mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2025-01-09 23:34:42 +08:00
1058b6a78d
Some users have complained that selftests fail to build when CONFIG_NF_CONNTRACK=m. It would be useful to allow building as long as it is set to module or built-in, even though in case of building as module, user would need to load it before running the selftest. Note that this also allows building selftest when CONFIG_NF_CONNTRACK is disabled. Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/bpf/20220120164932.2798544-1-memxor@gmail.com
119 lines
3.0 KiB
C
119 lines
3.0 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <vmlinux.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
|
|
#define EAFNOSUPPORT 97
|
|
#define EPROTO 71
|
|
#define ENONET 64
|
|
#define EINVAL 22
|
|
#define ENOENT 2
|
|
|
|
int test_einval_bpf_tuple = 0;
|
|
int test_einval_reserved = 0;
|
|
int test_einval_netns_id = 0;
|
|
int test_einval_len_opts = 0;
|
|
int test_eproto_l4proto = 0;
|
|
int test_enonet_netns_id = 0;
|
|
int test_enoent_lookup = 0;
|
|
int test_eafnosupport = 0;
|
|
|
|
struct nf_conn;
|
|
|
|
struct bpf_ct_opts___local {
|
|
s32 netns_id;
|
|
s32 error;
|
|
u8 l4proto;
|
|
u8 reserved[3];
|
|
} __attribute__((preserve_access_index));
|
|
|
|
struct nf_conn *bpf_xdp_ct_lookup(struct xdp_md *, struct bpf_sock_tuple *, u32,
|
|
struct bpf_ct_opts___local *, u32) __ksym;
|
|
struct nf_conn *bpf_skb_ct_lookup(struct __sk_buff *, struct bpf_sock_tuple *, u32,
|
|
struct bpf_ct_opts___local *, u32) __ksym;
|
|
void bpf_ct_release(struct nf_conn *) __ksym;
|
|
|
|
static __always_inline void
|
|
nf_ct_test(struct nf_conn *(*func)(void *, struct bpf_sock_tuple *, u32,
|
|
struct bpf_ct_opts___local *, u32),
|
|
void *ctx)
|
|
{
|
|
struct bpf_ct_opts___local opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 };
|
|
struct bpf_sock_tuple bpf_tuple;
|
|
struct nf_conn *ct;
|
|
|
|
__builtin_memset(&bpf_tuple, 0, sizeof(bpf_tuple.ipv4));
|
|
|
|
ct = func(ctx, NULL, 0, &opts_def, sizeof(opts_def));
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_einval_bpf_tuple = opts_def.error;
|
|
|
|
opts_def.reserved[0] = 1;
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def));
|
|
opts_def.reserved[0] = 0;
|
|
opts_def.l4proto = IPPROTO_TCP;
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_einval_reserved = opts_def.error;
|
|
|
|
opts_def.netns_id = -2;
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def));
|
|
opts_def.netns_id = -1;
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_einval_netns_id = opts_def.error;
|
|
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def) - 1);
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_einval_len_opts = opts_def.error;
|
|
|
|
opts_def.l4proto = IPPROTO_ICMP;
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def));
|
|
opts_def.l4proto = IPPROTO_TCP;
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_eproto_l4proto = opts_def.error;
|
|
|
|
opts_def.netns_id = 0xf00f;
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def));
|
|
opts_def.netns_id = -1;
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_enonet_netns_id = opts_def.error;
|
|
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, sizeof(opts_def));
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_enoent_lookup = opts_def.error;
|
|
|
|
ct = func(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4) - 1, &opts_def, sizeof(opts_def));
|
|
if (ct)
|
|
bpf_ct_release(ct);
|
|
else
|
|
test_eafnosupport = opts_def.error;
|
|
}
|
|
|
|
SEC("xdp")
|
|
int nf_xdp_ct_test(struct xdp_md *ctx)
|
|
{
|
|
nf_ct_test((void *)bpf_xdp_ct_lookup, ctx);
|
|
return 0;
|
|
}
|
|
|
|
SEC("tc")
|
|
int nf_skb_ct_test(struct __sk_buff *ctx)
|
|
{
|
|
nf_ct_test((void *)bpf_skb_ct_lookup, ctx);
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|