[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241008095109.99918-10-kerneljasonxing@gmail.com>
Date: Tue, 8 Oct 2024 17:51:09 +0800
From: Jason Xing <kerneljasonxing@...il.com>
To: davem@...emloft.net,
edumazet@...gle.com,
kuba@...nel.org,
pabeni@...hat.com,
dsahern@...nel.org,
willemdebruijn.kernel@...il.com,
willemb@...gle.com,
ast@...nel.org,
daniel@...earbox.net,
andrii@...nel.org,
martin.lau@...ux.dev,
eddyz87@...il.com,
song@...nel.org,
yonghong.song@...ux.dev,
john.fastabend@...il.com,
kpsingh@...nel.org,
sdf@...ichev.me,
haoluo@...gle.com,
jolsa@...nel.org
Cc: bpf@...r.kernel.org,
netdev@...r.kernel.org,
Jason Xing <kernelxing@...cent.com>
Subject: [PATCH net-next 9/9] net-timestamp: add bpf support for rx software/hardware timestamp
From: Jason Xing <kernelxing@...cent.com>
Now it's time to let the bpf for rx timestamp take effect.
Signed-off-by: Jason Xing <kernelxing@...cent.com>
---
include/net/tcp.h | 14 ++++++++++++++
include/uapi/linux/bpf.h | 5 +++++
net/ipv4/tcp.c | 28 +++++++++++++++++++++++++++-
tools/include/uapi/linux/bpf.h | 5 +++++
4 files changed, 51 insertions(+), 1 deletion(-)
diff --git a/include/net/tcp.h b/include/net/tcp.h
index 739a9fb83d0c..416a039da472 100644
--- a/include/net/tcp.h
+++ b/include/net/tcp.h
@@ -2676,6 +2676,14 @@ static inline int tcp_call_bpf_3arg(struct sock *sk, int op, u32 arg1, u32 arg2,
return tcp_call_bpf(sk, op, 3, args);
}
+static inline int tcp_call_bpf_4arg(struct sock *sk, int op, u32 arg1, u32 arg2,
+ u32 arg3, u32 arg4)
+{
+ u32 args[4] = {arg1, arg2, arg3, arg4};
+
+ return tcp_call_bpf(sk, op, 4, args);
+}
+
#else
static inline int tcp_call_bpf(struct sock *sk, int op, u32 nargs, u32 *args)
{
@@ -2693,6 +2701,12 @@ static inline int tcp_call_bpf_3arg(struct sock *sk, int op, u32 arg1, u32 arg2,
return -EPERM;
}
+static inline int tcp_call_bpf_4arg(struct sock *sk, int op, u32 arg1, u32 arg2,
+ u32 arg3, u32 arg4)
+{
+ return -EPERM;
+}
+
#endif
static inline u32 tcp_timeout_init(struct sock *sk)
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
index 3c28d74d14ea..ffaa483f1362 100644
--- a/include/uapi/linux/bpf.h
+++ b/include/uapi/linux/bpf.h
@@ -7045,6 +7045,11 @@ enum {
* flag for other three tx timestamp
* use.
*/
+ BPF_SOCK_OPS_TS_RX_OPT_CB, /* Called when tcp layer tries to
+ * receive skbs with timestamps when
+ * SO_TIMESTAMPING feature is on
+ * It indicates the recorded timestamp.
+ */
};
/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
index 938e2bff4fa6..f6addd26db9f 100644
--- a/net/ipv4/tcp.c
+++ b/net/ipv4/tcp.c
@@ -2278,10 +2278,36 @@ static int tcp_zerocopy_receive(struct sock *sk,
static bool tcp_bpf_recv_timestamp(struct sock *sk, struct scm_timestamping_internal *tss)
{
+ u32 tsflags = READ_ONCE(sk->sk_tsflags);
struct tcp_sock *tp = tcp_sk(sk);
- if (BPF_SOCK_OPS_TEST_FLAG(tp, BPF_SOCK_OPS_RX_TIMESTAMPING_OPT_CB_FLAG))
+ if (BPF_SOCK_OPS_TEST_FLAG(tp, BPF_SOCK_OPS_RX_TIMESTAMPING_OPT_CB_FLAG)) {
+ u32 hw_sec, hw_nsec, sw_sec, sw_nsec;
+
+ if (!(tsflags & (SOF_TIMESTAMPING_RX_SOFTWARE |
+ SOF_TIMESTAMPING_RX_HARDWARE)))
+ return true;
+
+ if (tsflags & SOF_TIMESTAMPING_RX_SOFTWARE) {
+ sw_sec = tss->ts[0].tv_sec;
+ sw_nsec = tss->ts[0].tv_nsec;
+ } else {
+ sw_sec = 0;
+ sw_nsec = 0;
+ }
+
+ if (tsflags & SOF_TIMESTAMPING_RX_HARDWARE) {
+ hw_sec = tss->ts[2].tv_sec;
+ hw_nsec = tss->ts[2].tv_nsec;
+ } else {
+ hw_sec = 0;
+ hw_nsec = 0;
+ }
+
+ tcp_call_bpf_4arg(sk, BPF_SOCK_OPS_TS_RX_OPT_CB,
+ sw_sec, sw_nsec, hw_sec, hw_nsec);
return true;
+ }
return false;
}
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index ff17cd820bde..8a87fee2e012 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -7044,6 +7044,11 @@ enum {
* flag for other three tx timestamp
* use.
*/
+ BPF_SOCK_OPS_TS_RX_OPT_CB, /* Called when tcp layer tries to
+ * receive skbs with timestamps when
+ * SO_TIMESTAMPING feature is on
+ * It indicates the recorded timestamp.
+ */
};
/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
--
2.37.3
Powered by blists - more mailing lists