From nobody Tue Dec 2 01:28:38 2025 Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1E0F1263C9F for ; Fri, 21 Nov 2025 08:14:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.49 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763712850; cv=none; b=FGNGnvlNR8oPaQoeA2Hf+RQtW8W227zdZnubzGTy1aUhoeey7s5nBEzMxuE0cLr0N3A0NYxm+nWuZOGod323DLpGkLFzybpFytryfesiCcklSXq4hxlJWmnBfmzzsf0z65uxAX6aOizb5wksvEmXWydsuyPaB4ucFJD6V4BnY0c= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763712850; c=relaxed/simple; bh=uAj5t3uon3XAlpMmhAYFzRZAjMZxodRwMmD+Cn89SWQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=KtE9TAWDbEutSRk7opHiUpBxlOSJCcI/ohRB5DRflyk6TGPwr+gV8V0+mWC9GwBjBCi+9jtZYabHo+BxkLvG6g/fbJFMMfEDDHyDkcEHXubgVFEedwJa09kzOx6xde3phyXrpsE0JDnR4bUxj1r1s3BTUn+NpZtbP7OUi0oZ/+g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=PVaAUSWo; arc=none smtp.client-ip=209.85.128.49 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="PVaAUSWo" Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-47798ded6fcso10402495e9.1 for ; Fri, 21 Nov 2025 00:14:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1763712846; x=1764317646; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=LZvzY5tKy1Em2HRmItEveO3049C1oFM/cjXz6QNtNDU=; b=PVaAUSWo3EUPE4ofpl68nh8vBstpzPp4VMeHvqszFY4m25Yh3msXYMWPxbZUQLK8vE ZtUYmW0MiTX3d/kX0ME2LkE7P4oFyfn5uZhT1yv4sSl8OKRko7fsfzPEGWOKrutMOCzU vUglf+RCeXpRDCZhi30OzzKZnZSSP9MquM8vhjCxX+jCJ1pmmHsaSpFVCXiFWHL5AfRO IT2Xzq4uH3nVmYfaecGAUxRw1NQov1WU64bAY5/O21+zjj/HoabnO1Pk3Yh95rVExeX5 YgV6scZXSzMAHhioI2t6vyupIgIeKMnQWfM0aYNfZX0hVcktIapkvdzYh80kW3N2ds5G NByQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763712846; x=1764317646; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=LZvzY5tKy1Em2HRmItEveO3049C1oFM/cjXz6QNtNDU=; b=WiTOYV7/PI6tAhDPs1aCByUTtL/k85HNexOVgObKwcVjVHFNIsxtIU1C6T9vbIcE9J 8sTi0xZJNEhw7wh1waaF8QN2yKMirZ0upeOmaP1tzt/HcA5k6kVuGBZ/yvNUQWRqwyjl r8Zcx1CcZ3/6aRlVeZaCKXiyuCUniotuaDpFLqLQizBWk0XxBRCXB7d7KCOYW9XcOhxL F1dJT/sK65MzwkLhHvQW+WglElMahPvI3QqafoN12saH1n7Ogb1B5bot8EYQRuCUj6i8 kuQ5vUP7mkmI0vzyHBY7DYTSppI3a0uy6ij+RZwVEC2eI2jMqWBOqaY6lPI26XNnHIvr 79uQ== X-Forwarded-Encrypted: i=1; AJvYcCUeTKmI+iOf7V3i1h1UsSvq31CGkIGrLRkm3z5+gAdFYvGR+/bVC5c7hyvjBoB1MJhGdk6YnC0pJ93Ru4Y=@vger.kernel.org X-Gm-Message-State: AOJu0YwsR7tiMNKg00rigDwv57iP25XbYmym/474H6h5ZhgdJXxu2vDP tULvXiTNGelOJbF2qVu09Kevpfyjpt0g7h4vKXgdIBPbhm93uA/WmmqNQBdJTNFdQ/Kcb/ri3IJ eIntJ X-Gm-Gg: ASbGncvrAp8qfPISjyvcJko+RJBiOIRPVWbSqgka8+g+g9k3W29LoDidaWV03L+SInQ qM2hBngHPg5aQ60VEMKBnf706GHNuJy8GGqRucjQcchR3GneqHxFv1ZS2omosaHeXaz09IGgxP4 Y3QYw3E6Qp6zXrI+WAhwdyrOeTai8sYMcptKNGPJPB7WTZYjyOks09+x/UR467h+JPal/DFK6MJ O0BStpmQ8Z6tGlaMJD59W9SRg/C3YWzpigDGtZeii6uF/FBurn3pxz4H50DrzUFLjbDLSwmNK2s lAz34Vlwn8CMcTKTtJbjpm0fQJV+OU1hUxQv/9JbURkakeb47+f3OIv1aLUjfWZxIll87Kg4tsq N3QZU8rycvih/3NWxY7RtqJw9Q2xLRBKpPeE2OWjfWQAfK49foaG/EjkiuQ6eyr9wvIOKB8DxZ6 WOfT3Tlmvshjq4lSJspHMb2/aPvZOaRt6hLY7K+5g03Z3xR72LQQ== X-Google-Smtp-Source: AGHT+IEu1txDJdEeuNyXg791niBx7HRrUwORyz/8Dajy7a5KZYJypuKK74oeC/wICBZW4I9TNk78aw== X-Received: by 2002:a05:600c:3b86:b0:477:7ae0:cd6e with SMTP id 5b1f17b1804b1-477c10c8038mr10964305e9.5.1763712846382; Fri, 21 Nov 2025 00:14:06 -0800 (PST) Received: from F15.localdomain ([121.167.230.140]) by smtp.gmail.com with ESMTPSA id 41be03b00d2f7-bd75def6314sm4722370a12.7.2025.11.21.00.14.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 Nov 2025 00:14:05 -0800 (PST) From: Hoyeon Lee To: bpf@vger.kernel.org Cc: andrii@kernel.org, eddyz87@gmail.com, ast@kernel.org, daniel@iogearbox.net, martin.lau@linux.dev, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, shuah@kernel.org, hoyeon.lee@suse.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next v2 1/2] selftests/bpf: use sockaddr_storage directly in cls_redirect test Date: Fri, 21 Nov 2025 17:13:31 +0900 Message-ID: <20251121081332.2309838-2-hoyeon.lee@suse.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251121081332.2309838-1-hoyeon.lee@suse.com> References: <20251121081332.2309838-1-hoyeon.lee@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The cls_redirect test uses a custom addr_port/tuple wrapper to represent IPv4/IPv6 addresses and ports. This custom wrapper requires extra conversion logic and specific helpers such as fill_addr_port(), which are no longer necessary when using standard socket address structures. This commit replaces addr_port/tuple with the standard sockaddr_storage so test handles address families and ports using native socket types. It removes the custom helper, eliminates redundant casts, and simplifies the setup helpers without functional changes. set_up_conn() and build_input() now take src/dst sockaddr_storage directly. Signed-off-by: Hoyeon Lee --- Changes in v2: - Remove the tuple wrapper and pass src/dst sockaddr_storage directly. - Rely on ss_family for protocol/port selection. - No other logic changes. .../selftests/bpf/prog_tests/cls_redirect.c | 122 ++++++------------ 1 file changed, 43 insertions(+), 79 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/cls_redirect.c b/tools/= testing/selftests/bpf/prog_tests/cls_redirect.c index 34b59f6baca1..7488a7606e6a 100644 --- a/tools/testing/selftests/bpf/prog_tests/cls_redirect.c +++ b/tools/testing/selftests/bpf/prog_tests/cls_redirect.c @@ -22,79 +22,37 @@ =20 static int duration =3D 0; =20 -struct addr_port { - in_port_t port; - union { - struct in_addr in_addr; - struct in6_addr in6_addr; - }; -}; - -struct tuple { - int family; - struct addr_port src; - struct addr_port dst; -}; - -static bool fill_addr_port(const struct sockaddr *sa, struct addr_port *ap) -{ - const struct sockaddr_in6 *in6; - const struct sockaddr_in *in; - - switch (sa->sa_family) { - case AF_INET: - in =3D (const struct sockaddr_in *)sa; - ap->in_addr =3D in->sin_addr; - ap->port =3D in->sin_port; - return true; - - case AF_INET6: - in6 =3D (const struct sockaddr_in6 *)sa; - ap->in6_addr =3D in6->sin6_addr; - ap->port =3D in6->sin6_port; - return true; - - default: - return false; - } -} =20 -static bool set_up_conn(const struct sockaddr *addr, socklen_t len, int ty= pe, - int *server, int *conn, struct tuple *tuple) +static bool set_up_conn(const struct sockaddr_storage *addr, socklen_t len= , int type, + int *server, int *conn, + struct sockaddr_storage *src, + struct sockaddr_storage *dst) { struct sockaddr_storage ss; socklen_t slen =3D sizeof(ss); - struct sockaddr *sa =3D (struct sockaddr *)&ss; =20 - *server =3D start_server_addr(type, (struct sockaddr_storage *)addr, len,= NULL); + *server =3D start_server_addr(type, addr, len, NULL); if (*server < 0) return false; =20 - if (CHECK_FAIL(getsockname(*server, sa, &slen))) + if (CHECK_FAIL(getsockname(*server, (struct sockaddr *)&ss, &slen))) goto close_server; =20 - *conn =3D connect_to_addr(type, (struct sockaddr_storage *)sa, slen, NULL= ); + *conn =3D connect_to_addr(type, &ss, slen, NULL); if (*conn < 0) goto close_server; =20 /* We want to simulate packets arriving at conn, so we have to * swap src and dst. */ - slen =3D sizeof(ss); - if (CHECK_FAIL(getsockname(*conn, sa, &slen))) - goto close_conn; - - if (CHECK_FAIL(!fill_addr_port(sa, &tuple->dst))) + slen =3D sizeof(*dst); + if (CHECK_FAIL(getsockname(*conn, (struct sockaddr *)dst, &slen))) goto close_conn; =20 - slen =3D sizeof(ss); - if (CHECK_FAIL(getpeername(*conn, sa, &slen))) + slen =3D sizeof(*src); + if (CHECK_FAIL(getpeername(*conn, (struct sockaddr *)src, &slen))) goto close_conn; =20 - if (CHECK_FAIL(!fill_addr_port(sa, &tuple->src))) - goto close_conn; - - tuple->family =3D ss.ss_family; return true; =20 close_conn: @@ -110,17 +68,16 @@ static socklen_t prepare_addr(struct sockaddr_storage = *addr, int family) { struct sockaddr_in *addr4; struct sockaddr_in6 *addr6; + memset(addr, 0, sizeof(*addr)); =20 switch (family) { case AF_INET: addr4 =3D (struct sockaddr_in *)addr; - memset(addr4, 0, sizeof(*addr4)); addr4->sin_family =3D family; addr4->sin_addr.s_addr =3D htonl(INADDR_LOOPBACK); return sizeof(*addr4); case AF_INET6: addr6 =3D (struct sockaddr_in6 *)addr; - memset(addr6, 0, sizeof(*addr6)); addr6->sin6_family =3D family; addr6->sin6_addr =3D in6addr_loopback; return sizeof(*addr6); @@ -242,9 +199,15 @@ static void encap_init(encap_headers_t *encap, uint8_t= hop_count, uint8_t proto) } =20 static size_t build_input(const struct test_cfg *test, void *const buf, - const struct tuple *tuple) + const struct sockaddr_storage *src, + const struct sockaddr_storage *dst) { - in_port_t sport =3D tuple->src.port; + struct sockaddr_in6 *src_in6 =3D (struct sockaddr_in6 *)src; + struct sockaddr_in6 *dst_in6 =3D (struct sockaddr_in6 *)dst; + struct sockaddr_in *src_in =3D (struct sockaddr_in *)src; + struct sockaddr_in *dst_in =3D (struct sockaddr_in *)dst; + sa_family_t family =3D src->ss_family; + in_port_t sport, dport; encap_headers_t encap; struct iphdr ip; struct ipv6hdr ipv6; @@ -254,8 +217,11 @@ static size_t build_input(const struct test_cfg *test,= void *const buf, uint8_t *p =3D buf; int proto; =20 + sport =3D (family =3D=3D AF_INET) ? src_in->sin_port : src_in6->sin6_port; + dport =3D (family =3D=3D AF_INET) ? dst_in->sin_port : dst_in6->sin6_port; + proto =3D IPPROTO_IPIP; - if (tuple->family =3D=3D AF_INET6) + if (family =3D=3D AF_INET6) proto =3D IPPROTO_IPV6; =20 encap_init(&encap, test->hops =3D=3D ONE_HOP ? 1 : 0, proto); @@ -270,15 +236,15 @@ static size_t build_input(const struct test_cfg *test= , void *const buf, if (test->type =3D=3D UDP) proto =3D IPPROTO_UDP; =20 - switch (tuple->family) { + switch (family) { case AF_INET: ip =3D (struct iphdr){ .ihl =3D 5, .version =3D 4, .ttl =3D IPDEFTTL, .protocol =3D proto, - .saddr =3D tuple->src.in_addr.s_addr, - .daddr =3D tuple->dst.in_addr.s_addr, + .saddr =3D src_in->sin_addr.s_addr, + .daddr =3D dst_in->sin_addr.s_addr, }; p =3D mempcpy(p, &ip, sizeof(ip)); break; @@ -287,8 +253,8 @@ static size_t build_input(const struct test_cfg *test, = void *const buf, .version =3D 6, .hop_limit =3D IPDEFTTL, .nexthdr =3D proto, - .saddr =3D tuple->src.in6_addr, - .daddr =3D tuple->dst.in6_addr, + .saddr =3D src_in6->sin6_addr, + .daddr =3D dst_in6->sin6_addr, }; p =3D mempcpy(p, &ipv6, sizeof(ipv6)); break; @@ -303,18 +269,16 @@ static size_t build_input(const struct test_cfg *test= , void *const buf, case TCP: tcp =3D (struct tcphdr){ .source =3D sport, - .dest =3D tuple->dst.port, + .dest =3D dport, + .syn =3D (test->flags =3D=3D SYN), + .ack =3D (test->flags =3D=3D ACK), }; - if (test->flags =3D=3D SYN) - tcp.syn =3D true; - if (test->flags =3D=3D ACK) - tcp.ack =3D true; p =3D mempcpy(p, &tcp, sizeof(tcp)); break; case UDP: udp =3D (struct udphdr){ .source =3D sport, - .dest =3D tuple->dst.port, + .dest =3D dport, }; p =3D mempcpy(p, &udp, sizeof(udp)); break; @@ -339,27 +303,26 @@ static void test_cls_redirect_common(struct bpf_progr= am *prog) LIBBPF_OPTS(bpf_test_run_opts, tattr); int families[] =3D { AF_INET, AF_INET6 }; struct sockaddr_storage ss; - struct sockaddr *addr; socklen_t slen; int i, j, err, prog_fd; int servers[__NR_KIND][ARRAY_SIZE(families)] =3D {}; int conns[__NR_KIND][ARRAY_SIZE(families)] =3D {}; - struct tuple tuples[__NR_KIND][ARRAY_SIZE(families)]; + struct sockaddr_storage srcs[__NR_KIND][ARRAY_SIZE(families)]; + struct sockaddr_storage dsts[__NR_KIND][ARRAY_SIZE(families)]; =20 - addr =3D (struct sockaddr *)&ss; for (i =3D 0; i < ARRAY_SIZE(families); i++) { slen =3D prepare_addr(&ss, families[i]); if (CHECK_FAIL(!slen)) goto cleanup; =20 - if (CHECK_FAIL(!set_up_conn(addr, slen, SOCK_DGRAM, + if (CHECK_FAIL(!set_up_conn(&ss, slen, SOCK_DGRAM, &servers[UDP][i], &conns[UDP][i], - &tuples[UDP][i]))) + &srcs[UDP][i], &dsts[UDP][i]))) goto cleanup; =20 - if (CHECK_FAIL(!set_up_conn(addr, slen, SOCK_STREAM, + if (CHECK_FAIL(!set_up_conn(&ss, slen, SOCK_STREAM, &servers[TCP][i], &conns[TCP][i], - &tuples[TCP][i]))) + &srcs[TCP][i], &dsts[TCP][i]))) goto cleanup; } =20 @@ -368,11 +331,12 @@ static void test_cls_redirect_common(struct bpf_progr= am *prog) struct test_cfg *test =3D &tests[i]; =20 for (j =3D 0; j < ARRAY_SIZE(families); j++) { - struct tuple *tuple =3D &tuples[test->type][j]; + struct sockaddr_storage *src =3D &srcs[test->type][j]; + struct sockaddr_storage *dst =3D &dsts[test->type][j]; char input[256]; char tmp[256]; =20 - test_str(tmp, sizeof(tmp), test, tuple->family); + test_str(tmp, sizeof(tmp), test, families[j]); if (!test__start_subtest(tmp)) continue; =20 @@ -380,7 +344,7 @@ static void test_cls_redirect_common(struct bpf_program= *prog) tattr.data_size_out =3D sizeof(tmp); =20 tattr.data_in =3D input; - tattr.data_size_in =3D build_input(test, input, tuple); + tattr.data_size_in =3D build_input(test, input, src, dst); if (CHECK_FAIL(!tattr.data_size_in)) continue; =20 --=20 2.51.1 From nobody Tue Dec 2 01:28:38 2025 Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4936F274B55 for ; Fri, 21 Nov 2025 08:14:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.52 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763712856; cv=none; b=Fh1ms0yEwXVP1Shmeyb2R0LGzW72QfM953Vfl6VkQR+cbkm4j5uemqqXsjLDeiJSXeV0SVskHrWNbyYXYEd9t38UQKO1LdVvVBCSdb9H2Y7pBoM2UQsg0SL4BFfFhrrRx2sam8ZD1L5/i9/j/4TFPNAdBBVdPF3YlVWkNx5kCkQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763712856; c=relaxed/simple; bh=yRG8Nxy/l0LvjSvT/KrupkQ2EizRIh9OaEoODht8KYk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=eOIILONDtJKigICMSLMqR3B9Orv1xmOQQVUq8bQ9XWub44m/Fl46TR5z+8mgdNDi1lUW5kSyIvVsmcS2fkZIqWTpNK6j/2Q9uRTRLj6KaL6PGxsgZBp1ddcfK4Ko9bxADs8gNGxGRqCtMlXNXmoWS7y2B9Z4x0n2k90BT5hVM+4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=RcRBIxH4; arc=none smtp.client-ip=209.85.128.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="RcRBIxH4" Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-4779adb38d3so12839245e9.2 for ; Fri, 21 Nov 2025 00:14:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1763712851; x=1764317651; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Ps8UGCpaZwTjonsD4/+wCNz8vb5xTFCKH5GRNUH/TvA=; b=RcRBIxH4EfgqyJVlkycqJCMTSxWN49/fn1e2zx5opRW0ECHwcvM1qrnqzKpVzA1Vot LuLcGkzsKHHqKjsTR9waFbt4iBThUypKtwH2zUoEMQvG147Ze/HHkPbRKiM4cdT+Duux 3HsxF72sIAXjKQb38GX+OjMBXOj9oWkSrltoHgBe4AV//0GqcOownbJ6dSbhg8x7DIvD Rop219dQu1Kp6GsLawA1Im0ZI7re5uBzmYS2Kr/fOoEBvEQcWEPJaa0WyCiQzPdkYkKv UpouE4qvLXNR3hiHxjvAJGIN8Rhkwf/nxxHxFwzvv9VVZPGqGcSL8Tj94NX5C+WoEiQO 5QGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763712851; x=1764317651; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=Ps8UGCpaZwTjonsD4/+wCNz8vb5xTFCKH5GRNUH/TvA=; b=WpY/7rYEz7QOZU+Ta4hidYL+PyZtSeQOEJ27vrgd5jGNV9fMuKffHILjKu4z9xPjyV 1cwFwHLwj8o0rvKI4YjTfSfQhkv085sASInCEN287QT3CWtthNnV5VVCuNj0VWd7ui2V TH1i/wR/GJG51X8j31dU3hOjzSxVG8AYOaMXMmfn+w1jQfE/4fpHo0Aoj0ScsJOiVIOc uoKzrU7ssGPU+RuZz7L2Y3wbqAeJ/gWk+MU8JYg13/yc/sEYRKLWjzFIX1vKDp/CpAEs FA1nJW+tXY4PuTYPY6emoM5DYgZ4XPtHXgTIVJCYtyC3mUecBHqo5a+bWSxRrss2AoY9 p/2A== X-Forwarded-Encrypted: i=1; AJvYcCVdhGkSYRf5Q35zxlLMP6Oui2o5ySAEVnGRsA++7mAt3sTQFiArwUpvHEOJObk65FF+X/SyEqqounuaJbQ=@vger.kernel.org X-Gm-Message-State: AOJu0YxNEs1YA7m5ki9L45BVO1li2zM/69KkLsF9J3QUDP02uvFEvxkw YobVrKNjmgHxZ3Z9W655QEi+VFEPgGBoQUn5r6s/EyXc0h+0r2L7L0IoRQfNV708m04= X-Gm-Gg: ASbGncsHo0PYgNbTOev6G2SEPnL7W0mEqvXA2ixY0/vJNDCD6TJnk5NGzlbhAldYCAw xue5OfLobqiIeTzhb3qidbuaZ7mKBpyeZ4HfDvsJ1NCrb8eHR9E6KDxDyKRczNlob2Z4osnaSF1 LwPs2CyW2nK3zP6DelItxledItyHZscpOfu8VnYKofl/Nplvf0FIpeBV2/WxvRaf8qgJPSsf6vo WQ7QgSbizAwSdIOH4E6efITQfuk7UkF+G8ctcKMHcMB+6QijV8VtPo/9eHv8HgWhNQkIym0+ciO OoY796mem9NYGdSQZYTMefRwihr2gs07hgKheQ6Yfz5gEkYG7DKPR643mqEQ26HNC+PdmFP/qBw 48ylyEIVh35AAA5n48EGtgnKaJDne7PYxoO8dmwL/xHcTyMvHyvcxlrfEvRanmMWrynb6qlFC5x i5AXyNCBbC5CiEHenm4WX+VDoXKnmLA0tmO4hu5AOBD7Cy+/aEvg== X-Google-Smtp-Source: AGHT+IFnlEJswVxHvEMgc0ivtrXYrObVWG/nBBqizX/gmyv6vLPBOc/j5AsjkUbZkZCVsCuPkMfgHg== X-Received: by 2002:a05:600c:5491:b0:477:fcb:226b with SMTP id 5b1f17b1804b1-477c016e60cmr13674025e9.2.1763712851432; Fri, 21 Nov 2025 00:14:11 -0800 (PST) Received: from F15.localdomain ([121.167.230.140]) by smtp.gmail.com with ESMTPSA id 41be03b00d2f7-bd75def6314sm4722370a12.7.2025.11.21.00.14.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 Nov 2025 00:14:10 -0800 (PST) From: Hoyeon Lee To: bpf@vger.kernel.org Cc: andrii@kernel.org, eddyz87@gmail.com, ast@kernel.org, daniel@iogearbox.net, martin.lau@linux.dev, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, shuah@kernel.org, hoyeon.lee@suse.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next v2 2/2] selftests/bpf: use sockaddr_storage instead of sa46 in select_reuseport test Date: Fri, 21 Nov 2025 17:13:32 +0900 Message-ID: <20251121081332.2309838-3-hoyeon.lee@suse.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251121081332.2309838-1-hoyeon.lee@suse.com> References: <20251121081332.2309838-1-hoyeon.lee@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The select_reuseport selftest uses a custom sa46 union to represent IPv4 and IPv6 addresses. This custom wrapper requires extra manual handling for address family and field extraction. Replace sa46 with sockaddr_storage and update the helper functions to operate on native socket structures. This simplifies the code and removes unnecessary custom address-handling logic. No functional changes intended. Signed-off-by: Hoyeon Lee --- .../bpf/prog_tests/select_reuseport.c | 67 ++++++++++--------- 1 file changed, 34 insertions(+), 33 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/select_reuseport.c b/to= ols/testing/selftests/bpf/prog_tests/select_reuseport.c index 036d4760d2c1..3dbcc091f16c 100644 --- a/tools/testing/selftests/bpf/prog_tests/select_reuseport.c +++ b/tools/testing/selftests/bpf/prog_tests/select_reuseport.c @@ -41,11 +41,7 @@ static struct bpf_object *obj; static __u32 index_zero; static int epfd; =20 -static union sa46 { - struct sockaddr_in6 v6; - struct sockaddr_in v4; - sa_family_t family; -} srv_sa; +static struct sockaddr_storage srv_sa; =20 #define RET_IF(condition, tag, format...) ({ \ if (CHECK_FAIL(condition)) { \ @@ -135,24 +131,24 @@ static int prepare_bpf_obj(void) return 0; } =20 -static void sa46_init_loopback(union sa46 *sa, sa_family_t family) +static void ss_init_loopback(struct sockaddr_storage *sa, sa_family_t fami= ly) { memset(sa, 0, sizeof(*sa)); - sa->family =3D family; - if (sa->family =3D=3D AF_INET6) - sa->v6.sin6_addr =3D in6addr_loopback; + sa->ss_family =3D family; + if (sa->ss_family =3D=3D AF_INET6) + ((struct sockaddr_in6 *)sa)->sin6_addr =3D in6addr_loopback; else - sa->v4.sin_addr.s_addr =3D htonl(INADDR_LOOPBACK); + ((struct sockaddr_in *)sa)->sin_addr.s_addr =3D htonl(INADDR_LOOPBACK); } =20 -static void sa46_init_inany(union sa46 *sa, sa_family_t family) +static void ss_init_inany(struct sockaddr_storage *sa, sa_family_t family) { memset(sa, 0, sizeof(*sa)); - sa->family =3D family; - if (sa->family =3D=3D AF_INET6) - sa->v6.sin6_addr =3D in6addr_any; + sa->ss_family =3D family; + if (sa->ss_family =3D=3D AF_INET6) + ((struct sockaddr_in6 *)sa)->sin6_addr =3D in6addr_any; else - sa->v4.sin_addr.s_addr =3D INADDR_ANY; + ((struct sockaddr_in *)sa)->sin_addr.s_addr =3D INADDR_ANY; } =20 static int read_int_sysctl(const char *sysctl) @@ -228,7 +224,7 @@ static void check_data(int type, sa_family_t family, co= nst struct cmd *cmd, int cli_fd) { struct data_check expected =3D {}, result; - union sa46 cli_sa; + struct sockaddr_storage cli_sa; socklen_t addrlen; int err; =20 @@ -251,26 +247,32 @@ static void check_data(int type, sa_family_t family, = const struct cmd *cmd, } =20 if (family =3D=3D AF_INET6) { + struct sockaddr_in6 *srv_v6 =3D (struct sockaddr_in6 *)&srv_sa; + struct sockaddr_in6 *cli_v6 =3D (struct sockaddr_in6 *)&cli_sa; + expected.eth_protocol =3D htons(ETH_P_IPV6); - expected.bind_inany =3D !srv_sa.v6.sin6_addr.s6_addr32[3] && - !srv_sa.v6.sin6_addr.s6_addr32[2] && - !srv_sa.v6.sin6_addr.s6_addr32[1] && - !srv_sa.v6.sin6_addr.s6_addr32[0]; + expected.bind_inany =3D !srv_v6->sin6_addr.s6_addr32[3] && + !srv_v6->sin6_addr.s6_addr32[2] && + !srv_v6->sin6_addr.s6_addr32[1] && + !srv_v6->sin6_addr.s6_addr32[0]; =20 - memcpy(&expected.skb_addrs[0], cli_sa.v6.sin6_addr.s6_addr32, - sizeof(cli_sa.v6.sin6_addr)); + memcpy(&expected.skb_addrs[0], cli_v6->sin6_addr.s6_addr32, + sizeof(cli_v6->sin6_addr)); memcpy(&expected.skb_addrs[4], &in6addr_loopback, sizeof(in6addr_loopback)); - expected.skb_ports[0] =3D cli_sa.v6.sin6_port; - expected.skb_ports[1] =3D srv_sa.v6.sin6_port; + expected.skb_ports[0] =3D cli_v6->sin6_port; + expected.skb_ports[1] =3D srv_v6->sin6_port; } else { + struct sockaddr_in *srv_v4 =3D (struct sockaddr_in *)&srv_sa; + struct sockaddr_in *cli_v4 =3D (struct sockaddr_in *)&cli_sa; + expected.eth_protocol =3D htons(ETH_P_IP); - expected.bind_inany =3D !srv_sa.v4.sin_addr.s_addr; + expected.bind_inany =3D !srv_v4->sin_addr.s_addr; =20 - expected.skb_addrs[0] =3D cli_sa.v4.sin_addr.s_addr; + expected.skb_addrs[0] =3D cli_v4->sin_addr.s_addr; expected.skb_addrs[1] =3D htonl(INADDR_LOOPBACK); - expected.skb_ports[0] =3D cli_sa.v4.sin_port; - expected.skb_ports[1] =3D srv_sa.v4.sin_port; + expected.skb_ports[0] =3D cli_v4->sin_port; + expected.skb_ports[1] =3D srv_v4->sin_port; } =20 if (memcmp(&result, &expected, offsetof(struct data_check, @@ -364,16 +366,15 @@ static void check_results(void) static int send_data(int type, sa_family_t family, void *data, size_t len, enum result expected) { - union sa46 cli_sa; + struct sockaddr_storage cli_sa; int fd, err; =20 fd =3D socket(family, type, 0); RET_ERR(fd =3D=3D -1, "socket()", "fd:%d errno:%d\n", fd, errno); =20 - sa46_init_loopback(&cli_sa, family); + ss_init_loopback(&cli_sa, family); err =3D bind(fd, (struct sockaddr *)&cli_sa, sizeof(cli_sa)); RET_ERR(fd =3D=3D -1, "bind(cli_sa)", "err:%d errno:%d\n", err, errno); - err =3D sendto(fd, data, len, MSG_FASTOPEN, (struct sockaddr *)&srv_sa, sizeof(srv_sa)); RET_ERR(err !=3D len && expected >=3D PASS, @@ -589,9 +590,9 @@ static void prepare_sk_fds(int type, sa_family_t family= , bool inany) socklen_t addrlen; =20 if (inany) - sa46_init_inany(&srv_sa, family); + ss_init_inany(&srv_sa, family); else - sa46_init_loopback(&srv_sa, family); + ss_init_loopback(&srv_sa, family); addrlen =3D sizeof(srv_sa); =20 /* --=20 2.51.1