mirror of https://gitee.com/openkylin/linux.git
selftests/bpf: Test allowed maps for bpf_sk_select_reuseport
Check that verifier allows passing a map of type: BPF_MAP_TYPE_REUSEPORT_SOCKARRARY, or BPF_MAP_TYPE_SOCKMAP, or BPF_MAP_TYPE_SOCKHASH ... to bpf_sk_select_reuseport helper. Suggested-by: John Fastabend <john.fastabend@gmail.com> Signed-off-by: Jakub Sitnicki <jakub@cloudflare.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20200430104738.494180-1-jakub@cloudflare.com
This commit is contained in:
parent
063e688133
commit
c321022244
|
@ -50,7 +50,7 @@
|
||||||
#define MAX_INSNS BPF_MAXINSNS
|
#define MAX_INSNS BPF_MAXINSNS
|
||||||
#define MAX_TEST_INSNS 1000000
|
#define MAX_TEST_INSNS 1000000
|
||||||
#define MAX_FIXUPS 8
|
#define MAX_FIXUPS 8
|
||||||
#define MAX_NR_MAPS 19
|
#define MAX_NR_MAPS 20
|
||||||
#define MAX_TEST_RUNS 8
|
#define MAX_TEST_RUNS 8
|
||||||
#define POINTER_VALUE 0xcafe4all
|
#define POINTER_VALUE 0xcafe4all
|
||||||
#define TEST_DATA_LEN 64
|
#define TEST_DATA_LEN 64
|
||||||
|
@ -86,6 +86,7 @@ struct bpf_test {
|
||||||
int fixup_map_array_small[MAX_FIXUPS];
|
int fixup_map_array_small[MAX_FIXUPS];
|
||||||
int fixup_sk_storage_map[MAX_FIXUPS];
|
int fixup_sk_storage_map[MAX_FIXUPS];
|
||||||
int fixup_map_event_output[MAX_FIXUPS];
|
int fixup_map_event_output[MAX_FIXUPS];
|
||||||
|
int fixup_map_reuseport_array[MAX_FIXUPS];
|
||||||
const char *errstr;
|
const char *errstr;
|
||||||
const char *errstr_unpriv;
|
const char *errstr_unpriv;
|
||||||
uint32_t insn_processed;
|
uint32_t insn_processed;
|
||||||
|
@ -637,6 +638,7 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type,
|
||||||
int *fixup_map_array_small = test->fixup_map_array_small;
|
int *fixup_map_array_small = test->fixup_map_array_small;
|
||||||
int *fixup_sk_storage_map = test->fixup_sk_storage_map;
|
int *fixup_sk_storage_map = test->fixup_sk_storage_map;
|
||||||
int *fixup_map_event_output = test->fixup_map_event_output;
|
int *fixup_map_event_output = test->fixup_map_event_output;
|
||||||
|
int *fixup_map_reuseport_array = test->fixup_map_reuseport_array;
|
||||||
|
|
||||||
if (test->fill_helper) {
|
if (test->fill_helper) {
|
||||||
test->fill_insns = calloc(MAX_TEST_INSNS, sizeof(struct bpf_insn));
|
test->fill_insns = calloc(MAX_TEST_INSNS, sizeof(struct bpf_insn));
|
||||||
|
@ -806,6 +808,14 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type,
|
||||||
fixup_map_event_output++;
|
fixup_map_event_output++;
|
||||||
} while (*fixup_map_event_output);
|
} while (*fixup_map_event_output);
|
||||||
}
|
}
|
||||||
|
if (*fixup_map_reuseport_array) {
|
||||||
|
map_fds[19] = __create_map(BPF_MAP_TYPE_REUSEPORT_SOCKARRAY,
|
||||||
|
sizeof(u32), sizeof(u64), 1, 0);
|
||||||
|
do {
|
||||||
|
prog[*fixup_map_reuseport_array].imm = map_fds[19];
|
||||||
|
fixup_map_reuseport_array++;
|
||||||
|
} while (*fixup_map_reuseport_array);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static int set_admin(bool admin)
|
static int set_admin(bool admin)
|
||||||
|
|
|
@ -586,3 +586,48 @@
|
||||||
.prog_type = BPF_PROG_TYPE_SK_SKB,
|
.prog_type = BPF_PROG_TYPE_SK_SKB,
|
||||||
.result = ACCEPT,
|
.result = ACCEPT,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"bpf_sk_select_reuseport(ctx, reuseport_array, &key, flags)",
|
||||||
|
.insns = {
|
||||||
|
BPF_MOV64_IMM(BPF_REG_4, 0),
|
||||||
|
BPF_ST_MEM(BPF_W, BPF_REG_10, -4, 0),
|
||||||
|
BPF_MOV64_REG(BPF_REG_3, BPF_REG_10),
|
||||||
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, -4),
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_2, 0),
|
||||||
|
BPF_EMIT_CALL(BPF_FUNC_sk_select_reuseport),
|
||||||
|
BPF_EXIT_INSN(),
|
||||||
|
},
|
||||||
|
.fixup_map_reuseport_array = { 4 },
|
||||||
|
.prog_type = BPF_PROG_TYPE_SK_REUSEPORT,
|
||||||
|
.result = ACCEPT,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"bpf_sk_select_reuseport(ctx, sockmap, &key, flags)",
|
||||||
|
.insns = {
|
||||||
|
BPF_MOV64_IMM(BPF_REG_4, 0),
|
||||||
|
BPF_ST_MEM(BPF_W, BPF_REG_10, -4, 0),
|
||||||
|
BPF_MOV64_REG(BPF_REG_3, BPF_REG_10),
|
||||||
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, -4),
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_2, 0),
|
||||||
|
BPF_EMIT_CALL(BPF_FUNC_sk_select_reuseport),
|
||||||
|
BPF_EXIT_INSN(),
|
||||||
|
},
|
||||||
|
.fixup_map_sockmap = { 4 },
|
||||||
|
.prog_type = BPF_PROG_TYPE_SK_REUSEPORT,
|
||||||
|
.result = ACCEPT,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"bpf_sk_select_reuseport(ctx, sockhash, &key, flags)",
|
||||||
|
.insns = {
|
||||||
|
BPF_MOV64_IMM(BPF_REG_4, 0),
|
||||||
|
BPF_ST_MEM(BPF_W, BPF_REG_10, -4, 0),
|
||||||
|
BPF_MOV64_REG(BPF_REG_3, BPF_REG_10),
|
||||||
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, -4),
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_2, 0),
|
||||||
|
BPF_EMIT_CALL(BPF_FUNC_sk_select_reuseport),
|
||||||
|
BPF_EXIT_INSN(),
|
||||||
|
},
|
||||||
|
.fixup_map_sockmap = { 4 },
|
||||||
|
.prog_type = BPF_PROG_TYPE_SK_REUSEPORT,
|
||||||
|
.result = ACCEPT,
|
||||||
|
},
|
||||||
|
|
Loading…
Reference in New Issue