From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by mail.toke.dk (Postfix) with ESMTPS id 0B1BF9B2E8A for ; Fri, 4 Nov 2022 04:25:47 +0100 (CET) Authentication-Results: mail.toke.dk; dkim=pass (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256 header.s=20210112 header.b=ZPiJVlIz Received: by mail-pf1-x44a.google.com with SMTP id m6-20020aa79006000000b0056bc283f477so1704368pfo.19 for ; Thu, 03 Nov 2022 20:25:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=TF3gnikwGWod7jyf9S0gnIr/jNh+FCDx9Jkdj/Kkpp8=; b=ZPiJVlIzPI5tA0QTNExoYHzEBc/nx437ZSrPWy8j5UsaJ4xbuf1R0TcuFPw7kds5Bz MQFu+FNjclu6+NMW0VYJTgios2noZ90uFH1q3HrfIJZbLg2bQPx70qOQUyt9jOze15qv oPVmRQEibrzqOmxm7LOkSk18Z+r2hgH0u1lGHbpfuQ3rpkx8v0o2MR83gBRzPKYqqE0D +cBbKSplpgYDuaRSACgYzWCotXaPbt+sOeiOD7bz4uIeYbfoy457pvfhMxhGj1p8LhcA jAFv/tr82+ivOJQgut0fRCmOiBHZUEdDgPTqbnOJ29nug2VOdZ/QI2JgW0kkQBmVIkNW 8R9A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=TF3gnikwGWod7jyf9S0gnIr/jNh+FCDx9Jkdj/Kkpp8=; b=4gKKhwkWK6vfNaTw5V12bfkXWlAwASdUDQbyoWxLp2tMHs2691tc+CKxno3r1RqaaT W4QrOiz5OBLJQZOj4Mb0qug+MmE5zOb419qw2f0hfOkyYhDUr5pEETDgIQpnNikIst24 Gkl59KL3PxoAj2xcCmHb6Wx7STDA0siGF5Z5PUj0ORMYaHB+vrOaCrqam6esIQ/R0CvN SUEdsLzEJB14N74S2wC5u4fh6ni2aQ1YOBptj5ZC7rQQY/L3bU38yttkLWkHa3kuelUG vsEnu2lSY9yzpAWwSKNTlW9IMm1HoGFedYRaF/Rirps8TgXGMSTYBr9fRzMvLpFCPhfJ Br5g== X-Gm-Message-State: ACrzQf0rYrU6XjN3Rkt4Opvac57msDVxsnI4+fMA/siBSaihtNUWGfjp EYkHb+IXuHJm5c4waElKiGXQja4= X-Google-Smtp-Source: AMsMyM4l+bXmf0a0f9swdUoqCtFk/7uqXEnZQd/v+Q165X7IlFkSyIXQ5nAVRxZjbxzqkdcPXJjmU8c= X-Received: from sdf.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5935]) (user=sdf job=sendgmr) by 2002:a05:6a00:4c84:b0:565:f8bb:96f8 with SMTP id eb4-20020a056a004c8400b00565f8bb96f8mr249640pfb.45.1667532346122; Thu, 03 Nov 2022 20:25:46 -0700 (PDT) Date: Thu, 3 Nov 2022 20:25:25 -0700 In-Reply-To: <20221104032532.1615099-1-sdf@google.com> Mime-Version: 1.0 References: <20221104032532.1615099-1-sdf@google.com> X-Mailer: git-send-email 2.38.1.431.g37b22c650d-goog Message-ID: <20221104032532.1615099-8-sdf@google.com> From: Stanislav Fomichev To: bpf@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Message-ID-Hash: XVHEJAMNRWEGENANARTFAAO5VGAFIED2 X-Message-ID-Hash: XVHEJAMNRWEGENANARTFAAO5VGAFIED2 X-MailFrom: 3OoZkYwMKCfkteghpphmf.dpnyeq-ijoutyeq-qspkfdu.ofu@flex--sdf.bounces.google.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, David Ahern , Jakub Kicinski , Willem de Bruijn , Jesper Dangaard Brouer , Anatoly Burakov , Alexander Lobakin , Magnus Karlsson , Maryam Tahhan , xdp-hints@xdp-project.net, netdev@vger.kernel.org X-Mailman-Version: 3.3.5 Precedence: list Subject: [xdp-hints] [RFC bpf-next v2 07/14] selftests/bpf: Verify xdp_metadata xdp->skb path List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - divert 9081 UDP traffic to the kernel - call bpf_xdp_metadata_export_to_skb for such packets - the kernel should fill in hwtstamp - verify that the received packet has non-zero hwtstamp Cc: John Fastabend Cc: David Ahern Cc: Martin KaFai Lau Cc: Jakub Kicinski Cc: Willem de Bruijn Cc: Jesper Dangaard Brouer Cc: Anatoly Burakov Cc: Alexander Lobakin Cc: Magnus Karlsson Cc: Maryam Tahhan Cc: xdp-hints@xdp-project.net Cc: netdev@vger.kernel.org Signed-off-by: Stanislav Fomichev --- .../selftests/bpf/prog_tests/xdp_metadata.c | 92 +++++++++++++++++++ .../selftests/bpf/progs/xdp_metadata.c | 28 ++++++ 2 files changed, 120 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c b/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c index bb06e25fb2bb..96cc6d7697f8 100644 --- a/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c +++ b/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c @@ -19,6 +19,11 @@ #define AF_XDP_SOURCE_PORT 1234 #define AF_XDP_CONSUMER_PORT 8080 +#define SOCKET_CONSUMER_PORT 9081 + +#ifndef SOL_UDP +#define SOL_UDP 17 +#endif #define UMEM_NUM 16 #define UMEM_FRAME_SIZE XSK_UMEM__DEFAULT_FRAME_SIZE @@ -221,6 +226,71 @@ int verify_xsk_metadata(struct xsk *xsk) return 0; } +static void disable_rx_checksum(int fd) +{ + int ret, val; + + val = 1; + ret = setsockopt(fd, SOL_UDP, UDP_NO_CHECK6_RX, &val, sizeof(val)); + ASSERT_OK(ret, "setsockopt(UDP_NO_CHECK6_RX)"); +} + +static void timestamping_enable(int fd) +{ + int ret, val; + + val = SOF_TIMESTAMPING_SOFTWARE | SOF_TIMESTAMPING_RAW_HARDWARE; + ret = setsockopt(fd, SOL_SOCKET, SO_TIMESTAMPING, &val, sizeof(val)); + ASSERT_OK(ret, "setsockopt(SO_TIMESTAMPING)"); +} + +int verify_skb_metadata(int fd) +{ + char cmsg_buf[1024]; + char packet_buf[128]; + + struct scm_timestamping *ts; + struct iovec packet_iov; + struct cmsghdr *cmsg; + struct msghdr hdr; + bool found_hwtstamp = false; + + memset(&hdr, 0, sizeof(hdr)); + hdr.msg_iov = &packet_iov; + hdr.msg_iovlen = 1; + packet_iov.iov_base = packet_buf; + packet_iov.iov_len = sizeof(packet_buf); + + hdr.msg_control = cmsg_buf; + hdr.msg_controllen = sizeof(cmsg_buf); + + if (ASSERT_GE(recvmsg(fd, &hdr, 0), 0, "recvmsg")) { + for (cmsg = CMSG_FIRSTHDR(&hdr); cmsg != NULL; + cmsg = CMSG_NXTHDR(&hdr, cmsg)) { + + if (cmsg->cmsg_level != SOL_SOCKET) + continue; + + switch (cmsg->cmsg_type) { + case SCM_TIMESTAMPING: + ts = (struct scm_timestamping *)CMSG_DATA(cmsg); + if (ts->ts[2].tv_sec || ts->ts[2].tv_nsec) { + found_hwtstamp = true; + break; + } + break; + default: + break; + } + } + } + + if (!ASSERT_EQ(found_hwtstamp, true, "no hwtstamp!")) + return -1; + + return 0; +} + void test_xdp_metadata(void) { struct xdp_metadata *bpf_obj = NULL; @@ -228,6 +298,7 @@ void test_xdp_metadata(void) struct bpf_program *prog; struct xsk tx_xsk = {}; struct xsk rx_xsk = {}; + int rx_udp_fd = -1; int rx_ifindex; int ret; @@ -243,6 +314,8 @@ void test_xdp_metadata(void) SYS("ip link set dev " RX_NAME " up"); SYS("ip addr add " TX_ADDR "/" PREFIX_LEN " dev " TX_NAME); SYS("ip addr add " RX_ADDR "/" PREFIX_LEN " dev " RX_NAME); + SYS("sysctl -q net.ipv4.ip_forward=1"); + SYS("sysctl -q net.ipv4.conf.all.accept_local=1"); rx_ifindex = if_nametoindex(RX_NAME); @@ -256,6 +329,14 @@ void test_xdp_metadata(void) if (!ASSERT_OK(ret, "open_xsk(RX_NAME)")) goto out; + /* Setup UPD listener for RX interface. */ + + rx_udp_fd = start_server(FAMILY, SOCK_DGRAM, NULL, SOCKET_CONSUMER_PORT, 1000); + if (!ASSERT_GE(rx_udp_fd, 0, "start_server")) + goto out; + disable_rx_checksum(rx_udp_fd); + timestamping_enable(rx_udp_fd); + /* Attach BPF program to RX interface. */ bpf_obj = xdp_metadata__open(); @@ -291,9 +372,20 @@ void test_xdp_metadata(void) "verify_xsk_metadata")) goto out; + /* Send packet destined to RX UDP socket. */ + if (!ASSERT_GE(generate_packet(&tx_xsk, SOCKET_CONSUMER_PORT), 0, + "generate SOCKET_CONSUMER_PORT")) + goto out; + + /* Verify SKB RX packet has proper metadata. */ + if (!ASSERT_GE(verify_skb_metadata(rx_udp_fd), 0, + "verify_skb_metadata")) + goto out; + out: close_xsk(&rx_xsk); close_xsk(&tx_xsk); + close(rx_udp_fd); if (bpf_obj) xdp_metadata__destroy(bpf_obj); system("ip netns del xdp_metadata"); diff --git a/tools/testing/selftests/bpf/progs/xdp_metadata.c b/tools/testing/selftests/bpf/progs/xdp_metadata.c index bdde17961ab6..6e7292c58b86 100644 --- a/tools/testing/selftests/bpf/progs/xdp_metadata.c +++ b/tools/testing/selftests/bpf/progs/xdp_metadata.c @@ -17,6 +17,7 @@ struct { __type(value, __u32); } xsk SEC(".maps"); +extern void bpf_xdp_metadata_export_to_skb(const struct xdp_md *ctx) __ksym; extern int bpf_xdp_metadata_rx_timestamp_supported(const struct xdp_md *ctx) __ksym; extern const __u64 bpf_xdp_metadata_rx_timestamp(const struct xdp_md *ctx) __ksym; @@ -24,8 +25,35 @@ SEC("xdp") int rx(struct xdp_md *ctx) { void *data, *data_meta; + struct ethhdr *eth = NULL; + struct udphdr *udp = NULL; + struct iphdr *iph = NULL; + void *data_end; int ret; + /* Exercise xdp -> skb metadata path by diverting some traffic + * into the kernel (UDP destination port 9081). + */ + + data = (void *)(long)ctx->data; + data_end = (void *)(long)ctx->data_end; + eth = data; + if (eth + 1 < data_end) { + if (eth->h_proto == bpf_htons(ETH_P_IP)) { + iph = (void *)(eth + 1); + if (iph + 1 < data_end && iph->protocol == IPPROTO_UDP) + udp = (void *)(iph + 1); + } + if (udp && udp + 1 > data_end) + udp = NULL; + } + if (udp && udp->dest == bpf_htons(9081)) { + bpf_xdp_metadata_export_to_skb(ctx); + bpf_printk("exporting metadata to skb for UDP port 9081"); + /*return bpf_redirect(ifindex, BPF_F_INGRESS);*/ + return XDP_PASS; + } + if (bpf_xdp_metadata_rx_timestamp_supported(ctx)) { __u64 rx_timestamp = bpf_xdp_metadata_rx_timestamp(ctx); -- 2.38.1.431.g37b22c650d-goog