cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

test_tcpbpf_kern.c (4141B)


      1// SPDX-License-Identifier: GPL-2.0
      2#include <stddef.h>
      3#include <string.h>
      4#include <netinet/in.h>
      5#include <linux/bpf.h>
      6#include <linux/if_ether.h>
      7#include <linux/if_packet.h>
      8#include <linux/ip.h>
      9#include <linux/ipv6.h>
     10#include <linux/types.h>
     11#include <linux/socket.h>
     12#include <linux/tcp.h>
     13#include <bpf/bpf_helpers.h>
     14#include <bpf/bpf_endian.h>
     15#include "bpf_tcp_helpers.h"
     16#include "test_tcpbpf.h"
     17
     18struct tcpbpf_globals global = {};
     19
     20/**
     21 * SOL_TCP is defined in <netinet/tcp.h> while
     22 * TCP_SAVED_SYN is defined in already included <linux/tcp.h>
     23 */
     24#ifndef SOL_TCP
     25#define SOL_TCP 6
     26#endif
     27
     28static __always_inline int get_tp_window_clamp(struct bpf_sock_ops *skops)
     29{
     30	struct bpf_sock *sk;
     31	struct tcp_sock *tp;
     32
     33	sk = skops->sk;
     34	if (!sk)
     35		return -1;
     36	tp = bpf_skc_to_tcp_sock(sk);
     37	if (!tp)
     38		return -1;
     39	return tp->window_clamp;
     40}
     41
     42SEC("sockops")
     43int bpf_testcb(struct bpf_sock_ops *skops)
     44{
     45	char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
     46	struct bpf_sock_ops *reuse = skops;
     47	struct tcphdr *thdr;
     48	int window_clamp = 9216;
     49	int good_call_rv = 0;
     50	int bad_call_rv = 0;
     51	int save_syn = 1;
     52	int rv = -1;
     53	int v = 0;
     54	int op;
     55
     56	/* Test reading fields in bpf_sock_ops using single register */
     57	asm volatile (
     58		"%[reuse] = *(u32 *)(%[reuse] +96)"
     59		: [reuse] "+r"(reuse)
     60		:);
     61
     62	asm volatile (
     63		"%[op] = *(u32 *)(%[skops] +96)"
     64		: [op] "+r"(op)
     65		: [skops] "r"(skops)
     66		:);
     67
     68	asm volatile (
     69		"r9 = %[skops];\n"
     70		"r8 = *(u32 *)(r9 +164);\n"
     71		"*(u32 *)(r9 +164) = r8;\n"
     72		:: [skops] "r"(skops)
     73		: "r9", "r8");
     74
     75	asm volatile (
     76		"r1 = %[skops];\n"
     77		"r1 = *(u64 *)(r1 +184);\n"
     78		"if r1 == 0 goto +1;\n"
     79		"r1 = *(u32 *)(r1 +4);\n"
     80		:: [skops] "r"(skops):"r1");
     81
     82	asm volatile (
     83		"r9 = %[skops];\n"
     84		"r9 = *(u64 *)(r9 +184);\n"
     85		"if r9 == 0 goto +1;\n"
     86		"r9 = *(u32 *)(r9 +4);\n"
     87		:: [skops] "r"(skops):"r9");
     88
     89	asm volatile (
     90		"r1 = %[skops];\n"
     91		"r2 = *(u64 *)(r1 +184);\n"
     92		"if r2 == 0 goto +1;\n"
     93		"r2 = *(u32 *)(r2 +4);\n"
     94		:: [skops] "r"(skops):"r1", "r2");
     95
     96	op = (int) skops->op;
     97
     98	global.event_map |= (1 << op);
     99
    100	switch (op) {
    101	case BPF_SOCK_OPS_TCP_CONNECT_CB:
    102		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
    103				    &window_clamp, sizeof(window_clamp));
    104		global.window_clamp_client = get_tp_window_clamp(skops);
    105		break;
    106	case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
    107		/* Test failure to set largest cb flag (assumes not defined) */
    108		global.bad_cb_test_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
    109		/* Set callback */
    110		global.good_cb_test_rv = bpf_sock_ops_cb_flags_set(skops,
    111						 BPF_SOCK_OPS_STATE_CB_FLAG);
    112		break;
    113	case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
    114		skops->sk_txhash = 0x12345f;
    115		v = 0xff;
    116		rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
    117				    sizeof(v));
    118		if (skops->family == AF_INET6) {
    119			v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
    120					   header, (sizeof(struct ipv6hdr) +
    121						    sizeof(struct tcphdr)));
    122			if (!v) {
    123				int offset = sizeof(struct ipv6hdr);
    124
    125				thdr = (struct tcphdr *)(header + offset);
    126				v = thdr->syn;
    127
    128				global.tcp_saved_syn = v;
    129			}
    130		}
    131		rv = bpf_setsockopt(skops, SOL_TCP, TCP_WINDOW_CLAMP,
    132				    &window_clamp, sizeof(window_clamp));
    133
    134		global.window_clamp_server = get_tp_window_clamp(skops);
    135		break;
    136	case BPF_SOCK_OPS_RTO_CB:
    137		break;
    138	case BPF_SOCK_OPS_RETRANS_CB:
    139		break;
    140	case BPF_SOCK_OPS_STATE_CB:
    141		if (skops->args[1] == BPF_TCP_CLOSE) {
    142			if (skops->args[0] == BPF_TCP_LISTEN) {
    143				global.num_listen++;
    144			} else {
    145				global.total_retrans = skops->total_retrans;
    146				global.data_segs_in = skops->data_segs_in;
    147				global.data_segs_out = skops->data_segs_out;
    148				global.bytes_received = skops->bytes_received;
    149				global.bytes_acked = skops->bytes_acked;
    150			}
    151			global.num_close_events++;
    152		}
    153		break;
    154	case BPF_SOCK_OPS_TCP_LISTEN_CB:
    155		bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
    156		v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
    157				   &save_syn, sizeof(save_syn));
    158		/* Update global map w/ result of setsock opt */
    159		global.tcp_save_syn = v;
    160		break;
    161	default:
    162		rv = -1;
    163	}
    164	skops->reply = rv;
    165	return 1;
    166}
    167char _license[] SEC("license") = "GPL";