Commit ddd00103 authored by Prashant Bhole's avatar Prashant Bhole Committed by David S. Miller

selftests/net: fixes psock_fanout eBPF test case

eBPF test fails due to verifier failure because log_buf is too small.
Fixed by increasing log_buf size
Signed-off-by: default avatarPrashant Bhole <bhole_prashant_q7@lab.ntt.co.jp>
Acked-by: default avatarWillem de Bruijn <willemb@google.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 68e813aa
...@@ -128,6 +128,8 @@ static void sock_fanout_getopts(int fd, uint16_t *typeflags, uint16_t *group_id) ...@@ -128,6 +128,8 @@ static void sock_fanout_getopts(int fd, uint16_t *typeflags, uint16_t *group_id)
static void sock_fanout_set_ebpf(int fd) static void sock_fanout_set_ebpf(int fd)
{ {
static char log_buf[65536];
const int len_off = __builtin_offsetof(struct __sk_buff, len); const int len_off = __builtin_offsetof(struct __sk_buff, len);
struct bpf_insn prog[] = { struct bpf_insn prog[] = {
{ BPF_ALU64 | BPF_MOV | BPF_X, 6, 1, 0, 0 }, { BPF_ALU64 | BPF_MOV | BPF_X, 6, 1, 0, 0 },
...@@ -140,7 +142,6 @@ static void sock_fanout_set_ebpf(int fd) ...@@ -140,7 +142,6 @@ static void sock_fanout_set_ebpf(int fd)
{ BPF_ALU | BPF_MOV | BPF_K, 0, 0, 0, 0 }, { BPF_ALU | BPF_MOV | BPF_K, 0, 0, 0, 0 },
{ BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 }
}; };
char log_buf[512];
union bpf_attr attr; union bpf_attr attr;
int pfd; int pfd;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment