mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-09-22 12:44:11 +08:00
selftests/bpf: Cover listener cloning with progs attached to sockmap
Today we test if a child socket is cloned properly from a listening socket inside a sockmap only when there are no BPF programs attached to the map. A bug has been reported [1] for the case when sockmap has a verdict program attached. So cover this case as well to prevent regressions. [1]: https://lore.kernel.org/r/00000000000073b14905ef2e7401@google.com Signed-off-by: Jakub Sitnicki <jakub@cloudflare.com> Acked-by: John Fastabend <john.fastabend@gmail.com> Link: https://lore.kernel.org/r/20230113-sockmap-fix-v2-4-1e0ee7ac2f90@cloudflare.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
b4ea530d02
commit
c88ea16a8f
@ -563,8 +563,7 @@ close_s1:
|
||||
/* Exercise the code path where we destroy child sockets that never
|
||||
* got accept()'ed, aka orphans, when parent socket gets closed.
|
||||
*/
|
||||
static void test_destroy_orphan_child(struct test_sockmap_listen *skel __always_unused,
|
||||
int family, int sotype, int mapfd)
|
||||
static void do_destroy_orphan_child(int family, int sotype, int mapfd)
|
||||
{
|
||||
struct sockaddr_storage addr;
|
||||
socklen_t len;
|
||||
@ -595,6 +594,33 @@ close_srv:
|
||||
xclose(s);
|
||||
}
|
||||
|
||||
static void test_destroy_orphan_child(struct test_sockmap_listen *skel,
|
||||
int family, int sotype, int mapfd)
|
||||
{
|
||||
int msg_verdict = bpf_program__fd(skel->progs.prog_msg_verdict);
|
||||
int skb_verdict = bpf_program__fd(skel->progs.prog_skb_verdict);
|
||||
const struct test {
|
||||
int progfd;
|
||||
enum bpf_attach_type atype;
|
||||
} tests[] = {
|
||||
{ -1, -1 },
|
||||
{ msg_verdict, BPF_SK_MSG_VERDICT },
|
||||
{ skb_verdict, BPF_SK_SKB_VERDICT },
|
||||
};
|
||||
const struct test *t;
|
||||
|
||||
for (t = tests; t < tests + ARRAY_SIZE(tests); t++) {
|
||||
if (t->progfd != -1 &&
|
||||
xbpf_prog_attach(t->progfd, mapfd, t->atype, 0) != 0)
|
||||
return;
|
||||
|
||||
do_destroy_orphan_child(family, sotype, mapfd);
|
||||
|
||||
if (t->progfd != -1)
|
||||
xbpf_prog_detach2(t->progfd, mapfd, t->atype);
|
||||
}
|
||||
}
|
||||
|
||||
/* Perform a passive open after removing listening socket from SOCKMAP
|
||||
* to ensure that callbacks get restored properly.
|
||||
*/
|
||||
|
Loading…
Reference in New Issue
Block a user