diff options
Diffstat (limited to 'tools/testing/selftests/bpf')
4 files changed, 105 insertions, 21 deletions
| diff --git a/tools/testing/selftests/bpf/prog_tests/dummy_st_ops.c b/tools/testing/selftests/bpf/prog_tests/dummy_st_ops.c index 5aa52cc31dc2..c11832657d2b 100644 --- a/tools/testing/selftests/bpf/prog_tests/dummy_st_ops.c +++ b/tools/testing/selftests/bpf/prog_tests/dummy_st_ops.c @@ -2,6 +2,7 @@  /* Copyright (C) 2021. Huawei Technologies Co., Ltd */  #include <test_progs.h>  #include "dummy_st_ops.skel.h" +#include "trace_dummy_st_ops.skel.h"  /* Need to keep consistent with definition in include/linux/bpf.h */  struct bpf_dummy_ops_state { @@ -56,6 +57,7 @@ static void test_dummy_init_ptr_arg(void)  		.ctx_in = args,  		.ctx_size_in = sizeof(args),  	); +	struct trace_dummy_st_ops *trace_skel;  	struct dummy_st_ops *skel;  	int fd, err; @@ -64,12 +66,33 @@ static void test_dummy_init_ptr_arg(void)  		return;  	fd = bpf_program__fd(skel->progs.test_1); + +	trace_skel = trace_dummy_st_ops__open(); +	if (!ASSERT_OK_PTR(trace_skel, "trace_dummy_st_ops__open")) +		goto done; + +	err = bpf_program__set_attach_target(trace_skel->progs.fentry_test_1, +					     fd, "test_1"); +	if (!ASSERT_OK(err, "set_attach_target(fentry_test_1)")) +		goto done; + +	err = trace_dummy_st_ops__load(trace_skel); +	if (!ASSERT_OK(err, "load(trace_skel)")) +		goto done; + +	err = trace_dummy_st_ops__attach(trace_skel); +	if (!ASSERT_OK(err, "attach(trace_skel)")) +		goto done; +  	err = bpf_prog_test_run_opts(fd, &attr);  	ASSERT_OK(err, "test_run");  	ASSERT_EQ(in_state.val, 0x5a, "test_ptr_ret");  	ASSERT_EQ(attr.retval, exp_retval, "test_ret"); +	ASSERT_EQ(trace_skel->bss->val, exp_retval, "fentry_val"); +done:  	dummy_st_ops__destroy(skel); +	trace_dummy_st_ops__destroy(trace_skel);  }  static void test_dummy_multiple_args(void) diff --git a/tools/testing/selftests/bpf/progs/map_ptr_kern.c b/tools/testing/selftests/bpf/progs/map_ptr_kern.c index b64df94ec476..db388f593d0a 100644 --- a/tools/testing/selftests/bpf/progs/map_ptr_kern.c +++ b/tools/testing/selftests/bpf/progs/map_ptr_kern.c @@ -367,7 +367,7 @@ static inline int check_array_of_maps(void)  	VERIFY(check_default(&array_of_maps->map, map));  	inner_map = bpf_map_lookup_elem(array_of_maps, &key); -	VERIFY(inner_map != 0); +	VERIFY(inner_map != NULL);  	VERIFY(inner_map->map.max_entries == INNER_MAX_ENTRIES);  	return 1; @@ -394,7 +394,7 @@ static inline int check_hash_of_maps(void)  	VERIFY(check_default(&hash_of_maps->map, map));  	inner_map = bpf_map_lookup_elem(hash_of_maps, &key); -	VERIFY(inner_map != 0); +	VERIFY(inner_map != NULL);  	VERIFY(inner_map->map.max_entries == INNER_MAX_ENTRIES);  	return 1; diff --git a/tools/testing/selftests/bpf/progs/trace_dummy_st_ops.c b/tools/testing/selftests/bpf/progs/trace_dummy_st_ops.c new file mode 100644 index 000000000000..00a4be9d3074 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/trace_dummy_st_ops.c @@ -0,0 +1,21 @@ +// SPDX-License-Identifier: GPL-2.0 +#include <linux/bpf.h> +#include <bpf/bpf_helpers.h> +#include <bpf/bpf_tracing.h> + +int val = 0; + +SEC("fentry/test_1") +int BPF_PROG(fentry_test_1, __u64 *st_ops_ctx) +{ +	__u64 state; + +	/* Read the traced st_ops arg1 which is a pointer */ +	bpf_probe_read_kernel(&state, sizeof(__u64), (void *)st_ops_ctx); +	/* Read state->val */ +	bpf_probe_read_kernel(&val, sizeof(__u32), (void *)state); + +	return 0; +} + +char _license[] SEC("license") = "GPL"; diff --git a/tools/testing/selftests/bpf/test_tcp_check_syncookie_user.c b/tools/testing/selftests/bpf/test_tcp_check_syncookie_user.c index b9e991d43155..e7775d3bbe08 100644 --- a/tools/testing/selftests/bpf/test_tcp_check_syncookie_user.c +++ b/tools/testing/selftests/bpf/test_tcp_check_syncookie_user.c @@ -18,8 +18,9 @@  #include "bpf_rlimit.h"  #include "cgroup_helpers.h" -static int start_server(const struct sockaddr *addr, socklen_t len) +static int start_server(const struct sockaddr *addr, socklen_t len, bool dual)  { +	int mode = !dual;  	int fd;  	fd = socket(addr->sa_family, SOCK_STREAM, 0); @@ -28,6 +29,14 @@ static int start_server(const struct sockaddr *addr, socklen_t len)  		goto out;  	} +	if (addr->sa_family == AF_INET6) { +		if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&mode, +			       sizeof(mode)) == -1) { +			log_err("Failed to set the dual-stack mode"); +			goto close_out; +		} +	} +  	if (bind(fd, addr, len) == -1) {  		log_err("Failed to bind server socket");  		goto close_out; @@ -47,24 +56,17 @@ out:  	return fd;  } -static int connect_to_server(int server_fd) +static int connect_to_server(const struct sockaddr *addr, socklen_t len)  { -	struct sockaddr_storage addr; -	socklen_t len = sizeof(addr);  	int fd = -1; -	if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { -		log_err("Failed to get server addr"); -		goto out; -	} - -	fd = socket(addr.ss_family, SOCK_STREAM, 0); +	fd = socket(addr->sa_family, SOCK_STREAM, 0);  	if (fd == -1) {  		log_err("Failed to create client socket");  		goto out;  	} -	if (connect(fd, (const struct sockaddr *)&addr, len) == -1) { +	if (connect(fd, (const struct sockaddr *)addr, len) == -1) {  		log_err("Fail to connect to server");  		goto close_out;  	} @@ -116,7 +118,8 @@ err:  	return map_fd;  } -static int run_test(int server_fd, int results_fd, bool xdp) +static int run_test(int server_fd, int results_fd, bool xdp, +		    const struct sockaddr *addr, socklen_t len)  {  	int client = -1, srv_client = -1;  	int ret = 0; @@ -142,7 +145,7 @@ static int run_test(int server_fd, int results_fd, bool xdp)  		goto err;  	} -	client = connect_to_server(server_fd); +	client = connect_to_server(addr, len);  	if (client == -1)  		goto err; @@ -199,12 +202,30 @@ out:  	return ret;  } +static bool get_port(int server_fd, in_port_t *port) +{ +	struct sockaddr_in addr; +	socklen_t len = sizeof(addr); + +	if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { +		log_err("Failed to get server addr"); +		return false; +	} + +	/* sin_port and sin6_port are located at the same offset. */ +	*port = addr.sin_port; +	return true; +} +  int main(int argc, char **argv)  {  	struct sockaddr_in addr4;  	struct sockaddr_in6 addr6; +	struct sockaddr_in addr4dual; +	struct sockaddr_in6 addr6dual;  	int server = -1;  	int server_v6 = -1; +	int server_dual = -1;  	int results = -1;  	int err = 0;  	bool xdp; @@ -224,25 +245,43 @@ int main(int argc, char **argv)  	addr4.sin_family = AF_INET;  	addr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);  	addr4.sin_port = 0; +	memcpy(&addr4dual, &addr4, sizeof(addr4dual));  	memset(&addr6, 0, sizeof(addr6));  	addr6.sin6_family = AF_INET6;  	addr6.sin6_addr = in6addr_loopback;  	addr6.sin6_port = 0; -	server = start_server((const struct sockaddr *)&addr4, sizeof(addr4)); -	if (server == -1) +	memset(&addr6dual, 0, sizeof(addr6dual)); +	addr6dual.sin6_family = AF_INET6; +	addr6dual.sin6_addr = in6addr_any; +	addr6dual.sin6_port = 0; + +	server = start_server((const struct sockaddr *)&addr4, sizeof(addr4), +			      false); +	if (server == -1 || !get_port(server, &addr4.sin_port))  		goto err;  	server_v6 = start_server((const struct sockaddr *)&addr6, -				 sizeof(addr6)); -	if (server_v6 == -1) +				 sizeof(addr6), false); +	if (server_v6 == -1 || !get_port(server_v6, &addr6.sin6_port)) +		goto err; + +	server_dual = start_server((const struct sockaddr *)&addr6dual, +				   sizeof(addr6dual), true); +	if (server_dual == -1 || !get_port(server_dual, &addr4dual.sin_port)) +		goto err; + +	if (run_test(server, results, xdp, +		     (const struct sockaddr *)&addr4, sizeof(addr4)))  		goto err; -	if (run_test(server, results, xdp)) +	if (run_test(server_v6, results, xdp, +		     (const struct sockaddr *)&addr6, sizeof(addr6)))  		goto err; -	if (run_test(server_v6, results, xdp)) +	if (run_test(server_dual, results, xdp, +		     (const struct sockaddr *)&addr4dual, sizeof(addr4dual)))  		goto err;  	printf("ok\n"); @@ -252,6 +291,7 @@ err:  out:  	close(server);  	close(server_v6); +	close(server_dual);  	close(results);  	return err;  } |