Commit 7ee0d4e9 authored by Jakub Sitnicki's avatar Jakub Sitnicki Committed by Alexei Starovoitov

selftests/bpf: Switch reuseport tests for test_progs framework

The tests were originally written in abort-on-error style. With the switch
to test_progs we can no longer do that. So at the risk of not cleaning up
some resource on failure, we now return to the caller on error.

That said, failure inside one test should not affect others because we run
setup/cleanup before/after every test.
Signed-off-by: default avatarJakub Sitnicki <jakub@cloudflare.com>
Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20191212102259.418536-11-jakub@cloudflare.com
parent 415bb4e1
...@@ -20,8 +20,11 @@ ...@@ -20,8 +20,11 @@
#include <bpf/libbpf.h> #include <bpf/libbpf.h>
#include "bpf_rlimit.h" #include "bpf_rlimit.h"
#include "bpf_util.h" #include "bpf_util.h"
#include "test_progs.h"
#include "test_select_reuseport_common.h" #include "test_select_reuseport_common.h"
#define MAX_TEST_NAME 80
#define MIN_TCPHDR_LEN 20 #define MIN_TCPHDR_LEN 20
#define UDPHDR_LEN 8 #define UDPHDR_LEN 8
...@@ -34,9 +37,9 @@ static enum result expected_results[NR_RESULTS]; ...@@ -34,9 +37,9 @@ static enum result expected_results[NR_RESULTS];
static int sk_fds[REUSEPORT_ARRAY_SIZE]; static int sk_fds[REUSEPORT_ARRAY_SIZE];
static int reuseport_array = -1, outer_map = -1; static int reuseport_array = -1, outer_map = -1;
static int select_by_skb_data_prog; static int select_by_skb_data_prog;
static int saved_tcp_syncookie; static int saved_tcp_syncookie = -1;
static struct bpf_object *obj; static struct bpf_object *obj;
static int saved_tcp_fo; static int saved_tcp_fo = -1;
static __u32 index_zero; static __u32 index_zero;
static int epfd; static int epfd;
...@@ -46,20 +49,16 @@ static union sa46 { ...@@ -46,20 +49,16 @@ static union sa46 {
sa_family_t family; sa_family_t family;
} srv_sa; } srv_sa;
#define CHECK(condition, tag, format...) ({ \ #define RET_IF(condition, tag, format...) ({ \
int __ret = !!(condition); \ if (CHECK_FAIL(condition)) { \
if (__ret) { \ printf(tag " " format); \
printf("%s(%d):FAIL:%s ", __func__, __LINE__, tag); \ return; \
printf(format); \
exit(-1); \
} \ } \
}) })
#define RET_ERR(condition, tag, format...) ({ \ #define RET_ERR(condition, tag, format...) ({ \
int __ret = !!(condition); \ if (CHECK_FAIL(condition)) { \
if (__ret) { \ printf(tag " " format); \
printf("%s(%d):FAIL:%s ", __func__, __LINE__, tag); \
printf(format); \
return -1; \ return -1; \
} \ } \
}) })
...@@ -202,7 +201,9 @@ static int write_int_sysctl(const char *sysctl, int v) ...@@ -202,7 +201,9 @@ static int write_int_sysctl(const char *sysctl, int v)
static void restore_sysctls(void) static void restore_sysctls(void)
{ {
if (saved_tcp_fo != -1)
write_int_sysctl(TCP_FO_SYSCTL, saved_tcp_fo); write_int_sysctl(TCP_FO_SYSCTL, saved_tcp_fo);
if (saved_tcp_syncookie != -1)
write_int_sysctl(TCP_SYNCOOKIE_SYSCTL, saved_tcp_syncookie); write_int_sysctl(TCP_SYNCOOKIE_SYSCTL, saved_tcp_syncookie);
} }
...@@ -227,13 +228,13 @@ static int disable_syncookie(void) ...@@ -227,13 +228,13 @@ static int disable_syncookie(void)
return write_int_sysctl(TCP_SYNCOOKIE_SYSCTL, 0); return write_int_sysctl(TCP_SYNCOOKIE_SYSCTL, 0);
} }
static __u32 get_linum(void) static long get_linum(void)
{ {
__u32 linum; __u32 linum;
int err; int err;
err = bpf_map_lookup_elem(linum_map, &index_zero, &linum); err = bpf_map_lookup_elem(linum_map, &index_zero, &linum);
CHECK(err == -1, "lookup_elem(linum_map)", "err:%d errno:%d\n", RET_ERR(err == -1, "lookup_elem(linum_map)", "err:%d errno:%d\n",
err, errno); err, errno);
return linum; return linum;
...@@ -250,11 +251,11 @@ static void check_data(int type, sa_family_t family, const struct cmd *cmd, ...@@ -250,11 +251,11 @@ static void check_data(int type, sa_family_t family, const struct cmd *cmd,
addrlen = sizeof(cli_sa); addrlen = sizeof(cli_sa);
err = getsockname(cli_fd, (struct sockaddr *)&cli_sa, err = getsockname(cli_fd, (struct sockaddr *)&cli_sa,
&addrlen); &addrlen);
CHECK(err == -1, "getsockname(cli_fd)", "err:%d errno:%d\n", RET_IF(err == -1, "getsockname(cli_fd)", "err:%d errno:%d\n",
err, errno); err, errno);
err = bpf_map_lookup_elem(data_check_map, &index_zero, &result); err = bpf_map_lookup_elem(data_check_map, &index_zero, &result);
CHECK(err == -1, "lookup_elem(data_check_map)", "err:%d errno:%d\n", RET_IF(err == -1, "lookup_elem(data_check_map)", "err:%d errno:%d\n",
err, errno); err, errno);
if (type == SOCK_STREAM) { if (type == SOCK_STREAM) {
...@@ -297,21 +298,21 @@ static void check_data(int type, sa_family_t family, const struct cmd *cmd, ...@@ -297,21 +298,21 @@ static void check_data(int type, sa_family_t family, const struct cmd *cmd,
printf("expected: (0x%x, %u, %u)\n", printf("expected: (0x%x, %u, %u)\n",
expected.eth_protocol, expected.ip_protocol, expected.eth_protocol, expected.ip_protocol,
expected.bind_inany); expected.bind_inany);
CHECK(1, "data_check result != expected", RET_IF(1, "data_check result != expected",
"bpf_prog_linum:%u\n", get_linum()); "bpf_prog_linum:%ld\n", get_linum());
} }
CHECK(!result.hash, "data_check result.hash empty", RET_IF(!result.hash, "data_check result.hash empty",
"result.hash:%u", result.hash); "result.hash:%u", result.hash);
expected.len += cmd ? sizeof(*cmd) : 0; expected.len += cmd ? sizeof(*cmd) : 0;
if (type == SOCK_STREAM) if (type == SOCK_STREAM)
CHECK(expected.len > result.len, "expected.len > result.len", RET_IF(expected.len > result.len, "expected.len > result.len",
"expected.len:%u result.len:%u bpf_prog_linum:%u\n", "expected.len:%u result.len:%u bpf_prog_linum:%ld\n",
expected.len, result.len, get_linum()); expected.len, result.len, get_linum());
else else
CHECK(expected.len != result.len, "expected.len != result.len", RET_IF(expected.len != result.len, "expected.len != result.len",
"expected.len:%u result.len:%u bpf_prog_linum:%u\n", "expected.len:%u result.len:%u bpf_prog_linum:%ld\n",
expected.len, result.len, get_linum()); expected.len, result.len, get_linum());
} }
...@@ -323,7 +324,7 @@ static void check_results(void) ...@@ -323,7 +324,7 @@ static void check_results(void)
for (i = 0; i < NR_RESULTS; i++) { for (i = 0; i < NR_RESULTS; i++) {
err = bpf_map_lookup_elem(result_map, &i, &results[i]); err = bpf_map_lookup_elem(result_map, &i, &results[i]);
CHECK(err == -1, "lookup_elem(result_map)", RET_IF(err == -1, "lookup_elem(result_map)",
"i:%u err:%d errno:%d\n", i, err, errno); "i:%u err:%d errno:%d\n", i, err, errno);
} }
...@@ -350,9 +351,9 @@ static void check_results(void) ...@@ -350,9 +351,9 @@ static void check_results(void)
printf(", %u", expected_results[i]); printf(", %u", expected_results[i]);
printf("]\n"); printf("]\n");
CHECK(expected_results[broken] != results[broken], RET_IF(expected_results[broken] != results[broken],
"unexpected result", "unexpected result",
"expected_results[%u] != results[%u] bpf_prog_linum:%u\n", "expected_results[%u] != results[%u] bpf_prog_linum:%ld\n",
broken, broken, get_linum()); broken, broken, get_linum());
} }
...@@ -363,15 +364,15 @@ static int send_data(int type, sa_family_t family, void *data, size_t len, ...@@ -363,15 +364,15 @@ static int send_data(int type, sa_family_t family, void *data, size_t len,
int fd, err; int fd, err;
fd = socket(family, type, 0); fd = socket(family, type, 0);
CHECK(fd == -1, "socket()", "fd:%d errno:%d\n", fd, errno); RET_ERR(fd == -1, "socket()", "fd:%d errno:%d\n", fd, errno);
sa46_init_loopback(&cli_sa, family); sa46_init_loopback(&cli_sa, family);
err = bind(fd, (struct sockaddr *)&cli_sa, sizeof(cli_sa)); err = bind(fd, (struct sockaddr *)&cli_sa, sizeof(cli_sa));
CHECK(fd == -1, "bind(cli_sa)", "err:%d errno:%d\n", err, errno); RET_ERR(fd == -1, "bind(cli_sa)", "err:%d errno:%d\n", err, errno);
err = sendto(fd, data, len, MSG_FASTOPEN, (struct sockaddr *)&srv_sa, err = sendto(fd, data, len, MSG_FASTOPEN, (struct sockaddr *)&srv_sa,
sizeof(srv_sa)); sizeof(srv_sa));
CHECK(err != len && expected >= PASS, RET_ERR(err != len && expected >= PASS,
"sendto()", "family:%u err:%d errno:%d expected:%d\n", "sendto()", "family:%u err:%d errno:%d expected:%d\n",
family, err, errno, expected); family, err, errno, expected);
...@@ -388,8 +389,10 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd, ...@@ -388,8 +389,10 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd,
cli_fd = send_data(type, family, cmd, cmd ? sizeof(*cmd) : 0, cli_fd = send_data(type, family, cmd, cmd ? sizeof(*cmd) : 0,
expected); expected);
if (cli_fd < 0)
return;
nev = epoll_wait(epfd, &ev, 1, expected >= PASS ? 5 : 0); nev = epoll_wait(epfd, &ev, 1, expected >= PASS ? 5 : 0);
CHECK((nev <= 0 && expected >= PASS) || RET_IF((nev <= 0 && expected >= PASS) ||
(nev > 0 && expected < PASS), (nev > 0 && expected < PASS),
"nev <> expected", "nev <> expected",
"nev:%d expected:%d type:%d family:%d data:(%d, %d)\n", "nev:%d expected:%d type:%d family:%d data:(%d, %d)\n",
...@@ -402,7 +405,7 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd, ...@@ -402,7 +405,7 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd,
if (expected < PASS) if (expected < PASS)
return; return;
CHECK(expected != PASS_ERR_SK_SELECT_REUSEPORT && RET_IF(expected != PASS_ERR_SK_SELECT_REUSEPORT &&
cmd->reuseport_index != ev.data.u32, cmd->reuseport_index != ev.data.u32,
"check cmd->reuseport_index", "check cmd->reuseport_index",
"cmd:(%u, %u) ev.data.u32:%u\n", "cmd:(%u, %u) ev.data.u32:%u\n",
...@@ -412,12 +415,12 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd, ...@@ -412,12 +415,12 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd,
if (type == SOCK_STREAM) { if (type == SOCK_STREAM) {
int new_fd = accept(srv_fd, NULL, 0); int new_fd = accept(srv_fd, NULL, 0);
CHECK(new_fd == -1, "accept(srv_fd)", RET_IF(new_fd == -1, "accept(srv_fd)",
"ev.data.u32:%u new_fd:%d errno:%d\n", "ev.data.u32:%u new_fd:%d errno:%d\n",
ev.data.u32, new_fd, errno); ev.data.u32, new_fd, errno);
nread = recv(new_fd, &rcv_cmd, sizeof(rcv_cmd), MSG_DONTWAIT); nread = recv(new_fd, &rcv_cmd, sizeof(rcv_cmd), MSG_DONTWAIT);
CHECK(nread != sizeof(rcv_cmd), RET_IF(nread != sizeof(rcv_cmd),
"recv(new_fd)", "recv(new_fd)",
"ev.data.u32:%u nread:%zd sizeof(rcv_cmd):%zu errno:%d\n", "ev.data.u32:%u nread:%zd sizeof(rcv_cmd):%zu errno:%d\n",
ev.data.u32, nread, sizeof(rcv_cmd), errno); ev.data.u32, nread, sizeof(rcv_cmd), errno);
...@@ -425,7 +428,7 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd, ...@@ -425,7 +428,7 @@ static void do_test(int type, sa_family_t family, struct cmd *cmd,
close(new_fd); close(new_fd);
} else { } else {
nread = recv(srv_fd, &rcv_cmd, sizeof(rcv_cmd), MSG_DONTWAIT); nread = recv(srv_fd, &rcv_cmd, sizeof(rcv_cmd), MSG_DONTWAIT);
CHECK(nread != sizeof(rcv_cmd), RET_IF(nread != sizeof(rcv_cmd),
"recv(sk_fds)", "recv(sk_fds)",
"ev.data.u32:%u nread:%zd sizeof(rcv_cmd):%zu errno:%d\n", "ev.data.u32:%u nread:%zd sizeof(rcv_cmd):%zu errno:%d\n",
ev.data.u32, nread, sizeof(rcv_cmd), errno); ev.data.u32, nread, sizeof(rcv_cmd), errno);
...@@ -443,14 +446,12 @@ static void test_err_inner_map(int type, sa_family_t family) ...@@ -443,14 +446,12 @@ static void test_err_inner_map(int type, sa_family_t family)
expected_results[DROP_ERR_INNER_MAP]++; expected_results[DROP_ERR_INNER_MAP]++;
do_test(type, family, &cmd, DROP_ERR_INNER_MAP); do_test(type, family, &cmd, DROP_ERR_INNER_MAP);
printf("OK\n");
} }
static void test_err_skb_data(int type, sa_family_t family) static void test_err_skb_data(int type, sa_family_t family)
{ {
expected_results[DROP_ERR_SKB_DATA]++; expected_results[DROP_ERR_SKB_DATA]++;
do_test(type, family, NULL, DROP_ERR_SKB_DATA); do_test(type, family, NULL, DROP_ERR_SKB_DATA);
printf("OK\n");
} }
static void test_err_sk_select_port(int type, sa_family_t family) static void test_err_sk_select_port(int type, sa_family_t family)
...@@ -462,7 +463,6 @@ static void test_err_sk_select_port(int type, sa_family_t family) ...@@ -462,7 +463,6 @@ static void test_err_sk_select_port(int type, sa_family_t family)
expected_results[DROP_ERR_SK_SELECT_REUSEPORT]++; expected_results[DROP_ERR_SK_SELECT_REUSEPORT]++;
do_test(type, family, &cmd, DROP_ERR_SK_SELECT_REUSEPORT); do_test(type, family, &cmd, DROP_ERR_SK_SELECT_REUSEPORT);
printf("OK\n");
} }
static void test_pass(int type, sa_family_t family) static void test_pass(int type, sa_family_t family)
...@@ -476,7 +476,6 @@ static void test_pass(int type, sa_family_t family) ...@@ -476,7 +476,6 @@ static void test_pass(int type, sa_family_t family)
cmd.reuseport_index = i; cmd.reuseport_index = i;
do_test(type, family, &cmd, PASS); do_test(type, family, &cmd, PASS);
} }
printf("OK\n");
} }
static void test_syncookie(int type, sa_family_t family) static void test_syncookie(int type, sa_family_t family)
...@@ -505,17 +504,16 @@ static void test_syncookie(int type, sa_family_t family) ...@@ -505,17 +504,16 @@ static void test_syncookie(int type, sa_family_t family)
*/ */
err = bpf_map_update_elem(tmp_index_ovr_map, &index_zero, err = bpf_map_update_elem(tmp_index_ovr_map, &index_zero,
&tmp_index, BPF_ANY); &tmp_index, BPF_ANY);
CHECK(err == -1, "update_elem(tmp_index_ovr_map, 0, 1)", RET_IF(err == -1, "update_elem(tmp_index_ovr_map, 0, 1)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
do_test(type, family, &cmd, PASS); do_test(type, family, &cmd, PASS);
err = bpf_map_lookup_elem(tmp_index_ovr_map, &index_zero, err = bpf_map_lookup_elem(tmp_index_ovr_map, &index_zero,
&tmp_index); &tmp_index);
CHECK(err == -1 || tmp_index != -1, RET_IF(err == -1 || tmp_index != -1,
"lookup_elem(tmp_index_ovr_map)", "lookup_elem(tmp_index_ovr_map)",
"err:%d errno:%d tmp_index:%d\n", "err:%d errno:%d tmp_index:%d\n",
err, errno, tmp_index); err, errno, tmp_index);
disable_syncookie(); disable_syncookie();
printf("OK\n");
} }
static void test_pass_on_err(int type, sa_family_t family) static void test_pass_on_err(int type, sa_family_t family)
...@@ -527,7 +525,6 @@ static void test_pass_on_err(int type, sa_family_t family) ...@@ -527,7 +525,6 @@ static void test_pass_on_err(int type, sa_family_t family)
expected_results[PASS_ERR_SK_SELECT_REUSEPORT] += 1; expected_results[PASS_ERR_SK_SELECT_REUSEPORT] += 1;
do_test(type, family, &cmd, PASS_ERR_SK_SELECT_REUSEPORT); do_test(type, family, &cmd, PASS_ERR_SK_SELECT_REUSEPORT);
printf("OK\n");
} }
static void test_detach_bpf(int type, sa_family_t family) static void test_detach_bpf(int type, sa_family_t family)
...@@ -541,43 +538,45 @@ static void test_detach_bpf(int type, sa_family_t family) ...@@ -541,43 +538,45 @@ static void test_detach_bpf(int type, sa_family_t family)
err = setsockopt(sk_fds[0], SOL_SOCKET, SO_DETACH_REUSEPORT_BPF, err = setsockopt(sk_fds[0], SOL_SOCKET, SO_DETACH_REUSEPORT_BPF,
&optvalue, sizeof(optvalue)); &optvalue, sizeof(optvalue));
CHECK(err == -1, "setsockopt(SO_DETACH_REUSEPORT_BPF)", RET_IF(err == -1, "setsockopt(SO_DETACH_REUSEPORT_BPF)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
err = setsockopt(sk_fds[1], SOL_SOCKET, SO_DETACH_REUSEPORT_BPF, err = setsockopt(sk_fds[1], SOL_SOCKET, SO_DETACH_REUSEPORT_BPF,
&optvalue, sizeof(optvalue)); &optvalue, sizeof(optvalue));
CHECK(err == 0 || errno != ENOENT, "setsockopt(SO_DETACH_REUSEPORT_BPF)", RET_IF(err == 0 || errno != ENOENT,
"setsockopt(SO_DETACH_REUSEPORT_BPF)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
for (i = 0; i < NR_RESULTS; i++) { for (i = 0; i < NR_RESULTS; i++) {
err = bpf_map_lookup_elem(result_map, &i, &tmp); err = bpf_map_lookup_elem(result_map, &i, &tmp);
CHECK(err == -1, "lookup_elem(result_map)", RET_IF(err == -1, "lookup_elem(result_map)",
"i:%u err:%d errno:%d\n", i, err, errno); "i:%u err:%d errno:%d\n", i, err, errno);
nr_run_before += tmp; nr_run_before += tmp;
} }
cli_fd = send_data(type, family, &cmd, sizeof(cmd), PASS); cli_fd = send_data(type, family, &cmd, sizeof(cmd), PASS);
if (cli_fd < 0)
return;
nev = epoll_wait(epfd, &ev, 1, 5); nev = epoll_wait(epfd, &ev, 1, 5);
CHECK(nev <= 0, "nev <= 0", RET_IF(nev <= 0, "nev <= 0",
"nev:%d expected:1 type:%d family:%d data:(0, 0)\n", "nev:%d expected:1 type:%d family:%d data:(0, 0)\n",
nev, type, family); nev, type, family);
for (i = 0; i < NR_RESULTS; i++) { for (i = 0; i < NR_RESULTS; i++) {
err = bpf_map_lookup_elem(result_map, &i, &tmp); err = bpf_map_lookup_elem(result_map, &i, &tmp);
CHECK(err == -1, "lookup_elem(result_map)", RET_IF(err == -1, "lookup_elem(result_map)",
"i:%u err:%d errno:%d\n", i, err, errno); "i:%u err:%d errno:%d\n", i, err, errno);
nr_run_after += tmp; nr_run_after += tmp;
} }
CHECK(nr_run_before != nr_run_after, RET_IF(nr_run_before != nr_run_after,
"nr_run_before != nr_run_after", "nr_run_before != nr_run_after",
"nr_run_before:%u nr_run_after:%u\n", "nr_run_before:%u nr_run_after:%u\n",
nr_run_before, nr_run_after); nr_run_before, nr_run_after);
printf("OK\n");
close(cli_fd); close(cli_fd);
#else #else
printf("SKIP\n"); test__skip();
#endif #endif
} }
...@@ -600,11 +599,11 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany) ...@@ -600,11 +599,11 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany)
*/ */
for (i = first; i >= 0; i--) { for (i = first; i >= 0; i--) {
sk_fds[i] = socket(family, type, 0); sk_fds[i] = socket(family, type, 0);
CHECK(sk_fds[i] == -1, "socket()", "sk_fds[%d]:%d errno:%d\n", RET_IF(sk_fds[i] == -1, "socket()", "sk_fds[%d]:%d errno:%d\n",
i, sk_fds[i], errno); i, sk_fds[i], errno);
err = setsockopt(sk_fds[i], SOL_SOCKET, SO_REUSEPORT, err = setsockopt(sk_fds[i], SOL_SOCKET, SO_REUSEPORT,
&optval, sizeof(optval)); &optval, sizeof(optval));
CHECK(err == -1, "setsockopt(SO_REUSEPORT)", RET_IF(err == -1, "setsockopt(SO_REUSEPORT)",
"sk_fds[%d] err:%d errno:%d\n", "sk_fds[%d] err:%d errno:%d\n",
i, err, errno); i, err, errno);
...@@ -613,24 +612,24 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany) ...@@ -613,24 +612,24 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany)
SO_ATTACH_REUSEPORT_EBPF, SO_ATTACH_REUSEPORT_EBPF,
&select_by_skb_data_prog, &select_by_skb_data_prog,
sizeof(select_by_skb_data_prog)); sizeof(select_by_skb_data_prog));
CHECK(err == -1, "setsockopt(SO_ATTACH_REUEPORT_EBPF)", RET_IF(err == -1, "setsockopt(SO_ATTACH_REUEPORT_EBPF)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
} }
err = bind(sk_fds[i], (struct sockaddr *)&srv_sa, addrlen); err = bind(sk_fds[i], (struct sockaddr *)&srv_sa, addrlen);
CHECK(err == -1, "bind()", "sk_fds[%d] err:%d errno:%d\n", RET_IF(err == -1, "bind()", "sk_fds[%d] err:%d errno:%d\n",
i, err, errno); i, err, errno);
if (type == SOCK_STREAM) { if (type == SOCK_STREAM) {
err = listen(sk_fds[i], 10); err = listen(sk_fds[i], 10);
CHECK(err == -1, "listen()", RET_IF(err == -1, "listen()",
"sk_fds[%d] err:%d errno:%d\n", "sk_fds[%d] err:%d errno:%d\n",
i, err, errno); i, err, errno);
} }
err = bpf_map_update_elem(reuseport_array, &i, &sk_fds[i], err = bpf_map_update_elem(reuseport_array, &i, &sk_fds[i],
BPF_NOEXIST); BPF_NOEXIST);
CHECK(err == -1, "update_elem(reuseport_array)", RET_IF(err == -1, "update_elem(reuseport_array)",
"sk_fds[%d] err:%d errno:%d\n", i, err, errno); "sk_fds[%d] err:%d errno:%d\n", i, err, errno);
if (i == first) { if (i == first) {
...@@ -638,20 +637,20 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany) ...@@ -638,20 +637,20 @@ static void prepare_sk_fds(int type, sa_family_t family, bool inany)
err = getsockname(sk_fds[i], (struct sockaddr *)&srv_sa, err = getsockname(sk_fds[i], (struct sockaddr *)&srv_sa,
&addrlen); &addrlen);
CHECK(err == -1, "getsockname()", RET_IF(err == -1, "getsockname()",
"sk_fds[%d] err:%d errno:%d\n", i, err, errno); "sk_fds[%d] err:%d errno:%d\n", i, err, errno);
} }
} }
epfd = epoll_create(1); epfd = epoll_create(1);
CHECK(epfd == -1, "epoll_create(1)", RET_IF(epfd == -1, "epoll_create(1)",
"epfd:%d errno:%d\n", epfd, errno); "epfd:%d errno:%d\n", epfd, errno);
ev.events = EPOLLIN; ev.events = EPOLLIN;
for (i = 0; i < REUSEPORT_ARRAY_SIZE; i++) { for (i = 0; i < REUSEPORT_ARRAY_SIZE; i++) {
ev.data.u32 = i; ev.data.u32 = i;
err = epoll_ctl(epfd, EPOLL_CTL_ADD, sk_fds[i], &ev); err = epoll_ctl(epfd, EPOLL_CTL_ADD, sk_fds[i], &ev);
CHECK(err, "epoll_ctl(EPOLL_CTL_ADD)", "sk_fds[%d]\n", i); RET_IF(err, "epoll_ctl(EPOLL_CTL_ADD)", "sk_fds[%d]\n", i);
} }
} }
...@@ -663,7 +662,7 @@ static void setup_per_test(int type, sa_family_t family, bool inany, ...@@ -663,7 +662,7 @@ static void setup_per_test(int type, sa_family_t family, bool inany,
prepare_sk_fds(type, family, inany); prepare_sk_fds(type, family, inany);
err = bpf_map_update_elem(tmp_index_ovr_map, &index_zero, &ovr, err = bpf_map_update_elem(tmp_index_ovr_map, &index_zero, &ovr,
BPF_ANY); BPF_ANY);
CHECK(err == -1, "update_elem(tmp_index_ovr_map, 0, -1)", RET_IF(err == -1, "update_elem(tmp_index_ovr_map, 0, -1)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
/* Install reuseport_array to outer_map? */ /* Install reuseport_array to outer_map? */
...@@ -672,7 +671,7 @@ static void setup_per_test(int type, sa_family_t family, bool inany, ...@@ -672,7 +671,7 @@ static void setup_per_test(int type, sa_family_t family, bool inany,
err = bpf_map_update_elem(outer_map, &index_zero, &reuseport_array, err = bpf_map_update_elem(outer_map, &index_zero, &reuseport_array,
BPF_ANY); BPF_ANY);
CHECK(err == -1, "update_elem(outer_map, 0, reuseport_array)", RET_IF(err == -1, "update_elem(outer_map, 0, reuseport_array)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
} }
...@@ -689,7 +688,7 @@ static void cleanup_per_test(bool no_inner_map) ...@@ -689,7 +688,7 @@ static void cleanup_per_test(bool no_inner_map)
return; return;
err = bpf_map_delete_elem(outer_map, &index_zero); err = bpf_map_delete_elem(outer_map, &index_zero);
CHECK(err == -1, "delete_elem(outer_map)", RET_IF(err == -1, "delete_elem(outer_map)",
"err:%d errno:%d\n", err, errno); "err:%d errno:%d\n", err, errno);
} }
...@@ -729,7 +728,7 @@ static const char *sotype_str(int sotype) ...@@ -729,7 +728,7 @@ static const char *sotype_str(int sotype)
#define TEST_INIT(fn, ...) { fn, #fn, __VA_ARGS__ } #define TEST_INIT(fn, ...) { fn, #fn, __VA_ARGS__ }
static void test_config(int type, sa_family_t family, bool inany) static void test_config(int sotype, sa_family_t family, bool inany)
{ {
const struct test { const struct test {
void (*fn)(int sotype, sa_family_t family); void (*fn)(int sotype, sa_family_t family);
...@@ -744,20 +743,21 @@ static void test_config(int type, sa_family_t family, bool inany) ...@@ -744,20 +743,21 @@ static void test_config(int type, sa_family_t family, bool inany)
TEST_INIT(test_pass_on_err), TEST_INIT(test_pass_on_err),
TEST_INIT(test_detach_bpf), TEST_INIT(test_detach_bpf),
}; };
char s[MAX_TEST_NAME];
const struct test *t; const struct test *t;
printf("######## %s/%s %s ########\n",
family_str(family), sotype_str(type),
inany ? " INANY " : "LOOPBACK");
for (t = tests; t < tests + ARRAY_SIZE(tests); t++) { for (t = tests; t < tests + ARRAY_SIZE(tests); t++) {
setup_per_test(type, family, inany, t->no_inner_map); snprintf(s, sizeof(s), "%s/%s %s %s",
printf("%s: ", t->name); family_str(family), sotype_str(sotype),
t->fn(type, family); inany ? "INANY" : "LOOPBACK", t->name);
if (!test__start_subtest(s))
continue;
setup_per_test(sotype, family, inany, t->no_inner_map);
t->fn(sotype, family);
cleanup_per_test(t->no_inner_map); cleanup_per_test(t->no_inner_map);
} }
printf("\n");
} }
#define BIND_INANY true #define BIND_INANY true
...@@ -782,10 +782,8 @@ static void test_all(void) ...@@ -782,10 +782,8 @@ static void test_all(void)
test_config(c->sotype, c->family, c->inany); test_config(c->sotype, c->family, c->inany);
} }
int main(int argc, const char **argv) void test_select_reuseport(void)
{ {
int ret = EXIT_FAILURE;
if (create_maps()) if (create_maps())
goto out; goto out;
if (prepare_bpf_obj()) if (prepare_bpf_obj())
...@@ -795,7 +793,6 @@ int main(int argc, const char **argv) ...@@ -795,7 +793,6 @@ int main(int argc, const char **argv)
saved_tcp_syncookie = read_int_sysctl(TCP_SYNCOOKIE_SYSCTL); saved_tcp_syncookie = read_int_sysctl(TCP_SYNCOOKIE_SYSCTL);
if (saved_tcp_syncookie < 0 || saved_tcp_syncookie < 0) if (saved_tcp_syncookie < 0 || saved_tcp_syncookie < 0)
goto out; goto out;
atexit(restore_sysctls);
if (enable_fastopen()) if (enable_fastopen())
goto out; goto out;
...@@ -803,9 +800,7 @@ int main(int argc, const char **argv) ...@@ -803,9 +800,7 @@ int main(int argc, const char **argv)
goto out; goto out;
test_all(); test_all();
ret = EXIT_SUCCESS;
out: out:
cleanup(); cleanup();
return ret; restore_sysctls();
} }
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment