.max_delack_ms = 11;
306 
307 	exp_active_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS;
308 	exp_active_estab_in.rand = 0xce;
309 	exp_active_estab_in.max_delack_ms = 22;
310 
311 	exp_passive_hdr_stg.fastopen = true;
312 
313 	prepare_out();
314 
315 	/* Allow fastopen without fastopen cookie */
316 	if (write_sysctl("/proc/sys/net/ipv4/tcp_fastopen", "1543"))
317 		return;
318 
319 	link = bpf_program__attach_cgroup(skel->progs.estab, cg_fd);
320 	if (!ASSERT_OK_PTR(link, "attach_cgroup(estab)"))
321 		return;
322 
323 	if (sk_fds_connect(&sk_fds, true)) {
324 		bpf_link__destroy(link);
325 		return;
326 	}
327 
328 	check_hdr_and_close_fds(&sk_fds);
329 	bpf_link__destroy(link);
330 }
331 
332 static void syncookie_estab(void)
333 {
334 	struct bpf_link *link;
335 	struct sk_fds sk_fds;
336 
337 	hdr_stg_map_fd = bpf_map__fd(skel->maps.hdr_stg_map);
338 	lport_linum_map_fd = bpf_map__fd(skel->maps.lport_linum_map);
339 
340 	exp_passive_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS;
341 	exp_passive_estab_in.rand = 0xfa;
342 	exp_passive_estab_in.max_delack_ms = 11;
343 
344 	exp_active_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS |
345 					OPTION_F_RESEND;
346 	exp_active_estab_in.rand = 0xce;
347 	exp_active_estab_in.max_delack_ms = 22;
348 
349 	exp_passive_hdr_stg.syncookie = true;
350 	exp_active_hdr_stg.resend_syn = true;
351 
352 	prepare_out();
353 
354 	/* Clear the RESEND to ensure the bpf prog can learn
355 	 * want_cookie and set the RESEND by itself.
356 	 */
357 	skel->bss->passive_synack_out.flags &= ~OPTION_F_RESEND;
358 
359 	/* Enforce syncookie mode */
360 	if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "2"))
361 		return;
362 
363 	link = bpf_program__attach_cgroup(skel->progs.estab, cg_fd);
364 	if (!ASSERT_OK_PTR(link, "attach_cgroup(estab)"))
365 		return;
366 
367 	if (sk_fds_connect(&sk_fds, false)) {
368 		bpf_link__destroy(link);
369 		return;
370 	}
371 
372 	check_hdr_and_close_fds(&sk_fds);
373 	bpf_link__destroy(link);
374 }
375 
376 static void fin(void)
377 {
378 	struct bpf_link *link;
379 	struct sk_fds sk_fds;
380 
381 	hdr_stg_map_fd = bpf_map__fd(skel->maps.hdr_stg_map);
382 	lport_linum_map_fd = bpf_map__fd(skel->maps.lport_linum_map);
383 
384 	exp_passive_fin_in.flags = OPTION_F_RAND;
385 	exp_passive_fin_in.rand = 0xfa;
386 
387 	exp_active_fin_in.flags = OPTION_F_RAND;
388 	exp_active_fin_in.rand = 0xce;
389 
390 	prepare_out();
391 
392 	if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "1"))
393 		return;
394 
395 	link = bpf_program__attach_cgroup(skel->progs.estab, cg_fd);
396 	if (!ASSERT_OK_PTR(link, "attach_cgroup(estab)"))
397 		return;
398 
399 	if (sk_fds_connect(&sk_fds, false)) {
400 		bpf_link__destroy(link);
401 		return;
402 	}
403 
404 	check_hdr_and_close_fds(&sk_fds);
405 	bpf_link__destroy(link);
406 }
407 
408 static void __simple_estab(bool exprm)
409 {
410 	struct bpf_link *link;
411 	struct sk_fds sk_fds;
412 
413 	hdr_stg_map_fd = bpf_map__fd(skel->maps.hdr_stg_map);
414 	lport_linum_map_fd = bpf_map__fd(skel->maps.lport_linum_map);
415 
416 	exp_passive_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS;
417 	exp_passive_estab_in.rand = 0xfa;
418 	exp_passive_estab_in.max_delack_ms = 11;
419 
420 	exp_active_estab_in.flags = OPTION_F_RAND | OPTION_F_MAX_DELACK_MS;
421 	exp_active_estab_in.rand = 0xce;
422 	exp_active_estab_in.max_delack_ms = 22;
423 
424 	prepare_out();
425 
426 	if (!exprm) {
427 		skel->data->test_kind = 0xB9;
428 		skel->data->test_magic = 0;
429 	}
430 
431 	if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "1"))
432 		return;
433 
434 	link = bpf_program__attach_cgroup(skel->progs.estab, cg_fd);
435 	if (!ASSERT_OK_PTR(link, "attach_cgroup(estab)"))
436 		return;
437 
438 	if (sk_fds_connect(&sk_fds, false)) {
439 		bpf_link__destroy(link);
440 		return;
441 	}
442 
443 	check_hdr_and_close_fds(&sk_fds);
444 	bpf_link__destroy(link);
445 }
446 
447 static void no_exprm_estab(void)
448 {
449 	__simple_estab(false);
450 }
451 
452 static void simple_estab(void)
453 {
454 	__simple_estab(true);
455 }
456 
457 static void misc(void)
458 {
459 	const char send_msg[] = "MISC!!!";
460 	char recv_msg[sizeof(send_msg)];
461 	const unsigned int nr_data = 2;
462 	struct bpf_link *link;
463 	struct sk_fds sk_fds;
464 	int i, ret;
465 
466 	lport_linum_map_fd = bpf_map__fd(misc_skel->maps.lport_linum_map);
467 
468 	if (write_sysctl("/proc/sys/net/ipv4/tcp_syncookies", "1"))
469 		return;
470 
471 	link = bpf_program__attach_cgroup(misc_skel->progs.misc_estab, cg_fd);
472 	if (!ASSERT_OK_PTR(link, "attach_cgroup(misc_estab)"))
473 		return;
474 
475 	if (sk_fds_connect(&sk_fds, false)) {
476 		bpf_link__destroy(link);
477 		return;
478 	}
479 
480 	for (i = 0; i < nr_data; i++) {
481 		/* MSG_EOR to ensure skb will not be combined */
482 		ret = send(sk_fds.active_fd, send_msg, sizeof(send_msg),
483 			   MSG_EOR);
484 		if (!ASSERT_EQ(ret, sizeof(send_msg), "send(msg)"))
485 			goto check_linum;
486 
487 		ret = read(sk_fds.passive_fd, recv_msg, sizeof(recv_msg));
488 		if (!ASSERT_EQ(ret, sizeof(send_msg), "read(msg)"))
489 			goto check_linum;
490 	}
491 
492 	if (sk_fds_shutdown(&sk_fds))
493 		goto check_linum;
494 
495 	ASSERT_EQ(misc_skel->bss->nr_syn, 1, "unexpected nr_syn");
496 
497 	ASSERT_EQ(misc_skel->bss->nr_data, nr_data, "unexpected nr_data");
498 
499 	/* The last ACK may have been delayed, so it is either 1 or 2. */
500 	CHECK(misc_skel->bss->nr_pure_ack != 1 &&
501 	      misc_skel->bss->nr_pure_ack != 2,
502 	      "unexpected nr_pure_ack",
503 	      "expected (1 or 2) != actual (%u)\n",
504 		misc_skel->bss->nr_pure_ack);
505 
506 	ASSERT_EQ(misc_skel->bss->nr_fin, 1, "unexpected nr_fin");
507 
508 	ASSERT_EQ(misc_skel->bss->nr_hwtstamp, 0, "nr_hwtstamp");
509 
510 check_linum:
511 	ASSERT_FALSE(check_error_linum(&sk_fds), "check_error_linum");
512 	sk_fds_close(&sk_fds);
513 	bpf_link__destroy(link);
514 }
515 
516 struct test {
517 	const char *desc;
518 	void (*run)(void);
519 };
520 
521 #define DEF_TEST(name) { #name, name }
522 static struct test tests[] = {
523 	DEF_TEST(simple_estab),
524 	DEF_TEST(no_exprm_estab),
525 	DEF_TEST(syncookie_estab),
526 	DEF_TEST(fastopen_estab),
527 	DEF_TEST(fin),
528 	DEF_TEST(misc),
529 };
530 
531 void test_tcp_hdr_options(void)
532 {
533 	int i;
534 
535 	skel = test_tcp_hdr_options__open_and_load();
536 	if (!ASSERT_OK_PTR(skel, "open and load skel"))
537 		return;
538 
539 	misc_skel = test_misc_tcp_hdr_options__open_and_load();
540 	if (!ASSERT_OK_PTR(misc_skel, "open and load misc test skel"))
541 		goto skel_destroy;
542 
543 	cg_fd = test__join_cgroup(CG_NAME);
544 	if (!ASSERT_GE(cg_fd, 0, "join_cgroup"))
545 		goto skel_destroy;
546 
547 	for (i = 0; i < ARRAY_SIZE(tests); i++) {
548 		if (!test__start_subtest(tests[i].desc))
549 			continue;
550 
551 		if (create_netns())
552 			break;
553 
554 		tests[i].run();
555 
556 		reset_test();
557 	}
558 
559 	close(cg_fd);
560 skel_destroy:
561 	test_misc_tcp_hdr_options__destroy(misc_skel);
562 	test_tcp_hdr_options__destroy(skel);
563 }
564