2019-03-01 19:42:19 -08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
#include <test_progs.h>
|
2020-05-08 10:46:09 -07:00
|
|
|
#include <network_helpers.h>
|
2019-03-01 19:42:19 -08:00
|
|
|
|
|
|
|
static void test_l4lb(const char *file)
|
|
|
|
{
|
|
|
|
unsigned int nr_cpus = bpf_num_possible_cpus();
|
|
|
|
struct vip key = {.protocol = 6};
|
|
|
|
struct vip_meta {
|
|
|
|
__u32 flags;
|
|
|
|
__u32 vip_num;
|
|
|
|
} value = {.vip_num = VIP_NUM};
|
|
|
|
__u32 stats_key = VIP_NUM;
|
|
|
|
struct vip_stats {
|
|
|
|
__u64 bytes;
|
|
|
|
__u64 pkts;
|
|
|
|
} stats[nr_cpus];
|
|
|
|
struct real_definition {
|
|
|
|
union {
|
|
|
|
__be32 dst;
|
|
|
|
__be32 dstv6[4];
|
|
|
|
};
|
|
|
|
__u8 flags;
|
|
|
|
} real_def = {.dst = MAGIC_VAL};
|
|
|
|
__u32 ch_key = 11, real_num = 3;
|
|
|
|
int err, i, prog_fd, map_fd;
|
|
|
|
__u64 bytes = 0, pkts = 0;
|
|
|
|
struct bpf_object *obj;
|
|
|
|
char buf[128];
|
|
|
|
u32 *magic = (u32 *)buf;
|
2022-02-02 15:54:20 -08:00
|
|
|
LIBBPF_OPTS(bpf_test_run_opts, topts,
|
|
|
|
.data_out = buf,
|
|
|
|
.data_size_out = sizeof(buf),
|
|
|
|
.repeat = NUM_ITER,
|
|
|
|
);
|
2019-03-01 19:42:19 -08:00
|
|
|
|
2021-11-03 15:08:44 -07:00
|
|
|
err = bpf_prog_test_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
2019-08-21 16:44:25 -07:00
|
|
|
if (CHECK_FAIL(err))
|
2019-03-01 19:42:19 -08:00
|
|
|
return;
|
|
|
|
|
|
|
|
map_fd = bpf_find_map(__func__, obj, "vip_map");
|
|
|
|
if (map_fd < 0)
|
|
|
|
goto out;
|
|
|
|
bpf_map_update_elem(map_fd, &key, &value, 0);
|
|
|
|
|
|
|
|
map_fd = bpf_find_map(__func__, obj, "ch_rings");
|
|
|
|
if (map_fd < 0)
|
|
|
|
goto out;
|
|
|
|
bpf_map_update_elem(map_fd, &ch_key, &real_num, 0);
|
|
|
|
|
|
|
|
map_fd = bpf_find_map(__func__, obj, "reals");
|
|
|
|
if (map_fd < 0)
|
|
|
|
goto out;
|
|
|
|
bpf_map_update_elem(map_fd, &real_num, &real_def, 0);
|
|
|
|
|
2022-02-02 15:54:20 -08:00
|
|
|
topts.data_in = &pkt_v4;
|
|
|
|
topts.data_size_in = sizeof(pkt_v4);
|
2019-03-01 19:42:19 -08:00
|
|
|
|
2022-02-02 15:54:20 -08:00
|
|
|
err = bpf_prog_test_run_opts(prog_fd, &topts);
|
|
|
|
ASSERT_OK(err, "test_run");
|
|
|
|
ASSERT_EQ(topts.retval, 7 /*TC_ACT_REDIRECT*/, "ipv4 test_run retval");
|
|
|
|
ASSERT_EQ(topts.data_size_out, 54, "ipv4 test_run data_size_out");
|
|
|
|
ASSERT_EQ(*magic, MAGIC_VAL, "ipv4 magic");
|
|
|
|
|
|
|
|
topts.data_in = &pkt_v6;
|
|
|
|
topts.data_size_in = sizeof(pkt_v6);
|
|
|
|
topts.data_size_out = sizeof(buf); /* reset out size */
|
|
|
|
|
|
|
|
err = bpf_prog_test_run_opts(prog_fd, &topts);
|
|
|
|
ASSERT_OK(err, "test_run");
|
|
|
|
ASSERT_EQ(topts.retval, 7 /*TC_ACT_REDIRECT*/, "ipv6 test_run retval");
|
|
|
|
ASSERT_EQ(topts.data_size_out, 74, "ipv6 test_run data_size_out");
|
|
|
|
ASSERT_EQ(*magic, MAGIC_VAL, "ipv6 magic");
|
2019-03-01 19:42:19 -08:00
|
|
|
|
|
|
|
map_fd = bpf_find_map(__func__, obj, "stats");
|
|
|
|
if (map_fd < 0)
|
|
|
|
goto out;
|
|
|
|
bpf_map_lookup_elem(map_fd, &stats_key, stats);
|
|
|
|
for (i = 0; i < nr_cpus; i++) {
|
|
|
|
bytes += stats[i].bytes;
|
|
|
|
pkts += stats[i].pkts;
|
|
|
|
}
|
2019-08-21 16:44:25 -07:00
|
|
|
if (CHECK_FAIL(bytes != MAGIC_BYTES * NUM_ITER * 2 ||
|
|
|
|
pkts != NUM_ITER * 2))
|
2019-03-01 19:42:19 -08:00
|
|
|
printf("test_l4lb:FAIL:stats %lld %lld\n", bytes, pkts);
|
|
|
|
out:
|
|
|
|
bpf_object__close(obj);
|
|
|
|
}
|
|
|
|
|
|
|
|
void test_l4lb_all(void)
|
|
|
|
{
|
2020-09-03 13:35:40 -07:00
|
|
|
if (test__start_subtest("l4lb_inline"))
|
2022-09-01 22:22:53 +00:00
|
|
|
test_l4lb("test_l4lb.bpf.o");
|
2020-09-03 13:35:40 -07:00
|
|
|
if (test__start_subtest("l4lb_noinline"))
|
2022-09-01 22:22:53 +00:00
|
|
|
test_l4lb("test_l4lb_noinline.bpf.o");
|
selftests/bpf: tests for using dynptrs to parse skb and xdp buffers
Test skb and xdp dynptr functionality in the following ways:
1) progs/test_cls_redirect_dynptr.c
* Rewrite "progs/test_cls_redirect.c" test to use dynptrs to parse
skb data
* This is a great example of how dynptrs can be used to simplify a
lot of the parsing logic for non-statically known values.
When measuring the user + system time between the original version
vs. using dynptrs, and averaging the time for 10 runs (using
"time ./test_progs -t cls_redirect"):
original version: 0.092 sec
with dynptrs: 0.078 sec
2) progs/test_xdp_dynptr.c
* Rewrite "progs/test_xdp.c" test to use dynptrs to parse xdp data
When measuring the user + system time between the original version
vs. using dynptrs, and averaging the time for 10 runs (using
"time ./test_progs -t xdp_attach"):
original version: 0.118 sec
with dynptrs: 0.094 sec
3) progs/test_l4lb_noinline_dynptr.c
* Rewrite "progs/test_l4lb_noinline.c" test to use dynptrs to parse
skb data
When measuring the user + system time between the original version
vs. using dynptrs, and averaging the time for 10 runs (using
"time ./test_progs -t l4lb_all"):
original version: 0.062 sec
with dynptrs: 0.081 sec
For number of processed verifier instructions:
original version: 6268 insns
with dynptrs: 2588 insns
4) progs/test_parse_tcp_hdr_opt_dynptr.c
* Add sample code for parsing tcp hdr opt lookup using dynptrs.
This logic is lifted from a real-world use case of packet parsing
in katran [0], a layer 4 load balancer. The original version
"progs/test_parse_tcp_hdr_opt.c" (not using dynptrs) is included
here as well, for comparison.
When measuring the user + system time between the original version
vs. using dynptrs, and averaging the time for 10 runs (using
"time ./test_progs -t parse_tcp_hdr_opt"):
original version: 0.031 sec
with dynptrs: 0.045 sec
5) progs/dynptr_success.c
* Add test case "test_skb_readonly" for testing attempts at writes
on a prog type with read-only skb ctx.
* Add "test_dynptr_skb_data" for testing that bpf_dynptr_data isn't
supported for skb progs.
6) progs/dynptr_fail.c
* Add test cases "skb_invalid_data_slice{1,2,3,4}" and
"xdp_invalid_data_slice{1,2}" for testing that helpers that modify the
underlying packet buffer automatically invalidate the associated
data slice.
* Add test cases "skb_invalid_ctx" and "xdp_invalid_ctx" for testing
that prog types that do not support bpf_dynptr_from_skb/xdp don't
have access to the API.
* Add test case "dynptr_slice_var_len{1,2}" for testing that
variable-sized len can't be passed in to bpf_dynptr_slice
* Add test case "skb_invalid_slice_write" for testing that writes to a
read-only data slice are rejected by the verifier.
* Add test case "data_slice_out_of_bounds_skb" for testing that
writes to an area outside the slice are rejected.
* Add test case "invalid_slice_rdwr_rdonly" for testing that prog
types that don't allow writes to packet data don't accept any calls
to bpf_dynptr_slice_rdwr.
[0] https://github.com/facebookincubator/katran/blob/main/katran/lib/bpf/pckt_parsing.h
Signed-off-by: Joanne Koong <joannelkoong@gmail.com>
Acked-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/r/20230301154953.641654-11-joannelkoong@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2023-03-01 07:49:53 -08:00
|
|
|
if (test__start_subtest("l4lb_noinline_dynptr"))
|
|
|
|
test_l4lb("test_l4lb_noinline_dynptr.bpf.o");
|
2019-03-01 19:42:19 -08:00
|
|
|
}
|