// SPDX-License-Identifier: GPL-2.0 #include <vmlinux.h> #include <bpf/bpf_tracing.h> #include <bpf/bpf_helpers.h> #include <bpf/bpf_core_read.h> struct nf_conn; struct bpf_ct_opts___local { s32 netns_id; s32 error; u8 l4proto; u8 reserved[3]; } __attribute__((preserve_access_index)); struct nf_conn *bpf_skb_ct_alloc(struct __sk_buff *, struct bpf_sock_tuple *, u32, struct bpf_ct_opts___local *, u32) __ksym; struct nf_conn *bpf_skb_ct_lookup(struct __sk_buff *, struct bpf_sock_tuple *, u32, struct bpf_ct_opts___local *, u32) __ksym; struct nf_conn *bpf_ct_insert_entry(struct nf_conn *) __ksym; void bpf_ct_release(struct nf_conn *) __ksym; void bpf_ct_set_timeout(struct nf_conn *, u32) __ksym; int bpf_ct_change_timeout(struct nf_conn *, u32) __ksym; int bpf_ct_set_status(struct nf_conn *, u32) __ksym; int bpf_ct_change_status(struct nf_conn *, u32) __ksym; SEC("?tc") int alloc_release(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; bpf_ct_release(ct); return 0; } SEC("?tc") int insert_insert(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; ct = bpf_ct_insert_entry(ct); if (!ct) return 0; ct = bpf_ct_insert_entry(ct); return 0; } SEC("?tc") int lookup_insert(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_lookup(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; bpf_ct_insert_entry(ct); return 0; } SEC("?tc") int write_not_allowlisted_field(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_lookup(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; ct->status = 0xF00; return 0; } SEC("?tc") int set_timeout_after_insert(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; ct = bpf_ct_insert_entry(ct); if (!ct) return 0; bpf_ct_set_timeout(ct, 0); return 0; } SEC("?tc") int set_status_after_insert(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; ct = bpf_ct_insert_entry(ct); if (!ct) return 0; bpf_ct_set_status(ct, 0); return 0; } SEC("?tc") int change_timeout_after_alloc(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; bpf_ct_change_timeout(ct, 0); return 0; } SEC("?tc") int change_status_after_alloc(struct __sk_buff *ctx) { struct bpf_ct_opts___local opts = {}; struct bpf_sock_tuple tup = {}; struct nf_conn *ct; ct = bpf_skb_ct_alloc(ctx, &tup, sizeof(tup.ipv4), &opts, sizeof(opts)); if (!ct) return 0; bpf_ct_change_status(ct, 0); return 0; } char _license[] SEC("license") = "GPL";