Skip to content
Navigation Menu
Toggle navigation
Sign in
In this repository
All GitHub Enterprise
↵
Jump to
↵
No suggested jump to results
In this repository
All GitHub Enterprise
↵
Jump to
↵
In this organization
All GitHub Enterprise
↵
Jump to
↵
In this repository
All GitHub Enterprise
↵
Jump to
↵
Sign in
Reseting focus
You signed in with another tab or window.
Reload
to refresh your session.
You signed out in another tab or window.
Reload
to refresh your session.
You switched accounts on another tab or window.
Reload
to refresh your session.
Dismiss alert
{{ message }}
mariux64
/
linux
Public
Notifications
You must be signed in to change notification settings
Fork
0
Star
0
Code
Issues
2
Pull requests
0
Actions
Projects
0
Wiki
Security
Insights
Additional navigation options
Code
Issues
Pull requests
Actions
Projects
Wiki
Security
Insights
Files
c77e572
Breadcrumbs
linux
/
tools
/
testing
/
selftests
/
bpf
/
prog_tests
/
xdp_flowtable.c
Blame
Blame
Latest commit
History
History
168 lines (135 loc) · 4.15 KB
Breadcrumbs
linux
/
tools
/
testing
/
selftests
/
bpf
/
prog_tests
/
xdp_flowtable.c
Top
File metadata and controls
Code
Blame
168 lines (135 loc) · 4.15 KB
Raw
// SPDX-License-Identifier: GPL-2.0 #include <test_progs.h> #include <network_helpers.h> #include <bpf/btf.h> #include <linux/if_link.h> #include <linux/udp.h> #include <net/if.h> #include <unistd.h> #include "xdp_flowtable.skel.h" #define TX_NETNS_NAME "ns0" #define RX_NETNS_NAME "ns1" #define TX_NAME "v0" #define FORWARD_NAME "v1" #define RX_NAME "d0" #define TX_MAC "00:00:00:00:00:01" #define FORWARD_MAC "00:00:00:00:00:02" #define RX_MAC "00:00:00:00:00:03" #define DST_MAC "00:00:00:00:00:04" #define TX_ADDR "10.0.0.1" #define FORWARD_ADDR "10.0.0.2" #define RX_ADDR "20.0.0.1" #define DST_ADDR "20.0.0.2" #define PREFIX_LEN "8" #define N_PACKETS 10 #define UDP_PORT 12345 #define UDP_PORT_STR "12345" static int send_udp_traffic(void) { struct sockaddr_storage addr; int i, sock; if (make_sockaddr(AF_INET, DST_ADDR, UDP_PORT, &addr, NULL)) return -EINVAL; sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) return sock; for (i = 0; i < N_PACKETS; i++) { unsigned char buf[] = { 0xaa, 0xbb, 0xcc }; int n; n = sendto(sock, buf, sizeof(buf), MSG_NOSIGNAL | MSG_CONFIRM, (struct sockaddr *)&addr, sizeof(addr)); if (n != sizeof(buf)) { close(sock); return -EINVAL; } usleep(50000); /* 50ms */ } close(sock); return 0; } void test_xdp_flowtable(void) { struct xdp_flowtable *skel = NULL; struct nstoken *tok = NULL; int iifindex, stats_fd; __u32 value, key = 0; struct bpf_link *link; if (SYS_NOFAIL("nft -v")) { fprintf(stdout, "Missing required nft tool\n"); test__skip(); return; } SYS(out, "ip netns add " TX_NETNS_NAME); SYS(out, "ip netns add " RX_NETNS_NAME); tok = open_netns(RX_NETNS_NAME); if (!ASSERT_OK_PTR(tok, "setns")) goto out; SYS(out, "sysctl -qw net.ipv4.conf.all.forwarding=1"); SYS(out, "ip link add " TX_NAME " type veth peer " FORWARD_NAME); SYS(out, "ip link set " TX_NAME " netns " TX_NETNS_NAME); SYS(out, "ip link set dev " FORWARD_NAME " address " FORWARD_MAC); SYS(out, "ip addr add " FORWARD_ADDR "/" PREFIX_LEN " dev " FORWARD_NAME); SYS(out, "ip link set dev " FORWARD_NAME " up"); SYS(out, "ip link add " RX_NAME " type dummy"); SYS(out, "ip link set dev " RX_NAME " address " RX_MAC); SYS(out, "ip addr add " RX_ADDR "/" PREFIX_LEN " dev " RX_NAME); SYS(out, "ip link set dev " RX_NAME " up"); /* configure the flowtable */ SYS(out, "nft add table ip filter"); SYS(out, "nft add flowtable ip filter f { hook ingress priority 0\\; " "devices = { " FORWARD_NAME ", " RX_NAME " }\\; }"); SYS(out, "nft add chain ip filter forward " "{ type filter hook forward priority 0\\; }"); SYS(out, "nft add rule ip filter forward ip protocol udp th dport " UDP_PORT_STR " flow add @f"); /* Avoid ARP calls */ SYS(out, "ip -4 neigh add " DST_ADDR " lladdr " DST_MAC " dev " RX_NAME); close_netns(tok); tok = open_netns(TX_NETNS_NAME); if (!ASSERT_OK_PTR(tok, "setns")) goto out; SYS(out, "ip addr add " TX_ADDR "/" PREFIX_LEN " dev " TX_NAME); SYS(out, "ip link set dev " TX_NAME " address " TX_MAC); SYS(out, "ip link set dev " TX_NAME " up"); SYS(out, "ip route add default via " FORWARD_ADDR); close_netns(tok); tok = open_netns(RX_NETNS_NAME); if (!ASSERT_OK_PTR(tok, "setns")) goto out; iifindex = if_nametoindex(FORWARD_NAME); if (!ASSERT_NEQ(iifindex, 0, "iifindex")) goto out; skel = xdp_flowtable__open_and_load(); if (!ASSERT_OK_PTR(skel, "skel")) goto out; link = bpf_program__attach_xdp(skel->progs.xdp_flowtable_do_lookup, iifindex); if (!ASSERT_OK_PTR(link, "prog_attach")) goto out; close_netns(tok); tok = open_netns(TX_NETNS_NAME); if (!ASSERT_OK_PTR(tok, "setns")) goto out; if (!ASSERT_OK(send_udp_traffic(), "send udp")) goto out; close_netns(tok); tok = open_netns(RX_NETNS_NAME); if (!ASSERT_OK_PTR(tok, "setns")) goto out; stats_fd = bpf_map__fd(skel->maps.stats); if (!ASSERT_OK(bpf_map_lookup_elem(stats_fd, &key, &value), "bpf_map_update_elem stats")) goto out; ASSERT_GE(value, N_PACKETS - 2, "bpf_xdp_flow_lookup failed"); out: xdp_flowtable__destroy(skel); if (tok) close_netns(tok); SYS_NOFAIL("ip netns del " TX_NETNS_NAME); SYS_NOFAIL("ip netns del " RX_NETNS_NAME); }
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
You can’t perform that action at this time.