1
0
Fork 0
mirror of synced 2025-03-06 20:59:54 +01:00
linux/tools/testing/selftests/bpf/progs/vrf_socket_lookup.c
Yonghong Song ee77f3d602 selftests/bpf: Fix compilation failure for prog vrf_socket_lookup
When building the latest kernel/selftest with clang17 compiler:

    make LLVM=1 -j                                  <== for kernel
    make -C tools/testing/selftests/bpf LLVM=1 -j   <== for selftest

I hit the following compilation error:

  [...]
  In file included from progs/vrf_socket_lookup.c:3:
  In file included from /usr/include/linux/ip.h:21:
  In file included from /usr/include/asm/byteorder.h:5:
  In file included from /usr/include/linux/byteorder/little_endian.h:13:
  /usr/include/linux/swab.h:136:8: error: unknown type name '__always_inline'
    136 | static __always_inline unsigned long __swab(const unsigned long y)
        |        ^
  /usr/include/linux/swab.h:171:8: error: unknown type name '__always_inline'
    171 | static __always_inline __u16 __swab16p(const __u16 *p)
        |        ^
  /usr/include/linux/swab.h:171:29: error: expected ';' after top level declarator
    171 | static __always_inline __u16 __swab16p(const __u16 *p)
        |                             ^
  [...]

Basically, with header files in my local host which is based on 5.12 kernel,
__always_inline is not defined and this caused compilation failure.

Since __always_inline is defined in bpf_helpers.h, let us move bpf_helpers.h
to an early position which fixed the problem.

Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20230622061921.816772-1-yhs@fb.com
2023-06-22 11:51:05 +02:00

89 lines
1.6 KiB
C

// SPDX-License-Identifier: GPL-2.0
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_endian.h>
#include <linux/ip.h>
#include <linux/in.h>
#include <linux/if_ether.h>
#include <linux/pkt_cls.h>
#include <stdbool.h>
int lookup_status;
bool test_xdp;
bool tcp_skc;
#define CUR_NS BPF_F_CURRENT_NETNS
static void socket_lookup(void *ctx, void *data_end, void *data)
{
struct ethhdr *eth = data;
struct bpf_sock_tuple *tp;
struct bpf_sock *sk;
struct iphdr *iph;
int tplen;
if (eth + 1 > data_end)
return;
if (eth->h_proto != bpf_htons(ETH_P_IP))
return;
iph = (struct iphdr *)(eth + 1);
if (iph + 1 > data_end)
return;
tp = (struct bpf_sock_tuple *)&iph->saddr;
tplen = sizeof(tp->ipv4);
if ((void *)tp + tplen > data_end)
return;
switch (iph->protocol) {
case IPPROTO_TCP:
if (tcp_skc)
sk = bpf_skc_lookup_tcp(ctx, tp, tplen, CUR_NS, 0);
else
sk = bpf_sk_lookup_tcp(ctx, tp, tplen, CUR_NS, 0);
break;
case IPPROTO_UDP:
sk = bpf_sk_lookup_udp(ctx, tp, tplen, CUR_NS, 0);
break;
default:
return;
}
lookup_status = 0;
if (sk) {
bpf_sk_release(sk);
lookup_status = 1;
}
}
SEC("tc")
int tc_socket_lookup(struct __sk_buff *skb)
{
void *data_end = (void *)(long)skb->data_end;
void *data = (void *)(long)skb->data;
if (test_xdp)
return TC_ACT_UNSPEC;
socket_lookup(skb, data_end, data);
return TC_ACT_UNSPEC;
}
SEC("xdp")
int xdp_socket_lookup(struct xdp_md *xdp)
{
void *data_end = (void *)(long)xdp->data_end;
void *data = (void *)(long)xdp->data;
if (!test_xdp)
return XDP_PASS;
socket_lookup(xdp, data_end, data);
return XDP_PASS;
}
char _license[] SEC("license") = "GPL";