Received: by 2002:ab2:6203:0:b0:1f5:f2ab:c469 with SMTP id o3csp2484156lqt; Mon, 22 Apr 2024 12:00:57 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW7sYtYgKmDgIWYzIQk3iXXyzP6wwoh74y9aGjuIfMuVj/IV8UtuAY/TdPbwexL3+ZmJHmA3TBp8w/vPHXeqoqCizbwW5x+Wz435GRS4w== X-Google-Smtp-Source: AGHT+IFGpW5+/6TumuyVFmy8xjt/uPZsoGzqooucuJpJv8N72mMEZIJP0GHaWe8aPJOb7D9r48Ny X-Received: by 2002:a17:902:ce09:b0:1dd:c288:899f with SMTP id k9-20020a170902ce0900b001ddc288899fmr14098496plg.18.1713812456458; Mon, 22 Apr 2024 12:00:56 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713812456; cv=pass; d=google.com; s=arc-20160816; b=iZIGlQwf2wRAcJGJuzpZD30hlcM5L+Vj8K4wlorsUaflP/orla+UhvnIzON2mnMtWR Ge7X+WhdKo3flW6MLpUEGJB9stJnKELM/FY16XJLWbXJxcL5XOe45CtDyvJpfBBKpmr1 CIcXhDc6stbd6fF3/ja8O0aSHTAMAuv57QdvOp3j2ioMVcWs8PdIwS3vX3OdplCF+Wq7 KxH3mPqt7V3zZVJWm9brA9hMLZcs922SqIy+oPBPQ9FehEN9R8Wzf9U1vwsW4pbZuTdq BQIPHCjAqjrfb9YfvQoLpza/A8KEhD9BDtmtAJqyodtQ+awc1Ai12YYThk1zi7j7HtaA 2g1w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:content-language:from :references:cc:to:subject:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:dkim-signature:message-id; bh=Hmx5bIC9HXhYXvBA5QU87uwq6RGHLvRpwGDnjq22S+Y=; fh=dWy2TC+kdzjb7ePn/XHS2d3jYZP2x0qcbZbIUQ7kTvU=; b=0ZgnApSJJ+mzhYwq57DftwwNBuqkJffKVFxAl4TeJVsZAQwbJgwqWbXpJ7O0nzSpcs IbaTnGESlzqQaGG+pQ/3PhWLX1JvWVAS2g37R+u0ynDUQWk7CBDrp7S7nJTr13TuyKeA jQUwt85tUgdvZHanDQhzoAUAmU/KGWV7OdQdmFKM8rZBmBfGdN9ougA56nJ+AcDoiqCk z4HX5i2h0+jXyUpy8uiqYoo98vGqf/58G+H4jLGwDup1leG/80WMMGAf5WsAvGXeZG4b wzZpat0pNe/DCVKtSLKSby3qK1r/C1u8XwLBVP5bU4bwEmPuoc5b3wFkiew558tp1V94 f7xg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=vuZ4leAg; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-153869-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-153869-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id i2-20020a170902c94200b001e2c8a0e01asi8265672pla.29.2024.04.22.12.00.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Apr 2024 12:00:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-153869-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=vuZ4leAg; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-153869-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-153869-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id CF811286916 for ; Mon, 22 Apr 2024 18:49:51 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2E365156C78; Mon, 22 Apr 2024 18:46:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="vuZ4leAg" Received: from out-183.mta0.migadu.com (out-183.mta0.migadu.com [91.218.175.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B3FF1156F24 for ; Mon, 22 Apr 2024 18:46:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.183 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713811588; cv=none; b=Tmx9gLmt7qApzyc577tDfU2R6psl7XVWTd8gtZ18bKV12o6q+/i5TRPqTOEEyVlp6VpZQQ5Twfg56018Nkf0hGlocK8HMZhPwqENbalcTxv9JzVs1pmNdEB4tEC6KAOwg7sqswzzovdOW/JUt4yl/8KK+G+dtbs4og5dwtOw4wE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713811588; c=relaxed/simple; bh=noHXfVMJV+yXJVx0vjokRg9H1rF7im7quabjLuDwldk=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=bC68zS6hdawi+V6LH7szgUmUbzHniZm/3XN+FWCIorS5xcpd1+UZt8fyVYoRPqIPX7e83BY9GfQvifc/M8aUO05gjm78UzjevFjLTnpvWW8jZ68e32Nw7QuhGYwLq5WKd0WBZMzwYv1e9B/ai8nFqdXjgVDe+6JDh84NBUPCM+A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=vuZ4leAg; arc=none smtp.client-ip=91.218.175.183 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Message-ID: DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1713811585; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Hmx5bIC9HXhYXvBA5QU87uwq6RGHLvRpwGDnjq22S+Y=; b=vuZ4leAgw32yhPRgHio+YtpCjzv1H4dHtDy0TivOTncN32ArN5czGV5iz5prcT5D3wDHoi ahs0/U5jkJoiGF9yc/FjHxd6yCYqpbbtGaQeo6LnPzm/U0u4r1Xa3SD657PZZEbLYmPPNz FR4oSCPUfKKHPcwTmVFHKs7EJ9K3XkU= Date: Mon, 22 Apr 2024 11:46:19 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Subject: Re: [RFC PATCH bpf-next v4 2/2] net: Add additional bit to support clockid_t timestamp type To: "Abhishek Chauhan (ABC)" , Willem de Bruijn Cc: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Andrew Halaney , Martin KaFai Lau , Daniel Borkmann , bpf , kernel@quicinc.com References: <20240418004308.1009262-1-quic_abchauha@quicinc.com> <20240418004308.1009262-3-quic_abchauha@quicinc.com> <66216f3ec638b_f648a294ec@willemb.c.googlers.com.notmuch> <6b6bd108-817c-4a58-8b69-6c2dde436575@quicinc.com> <79ca7697-339a-4f72-ab12-5a3094b294f3@quicinc.com> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Martin KaFai Lau Content-Language: en-US In-Reply-To: <79ca7697-339a-4f72-ab12-5a3094b294f3@quicinc.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT On 4/19/24 6:13 PM, Abhishek Chauhan (ABC) wrote: > > > On 4/18/2024 5:30 PM, Abhishek Chauhan (ABC) wrote: >> >> >> On 4/18/2024 2:57 PM, Martin KaFai Lau wrote: >>> On 4/18/24 1:10 PM, Abhishek Chauhan (ABC) wrote: >>>>>>   #ifdef CONFIG_NET_XGRESS >>>>>>       __u8            tc_at_ingress:1;    /* See TC_AT_INGRESS_MASK */ >>>>>>       __u8            tc_skip_classify:1; >>>>>> @@ -1096,10 +1100,12 @@ struct sk_buff { >>>>>>    */ >>>>>>   #ifdef __BIG_ENDIAN_BITFIELD >>>>>>   #define SKB_MONO_DELIVERY_TIME_MASK    (1 << 7) >>>>>> -#define TC_AT_INGRESS_MASK        (1 << 6) >>>>>> +#define SKB_TAI_DELIVERY_TIME_MASK    (1 << 6) >>>>> >>>>> SKB_TSTAMP_TYPE_BIT2_MASK? >>> >>> nit. Shorten it to just SKB_TSTAMP_TYPE_MASK? >>> >> Okay i will do the same. Noted! >>> #ifdef __BIG_ENDIAN_BITFIELD >>> #define SKB_TSTAMP_TYPE_MASK    (3 << 6) >>> #define SKB_TSTAMP_TYPE_RSH    (6)    /* more on this later */ >>> #else >>> #define SKB_TSTAMP_TYPE_MASK    (3) >>> #endif >>> >>>>> >>>> I was thinking to keep it as TAI because it will confuse developers. I hope thats okay. >>> >>> I think it is not very useful to distinguish each bit since it is an enum value now. It becomes more like the "pkt_type:3" and its PKT_TYPE_MAX. >>> I see what you are saying. >>>>>> +#define TC_AT_INGRESS_MASK        (1 << 5) >>>>>>   #else >>>>>>   #define SKB_MONO_DELIVERY_TIME_MASK    (1 << 0) >>>>>> -#define TC_AT_INGRESS_MASK        (1 << 1) >>>>>> +#define SKB_TAI_DELIVERY_TIME_MASK    (1 << 1) >>>>>> +#define TC_AT_INGRESS_MASK        (1 << 2) >>>>>>   #endif >>>>>>   #define SKB_BF_MONO_TC_OFFSET        offsetof(struct sk_buff, __mono_tc_offset) >>>>>>   @@ -4206,6 +4212,11 @@ static inline void skb_set_delivery_time(struct sk_buff *skb, ktime_t kt, >>>>>>       case CLOCK_MONOTONIC: >>>>>>           skb->tstamp_type = SKB_CLOCK_MONO; >>>>>>           break; >>>>>> +    case CLOCK_TAI: >>>>>> +        skb->tstamp_type = SKB_CLOCK_TAI; >>>>>> +        break; >>>>>> +    default: >>>>>> +        WARN_ONCE(true, "clockid %d not supported", tstamp_type); >>>>> >>>>> and set to 0 and default tstamp_type? >>>>> Actually thinking about it. I feel if its unsupported just fall back to default is the correct thing. I will take care of this. >>>>>>       } >>>>>>   } >>>>> >>>>>>   > >>>>>   @@ -9372,10 +9378,16 @@ static struct bpf_insn *bpf_convert_tstamp_type_read(const struct bpf_insn *si, >>>>>>       *insn++ = BPF_LDX_MEM(BPF_B, tmp_reg, skb_reg, >>>>>>                     SKB_BF_MONO_TC_OFFSET); >>>>>>       *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, >>>>>> -                SKB_MONO_DELIVERY_TIME_MASK, 2); >>>>>> +                SKB_MONO_DELIVERY_TIME_MASK | SKB_TAI_DELIVERY_TIME_MASK, 2); >>>>>> +    *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, >>>>>> +                SKB_MONO_DELIVERY_TIME_MASK, 3); >>>>>> +    *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, >>>>>> +                SKB_TAI_DELIVERY_TIME_MASK, 4); >>>>>>       *insn++ = BPF_MOV32_IMM(value_reg, BPF_SKB_TSTAMP_UNSPEC); >>>>>>       *insn++ = BPF_JMP_A(1); >>>>>>       *insn++ = BPF_MOV32_IMM(value_reg, BPF_SKB_TSTAMP_DELIVERY_MONO); >>>>>> +    *insn++ = BPF_JMP_A(1); >>>>>> +    *insn++ = BPF_MOV32_IMM(value_reg, BPF_SKB_TSTAMP_DELIVERY_TAI); >>> >>> With SKB_TSTAMP_TYPE_MASK defined like above, this could be simplified like this (untested): >>> >> Let me think this through and raise it as part of the next rfc patch. >>> static struct bpf_insn *bpf_convert_tstamp_type_read(const struct bpf_insn *si, >>>                                                      struct bpf_insn *insn) >>> { >>>     __u8 value_reg = si->dst_reg; >>>     __u8 skb_reg = si->src_reg; >>> >>>     BUILD_BUG_ON(__SKB_CLOCK_MAX != BPF_SKB_TSTAMP_DELIVERY_TAI); >>>     *insn++ = BPF_LDX_MEM(BPF_B, value_reg, skb_reg, SKB_BF_MONO_TC_OFFSET); >>>     *insn++ = BPF_ALU32_IMM(BPF_AND, value_reg, SKB_TSTAMP_TYPE_MASK); >>> #ifdef __BIG_ENDIAN_BITFIELD >>>     *insn++ = BPF_ALU32_IMM(BPF_RSH, value_reg, SKB_TSTAMP_TYPE_RSH); >>> #else >>>     BUILD_BUG_ON(!(SKB_TSTAMP_TYPE_MASK & 0x1)); >>> #endif >>> >>>     return insn; >>> } >>> >>>>>>         return insn; >>>>>>   } >>>>>> @@ -9418,10 +9430,26 @@ static struct bpf_insn *bpf_convert_tstamp_read(const struct bpf_prog *prog, >>>>>>           __u8 tmp_reg = BPF_REG_AX; >>>>>>             *insn++ = BPF_LDX_MEM(BPF_B, tmp_reg, skb_reg, SKB_BF_MONO_TC_OFFSET); >>>>>> +        /*check if all three bits are set*/ >>>>>>           *insn++ = BPF_ALU32_IMM(BPF_AND, tmp_reg, >>>>>> -                    TC_AT_INGRESS_MASK | SKB_MONO_DELIVERY_TIME_MASK); >>>>>> -        *insn++ = BPF_JMP32_IMM(BPF_JNE, tmp_reg, >>>>>> -                    TC_AT_INGRESS_MASK | SKB_MONO_DELIVERY_TIME_MASK, 2); >>>>>> +                    TC_AT_INGRESS_MASK | SKB_MONO_DELIVERY_TIME_MASK | >>>>>> +                    SKB_TAI_DELIVERY_TIME_MASK); >>>>>> +        /*if all 3 bits are set jump 3 instructions and clear the register */ >>>>>> +        *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, >>>>>> +                    TC_AT_INGRESS_MASK | SKB_MONO_DELIVERY_TIME_MASK | >>>>>> +                    SKB_TAI_DELIVERY_TIME_MASK, 4); >>>>>> +        /*Now check Mono is set with ingress mask if so clear */ >>>>>> +        *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, >>>>>> +                    TC_AT_INGRESS_MASK | SKB_MONO_DELIVERY_TIME_MASK, 3); >>>>>> +        /*Now Check tai is set with ingress mask if so clear */ >>>>>> +        *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, >>>>>> +                    TC_AT_INGRESS_MASK | SKB_TAI_DELIVERY_TIME_MASK, 2); >>>>>> +        /*Now Check tai and mono are set if so clear */ >>>>>> +        *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, >>>>>> +                    SKB_MONO_DELIVERY_TIME_MASK | >>>>>> +                    SKB_TAI_DELIVERY_TIME_MASK, 1); >>> >>> Same as the bpf_convert_tstamp_type_read, this could be simplified with SKB_TSTAMP_TYPE_MASK. >>> > Willem and Martin, > When do we clear the tstamp and make it 0 in bpf_convert_tstamp_read? meaning which configuration? When the bpf prog does not check the skb->tstamp_type. It is the "if (!prog->tstamp_type_access)" in bpf_convert_tstamp_read(). If bpf prog does not check the skb->tstamp_type and it is at ingress, bpf prog expects recv tstamp (ie. real clock), so it needs to clear out the tstamp (i.e read as 0 tstamp). > I see previously(current upstream code) if mono_delivery is set and tc_ingress_mask is set > upstream code used to set the tstamp as 0. > > Which means with addition of tai mask the new implementation should take care of following cases(correct me if i am wrong) > 1. ( tai mask set + ingress mask set ) = Clear tstamp > 2. ( mono mask set + ingress mask set ) = Clear tstamp > 3. ( mono mask set + tai mask set + ingress mask set ) = Clear tstamp > 4. ( No mask set ) = Clear tstamp > 5. ( Tai mask set + mono mask set ) = Clear tstamp No need to check the individual mono and tai bit here. Check the tstamp_type as a whole. Like in pseudo C: if (skb->tc_at_ingress && skb->tstamp_type) value_reg = 0; untested code for tstamp_read() and tstamp_write(): static struct bpf_insn *bpf_convert_tstamp_read(const struct bpf_prog *prog, const struct bpf_insn *si, struct bpf_insn *insn) { __u8 value_reg = si->dst_reg; __u8 skb_reg = si->src_reg; #ifdef CONFIG_NET_XGRESS /* If the tstamp_type is read, * the bpf prog is aware the tstamp could have delivery time. * Thus, read skb->tstamp as is if tstamp_type_access is true. */ if (!prog->tstamp_type_access) { /* AX is needed because src_reg and dst_reg could be the same */ __u8 tmp_reg = BPF_REG_AX; *insn++ = BPF_LDX_MEM(BPF_B, tmp_reg, skb_reg, SKB_BF_MONO_TC_OFFSET); *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, TC_AT_INGRESS_MASK, 1); /* goto */ BPF_JMP_A(4); *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, SKB_TSTAMP_TYPE_MASK, 1); /* goto */ BPF_JMP_A(2); /* skb->tc_at_ingress && skb->tstamp_type, * read 0 as the (rcv) timestamp. */ *insn++ = BPF_MOV64_IMM(value_reg, 0); *insn++ = BPF_JMP_A(1); } #endif /* : value_reg = skb->tstamp */ *insn++ = BPF_LDX_MEM(BPF_DW, value_reg, skb_reg, offsetof(struct sk_buff, tstamp)); return insn; } static struct bpf_insn *bpf_convert_tstamp_write(const struct bpf_prog *prog, const struct bpf_insn *si, struct bpf_insn *insn) { __u8 value_reg = si->src_reg; __u8 skb_reg = si->dst_reg; #ifdef CONFIG_NET_XGRESS /* If the tstamp_type is read, * the bpf prog is aware the tstamp could have delivery time. * Thus, write skb->tstamp as is if tstamp_type_access is true. * Otherwise, writing at ingress will have to clear the * mono_delivery_time (skb->tstamp_type:1)bit also. */ if (!prog->tstamp_type_access) { __u8 tmp_reg = BPF_REG_AX; *insn++ = BPF_LDX_MEM(BPF_B, tmp_reg, skb_reg, SKB_BF_MONO_TC_OFFSET); /* Writing __sk_buff->tstamp as ingress, goto */ *insn++ = BPF_JMP32_IMM(BPF_JSET, tmp_reg, TC_AT_INGRESS_MASK, 1); /* goto */ *insn++ = BPF_JMP_A(2); /* : skb->tstamp_type */ *insn++ = BPF_ALU32_IMM(BPF_AND, tmp_reg, ~SKB_TSTAMP_TYPE_MASK); *insn++ = BPF_STX_MEM(BPF_B, skb_reg, tmp_reg, SKB_BF_MONO_TC_OFFSET); } #endif /* : skb->tstamp = tstamp */ *insn++ = BPF_RAW_INSN(BPF_CLASS(si->code) | BPF_DW | BPF_MEM, skb_reg, value_reg, offsetof(struct sk_buff, tstamp), si->imm); return insn; } > > This leaves us with only two values which can be support which is 0x1 and 0x2 > > This means the tstamp_type should be either 0x1(mono) and tstamp_type 0x2 (tai) to set the value_reg with tstamp > Is my understanding correct ? > > Do you think the below simplified version looks okay ? > > static struct bpf_insn *bpf_convert_tstamp_read(const struct bpf_prog *prog, > const struct bpf_insn *si, > struct bpf_insn *insn) > { > __u8 value_reg = si->dst_reg; > __u8 skb_reg = si->src_reg; > > BUILD_BUG_ON(__SKB_CLOCK_MAX != BPF_SKB_TSTAMP_DELIVERY_TAI); > #ifdef CONFIG_NET_XGRESS > /* If the tstamp_type is read, > * the bpf prog is aware the tstamp could have delivery time. > * Thus, read skb->tstamp as is if tstamp_type_access is true. > */ > if (!prog->tstamp_type_access) { > /* AX is needed because src_reg and dst_reg could be the same */ > __u8 tmp_reg = BPF_REG_AX; > > *insn++ = BPF_LDX_MEM(BPF_B, tmp_reg, skb_reg, SKB_BF_MONO_TC_OFFSET); > /* check if all three bits are set*/ > *insn++ = BPF_ALU32_IMM(BPF_AND, tmp_reg, > TC_AT_INGRESS_MASK | SKB_TSTAMP_TYPE_MASK); > > /* If the value of tmp_reg is 7,6,5,4,3,0 which means invalid > * configuration set the tstamp to 0, value 0x1 and 0x2 > * is correct configuration > */ > #ifdef __BIG_ENDIAN_BITFIELD > *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, 0x1 << SKB_TSTAMP_TYPE_RSH, 3); > *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, 0x2 << SKB_TSTAMP_TYPE_RSH, 2); > #endif > *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, 0x1, 3); > *insn++ = BPF_JMP32_IMM(BPF_JEQ, tmp_reg, 0x2, 2); > #endif > /* skb->tc_at_ingress && skb->tstamp_type:2, > * read 0 as the (rcv) timestamp. > */ > *insn++ = BPF_MOV64_IMM(value_reg, 0); > *insn++ = BPF_JMP_A(1); > } > #endif > > *insn++ = BPF_LDX_MEM(BPF_DW, value_reg, skb_reg, > offsetof(struct sk_buff, tstamp)); > return insn; > } > >