Received: by 2002:a05:6a10:c7d3:0:0:0:0 with SMTP id h19csp24850pxy; Fri, 13 Aug 2021 21:30:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzo1kE4PSi7STPao+QN0/idoSkl3Sl1FitlRyNE1QHAxGqdkUowVcM2d9grLOFEa1kZ32em X-Received: by 2002:a02:2a88:: with SMTP id w130mr5365354jaw.60.1628915445528; Fri, 13 Aug 2021 21:30:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628915445; cv=none; d=google.com; s=arc-20160816; b=f6JEujSquIfAoyIqsc1mBiOdk0h8ZzdRwQbZmcmGIoy7Zd9RHLfcGVEE6ue2J2QDJ+ aYP/cK/tYEl8S/mMPSkw9+G0aEP4Lc+LXqClbTW3mhmWSDdOekOMJZ5wFkRJ/R893u0K ChyzuRTJvjcAQAbqAjfcQ3FFCM9aVHlTLCPR1fVoJyrHSZia0UuOQycHE5OBO64qtIs1 rXEx5I39RSuBJleYSNKwgRz4Ozjre0CrpUwH7TIt8si4IV1Q8yaSm/0U7weXTrQROImF 99xIy1l2qRWot4s8XsOBzIlSaJGHYZs+F2J48C1HKLgEd3+rb+nMrLIla5kEih4F/+ov DCkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=ZdTvP7tVQ8/uI58/VvhnZSqvF7FSGYUugtgsnpjX69XoN5scsg3pCedQGBW9Vtk7dz uPiFOkvDo/1cA86BHzedkLUC+Lfa1bnNa6jDa6xf58SUFkqRc5DJuhkKrr4MV1BhSJD5 DDnfEzF40LwYxARS8er3oiDGlnpVqNAPtRBzzVoo5rJ8sVkDnGFuCz7uzocFigRyPFKd GHDR7kF6NfPUGeRYu8biotSMCX89ymqGq6escCBpl06RSLS/baD7lWI9CPmyNgV/xACB /O8TKl7HpTrwAGv9xhsXNVmf4wGjTL4Qs+5F7YSr+MebIZAL6DoAG9m+tEqEnX4+n+5B kHfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=fvOuwKoQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x1si3267594ilp.101.2021.08.13.21.30.34; Fri, 13 Aug 2021 21:30:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=fvOuwKoQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235808AbhHNE3D (ORCPT + 99 others); Sat, 14 Aug 2021 00:29:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57568 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237133AbhHNE3A (ORCPT ); Sat, 14 Aug 2021 00:29:00 -0400 Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 53E4DC0612A6 for ; Fri, 13 Aug 2021 21:28:28 -0700 (PDT) Received: by mail-pj1-x102d.google.com with SMTP id j1so18275243pjv.3 for ; Fri, 13 Aug 2021 21:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=fvOuwKoQ212hPJxpvu+eXB3l+9X9CTwdzNpm6t+0yppO7P2Ljyx4B/EmO1jpcR2QP7 knVA8TnyhNcEUc9tIhW2IDYZ8950Jljd4/UHe9yusWxYZo974Pm0pME1hm6EWLKhhRS0 qP6HEgf5D/92s22ehSAmz5RXzInWlQ4xTL/WSbZirekHKLIns2VtYFE8tRhs86P1szll DndmkUznlfGQzIdOvKnT1Kw0WipbuPvFQN47/fzlJSqpWCtPiUdVQKdCnx2VRmO3AkEI 0Lp6rbuZLzt8yjXn2lRMwOI9H91Xy6WWqt8S6Qx90aB9e6Ls+p+sxMvhX3703LXt3Cl/ wz7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=r3PSHkcAjyf4A/8pjnoX3efBhkwY/dr25m2VYWD45VMebcf3N7ci7AKXkaDW7Ajujc ad93sFgBE7AOa9fFjn0hNIRCxNvH4TSlHAmTC+VftJyDueGnC6CYp3nxBOpB5bFMSSpH r7XGYdPAsX1mUQ1mNg/ZC2N7X/4WFNy75HsYl34iLdva0fhGy3a2krUaZfTfojMFVRS8 eeaBR7k1wocR9b17tVSj8aV+T2SVKgUAy5QxNamntsNaS7w/mz6yFqVJFQE0bDqIvOfj 3gSmFNPL993caEpJcuiWEgazrOWgvq0kmBN2EvahobRuxkLsj4r60WoPXKKO/2D3WjY5 7DAw== X-Gm-Message-State: AOAM531TPB8RK1+vcrFBzY4UWtACq07Bbi4EMG7NITyURiFvkaf2fXRb o0my6nX/rSgrLgcjbZUKPnTVSQ== X-Received: by 2002:a63:7c5:: with SMTP id 188mr5331402pgh.211.1628915307941; Fri, 13 Aug 2021 21:28:27 -0700 (PDT) Received: from ip-10-124-121-13.byted.org (ec2-54-241-92-238.us-west-1.compute.amazonaws.com. [54.241.92.238]) by smtp.gmail.com with ESMTPSA id q21sm4420492pgk.71.2021.08.13.21.28.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Aug 2021 21:28:27 -0700 (PDT) From: Jiang Wang To: netdev@vger.kernel.org Cc: cong.wang@bytedance.com, duanxiongchun@bytedance.com, xieyongji@bytedance.com, chaiwen.cc@bytedance.com, John Fastabend , "David S. Miller" , Jakub Kicinski , Daniel Borkmann , Jakub Sitnicki , Lorenz Bauer , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Shuah Khan , Al Viro , Christian Brauner , Rao Shoaib , Johan Almbladh , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH bpf-next v6 5/5] selftest/bpf: add new tests in sockmap for unix stream to tcp. Date: Sat, 14 Aug 2021 04:27:50 +0000 Message-Id: <20210814042754.3351268-6-jiang.wang@bytedance.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210814042754.3351268-1-jiang.wang@bytedance.com> References: <20210814042754.3351268-1-jiang.wang@bytedance.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add two new test cases in sockmap tests, where unix stream is redirected to tcp and vice versa. Signed-off-by: Jiang Wang Reviewed-by: Cong Wang Acked-by: John Fastabend --- .../selftests/bpf/prog_tests/sockmap_listen.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c index 07ed8081f9ae..afa14fb66f08 100644 --- a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c +++ b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c @@ -1884,7 +1884,7 @@ static void inet_unix_redir_to_connected(int family, int type, int sock_mapfd, xclose(p0); } -static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void inet_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1899,9 +1899,13 @@ static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1961,7 +1965,7 @@ static void unix_inet_redir_to_connected(int family, int type, int sock_mapfd, } -static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void unix_inet_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1976,9 +1980,13 @@ static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1994,8 +2002,8 @@ static void test_udp_unix_redir(struct test_sockmap_listen *skel, struct bpf_map snprintf(s, sizeof(s), "%s %s %s", map_name, family_name, __func__); if (!test__start_subtest(s)) return; - udp_unix_skb_redir_to_connected(skel, map, family); - unix_udp_skb_redir_to_connected(skel, map, family); + inet_unix_skb_redir_to_connected(skel, map, family); + unix_inet_skb_redir_to_connected(skel, map, family); } static void run_tests(struct test_sockmap_listen *skel, struct bpf_map *map, -- 2.20.1