187091063SKumar Kartikeya Dwivedi // SPDX-License-Identifier: GPL-2.0 287091063SKumar Kartikeya Dwivedi #include <test_progs.h> 387091063SKumar Kartikeya Dwivedi #include <network_helpers.h> 4*f7c946f2SLorenzo Bianconi #include <linux/netfilter/nf_conntrack_common.h> 587091063SKumar Kartikeya Dwivedi #include "test_bpf_nf.skel.h" 6c6f420acSKumar Kartikeya Dwivedi #include "test_bpf_nf_fail.skel.h" 7c6f420acSKumar Kartikeya Dwivedi 8c6f420acSKumar Kartikeya Dwivedi static char log_buf[1024 * 1024]; 9c6f420acSKumar Kartikeya Dwivedi 10c6f420acSKumar Kartikeya Dwivedi struct { 11c6f420acSKumar Kartikeya Dwivedi const char *prog_name; 12c6f420acSKumar Kartikeya Dwivedi const char *err_msg; 13c6f420acSKumar Kartikeya Dwivedi } test_bpf_nf_fail_tests[] = { 14c6f420acSKumar Kartikeya Dwivedi { "alloc_release", "kernel function bpf_ct_release args#0 expected pointer to STRUCT nf_conn but" }, 15c6f420acSKumar Kartikeya Dwivedi { "insert_insert", "kernel function bpf_ct_insert_entry args#0 expected pointer to STRUCT nf_conn___init but" }, 16c6f420acSKumar Kartikeya Dwivedi { "lookup_insert", "kernel function bpf_ct_insert_entry args#0 expected pointer to STRUCT nf_conn___init but" }, 17c6f420acSKumar Kartikeya Dwivedi { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout args#0 expected pointer to STRUCT nf_conn___init but" }, 18c6f420acSKumar Kartikeya Dwivedi { "set_status_after_insert", "kernel function bpf_ct_set_status args#0 expected pointer to STRUCT nf_conn___init but" }, 19c6f420acSKumar Kartikeya Dwivedi { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout args#0 expected pointer to STRUCT nf_conn but" }, 20c6f420acSKumar Kartikeya Dwivedi { "change_status_after_alloc", "kernel function bpf_ct_change_status args#0 expected pointer to STRUCT nf_conn but" }, 21e2d75e95SDaniel Xu { "write_not_allowlisted_field", "no write support to nf_conn at off" }, 22c6f420acSKumar Kartikeya Dwivedi }; 2387091063SKumar Kartikeya Dwivedi 2487091063SKumar Kartikeya Dwivedi enum { 2587091063SKumar Kartikeya Dwivedi TEST_XDP, 2687091063SKumar Kartikeya Dwivedi TEST_TC_BPF, 2787091063SKumar Kartikeya Dwivedi }; 2887091063SKumar Kartikeya Dwivedi 29e81fbd4cSDaniel Xu #define TIMEOUT_MS 3000 30e81fbd4cSDaniel Xu 31e81fbd4cSDaniel Xu static int connect_to_server(int srv_fd) 32e81fbd4cSDaniel Xu { 33e81fbd4cSDaniel Xu int fd = -1; 34e81fbd4cSDaniel Xu 35e81fbd4cSDaniel Xu fd = socket(AF_INET, SOCK_STREAM, 0); 36e81fbd4cSDaniel Xu if (!ASSERT_GE(fd, 0, "socket")) 37e81fbd4cSDaniel Xu goto out; 38e81fbd4cSDaniel Xu 39e81fbd4cSDaniel Xu if (!ASSERT_EQ(connect_fd_to_fd(fd, srv_fd, TIMEOUT_MS), 0, "connect_fd_to_fd")) { 40e81fbd4cSDaniel Xu close(fd); 41e81fbd4cSDaniel Xu fd = -1; 42e81fbd4cSDaniel Xu } 43e81fbd4cSDaniel Xu out: 44e81fbd4cSDaniel Xu return fd; 45e81fbd4cSDaniel Xu } 46e81fbd4cSDaniel Xu 47c6f420acSKumar Kartikeya Dwivedi static void test_bpf_nf_ct(int mode) 4887091063SKumar Kartikeya Dwivedi { 4999799de2SDaniel Xu const char *iptables = "iptables -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; 50e81fbd4cSDaniel Xu int srv_fd = -1, client_fd = -1, srv_client_fd = -1; 51e81fbd4cSDaniel Xu struct sockaddr_in peer_addr = {}; 5287091063SKumar Kartikeya Dwivedi struct test_bpf_nf *skel; 5304fcb5f9SDelyan Kratunov int prog_fd, err; 54e81fbd4cSDaniel Xu socklen_t len; 55e81fbd4cSDaniel Xu u16 srv_port; 56e81fbd4cSDaniel Xu char cmd[64]; 5704fcb5f9SDelyan Kratunov LIBBPF_OPTS(bpf_test_run_opts, topts, 5804fcb5f9SDelyan Kratunov .data_in = &pkt_v4, 5904fcb5f9SDelyan Kratunov .data_size_in = sizeof(pkt_v4), 6004fcb5f9SDelyan Kratunov .repeat = 1, 6104fcb5f9SDelyan Kratunov ); 6287091063SKumar Kartikeya Dwivedi 6387091063SKumar Kartikeya Dwivedi skel = test_bpf_nf__open_and_load(); 6487091063SKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(skel, "test_bpf_nf__open_and_load")) 6587091063SKumar Kartikeya Dwivedi return; 6687091063SKumar Kartikeya Dwivedi 67e81fbd4cSDaniel Xu /* Enable connection tracking */ 68e81fbd4cSDaniel Xu snprintf(cmd, sizeof(cmd), iptables, "-A"); 69e81fbd4cSDaniel Xu if (!ASSERT_OK(system(cmd), "iptables")) 70e81fbd4cSDaniel Xu goto end; 71e81fbd4cSDaniel Xu 72e81fbd4cSDaniel Xu srv_port = (mode == TEST_XDP) ? 5005 : 5006; 73e81fbd4cSDaniel Xu srv_fd = start_server(AF_INET, SOCK_STREAM, "127.0.0.1", srv_port, TIMEOUT_MS); 74e81fbd4cSDaniel Xu if (!ASSERT_GE(srv_fd, 0, "start_server")) 75e81fbd4cSDaniel Xu goto end; 76e81fbd4cSDaniel Xu 77e81fbd4cSDaniel Xu client_fd = connect_to_server(srv_fd); 78e81fbd4cSDaniel Xu if (!ASSERT_GE(client_fd, 0, "connect_to_server")) 79e81fbd4cSDaniel Xu goto end; 80e81fbd4cSDaniel Xu 81e81fbd4cSDaniel Xu len = sizeof(peer_addr); 82e81fbd4cSDaniel Xu srv_client_fd = accept(srv_fd, (struct sockaddr *)&peer_addr, &len); 83e81fbd4cSDaniel Xu if (!ASSERT_GE(srv_client_fd, 0, "accept")) 84e81fbd4cSDaniel Xu goto end; 85e81fbd4cSDaniel Xu if (!ASSERT_EQ(len, sizeof(struct sockaddr_in), "sockaddr len")) 86e81fbd4cSDaniel Xu goto end; 87e81fbd4cSDaniel Xu 88e81fbd4cSDaniel Xu skel->bss->saddr = peer_addr.sin_addr.s_addr; 89e81fbd4cSDaniel Xu skel->bss->sport = peer_addr.sin_port; 90e81fbd4cSDaniel Xu skel->bss->daddr = peer_addr.sin_addr.s_addr; 91e81fbd4cSDaniel Xu skel->bss->dport = htons(srv_port); 92e81fbd4cSDaniel Xu 9387091063SKumar Kartikeya Dwivedi if (mode == TEST_XDP) 9487091063SKumar Kartikeya Dwivedi prog_fd = bpf_program__fd(skel->progs.nf_xdp_ct_test); 9587091063SKumar Kartikeya Dwivedi else 9687091063SKumar Kartikeya Dwivedi prog_fd = bpf_program__fd(skel->progs.nf_skb_ct_test); 9787091063SKumar Kartikeya Dwivedi 9804fcb5f9SDelyan Kratunov err = bpf_prog_test_run_opts(prog_fd, &topts); 9987091063SKumar Kartikeya Dwivedi if (!ASSERT_OK(err, "bpf_prog_test_run")) 10087091063SKumar Kartikeya Dwivedi goto end; 10187091063SKumar Kartikeya Dwivedi 10287091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_bpf_tuple, -EINVAL, "Test EINVAL for NULL bpf_tuple"); 10387091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_reserved, -EINVAL, "Test EINVAL for reserved not set to 0"); 10487091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_netns_id, -EINVAL, "Test EINVAL for netns_id < -1"); 10587091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_einval_len_opts, -EINVAL, "Test EINVAL for len__opts != NF_BPF_CT_OPTS_SZ"); 10687091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_eproto_l4proto, -EPROTO, "Test EPROTO for l4proto != TCP or UDP"); 10787091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_enonet_netns_id, -ENONET, "Test ENONET for bad but valid netns_id"); 10887091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_enoent_lookup, -ENOENT, "Test ENOENT for failed lookup"); 10987091063SKumar Kartikeya Dwivedi ASSERT_EQ(skel->bss->test_eafnosupport, -EAFNOSUPPORT, "Test EAFNOSUPPORT for invalid len__tuple"); 1106eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_alloc_entry, 0, "Test for alloc new entry"); 1116eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_insert_entry, 0, "Test for insert new entry"); 1126eb7fba0SLorenzo Bianconi ASSERT_EQ(skel->data->test_succ_lookup, 0, "Test for successful lookup"); 1136eb7fba0SLorenzo Bianconi /* allow some tolerance for test_delta_timeout value to avoid races. */ 1146eb7fba0SLorenzo Bianconi ASSERT_GT(skel->bss->test_delta_timeout, 8, "Test for min ct timeout update"); 1156eb7fba0SLorenzo Bianconi ASSERT_LE(skel->bss->test_delta_timeout, 10, "Test for max ct timeout update"); 116e2d75e95SDaniel Xu ASSERT_EQ(skel->bss->test_insert_lookup_mark, 77, "Test for insert and lookup mark value"); 117*f7c946f2SLorenzo Bianconi ASSERT_EQ(skel->bss->test_status, IPS_CONFIRMED | IPS_SEEN_REPLY, 118*f7c946f2SLorenzo Bianconi "Test for ct status update "); 119e81fbd4cSDaniel Xu ASSERT_EQ(skel->data->test_exist_lookup, 0, "Test existing connection lookup"); 12099799de2SDaniel Xu ASSERT_EQ(skel->bss->test_exist_lookup_mark, 43, "Test existing connection lookup ctmark"); 12187091063SKumar Kartikeya Dwivedi end: 122e81fbd4cSDaniel Xu if (srv_client_fd != -1) 123e81fbd4cSDaniel Xu close(srv_client_fd); 124e81fbd4cSDaniel Xu if (client_fd != -1) 125e81fbd4cSDaniel Xu close(client_fd); 126e81fbd4cSDaniel Xu if (srv_fd != -1) 127e81fbd4cSDaniel Xu close(srv_fd); 128e81fbd4cSDaniel Xu snprintf(cmd, sizeof(cmd), iptables, "-D"); 129e81fbd4cSDaniel Xu system(cmd); 13087091063SKumar Kartikeya Dwivedi test_bpf_nf__destroy(skel); 13187091063SKumar Kartikeya Dwivedi } 13287091063SKumar Kartikeya Dwivedi 133c6f420acSKumar Kartikeya Dwivedi static void test_bpf_nf_ct_fail(const char *prog_name, const char *err_msg) 134c6f420acSKumar Kartikeya Dwivedi { 135c6f420acSKumar Kartikeya Dwivedi LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, 136c6f420acSKumar Kartikeya Dwivedi .kernel_log_size = sizeof(log_buf), 137c6f420acSKumar Kartikeya Dwivedi .kernel_log_level = 1); 138c6f420acSKumar Kartikeya Dwivedi struct test_bpf_nf_fail *skel; 139c6f420acSKumar Kartikeya Dwivedi struct bpf_program *prog; 140c6f420acSKumar Kartikeya Dwivedi int ret; 141c6f420acSKumar Kartikeya Dwivedi 142c6f420acSKumar Kartikeya Dwivedi skel = test_bpf_nf_fail__open_opts(&opts); 143c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(skel, "test_bpf_nf_fail__open")) 144c6f420acSKumar Kartikeya Dwivedi return; 145c6f420acSKumar Kartikeya Dwivedi 146c6f420acSKumar Kartikeya Dwivedi prog = bpf_object__find_program_by_name(skel->obj, prog_name); 147c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name")) 148c6f420acSKumar Kartikeya Dwivedi goto end; 149c6f420acSKumar Kartikeya Dwivedi 150c6f420acSKumar Kartikeya Dwivedi bpf_program__set_autoload(prog, true); 151c6f420acSKumar Kartikeya Dwivedi 152c6f420acSKumar Kartikeya Dwivedi ret = test_bpf_nf_fail__load(skel); 153c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_ERR(ret, "test_bpf_nf_fail__load must fail")) 154c6f420acSKumar Kartikeya Dwivedi goto end; 155c6f420acSKumar Kartikeya Dwivedi 156c6f420acSKumar Kartikeya Dwivedi if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { 157c6f420acSKumar Kartikeya Dwivedi fprintf(stderr, "Expected: %s\n", err_msg); 158c6f420acSKumar Kartikeya Dwivedi fprintf(stderr, "Verifier: %s\n", log_buf); 159c6f420acSKumar Kartikeya Dwivedi } 160c6f420acSKumar Kartikeya Dwivedi 161c6f420acSKumar Kartikeya Dwivedi end: 162c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_fail__destroy(skel); 163c6f420acSKumar Kartikeya Dwivedi } 164c6f420acSKumar Kartikeya Dwivedi 16587091063SKumar Kartikeya Dwivedi void test_bpf_nf(void) 16687091063SKumar Kartikeya Dwivedi { 167c6f420acSKumar Kartikeya Dwivedi int i; 16887091063SKumar Kartikeya Dwivedi if (test__start_subtest("xdp-ct")) 16987091063SKumar Kartikeya Dwivedi test_bpf_nf_ct(TEST_XDP); 17087091063SKumar Kartikeya Dwivedi if (test__start_subtest("tc-bpf-ct")) 17187091063SKumar Kartikeya Dwivedi test_bpf_nf_ct(TEST_TC_BPF); 172c6f420acSKumar Kartikeya Dwivedi for (i = 0; i < ARRAY_SIZE(test_bpf_nf_fail_tests); i++) { 173c6f420acSKumar Kartikeya Dwivedi if (test__start_subtest(test_bpf_nf_fail_tests[i].prog_name)) 174c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_ct_fail(test_bpf_nf_fail_tests[i].prog_name, 175c6f420acSKumar Kartikeya Dwivedi test_bpf_nf_fail_tests[i].err_msg); 176c6f420acSKumar Kartikeya Dwivedi } 17787091063SKumar Kartikeya Dwivedi } 178