mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Introduce tail adjustment functionality in xskxceiver using bpf_xdp_adjust_tail(). Add `xsk_xdp_adjust_tail` to modify packet sizes and drop unmodified packets. Implement `is_adjust_tail_supported` to check helper availability. Develop packet resizing tests, including shrinking and growing scenarios, with functions for both single-buffer and multi-buffer cases. Update the test framework to handle various scenarios and adjust MTU settings. These changes enhance the testing of packet tail adjustments, improving AF_XDP framework reliability. Reviewed-by: Maciej Fijalkowski <maciej.fijalkowski@intel.com> Signed-off-by: Tushar Vyavahare <tushar.vyavahare@intel.com> Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Link: https://patch.msgid.link/20250410033116.173617-3-tushar.vyavahare@intel.com
123 lines
2.9 KiB
C
123 lines
2.9 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2022 Intel */
|
|
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <linux/if_ether.h>
|
|
#include <linux/ip.h>
|
|
#include <linux/errno.h>
|
|
#include "xsk_xdp_common.h"
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_XSKMAP);
|
|
__uint(max_entries, 2);
|
|
__uint(key_size, sizeof(int));
|
|
__uint(value_size, sizeof(int));
|
|
} xsk SEC(".maps");
|
|
|
|
static unsigned int idx;
|
|
int adjust_value = 0;
|
|
int count = 0;
|
|
|
|
SEC("xdp.frags") int xsk_def_prog(struct xdp_md *xdp)
|
|
{
|
|
return bpf_redirect_map(&xsk, 0, XDP_DROP);
|
|
}
|
|
|
|
SEC("xdp.frags") int xsk_xdp_drop(struct xdp_md *xdp)
|
|
{
|
|
/* Drop every other packet */
|
|
if (idx++ % 2)
|
|
return XDP_DROP;
|
|
|
|
return bpf_redirect_map(&xsk, 0, XDP_DROP);
|
|
}
|
|
|
|
SEC("xdp.frags") int xsk_xdp_populate_metadata(struct xdp_md *xdp)
|
|
{
|
|
void *data, *data_meta;
|
|
struct xdp_info *meta;
|
|
int err;
|
|
|
|
/* Reserve enough for all custom metadata. */
|
|
err = bpf_xdp_adjust_meta(xdp, -(int)sizeof(struct xdp_info));
|
|
if (err)
|
|
return XDP_DROP;
|
|
|
|
data = (void *)(long)xdp->data;
|
|
data_meta = (void *)(long)xdp->data_meta;
|
|
|
|
if (data_meta + sizeof(struct xdp_info) > data)
|
|
return XDP_DROP;
|
|
|
|
meta = data_meta;
|
|
meta->count = count++;
|
|
|
|
return bpf_redirect_map(&xsk, 0, XDP_DROP);
|
|
}
|
|
|
|
SEC("xdp") int xsk_xdp_shared_umem(struct xdp_md *xdp)
|
|
{
|
|
void *data = (void *)(long)xdp->data;
|
|
void *data_end = (void *)(long)xdp->data_end;
|
|
struct ethhdr *eth = data;
|
|
|
|
if (eth + 1 > data_end)
|
|
return XDP_DROP;
|
|
|
|
/* Redirecting packets based on the destination MAC address */
|
|
idx = ((unsigned int)(eth->h_dest[5])) / 2;
|
|
if (idx > MAX_SOCKETS)
|
|
return XDP_DROP;
|
|
|
|
return bpf_redirect_map(&xsk, idx, XDP_DROP);
|
|
}
|
|
|
|
SEC("xdp.frags") int xsk_xdp_adjust_tail(struct xdp_md *xdp)
|
|
{
|
|
__u32 buff_len, curr_buff_len;
|
|
int ret;
|
|
|
|
buff_len = bpf_xdp_get_buff_len(xdp);
|
|
if (buff_len == 0)
|
|
return XDP_DROP;
|
|
|
|
ret = bpf_xdp_adjust_tail(xdp, adjust_value);
|
|
if (ret < 0) {
|
|
/* Handle unsupported cases */
|
|
if (ret == -EOPNOTSUPP) {
|
|
/* Set adjust_value to -EOPNOTSUPP to indicate to userspace that this case
|
|
* is unsupported
|
|
*/
|
|
adjust_value = -EOPNOTSUPP;
|
|
return bpf_redirect_map(&xsk, 0, XDP_DROP);
|
|
}
|
|
|
|
return XDP_DROP;
|
|
}
|
|
|
|
curr_buff_len = bpf_xdp_get_buff_len(xdp);
|
|
if (curr_buff_len != buff_len + adjust_value)
|
|
return XDP_DROP;
|
|
|
|
if (curr_buff_len > buff_len) {
|
|
__u32 *pkt_data = (void *)(long)xdp->data;
|
|
__u32 len, words_to_end, seq_num;
|
|
|
|
len = curr_buff_len - PKT_HDR_ALIGN;
|
|
words_to_end = len / sizeof(*pkt_data) - 1;
|
|
seq_num = words_to_end;
|
|
|
|
/* Convert sequence number to network byte order. Store this in the last 4 bytes of
|
|
* the packet. Use 'adjust_value' to determine the position at the end of the
|
|
* packet for storing the sequence number.
|
|
*/
|
|
seq_num = __constant_htonl(words_to_end);
|
|
bpf_xdp_store_bytes(xdp, curr_buff_len - sizeof(seq_num), &seq_num,
|
|
sizeof(seq_num));
|
|
}
|
|
|
|
return bpf_redirect_map(&xsk, 0, XDP_DROP);
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|