Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3012678pxt; Mon, 9 Aug 2021 14:38:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwbPDhWxjGgJkpW0J++IG9eY3k4xaPJ6t4nvzuj31a2mSmf+LpQmm5YxxOrrrP4ZkthzoHM X-Received: by 2002:a17:907:1b22:: with SMTP id mp34mr24777670ejc.408.1628545135412; Mon, 09 Aug 2021 14:38:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628545135; cv=none; d=google.com; s=arc-20160816; b=wjCW7FKBPeBOd7Wzs7iZoNi9esFxGw2+3B7yugM+8S91XVaU6ETNg8qci8G8v9Wh1G j3iYrQcm2gpfbGKH7L1ag+rnXur4aD9iqw7ZZmugaZla8scgDJ5CCvqoDunl5kyQuJgW JSciIwy/MN9yiRwoiYJPDfofZgDpDtbLXGATozmOANpY4SlLfP6gPp1LLdBtOEufDGaQ n57LKNGDzUtKdXyQBJ9OnmQfx6cL3JxaYrGN0iUG5zzB2sM6HD49okaA/GsGfNMt/HV6 K3wwqSH6WTxzIbWSD19uGgiLm2PQYyQ3jzDkGXW+HmB1BCeCGutMTKRmlLBEbIT7A+vL q09A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=drTkDZMum2Dbgqh/tIdRsyj1mQbOD26pGghPb3tYD5VdIBd2jBoW4P6EFRfhvLgCU3 hEZSsWFRQjpqkaOnObu3jsHgv4i3lKLbK74qiS37y6xpaaEM5ujzquhabN8Kj4uq2BLN G+tJwBK/mqv+3tCyeZnZ9p2PYXer+zAu6yMFfexHj9WujGTcrOaQtvVurI+IIsfibqPS 8TXKym5rypddPPU6KxbUhUMvl1oOkGAMtupPiQ2qw96LaWRaNnoepqLOoxb7ZMKl1CyR Fa4kJozwy57KMz4RgIansKpp+dUUmtI61jp7t/bP6ue2PAjv7yuJr+IaZj4jgFrZjPTX zr+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=LuLiyatg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b13si6891601edy.417.2021.08.09.14.38.30; Mon, 09 Aug 2021 14:38:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=LuLiyatg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236208AbhHITs4 (ORCPT + 99 others); Mon, 9 Aug 2021 15:48:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34118 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236195AbhHITsv (ORCPT ); Mon, 9 Aug 2021 15:48:51 -0400 Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E501CC0617A3 for ; Mon, 9 Aug 2021 12:48:20 -0700 (PDT) Received: by mail-pl1-x633.google.com with SMTP id c16so17723541plh.7 for ; Mon, 09 Aug 2021 12:48:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=LuLiyatg4L0Vt8zuuH92aFL4DwPAOxB9XtuRR5rsD2KFle1ZtAd1P/wIzqDHovrZJm oxtQ8uIleZVNsuQ07R+sKRCaQVKZbc0f54weNRmLw/JTEMOEiQs4xq2oa5S9Jf2Vacdv HOuBQ6P/3SFFe47LUwsnKnF3IRSkOjLpXYURhRQ/5znoMbTxrMr+DatMRr5LQezTC8Ww cohPixCFWyfKGn42FJrjGy5CQ4RgL15pJSmJR4MmV1VdVdRo6kDNE4H1TBsmV6kazMmI m3zEBu9gbzBOXC8qfqbxVTlhzzF/VysABBdz+c8LRJk44zzr2p6NMM6GdO+a6rYyTrlq Grqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=H2tAiXvwTReKeuscS6va6emkR4hBvghr/XtlwQ3gVTV8HHXGSo5YFUa95XaRm0Q4fK aHBYxO9PR2j0F0LAtpZIx6mgZrupaUaea7e8h/lXYgnBJ0QwYlmsrHFot7mmuWGnhlNB C89y70eUzAo1IULqsnkfVhFAv7lg1bhECaOaqjquFRzTY8aM/HFICaI+yR7rSU9DdBjt bLTh3DLfsqAbdAaiMKR3FOCD8XFm6TC4Xnsqye0OW00Q60gaE27KeJfP3ftSmI4AkShv uN5oimp4pUrlEjvi8KG31CmAMdeLdnO+C7co2I9QFNBKeM/KeDzosE+KWr1MDcTbXjww O//w== X-Gm-Message-State: AOAM532LFq0qM0dC8Po7LY+Yxnaou8GCdjfv9AhytPFFm+rPuGlOk2F/ dtvr9eqULou1TgzVhm7870NIxg== X-Received: by 2002:a17:90a:6782:: with SMTP id o2mr728151pjj.165.1628538500526; Mon, 09 Aug 2021 12:48:20 -0700 (PDT) Received: from ip-10-124-121-13.byted.org (ec2-54-241-92-238.us-west-1.compute.amazonaws.com. [54.241.92.238]) by smtp.gmail.com with ESMTPSA id x19sm21372291pfa.104.2021.08.09.12.48.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Aug 2021 12:48:20 -0700 (PDT) From: Jiang Wang To: netdev@vger.kernel.org Cc: cong.wang@bytedance.com, duanxiongchun@bytedance.com, xieyongji@bytedance.com, chaiwen.cc@bytedance.com, John Fastabend , "David S. Miller" , Jakub Kicinski , Daniel Borkmann , Jakub Sitnicki , Lorenz Bauer , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Shuah Khan , Al Viro , Christian Brauner , Johan Almbladh , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH bpf-next v6 5/5] selftest/bpf: add new tests in sockmap for unix stream to tcp. Date: Mon, 9 Aug 2021 19:47:38 +0000 Message-Id: <20210809194742.1489985-6-jiang.wang@bytedance.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210809194742.1489985-1-jiang.wang@bytedance.com> References: <20210809194742.1489985-1-jiang.wang@bytedance.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add two new test cases in sockmap tests, where unix stream is redirected to tcp and vice versa. Signed-off-by: Jiang Wang Reviewed-by: Cong Wang Acked-by: John Fastabend --- .../selftests/bpf/prog_tests/sockmap_listen.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c index 07ed8081f9ae..afa14fb66f08 100644 --- a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c +++ b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c @@ -1884,7 +1884,7 @@ static void inet_unix_redir_to_connected(int family, int type, int sock_mapfd, xclose(p0); } -static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void inet_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1899,9 +1899,13 @@ static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1961,7 +1965,7 @@ static void unix_inet_redir_to_connected(int family, int type, int sock_mapfd, } -static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void unix_inet_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1976,9 +1980,13 @@ static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1994,8 +2002,8 @@ static void test_udp_unix_redir(struct test_sockmap_listen *skel, struct bpf_map snprintf(s, sizeof(s), "%s %s %s", map_name, family_name, __func__); if (!test__start_subtest(s)) return; - udp_unix_skb_redir_to_connected(skel, map, family); - unix_udp_skb_redir_to_connected(skel, map, family); + inet_unix_skb_redir_to_connected(skel, map, family); + unix_inet_skb_redir_to_connected(skel, map, family); } static void run_tests(struct test_sockmap_listen *skel, struct bpf_map *map, -- 2.20.1