mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
7cf245a37e
Fix all files in samples/bpf to include libbpf header files with the bpf/
prefix, to be consistent with external users of the library. Also ensure
that all includes of exported libbpf header files (those that are exported
on 'make install' of the library) use bracketed includes instead of quoted.
To make sure no new files are introduced that doesn't include the bpf/
prefix in its include, remove tools/lib/bpf from the include path entirely,
and use tools/lib instead.
Fixes: 6910d7d386
("selftests/bpf: Ensure bpf_helper_defs.h are taken from selftests dir")
Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Link: https://lore.kernel.org/bpf/157952560911.1683545.8795966751309534150.stgit@toke.dk
224 lines
4.8 KiB
C
224 lines
4.8 KiB
C
#include <uapi/linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include "bpf_legacy.h"
|
|
#include <uapi/linux/in.h>
|
|
#include <uapi/linux/if.h>
|
|
#include <uapi/linux/if_ether.h>
|
|
#include <uapi/linux/ip.h>
|
|
#include <uapi/linux/ipv6.h>
|
|
#include <uapi/linux/if_tunnel.h>
|
|
#define IP_MF 0x2000
|
|
#define IP_OFFSET 0x1FFF
|
|
|
|
struct vlan_hdr {
|
|
__be16 h_vlan_TCI;
|
|
__be16 h_vlan_encapsulated_proto;
|
|
};
|
|
|
|
struct flow_key_record {
|
|
__be32 src;
|
|
__be32 dst;
|
|
union {
|
|
__be32 ports;
|
|
__be16 port16[2];
|
|
};
|
|
__u16 thoff;
|
|
__u8 ip_proto;
|
|
};
|
|
|
|
static inline int proto_ports_offset(__u64 proto)
|
|
{
|
|
switch (proto) {
|
|
case IPPROTO_TCP:
|
|
case IPPROTO_UDP:
|
|
case IPPROTO_DCCP:
|
|
case IPPROTO_ESP:
|
|
case IPPROTO_SCTP:
|
|
case IPPROTO_UDPLITE:
|
|
return 0;
|
|
case IPPROTO_AH:
|
|
return 4;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static inline int ip_is_fragment(struct __sk_buff *ctx, __u64 nhoff)
|
|
{
|
|
return load_half(ctx, nhoff + offsetof(struct iphdr, frag_off))
|
|
& (IP_MF | IP_OFFSET);
|
|
}
|
|
|
|
static inline __u32 ipv6_addr_hash(struct __sk_buff *ctx, __u64 off)
|
|
{
|
|
__u64 w0 = load_word(ctx, off);
|
|
__u64 w1 = load_word(ctx, off + 4);
|
|
__u64 w2 = load_word(ctx, off + 8);
|
|
__u64 w3 = load_word(ctx, off + 12);
|
|
|
|
return (__u32)(w0 ^ w1 ^ w2 ^ w3);
|
|
}
|
|
|
|
static inline __u64 parse_ip(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_proto,
|
|
struct flow_key_record *flow)
|
|
{
|
|
__u64 verlen;
|
|
|
|
if (unlikely(ip_is_fragment(skb, nhoff)))
|
|
*ip_proto = 0;
|
|
else
|
|
*ip_proto = load_byte(skb, nhoff + offsetof(struct iphdr, protocol));
|
|
|
|
if (*ip_proto != IPPROTO_GRE) {
|
|
flow->src = load_word(skb, nhoff + offsetof(struct iphdr, saddr));
|
|
flow->dst = load_word(skb, nhoff + offsetof(struct iphdr, daddr));
|
|
}
|
|
|
|
verlen = load_byte(skb, nhoff + 0/*offsetof(struct iphdr, ihl)*/);
|
|
if (likely(verlen == 0x45))
|
|
nhoff += 20;
|
|
else
|
|
nhoff += (verlen & 0xF) << 2;
|
|
|
|
return nhoff;
|
|
}
|
|
|
|
static inline __u64 parse_ipv6(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_proto,
|
|
struct flow_key_record *flow)
|
|
{
|
|
*ip_proto = load_byte(skb,
|
|
nhoff + offsetof(struct ipv6hdr, nexthdr));
|
|
flow->src = ipv6_addr_hash(skb,
|
|
nhoff + offsetof(struct ipv6hdr, saddr));
|
|
flow->dst = ipv6_addr_hash(skb,
|
|
nhoff + offsetof(struct ipv6hdr, daddr));
|
|
nhoff += sizeof(struct ipv6hdr);
|
|
|
|
return nhoff;
|
|
}
|
|
|
|
static inline bool flow_dissector(struct __sk_buff *skb,
|
|
struct flow_key_record *flow)
|
|
{
|
|
__u64 nhoff = ETH_HLEN;
|
|
__u64 ip_proto;
|
|
__u64 proto = load_half(skb, 12);
|
|
int poff;
|
|
|
|
if (proto == ETH_P_8021AD) {
|
|
proto = load_half(skb, nhoff + offsetof(struct vlan_hdr,
|
|
h_vlan_encapsulated_proto));
|
|
nhoff += sizeof(struct vlan_hdr);
|
|
}
|
|
|
|
if (proto == ETH_P_8021Q) {
|
|
proto = load_half(skb, nhoff + offsetof(struct vlan_hdr,
|
|
h_vlan_encapsulated_proto));
|
|
nhoff += sizeof(struct vlan_hdr);
|
|
}
|
|
|
|
if (likely(proto == ETH_P_IP))
|
|
nhoff = parse_ip(skb, nhoff, &ip_proto, flow);
|
|
else if (proto == ETH_P_IPV6)
|
|
nhoff = parse_ipv6(skb, nhoff, &ip_proto, flow);
|
|
else
|
|
return false;
|
|
|
|
switch (ip_proto) {
|
|
case IPPROTO_GRE: {
|
|
struct gre_hdr {
|
|
__be16 flags;
|
|
__be16 proto;
|
|
};
|
|
|
|
__u64 gre_flags = load_half(skb,
|
|
nhoff + offsetof(struct gre_hdr, flags));
|
|
__u64 gre_proto = load_half(skb,
|
|
nhoff + offsetof(struct gre_hdr, proto));
|
|
|
|
if (gre_flags & (GRE_VERSION|GRE_ROUTING))
|
|
break;
|
|
|
|
proto = gre_proto;
|
|
nhoff += 4;
|
|
if (gre_flags & GRE_CSUM)
|
|
nhoff += 4;
|
|
if (gre_flags & GRE_KEY)
|
|
nhoff += 4;
|
|
if (gre_flags & GRE_SEQ)
|
|
nhoff += 4;
|
|
|
|
if (proto == ETH_P_8021Q) {
|
|
proto = load_half(skb,
|
|
nhoff + offsetof(struct vlan_hdr,
|
|
h_vlan_encapsulated_proto));
|
|
nhoff += sizeof(struct vlan_hdr);
|
|
}
|
|
|
|
if (proto == ETH_P_IP)
|
|
nhoff = parse_ip(skb, nhoff, &ip_proto, flow);
|
|
else if (proto == ETH_P_IPV6)
|
|
nhoff = parse_ipv6(skb, nhoff, &ip_proto, flow);
|
|
else
|
|
return false;
|
|
break;
|
|
}
|
|
case IPPROTO_IPIP:
|
|
nhoff = parse_ip(skb, nhoff, &ip_proto, flow);
|
|
break;
|
|
case IPPROTO_IPV6:
|
|
nhoff = parse_ipv6(skb, nhoff, &ip_proto, flow);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
flow->ip_proto = ip_proto;
|
|
poff = proto_ports_offset(ip_proto);
|
|
if (poff >= 0) {
|
|
nhoff += poff;
|
|
flow->ports = load_word(skb, nhoff);
|
|
}
|
|
|
|
flow->thoff = (__u16) nhoff;
|
|
|
|
return true;
|
|
}
|
|
|
|
struct pair {
|
|
long packets;
|
|
long bytes;
|
|
};
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_HASH);
|
|
__type(key, __be32);
|
|
__type(value, struct pair);
|
|
__uint(max_entries, 1024);
|
|
} hash_map SEC(".maps");
|
|
|
|
SEC("socket2")
|
|
int bpf_prog2(struct __sk_buff *skb)
|
|
{
|
|
struct flow_key_record flow = {};
|
|
struct pair *value;
|
|
u32 key;
|
|
|
|
if (!flow_dissector(skb, &flow))
|
|
return 0;
|
|
|
|
key = flow.dst;
|
|
value = bpf_map_lookup_elem(&hash_map, &key);
|
|
if (value) {
|
|
__sync_fetch_and_add(&value->packets, 1);
|
|
__sync_fetch_and_add(&value->bytes, skb->len);
|
|
} else {
|
|
struct pair val = {1, skb->len};
|
|
|
|
bpf_map_update_elem(&hash_map, &key, &val, BPF_ANY);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|