187091063SKumar Kartikeya Dwivedi // SPDX-License-Identifier: GPL-2.0 287091063SKumar Kartikeya Dwivedi #include <test_progs.h> 387091063SKumar Kartikeya Dwivedi #include <network_helpers.h> 487091063SKumar Kartikeya Dwivedi #include "test_bpf_nf.skel.h" 5*c6f420acSKumar Kartikeya Dwivedi #include "test_bpf_nf_fail.skel.h" 6*c6f420acSKumar Kartikeya Dwivedi 7*c6f420acSKumar Kartikeya Dwivedi static char log_buf[1024 * 1024]; 8*c6f420acSKumar Kartikeya Dwivedi 9*c6f420acSKumar Kartikeya Dwivedi struct { 10*c6f420acSKumar Kartikeya Dwivedi const char *prog_name; 11*c6f420acSKumar Kartikeya Dwivedi const char *err_msg; 12*c6f420acSKumar Kartikeya Dwivedi } test_bpf_nf_fail_tests[] = { 13*c6f420acSKumar Kartikeya Dwivedi { "alloc_release", "kernel function bpf_ct_release args#0 expected pointer to STRUCT nf_conn but" }, 14*c6f420acSKumar Kartikeya Dwivedi { "insert_insert", "kernel function bpf_ct_insert_entry args#0 expected pointer to STRUCT nf_conn___init but" }, 15*c6f420acSKumar Kartikeya Dwivedi { "lookup_insert", "kernel function bpf_ct_insert_entry args#0 expected pointer to STRUCT nf_conn___init but" }, 16*c6f420acSKumar Kartikeya Dwivedi { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout args#0 expected pointer to STRUCT nf_conn___init but" }, 17*c6f420acSKumar Kartikeya Dwivedi { "set_status_after_insert", "kernel function bpf_ct_set_status args#0 expected pointer to STRUCT nf_conn___init but" }, 18*c6f420acSKumar Kartikeya Dwivedi { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout args#0 expected pointer to STRUCT nf_conn but" }, 19*c6f420acSKumar Kartikeya Dwivedi { "change_status_after_alloc", "kernel function bpf_ct_change_status args#0 expected pointer to STRUCT nf_conn but" }, 20*c6f420acSKumar Kartikeya Dwivedi }; 2187091063SKumar Kartikeya Dwivedi 2287091063SKumar Kartikeya Dwivedi enum { 2387091063SKumar Kartikeya Dwivedi TEST_XDP, 2487091063SKumar Kartikeya Dwivedi TEST_TC_BPF, 2587091063SKumar Kartikeya Dwivedi }; 2687091063SKumar Kartikeya Dwivedi 27*c6f420acSKumar Kartikeya Dwivedi static void test_bpf_nf_ct(int mode) 2887091063SKumar Kartikeya Dwivedi { 2987091063SKumar Kartikeya Dwivedi struct test_bpf_nf *skel; 3004fcb5f9SDelyan Kratunov int prog_fd, err; 3104fcb5f9SDelyan Kratunov LIBBPF_OPTS(bpf_test_run_opts, topts, 3204fcb5f9SDelyan Kratunov .data_in = &pkt_v4, 3304fcb5f9SDelyan Kratunov .data_size_in = sizeof(pkt_v4), 3404fcb5f9SDelyan Kratunov .repeat = 1, 3504fcb5f9SDelyan Kratunov ); 3687091063SKumar Kartikeya Dwivedi 3787091063SKumar Kartikeya Dwivedi skel = test_bpf_nf__open_and_load(); 3887091063SKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(skel, "test_bpf_nf__open_and_load")) 3987091063SKumar Kartikeya Dwivedi return; 4087091063SKumar Kartikeya Dwivedi 4187091063SKumar Kartikeya Dwivedi if (mode == TEST_XDP) 4287091063SKumar Kartikeya Dwivedi prog_fd = bpf_program__fd(skel->progs.nf_xdp_ct_test); 4387091063SKumar Kartikeya Dwivedi else 4487091063SKumar Kartikeya Dwivedi prog_fd = bpf_program__fd(skel->progs.nf_skb_ct_test); 4587091063SKumar Kartikeya Dwivedi 4604fcb5f9SDelyan Kratunov err = bpf_prog_test_run_opts(prog_fd, &topts); 4787091063SKumar Kartikeya Dwivedi if (!ASSERT_OK(err, "bpf_prog_test_run")) 4887091063SKumar Kartikeya Dwivedi goto end; 4987091063SKumar Kartikeya Dwivedi 5087091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_bpf_tuple, -EINVAL, "Test EINVAL for NULL bpf_tuple"); 5187091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_reserved, -EINVAL, "Test EINVAL for reserved not set to 0"); 5287091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_netns_id, -EINVAL, "Test EINVAL for netns_id < -1"); 5387091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_len_opts, -EINVAL, "Test EINVAL for len__opts != NF_BPF_CT_OPTS_SZ"); 5487091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_eproto_l4proto, -EPROTO, "Test EPROTO for l4proto != TCP or UDP"); 5587091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_enonet_netns_id, -ENONET, "Test ENONET for bad but valid netns_id"); 5687091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_enoent_lookup, -ENOENT, "Test ENOENT for failed lookup"); 5787091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_eafnosupport, -EAFNOSUPPORT, "Test EAFNOSUPPORT for invalid len__tuple"); 586eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_alloc_entry, 0, "Test for alloc new entry"); 596eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_insert_entry, 0, "Test for insert new entry"); 606eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_succ_lookup, 0, "Test for successful lookup"); 616eb7fba0SLorenzo Bianconi /* allow some tolerance for test_delta_timeout value to avoid races. */ 626eb7fba0SLorenzo Bianconi ASSERT_GT(skel->bss->test_delta_timeout, 8, "Test for min ct timeout update"); 636eb7fba0SLorenzo Bianconi ASSERT_LE(skel->bss->test_delta_timeout, 10, "Test for max ct timeout update"); 646eb7fba0SLorenzo Bianconi /* expected status is IPS_SEEN_REPLY */ 656eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->bss->test_status, 2, "Test for ct status update "); 6687091063SKumar Kartikeya Dwivedi end: 6787091063SKumar Kartikeya Dwivedi test_bpf_nf__destroy(skel); 6887091063SKumar Kartikeya Dwivedi } 6987091063SKumar Kartikeya Dwivedi 70*c6f420acSKumar Kartikeya Dwivedi static void test_bpf_nf_ct_fail(const char *prog_name, const char *err_msg) 71*c6f420acSKumar Kartikeya Dwivedi { 72*c6f420acSKumar Kartikeya Dwivedi LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, 73*c6f420acSKumar Kartikeya Dwivedi .kernel_log_size = sizeof(log_buf), 74*c6f420acSKumar Kartikeya Dwivedi .kernel_log_level = 1); 75*c6f420acSKumar Kartikeya Dwivedi struct test_bpf_nf_fail *skel; 76*c6f420acSKumar Kartikeya Dwivedi struct bpf_program *prog; 77*c6f420acSKumar Kartikeya Dwivedi int ret; 78*c6f420acSKumar Kartikeya Dwivedi 79*c6f420acSKumar Kartikeya Dwivedi skel = test_bpf_nf_fail__open_opts(&opts); 80*c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(skel, "test_bpf_nf_fail__open")) 81*c6f420acSKumar Kartikeya Dwivedi return; 82*c6f420acSKumar Kartikeya Dwivedi 83*c6f420acSKumar Kartikeya Dwivedi prog = bpf_object__find_program_by_name(skel->obj, prog_name); 84*c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name")) 85*c6f420acSKumar Kartikeya Dwivedi goto end; 86*c6f420acSKumar Kartikeya Dwivedi 87*c6f420acSKumar Kartikeya Dwivedi bpf_program__set_autoload(prog, true); 88*c6f420acSKumar Kartikeya Dwivedi 89*c6f420acSKumar Kartikeya Dwivedi ret = test_bpf_nf_fail__load(skel); 90*c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_ERR(ret, "test_bpf_nf_fail__load must fail")) 91*c6f420acSKumar Kartikeya Dwivedi goto end; 92*c6f420acSKumar Kartikeya Dwivedi 93*c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { 94*c6f420acSKumar Kartikeya Dwivedi fprintf(stderr, "Expected: %s\n", err_msg); 95*c6f420acSKumar Kartikeya Dwivedi fprintf(stderr, "Verifier: %s\n", log_buf); 96*c6f420acSKumar Kartikeya Dwivedi } 97*c6f420acSKumar Kartikeya Dwivedi 98*c6f420acSKumar Kartikeya Dwivedi end: 99*c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_fail__destroy(skel); 100*c6f420acSKumar Kartikeya Dwivedi } 101*c6f420acSKumar Kartikeya Dwivedi 10287091063SKumar Kartikeya Dwivedi void test_bpf_nf(void) 10387091063SKumar Kartikeya Dwivedi { 104*c6f420acSKumar Kartikeya Dwivedi int i; 10587091063SKumar Kartikeya Dwivedi if (test__start_subtest("xdp-ct")) 10687091063SKumar Kartikeya Dwivedi test_bpf_nf_ct(TEST_XDP); 10787091063SKumar Kartikeya Dwivedi if (test__start_subtest("tc-bpf-ct")) 10887091063SKumar Kartikeya Dwivedi test_bpf_nf_ct(TEST_TC_BPF); 109*c6f420acSKumar Kartikeya Dwivedi for (i = 0; i < ARRAY_SIZE(test_bpf_nf_fail_tests); i++) { 110*c6f420acSKumar Kartikeya Dwivedi if (test__start_subtest(test_bpf_nf_fail_tests[i].prog_name)) 111*c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_ct_fail(test_bpf_nf_fail_tests[i].prog_name, 112*c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_fail_tests[i].err_msg); 113*c6f420acSKumar Kartikeya Dwivedi } 11487091063SKumar Kartikeya Dwivedi } 115