| // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) |
| |
| /* |
| * AF_XDP user-space access library. |
| * |
| * Copyright(c) 2018 - 2019 Intel Corporation. |
| * |
| * Author(s): Magnus Karlsson <magnus.karlsson@intel.com> |
| */ |
| |
| #include <errno.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <unistd.h> |
| #include <arpa/inet.h> |
| #include <asm/barrier.h> |
| #include <linux/compiler.h> |
| #include <linux/ethtool.h> |
| #include <linux/filter.h> |
| #include <linux/if_ether.h> |
| #include <linux/if_packet.h> |
| #include <linux/if_xdp.h> |
| #include <linux/kernel.h> |
| #include <linux/list.h> |
| #include <linux/sockios.h> |
| #include <net/if.h> |
| #include <sys/ioctl.h> |
| #include <sys/mman.h> |
| #include <sys/socket.h> |
| #include <sys/types.h> |
| #include <linux/if_link.h> |
| |
| #include "bpf.h" |
| #include "libbpf.h" |
| #include "libbpf_internal.h" |
| #include "xsk.h" |
| |
| #ifndef SOL_XDP |
| #define SOL_XDP 283 |
| #endif |
| |
| #ifndef AF_XDP |
| #define AF_XDP 44 |
| #endif |
| |
| #ifndef PF_XDP |
| #define PF_XDP AF_XDP |
| #endif |
| |
| enum xsk_prog { |
| XSK_PROG_FALLBACK, |
| XSK_PROG_REDIRECT_FLAGS, |
| }; |
| |
| struct xsk_umem { |
| struct xsk_ring_prod *fill_save; |
| struct xsk_ring_cons *comp_save; |
| char *umem_area; |
| struct xsk_umem_config config; |
| int fd; |
| int refcount; |
| struct list_head ctx_list; |
| bool rx_ring_setup_done; |
| bool tx_ring_setup_done; |
| }; |
| |
| struct xsk_ctx { |
| struct xsk_ring_prod *fill; |
| struct xsk_ring_cons *comp; |
| __u32 queue_id; |
| struct xsk_umem *umem; |
| int refcount; |
| int ifindex; |
| struct list_head list; |
| int prog_fd; |
| int link_fd; |
| int xsks_map_fd; |
| char ifname[IFNAMSIZ]; |
| bool has_bpf_link; |
| }; |
| |
| struct xsk_socket { |
| struct xsk_ring_cons *rx; |
| struct xsk_ring_prod *tx; |
| __u64 outstanding_tx; |
| struct xsk_ctx *ctx; |
| struct xsk_socket_config config; |
| int fd; |
| }; |
| |
| struct xsk_nl_info { |
| bool xdp_prog_attached; |
| int ifindex; |
| int fd; |
| }; |
| |
| /* Up until and including Linux 5.3 */ |
| struct xdp_ring_offset_v1 { |
| __u64 producer; |
| __u64 consumer; |
| __u64 desc; |
| }; |
| |
| /* Up until and including Linux 5.3 */ |
| struct xdp_mmap_offsets_v1 { |
| struct xdp_ring_offset_v1 rx; |
| struct xdp_ring_offset_v1 tx; |
| struct xdp_ring_offset_v1 fr; |
| struct xdp_ring_offset_v1 cr; |
| }; |
| |
| int xsk_umem__fd(const struct xsk_umem *umem) |
| { |
| return umem ? umem->fd : -EINVAL; |
| } |
| |
| int xsk_socket__fd(const struct xsk_socket *xsk) |
| { |
| return xsk ? xsk->fd : -EINVAL; |
| } |
| |
| static bool xsk_page_aligned(void *buffer) |
| { |
| unsigned long addr = (unsigned long)buffer; |
| |
| return !(addr & (getpagesize() - 1)); |
| } |
| |
| static void xsk_set_umem_config(struct xsk_umem_config *cfg, |
| const struct xsk_umem_config *usr_cfg) |
| { |
| if (!usr_cfg) { |
| cfg->fill_size = XSK_RING_PROD__DEFAULT_NUM_DESCS; |
| cfg->comp_size = XSK_RING_CONS__DEFAULT_NUM_DESCS; |
| cfg->frame_size = XSK_UMEM__DEFAULT_FRAME_SIZE; |
| cfg->frame_headroom = XSK_UMEM__DEFAULT_FRAME_HEADROOM; |
| cfg->flags = XSK_UMEM__DEFAULT_FLAGS; |
| return; |
| } |
| |
| cfg->fill_size = usr_cfg->fill_size; |
| cfg->comp_size = usr_cfg->comp_size; |
| cfg->frame_size = usr_cfg->frame_size; |
| cfg->frame_headroom = usr_cfg->frame_headroom; |
| cfg->flags = usr_cfg->flags; |
| } |
| |
| static int xsk_set_xdp_socket_config(struct xsk_socket_config *cfg, |
| const struct xsk_socket_config *usr_cfg) |
| { |
| if (!usr_cfg) { |
| cfg->rx_size = XSK_RING_CONS__DEFAULT_NUM_DESCS; |
| cfg->tx_size = XSK_RING_PROD__DEFAULT_NUM_DESCS; |
| cfg->libbpf_flags = 0; |
| cfg->xdp_flags = 0; |
| cfg->bind_flags = 0; |
| return 0; |
| } |
| |
| if (usr_cfg->libbpf_flags & ~XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD) |
| return -EINVAL; |
| |
| cfg->rx_size = usr_cfg->rx_size; |
| cfg->tx_size = usr_cfg->tx_size; |
| cfg->libbpf_flags = usr_cfg->libbpf_flags; |
| cfg->xdp_flags = usr_cfg->xdp_flags; |
| cfg->bind_flags = usr_cfg->bind_flags; |
| |
| return 0; |
| } |
| |
| static void xsk_mmap_offsets_v1(struct xdp_mmap_offsets *off) |
| { |
| struct xdp_mmap_offsets_v1 off_v1; |
| |
| /* getsockopt on a kernel <= 5.3 has no flags fields. |
| * Copy over the offsets to the correct places in the >=5.4 format |
| * and put the flags where they would have been on that kernel. |
| */ |
| memcpy(&off_v1, off, sizeof(off_v1)); |
| |
| off->rx.producer = off_v1.rx.producer; |
| off->rx.consumer = off_v1.rx.consumer; |
| off->rx.desc = off_v1.rx.desc; |
| off->rx.flags = off_v1.rx.consumer + sizeof(__u32); |
| |
| off->tx.producer = off_v1.tx.producer; |
| off->tx.consumer = off_v1.tx.consumer; |
| off->tx.desc = off_v1.tx.desc; |
| off->tx.flags = off_v1.tx.consumer + sizeof(__u32); |
| |
| off->fr.producer = off_v1.fr.producer; |
| off->fr.consumer = off_v1.fr.consumer; |
| off->fr.desc = off_v1.fr.desc; |
| off->fr.flags = off_v1.fr.consumer + sizeof(__u32); |
| |
| off->cr.producer = off_v1.cr.producer; |
| off->cr.consumer = off_v1.cr.consumer; |
| off->cr.desc = off_v1.cr.desc; |
| off->cr.flags = off_v1.cr.consumer + sizeof(__u32); |
| } |
| |
| static int xsk_get_mmap_offsets(int fd, struct xdp_mmap_offsets *off) |
| { |
| socklen_t optlen; |
| int err; |
| |
| optlen = sizeof(*off); |
| err = getsockopt(fd, SOL_XDP, XDP_MMAP_OFFSETS, off, &optlen); |
| if (err) |
| return err; |
| |
| if (optlen == sizeof(*off)) |
| return 0; |
| |
| if (optlen == sizeof(struct xdp_mmap_offsets_v1)) { |
| xsk_mmap_offsets_v1(off); |
| return 0; |
| } |
| |
| return -EINVAL; |
| } |
| |
| static int xsk_create_umem_rings(struct xsk_umem *umem, int fd, |
| struct xsk_ring_prod *fill, |
| struct xsk_ring_cons *comp) |
| { |
| struct xdp_mmap_offsets off; |
| void *map; |
| int err; |
| |
| err = setsockopt(fd, SOL_XDP, XDP_UMEM_FILL_RING, |
| &umem->config.fill_size, |
| sizeof(umem->config.fill_size)); |
| if (err) |
| return -errno; |
| |
| err = setsockopt(fd, SOL_XDP, XDP_UMEM_COMPLETION_RING, |
| &umem->config.comp_size, |
| sizeof(umem->config.comp_size)); |
| if (err) |
| return -errno; |
| |
| err = xsk_get_mmap_offsets(fd, &off); |
| if (err) |
| return -errno; |
| |
| map = mmap(NULL, off.fr.desc + umem->config.fill_size * sizeof(__u64), |
| PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, fd, |
| XDP_UMEM_PGOFF_FILL_RING); |
| if (map == MAP_FAILED) |
| return -errno; |
| |
| fill->mask = umem->config.fill_size - 1; |
| fill->size = umem->config.fill_size; |
| fill->producer = map + off.fr.producer; |
| fill->consumer = map + off.fr.consumer; |
| fill->flags = map + off.fr.flags; |
| fill->ring = map + off.fr.desc; |
| fill->cached_cons = umem->config.fill_size; |
| |
| map = mmap(NULL, off.cr.desc + umem->config.comp_size * sizeof(__u64), |
| PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, fd, |
| XDP_UMEM_PGOFF_COMPLETION_RING); |
| if (map == MAP_FAILED) { |
| err = -errno; |
| goto out_mmap; |
| } |
| |
| comp->mask = umem->config.comp_size - 1; |
| comp->size = umem->config.comp_size; |
| comp->producer = map + off.cr.producer; |
| comp->consumer = map + off.cr.consumer; |
| comp->flags = map + off.cr.flags; |
| comp->ring = map + off.cr.desc; |
| |
| return 0; |
| |
| out_mmap: |
| munmap(map, off.fr.desc + umem->config.fill_size * sizeof(__u64)); |
| return err; |
| } |
| |
| DEFAULT_VERSION(xsk_umem__create_v0_0_4, xsk_umem__create, LIBBPF_0.0.4) |
| int xsk_umem__create_v0_0_4(struct xsk_umem **umem_ptr, void *umem_area, |
| __u64 size, struct xsk_ring_prod *fill, |
| struct xsk_ring_cons *comp, |
| const struct xsk_umem_config *usr_config) |
| { |
| struct xdp_umem_reg mr; |
| struct xsk_umem *umem; |
| int err; |
| |
| if (!umem_area || !umem_ptr || !fill || !comp) |
| return -EFAULT; |
| if (!size && !xsk_page_aligned(umem_area)) |
| return -EINVAL; |
| |
| umem = calloc(1, sizeof(*umem)); |
| if (!umem) |
| return -ENOMEM; |
| |
| umem->fd = socket(AF_XDP, SOCK_RAW | SOCK_CLOEXEC, 0); |
| if (umem->fd < 0) { |
| err = -errno; |
| goto out_umem_alloc; |
| } |
| |
| umem->umem_area = umem_area; |
| INIT_LIST_HEAD(&umem->ctx_list); |
| xsk_set_umem_config(&umem->config, usr_config); |
| |
| memset(&mr, 0, sizeof(mr)); |
| mr.addr = (uintptr_t)umem_area; |
| mr.len = size; |
| mr.chunk_size = umem->config.frame_size; |
| mr.headroom = umem->config.frame_headroom; |
| mr.flags = umem->config.flags; |
| |
| err = setsockopt(umem->fd, SOL_XDP, XDP_UMEM_REG, &mr, sizeof(mr)); |
| if (err) { |
| err = -errno; |
| goto out_socket; |
| } |
| |
| err = xsk_create_umem_rings(umem, umem->fd, fill, comp); |
| if (err) |
| goto out_socket; |
| |
| umem->fill_save = fill; |
| umem->comp_save = comp; |
| *umem_ptr = umem; |
| return 0; |
| |
| out_socket: |
| close(umem->fd); |
| out_umem_alloc: |
| free(umem); |
| return err; |
| } |
| |
| struct xsk_umem_config_v1 { |
| __u32 fill_size; |
| __u32 comp_size; |
| __u32 frame_size; |
| __u32 frame_headroom; |
| }; |
| |
| COMPAT_VERSION(xsk_umem__create_v0_0_2, xsk_umem__create, LIBBPF_0.0.2) |
| int xsk_umem__create_v0_0_2(struct xsk_umem **umem_ptr, void *umem_area, |
| __u64 size, struct xsk_ring_prod *fill, |
| struct xsk_ring_cons *comp, |
| const struct xsk_umem_config *usr_config) |
| { |
| struct xsk_umem_config config; |
| |
| memcpy(&config, usr_config, sizeof(struct xsk_umem_config_v1)); |
| config.flags = 0; |
| |
| return xsk_umem__create_v0_0_4(umem_ptr, umem_area, size, fill, comp, |
| &config); |
| } |
| |
| static enum xsk_prog get_xsk_prog(void) |
| { |
| enum xsk_prog detected = XSK_PROG_FALLBACK; |
| struct bpf_load_program_attr prog_attr; |
| struct bpf_create_map_attr map_attr; |
| __u32 size_out, retval, duration; |
| char data_in = 0, data_out; |
| struct bpf_insn insns[] = { |
| BPF_LD_MAP_FD(BPF_REG_1, 0), |
| BPF_MOV64_IMM(BPF_REG_2, 0), |
| BPF_MOV64_IMM(BPF_REG_3, XDP_PASS), |
| BPF_EMIT_CALL(BPF_FUNC_redirect_map), |
| BPF_EXIT_INSN(), |
| }; |
| int prog_fd, map_fd, ret; |
| |
| memset(&map_attr, 0, sizeof(map_attr)); |
| map_attr.map_type = BPF_MAP_TYPE_XSKMAP; |
| map_attr.key_size = sizeof(int); |
| map_attr.value_size = sizeof(int); |
| map_attr.max_entries = 1; |
| |
| map_fd = bpf_create_map_xattr(&map_attr); |
| if (map_fd < 0) |
| return detected; |
| |
| insns[0].imm = map_fd; |
| |
| memset(&prog_attr, 0, sizeof(prog_attr)); |
| prog_attr.prog_type = BPF_PROG_TYPE_XDP; |
| prog_attr.insns = insns; |
| prog_attr.insns_cnt = ARRAY_SIZE(insns); |
| prog_attr.license = "GPL"; |
| |
| prog_fd = bpf_load_program_xattr(&prog_attr, NULL, 0); |
| if (prog_fd < 0) { |
| close(map_fd); |
| return detected; |
| } |
| |
| ret = bpf_prog_test_run(prog_fd, 0, &data_in, 1, &data_out, &size_out, &retval, &duration); |
| if (!ret && retval == XDP_PASS) |
| detected = XSK_PROG_REDIRECT_FLAGS; |
| close(prog_fd); |
| close(map_fd); |
| return detected; |
| } |
| |
| static int xsk_load_xdp_prog(struct xsk_socket *xsk) |
| { |
| static const int log_buf_size = 16 * 1024; |
| struct xsk_ctx *ctx = xsk->ctx; |
| char log_buf[log_buf_size]; |
| int prog_fd; |
| |
| /* This is the fallback C-program: |
| * SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) |
| * { |
| * int ret, index = ctx->rx_queue_index; |
| * |
| * // A set entry here means that the correspnding queue_id |
| * // has an active AF_XDP socket bound to it. |
| * ret = bpf_redirect_map(&xsks_map, index, XDP_PASS); |
| * if (ret > 0) |
| * return ret; |
| * |
| * // Fallback for pre-5.3 kernels, not supporting default |
| * // action in the flags parameter. |
| * if (bpf_map_lookup_elem(&xsks_map, &index)) |
| * return bpf_redirect_map(&xsks_map, index, 0); |
| * return XDP_PASS; |
| * } |
| */ |
| struct bpf_insn prog[] = { |
| /* r2 = *(u32 *)(r1 + 16) */ |
| BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 16), |
| /* *(u32 *)(r10 - 4) = r2 */ |
| BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_2, -4), |
| /* r1 = xskmap[] */ |
| BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), |
| /* r3 = XDP_PASS */ |
| BPF_MOV64_IMM(BPF_REG_3, 2), |
| /* call bpf_redirect_map */ |
| BPF_EMIT_CALL(BPF_FUNC_redirect_map), |
| /* if w0 != 0 goto pc+13 */ |
| BPF_JMP32_IMM(BPF_JSGT, BPF_REG_0, 0, 13), |
| /* r2 = r10 */ |
| BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), |
| /* r2 += -4 */ |
| BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4), |
| /* r1 = xskmap[] */ |
| BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), |
| /* call bpf_map_lookup_elem */ |
| BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem), |
| /* r1 = r0 */ |
| BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), |
| /* r0 = XDP_PASS */ |
| BPF_MOV64_IMM(BPF_REG_0, 2), |
| /* if r1 == 0 goto pc+5 */ |
| BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 5), |
| /* r2 = *(u32 *)(r10 - 4) */ |
| BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_10, -4), |
| /* r1 = xskmap[] */ |
| BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), |
| /* r3 = 0 */ |
| BPF_MOV64_IMM(BPF_REG_3, 0), |
| /* call bpf_redirect_map */ |
| BPF_EMIT_CALL(BPF_FUNC_redirect_map), |
| /* The jumps are to this instruction */ |
| BPF_EXIT_INSN(), |
| }; |
| |
| /* This is the post-5.3 kernel C-program: |
| * SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) |
| * { |
| * return bpf_redirect_map(&xsks_map, ctx->rx_queue_index, XDP_PASS); |
| * } |
| */ |
| struct bpf_insn prog_redirect_flags[] = { |
| /* r2 = *(u32 *)(r1 + 16) */ |
| BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 16), |
| /* r1 = xskmap[] */ |
| BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), |
| /* r3 = XDP_PASS */ |
| BPF_MOV64_IMM(BPF_REG_3, 2), |
| /* call bpf_redirect_map */ |
| BPF_EMIT_CALL(BPF_FUNC_redirect_map), |
| BPF_EXIT_INSN(), |
| }; |
| size_t insns_cnt[] = {sizeof(prog) / sizeof(struct bpf_insn), |
| sizeof(prog_redirect_flags) / sizeof(struct bpf_insn), |
| }; |
| struct bpf_insn *progs[] = {prog, prog_redirect_flags}; |
| enum xsk_prog option = get_xsk_prog(); |
| |
| prog_fd = bpf_load_program(BPF_PROG_TYPE_XDP, progs[option], insns_cnt[option], |
| "LGPL-2.1 or BSD-2-Clause", 0, log_buf, |
| log_buf_size); |
| if (prog_fd < 0) { |
| pr_warn("BPF log buffer:\n%s", log_buf); |
| return prog_fd; |
| } |
| |
| ctx->prog_fd = prog_fd; |
| return 0; |
| } |
| |
| static int xsk_create_bpf_link(struct xsk_socket *xsk) |
| { |
| DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts); |
| struct xsk_ctx *ctx = xsk->ctx; |
| __u32 prog_id = 0; |
| int link_fd; |
| int err; |
| |
| err = bpf_get_link_xdp_id(ctx->ifindex, &prog_id, xsk->config.xdp_flags); |
| if (err) { |
| pr_warn("getting XDP prog id failed\n"); |
| return err; |
| } |
| |
| /* if there's a netlink-based XDP prog loaded on interface, bail out |
| * and ask user to do the removal by himself |
| */ |
| if (prog_id) { |
| pr_warn("Netlink-based XDP prog detected, please unload it in order to launch AF_XDP prog\n"); |
| return -EINVAL; |
| } |
| |
| opts.flags = xsk->config.xdp_flags & ~(XDP_FLAGS_UPDATE_IF_NOEXIST | XDP_FLAGS_REPLACE); |
| |
| link_fd = bpf_link_create(ctx->prog_fd, ctx->ifindex, BPF_XDP, &opts); |
| if (link_fd < 0) { |
| pr_warn("bpf_link_create failed: %s\n", strerror(errno)); |
| return link_fd; |
| } |
| |
| ctx->link_fd = link_fd; |
| return 0; |
| } |
| |
| static int xsk_get_max_queues(struct xsk_socket *xsk) |
| { |
| struct ethtool_channels channels = { .cmd = ETHTOOL_GCHANNELS }; |
| struct xsk_ctx *ctx = xsk->ctx; |
| struct ifreq ifr = {}; |
| int fd, err, ret; |
| |
| fd = socket(AF_LOCAL, SOCK_DGRAM | SOCK_CLOEXEC, 0); |
| if (fd < 0) |
| return -errno; |
| |
| ifr.ifr_data = (void *)&channels; |
| memcpy(ifr.ifr_name, ctx->ifname, IFNAMSIZ - 1); |
| ifr.ifr_name[IFNAMSIZ - 1] = '\0'; |
| err = ioctl(fd, SIOCETHTOOL, &ifr); |
| if (err && errno != EOPNOTSUPP) { |
| ret = -errno; |
| goto out; |
| } |
| |
| if (err) { |
| /* If the device says it has no channels, then all traffic |
| * is sent to a single stream, so max queues = 1. |
| */ |
| ret = 1; |
| } else { |
| /* Take the max of rx, tx, combined. Drivers return |
| * the number of channels in different ways. |
| */ |
| ret = max(channels.max_rx, channels.max_tx); |
| ret = max(ret, (int)channels.max_combined); |
| } |
| |
| out: |
| close(fd); |
| return ret; |
| } |
| |
| static int xsk_create_bpf_maps(struct xsk_socket *xsk) |
| { |
| struct xsk_ctx *ctx = xsk->ctx; |
| int max_queues; |
| int fd; |
| |
| max_queues = xsk_get_max_queues(xsk); |
| if (max_queues < 0) |
| return max_queues; |
| |
| fd = bpf_create_map_name(BPF_MAP_TYPE_XSKMAP, "xsks_map", |
| sizeof(int), sizeof(int), max_queues, 0); |
| if (fd < 0) |
| return fd; |
| |
| ctx->xsks_map_fd = fd; |
| |
| return 0; |
| } |
| |
| static void xsk_delete_bpf_maps(struct xsk_socket *xsk) |
| { |
| struct xsk_ctx *ctx = xsk->ctx; |
| |
| bpf_map_delete_elem(ctx->xsks_map_fd, &ctx->queue_id); |
| close(ctx->xsks_map_fd); |
| } |
| |
| static int xsk_lookup_bpf_maps(struct xsk_socket *xsk) |
| { |
| __u32 i, *map_ids, num_maps, prog_len = sizeof(struct bpf_prog_info); |
| __u32 map_len = sizeof(struct bpf_map_info); |
| struct bpf_prog_info prog_info = {}; |
| struct xsk_ctx *ctx = xsk->ctx; |
| struct bpf_map_info map_info; |
| int fd, err; |
| |
| err = bpf_obj_get_info_by_fd(ctx->prog_fd, &prog_info, &prog_len); |
| if (err) |
| return err; |
| |
| num_maps = prog_info.nr_map_ids; |
| |
| map_ids = calloc(prog_info.nr_map_ids, sizeof(*map_ids)); |
| if (!map_ids) |
| return -ENOMEM; |
| |
| memset(&prog_info, 0, prog_len); |
| prog_info.nr_map_ids = num_maps; |
| prog_info.map_ids = (__u64)(unsigned long)map_ids; |
| |
| err = bpf_obj_get_info_by_fd(ctx->prog_fd, &prog_info, &prog_len); |
| if (err) |
| goto out_map_ids; |
| |
| ctx->xsks_map_fd = -1; |
| |
| for (i = 0; i < prog_info.nr_map_ids; i++) { |
| fd = bpf_map_get_fd_by_id(map_ids[i]); |
| if (fd < 0) |
| continue; |
| |
| memset(&map_info, 0, map_len); |
| err = bpf_obj_get_info_by_fd(fd, &map_info, &map_len); |
| if (err) { |
| close(fd); |
| continue; |
| } |
| |
| if (!strncmp(map_info.name, "xsks_map", sizeof(map_info.name))) { |
| ctx->xsks_map_fd = fd; |
| break; |
| } |
| |
| close(fd); |
| } |
| |
| if (ctx->xsks_map_fd == -1) |
| err = -ENOENT; |
| |
| out_map_ids: |
| free(map_ids); |
| return err; |
| } |
| |
| static int xsk_set_bpf_maps(struct xsk_socket *xsk) |
| { |
| struct xsk_ctx *ctx = xsk->ctx; |
| |
| return bpf_map_update_elem(ctx->xsks_map_fd, &ctx->queue_id, |
| &xsk->fd, 0); |
| } |
| |
| static int xsk_link_lookup(int ifindex, __u32 *prog_id, int *link_fd) |
| { |
| struct bpf_link_info link_info; |
| __u32 link_len; |
| __u32 id = 0; |
| int err; |
| int fd; |
| |
| while (true) { |
| err = bpf_link_get_next_id(id, &id); |
| if (err) { |
| if (errno == ENOENT) { |
| err = 0; |
| break; |
| } |
| pr_warn("can't get next link: %s\n", strerror(errno)); |
| break; |
| } |
| |
| fd = bpf_link_get_fd_by_id(id); |
| if (fd < 0) { |
| if (errno == ENOENT) |
| continue; |
| pr_warn("can't get link by id (%u): %s\n", id, strerror(errno)); |
| err = -errno; |
| break; |
| } |
| |
| link_len = sizeof(struct bpf_link_info); |
| memset(&link_info, 0, link_len); |
| err = bpf_obj_get_info_by_fd(fd, &link_info, &link_len); |
| if (err) { |
| pr_warn("can't get link info: %s\n", strerror(errno)); |
| close(fd); |
| break; |
| } |
| if (link_info.type == BPF_LINK_TYPE_XDP) { |
| if (link_info.xdp.ifindex == ifindex) { |
| *link_fd = fd; |
| if (prog_id) |
| *prog_id = link_info.prog_id; |
| break; |
| } |
| } |
| close(fd); |
| } |
| |
| return err; |
| } |
| |
| static bool xsk_probe_bpf_link(void) |
| { |
| DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts, |
| .flags = XDP_FLAGS_SKB_MODE); |
| struct bpf_load_program_attr prog_attr; |
| struct bpf_insn insns[2] = { |
| BPF_MOV64_IMM(BPF_REG_0, XDP_PASS), |
| BPF_EXIT_INSN() |
| }; |
| int prog_fd, link_fd = -1; |
| int ifindex_lo = 1; |
| bool ret = false; |
| int err; |
| |
| err = xsk_link_lookup(ifindex_lo, NULL, &link_fd); |
| if (err) |
| return ret; |
| |
| if (link_fd >= 0) |
| return true; |
| |
| memset(&prog_attr, 0, sizeof(prog_attr)); |
| prog_attr.prog_type = BPF_PROG_TYPE_XDP; |
| prog_attr.insns = insns; |
| prog_attr.insns_cnt = ARRAY_SIZE(insns); |
| prog_attr.license = "GPL"; |
| |
| prog_fd = bpf_load_program_xattr(&prog_attr, NULL, 0); |
| if (prog_fd < 0) |
| return ret; |
| |
| link_fd = bpf_link_create(prog_fd, ifindex_lo, BPF_XDP, &opts); |
| close(prog_fd); |
| |
| if (link_fd >= 0) { |
| ret = true; |
| close(link_fd); |
| } |
| |
| return ret; |
| } |
| |
| static int xsk_create_xsk_struct(int ifindex, struct xsk_socket *xsk) |
| { |
| char ifname[IFNAMSIZ]; |
| struct xsk_ctx *ctx; |
| char *interface; |
| |
| ctx = calloc(1, sizeof(*ctx)); |
| if (!ctx) |
| return -ENOMEM; |
| |
| interface = if_indextoname(ifindex, &ifname[0]); |
| if (!interface) { |
| free(ctx); |
| return -errno; |
| } |
| |
| ctx->ifindex = ifindex; |
| memcpy(ctx->ifname, ifname, IFNAMSIZ -1); |
| ctx->ifname[IFNAMSIZ - 1] = 0; |
| |
| xsk->ctx = ctx; |
| xsk->ctx->has_bpf_link = xsk_probe_bpf_link(); |
| |
| return 0; |
| } |
| |
| static int xsk_init_xdp_res(struct xsk_socket *xsk, |
| int *xsks_map_fd) |
| { |
| struct xsk_ctx *ctx = xsk->ctx; |
| int err; |
| |
| err = xsk_create_bpf_maps(xsk); |
| if (err) |
| return err; |
| |
| err = xsk_load_xdp_prog(xsk); |
| if (err) |
| goto err_load_xdp_prog; |
| |
| if (ctx->has_bpf_link) |
| err = xsk_create_bpf_link(xsk); |
| else |
| err = bpf_set_link_xdp_fd(xsk->ctx->ifindex, ctx->prog_fd, |
| xsk->config.xdp_flags); |
| |
| if (err) |
| goto err_attach_xdp_prog; |
| |
| if (!xsk->rx) |
| return err; |
| |
| err = xsk_set_bpf_maps(xsk); |
| if (err) |
| goto err_set_bpf_maps; |
| |
| return err; |
| |
| err_set_bpf_maps: |
| if (ctx->has_bpf_link) |
| close(ctx->link_fd); |
| else |
| bpf_set_link_xdp_fd(ctx->ifindex, -1, 0); |
| err_attach_xdp_prog: |
| close(ctx->prog_fd); |
| err_load_xdp_prog: |
| xsk_delete_bpf_maps(xsk); |
| return err; |
| } |
| |
| static int xsk_lookup_xdp_res(struct xsk_socket *xsk, int *xsks_map_fd, int prog_id) |
| { |
| struct xsk_ctx *ctx = xsk->ctx; |
| int err; |
| |
| ctx->prog_fd = bpf_prog_get_fd_by_id(prog_id); |
| if (ctx->prog_fd < 0) { |
| err = -errno; |
| goto err_prog_fd; |
| } |
| err = xsk_lookup_bpf_maps(xsk); |
| if (err) |
| goto err_lookup_maps; |
| |
| if (!xsk->rx) |
| return err; |
| |
| err = xsk_set_bpf_maps(xsk); |
| if (err) |
| goto err_set_maps; |
| |
| return err; |
| |
| err_set_maps: |
| close(ctx->xsks_map_fd); |
| err_lookup_maps: |
| close(ctx->prog_fd); |
| err_prog_fd: |
| if (ctx->has_bpf_link) |
| close(ctx->link_fd); |
| return err; |
| } |
| |
| static int __xsk_setup_xdp_prog(struct xsk_socket *_xdp, int *xsks_map_fd) |
| { |
| struct xsk_socket *xsk = _xdp; |
| struct xsk_ctx *ctx = xsk->ctx; |
| __u32 prog_id = 0; |
| int err; |
| |
| if (ctx->has_bpf_link) |
| err = xsk_link_lookup(ctx->ifindex, &prog_id, &ctx->link_fd); |
| else |
| err = bpf_get_link_xdp_id(ctx->ifindex, &prog_id, xsk->config.xdp_flags); |
| |
| if (err) |
| return err; |
| |
| err = !prog_id ? xsk_init_xdp_res(xsk, xsks_map_fd) : |
| xsk_lookup_xdp_res(xsk, xsks_map_fd, prog_id); |
| |
| if (!err && xsks_map_fd) |
| *xsks_map_fd = ctx->xsks_map_fd; |
| |
| return err; |
| } |
| |
| static struct xsk_ctx *xsk_get_ctx(struct xsk_umem *umem, int ifindex, |
| __u32 queue_id) |
| { |
| struct xsk_ctx *ctx; |
| |
| if (list_empty(&umem->ctx_list)) |
| return NULL; |
| |
| list_for_each_entry(ctx, &umem->ctx_list, list) { |
| if (ctx->ifindex == ifindex && ctx->queue_id == queue_id) { |
| ctx->refcount++; |
| return ctx; |
| } |
| } |
| |
| return NULL; |
| } |
| |
| static void xsk_put_ctx(struct xsk_ctx *ctx, bool unmap) |
| { |
| struct xsk_umem *umem = ctx->umem; |
| struct xdp_mmap_offsets off; |
| int err; |
| |
| if (--ctx->refcount) |
| return; |
| |
| if (!unmap) |
| goto out_free; |
| |
| err = xsk_get_mmap_offsets(umem->fd, &off); |
| if (err) |
| goto out_free; |
| |
| munmap(ctx->fill->ring - off.fr.desc, off.fr.desc + umem->config.fill_size * |
| sizeof(__u64)); |
| munmap(ctx->comp->ring - off.cr.desc, off.cr.desc + umem->config.comp_size * |
| sizeof(__u64)); |
| |
| out_free: |
| list_del(&ctx->list); |
| free(ctx); |
| } |
| |
| static struct xsk_ctx *xsk_create_ctx(struct xsk_socket *xsk, |
| struct xsk_umem *umem, int ifindex, |
| const char *ifname, __u32 queue_id, |
| struct xsk_ring_prod *fill, |
| struct xsk_ring_cons *comp) |
| { |
| struct xsk_ctx *ctx; |
| int err; |
| |
| ctx = calloc(1, sizeof(*ctx)); |
| if (!ctx) |
| return NULL; |
| |
| if (!umem->fill_save) { |
| err = xsk_create_umem_rings(umem, xsk->fd, fill, comp); |
| if (err) { |
| free(ctx); |
| return NULL; |
| } |
| } else if (umem->fill_save != fill || umem->comp_save != comp) { |
| /* Copy over rings to new structs. */ |
| memcpy(fill, umem->fill_save, sizeof(*fill)); |
| memcpy(comp, umem->comp_save, sizeof(*comp)); |
| } |
| |
| ctx->ifindex = ifindex; |
| ctx->refcount = 1; |
| ctx->umem = umem; |
| ctx->queue_id = queue_id; |
| memcpy(ctx->ifname, ifname, IFNAMSIZ - 1); |
| ctx->ifname[IFNAMSIZ - 1] = '\0'; |
| |
| ctx->fill = fill; |
| ctx->comp = comp; |
| list_add(&ctx->list, &umem->ctx_list); |
| return ctx; |
| } |
| |
| static void xsk_destroy_xsk_struct(struct xsk_socket *xsk) |
| { |
| free(xsk->ctx); |
| free(xsk); |
| } |
| |
| int xsk_socket__update_xskmap(struct xsk_socket *xsk, int fd) |
| { |
| xsk->ctx->xsks_map_fd = fd; |
| return xsk_set_bpf_maps(xsk); |
| } |
| |
| int xsk_setup_xdp_prog(int ifindex, int *xsks_map_fd) |
| { |
| struct xsk_socket *xsk; |
| int res; |
| |
| xsk = calloc(1, sizeof(*xsk)); |
| if (!xsk) |
| return -ENOMEM; |
| |
| res = xsk_create_xsk_struct(ifindex, xsk); |
| if (res) { |
| free(xsk); |
| return -EINVAL; |
| } |
| |
| res = __xsk_setup_xdp_prog(xsk, xsks_map_fd); |
| |
| xsk_destroy_xsk_struct(xsk); |
| |
| return res; |
| } |
| |
| int xsk_socket__create_shared(struct xsk_socket **xsk_ptr, |
| const char *ifname, |
| __u32 queue_id, struct xsk_umem *umem, |
| struct xsk_ring_cons *rx, |
| struct xsk_ring_prod *tx, |
| struct xsk_ring_prod *fill, |
| struct xsk_ring_cons *comp, |
| const struct xsk_socket_config *usr_config) |
| { |
| bool unmap, rx_setup_done = false, tx_setup_done = false; |
| void *rx_map = NULL, *tx_map = NULL; |
| struct sockaddr_xdp sxdp = {}; |
| struct xdp_mmap_offsets off; |
| struct xsk_socket *xsk; |
| struct xsk_ctx *ctx; |
| int err, ifindex; |
| |
| if (!umem || !xsk_ptr || !(rx || tx)) |
| return -EFAULT; |
| |
| unmap = umem->fill_save != fill; |
| |
| xsk = calloc(1, sizeof(*xsk)); |
| if (!xsk) |
| return -ENOMEM; |
| |
| err = xsk_set_xdp_socket_config(&xsk->config, usr_config); |
| if (err) |
| goto out_xsk_alloc; |
| |
| xsk->outstanding_tx = 0; |
| ifindex = if_nametoindex(ifname); |
| if (!ifindex) { |
| err = -errno; |
| goto out_xsk_alloc; |
| } |
| |
| if (umem->refcount++ > 0) { |
| xsk->fd = socket(AF_XDP, SOCK_RAW | SOCK_CLOEXEC, 0); |
| if (xsk->fd < 0) { |
| err = -errno; |
| goto out_xsk_alloc; |
| } |
| } else { |
| xsk->fd = umem->fd; |
| rx_setup_done = umem->rx_ring_setup_done; |
| tx_setup_done = umem->tx_ring_setup_done; |
| } |
| |
| ctx = xsk_get_ctx(umem, ifindex, queue_id); |
| if (!ctx) { |
| if (!fill || !comp) { |
| err = -EFAULT; |
| goto out_socket; |
| } |
| |
| ctx = xsk_create_ctx(xsk, umem, ifindex, ifname, queue_id, |
| fill, comp); |
| if (!ctx) { |
| err = -ENOMEM; |
| goto out_socket; |
| } |
| } |
| xsk->ctx = ctx; |
| xsk->ctx->has_bpf_link = xsk_probe_bpf_link(); |
| |
| if (rx && !rx_setup_done) { |
| err = setsockopt(xsk->fd, SOL_XDP, XDP_RX_RING, |
| &xsk->config.rx_size, |
| sizeof(xsk->config.rx_size)); |
| if (err) { |
| err = -errno; |
| goto out_put_ctx; |
| } |
| if (xsk->fd == umem->fd) |
| umem->rx_ring_setup_done = true; |
| } |
| if (tx && !tx_setup_done) { |
| err = setsockopt(xsk->fd, SOL_XDP, XDP_TX_RING, |
| &xsk->config.tx_size, |
| sizeof(xsk->config.tx_size)); |
| if (err) { |
| err = -errno; |
| goto out_put_ctx; |
| } |
| if (xsk->fd == umem->fd) |
| umem->tx_ring_setup_done = true; |
| } |
| |
| err = xsk_get_mmap_offsets(xsk->fd, &off); |
| if (err) { |
| err = -errno; |
| goto out_put_ctx; |
| } |
| |
| if (rx) { |
| rx_map = mmap(NULL, off.rx.desc + |
| xsk->config.rx_size * sizeof(struct xdp_desc), |
| PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, |
| xsk->fd, XDP_PGOFF_RX_RING); |
| if (rx_map == MAP_FAILED) { |
| err = -errno; |
| goto out_put_ctx; |
| } |
| |
| rx->mask = xsk->config.rx_size - 1; |
| rx->size = xsk->config.rx_size; |
| rx->producer = rx_map + off.rx.producer; |
| rx->consumer = rx_map + off.rx.consumer; |
| rx->flags = rx_map + off.rx.flags; |
| rx->ring = rx_map + off.rx.desc; |
| rx->cached_prod = *rx->producer; |
| rx->cached_cons = *rx->consumer; |
| } |
| xsk->rx = rx; |
| |
| if (tx) { |
| tx_map = mmap(NULL, off.tx.desc + |
| xsk->config.tx_size * sizeof(struct xdp_desc), |
| PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, |
| xsk->fd, XDP_PGOFF_TX_RING); |
| if (tx_map == MAP_FAILED) { |
| err = -errno; |
| goto out_mmap_rx; |
| } |
| |
| tx->mask = xsk->config.tx_size - 1; |
| tx->size = xsk->config.tx_size; |
| tx->producer = tx_map + off.tx.producer; |
| tx->consumer = tx_map + off.tx.consumer; |
| tx->flags = tx_map + off.tx.flags; |
| tx->ring = tx_map + off.tx.desc; |
| tx->cached_prod = *tx->producer; |
| /* cached_cons is r->size bigger than the real consumer pointer |
| * See xsk_prod_nb_free |
| */ |
| tx->cached_cons = *tx->consumer + xsk->config.tx_size; |
| } |
| xsk->tx = tx; |
| |
| sxdp.sxdp_family = PF_XDP; |
| sxdp.sxdp_ifindex = ctx->ifindex; |
| sxdp.sxdp_queue_id = ctx->queue_id; |
| if (umem->refcount > 1) { |
| sxdp.sxdp_flags |= XDP_SHARED_UMEM; |
| sxdp.sxdp_shared_umem_fd = umem->fd; |
| } else { |
| sxdp.sxdp_flags = xsk->config.bind_flags; |
| } |
| |
| err = bind(xsk->fd, (struct sockaddr *)&sxdp, sizeof(sxdp)); |
| if (err) { |
| err = -errno; |
| goto out_mmap_tx; |
| } |
| |
| ctx->prog_fd = -1; |
| |
| if (!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) { |
| err = __xsk_setup_xdp_prog(xsk, NULL); |
| if (err) |
| goto out_mmap_tx; |
| } |
| |
| *xsk_ptr = xsk; |
| umem->fill_save = NULL; |
| umem->comp_save = NULL; |
| return 0; |
| |
| out_mmap_tx: |
| if (tx) |
| munmap(tx_map, off.tx.desc + |
| xsk->config.tx_size * sizeof(struct xdp_desc)); |
| out_mmap_rx: |
| if (rx) |
| munmap(rx_map, off.rx.desc + |
| xsk->config.rx_size * sizeof(struct xdp_desc)); |
| out_put_ctx: |
| xsk_put_ctx(ctx, unmap); |
| out_socket: |
| if (--umem->refcount) |
| close(xsk->fd); |
| out_xsk_alloc: |
| free(xsk); |
| return err; |
| } |
| |
| int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname, |
| __u32 queue_id, struct xsk_umem *umem, |
| struct xsk_ring_cons *rx, struct xsk_ring_prod *tx, |
| const struct xsk_socket_config *usr_config) |
| { |
| if (!umem) |
| return -EFAULT; |
| |
| return xsk_socket__create_shared(xsk_ptr, ifname, queue_id, umem, |
| rx, tx, umem->fill_save, |
| umem->comp_save, usr_config); |
| } |
| |
| int xsk_umem__delete(struct xsk_umem *umem) |
| { |
| if (!umem) |
| return 0; |
| |
| if (umem->refcount) |
| return -EBUSY; |
| |
| close(umem->fd); |
| free(umem); |
| |
| return 0; |
| } |
| |
| void xsk_socket__delete(struct xsk_socket *xsk) |
| { |
| size_t desc_sz = sizeof(struct xdp_desc); |
| struct xdp_mmap_offsets off; |
| struct xsk_umem *umem; |
| struct xsk_ctx *ctx; |
| int err; |
| |
| if (!xsk) |
| return; |
| |
| ctx = xsk->ctx; |
| umem = ctx->umem; |
| if (ctx->prog_fd != -1) { |
| xsk_delete_bpf_maps(xsk); |
| close(ctx->prog_fd); |
| if (ctx->has_bpf_link) |
| close(ctx->link_fd); |
| } |
| |
| err = xsk_get_mmap_offsets(xsk->fd, &off); |
| if (!err) { |
| if (xsk->rx) { |
| munmap(xsk->rx->ring - off.rx.desc, |
| off.rx.desc + xsk->config.rx_size * desc_sz); |
| } |
| if (xsk->tx) { |
| munmap(xsk->tx->ring - off.tx.desc, |
| off.tx.desc + xsk->config.tx_size * desc_sz); |
| } |
| } |
| |
| xsk_put_ctx(ctx, true); |
| |
| umem->refcount--; |
| /* Do not close an fd that also has an associated umem connected |
| * to it. |
| */ |
| if (xsk->fd != umem->fd) |
| close(xsk->fd); |
| free(xsk); |
| } |