From: Larysa Zaremba <larysa.zaremba@intel.com>
To: bpf@vger.kernel.org
Cc: Larysa Zaremba <larysa.zaremba@intel.com>,
ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org,
martin.lau@linux.dev, song@kernel.org, yhs@fb.com,
john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com,
haoluo@google.com, jolsa@kernel.org,
David Ahern <dsahern@gmail.com>, Jakub Kicinski <kuba@kernel.org>,
Willem de Bruijn <willemb@google.com>,
Jesper Dangaard Brouer <brouer@redhat.com>,
Anatoly Burakov <anatoly.burakov@intel.com>,
Alexander Lobakin <alexandr.lobakin@intel.com>,
Magnus Karlsson <magnus.karlsson@gmail.com>,
Maryam Tahhan <mtahhan@redhat.com>,
xdp-hints@xdp-project.net, netdev@vger.kernel.org,
Willem de Bruijn <willemdebruijn.kernel@gmail.com>,
Alexei Starovoitov <alexei.starovoitov@gmail.com>,
Simon Horman <simon.horman@corigine.com>
Subject: [xdp-hints] [PATCH bpf-next v5 16/21] selftests/bpf: Add flags and new hints to xdp_hw_metadata
Date: Fri, 11 Aug 2023 18:15:04 +0200 [thread overview]
Message-ID: <20230811161509.19722-17-larysa.zaremba@intel.com> (raw)
In-Reply-To: <20230811161509.19722-1-larysa.zaremba@intel.com>
Add hints added in the previous patches (VLAN tag and checksum)
to the xdp_hw_metadata program.
Also, to make metadata layout more straightforward, add flags field
to pass information about validity of every separate hint separately.
Signed-off-by: Larysa Zaremba <larysa.zaremba@intel.com>
---
.../selftests/bpf/progs/xdp_hw_metadata.c | 38 +++++++++--
tools/testing/selftests/bpf/xdp_hw_metadata.c | 67 +++++++++++++++++--
tools/testing/selftests/bpf/xdp_metadata.h | 34 +++++++++-
3 files changed, 126 insertions(+), 13 deletions(-)
diff --git a/tools/testing/selftests/bpf/progs/xdp_hw_metadata.c b/tools/testing/selftests/bpf/progs/xdp_hw_metadata.c
index 63d7de6c6bbb..95b17eaf8f05 100644
--- a/tools/testing/selftests/bpf/progs/xdp_hw_metadata.c
+++ b/tools/testing/selftests/bpf/progs/xdp_hw_metadata.c
@@ -20,6 +20,12 @@ extern int bpf_xdp_metadata_rx_timestamp(const struct xdp_md *ctx,
__u64 *timestamp) __ksym;
extern int bpf_xdp_metadata_rx_hash(const struct xdp_md *ctx, __u32 *hash,
enum xdp_rss_hash_type *rss_type) __ksym;
+extern int bpf_xdp_metadata_rx_vlan_tag(const struct xdp_md *ctx,
+ __u16 *vlan_tci,
+ __be16 *vlan_proto) __ksym;
+extern int bpf_xdp_metadata_rx_csum(const struct xdp_md *ctx,
+ enum xdp_csum_status *csum_status,
+ __wsum *csum) __ksym;
SEC("xdp")
int rx(struct xdp_md *ctx)
@@ -84,15 +90,35 @@ int rx(struct xdp_md *ctx)
return XDP_PASS;
}
+ meta->hint_valid = 0;
+
+ meta->xdp_timestamp = bpf_ktime_get_tai_ns();
err = bpf_xdp_metadata_rx_timestamp(ctx, &meta->rx_timestamp);
- if (!err)
- meta->xdp_timestamp = bpf_ktime_get_tai_ns();
+ if (err)
+ meta->rx_timestamp_err = err;
+ else
+ meta->hint_valid |= XDP_META_FIELD_TS;
+
+ err = bpf_xdp_metadata_rx_hash(ctx, &meta->rx_hash,
+ &meta->rx_hash_type);
+ if (err)
+ meta->rx_hash_err = err;
else
- meta->rx_timestamp = 0; /* Used by AF_XDP as not avail signal */
+ meta->hint_valid |= XDP_META_FIELD_RSS;
- err = bpf_xdp_metadata_rx_hash(ctx, &meta->rx_hash, &meta->rx_hash_type);
- if (err < 0)
- meta->rx_hash_err = err; /* Used by AF_XDP as no hash signal */
+ err = bpf_xdp_metadata_rx_vlan_tag(ctx, &meta->rx_vlan_tci,
+ &meta->rx_vlan_proto);
+ if (err)
+ meta->rx_vlan_tag_err = err;
+ else
+ meta->hint_valid |= XDP_META_FIELD_VLAN_TAG;
+
+ err = bpf_xdp_metadata_rx_csum(ctx, &meta->rx_csum_status,
+ &meta->rx_csum);
+ if (err)
+ meta->rx_csum_err = err;
+ else
+ meta->hint_valid |= XDP_META_FIELD_CSUM;
__sync_add_and_fetch(&pkts_redir, 1);
return bpf_redirect_map(&xsk, ctx->rx_queue_index, XDP_PASS);
diff --git a/tools/testing/selftests/bpf/xdp_hw_metadata.c b/tools/testing/selftests/bpf/xdp_hw_metadata.c
index 613321eb84c1..7535baa7e7ef 100644
--- a/tools/testing/selftests/bpf/xdp_hw_metadata.c
+++ b/tools/testing/selftests/bpf/xdp_hw_metadata.c
@@ -19,6 +19,9 @@
#include "xsk.h"
#include <error.h>
+#include <linux/kernel.h>
+#include <linux/bits.h>
+#include <linux/bitfield.h>
#include <linux/errqueue.h>
#include <linux/if_link.h>
#include <linux/net_tstamp.h>
@@ -150,21 +153,58 @@ static __u64 gettime(clockid_t clock_id)
return (__u64) t.tv_sec * NANOSEC_PER_SEC + t.tv_nsec;
}
+#define VLAN_PRIO_MASK GENMASK(15, 13) /* Priority Code Point */
+#define VLAN_DEI_MASK GENMASK(12, 12) /* Drop Eligible Indicator */
+#define VLAN_VID_MASK GENMASK(11, 0) /* VLAN Identifier */
+static void print_vlan_tci(__u16 tag)
+{
+ __u16 vlan_id = FIELD_GET(VLAN_VID_MASK, tag);
+ __u8 pcp = FIELD_GET(VLAN_PRIO_MASK, tag);
+ bool dei = FIELD_GET(VLAN_DEI_MASK, tag);
+
+ printf("PCP=%u, DEI=%d, VID=0x%X\n", pcp, dei, vlan_id);
+}
+
+#define XDP_CHECKSUM_VERIFIED BIT(0)
+#define XDP_CHECKSUM_COMPLETE BIT(1)
+
+struct partial_csum_info {
+ __u16 csum_start;
+ __u16 csum_offset;
+};
+
+static void print_csum_state(__u32 status, __u32 info)
+{
+ bool is_verified = status & XDP_CHECKSUM_VERIFIED;
+
+ printf("Checksum status: ");
+ if (status & ~(XDP_CHECKSUM_COMPLETE | XDP_CHECKSUM_VERIFIED))
+ printf("cannot be interpreted, status=0x%X\n", status);
+
+ if (status & XDP_CHECKSUM_COMPLETE)
+ printf("complete, checksum=0x%X%s", info,
+ is_verified ? ", " : "\n");
+
+ if (is_verified)
+ printf("outermost checksum is verified\n");
+}
+
static void verify_xdp_metadata(void *data, clockid_t clock_id)
{
struct xdp_meta *meta;
meta = data - sizeof(*meta);
- if (meta->rx_hash_err < 0)
- printf("No rx_hash err=%d\n", meta->rx_hash_err);
- else
+ if (meta->hint_valid & XDP_META_FIELD_RSS)
printf("rx_hash: 0x%X with RSS type:0x%X\n",
meta->rx_hash, meta->rx_hash_type);
+ else
+ printf("No rx_hash, err=%d\n", meta->rx_hash_err);
+
+ if (meta->hint_valid & XDP_META_FIELD_TS) {
+ printf("rx_timestamp: %llu (sec:%0.4f)\n", meta->rx_timestamp,
+ (double)meta->rx_timestamp / NANOSEC_PER_SEC);
- printf("rx_timestamp: %llu (sec:%0.4f)\n", meta->rx_timestamp,
- (double)meta->rx_timestamp / NANOSEC_PER_SEC);
- if (meta->rx_timestamp) {
__u64 usr_clock = gettime(clock_id);
__u64 xdp_clock = meta->xdp_timestamp;
__s64 delta_X = xdp_clock - meta->rx_timestamp;
@@ -179,8 +219,23 @@ static void verify_xdp_metadata(void *data, clockid_t clock_id)
usr_clock, (double)usr_clock / NANOSEC_PER_SEC,
(double)delta_X2U / NANOSEC_PER_SEC,
(double)delta_X2U / 1000);
+ } else {
+ printf("No rx_timestamp, err=%d\n", meta->rx_timestamp_err);
+ }
+
+ if (meta->hint_valid & XDP_META_FIELD_VLAN_TAG) {
+ printf("rx_vlan_proto: 0x%X\n", ntohs(meta->rx_vlan_proto));
+ printf("rx_vlan_tci: ");
+ print_vlan_tci(meta->rx_vlan_tci);
+ } else {
+ printf("No rx_vlan_tci or rx_vlan_proto, err=%d\n",
+ meta->rx_vlan_tag_err);
}
+ if (meta->hint_valid & XDP_META_FIELD_CSUM)
+ print_csum_state(meta->rx_csum_status, meta->rx_csum);
+ else
+ printf("Checksum was not checked, err=%d\n", meta->rx_csum_err);
}
static void verify_skb_metadata(int fd)
diff --git a/tools/testing/selftests/bpf/xdp_metadata.h b/tools/testing/selftests/bpf/xdp_metadata.h
index 6664893c2c77..0b749bfed2de 100644
--- a/tools/testing/selftests/bpf/xdp_metadata.h
+++ b/tools/testing/selftests/bpf/xdp_metadata.h
@@ -17,12 +17,44 @@
#define ETH_P_8021AD 0x88A8
#endif
+#ifndef BIT
+#define BIT(nr) (1 << (nr))
+#endif
+
+/* Non-existent checksum status */
+#define XDP_CHECKSUM_MAGIC BIT(2)
+
+enum xdp_meta_field {
+ XDP_META_FIELD_TS = BIT(0),
+ XDP_META_FIELD_RSS = BIT(1),
+ XDP_META_FIELD_VLAN_TAG = BIT(2),
+ XDP_META_FIELD_CSUM = BIT(3),
+};
+
struct xdp_meta {
- __u64 rx_timestamp;
+ union {
+ __u64 rx_timestamp;
+ __s32 rx_timestamp_err;
+ };
__u64 xdp_timestamp;
__u32 rx_hash;
union {
__u32 rx_hash_type;
__s32 rx_hash_err;
};
+ union {
+ struct {
+ __u16 rx_vlan_tci;
+ __be16 rx_vlan_proto;
+ };
+ __s32 rx_vlan_tag_err;
+ };
+ union {
+ struct {
+ __u32 rx_csum_status;
+ __wsum rx_csum;
+ };
+ __s32 rx_csum_err;
+ };
+ enum xdp_meta_field hint_valid;
};
--
2.41.0
next prev parent reply other threads:[~2023-08-11 16:20 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-08-11 16:14 [xdp-hints] [PATCH bpf-next v5 00/21] XDP metadata via kfuncs for ice Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 01/21] ice: make RX hash reading code more reusable Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 02/21] ice: make RX HW timestamp " Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 03/21] ice: make RX checksum checking " Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 04/21] ice: Make ptype internal to descriptor info processing Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 05/21] ice: Introduce ice_xdp_buff Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 06/21] ice: Support HW timestamp hint Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 07/21] ice: Support RX hash XDP hint Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 08/21] ice: Support XDP hints in AF_XDP ZC mode Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 09/21] xdp: Add VLAN tag hint Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 10/21] ice: Implement " Larysa Zaremba
2023-08-11 16:14 ` [xdp-hints] [PATCH bpf-next v5 11/21] ice: use VLAN proto from ring packet context in skb path Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 12/21] xdp: Add checksum hint Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 13/21] ice: Implement " Larysa Zaremba
2023-08-17 21:58 ` [xdp-hints] " Alexei Starovoitov
2023-08-22 9:07 ` Larysa Zaremba
2023-08-22 19:50 ` Alexei Starovoitov
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 14/21] selftests/bpf: Allow VLAN packets in xdp_hw_metadata Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 15/21] net, xdp: allow metadata > 32 Larysa Zaremba
2023-08-11 16:15 ` Larysa Zaremba [this message]
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 17/21] veth: Implement VLAN tag and checksum XDP hint Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 18/21] net: make vlan_get_tag() return -ENODATA instead of -EINVAL Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 19/21] selftests/bpf: Use AF_INET for TX in xdp_metadata Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 20/21] selftests/bpf: Check VLAN tag and proto " Larysa Zaremba
2023-08-11 16:15 ` [xdp-hints] [PATCH bpf-next v5 21/21] selftests/bpf: check checksum state " Larysa Zaremba
2023-08-11 16:23 ` [xdp-hints] Re: [PATCH bpf-next v5 00/21] XDP metadata via kfuncs for ice Larysa Zaremba
2023-08-15 18:45 ` Stanislav Fomichev
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.xdp-project.net/postorius/lists/xdp-hints.xdp-project.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230811161509.19722-17-larysa.zaremba@intel.com \
--to=larysa.zaremba@intel.com \
--cc=alexandr.lobakin@intel.com \
--cc=alexei.starovoitov@gmail.com \
--cc=anatoly.burakov@intel.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=brouer@redhat.com \
--cc=daniel@iogearbox.net \
--cc=dsahern@gmail.com \
--cc=haoluo@google.com \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=kuba@kernel.org \
--cc=magnus.karlsson@gmail.com \
--cc=martin.lau@linux.dev \
--cc=mtahhan@redhat.com \
--cc=netdev@vger.kernel.org \
--cc=sdf@google.com \
--cc=simon.horman@corigine.com \
--cc=song@kernel.org \
--cc=willemb@google.com \
--cc=willemdebruijn.kernel@gmail.com \
--cc=xdp-hints@xdp-project.net \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox