From nobody Wed May 15 06:48:36 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 80E66129A63; Mon, 25 Mar 2024 05:15:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711343727; cv=none; b=U/cexwYXtIJiVZYKUhyCHopQm03lG5K1bbFS5c1XeuvIXmL6o1SO4kMCKrfid8ypen2ThQiy/NaxGuTGvowVhGMse+EUEQd+wtYSHoI5q5OkD51nnF77FWVi9qMR1RLMXtKSC3a9cOv/P/R8zmzbanMityXyBqzrcieMOa9V75o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711343727; c=relaxed/simple; bh=bs0JfZVK/aN1+hpKTWB7rxnBB7XfX24fEF7rMO6xYMQ=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=a+OT/5cUjBE2icpnvA4Ui+acOUYCZEBSbbvfSyld2A1UPEupccffLCGtwqScO8Mf8cnnKwWasqlCf3VjPYcIN342YMBF3EB6QkAa2PLwykorRq/3CSmcYxnFfYggaGGknZcZya2gW89lSZ7jS5cJGS7iFnur+PQmtLPl4SkbHBg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FlzmGzDo; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FlzmGzDo" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0D303C433C7; Mon, 25 Mar 2024 05:15:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711343727; bh=bs0JfZVK/aN1+hpKTWB7rxnBB7XfX24fEF7rMO6xYMQ=; h=From:To:Cc:Subject:Date:From; b=FlzmGzDojtvmAx+BuGaPu25aDpTdgrxqXDT9ukZliUiEeGWTyHAC2uFvY7srcxB02 rC4BGmiUKiQu/r84I59J+eWyxW8nj5TI9H05+OrYHfLVSki8zn6/5itq8RQIhuSkWG r2syPs5pc50RGDFxzvUocol/tJGVMXWplVDc6E4sHcStEeCPW3MJ9D31HO+4Gm5FXO u6OMuyBhrwpSaNOxQOOTw2ziYmZFl9GK+77LYxdv+f+x+Rk8aiZazy8gJlRS/J1I8i JubDgEV40hWlYTrlpCdiBK23YNZxBuiwHCTLrxm3fYbNWMaM7h3VTXhuROCGxeGEVQ R/0xNSMZvBF2g== From: Geliang Tang To: bpf@vger.kernel.org, Andrii Nakryiko , Eduard Zingerman , Mykola Lysenko , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Shuah Khan Cc: Geliang Tang , mptcp@lists.linux.dev Subject: [PATCH bpf-next v2] selftests/bpf: Use start_server and connect_fd_to_fd Date: Mon, 25 Mar 2024 13:15:10 +0800 Message-Id: <686400b5c4eefdb930048df57cc513dbd6e94fa1.1711343483.git.tanggeliang@kylinos.cn> X-Mailer: git-send-email 2.40.1 Precedence: bulk X-Mailing-List: mptcp@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Geliang Tang To simplify the code, use BPF selftests helpers start_server() and connect_fd_to_fd() in bpf_tcp_ca.c instead of open-coding. These helpers are defined in network_helpers.c, and exported in network_helpers.h, which is already included in bpf_tcp_ca.c. Signed-off-by: Geliang Tang --- v2: - use connect_fd_to_fd too. --- .../selftests/bpf/prog_tests/bpf_tcp_ca.c | 24 +++---------------- 1 file changed, 3 insertions(+), 21 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_tcp_ca.c b/tools/te= sting/selftests/bpf/prog_tests/bpf_tcp_ca.c index a88e6e07e4f5..3da3030c9365 100644 --- a/tools/testing/selftests/bpf/prog_tests/bpf_tcp_ca.c +++ b/tools/testing/selftests/bpf/prog_tests/bpf_tcp_ca.c @@ -78,18 +78,16 @@ static void *server(void *arg) =20 static void do_test(const char *tcp_ca, const struct bpf_map *sk_stg_map) { - struct sockaddr_in6 sa6 =3D {}; ssize_t nr_recv =3D 0, bytes =3D 0; int lfd =3D -1, fd =3D -1; pthread_t srv_thread; - socklen_t addrlen =3D sizeof(sa6); void *thread_ret; char batch[1500]; int err; =20 WRITE_ONCE(stop, 0); =20 - lfd =3D socket(AF_INET6, SOCK_STREAM, 0); + lfd =3D start_server(AF_INET6, SOCK_STREAM, NULL, 0, 0); if (!ASSERT_NEQ(lfd, -1, "socket")) return; =20 @@ -99,23 +97,7 @@ static void do_test(const char *tcp_ca, const struct bpf= _map *sk_stg_map) return; } =20 - if (settcpca(lfd, tcp_ca) || settcpca(fd, tcp_ca) || - settimeo(lfd, 0) || settimeo(fd, 0)) - goto done; - - /* bind, listen and start server thread to accept */ - sa6.sin6_family =3D AF_INET6; - sa6.sin6_addr =3D in6addr_loopback; - err =3D bind(lfd, (struct sockaddr *)&sa6, addrlen); - if (!ASSERT_NEQ(err, -1, "bind")) - goto done; - - err =3D getsockname(lfd, (struct sockaddr *)&sa6, &addrlen); - if (!ASSERT_NEQ(err, -1, "getsockname")) - goto done; - - err =3D listen(lfd, 1); - if (!ASSERT_NEQ(err, -1, "listen")) + if (settcpca(lfd, tcp_ca) || settcpca(fd, tcp_ca)) goto done; =20 if (sk_stg_map) { @@ -126,7 +108,7 @@ static void do_test(const char *tcp_ca, const struct bp= f_map *sk_stg_map) } =20 /* connect to server */ - err =3D connect(fd, (struct sockaddr *)&sa6, addrlen); + err =3D connect_fd_to_fd(fd, lfd, 0); if (!ASSERT_NEQ(err, -1, "connect")) goto done; =20 --=20 2.40.1