selftests: net: veth: test the ability to independently manipulate GRO and XDP

We should be able to independently flip either XDP or GRO states and toggling
one should not affect the other.

Adjust other tests as well that had implicit expectation that GRO would be
automatically enabled.

Signed-off-by: Ignat Korchagin <ignat@cloudflare.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Ignat Korchagin 2024-03-13 19:37:59 +01:00 committed by David S. Miller
parent d7db7775ea
commit ba5a6476e3
2 changed files with 25 additions and 3 deletions

View file

@ -217,6 +217,7 @@ for family in 4 6; do
cleanup cleanup
create_ns create_ns
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
run_test "GRO frag list" $BM_NET$DST 1 0 run_test "GRO frag list" $BM_NET$DST 1 0
cleanup cleanup
@ -227,6 +228,7 @@ for family in 4 6; do
# use NAT to circumvent GRO FWD check # use NAT to circumvent GRO FWD check
create_ns create_ns
ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \ ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \
-j DNAT --to-destination $BM_NET$DST -j DNAT --to-destination $BM_NET$DST
@ -240,6 +242,7 @@ for family in 4 6; do
cleanup cleanup
create_vxlan_pair create_vxlan_pair
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1 run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1
cleanup cleanup
@ -247,6 +250,7 @@ for family in 4 6; do
# use NAT to circumvent GRO FWD check # use NAT to circumvent GRO FWD check
create_vxlan_pair create_vxlan_pair
ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \ ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \
-j DNAT --to-destination $OL_NET$DST -j DNAT --to-destination $OL_NET$DST

View file

@ -249,9 +249,9 @@ cleanup
create_ns create_ns
ip -n $NS_DST link set dev veth$DST up ip -n $NS_DST link set dev veth$DST up
ip -n $NS_DST link set dev veth$DST xdp object ${BPF_FILE} section xdp ip -n $NS_DST link set dev veth$DST xdp object ${BPF_FILE} section xdp
chk_gro_flag "gro vs xdp while down - gro flag on" $DST on chk_gro_flag "gro vs xdp while down - gro flag off" $DST off
ip -n $NS_DST link set dev veth$DST down ip -n $NS_DST link set dev veth$DST down
chk_gro_flag " - after down" $DST on chk_gro_flag " - after down" $DST off
ip -n $NS_DST link set dev veth$DST xdp off ip -n $NS_DST link set dev veth$DST xdp off
chk_gro_flag " - after xdp off" $DST off chk_gro_flag " - after xdp off" $DST off
ip -n $NS_DST link set dev veth$DST up ip -n $NS_DST link set dev veth$DST up
@ -260,6 +260,21 @@ ip -n $NS_SRC link set dev veth$SRC xdp object ${BPF_FILE} section xdp
chk_gro_flag " - after peer xdp" $DST off chk_gro_flag " - after peer xdp" $DST off
cleanup cleanup
create_ns
ip -n $NS_DST link set dev veth$DST up
ip -n $NS_DST link set dev veth$DST xdp object ${BPF_FILE} section xdp
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
chk_gro_flag "gro vs xdp while down - gro flag on" $DST on
ip -n $NS_DST link set dev veth$DST down
chk_gro_flag " - after down" $DST on
ip -n $NS_DST link set dev veth$DST xdp off
chk_gro_flag " - after xdp off" $DST on
ip -n $NS_DST link set dev veth$DST up
chk_gro_flag " - after up" $DST on
ip -n $NS_SRC link set dev veth$SRC xdp object ${BPF_FILE} section xdp
chk_gro_flag " - after peer xdp" $DST on
cleanup
create_ns create_ns
chk_channels "default channels" $DST 1 1 chk_channels "default channels" $DST 1 1
@ -327,11 +342,14 @@ if [ $CPUS -gt 2 ]; then
fi fi
ip -n $NS_DST link set dev veth$DST xdp object ${BPF_FILE} section xdp 2>/dev/null ip -n $NS_DST link set dev veth$DST xdp object ${BPF_FILE} section xdp 2>/dev/null
chk_gro_flag "with xdp attached - gro flag" $DST on chk_gro_flag "with xdp attached - gro flag" $DST off
chk_gro_flag " - peer gro flag" $SRC off chk_gro_flag " - peer gro flag" $SRC off
chk_tso_flag " - tso flag" $SRC off chk_tso_flag " - tso flag" $SRC off
chk_tso_flag " - peer tso flag" $DST on chk_tso_flag " - peer tso flag" $DST on
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
chk_gro " - no aggregation" 10
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
chk_gro_flag " - gro flag with GRO on" $DST on
chk_gro " - aggregation" 1 chk_gro " - aggregation" 1