Commit Graph

547 Commits

Author SHA1 Message Date
fc18074b31 Merge pull request #44 from xdp-project/pping-libxdp
pping: Use libxdp to load and attach XDP program
2022-05-26 13:46:13 +02:00
070715cf1c Add pkt-loop-filter example
Add an example to filter looping packets on (for instance) a bond
interface, by recording the egress MAC+VLAN and dropping any packets that
come in on other (related) interfaces with the same MAC+VLAN.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-05-20 14:53:14 +02:00
daefd11178 encap-forward: Don't redefine AF_INET
Only conditionally define AF_INET so we don't get warnings about it being redefined.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-27 13:05:26 +02:00
3701d30083 Merge pull request #45 from xdp-project/vestas08_cleanups
Cleanups for AF_XDP-interaction code and btf_unit_test
2022-04-27 09:23:19 +02:00
c673cf628f configure: Make sure libxdp is before libbpf in linker arguments
When libxdp is linked against the submodule libbpf, the order of linker
arguments is important because libxdp.a needs symbols from libbpf.a. Fix up
configure so it ensures this.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-27 00:43:02 +02:00
c2eb81ec70 Fix xdp-tools submodule to work with libbpf submodule
Update the version of xdp-tools to pull in some configure changes that
makes interoperating between a libbpf submodule and an xdp-tools submodule
work better, and set the LIBBPF_UNBUILT variable in the top-level configure
to enables this support.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-26 22:03:08 +02:00
6b10ae1c6e Update libbpf submodule version to v0.7.0
This version is the newest version that's compatible with xdp-tools
currently.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-25 18:03:00 +02:00
18908873a7 refactor code test02_should_fail
Introduce helper to make is easier to test two struct variations
with the same invalid btf_id struct location.

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 12:21:35 +02:00
1e4e033c3a btf_unit_test: Add test02_should_fail
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 11:29:47 +02:00
7409814e44 btf_unit_test: Fix small leak
If init_btf_info_via_bpf_object() fails, then we should release bpf_object.

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 10:43:55 +02:00
f14a20a15d btf_unit_test: Prepare partition of tests
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 10:41:27 +02:00
8b2494f0c0 btf_unit_test: Remember to free memory
It is a bad habit to rely on process exit to free memory.
Add proper memory free operations.

Using checker command: 
  valgrind --leak-check=yes ./btf_unit_test

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 10:34:16 +02:00
9ed0567cf3 btf_unit_test: Load BPF-object file btf_unit_test_bpf.o
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 10:15:05 +02:00
1f15e94296 btf_unit_test: Refactor load_bpf_object to take filename
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 10:12:50 +02:00
20916547db AF_XDP-interaction: Add BPF object/code for unit test
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-22 08:33:40 +02:00
78b45bde56 pping: Use libxdp to load and attach XDP program
Since we now have libxdp as a submodule, we can switch pping over to using
libxdp for loading its XDP program. This requires switching the order of
attachment, because libxdp needs to be fed the BPF object in an unloaded
state (and will load it as part of attaching).

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 17:08:36 +02:00
441650c510 Merge pull request #26 from xdp-project/libxdp
Embedding libxdp
2022-04-20 13:37:27 +02:00
24cea38474 nat64-bpf: Use logging helpers and add verbose option
Use the newly-added logging helpers from logging.h and add a -v option to
increase the effective log level.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 13:25:27 +02:00
f27c7c2c46 lib/util: Import logging helpers from xdp-tools
Include logging.{h,c} from xdp-tools so utilities can use them for setting
libxdp and libbpf logging.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 13:24:22 +02:00
4d74e4aaf3 lib/xdp-tools: update version
Pull the latest version of xdp-tools into the submodule. Change the
wildcard pattern for libxdp to not include the XDP programs to avoid
constantly recompiling it.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 13:12:45 +02:00
4ac5a33a40 lib: simplify installation of libbpf and libxdp submodule libraries
Instead of having the someone redundantly named 'lib/lib-install' folder,
let's rename it to just 'lib/install', and drop the 'usr/' prefix of the
files installed into that directory. Also, to simplify the configure
script, check in the directory to git so it's always present, and always
include it in the include and linker paths. On clean we just clear out the
contents.

Also, copy over libbpf.a to lib/install/lib alongside libxdp.a instead of
putting libbpf/src in the linker path.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 13:12:45 +02:00
ff3e4272ff Integrate libxdp as a submodule
This adds libxdp as a submodule and link target alongside libbpf. This
should make it just as easy for examples to use libxdp as it currently is
for libbpf. Some hoops need to be jumped through to make libxdp link
against the same version of libbpf as the one we use in this repository.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-20 13:12:45 +02:00
58fcc521b7 pping: Guard local definitions of AF_* constants in pping_kern.c
The header files included from pping_kern.c include definitions of AF_INET
and AF_INET6, leading to warnings like:

pping_kern.c:25:9: warning: 'AF_INET' macro redefined [-Wmacro-redefined]
        ^
/usr/include/bits/socket.h:97:9: note: previous definition is here
        ^
pping_kern.c:26:9: warning: 'AF_INET6' macro redefined [-Wmacro-redefined]
        ^
/usr/include/bits/socket.h:105:9: note: previous definition is here
        ^
2 warnings generated.

Fix this by guarding the definitions behind suitable ifdefs.

Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
2022-04-14 21:29:32 +02:00
a0e2c91983 AF_XDP-interaction: lib user don't need to check for btf_id
Now that lib side of xsk_btf__init_xdp_hint check for a valid
btf_id variable, then users of the call doesn't need to check
for the existance of a btf_id member.

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-04-05 10:35:34 +02:00
5ca0416e9e Merge pull request #43 from simosund/pping_dualdirection_flowstate
PPing dualdirection flowstate
2022-03-31 17:58:25 +02:00
2e7595b3ca pping: Replace boolean connection state flags with enum
The connection state had 3 boolean flags related to what state it was
in (is_empty, has_opened and has_closed). Only specific combinations
of these flags really made sense (has_opened/has_closed didn't really
mean anything if is_empty, and if has_closed one would expect is_empty
to be false and has_opened to be true etc.). Therefore, replace these
combinations of boolean values with a singular enum which is used to
check if the flow is empty, waiting to open (seen outgoing packet but
no response), is open or has closed.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-30 18:12:46 +02:00
4fb1f6de64 pping: Combine flow state in each direction to a dualflow state
Combine the flow state entries for both the "forward" and "reverse"
direction of the flow into a single dualflow state. Change the
flowstate map to use the dualflow state so that state for both
directions can be retrieved using a single map lookup.

As flow states are now kept in pairs, cannot directly create/delete
states from the BPF map each time a flow opens/closes in one
direction. Therefore, update all logic related to creating/deleting
flows. For example, use "empty" slot in dualflow state instead of
creating a new map entry, and only delete the dual flow state entry
once both directions of the flow have closed/timed out.

Some implementation details:

Have implemented a simple memcmp function as I could not get the
__builtin_memcmp function to work (got error "libbpf: failed to
find BTF for extern 'memcmp': -2").

To ensure that both directions of the flow always look up the same
entry, use the "sorted" flow tuple (the (ip, port) pair that is
smaller is always first) as key. This is what the memcmp is used for.

To avoid storing two copies of the flow tuple (src -> dst and dst ->
src) and doing additional memcmps, always store the flow state for the
"sorted" direction as the first direction and the reverse as the
second direction. Then simply check if a flow is sorted or not to
determine which direction in the dual flow state that matches. Have
attempted to at least partially abstract this detail away from most of
the code by adding some get_flowstate_from* helpers.

The dual flow state simply stores the two (single direction) flow
states as the struct members dir1 and dir2. Use these two (admittedly
poorly named) members instead of a single array of size 2 in order to
avoid some issues with the verifier being worried that the array index
might be out of bounds.

Have added some new boolean members to the flow state to keep track of
"connection state". In addition the the previous has_opened, I now
also have a member for if the flow is "empty" or if it has been
closed. These are needed to cope with having to keep individual flow
states for both directions of the flow around as long as one direction
of the flow is used. I plan to replace these boolean "connection
state" members with a single enum in a future commit.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-30 18:12:46 +02:00
871378bd4d AF_XDP-interaction: lib_xsk_extend: Validate 'btf_id' is last member
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-03-25 14:17:23 +01:00
7715df83ee AF_XDP-interaction: Add BTF decoding code to btf_unit_test
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-03-24 12:25:07 +01:00
75a979fc31 pping: Refactor parsing of packet identifiers
Refactor functions for parsing protocol-specific packet
identifiers (parse_tcp_identifier, parse_icmp6_identifer and
parse_icmp_identifer) so they no longer directly fill in the
packet_info struct. Instead make the functions take additional
pointers as arguments and fill in a protocol_info struct.

The reason for this change is to decouple the
parse_<protocol>_identifier functions from the logic of how the
packet_info struct should be filled. The parse_packet_indentifier is
now solely responsible for filling in the members of packet_info
struct correctly instead of working in tandem with the
parse_<protocol>_identifier, filling in some members each.

This might result in a minimal performance degradation as some values
are now first filled in the protocol_info struct and later copied to
packet_info instead of being filled in directly in packet_info.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-22 13:24:09 +01:00
2935fb05cc pping: Minor formating fixes
Format code using clang-format from the kernel tree. However, leave
code in orginal format in some instances where clang-format clearly
reduces readability of code (ex. do not remove alginment of comments
for struct members and long options).

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-22 09:11:53 +01:00
b7d365dcaa Merge pull request #41 from simosund/pping_ref_count
PPing optimization: Tracking outstanding timestamps
2022-03-21 15:52:06 +01:00
2b3fcf932d AF_XDP-interaction: Add btf_unit_test
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-03-21 15:10:46 +01:00
f9095c5caf AF_XDP-interaction: lib_xsk_extend: Validate 'btf_id' member MUST exist
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-03-21 13:24:26 +01:00
02ccbfc152 AF_XDP-interaction: Move function xsk_btf__init_xdp_hint
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-03-21 12:47:56 +01:00
8c0084dd0e pping: Update TODO about timestamp ref count
Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-15 15:39:53 +01:00
11f1d88742 pping: Keep track of outstanding timestamps
Add a counter of outstanding (unmatched) timestamped entires in the
flow state. Before a timestamp lookup is attempted, check that there
are any outstanding timestamps, otherwise avoid the unecessary hash
map lookup.

Use 32 bit counter for outstanding timestamps to allow atomic
increments/decrements using __synch_fetch_and_add. This operation is
not supported on smaller integers, which is why such a large counter
is used. The atomicity is needed because the counter may be
concurrently accessed by both the ingress/egress hook as well as the
periodical map cleanup.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-15 15:39:53 +01:00
a6e4dd8748 Merge pull request #34 from simosund/pping_better_map_cleaning
PPing - Improve map cleanup
2022-03-10 14:28:22 +01:00
e7201c9eab pping: Update TODO based on map cleaning improvements
Also add description of three potential issues introduced by the
changes to cleanup process.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-10 09:59:21 +01:00
f22025f716 pping: More aggressive map cleanup
Add conditions that allows removing old flow and timestamp entries
sooner.

For flow map, have added conditions that allow unopened flows and ICMP
flows to be removed earlier than open TCP flows (currently both set to
30 sec instead of 300 sec).

For timestamp entries, allow them to be removed if they're more than
TIMESTAMP_RTT_LIFETIME (currently 8) times higher than the flow's
sRTT.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-10 09:54:52 +01:00
72404b6767 pping: Add map cleanup debug info
Add some debug info to the periodical map cleanup process. Push debug
information through the events perf buffer by using newly added
map_clean_event.

The old user space map cleanup process had some simple debug
information that was lost when transitioning to using bpf_iter
instead. Therefore, add back similar (but more extensive) debug
information but now collected from the BPF-side. In addition to stats
on entries deleted by the cleanup process, also include stats on
entries deleted by ePPing itself due to matching (for timestamp
entries) or detecting FIN/RST (for flow entries)

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-10 09:45:22 +01:00
be0921d116 pping: Use BPF iterators to do map gc
To improve the performance of the map cleanup, switch from the
user-spaced loop to using BPF iterators. With BPF iterators, a BPF
program can be run on each element in the map, and can thus be done in
kernel-space. This should hopefully also avoid the issue the previous
userspace loop had with resetting in case an element was removed by
the BPF programs during the cleanup.

Due to removal of userspace logic for map cleanup, no longer provide
any debug information about how many entires there are in each map and
how many of them were removed by the garbage collection. This will be
added back in the next commit.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-10 09:45:15 +01:00
d4c33259c7 pping: Improve program cleanup on shutdown
Explicitly stop the thread which performs periodical map cleanup on
shutdown, before attempting to free up any resources it might use.

For the cleanup order to make more sense, also setup the perf-buffer
before setting up the periodical map cleaning, so that the thread can
be stopped as the first part of the cleanup. This also matches better
with the next couple of commits where map cleaning debug information
will be pushed through the perf-buffer.

Finally, move the addition of the signalhandler earlier in the code to
eliminate a window where it was possible to terminate the program
without relevant cleanup code having a chance to run.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-09 19:20:51 +01:00
6885771b14 pping: Allocate cleanup-args on main's stack
Allocate the clean_args on the stack of the main function rather than
the stack of setup_periodical_map_cleaning. The clean_args is used by
periodical_map_cleanup from a different thread, so allocating them on
stack for setup_periodical_map_cleaning which goes out of scope
directly after the thread is created opens up for errors where later
function calls may overwrite the arguments, causing unpredictable
behavior.

Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
2022-03-09 14:54:20 +01:00
27861e384e Merge pull request #39 from chenhengqi/update-btf-example
Update btf example
2022-03-09 12:00:39 +01:00
e307581009 BTF-playground: Handle error and free resources explicitly
Signed-off-by: Hengqi Chen <chenhengqi@outlook.com>
2022-03-09 09:04:38 +08:00
c9398145ac Ignore lib/libbpf-install/
Signed-off-by: Hengqi Chen <chenhengqi@outlook.com>
2022-03-06 21:54:01 +08:00
8301679918 configure: Fix mixed indentions
Signed-off-by: Hengqi Chen <chenhengqi@outlook.com>
2022-03-06 21:52:48 +08:00
ce714625ce AF_XDP-interaction: Fix function tx_pkt
If there were more transmit slots, then we umem free the
packet, but we continued sending it anyhow.

The places tx_pkt() is currently used this never happened.
Still fix the bug.

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2022-02-21 19:03:49 +01:00
dd24bce55c Merge pull request #32 from simosund/pping_improve_capabilities
PPing core improvements
2022-02-10 18:20:18 +01:00