Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2361342pxk; Mon, 14 Sep 2020 11:12:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGRIAn5j626YVUE7uW493LatJjUAMyYPDIUCkphG5lf6csNyIglOL/pcsWz+y+G6OAuYQ4 X-Received: by 2002:aa7:c155:: with SMTP id r21mr19007853edp.140.1600107153158; Mon, 14 Sep 2020 11:12:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600107153; cv=none; d=google.com; s=arc-20160816; b=U9gmB45f2qk97VlZ/aPo0gIjXUg7dWX0q2dpdU+qZq7FTAyAWZwWJheW8Jzzybec5i Hn1F0s6WJl0FP6DlzC9Fj2W1upvtPZff8ysSmLP9m0DYKmO9SQ11YLjp0c5tziAAeBvT 2xGuujg6L6EtxTioasCFJqj5CDy5akubp0FprdFSB+UK7sgkRYLWh/QsThAwHjU1RuMH TEDVgPcKIt4ZiVhcp5Ybu16I1Q1y+G4Cue7s0CDMRitYUjrNm1oTh1BCY4i4hQXlEzwq +JZrKiZ40/jqU9BkX49nLgU7S+nwqLIkhM99Py0GaZ1XT4qZDSLw/WScrx7AOvfPMATE QaNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=CfRmeNK8D5eIpf04wtkC++/Brt6HDeUzFDnNUyWFqtM=; b=fg2HgiGCqFqZ1LRuLQjVn2b25FzC/7Kf9VZGkAI1sZqD4HNsvbziC7bFhoYDQug9XD iJThcpWozNORBi2wi19T1P1sHo2GCM7DMlwWA8//rxE2UqJhXfOTSppR7PwfUvlWdpaO O1pbNoNV+ajm0rJ+PmToUQvQ7j7UfZqtFWGGs5/BwNoUUke7sjYr9x4rKjzab/ryI1jn P8jIEpy1Pmwt/rXxImn0+4NYgBnzz/HClJZzl+VJRwYsb0MYnKnggJ3PRETk+RJPOzt/ S5lpxwHBWd1GKfHFCWdQEEsa77X2EetutsmTInJNDi1Q1JQce2ut1KDuZYHzzlsPz1TR tYPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t1XNYlyc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l21si8052886ejg.119.2020.09.14.11.12.09; Mon, 14 Sep 2020 11:12:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t1XNYlyc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726110AbgINSJk (ORCPT + 99 others); Mon, 14 Sep 2020 14:09:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:38754 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726168AbgINSJF (ORCPT ); Mon, 14 Sep 2020 14:09:05 -0400 Received: from mail-lj1-f182.google.com (mail-lj1-f182.google.com [209.85.208.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 567CF217BA; Mon, 14 Sep 2020 18:09:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600106943; bh=CfRmeNK8D5eIpf04wtkC++/Brt6HDeUzFDnNUyWFqtM=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=t1XNYlyclMMvW/+rTr8PGPfHUPz3WdRkEIeELx1JxILygNT5C7WqC+pdjAuSK3au8 eyMoOqOrU374tGQ/0uBes33aikMbBd+A+fzfIvMiSjFlSmMb4Z5Uz319034UTYXUyH nFI4wok2RyhvcrbfJV3qrtlxyLCLCoQL6Xlyrj9s= Received: by mail-lj1-f182.google.com with SMTP id b19so447716lji.11; Mon, 14 Sep 2020 11:09:03 -0700 (PDT) X-Gm-Message-State: AOAM533BvotRhoysHJZ9B2UQdrXCP5A4+VEMurMy9ElUiTyGIUBCvA6p xaLjKfXH6pZPJjPsdgS5K2ZMsZjujz/zozAfQHA= X-Received: by 2002:a2e:9c15:: with SMTP id s21mr5578169lji.27.1600106941660; Mon, 14 Sep 2020 11:09:01 -0700 (PDT) MIME-Version: 1.0 References: <20200911143022.414783-1-nicolas.rybowski@tessares.net> <20200911143022.414783-5-nicolas.rybowski@tessares.net> In-Reply-To: <20200911143022.414783-5-nicolas.rybowski@tessares.net> From: Song Liu Date: Mon, 14 Sep 2020 11:08:50 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH bpf-next v2 5/5] bpf: selftests: add bpf_mptcp_sock() verifier tests To: Nicolas Rybowski Cc: Shuah Khan , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , John Fastabend , KP Singh , Matthieu Baerts , linux-kselftest@vger.kernel.org, Networking , bpf , open list Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 11, 2020 at 9:46 AM Nicolas Rybowski wrote: > > This patch adds verifier side tests for the new bpf_mptcp_sock() helper. > > Here are the new tests : > - NULL bpf_sock is correctly handled > - We cannot access a field from bpf_mptcp_sock if the latter is NULL > - We can access a field from bpf_mptcp_sock if the latter is not NULL > - We cannot modify a field from bpf_mptcp_sock. > > Note that "token" is currently the only field in bpf_mptcp_sock. > > Currently, there is no easy way to test the token field since we cannot > get back the mptcp_sock in userspace, this could be a future amelioration. > > Acked-by: Matthieu Baerts > Signed-off-by: Nicolas Rybowski Acked-by: Song Liu