mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-05-24 10:39:52 +00:00

While commit90f0074cd9
("selftests/bpf: fix a CI failure caused by vsock sockmap test") fixes a receive failure of vsock sockmap test, there is still a write failure: Error: #211/79 sockmap_listen/sockmap VSOCK test_vsock_redir Error: #211/79 sockmap_listen/sockmap VSOCK test_vsock_redir ./test_progs:vsock_unix_redir_connectible:1501: egress: write: Transport endpoint is not connected vsock_unix_redir_connectible:FAIL:1501 ./test_progs:vsock_unix_redir_connectible:1501: ingress: write: Transport endpoint is not connected vsock_unix_redir_connectible:FAIL:1501 ./test_progs:vsock_unix_redir_connectible:1501: egress: write: Transport endpoint is not connected vsock_unix_redir_connectible:FAIL:1501 The reason is that the vsock connection in the test is set to ESTABLISHED state by function virtio_transport_recv_pkt, which is executed in a workqueue thread, so when the user space test thread runs before the workqueue thread, this problem occurs. To fix it, before writing the connection, wait for it to be connected. Fixes:d61bd8c1fd
("selftests/bpf: add a test case for vsock sockmap") Signed-off-by: Xu Kuohai <xukuohai@huawei.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20230901031037.3314007-1-xukuohai@huaweicloud.com
416 lines
13 KiB
C
416 lines
13 KiB
C
#ifndef __SOCKMAP_HELPERS__
|
|
#define __SOCKMAP_HELPERS__
|
|
|
|
#include <linux/vm_sockets.h>
|
|
|
|
#define IO_TIMEOUT_SEC 30
|
|
#define MAX_STRERR_LEN 256
|
|
#define MAX_TEST_NAME 80
|
|
|
|
/* workaround for older vm_sockets.h */
|
|
#ifndef VMADDR_CID_LOCAL
|
|
#define VMADDR_CID_LOCAL 1
|
|
#endif
|
|
|
|
#define __always_unused __attribute__((__unused__))
|
|
|
|
#define _FAIL(errnum, fmt...) \
|
|
({ \
|
|
error_at_line(0, (errnum), __func__, __LINE__, fmt); \
|
|
CHECK_FAIL(true); \
|
|
})
|
|
#define FAIL(fmt...) _FAIL(0, fmt)
|
|
#define FAIL_ERRNO(fmt...) _FAIL(errno, fmt)
|
|
#define FAIL_LIBBPF(err, msg) \
|
|
({ \
|
|
char __buf[MAX_STRERR_LEN]; \
|
|
libbpf_strerror((err), __buf, sizeof(__buf)); \
|
|
FAIL("%s: %s", (msg), __buf); \
|
|
})
|
|
|
|
/* Wrappers that fail the test on error and report it. */
|
|
|
|
#define xaccept_nonblock(fd, addr, len) \
|
|
({ \
|
|
int __ret = \
|
|
accept_timeout((fd), (addr), (len), IO_TIMEOUT_SEC); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("accept"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbind(fd, addr, len) \
|
|
({ \
|
|
int __ret = bind((fd), (addr), (len)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("bind"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xclose(fd) \
|
|
({ \
|
|
int __ret = close((fd)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("close"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xconnect(fd, addr, len) \
|
|
({ \
|
|
int __ret = connect((fd), (addr), (len)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("connect"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xgetsockname(fd, addr, len) \
|
|
({ \
|
|
int __ret = getsockname((fd), (addr), (len)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("getsockname"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xgetsockopt(fd, level, name, val, len) \
|
|
({ \
|
|
int __ret = getsockopt((fd), (level), (name), (val), (len)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("getsockopt(" #name ")"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xlisten(fd, backlog) \
|
|
({ \
|
|
int __ret = listen((fd), (backlog)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("listen"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xsetsockopt(fd, level, name, val, len) \
|
|
({ \
|
|
int __ret = setsockopt((fd), (level), (name), (val), (len)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("setsockopt(" #name ")"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xsend(fd, buf, len, flags) \
|
|
({ \
|
|
ssize_t __ret = send((fd), (buf), (len), (flags)); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("send"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xrecv_nonblock(fd, buf, len, flags) \
|
|
({ \
|
|
ssize_t __ret = recv_timeout((fd), (buf), (len), (flags), \
|
|
IO_TIMEOUT_SEC); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("recv"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xsocket(family, sotype, flags) \
|
|
({ \
|
|
int __ret = socket(family, sotype, flags); \
|
|
if (__ret == -1) \
|
|
FAIL_ERRNO("socket"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbpf_map_delete_elem(fd, key) \
|
|
({ \
|
|
int __ret = bpf_map_delete_elem((fd), (key)); \
|
|
if (__ret < 0) \
|
|
FAIL_ERRNO("map_delete"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbpf_map_lookup_elem(fd, key, val) \
|
|
({ \
|
|
int __ret = bpf_map_lookup_elem((fd), (key), (val)); \
|
|
if (__ret < 0) \
|
|
FAIL_ERRNO("map_lookup"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbpf_map_update_elem(fd, key, val, flags) \
|
|
({ \
|
|
int __ret = bpf_map_update_elem((fd), (key), (val), (flags)); \
|
|
if (__ret < 0) \
|
|
FAIL_ERRNO("map_update"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbpf_prog_attach(prog, target, type, flags) \
|
|
({ \
|
|
int __ret = \
|
|
bpf_prog_attach((prog), (target), (type), (flags)); \
|
|
if (__ret < 0) \
|
|
FAIL_ERRNO("prog_attach(" #type ")"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xbpf_prog_detach2(prog, target, type) \
|
|
({ \
|
|
int __ret = bpf_prog_detach2((prog), (target), (type)); \
|
|
if (__ret < 0) \
|
|
FAIL_ERRNO("prog_detach2(" #type ")"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xpthread_create(thread, attr, func, arg) \
|
|
({ \
|
|
int __ret = pthread_create((thread), (attr), (func), (arg)); \
|
|
errno = __ret; \
|
|
if (__ret) \
|
|
FAIL_ERRNO("pthread_create"); \
|
|
__ret; \
|
|
})
|
|
|
|
#define xpthread_join(thread, retval) \
|
|
({ \
|
|
int __ret = pthread_join((thread), (retval)); \
|
|
errno = __ret; \
|
|
if (__ret) \
|
|
FAIL_ERRNO("pthread_join"); \
|
|
__ret; \
|
|
})
|
|
|
|
static inline int poll_connect(int fd, unsigned int timeout_sec)
|
|
{
|
|
struct timeval timeout = { .tv_sec = timeout_sec };
|
|
fd_set wfds;
|
|
int r, eval;
|
|
socklen_t esize = sizeof(eval);
|
|
|
|
FD_ZERO(&wfds);
|
|
FD_SET(fd, &wfds);
|
|
|
|
r = select(fd + 1, NULL, &wfds, NULL, &timeout);
|
|
if (r == 0)
|
|
errno = ETIME;
|
|
if (r != 1)
|
|
return -1;
|
|
|
|
if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &eval, &esize) < 0)
|
|
return -1;
|
|
if (eval != 0) {
|
|
errno = eval;
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int poll_read(int fd, unsigned int timeout_sec)
|
|
{
|
|
struct timeval timeout = { .tv_sec = timeout_sec };
|
|
fd_set rfds;
|
|
int r;
|
|
|
|
FD_ZERO(&rfds);
|
|
FD_SET(fd, &rfds);
|
|
|
|
r = select(fd + 1, &rfds, NULL, NULL, &timeout);
|
|
if (r == 0)
|
|
errno = ETIME;
|
|
|
|
return r == 1 ? 0 : -1;
|
|
}
|
|
|
|
static inline int accept_timeout(int fd, struct sockaddr *addr, socklen_t *len,
|
|
unsigned int timeout_sec)
|
|
{
|
|
if (poll_read(fd, timeout_sec))
|
|
return -1;
|
|
|
|
return accept(fd, addr, len);
|
|
}
|
|
|
|
static inline int recv_timeout(int fd, void *buf, size_t len, int flags,
|
|
unsigned int timeout_sec)
|
|
{
|
|
if (poll_read(fd, timeout_sec))
|
|
return -1;
|
|
|
|
return recv(fd, buf, len, flags);
|
|
}
|
|
|
|
static inline void init_addr_loopback4(struct sockaddr_storage *ss,
|
|
socklen_t *len)
|
|
{
|
|
struct sockaddr_in *addr4 = memset(ss, 0, sizeof(*ss));
|
|
|
|
addr4->sin_family = AF_INET;
|
|
addr4->sin_port = 0;
|
|
addr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
|
*len = sizeof(*addr4);
|
|
}
|
|
|
|
static inline void init_addr_loopback6(struct sockaddr_storage *ss,
|
|
socklen_t *len)
|
|
{
|
|
struct sockaddr_in6 *addr6 = memset(ss, 0, sizeof(*ss));
|
|
|
|
addr6->sin6_family = AF_INET6;
|
|
addr6->sin6_port = 0;
|
|
addr6->sin6_addr = in6addr_loopback;
|
|
*len = sizeof(*addr6);
|
|
}
|
|
|
|
static inline void init_addr_loopback_vsock(struct sockaddr_storage *ss,
|
|
socklen_t *len)
|
|
{
|
|
struct sockaddr_vm *addr = memset(ss, 0, sizeof(*ss));
|
|
|
|
addr->svm_family = AF_VSOCK;
|
|
addr->svm_port = VMADDR_PORT_ANY;
|
|
addr->svm_cid = VMADDR_CID_LOCAL;
|
|
*len = sizeof(*addr);
|
|
}
|
|
|
|
static inline void init_addr_loopback(int family, struct sockaddr_storage *ss,
|
|
socklen_t *len)
|
|
{
|
|
switch (family) {
|
|
case AF_INET:
|
|
init_addr_loopback4(ss, len);
|
|
return;
|
|
case AF_INET6:
|
|
init_addr_loopback6(ss, len);
|
|
return;
|
|
case AF_VSOCK:
|
|
init_addr_loopback_vsock(ss, len);
|
|
return;
|
|
default:
|
|
FAIL("unsupported address family %d", family);
|
|
}
|
|
}
|
|
|
|
static inline struct sockaddr *sockaddr(struct sockaddr_storage *ss)
|
|
{
|
|
return (struct sockaddr *)ss;
|
|
}
|
|
|
|
static inline int add_to_sockmap(int sock_mapfd, int fd1, int fd2)
|
|
{
|
|
u64 value;
|
|
u32 key;
|
|
int err;
|
|
|
|
key = 0;
|
|
value = fd1;
|
|
err = xbpf_map_update_elem(sock_mapfd, &key, &value, BPF_NOEXIST);
|
|
if (err)
|
|
return err;
|
|
|
|
key = 1;
|
|
value = fd2;
|
|
return xbpf_map_update_elem(sock_mapfd, &key, &value, BPF_NOEXIST);
|
|
}
|
|
|
|
static inline int create_pair(int s, int family, int sotype, int *c, int *p)
|
|
{
|
|
struct sockaddr_storage addr;
|
|
socklen_t len;
|
|
int err = 0;
|
|
|
|
len = sizeof(addr);
|
|
err = xgetsockname(s, sockaddr(&addr), &len);
|
|
if (err)
|
|
return err;
|
|
|
|
*c = xsocket(family, sotype, 0);
|
|
if (*c < 0)
|
|
return errno;
|
|
err = xconnect(*c, sockaddr(&addr), len);
|
|
if (err) {
|
|
err = errno;
|
|
goto close_cli0;
|
|
}
|
|
|
|
*p = xaccept_nonblock(s, NULL, NULL);
|
|
if (*p < 0) {
|
|
err = errno;
|
|
goto close_cli0;
|
|
}
|
|
return err;
|
|
close_cli0:
|
|
close(*c);
|
|
return err;
|
|
}
|
|
|
|
static inline int create_socket_pairs(int s, int family, int sotype,
|
|
int *c0, int *c1, int *p0, int *p1)
|
|
{
|
|
int err;
|
|
|
|
err = create_pair(s, family, sotype, c0, p0);
|
|
if (err)
|
|
return err;
|
|
|
|
err = create_pair(s, family, sotype, c1, p1);
|
|
if (err) {
|
|
close(*c0);
|
|
close(*p0);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static inline int enable_reuseport(int s, int progfd)
|
|
{
|
|
int err, one = 1;
|
|
|
|
err = xsetsockopt(s, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one));
|
|
if (err)
|
|
return -1;
|
|
err = xsetsockopt(s, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &progfd,
|
|
sizeof(progfd));
|
|
if (err)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int socket_loopback_reuseport(int family, int sotype, int progfd)
|
|
{
|
|
struct sockaddr_storage addr;
|
|
socklen_t len;
|
|
int err, s;
|
|
|
|
init_addr_loopback(family, &addr, &len);
|
|
|
|
s = xsocket(family, sotype, 0);
|
|
if (s == -1)
|
|
return -1;
|
|
|
|
if (progfd >= 0)
|
|
enable_reuseport(s, progfd);
|
|
|
|
err = xbind(s, sockaddr(&addr), len);
|
|
if (err)
|
|
goto close;
|
|
|
|
if (sotype & SOCK_DGRAM)
|
|
return s;
|
|
|
|
err = xlisten(s, SOMAXCONN);
|
|
if (err)
|
|
goto close;
|
|
|
|
return s;
|
|
close:
|
|
xclose(s);
|
|
return -1;
|
|
}
|
|
|
|
static inline int socket_loopback(int family, int sotype)
|
|
{
|
|
return socket_loopback_reuseport(family, sotype, -1);
|
|
}
|
|
|
|
|
|
#endif // __SOCKMAP_HELPERS__
|