public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: Daniel Borkmann <daniel@iogearbox.net>
To: netdev@vger.kernel.org
Cc: bpf@vger.kernel.org, kuba@kernel.org, davem@davemloft.net,
	razor@blackwall.org, pabeni@redhat.com, willemb@google.com,
	sdf@fomichev.me, john.fastabend@gmail.com, martin.lau@kernel.org,
	jordan@jrife.io, maciej.fijalkowski@intel.com,
	magnus.karlsson@intel.com, dw@davidwei.uk, toke@redhat.com,
	yangzhenze@bytedance.com, wangdongdong.6@bytedance.com
Subject: [PATCH net-next v6 13/16] selftests/net: Add bpf skb forwarding program
Date: Wed, 14 Jan 2026 00:22:54 +0100	[thread overview]
Message-ID: <20260113232257.200036-14-daniel@iogearbox.net> (raw)
In-Reply-To: <20260113232257.200036-1-daniel@iogearbox.net>

From: David Wei <dw@davidwei.uk>

Add nk_forward.bpf.c, a BPF program that forwards skbs matching some IPv6
prefix received on eth0 ifindex to a specified netkit ifindex. This will
be needed by netkit container tests.

Signed-off-by: David Wei <dw@davidwei.uk>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
---
 .../selftests/drivers/net/hw/nk_forward.bpf.c | 49 +++++++++++++++++++
 1 file changed, 49 insertions(+)
 create mode 100644 tools/testing/selftests/drivers/net/hw/nk_forward.bpf.c

diff --git a/tools/testing/selftests/drivers/net/hw/nk_forward.bpf.c b/tools/testing/selftests/drivers/net/hw/nk_forward.bpf.c
new file mode 100644
index 000000000000..86ebfc1445b6
--- /dev/null
+++ b/tools/testing/selftests/drivers/net/hw/nk_forward.bpf.c
@@ -0,0 +1,49 @@
+// SPDX-License-Identifier: GPL-2.0
+#include <linux/bpf.h>
+#include <linux/pkt_cls.h>
+#include <linux/if_ether.h>
+#include <linux/ipv6.h>
+#include <linux/in6.h>
+#include <bpf/bpf_endian.h>
+#include <bpf/bpf_helpers.h>
+
+#define TC_ACT_OK 0
+#define ETH_P_IPV6 0x86DD
+
+#define ctx_ptr(field)		((void *)(long)(field))
+
+#define v6_p64_equal(a, b)	(a.s6_addr32[0] == b.s6_addr32[0] && \
+				 a.s6_addr32[1] == b.s6_addr32[1])
+
+volatile __u32 netkit_ifindex;
+volatile __u8 ipv6_prefix[16];
+
+SEC("tc/ingress")
+int tc_redirect_peer(struct __sk_buff *skb)
+{
+	void *data_end = ctx_ptr(skb->data_end);
+	void *data = ctx_ptr(skb->data);
+	struct in6_addr *peer_addr;
+	struct ipv6hdr *ip6h;
+	struct ethhdr *eth;
+
+	peer_addr = (struct in6_addr *)ipv6_prefix;
+
+	if (skb->protocol != bpf_htons(ETH_P_IPV6))
+		return TC_ACT_OK;
+
+	eth = data;
+	if ((void *)(eth + 1) > data_end)
+		return TC_ACT_OK;
+
+	ip6h = data + sizeof(struct ethhdr);
+	if ((void *)(ip6h + 1) > data_end)
+		return TC_ACT_OK;
+
+	if (!v6_p64_equal(ip6h->daddr, (*peer_addr)))
+		return TC_ACT_OK;
+
+	return bpf_redirect_peer(netkit_ifindex, 0);
+}
+
+char __license[] SEC("license") = "GPL";
-- 
2.43.0


  parent reply	other threads:[~2026-01-13 23:23 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-13 23:22 [PATCH net-next v6 00/16] netkit: Support for io_uring zero-copy and AF_XDP Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 01/16] net: Add queue-create operation Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 02/16] net: Implement netdev_nl_queue_create_doit Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 03/16] net: Add lease info to queue-get response Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 04/16] net, ethtool: Disallow leased real rxqs to be resized Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 05/16] net: Proxy net_mp_{open,close}_rxq for leased queues Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 06/16] net: Proxy netdev_queue_get_dma_dev " Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 07/16] xsk: Extend xsk_rcv_check validation Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 08/16] xsk: Proxy pool management for leased queues Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 09/16] netkit: Add single device mode for netkit Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 10/16] netkit: Implement rtnl_link_ops->alloc and ndo_queue_create Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 11/16] netkit: Add netkit notifier to check for unregistering devices Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 12/16] netkit: Add xsk support for af_xdp applications Daniel Borkmann
2026-01-13 23:22 ` Daniel Borkmann [this message]
2026-01-13 23:22 ` [PATCH net-next v6 14/16] selftests/net: Add env for container based tests Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 15/16] selftests/net: Make NetDrvContEnv support queue leasing Daniel Borkmann
2026-01-13 23:22 ` [PATCH net-next v6 16/16] selftests/net: Add netkit container tests Daniel Borkmann
2026-01-14 22:39 ` [PATCH net-next v6 00/16] netkit: Support for io_uring zero-copy and AF_XDP Daniel Borkmann

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260113232257.200036-14-daniel@iogearbox.net \
    --to=daniel@iogearbox.net \
    --cc=bpf@vger.kernel.org \
    --cc=davem@davemloft.net \
    --cc=dw@davidwei.uk \
    --cc=john.fastabend@gmail.com \
    --cc=jordan@jrife.io \
    --cc=kuba@kernel.org \
    --cc=maciej.fijalkowski@intel.com \
    --cc=magnus.karlsson@intel.com \
    --cc=martin.lau@kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=razor@blackwall.org \
    --cc=sdf@fomichev.me \
    --cc=toke@redhat.com \
    --cc=wangdongdong.6@bytedance.com \
    --cc=willemb@google.com \
    --cc=yangzhenze@bytedance.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox