From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by mail.toke.dk (Postfix) with ESMTPS id E38CCA1AE15 for ; Wed, 19 Jul 2023 20:42:30 +0200 (CEST) Authentication-Results: mail.toke.dk; dkim=pass (2048-bit key; unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=ILnUYyHU DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1689792151; x=1721328151; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=tCRT0YNCRb1+JRzmmOM7Ki1u+a+FvS1+eOg+htCms3s=; b=ILnUYyHUDFmseHWu5Zo+A9BppeDtLzCymtBUtSt40BYRIT5Q7dse5QjJ PrF5AniDsb7HQeuwOmxbIntk46ZTOdQyjeLOhqaJxmP0ncbdG8HSogd0L +h1lwOnkt/DAUzbWGjMjaxcfYnJwZ+FVpSou50h0dIccTTmXEBvn9S6gV NXUQOX2Vea/LKZ+zt2BmlQPdqW5TG3AUKZYHUTv3uHizL+MFZN0L+1cvM jvC4o7XQFgUtIRIGOBgrxKCCUD9dGl297NPvqnoQzvlwQi2iq4iIfToPv SJ2q+RJps6wdYeEbJeBII1PgavvAnoz+IfbfCqMW4CniKeE23PMKVIV8t g==; X-IronPort-AV: E=McAfee;i="6600,9927,10776"; a="356504882" X-IronPort-AV: E=Sophos;i="6.01,216,1684825200"; d="scan'208";a="356504882" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jul 2023 11:42:29 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10776"; a="674405837" X-IronPort-AV: E=Sophos;i="6.01,216,1684825200"; d="scan'208";a="674405837" Received: from irvmail002.ir.intel.com ([10.43.11.120]) by orsmga003.jf.intel.com with ESMTP; 19 Jul 2023 11:42:24 -0700 Received: from lincoln.igk.intel.com (lincoln.igk.intel.com [10.102.21.235]) by irvmail002.ir.intel.com (Postfix) with ESMTP id AED2434F04; Wed, 19 Jul 2023 19:42:22 +0100 (IST) From: Larysa Zaremba To: bpf@vger.kernel.org Date: Wed, 19 Jul 2023 20:37:34 +0200 Message-ID: <20230719183734.21681-22-larysa.zaremba@intel.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230719183734.21681-1-larysa.zaremba@intel.com> References: <20230719183734.21681-1-larysa.zaremba@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-ID-Hash: EAXJ7VHOYCLOGTXZ6BWIZB7526SIPI4S X-Message-ID-Hash: EAXJ7VHOYCLOGTXZ6BWIZB7526SIPI4S X-MailFrom: larysa.zaremba@intel.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Larysa Zaremba , ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, David Ahern , Jakub Kicinski , Willem de Bruijn , Jesper Dangaard Brouer , Anatoly Burakov , Alexander Lobakin , Magnus Karlsson , Maryam Tahhan , xdp-hints@xdp-project.net, netdev@vger.kernel.org X-Mailman-Version: 3.3.8 Precedence: list Subject: [xdp-hints] [PATCH bpf-next v3 21/21] selftests/bpf: check checksum state in xdp_metadata List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Verify, whether kfunc in xdp_metadata test correctly returns partial checksum status and offsets. Signed-off-by: Larysa Zaremba --- .../selftests/bpf/prog_tests/xdp_metadata.c | 30 +++++++++++++++++++ .../selftests/bpf/progs/xdp_metadata.c | 6 ++++ 2 files changed, 36 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c b/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c index 6665cf0c59cc..c0ce66703696 100644 --- a/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c +++ b/tools/testing/selftests/bpf/prog_tests/xdp_metadata.c @@ -47,6 +47,7 @@ #define XDP_RSS_TYPE_L4 BIT(3) #define VLAN_VID_MASK 0xfff +#define XDP_CHECKSUM_PARTIAL BIT(3) struct xsk { void *umem_area; @@ -168,6 +169,32 @@ static void refill_rx(struct xsk *xsk, __u64 addr) } } +struct partial_csum_info { + __u16 csum_start; + __u16 csum_offset; +}; + +static bool assert_checksum_ok(struct xdp_meta *meta) +{ + struct partial_csum_info *info; + u32 csum_start, csum_offset; + + if (!ASSERT_EQ(meta->rx_csum_status, XDP_CHECKSUM_PARTIAL, + "rx_csum_status")) + return false; + + csum_start = sizeof(struct ethhdr) + sizeof(struct iphdr); + csum_offset = offsetof(struct udphdr, check); + info = (void *)&meta->rx_csum_info; + + if (!ASSERT_EQ(info->csum_start, csum_start, "rx csum_start")) + return false; + if (!ASSERT_EQ(info->csum_offset, csum_offset, "rx csum_offset")) + return false; + + return true; +} + static int verify_xsk_metadata(struct xsk *xsk) { const struct xdp_desc *rx_desc; @@ -229,6 +256,9 @@ static int verify_xsk_metadata(struct xsk *xsk) if (!ASSERT_EQ(meta->rx_vlan_proto, VLAN_PID, "rx_vlan_proto")) return -1; + if (!assert_checksum_ok(meta)) + return -1; + xsk_ring_cons__release(&xsk->rx, 1); refill_rx(xsk, comp_addr); diff --git a/tools/testing/selftests/bpf/progs/xdp_metadata.c b/tools/testing/selftests/bpf/progs/xdp_metadata.c index d3111649170e..e79667a0726e 100644 --- a/tools/testing/selftests/bpf/progs/xdp_metadata.c +++ b/tools/testing/selftests/bpf/progs/xdp_metadata.c @@ -26,6 +26,9 @@ extern int bpf_xdp_metadata_rx_hash(const struct xdp_md *ctx, __u32 *hash, extern int bpf_xdp_metadata_rx_vlan_tag(const struct xdp_md *ctx, __u16 *vlan_tci, __be16 *vlan_proto) __ksym; +extern int bpf_xdp_metadata_rx_csum(const struct xdp_md *ctx, + enum xdp_csum_status *csum_status, + union xdp_csum_info *csum_info) __ksym; SEC("xdp") int rx(struct xdp_md *ctx) @@ -62,6 +65,9 @@ int rx(struct xdp_md *ctx) bpf_xdp_metadata_rx_hash(ctx, &meta->rx_hash, &meta->rx_hash_type); bpf_xdp_metadata_rx_vlan_tag(ctx, &meta->rx_vlan_tci, &meta->rx_vlan_proto); + bpf_xdp_metadata_rx_csum(ctx, &meta->rx_csum_status, + (void *)&meta->rx_csum_info); + return bpf_redirect_map(&xsk, ctx->rx_queue_index, XDP_PASS); } -- 2.41.0