mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Clean up the existing export namespace code along the same lines of
commit 33def8498f
("treewide: Convert macro and uses of __section(foo)
to __section("foo")") and for the same reason, it is not desired for the
namespace argument to be a macro expansion itself.
Scripted using
git grep -l -e MODULE_IMPORT_NS -e EXPORT_SYMBOL_NS | while read file;
do
awk -i inplace '
/^#define EXPORT_SYMBOL_NS/ {
gsub(/__stringify\(ns\)/, "ns");
print;
next;
}
/^#define MODULE_IMPORT_NS/ {
gsub(/__stringify\(ns\)/, "ns");
print;
next;
}
/MODULE_IMPORT_NS/ {
$0 = gensub(/MODULE_IMPORT_NS\(([^)]*)\)/, "MODULE_IMPORT_NS(\"\\1\")", "g");
}
/EXPORT_SYMBOL_NS/ {
if ($0 ~ /(EXPORT_SYMBOL_NS[^(]*)\(([^,]+),/) {
if ($0 !~ /(EXPORT_SYMBOL_NS[^(]*)\(([^,]+), ([^)]+)\)/ &&
$0 !~ /(EXPORT_SYMBOL_NS[^(]*)\(\)/ &&
$0 !~ /^my/) {
getline line;
gsub(/[[:space:]]*\\$/, "");
gsub(/[[:space:]]/, "", line);
$0 = $0 " " line;
}
$0 = gensub(/(EXPORT_SYMBOL_NS[^(]*)\(([^,]+), ([^)]+)\)/,
"\\1(\\2, \"\\3\")", "g");
}
}
{ print }' $file;
done
Requested-by: Masahiro Yamada <masahiroy@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://mail.google.com/mail/u/2/#inbox/FMfcgzQXKWgMmjdFwwdsfgxzKpVHWPlc
Acked-by: Greg KH <gregkh@linuxfoundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
286 lines
7.2 KiB
C
286 lines
7.2 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* KUnit tests for management frame acceptance
|
|
*
|
|
* Copyright (C) 2023 Intel Corporation
|
|
*/
|
|
#include <kunit/test.h>
|
|
#include <kunit/skbuff.h>
|
|
#include "../ieee80211_i.h"
|
|
#include "../sta_info.h"
|
|
|
|
MODULE_IMPORT_NS("EXPORTED_FOR_KUNIT_TESTING");
|
|
|
|
static const struct mfp_test_case {
|
|
const char *desc;
|
|
bool sta, mfp, decrypted, unicast, assoc;
|
|
u8 category;
|
|
u8 stype;
|
|
u8 action;
|
|
ieee80211_rx_result result;
|
|
} accept_mfp_cases[] = {
|
|
/* regular public action */
|
|
{
|
|
.desc = "public action: accept unicast from unknown peer",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "public action: accept multicast from unknown peer",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "public action: accept unicast without MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "public action: accept multicast without MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.sta = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "public action: drop unicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_DROP_U_UNPROT_UNICAST_PUB_ACTION,
|
|
},
|
|
{
|
|
.desc = "public action: accept multicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PUBLIC,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
/* protected dual of public action */
|
|
{
|
|
.desc = "protected dual: drop unicast from unknown peer",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: drop multicast from unknown peer",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: drop unicast without MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: drop multicast without MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.sta = true,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: drop undecrypted unicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: drop undecrypted multicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.unicast = false,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_DROP_U_UNPROT_DUAL,
|
|
},
|
|
{
|
|
.desc = "protected dual: accept unicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.decrypted = true,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "protected dual: accept multicast with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION,
|
|
.action = WLAN_PUB_ACTION_DSE_ENABLEMENT,
|
|
.decrypted = true,
|
|
.unicast = false,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
/* deauth/disassoc before keys are set */
|
|
{
|
|
.desc = "deauth: accept unicast with MFP but w/o key",
|
|
.stype = IEEE80211_STYPE_DEAUTH,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.unicast = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "disassoc: accept unicast with MFP but w/o key",
|
|
.stype = IEEE80211_STYPE_DEAUTH,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.unicast = true,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
/* non-public robust action frame ... */
|
|
{
|
|
.desc = "BA action: drop unicast before assoc",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_BACK,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.result = RX_DROP_U_UNPROT_ROBUST_ACTION,
|
|
},
|
|
{
|
|
.desc = "BA action: drop unprotected after assoc",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_BACK,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_DROP_U_UNPROT_UCAST_MGMT,
|
|
},
|
|
{
|
|
.desc = "BA action: accept unprotected without MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_BACK,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.assoc = true,
|
|
.mfp = false,
|
|
.result = RX_CONTINUE,
|
|
},
|
|
{
|
|
.desc = "BA action: drop unprotected with MFP",
|
|
.stype = IEEE80211_STYPE_ACTION,
|
|
.category = WLAN_CATEGORY_BACK,
|
|
.unicast = true,
|
|
.sta = true,
|
|
.mfp = true,
|
|
.result = RX_DROP_U_UNPROT_UCAST_MGMT,
|
|
},
|
|
};
|
|
|
|
KUNIT_ARRAY_PARAM_DESC(accept_mfp, accept_mfp_cases, desc);
|
|
|
|
static void accept_mfp(struct kunit *test)
|
|
{
|
|
static struct sta_info sta;
|
|
const struct mfp_test_case *params = test->param_value;
|
|
struct ieee80211_rx_data rx = {
|
|
.sta = params->sta ? &sta : NULL,
|
|
};
|
|
struct ieee80211_rx_status *status;
|
|
struct ieee80211_hdr_3addr hdr = {
|
|
.frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT |
|
|
params->stype),
|
|
.addr1 = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff },
|
|
.addr2 = { 0x12, 0x22, 0x33, 0x44, 0x55, 0x66 },
|
|
/* A3/BSSID doesn't matter here */
|
|
};
|
|
|
|
memset(&sta, 0, sizeof(sta));
|
|
|
|
if (!params->sta) {
|
|
KUNIT_ASSERT_FALSE(test, params->mfp);
|
|
KUNIT_ASSERT_FALSE(test, params->decrypted);
|
|
}
|
|
|
|
if (params->mfp)
|
|
set_sta_flag(&sta, WLAN_STA_MFP);
|
|
|
|
if (params->assoc)
|
|
set_bit(WLAN_STA_ASSOC, &sta._flags);
|
|
|
|
rx.skb = kunit_zalloc_skb(test, 128, GFP_KERNEL);
|
|
KUNIT_ASSERT_NOT_NULL(test, rx.skb);
|
|
status = IEEE80211_SKB_RXCB(rx.skb);
|
|
|
|
if (params->decrypted) {
|
|
status->flag |= RX_FLAG_DECRYPTED;
|
|
if (params->unicast)
|
|
hdr.frame_control |=
|
|
cpu_to_le16(IEEE80211_FCTL_PROTECTED);
|
|
}
|
|
|
|
if (params->unicast)
|
|
hdr.addr1[0] = 0x02;
|
|
|
|
skb_put_data(rx.skb, &hdr, sizeof(hdr));
|
|
|
|
switch (params->stype) {
|
|
case IEEE80211_STYPE_ACTION:
|
|
skb_put_u8(rx.skb, params->category);
|
|
skb_put_u8(rx.skb, params->action);
|
|
break;
|
|
case IEEE80211_STYPE_DEAUTH:
|
|
case IEEE80211_STYPE_DISASSOC: {
|
|
__le16 reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
|
|
|
|
skb_put_data(rx.skb, &reason, sizeof(reason));
|
|
}
|
|
break;
|
|
}
|
|
|
|
KUNIT_EXPECT_EQ(test,
|
|
(__force u32)ieee80211_drop_unencrypted_mgmt(&rx),
|
|
(__force u32)params->result);
|
|
}
|
|
|
|
static struct kunit_case mfp_test_cases[] = {
|
|
KUNIT_CASE_PARAM(accept_mfp, accept_mfp_gen_params),
|
|
{}
|
|
};
|
|
|
|
static struct kunit_suite mfp = {
|
|
.name = "mac80211-mfp",
|
|
.test_cases = mfp_test_cases,
|
|
};
|
|
|
|
kunit_test_suite(mfp);
|