lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJ8uoz31-=tvN_eCfxYRS8bWkgFSj=BE6oy5uLmq6UmTGys4ew@mail.gmail.com> Date: Tue, 4 Apr 2023 08:27:46 +0200 From: Magnus Karlsson <magnus.karlsson@...il.com> To: Kal Conley <kal.conley@...tris.com> Cc: Björn Töpel <bjorn@...nel.org>, Magnus Karlsson <magnus.karlsson@...el.com>, Maciej Fijalkowski <maciej.fijalkowski@...el.com>, Jonathan Lemon <jonathan.lemon@...il.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii@...nel.org>, Martin KaFai Lau <martin.lau@...ux.dev>, Song Liu <song@...nel.org>, Yonghong Song <yhs@...com>, John Fastabend <john.fastabend@...il.com>, KP Singh <kpsingh@...nel.org>, Stanislav Fomichev <sdf@...gle.com>, Hao Luo <haoluo@...gle.com>, Jiri Olsa <jolsa@...nel.org>, Mykola Lysenko <mykolal@...com>, Shuah Khan <shuah@...nel.org>, netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kselftest@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH bpf-next 2/2] selftests: xsk: Add test case for packets at end of UMEM On Mon, 3 Apr 2023 at 16:52, Kal Conley <kal.conley@...tris.com> wrote: > > Add test case to testapp_invalid_desc for valid packets at the end of > the UMEM. Thanks. Acked-by: Magnus Karlsson <magnus.karlsson@...el.com> > Signed-off-by: Kal Conley <kal.conley@...tris.com> > --- > tools/testing/selftests/bpf/xskxceiver.c | 7 +++++-- > 1 file changed, 5 insertions(+), 2 deletions(-) > > diff --git a/tools/testing/selftests/bpf/xskxceiver.c b/tools/testing/selftests/bpf/xskxceiver.c > index 3956f5db84f3..34a1f32fe752 100644 > --- a/tools/testing/selftests/bpf/xskxceiver.c > +++ b/tools/testing/selftests/bpf/xskxceiver.c > @@ -1662,6 +1662,8 @@ static void testapp_invalid_desc(struct test_spec *test) > {-2, PKT_SIZE, 0, false}, > /* Packet too large */ > {0x2000, XSK_UMEM__INVALID_FRAME_SIZE, 0, false}, > + /* Up to end of umem allowed */ > + {umem_size - PKT_SIZE, PKT_SIZE, 0, true}, > /* After umem ends */ > {umem_size, PKT_SIZE, 0, false}, > /* Straddle the end of umem */ > @@ -1675,16 +1677,17 @@ static void testapp_invalid_desc(struct test_spec *test) > > if (test->ifobj_tx->umem->unaligned_mode) { > /* Crossing a page boundrary allowed */ > - pkts[6].valid = true; > + pkts[7].valid = true; > } > if (test->ifobj_tx->umem->frame_size == XSK_UMEM__DEFAULT_FRAME_SIZE / 2) { > /* Crossing a 2K frame size boundrary not allowed */ > - pkts[7].valid = false; > + pkts[8].valid = false; > } > > if (test->ifobj_tx->shared_umem) { > pkts[4].addr += umem_size; > pkts[5].addr += umem_size; > + pkts[6].addr += umem_size; > } > > pkt_stream_generate_custom(test, pkts, ARRAY_SIZE(pkts)); > -- > 2.39.2 >
Powered by blists - more mailing lists