Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp575032pxb; Mon, 16 Aug 2021 12:05:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyRV+iqEzbuBG9BYuXjge26Bm+puw2zP/ovqEGwPUdktEdIdjNQa8eXy1LHiWpQELeb574r X-Received: by 2002:a5d:8d1a:: with SMTP id p26mr326745ioj.178.1629140744827; Mon, 16 Aug 2021 12:05:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629140744; cv=none; d=google.com; s=arc-20160816; b=ZeezOdOA95fi51i5VBv5/hCIc23VqxlhwrKqjmDZcUTQcOaskzCufVBDZSpxokjuYW m2UAjE0XXW/8w3nVpavaiJCGppl2XHvqXM1gzURKGsLEOI+Bh/7gH+oA7m/ls8TQ4SI6 RU1E7ofrbZxklaEz0YxV9tFLke/sRetMw9LmtNeXGKfCh5KZuojI5MTQ81ceYCl8a0fT x6k1FNn92u7tzhF1fRnjyGUzS4PWBKrv1Dzh+0HsTq5JgBk4B2f02Xirxg3LhMwjMzN8 M4OsZVopE7f0N5xbLIZ5OUkPhyz4SsgIAZ5GPAcqYoixl72i7Jf4WtVGZHNWszQzxT2U 8hcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=KMiDvt1SCAQsmb7CDIBkLA9yZ9l4rB11aEtS/ftU5piEXyp1Kgvs8o5ZlhiMAGvh+V rOns02I7wARVhLT7c7Y56WieD7UXVygU3KZoK8JnbMAO5V5fMqF7KAjUAnJABv57Hikt AWkeSGjD0qEUHDe9RM1crulWG7QfLbxHz15UaY2t0BL3bOl7qfVH33QREzZ8F/Q+mSbE 5JDwlQ6LbdoCtHUr/X40T/z7ftgv85tjXeLB+/4X3vXmGMPPlm62lrTa++BnrDv4qZwZ rYl7NTfNFo4mGbZ6Sm7jh8rvkdfRnDNzYDoMzcNhWrTQlYqgchC8j6oNYJvYofltYAiI 4PMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b="khVO0/QB"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o4si123763iom.0.2021.08.16.12.05.33; Mon, 16 Aug 2021 12:05:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b="khVO0/QB"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231448AbhHPTEg (ORCPT + 99 others); Mon, 16 Aug 2021 15:04:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44194 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231409AbhHPTEd (ORCPT ); Mon, 16 Aug 2021 15:04:33 -0400 Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A90B1C0613C1 for ; Mon, 16 Aug 2021 12:04:01 -0700 (PDT) Received: by mail-pj1-x102d.google.com with SMTP id j12-20020a17090aeb0c00b00179530520b3so389317pjz.0 for ; Mon, 16 Aug 2021 12:04:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=khVO0/QBba6vVfRXK6CkZDH6IA77BIoDB/of9b/WaqA/ZZPZl1jwp8lXh/+Q9THe6V V23ugeQ+qALQrViS/23lb6hOfjAHcc0squ2h/uz2O7LHQ/302rXRyuELOzhqyxn+c4T9 j8moD3MPTNepuBCMSPp3I/b+AQVIivkGe3p16+tUDMrgjTHf04ImbH9UVN+b1Q3rgpHo swIBWR/0bMgvUajEYIW+mIagnUh/qTMlgWEwnyTUW5Q2i/3lonVdgSFJfmg5GHcbXnAW 15kQuMYaDg3RFCZEg/tL3dYlEmpfkcJP6/xxNM5LMjTP22d3TsUsPGVC0SjzH4KvnCRq yU1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9iqwgQUcM7kXjxKmNPoKYxMsXr+XLcOB8+pWCUZkNe8=; b=hU+qRkapp3bFH9Algozw0A42VkxmAXZKAnO/wLVuS1NvRjgxYdl/tyceD44uxFfi6d QUL6kInHx1ekdd1rEjQwz5xzD5Mqsm4vWOGoXfaLbrdaJ/15oRLKV+NK3k9J+bK+YZK+ iFIUspZ9ViJgEaFOjLtluANwoVWUfJc6cVwipuBmBs34hDLZ48WGBWWhreJJonG5CCqg hLAodtUAf5P2S7xs9QPfB2sxJeLnj3Tw32EbeBsTMe9w7wQw2Xh2mTDzwkMj1EiQUjmd RFaiRbniBMZkzTtewnlbXLeste3rWBE5RegNNyRVQOrTOTJMO+qi38qQKqBVJ8MSHEot ogRw== X-Gm-Message-State: AOAM532edujgK4atqRYtmQvpN43oOAzs2JR0kjVWMydAf7KgkL+wjYOq R9qaPQZInkNj6CDbylmsBxpcow== X-Received: by 2002:a17:902:9885:b0:12d:b795:f48e with SMTP id s5-20020a170902988500b0012db795f48emr259320plp.10.1629140641236; Mon, 16 Aug 2021 12:04:01 -0700 (PDT) Received: from ip-10-124-121-13.byted.org (ec2-54-241-92-238.us-west-1.compute.amazonaws.com. [54.241.92.238]) by smtp.gmail.com with ESMTPSA id t30sm175845pgl.47.2021.08.16.12.03.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Aug 2021 12:04:01 -0700 (PDT) From: Jiang Wang To: netdev@vger.kernel.org Cc: cong.wang@bytedance.com, duanxiongchun@bytedance.com, xieyongji@bytedance.com, chaiwen.cc@bytedance.com, John Fastabend , "David S. Miller" , Jakub Kicinski , Daniel Borkmann , Jakub Sitnicki , Lorenz Bauer , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Shuah Khan , Al Viro , Christian Brauner , Rao Shoaib , Johan Almbladh , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH bpf-next v7 5/5] selftest/bpf: add new tests in sockmap for unix stream to tcp. Date: Mon, 16 Aug 2021 19:03:24 +0000 Message-Id: <20210816190327.2739291-6-jiang.wang@bytedance.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210816190327.2739291-1-jiang.wang@bytedance.com> References: <20210816190327.2739291-1-jiang.wang@bytedance.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add two new test cases in sockmap tests, where unix stream is redirected to tcp and vice versa. Signed-off-by: Jiang Wang Reviewed-by: Cong Wang Acked-by: John Fastabend --- .../selftests/bpf/prog_tests/sockmap_listen.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c index 07ed8081f9ae..afa14fb66f08 100644 --- a/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c +++ b/tools/testing/selftests/bpf/prog_tests/sockmap_listen.c @@ -1884,7 +1884,7 @@ static void inet_unix_redir_to_connected(int family, int type, int sock_mapfd, xclose(p0); } -static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void inet_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1899,9 +1899,13 @@ static void udp_unix_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; inet_unix_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + inet_unix_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1961,7 +1965,7 @@ static void unix_inet_redir_to_connected(int family, int type, int sock_mapfd, } -static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, +static void unix_inet_skb_redir_to_connected(struct test_sockmap_listen *skel, struct bpf_map *inner_map, int family) { int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); @@ -1976,9 +1980,13 @@ static void unix_udp_skb_redir_to_connected(struct test_sockmap_listen *skel, skel->bss->test_ingress = false; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_EGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_EGRESS); skel->bss->test_ingress = true; unix_inet_redir_to_connected(family, SOCK_DGRAM, sock_map, verdict_map, REDIR_INGRESS); + unix_inet_redir_to_connected(family, SOCK_STREAM, sock_map, verdict_map, + REDIR_INGRESS); xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_VERDICT); } @@ -1994,8 +2002,8 @@ static void test_udp_unix_redir(struct test_sockmap_listen *skel, struct bpf_map snprintf(s, sizeof(s), "%s %s %s", map_name, family_name, __func__); if (!test__start_subtest(s)) return; - udp_unix_skb_redir_to_connected(skel, map, family); - unix_udp_skb_redir_to_connected(skel, map, family); + inet_unix_skb_redir_to_connected(skel, map, family); + unix_inet_skb_redir_to_connected(skel, map, family); } static void run_tests(struct test_sockmap_listen *skel, struct bpf_map *map, -- 2.20.1