This patch corrects a few warnings to allow selftests to compile for GCC. -- progs/cpumask_failure.c -- progs/bpf_misc.h:136:22: error: ‘cpumask’ is used uninitialized [-Werror=uninitialized] 136 | #define __sink(expr) asm volatile("" : "+g"(expr)) | ^~~ progs/cpumask_failure.c:68:9: note: in expansion of macro ‘__sink’ 68 | __sink(cpumask); The macro __sink(cpumask) with the '+' contraint modifier forces the the compiler to expect a read and write from cpumask. GCC detects that cpumask is never initialized and reports an error. This patch removes the spurious non required definitions of cpumask. -- progs/dynptr_fail.c -- progs/dynptr_fail.c:1444:9: error: ‘ptr1’ may be used uninitialized [-Werror=maybe-uninitialized] 1444 | bpf_dynptr_clone(&ptr1, &ptr2); Many of the tests in the file are related to the detection of uninitialized pointers by the verifier. GCC is able to detect possible uninitialized values, and reports this as an error. The patch initializes all of the previous uninitialized structs. -- progs/test_tunnel_kern.c -- progs/test_tunnel_kern.c:590:9: error: array subscript 1 is outside array bounds of ‘struct geneve_opt[1]’ [-Werror=array-bounds=] 590 | *(int *) &gopt.opt_data = bpf_htonl(0xdeadbeef); | ^~~~~~~~~~~~~~~~~~~~~~~ progs/test_tunnel_kern.c:575:27: note: at offset 4 into object ‘gopt’ of size 4 575 | struct geneve_opt gopt; This tests accesses beyond the defined data for the struct geneve_opt which contains as last field "u8 opt_data[0]" which clearly does not get reserved space (in stack) in the function header. This pattern is repeated in ip6geneve_set_tunnel and geneve_set_tunnel functions. GCC is able to see this and emits a warning. The patch introduces a local struct that allocates enough space to safely allow the write to opt_data field. -- progs/jeq_infer_not_null_fail.c -- progs/jeq_infer_not_null_fail.c:21:40: error: array subscript ‘struct bpf_map[0]’ is partly outside array bounds of ‘struct <anonymous>[1]’ [-Werror=array-bounds=] 21 | struct bpf_map *inner_map = map->inner_map_meta; | ^~ progs/jeq_infer_not_null_fail.c:14:3: note: object ‘m_hash’ of size 32 14 | } m_hash SEC(".maps"); This example defines m_hash in the context of the compilation unit and casts it to struct bpf_map which is much smaller than the size of struct bpf_map. It errors out in GCC when it attempts to access an element that would be defined in struct bpf_map outsize of the defined limits for m_hash. This patch disables the warning through a GCC pragma. This changes were tested in bpf-next master selftests without any regressions. Signed-off-by: Cupertino Miranda <cupertino.miranda@oracle.com> Cc: jose.marchesi@oracle.com Cc: david.faust@oracle.com Cc: Yonghong Song <yonghong.song@linux.dev> Cc: Eduard Zingerman <eddyz87@gmail.com> Cc: Andrii Nakryiko <andrii.nakryiko@gmail.com> Link: https://lore.kernel.org/r/20240510183850.286661-2-cupertino.miranda@oracle.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
1011 lines
21 KiB
C
1011 lines
21 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2016 VMware
|
|
* Copyright (c) 2016 Facebook
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
* License as published by the Free Software Foundation.
|
|
*/
|
|
#include "vmlinux.h"
|
|
#include <bpf/bpf_core_read.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_endian.h>
|
|
#include "bpf_kfuncs.h"
|
|
#include "bpf_tracing_net.h"
|
|
|
|
#define log_err(__ret) bpf_printk("ERROR line:%d ret:%d\n", __LINE__, __ret)
|
|
|
|
#define VXLAN_UDP_PORT 4789
|
|
#define ETH_P_IP 0x0800
|
|
#define PACKET_HOST 0
|
|
#define TUNNEL_CSUM bpf_htons(0x01)
|
|
#define TUNNEL_KEY bpf_htons(0x04)
|
|
|
|
/* Only IPv4 address assigned to veth1.
|
|
* 172.16.1.200
|
|
*/
|
|
#define ASSIGNED_ADDR_VETH1 0xac1001c8
|
|
|
|
int bpf_skb_set_fou_encap(struct __sk_buff *skb_ctx,
|
|
struct bpf_fou_encap *encap, int type) __ksym;
|
|
int bpf_skb_get_fou_encap(struct __sk_buff *skb_ctx,
|
|
struct bpf_fou_encap *encap) __ksym;
|
|
struct xfrm_state *
|
|
bpf_xdp_get_xfrm_state(struct xdp_md *ctx, struct bpf_xfrm_state_opts *opts,
|
|
u32 opts__sz) __ksym;
|
|
void bpf_xdp_xfrm_state_release(struct xfrm_state *x) __ksym;
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_ARRAY);
|
|
__uint(max_entries, 1);
|
|
__type(key, __u32);
|
|
__type(value, __u32);
|
|
} local_ip_map SEC(".maps");
|
|
|
|
SEC("tc")
|
|
int gre_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX | BPF_F_SEQ_NUMBER);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int gre_set_tunnel_no_key(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX | BPF_F_SEQ_NUMBER |
|
|
BPF_F_NO_TUNNEL_KEY);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int gre_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("key %d remote ip 0x%x\n", key.tunnel_id, key.remote_ipv4);
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6gretap_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
int ret;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
key.tunnel_label = 0xabcde;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6 | BPF_F_ZERO_CSUM_TX |
|
|
BPF_F_SEQ_NUMBER);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6gretap_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
int ret;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("key %d remote ip6 ::%x label %x\n",
|
|
key.tunnel_id, key.remote_ipv6[3], key.tunnel_label);
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int erspan_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct erspan_metadata md;
|
|
int ret;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&md, 0, sizeof(md));
|
|
#ifdef ERSPAN_V1
|
|
md.version = 1;
|
|
md.u.index = bpf_htonl(123);
|
|
#else
|
|
__u8 direction = 1;
|
|
__u8 hwid = 7;
|
|
|
|
md.version = 2;
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, dir, direction);
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, hwid, (hwid & 0xf));
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, hwid_upper, (hwid >> 4) & 0x3);
|
|
#endif
|
|
|
|
ret = bpf_skb_set_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int erspan_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct erspan_metadata md;
|
|
int ret;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("key %d remote ip 0x%x erspan version %d\n",
|
|
key.tunnel_id, key.remote_ipv4, md.version);
|
|
|
|
#ifdef ERSPAN_V1
|
|
index = bpf_ntohl(md.u.index);
|
|
bpf_printk("\tindex %x\n", index);
|
|
#else
|
|
bpf_printk("\tdirection %d hwid %x timestamp %u\n",
|
|
BPF_CORE_READ_BITFIELD(&md.u.md2, dir),
|
|
(BPF_CORE_READ_BITFIELD(&md.u.md2, hwid_upper) << 4) +
|
|
BPF_CORE_READ_BITFIELD(&md.u.md2, hwid),
|
|
bpf_ntohl(md.u.md2.timestamp));
|
|
#endif
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip4ip6erspan_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct erspan_metadata md;
|
|
int ret;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv6[3] = bpf_htonl(0x11);
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&md, 0, sizeof(md));
|
|
|
|
#ifdef ERSPAN_V1
|
|
md.u.index = bpf_htonl(123);
|
|
md.version = 1;
|
|
#else
|
|
__u8 direction = 0;
|
|
__u8 hwid = 17;
|
|
|
|
md.version = 2;
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, dir, direction);
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, hwid, (hwid & 0xf));
|
|
BPF_CORE_WRITE_BITFIELD(&md.u.md2, hwid_upper, (hwid >> 4) & 0x3);
|
|
#endif
|
|
|
|
ret = bpf_skb_set_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip4ip6erspan_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct erspan_metadata md;
|
|
int ret;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("ip6erspan get key %d remote ip6 ::%x erspan version %d\n",
|
|
key.tunnel_id, key.remote_ipv4, md.version);
|
|
|
|
#ifdef ERSPAN_V1
|
|
index = bpf_ntohl(md.u.index);
|
|
bpf_printk("\tindex %x\n", index);
|
|
#else
|
|
bpf_printk("\tdirection %d hwid %x timestamp %u\n",
|
|
BPF_CORE_READ_BITFIELD(&md.u.md2, dir),
|
|
(BPF_CORE_READ_BITFIELD(&md.u.md2, hwid_upper) << 4) +
|
|
BPF_CORE_READ_BITFIELD(&md.u.md2, hwid),
|
|
bpf_ntohl(md.u.md2.timestamp));
|
|
#endif
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int vxlan_set_tunnel_dst(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct vxlan_metadata md;
|
|
__u32 index = 0;
|
|
__u32 *local_ip = NULL;
|
|
int ret = 0;
|
|
|
|
local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
|
|
if (!local_ip) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.local_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.remote_ipv4 = *local_ip;
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
md.gbp = 0x800FF; /* Set VXLAN Group Policy extension */
|
|
ret = bpf_skb_set_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int vxlan_set_tunnel_src(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct vxlan_metadata md;
|
|
__u32 index = 0;
|
|
__u32 *local_ip = NULL;
|
|
int ret = 0;
|
|
|
|
local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
|
|
if (!local_ip) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.local_ipv4 = *local_ip;
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
md.gbp = 0x800FF; /* Set VXLAN Group Policy extension */
|
|
ret = bpf_skb_set_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int vxlan_get_tunnel_src(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
struct vxlan_metadata md;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_FLAGS);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
if (key.local_ipv4 != ASSIGNED_ADDR_VETH1 || md.gbp != 0x800FF ||
|
|
!(key.tunnel_flags & TUNNEL_KEY) ||
|
|
(key.tunnel_flags & TUNNEL_CSUM)) {
|
|
bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x flags 0x%x\n",
|
|
key.tunnel_id, key.local_ipv4,
|
|
key.remote_ipv4, md.gbp,
|
|
bpf_ntohs(key.tunnel_flags));
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int veth_set_outer_dst(struct __sk_buff *skb)
|
|
{
|
|
struct ethhdr *eth = (struct ethhdr *)(long)skb->data;
|
|
__u32 assigned_ip = bpf_htonl(ASSIGNED_ADDR_VETH1);
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
struct udphdr *udph;
|
|
struct iphdr *iph;
|
|
int ret = 0;
|
|
__s64 csum;
|
|
|
|
if ((void *)eth + sizeof(*eth) > data_end) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
if (eth->h_proto != bpf_htons(ETH_P_IP))
|
|
return TC_ACT_OK;
|
|
|
|
iph = (struct iphdr *)(eth + 1);
|
|
if ((void *)iph + sizeof(*iph) > data_end) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
if (iph->protocol != IPPROTO_UDP)
|
|
return TC_ACT_OK;
|
|
|
|
udph = (struct udphdr *)(iph + 1);
|
|
if ((void *)udph + sizeof(*udph) > data_end) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
if (udph->dest != bpf_htons(VXLAN_UDP_PORT))
|
|
return TC_ACT_OK;
|
|
|
|
if (iph->daddr != assigned_ip) {
|
|
csum = bpf_csum_diff(&iph->daddr, sizeof(__u32), &assigned_ip,
|
|
sizeof(__u32), 0);
|
|
if (bpf_skb_store_bytes(skb, ETH_HLEN + offsetof(struct iphdr, daddr),
|
|
&assigned_ip, sizeof(__u32), 0) < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
if (bpf_l3_csum_replace(skb, ETH_HLEN + offsetof(struct iphdr, check),
|
|
0, csum, 0) < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
bpf_skb_change_type(skb, PACKET_HOST);
|
|
}
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6vxlan_set_tunnel_dst(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
__u32 index = 0;
|
|
__u32 *local_ip;
|
|
int ret = 0;
|
|
|
|
local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
|
|
if (!local_ip) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.local_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
key.remote_ipv6[3] = bpf_htonl(*local_ip);
|
|
key.tunnel_id = 22;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6vxlan_set_tunnel_src(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
__u32 index = 0;
|
|
__u32 *local_ip;
|
|
int ret = 0;
|
|
|
|
local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
|
|
if (!local_ip) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.local_ipv6[3] = bpf_htonl(*local_ip);
|
|
key.remote_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
key.tunnel_id = 22;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6vxlan_get_tunnel_src(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
__u32 index = 0;
|
|
__u32 *local_ip;
|
|
int ret = 0;
|
|
|
|
local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
|
|
if (!local_ip) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6 | BPF_F_TUNINFO_FLAGS);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
if (bpf_ntohl(key.local_ipv6[3]) != *local_ip ||
|
|
!(key.tunnel_flags & TUNNEL_KEY) ||
|
|
!(key.tunnel_flags & TUNNEL_CSUM)) {
|
|
bpf_printk("ip6vxlan key %d local ip6 ::%x remote ip6 ::%x label 0x%x flags 0x%x\n",
|
|
key.tunnel_id, bpf_ntohl(key.local_ipv6[3]),
|
|
bpf_ntohl(key.remote_ipv6[3]), key.tunnel_label,
|
|
bpf_ntohs(key.tunnel_flags));
|
|
bpf_printk("local_ip 0x%x\n", *local_ip);
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
struct local_geneve_opt {
|
|
struct geneve_opt gopt;
|
|
int data;
|
|
};
|
|
|
|
SEC("tc")
|
|
int geneve_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
struct local_geneve_opt local_gopt;
|
|
struct geneve_opt *gopt = (struct geneve_opt *) &local_gopt;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
key.tunnel_id = 2;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
__builtin_memset(gopt, 0x0, sizeof(local_gopt));
|
|
gopt->opt_class = bpf_htons(0x102); /* Open Virtual Networking (OVN) */
|
|
gopt->type = 0x08;
|
|
gopt->r1 = 0;
|
|
gopt->r2 = 0;
|
|
gopt->r3 = 0;
|
|
gopt->length = 2; /* 4-byte multiple */
|
|
*(int *) &gopt->opt_data = bpf_htonl(0xdeadbeef);
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_ZERO_CSUM_TX);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_set_tunnel_opt(skb, gopt, sizeof(local_gopt));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int geneve_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
struct geneve_opt gopt;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_opt(skb, &gopt, sizeof(gopt));
|
|
if (ret < 0)
|
|
gopt.opt_class = 0;
|
|
|
|
bpf_printk("key %d remote ip 0x%x geneve class 0x%x\n",
|
|
key.tunnel_id, key.remote_ipv4, gopt.opt_class);
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6geneve_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct local_geneve_opt local_gopt;
|
|
struct geneve_opt *gopt = (struct geneve_opt *) &local_gopt;
|
|
int ret;
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.remote_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
key.tunnel_id = 22;
|
|
key.tunnel_tos = 0;
|
|
key.tunnel_ttl = 64;
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(gopt, 0x0, sizeof(local_gopt));
|
|
gopt->opt_class = bpf_htons(0x102); /* Open Virtual Networking (OVN) */
|
|
gopt->type = 0x08;
|
|
gopt->r1 = 0;
|
|
gopt->r2 = 0;
|
|
gopt->r3 = 0;
|
|
gopt->length = 2; /* 4-byte multiple */
|
|
*(int *) &gopt->opt_data = bpf_htonl(0xfeedbeef);
|
|
|
|
ret = bpf_skb_set_tunnel_opt(skb, gopt, sizeof(gopt));
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6geneve_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key;
|
|
struct geneve_opt gopt;
|
|
int ret;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_tunnel_opt(skb, &gopt, sizeof(gopt));
|
|
if (ret < 0)
|
|
gopt.opt_class = 0;
|
|
|
|
bpf_printk("key %d remote ip 0x%x geneve class 0x%x\n",
|
|
key.tunnel_id, key.remote_ipv4, gopt.opt_class);
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key = {};
|
|
void *data = (void *)(long)skb->data;
|
|
struct iphdr *iph = data;
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
int ret;
|
|
|
|
/* single length check */
|
|
if (data + sizeof(*iph) > data_end) {
|
|
log_err(1);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
key.tunnel_ttl = 64;
|
|
if (iph->protocol == IPPROTO_ICMP) {
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
}
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("remote ip 0x%x\n", key.remote_ipv4);
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip_gue_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key = {};
|
|
struct bpf_fou_encap encap = {};
|
|
void *data = (void *)(long)skb->data;
|
|
struct iphdr *iph = data;
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
int ret;
|
|
|
|
if (data + sizeof(*iph) > data_end) {
|
|
log_err(1);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
key.tunnel_ttl = 64;
|
|
if (iph->protocol == IPPROTO_ICMP)
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
encap.sport = 0;
|
|
encap.dport = bpf_htons(5555);
|
|
|
|
ret = bpf_skb_set_fou_encap(skb, &encap, FOU_BPF_ENCAP_GUE);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip_fou_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key = {};
|
|
struct bpf_fou_encap encap = {};
|
|
void *data = (void *)(long)skb->data;
|
|
struct iphdr *iph = data;
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
int ret;
|
|
|
|
if (data + sizeof(*iph) > data_end) {
|
|
log_err(1);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
key.tunnel_ttl = 64;
|
|
if (iph->protocol == IPPROTO_ICMP)
|
|
key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
encap.sport = 0;
|
|
encap.dport = bpf_htons(5555);
|
|
|
|
ret = bpf_skb_set_fou_encap(skb, &encap, FOU_BPF_ENCAP_FOU);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip_encap_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key = {};
|
|
struct bpf_fou_encap encap = {};
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
ret = bpf_skb_get_fou_encap(skb, &encap);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
if (bpf_ntohs(encap.dport) != 5555)
|
|
return TC_ACT_SHOT;
|
|
|
|
bpf_printk("%d remote ip 0x%x, sport %d, dport %d\n", ret,
|
|
key.remote_ipv4, bpf_ntohs(encap.sport),
|
|
bpf_ntohs(encap.dport));
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip6_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key = {};
|
|
void *data = (void *)(long)skb->data;
|
|
struct iphdr *iph = data;
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
int ret;
|
|
|
|
/* single length check */
|
|
if (data + sizeof(*iph) > data_end) {
|
|
log_err(1);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
__builtin_memset(&key, 0x0, sizeof(key));
|
|
key.tunnel_ttl = 64;
|
|
if (iph->protocol == IPPROTO_ICMP) {
|
|
key.remote_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
}
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ipip6_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("remote ip6 %x::%x\n", bpf_htonl(key.remote_ipv6[0]),
|
|
bpf_htonl(key.remote_ipv6[3]));
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6ip6_set_tunnel(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_tunnel_key key = {};
|
|
void *data = (void *)(long)skb->data;
|
|
struct ipv6hdr *iph = data;
|
|
void *data_end = (void *)(long)skb->data_end;
|
|
int ret;
|
|
|
|
/* single length check */
|
|
if (data + sizeof(*iph) > data_end) {
|
|
log_err(1);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
key.tunnel_ttl = 64;
|
|
if (iph->nexthdr == 58 /* NEXTHDR_ICMP */) {
|
|
key.remote_ipv6[3] = bpf_htonl(0x11); /* ::11 */
|
|
}
|
|
|
|
ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
SEC("tc")
|
|
int ip6ip6_get_tunnel(struct __sk_buff *skb)
|
|
{
|
|
int ret;
|
|
struct bpf_tunnel_key key;
|
|
|
|
ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key),
|
|
BPF_F_TUNINFO_IPV6);
|
|
if (ret < 0) {
|
|
log_err(ret);
|
|
return TC_ACT_SHOT;
|
|
}
|
|
|
|
bpf_printk("remote ip6 %x::%x\n", bpf_htonl(key.remote_ipv6[0]),
|
|
bpf_htonl(key.remote_ipv6[3]));
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
volatile int xfrm_reqid = 0;
|
|
volatile int xfrm_spi = 0;
|
|
volatile int xfrm_remote_ip = 0;
|
|
|
|
SEC("tc")
|
|
int xfrm_get_state(struct __sk_buff *skb)
|
|
{
|
|
struct bpf_xfrm_state x;
|
|
int ret;
|
|
|
|
ret = bpf_skb_get_xfrm_state(skb, 0, &x, sizeof(x), 0);
|
|
if (ret < 0)
|
|
return TC_ACT_OK;
|
|
|
|
xfrm_reqid = x.reqid;
|
|
xfrm_spi = bpf_ntohl(x.spi);
|
|
xfrm_remote_ip = bpf_ntohl(x.remote_ipv4);
|
|
|
|
return TC_ACT_OK;
|
|
}
|
|
|
|
volatile int xfrm_replay_window = 0;
|
|
|
|
SEC("xdp")
|
|
int xfrm_get_state_xdp(struct xdp_md *xdp)
|
|
{
|
|
struct bpf_xfrm_state_opts opts = {};
|
|
struct xfrm_state *x = NULL;
|
|
struct ip_esp_hdr *esph;
|
|
struct bpf_dynptr ptr;
|
|
u8 esph_buf[8] = {};
|
|
u8 iph_buf[20] = {};
|
|
struct iphdr *iph;
|
|
u32 off;
|
|
|
|
if (bpf_dynptr_from_xdp(xdp, 0, &ptr))
|
|
goto out;
|
|
|
|
off = sizeof(struct ethhdr);
|
|
iph = bpf_dynptr_slice(&ptr, off, iph_buf, sizeof(iph_buf));
|
|
if (!iph || iph->protocol != IPPROTO_ESP)
|
|
goto out;
|
|
|
|
off += sizeof(struct iphdr);
|
|
esph = bpf_dynptr_slice(&ptr, off, esph_buf, sizeof(esph_buf));
|
|
if (!esph)
|
|
goto out;
|
|
|
|
opts.netns_id = BPF_F_CURRENT_NETNS;
|
|
opts.daddr.a4 = iph->daddr;
|
|
opts.spi = esph->spi;
|
|
opts.proto = IPPROTO_ESP;
|
|
opts.family = AF_INET;
|
|
|
|
x = bpf_xdp_get_xfrm_state(xdp, &opts, sizeof(opts));
|
|
if (!x)
|
|
goto out;
|
|
|
|
if (!x->replay_esn)
|
|
goto out;
|
|
|
|
xfrm_replay_window = x->replay_esn->replay_window;
|
|
out:
|
|
if (x)
|
|
bpf_xdp_xfrm_state_release(x);
|
|
return XDP_PASS;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|