summaryrefslogtreecommitdiffstats
path: root/xdp-dump/xdpdump.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--xdp-dump/xdpdump.c1954
1 files changed, 1954 insertions, 0 deletions
diff --git a/xdp-dump/xdpdump.c b/xdp-dump/xdpdump.c
new file mode 100644
index 0000000..a37458e
--- /dev/null
+++ b/xdp-dump/xdpdump.c
@@ -0,0 +1,1954 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+
+/*****************************************************************************
+ * Include files
+ *****************************************************************************/
+#include <ctype.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <inttypes.h>
+#include <signal.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <time.h>
+#include <unistd.h>
+
+#include <bpf/bpf.h>
+#include <bpf/btf.h>
+#include <bpf/libbpf.h>
+
+#include <linux/err.h>
+#include <linux/ethtool.h>
+#include <linux/perf_event.h>
+#include <linux/sockios.h>
+
+#include <net/if.h>
+
+#define PCAP_DONT_INCLUDE_PCAP_BPF_H
+#include <pcap/dlt.h>
+#include <pcap/pcap.h>
+
+#include <sys/ioctl.h>
+#include <sys/resource.h>
+#include <sys/sysinfo.h>
+#include <sys/utsname.h>
+
+#include <xdp/prog_dispatcher.h>
+
+#include "logging.h"
+#include "params.h"
+#include "util.h"
+#include "xdpdump.h"
+#include "xpcapng.h"
+#include "compat.h"
+
+/*****************************************************************************
+ * Local definitions and global variables
+ *****************************************************************************/
+#define PROG_NAME "xdpdump"
+#define DEFAULT_SNAP_LEN 262144
+
+#ifndef ENOTSUPP
+#define ENOTSUPP 524 /* Operation is not supported */
+#endif
+
+#define RX_FLAG_FENTRY (1<<0)
+#define RX_FLAG_FEXIT (1<<1)
+
+struct flag_val rx_capture_flags[] = {
+ {"entry", RX_FLAG_FENTRY},
+ {"exit", RX_FLAG_FEXIT},
+ {}
+};
+
+struct enum_val xdp_modes[] = {
+ {"native", XDP_MODE_NATIVE},
+ {"skb", XDP_MODE_SKB},
+ {"hw", XDP_MODE_HW},
+ {"unspecified", XDP_MODE_UNSPEC},
+ {NULL, 0}
+};
+
+static const struct dumpopt {
+ bool hex_dump;
+ bool list_interfaces;
+ bool load_xdp;
+ bool promiscuous;
+ bool use_pcap;
+ struct iface iface;
+ uint32_t perf_wakeup;
+ uint32_t snaplen;
+ char *pcap_file;
+ char *program_names;
+ unsigned int load_xdp_mode;
+ unsigned int rx_capture;
+} defaults_dumpopt = {
+ .hex_dump = false,
+ .list_interfaces = false,
+ .load_xdp = false,
+ .promiscuous = false,
+ .use_pcap = false,
+ .snaplen = DEFAULT_SNAP_LEN,
+ .load_xdp_mode = XDP_MODE_NATIVE,
+ .rx_capture = RX_FLAG_FENTRY,
+};
+struct dumpopt cfg_dumpopt;
+
+static struct prog_option xdpdump_options[] = {
+ DEFINE_OPTION("rx-capture", OPT_FLAGS, struct dumpopt, rx_capture,
+ .metavar = "<mode>",
+ .typearg = rx_capture_flags,
+ .help = "Capture point for the rx direction"),
+ DEFINE_OPTION("list-interfaces", OPT_BOOL, struct dumpopt,
+ list_interfaces,
+ .short_opt = 'D',
+ .help = "Print the list of available interfaces"),
+ DEFINE_OPTION("load-xdp-mode", OPT_ENUM, struct dumpopt, load_xdp_mode,
+ .typearg = xdp_modes,
+ .metavar = "<mode>",
+ .help = "Mode used for --load-xdp-mode, default native"),
+ DEFINE_OPTION("load-xdp-program", OPT_BOOL, struct dumpopt, load_xdp,
+ .help = "Load XDP trace program if no XDP program is loaded"),
+ DEFINE_OPTION("interface", OPT_IFNAME, struct dumpopt, iface,
+ .short_opt = 'i',
+ .metavar = "<ifname>",
+ .help = "Name of interface to capture on"),
+#ifdef HAVE_LIBBPF_PERF_BUFFER__CONSUME
+ DEFINE_OPTION("perf-wakeup", OPT_U32, struct dumpopt, perf_wakeup,
+ .metavar = "<events>",
+ .help = "Wake up xdpdump every <events> packets"),
+#endif
+ DEFINE_OPTION("program-names", OPT_STRING, struct dumpopt,
+ program_names,
+ .short_opt = 'p',
+ .metavar = "<prog>",
+ .help = "Specific program to attach to"),
+ DEFINE_OPTION("promiscuous-mode", OPT_BOOL, struct dumpopt,
+ promiscuous,
+ .short_opt = 'P',
+ .help = "Open interface in promiscuous mode"),
+ DEFINE_OPTION("snapshot-length", OPT_U32, struct dumpopt, snaplen,
+ .short_opt = 's',
+ .metavar = "<snaplen>",
+ .help = "Minimum bytes of packet to capture"),
+ DEFINE_OPTION("use-pcap", OPT_BOOL, struct dumpopt, use_pcap,
+ .help = "Use legacy pcap format for XDP traces"),
+ DEFINE_OPTION("write", OPT_STRING, struct dumpopt, pcap_file,
+ .short_opt = 'w',
+ .metavar = "<file>",
+ .help = "Write raw packets to pcap file"),
+ DEFINE_OPTION("hex", OPT_BOOL, struct dumpopt, hex_dump,
+ .short_opt = 'x',
+ .help = "Print the full packet in hex"),
+ END_OPTIONS
+};
+
+#define MAX_LOADED_XDP_PROGRAMS (MAX_DISPATCHER_ACTIONS + 1)
+
+struct capture_programs {
+ /* Contains a list of programs to capture on, with the respective
+ * program names. The order MUST be the same as the loaded order!
+ */
+ unsigned int nr_of_progs;
+ struct prog_info {
+ struct xdp_program *prog;
+ const char *func;
+ unsigned int rx_capture;
+ /* Fields used by the actual loader. */
+ bool attached;
+ int perf_map_fd;
+ struct bpf_object *prog_obj;
+ struct bpf_link *fentry_link;
+ struct bpf_link *fexit_link;
+ } progs[MAX_LOADED_XDP_PROGRAMS];
+};
+
+struct perf_handler_ctx {
+ uint64_t missed_events;
+ uint64_t last_missed_events;
+ uint64_t captured_packets;
+ uint64_t epoch_delta;
+ uint64_t packet_id;
+ uint64_t cpu_packet_id[MAX_CPUS];
+ struct dumpopt *cfg;
+ struct capture_programs *xdp_progs;
+ pcap_t *pcap;
+ pcap_dumper_t *pcap_dumper;
+ struct xpcapng_dumper *pcapng_dumper;
+};
+
+bool exit_xdpdump;
+pcap_t *exit_pcap;
+
+/*****************************************************************************
+ * get_if_speed()
+ *****************************************************************************/
+static uint64_t get_if_speed(struct iface *iface)
+{
+#define MAX_MODE_MASKS 10
+
+ int fd;
+ struct ifreq ifr;
+ struct {
+ struct ethtool_link_settings req;
+ uint32_t modes[3 * MAX_MODE_MASKS];
+ } ereq;
+
+ if (iface == NULL)
+ return 0;
+
+ /* Open socket, and initialize structures. */
+ fd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (fd < 0)
+ return 0;
+
+ memset(&ereq, 0, sizeof(ereq));
+ ereq.req.cmd = ETHTOOL_GLINKSETTINGS;
+
+ memset(&ifr, 0, sizeof(ifr));
+ strncpy(ifr.ifr_name, iface->ifname, sizeof(ifr.ifr_name) - 1);
+ ifr.ifr_data = (void *)&ereq;
+
+ /* First query the kernel to see how many masks we need to ask for. */
+ if (ioctl(fd, SIOCETHTOOL, &ifr) != 0)
+ goto error_exit;
+
+ if (ereq.req.link_mode_masks_nwords >= 0 ||
+ ereq.req.link_mode_masks_nwords < -MAX_MODE_MASKS ||
+ ereq.req.cmd != ETHTOOL_GLINKSETTINGS)
+ goto error_exit;
+
+ /* Now ask for the data set, and extract the speed in bps. */
+ ereq.req.link_mode_masks_nwords = -ereq.req.link_mode_masks_nwords;
+ if (ioctl(fd, SIOCETHTOOL, &ifr) != 0)
+ goto error_exit;
+
+ /* If speed is unknown return 0. */
+ if (ereq.req.speed == -1U)
+ ereq.req.speed = 0;
+
+ close(fd);
+ return ereq.req.speed * 1000000ULL;
+
+error_exit:
+ close(fd);
+ return 0;
+}
+
+/*****************************************************************************
+ * get_if_drv_info()
+ *****************************************************************************/
+static char *get_if_drv_info(struct iface *iface, char *buffer, size_t len)
+{
+ int fd;
+ char *r_buffer = NULL;
+ struct ifreq ifr;
+ struct ethtool_drvinfo info;
+
+ if (iface == NULL || buffer == NULL || len == 0)
+ return NULL;
+
+ fd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (fd < 0)
+ return NULL;
+
+ memset(&info, 0, sizeof(info));
+ info.cmd = ETHTOOL_GDRVINFO;
+
+ memset(&ifr, 0, sizeof(ifr));
+ strncpy(ifr.ifr_name, iface->ifname, sizeof(ifr.ifr_name) - 1);
+ ifr.ifr_data = (void *)&info;
+
+ if (ioctl(fd, SIOCETHTOOL, &ifr) != 0)
+ goto exit;
+
+ if (try_snprintf(buffer, len,
+ "driver: \"%s\", version: \"%s\", "
+ "fw-version: \"%s\", rom-version: \"%s\", "
+ "bus-info: \"%s\"",
+ info.driver, info.version, info.fw_version,
+ info.erom_version, info.bus_info))
+ goto exit;
+
+ r_buffer = buffer;
+exit:
+ close(fd);
+ return r_buffer;
+}
+
+/*****************************************************************************
+ * set_if_promiscuous_mode()
+ *****************************************************************************/
+static int set_if_promiscuous_mode(struct iface *iface, bool enable,
+ bool *did_enable)
+{
+ int fd;
+ int rc = 0;
+ struct ifreq ifr;
+
+ if (iface == NULL)
+ return -EINVAL;
+
+ fd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (fd < 0)
+ return -errno;
+
+ memset(&ifr, 0, sizeof(ifr));
+ strncpy(ifr.ifr_name, iface->ifname, sizeof(ifr.ifr_name) - 1);
+
+ if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
+ pr_debug("DBG: Failed getting promiscuous mode: %s\n",
+ strerror(errno));
+ rc = -errno;
+ goto exit;
+ }
+ if (((ifr.ifr_flags & IFF_PROMISC) && enable) ||
+ (!(ifr.ifr_flags & IFF_PROMISC) && !enable)) {
+ pr_debug("DBG: Promiscuous mode already %s!\n",
+ enable ? "on" : "off");
+ goto exit;
+ }
+
+ if (enable)
+ ifr.ifr_flags |= IFF_PROMISC;
+ else
+ ifr.ifr_flags &= ~IFF_PROMISC;
+
+ if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
+ pr_debug("DBG: Failed setting promiscuous mode %s: %s\n",
+ enable ? "on" : "off", strerror(errno));
+ rc = -errno;
+ goto exit;
+ }
+
+ if (did_enable) {
+ if (enable)
+ *did_enable = true;
+ else
+ *did_enable = false;
+ }
+exit:
+ close(fd);
+ return rc;
+}
+
+/*****************************************************************************
+ * get_xdp_return_string()
+ *****************************************************************************/
+static const char *get_xdp_action_string(enum xdp_action act)
+{
+ switch (act) {
+ case XDP_ABORTED:
+ return "[ABORTED]";
+ case XDP_DROP:
+ return "[DROP]";
+ case XDP_PASS:
+ return "[PASS]";
+ case XDP_TX:
+ return "[TX]";
+ case XDP_REDIRECT:
+ return "[REDIRECT]";
+ }
+ return "[*unknown*]";
+}
+
+/*****************************************************************************
+ * get_capture_mode_string()
+ *****************************************************************************/
+static const char *get_capture_mode_string(unsigned int mode)
+{
+ switch(mode) {
+ case RX_FLAG_FENTRY:
+ return "entry";
+ case RX_FLAG_FEXIT:
+ return "exit";
+ case RX_FLAG_FENTRY | RX_FLAG_FEXIT:
+ return "entry/exit";
+ }
+ return "unknown";
+}
+
+/*****************************************************************************
+ * snprinth()
+ *****************************************************************************/
+#define SNPRINTH_MIN_BUFFER_SIZE sizeof("0xffff: 00 11 22 33 44 55 66 77 88" \
+ " 99 aa bb cc dd ee ff " \
+ "................0")
+
+static int snprinth(char *str, size_t size,
+ const uint8_t *buffer, size_t buffer_size, size_t offset)
+{
+ int i;
+ int pre_skip;
+ int post_skip;
+ size_t zero_offset;
+
+ if (str == NULL || size < SNPRINTH_MIN_BUFFER_SIZE ||
+ buffer == NULL || offset >= buffer_size || buffer_size > 0xffff)
+ return -EINVAL;
+
+ zero_offset = offset & ~0xf;
+ pre_skip = offset & 0xf;
+ post_skip = (zero_offset + 0xf) < buffer_size ? \
+ 0 : 16 - (buffer_size - zero_offset);
+
+ /* Print offset */
+ snprintf(str, size, "0x%04zx: ", offset & 0xfff0);
+ str += 9;
+
+ /* Print hex values */
+ if (pre_skip) {
+ memset(str, ' ', pre_skip * 3);
+ str[pre_skip * 3] = 0;
+ }
+
+ for (i = pre_skip; i < 16 - post_skip; i++) {
+ snprintf(str + (i * 3), 5, "%02x ",
+ buffer[zero_offset + i]);
+ }
+
+ if (post_skip) {
+ memset(str + (i * 3), ' ', post_skip * 3);
+ str[(i * 3) + (post_skip * 3)] = 0;
+ }
+
+ /* Print printable chars */
+ str += 16 * 3;
+ *str++ = ' ';
+
+ if (pre_skip) {
+ memset(str, ' ', pre_skip);
+ str[pre_skip] = 0;
+ }
+ for (i = pre_skip; i < 16 - post_skip; i++)
+ str[i] = isprint(buffer[zero_offset + i]) ? \
+ buffer[zero_offset + i]: '.';
+
+ str[i] = 0;
+ return 0;
+}
+
+/*****************************************************************************
+ * handle_perf_event()
+ *****************************************************************************/
+static enum bpf_perf_event_ret handle_perf_event(void *private_data,
+ int cpu,
+ struct perf_event_header *event)
+{
+ uint64_t ts;
+ bool fexit;
+ unsigned int if_idx, prog_idx;
+ const char *xdp_func;
+ struct perf_handler_ctx *ctx = private_data;
+ struct perf_sample_event *e = container_of(event,
+ struct perf_sample_event,
+ header);
+ struct perf_lost_event *lost = container_of(event,
+ struct perf_lost_event,
+ header);
+
+ switch(e->header.type) {
+ case PERF_RECORD_SAMPLE:
+
+ if (cpu >= MAX_CPUS ||
+ e->header.size < sizeof(struct perf_sample_event) ||
+ e->size < (sizeof(struct pkt_trace_metadata) + e->metadata.cap_len) ||
+ e->metadata.prog_index >= ctx->xdp_progs->nr_of_progs)
+ return LIBBPF_PERF_EVENT_CONT;
+
+ fexit = e->metadata.flags & MDF_DIRECTION_FEXIT;
+ prog_idx = e->metadata.prog_index;
+ if_idx = prog_idx * 2 + (fexit ? 1 : 0);
+ xdp_func = ctx->xdp_progs->progs[prog_idx].func;
+
+ if (prog_idx == 0 &&
+ (!fexit ||
+ ctx->xdp_progs->progs[prog_idx].rx_capture == RX_FLAG_FEXIT))
+ ctx->cpu_packet_id[cpu] = ++ctx->packet_id;
+
+ ts = e->time + ctx->epoch_delta;
+
+ if (ctx->pcapng_dumper) {
+ struct xpcapng_epb_options_s options = {};
+ int64_t action = e->metadata.action;
+ uint32_t queue = e->metadata.rx_queue;
+
+ options.flags = PCAPNG_EPB_FLAG_INBOUND;
+ options.dropcount = ctx->last_missed_events;
+ options.packetid = &ctx->cpu_packet_id[cpu];
+ options.queue = &queue;
+ options.xdp_verdict = fexit ? &action : NULL;
+
+ xpcapng_dump_enhanced_pkt(ctx->pcapng_dumper,
+ if_idx,
+ e->packet,
+ e->metadata.pkt_len,
+ min(e->metadata.cap_len,
+ ctx->cfg->snaplen),
+ ts,
+ &options);
+
+ ctx->last_missed_events = 0;
+ if (ctx->cfg->pcap_file[0] == '-' &&
+ ctx->cfg->pcap_file[1] == 0)
+ xpcapng_dump_flush(ctx->pcapng_dumper);
+ } else if (ctx->pcap_dumper) {
+ struct pcap_pkthdr h;
+
+ h.ts.tv_sec = ts / 1000000000ULL;
+ h.ts.tv_usec = ts % 1000000000ULL / 1000;
+ h.caplen = min(e->metadata.cap_len, ctx->cfg->snaplen);
+ h.len = e->metadata.pkt_len;
+ pcap_dump((u_char *) ctx->pcap_dumper, &h,
+ e->packet);
+
+ if (ctx->cfg->pcap_file[0] == '-' &&
+ ctx->cfg->pcap_file[1] == 0)
+ pcap_dump_flush(ctx->pcap_dumper);
+ } else {
+ int i;
+ char hline[SNPRINTH_MIN_BUFFER_SIZE];
+
+ if (ctx->cfg->hex_dump) {
+ printf("%llu.%09lld: %s()@%s%s: packet size %u "
+ "bytes, captured %u bytes on if_index "
+ "%u, rx queue %u, id %"PRIu64"\n",
+ ts / 1000000000ULL,
+ ts % 1000000000ULL,
+ xdp_func,
+ fexit ? "exit" : "entry",
+ fexit ? get_xdp_action_string(
+ e->metadata.action) : "",
+ e->metadata.pkt_len,
+ e->metadata.cap_len,
+ e->metadata.ifindex,
+ e->metadata.rx_queue,
+ ctx->cpu_packet_id[cpu]);
+
+ for (i = 0; i < e->metadata.cap_len; i += 16) {
+ snprinth(hline, sizeof(hline),
+ e->packet,
+ e->metadata.cap_len, i);
+ printf(" %s\n", hline);
+ }
+ } else {
+ printf("%llu.%09lld: %s()@%s%s: packet size %u "
+ "bytes on if_index %u, rx queue %u, "
+ "id %"PRIu64"\n",
+ ts / 1000000000ULL,
+ ts % 1000000000ULL,
+ xdp_func,
+ fexit ? "exit" : "entry",
+ fexit ? get_xdp_action_string(
+ e->metadata.action) : "",
+ e->metadata.pkt_len,e->metadata.ifindex,
+ e->metadata.rx_queue,
+ ctx->cpu_packet_id[cpu]);
+ }
+ }
+ ctx->captured_packets++;
+ break;
+
+ case PERF_RECORD_LOST:
+ ctx->missed_events += lost->lost;
+ ctx->last_missed_events += lost->lost;
+ break;
+ }
+
+ return LIBBPF_PERF_EVENT_CONT;
+}
+
+/*****************************************************************************
+ * get_epoch_to_uptime_delta()
+ *****************************************************************************/
+static uint64_t get_epoch_to_uptime_delta(void)
+{
+ /* This function will calculate the rough delta between uptime
+ * seconds and the epoch time. This is not a precise delta as there is
+ * a delay between calling the two functions below (and time() being in
+ * seconds), but it's good enough to get a general offset. The delta
+ * between packets is still based on the timestamps from the trace
+ * infrastructure.
+ */
+ struct timespec ts;
+ uint64_t uptime;
+ uint64_t epoch = time(NULL) * 1000000000ULL;
+
+ clock_gettime(CLOCK_MONOTONIC, &ts);
+ uptime = ts.tv_sec * 1000000000ULL + ts.tv_nsec;
+
+ return epoch - uptime;
+}
+
+/*****************************************************************************
+ * capture_on_legacy_interface()
+ *****************************************************************************/
+static bool capture_on_legacy_interface(struct dumpopt *cfg)
+{
+ bool rc = false;
+ char errbuf[PCAP_ERRBUF_SIZE];
+ uint64_t captured_packets = 0;
+ pcap_t *pcap = NULL;
+ pcap_dumper_t *pcap_dumper = NULL;
+ struct pcap_stat ps;
+
+ /* Open pcap handle for live capture. */
+ if (cfg->rx_capture != RX_FLAG_FENTRY) {
+ pr_warn("ERROR: For legacy capture only \"--rx-capture entry\""
+ " is supported!\n");
+ goto error_exit;
+ }
+
+ pcap = pcap_open_live(cfg->iface.ifname, cfg->snaplen,
+ cfg->promiscuous, 1000, errbuf);
+ if (pcap == NULL) {
+ pr_warn("ERROR: Can't open pcap live interface: %s\n", errbuf);
+ goto error_exit;
+ }
+
+ /* Open the pcap handle for pcap file. */
+ if (cfg->pcap_file) {
+ pcap_dumper = pcap_dump_open(pcap, cfg->pcap_file);
+ if (!pcap_dumper) {
+ pr_warn("ERROR: Can't open pcap file for writing!\n");
+ goto error_exit;
+ }
+ }
+
+ /* No more error conditions, display some capture information */
+ fprintf(stderr, "listening on %s, link-type %s (%s), "
+ "capture size %d bytes\n", cfg->iface.ifname,
+ pcap_datalink_val_to_name(pcap_datalink(pcap)),
+ pcap_datalink_val_to_description(pcap_datalink(pcap)),
+ cfg->snaplen);
+
+ /* Loop for receive packets on live interface. */
+ exit_pcap = pcap;
+ while (!exit_xdpdump) {
+ const uint8_t *packet;
+ struct pcap_pkthdr h;
+
+ packet = pcap_next(pcap, &h);
+ if (!packet)
+ continue;
+
+ if (pcap_dumper) {
+ pcap_dump((u_char *) pcap_dumper, &h, packet);
+
+ if (cfg->pcap_file[0] == '-' && cfg->pcap_file[1] == 0)
+ pcap_dump_flush(pcap_dumper);
+ } else {
+ size_t i;
+ char hline[SNPRINTH_MIN_BUFFER_SIZE];
+
+ if (cfg->hex_dump) {
+ printf("%ld.%06ld: packet size %u bytes, "
+ "captured %u bytes on if_name \"%s\"\n",
+ (long) h.ts.tv_sec, (long) h.ts.tv_usec,
+ h.len, h.caplen, cfg->iface.ifname);
+
+ for (i = 0; i < h.caplen; i += 16) {
+ snprinth(hline, sizeof(hline),
+ packet, h.caplen, i);
+ printf(" %s\n", hline);
+ }
+ } else {
+ printf("%ld.%06ld: packet size %u bytes on "
+ "if_name \"%s\"\n",
+ (long) h.ts.tv_sec, (long) h.ts.tv_usec,
+ h.len, cfg->iface.ifname);
+ }
+ }
+ captured_packets++;
+ }
+ exit_pcap = NULL;
+ rc = true;
+
+ fprintf(stderr, "\n%"PRIu64" packets captured\n", captured_packets);
+ if (pcap_stats(pcap, &ps) == 0) {
+ fprintf(stderr, "%u packets dropped by kernel\n", ps.ps_drop);
+ if (ps.ps_ifdrop != 0)
+ fprintf(stderr, "%u packets dropped by interface\n",
+ ps.ps_ifdrop);
+ }
+
+error_exit:
+
+ if (pcap_dumper)
+ pcap_dump_close(pcap_dumper);
+
+ if (pcap)
+ pcap_close(pcap);
+
+ return rc;
+}
+
+/*****************************************************************************
+ * append_snprintf()
+ *****************************************************************************/
+int append_snprintf(char **buf, size_t *buf_len, size_t *offset,
+ const char *format, ...)
+{
+ int len;
+ va_list args;
+
+ if (buf == NULL || *buf == NULL || buf_len == NULL || *buf_len <= 0 ||
+ offset == NULL || *buf_len - *offset <= 0)
+ return -EINVAL;
+
+ while (true) {
+ char *new_buf;
+ size_t new_buf_len;
+
+ va_start(args, format);
+ len = vsnprintf(*buf + *offset, *buf_len - *offset, format, args);
+ va_end(args);
+
+ if ((size_t)len < (*buf_len - *offset)) {
+ *offset += len;
+ len = 0;
+ break;
+ }
+
+ if (*buf_len >= 2048)
+ return -ENOMEM;
+
+ new_buf_len = *buf_len * 2;
+ new_buf = realloc(*buf, new_buf_len);
+
+ if (!new_buf)
+ return -ENOMEM;
+
+ *buf = new_buf;
+ *buf_len = new_buf_len;
+ }
+ return len;
+}
+
+/*****************************************************************************
+ * get_program_names_all()
+ *****************************************************************************/
+static char *get_program_names_all(struct capture_programs *progs, int skip_index)
+{
+ char *program_names;
+ size_t size = 128;
+ size_t offset = 0;
+
+ program_names = malloc(size);
+ if (!program_names)
+ return NULL;
+
+ for (unsigned int i = 0; i < progs->nr_of_progs; i++) {
+ const char *kname = xdp_program__name(progs->progs[i].prog);
+ const char *fname = progs->progs[i].func;
+ uint32_t id = xdp_program__id(progs->progs[i].prog);
+
+ if (skip_index != (int)i) {
+ if (append_snprintf(&program_names, &size, &offset,
+ "%s%s@%d", i == 0 ? "" : ",",
+ fname ? fname : kname, id) < 0) {
+ free(program_names);
+ return NULL;
+ }
+ } else {
+ if (append_snprintf(&program_names, &size, &offset,
+ "%s%s@%d", i == 0 ? "" : ",",
+ "<function_name>", id) < 0) {
+ free(program_names);
+ return NULL;
+ }
+ }
+ }
+ return program_names;
+}
+
+/*****************************************************************************
+ * find_func_matches()
+ *****************************************************************************/
+static size_t find_func_matches(const struct btf *btf,
+ const char *func_name,
+ const char **found_name,
+ bool print, int print_id, bool exact)
+{
+ const struct btf_type *t, *match;
+ size_t len, matches = 0;
+ const char *name;
+ int nr_types, i;
+
+ if (!btf) {
+ pr_debug("No BTF found for program\n");
+ return 0;
+ }
+
+ len = strlen(func_name);
+
+ nr_types = btf__type_cnt(btf);
+ for (i = 1; i < nr_types; i++) {
+ t = btf__type_by_id(btf, i);
+ if (!btf_is_func(t))
+ continue;
+
+ name = btf__name_by_offset(btf, t->name_off);
+ if (!strncmp(name, func_name, len)) {
+ pr_debug("Found func %s matching %s\n",
+ name, func_name);
+
+ if (print) {
+ if (print_id < 0)
+ pr_warn(" %s\n", name);
+ else
+ pr_warn(" %s@%d\n", name, print_id);
+ }
+
+ /* Do an exact match if the user specified a function
+ * name, or if there is no possibility of truncation
+ * because the length is different from the truncated
+ * length.
+ */
+ if (strlen(name) == len &&
+ (exact || len != BPF_OBJ_NAME_LEN - 1)) {
+ *found_name = name;
+ return 1; /* exact match */
+ }
+
+ /* prefix, may not be unique */
+ matches++;
+ match = t;
+ }
+ }
+
+ if (exact)
+ return 0;
+
+ if (matches == 1)
+ *found_name = btf__name_by_offset(btf, match->name_off);
+
+ return matches;
+}
+
+/*****************************************************************************
+ * match_target_function()
+ *****************************************************************************/
+static int match_target_function(struct dumpopt *cfg,
+ struct capture_programs *all_progs,
+ char *prog_name, int prog_id)
+{
+ int i;
+ unsigned int matches = 0;
+
+ for (i = 0; i < (int)all_progs->nr_of_progs; i++) {
+ const char *kname = xdp_program__name(all_progs->progs[i].prog);
+
+ if (prog_id != -1 &&
+ xdp_program__id(all_progs->progs[i].prog) != (uint32_t) prog_id)
+ continue;
+
+ if (!strncmp(kname, prog_name, strlen(kname))) {
+ if (all_progs->progs[i].func == NULL) {
+ if (find_func_matches(xdp_program__btf(all_progs->progs[i].prog),
+ prog_name,
+ &all_progs->progs[i].func,
+ false, -1,
+ true) == 1) {
+ all_progs->progs[i].rx_capture = cfg->rx_capture;
+ matches++;
+ } else if (strlen(prog_name) <= BPF_OBJ_NAME_LEN - 1) {
+ /* If the user cut and paste the
+ * truncated function name, make sure
+ * we tell him all the possible options!
+ */
+ matches = UINT_MAX;
+ break;
+ }
+ } else if (!strcmp(all_progs->progs[i].func, prog_name)) {
+ all_progs->progs[i].rx_capture = cfg->rx_capture;
+ matches++;
+ }
+ }
+ if (prog_id != -1)
+ break;
+ }
+
+ if (!matches) {
+ if (prog_id == -1)
+ pr_warn("ERROR: Can't find function '%s' on interface!\n",
+ prog_name);
+ else
+ pr_warn("ERROR: Can't find function '%s' in interface program %d!\n",
+ prog_name, prog_id);
+
+ return -ENOENT;
+ } else if (matches == 1) {
+ return 0;
+ }
+
+ if (matches != UINT_MAX) {
+ pr_warn("ERROR: The function '%s' exists in multiple programs!\n",
+ prog_name);
+ } else {
+ if (prog_id == -1)
+ pr_warn("ERROR: Can't identify the full XDP '%s' function!\n",
+ prog_name);
+ else
+ pr_warn("ERROR: Can't identify the full XDP '%s' function in program %d!\n",
+ prog_name, prog_id);
+ }
+ pr_warn("The following is a list of candidates:\n");
+
+ for (i = 0; i < (int)all_progs->nr_of_progs; i++) {
+ uint32_t cur_prog_id = xdp_program__id(all_progs->progs[i].prog);
+ const char *func_dummy;
+
+ if (prog_id != -1 && cur_prog_id != (uint32_t) prog_id)
+ continue;
+
+ find_func_matches(xdp_program__btf(all_progs->progs[i].prog),
+ xdp_program__name(all_progs->progs[i].prog),
+ &func_dummy, true,
+ (prog_id == -1 &&
+ matches == UINT_MAX) ? -1 : (int) cur_prog_id,
+ false);
+
+ if (prog_id != -1)
+ break;
+ }
+
+ pr_warn("Please use the -p option to pick the correct one.\n");
+ if (!strcmp("all", cfg->program_names)) {
+ char *program_names = get_program_names_all(all_progs, i);
+
+ if (program_names) {
+ pr_warn("Command line to replace 'all':\n %s\n",
+ program_names);
+ free(program_names);
+ }
+ }
+
+ return -EAGAIN;
+}
+
+
+/*****************************************************************************
+ * check_btf()
+ *****************************************************************************/
+static bool check_btf(struct xdp_program *prog)
+{
+ if (xdp_program__btf(prog))
+ return true;
+
+ pr_warn("ERROR: xdpdump requires BTF information, but that is missing "
+ "from the loaded XDP program!\n");
+ return false;
+}
+
+/*****************************************************************************
+ * find_target()
+ *
+ * What is this function trying to do? It will return a list of programs to
+ * capture on, based on the configured program-names. If this parameter is
+ * not given, it will attach to the first (main) program.
+ *
+ * Note that the kernel API will truncate function names at BPF_OBJ_NAME_LEN
+ * so we need to guess the correct function if not explicitly given with
+ * the program-names option.
+ *
+ *****************************************************************************/
+static int find_target(struct dumpopt *cfg, struct xdp_multiprog *mp,
+ struct capture_programs *tgt_progs)
+{
+ const char *func;
+ struct xdp_program *prog, *p;
+ struct capture_programs progs;
+ size_t matches;
+ char *prog_name;
+ char *prog_safe_ptr;
+ char *program_names = cfg->program_names;
+
+ prog = xdp_multiprog__main_prog(mp);
+ if (!check_btf(prog))
+ return -EINVAL;
+
+ /* First take care of the default case, i.e. no function supplied */
+ if (!program_names) {
+ /* The libxdp code optimization where it skips the dispatcher
+ * if only one program is loaded. If this is the case, we need
+ * to attach to the actual first program, not the dispatcher.
+ */
+ if (xdp_multiprog__program_count(mp) == 1) {
+ prog = xdp_multiprog__next_prog(NULL, mp);
+
+ if (!check_btf(prog))
+ return -EINVAL;
+ }
+
+ matches = find_func_matches(xdp_program__btf(prog),
+ xdp_program__name(prog),
+ &func, false, -1, false);
+
+ if (!matches) {
+ pr_warn("ERROR: Can't find function '%s' on interface!\n",
+ xdp_program__name(prog));
+ return -ENOENT;
+ } else if (matches == 1) {
+ tgt_progs->nr_of_progs = 1;
+ tgt_progs->progs[0].prog = prog;
+ tgt_progs->progs[0].func = func;
+ tgt_progs->progs[0].rx_capture = cfg->rx_capture;
+ return 0;
+ }
+
+ pr_warn("ERROR: Can't identify the full XDP main function!\n"
+ "The following is a list of candidates:\n");
+
+ find_func_matches(xdp_program__btf(prog),
+ xdp_program__name(prog),
+ &func, true, -1, false);
+
+ pr_warn("Please use the -p option to pick the correct one.\n");
+ return -EAGAIN;
+ }
+
+ /* We end up here if we have a configured function(s), which can be
+ * any function in one of the programs attached. In the case of
+ * multiple programs we can even have duplicate functions amongst
+ * programs and we need a way to differentiate. We do this by
+ * supplying the @<program_id>. See the -D output for the program IDs.
+ * We also have the "all" keyword, which will specify that all
+ * functions need to be traced.
+ */
+
+ /* Fill in the all_prog data structure to make matching easier */
+ memset(&progs, 0, sizeof(progs));
+
+ progs.progs[progs.nr_of_progs].prog = prog;
+ matches = find_func_matches(xdp_program__btf(prog),
+ xdp_program__name(prog),
+ &progs.progs[progs.nr_of_progs].func,
+ false, -1, false);
+ if (matches != 1)
+ progs.progs[progs.nr_of_progs].func = NULL;
+ progs.nr_of_progs++;
+
+ for (p = xdp_multiprog__next_prog(NULL, mp);
+ p;
+ p = xdp_multiprog__next_prog(p, mp)) {
+
+ progs.progs[progs.nr_of_progs].prog = p;
+ matches = find_func_matches(xdp_program__btf(p),
+ xdp_program__name(p),
+ &progs.progs[progs.nr_of_progs].func,
+ false, -1, false);
+ if (matches != 1)
+ progs.progs[progs.nr_of_progs].func = NULL;
+ progs.nr_of_progs++;
+
+ if (progs.nr_of_progs >= MAX_LOADED_XDP_PROGRAMS)
+ break;
+ }
+
+ /* If "all" option is specified create temp program names */
+ if (!strcmp("all", program_names)) {
+ program_names = get_program_names_all(&progs, -1);
+ if (!program_names) {
+ pr_warn("ERROR: Out of memory for 'all' programs!\n");
+ return -ENOMEM;
+ }
+ }
+
+ /* Split up the --program-names and walk over it */
+ for (prog_name = strtok_r(program_names, ",", &prog_safe_ptr);
+ prog_name != NULL;
+ prog_name = strtok_r(NULL, ",", &prog_safe_ptr)) {
+
+ int rc;
+ unsigned long id = -1;
+ char *id_str = strchr(prog_name, '@');
+ char *alloc_name = NULL;
+
+ if (id_str) {
+ unsigned int i;
+ char *endptr;
+
+ errno = 0;
+ id_str++;
+ id = strtoul(id_str, &endptr, 10);
+ if ((errno == ERANGE && id == ULONG_MAX)
+ || (errno != 0 && id == 0) || *endptr != '\0'
+ || endptr == id_str) {
+
+ pr_warn("ERROR: Can't extract valid program id from \"%s\"!\n",
+ prog_name);
+ if (cfg->program_names != program_names)
+ free(program_names);
+ return -EINVAL;
+ }
+
+ for (i = 0; i < progs.nr_of_progs; i++) {
+ if (id == xdp_program__id(progs.progs[i].prog))
+ break;
+ }
+ if (i >= progs.nr_of_progs) {
+ pr_warn("ERROR: Invalid program id supplied, \"%s\"!\n",
+ prog_name);
+ if (cfg->program_names != program_names)
+ free(program_names);
+ return -EINVAL;
+ }
+
+ alloc_name = strndup(prog_name,
+ id_str - prog_name - 1);
+ if (!alloc_name) {
+ pr_warn("ERROR: Out of memory while processing program-name argument!\n");
+ if (cfg->program_names != program_names)
+ free(program_names);
+ return -ENOMEM;
+ }
+ prog_name = alloc_name;
+ } else {
+ /* If no @id was specified, verify if the program name
+ * was not a program_id. If so, locate the name and
+ * use it in the lookup below.
+ */
+ char *endptr;
+ unsigned long prog_id;
+
+ prog_id = strtoul(prog_name, &endptr, 10);
+ if (!((errno == ERANGE && prog_id == ULONG_MAX)
+ || (errno != 0 && prog_id == 0) || *endptr != '\0'
+ || endptr == prog_name)) {
+
+ for (unsigned int i = 0; i < progs.nr_of_progs; i++) {
+ if (prog_id == xdp_program__id(progs.progs[i].prog)) {
+ alloc_name = strdup(progs.progs[i].func);
+ if (alloc_name) {
+ id = prog_id;
+ prog_name = alloc_name;
+ }
+ break;
+ }
+ }
+ }
+ }
+
+ rc = match_target_function(cfg, &progs, prog_name, id);
+ free(alloc_name);
+ if (rc < 0) {
+ if (cfg->program_names != program_names)
+ free(program_names);
+ return rc;
+ }
+ }
+
+#if 0
+ /* Removed this optimization for now as it will save one packet when
+ * three programs are loaded, two for four, etc. In addition, it will
+ * make the packet flow looks a bit weird, without it's more clear
+ * which programs the dispatcher has executed.
+ */
+ if (cfg->rx_capture == (RX_FLAG_FENTRY | RX_FLAG_FEXIT)) {
+ /* If we do entry and exit captures we can remove fentry from
+ * back to back programs to skip storing an identical packet.
+ * We keep fexit due to the reported return code.
+ *
+ * First program is the dispatches (which should not modify
+ * the packet, but we can't be sure). So we skip this and the
+ * first sub-programs fexit).
+ */
+ for (int i = 2; i < progs.nr_of_progs; i++)
+ if (progs.progs[i-1].rx_capture & RX_FLAG_FENTRY)
+ progs.progs[i].rx_capture &= ~RX_FLAG_FENTRY;
+ }
+#endif
+
+ if (cfg->program_names != program_names)
+ free(program_names);
+
+ /* Copy all the programs that need capture actions */
+ memset(tgt_progs, 0, sizeof(*tgt_progs));
+ for (unsigned int i = 0; i < progs.nr_of_progs; i++) {
+ if (!progs.progs[i].rx_capture)
+ continue;
+
+ tgt_progs->progs[tgt_progs->nr_of_progs].prog = progs.progs[i].prog;
+ tgt_progs->progs[tgt_progs->nr_of_progs].func = progs.progs[i].func;
+ tgt_progs->progs[tgt_progs->nr_of_progs].rx_capture = progs.progs[i].rx_capture;
+ tgt_progs->nr_of_progs++;
+ }
+ return 0;
+}
+
+/*****************************************************************************
+ * get_loaded_program_info()
+ *****************************************************************************/
+static char *get_loaded_program_info(struct dumpopt *cfg)
+{
+ char *info;
+ size_t info_size = 128;
+ size_t info_offset = 0;
+ struct xdp_multiprog *mp = NULL;
+
+ info = malloc(info_size);
+ if (!info)
+ return NULL;
+
+ if (append_snprintf(&info, &info_size, &info_offset,
+ "Capture was taken on interface %s, with the "
+ "following XDP programs loaded:\n",
+ cfg->iface.ifname) < 0)
+ goto error_out;
+
+ mp = xdp_multiprog__get_from_ifindex(cfg->iface.ifindex);
+ if (IS_ERR_OR_NULL(mp)) {
+ if (append_snprintf(&info, &info_size, &info_offset,
+ " %s()\n", "<No XDP program loaded!>"))
+ goto error_out;
+ } else {
+ struct xdp_program *prog = NULL;
+
+ if (append_snprintf(&info, &info_size, &info_offset, " %s()\n",
+ xdp_program__name(
+ xdp_multiprog__main_prog(mp))) < 0)
+ goto error_out;
+
+ while ((prog = xdp_multiprog__next_prog(prog, mp))) {
+ if (append_snprintf(&info, &info_size, &info_offset,
+ " %s()\n",
+ xdp_program__name(prog)) < 0)
+ goto error_out;
+ }
+
+ xdp_multiprog__close(mp);
+ }
+ return info;
+
+error_out:
+ xdp_multiprog__close(mp);
+ free(info);
+ return NULL;
+}
+
+/*****************************************************************************
+ * add_interfaces_to_pcapng()
+ *****************************************************************************/
+static bool add_interfaces_to_pcapng(struct dumpopt *cfg,
+ struct xpcapng_dumper *pcapng_dumper,
+ struct capture_programs *progs)
+{
+ uint64_t if_speed;
+ char if_drv[260];
+
+ if_speed = get_if_speed(&cfg->iface);
+ if_drv[0] = 0;
+ get_if_drv_info(&cfg->iface, if_drv, sizeof(if_drv));
+
+ for (unsigned int i = 0; i < progs->nr_of_progs; i++) {
+ char if_name[128];
+
+ if (try_snprintf(if_name, sizeof(if_name), "%s:%s()@fentry",
+ cfg->iface.ifname, progs->progs[i].func)) {
+ pr_warn("ERROR: Could not format interface name, %s:%s()@fentry!\n",
+ cfg->iface.ifname, progs->progs[i].func);
+ return false;
+ }
+
+ if (xpcapng_dump_add_interface(pcapng_dumper,
+ cfg->snaplen,
+ if_name, NULL, NULL,
+ if_speed,
+ 9 /* nsec resolution */,
+ if_drv) < 0) {
+ pr_warn("ERROR: Can't add %s interface to PcapNG file!\n",
+ if_name);
+ return false;
+ }
+
+ if (try_snprintf(if_name, sizeof(if_name), "%s:%s()@fexit",
+ cfg->iface.ifname, progs->progs[i].func)) {
+ pr_warn("ERROR: Could not format interface name, %s:%s()@fexit!\n",
+ cfg->iface.ifname, progs->progs[i].func);
+ return false;
+ }
+
+ if (xpcapng_dump_add_interface(pcapng_dumper,
+ cfg->snaplen,
+ if_name, NULL, NULL,
+ if_speed,
+ 9 /* nsec resolution */,
+ if_drv) < 0) {
+ pr_warn("ERROR: Can't add %s interface to PcapNG file!\n",
+ if_name);
+ return false;
+ }
+ }
+ return true;
+}
+
+static void print_compat_error(const char *what)
+{
+#if defined(__x86_64__) || defined(__i686__)
+ pr_warn("ERROR: The kernel does not support "
+ "fentry %s because it is too old!", what);
+#else
+ pr_warn("ERROR: The kernel does not support "
+ "fentry %s on the current CPU architecture!", what);
+#endif
+}
+
+/*****************************************************************************
+ * load_and_attach_trace()
+ *****************************************************************************/
+static bool load_and_attach_trace(struct dumpopt *cfg,
+ struct capture_programs *progs,
+ unsigned int idx)
+{
+ int err;
+ struct bpf_object *trace_obj = NULL;
+ struct bpf_program *trace_prog_fentry;
+ struct bpf_program *trace_prog_fexit;
+ struct bpf_link *trace_link_fentry = NULL;
+ struct bpf_link *trace_link_fexit = NULL;
+ struct bpf_map *perf_map;
+ struct bpf_map *data_map;
+ struct trace_configuration trace_cfg;
+
+ if (idx >= progs->nr_of_progs || progs->nr_of_progs == 0) {
+ pr_warn("ERROR: Attach program ID invalid!\n");
+ return false;
+ }
+
+ progs->progs[idx].attached = false;
+
+ if (progs->progs[idx].rx_capture == 0) {
+ pr_warn("ERROR: No RX capture mode to attach to!\n");
+ return false;
+ }
+
+ silence_libbpf_logging();
+
+rlimit_loop:
+ /* Load the trace program object */
+ trace_obj = open_bpf_file("xdpdump_bpf.o", NULL);
+ err = libbpf_get_error(trace_obj);
+ if (err) {
+ pr_warn("ERROR: Can't open XDP trace program: %s(%d)\n",
+ strerror(-err), err);
+ trace_obj = NULL;
+ goto error_exit;
+ }
+
+ /* Set the ifIndex in the DATA map */
+ data_map = bpf_object__find_map_by_name(trace_obj, "xdpdump_.data");
+ if (!data_map) {
+ pr_warn("ERROR: Can't find the .data MAP in the trace "
+ "program!\n");
+ goto error_exit;
+ }
+
+ if (bpf_map__value_size(data_map) != sizeof(trace_cfg)) {
+ pr_warn("ERROR: Can't find the correct sized .data MAP in the "
+ "trace program!\n");
+ goto error_exit;
+ }
+
+ trace_cfg.capture_if_ifindex = cfg->iface.ifindex;
+ trace_cfg.capture_snaplen = cfg->snaplen;
+ trace_cfg.capture_prog_index = idx;
+ if (bpf_map__set_initial_value(data_map, &trace_cfg,
+ sizeof(trace_cfg))) {
+ pr_warn("ERROR: Can't set initial .data MAP in the trace "
+ "program!\n");
+ goto error_exit;
+ }
+
+ /* Locate the fentry and fexit functions */
+ trace_prog_fentry = bpf_object__find_program_by_name(trace_obj,
+ "trace_on_entry");
+ if (!trace_prog_fentry) {
+ pr_warn("ERROR: Can't find XDP trace fentry function!\n");
+ goto error_exit;
+ }
+
+ trace_prog_fexit = bpf_object__find_program_by_name(trace_obj,
+ "trace_on_exit");
+ if (!trace_prog_fexit) {
+ pr_warn("ERROR: Can't find XDP trace fexit function!\n");
+ goto error_exit;
+ }
+
+ /* Before we can load the object in memory we need to set the attach
+ * point to our function. */
+ bpf_program__set_expected_attach_type(trace_prog_fentry,
+ BPF_TRACE_FENTRY);
+ bpf_program__set_expected_attach_type(trace_prog_fexit,
+ BPF_TRACE_FEXIT);
+ bpf_program__set_attach_target(trace_prog_fentry,
+ xdp_program__fd(progs->progs[idx].prog),
+ progs->progs[idx].func);
+ bpf_program__set_attach_target(trace_prog_fexit,
+ xdp_program__fd(progs->progs[idx].prog),
+ progs->progs[idx].func);
+
+ /* Reuse the xdpdump_perf_map for all programs */
+ perf_map = bpf_object__find_map_by_name(trace_obj,
+ "xdpdump_perf_map");
+ if (!perf_map) {
+ pr_warn("ERROR: Can't find xdpdump_perf_map in trace program!\n");
+ goto error_exit;
+ }
+ if (idx != 0) {
+ err = bpf_map__reuse_fd(perf_map, progs->progs[0].perf_map_fd);
+ if (err) {
+ pr_warn("ERROR: Can't reuse xdpdump_perf_map: %s\n",
+ strerror(-err));
+ goto error_exit;
+ }
+ }
+
+ /* Load the bpf object into memory */
+ err = bpf_object__load(trace_obj);
+ if (err) {
+ if (err == -EPERM && !double_rlimit()) {
+ bpf_object__close(trace_obj);
+ goto rlimit_loop;
+ } else if (err == -E2BIG) {
+ print_compat_error("function load");
+ } else {
+ char err_msg[STRERR_BUFSIZE];
+
+ libbpf_strerror(err, err_msg, sizeof(err_msg));
+ pr_warn("ERROR: Can't load eBPF object: %s(%d)\n",
+ err_msg, err);
+ }
+ goto error_exit;
+ }
+
+ /* Attach trace programs only in the direction(s) needed */
+ if (progs->progs[idx].rx_capture & RX_FLAG_FENTRY) {
+ trace_link_fentry = bpf_program__attach_trace(trace_prog_fentry);
+ err = libbpf_get_error(trace_link_fentry);
+ if (err) {
+ if (err == -ENOTSUPP)
+ print_compat_error("function attach");
+ else
+ pr_warn("ERROR: Can't attach XDP trace fentry "
+ "function: %s\n",
+ strerror(-err));
+ goto error_exit;
+ }
+ }
+
+ if (progs->progs[idx].rx_capture & RX_FLAG_FEXIT) {
+ trace_link_fexit = bpf_program__attach_trace(trace_prog_fexit);
+ err = libbpf_get_error(trace_link_fexit);
+ if (err) {
+ pr_warn("ERROR: Can't attach XDP trace fexit function: %s\n",
+ strerror(-err));
+ goto error_exit;
+ }
+ }
+
+ /* Figure out the fd for the BPF_MAP_TYPE_PERF_EVENT_ARRAY trace map. */
+ if (idx == 0) {
+ progs->progs[idx].perf_map_fd = bpf_map__fd(perf_map);
+ if (progs->progs[idx].perf_map_fd < 0) {
+ pr_warn("ERROR: Can't get xdpdump_perf_map file descriptor: %s\n",
+ strerror(errno));
+ return false;
+ }
+ } else {
+ progs->progs[idx].perf_map_fd = progs->progs[0].perf_map_fd;
+ }
+
+ progs->progs[idx].attached = true;
+ progs->progs[idx].fentry_link = trace_link_fentry;
+ progs->progs[idx].fexit_link = trace_link_fexit;
+ progs->progs[idx].prog_obj = trace_obj;
+ return true;
+
+error_exit:
+ bpf_link__destroy(trace_link_fentry);
+ bpf_link__destroy(trace_link_fexit);
+ bpf_object__close(trace_obj);
+ return false;
+}
+
+/*****************************************************************************
+ * load_and_attach_traces()
+ *****************************************************************************/
+static bool load_and_attach_traces(struct dumpopt *cfg,
+ struct capture_programs *progs)
+{
+ for (unsigned int i = 0; i < progs->nr_of_progs; i++)
+ if (!load_and_attach_trace(cfg, progs, i))
+ return false;
+
+ return true;
+}
+
+/*****************************************************************************
+ * detach_trace()
+ *****************************************************************************/
+static void detach_trace(struct capture_programs *progs, unsigned int idx)
+{
+ if (idx >= progs->nr_of_progs || progs->nr_of_progs == 0 ||
+ !progs->progs[idx].attached)
+ return;
+
+ bpf_link__destroy(progs->progs[idx].fentry_link);
+ bpf_link__destroy(progs->progs[idx].fexit_link);
+ bpf_object__close(progs->progs[idx].prog_obj);
+ progs->progs[idx].attached = false;
+}
+
+/*****************************************************************************
+ * detach_traces()
+ *****************************************************************************/
+static void detach_traces(struct capture_programs *progs)
+{
+ for (unsigned int i = 0; i < progs->nr_of_progs; i++)
+ detach_trace(progs, i);
+}
+
+/*****************************************************************************
+ * load_xdp_trace_program()
+ *****************************************************************************/
+static bool load_xdp_trace_program(struct dumpopt *cfg,
+ struct capture_programs *progs)
+{
+ DECLARE_LIBXDP_OPTS(xdp_program_opts, opts, 0);
+ int fd, rc;
+ char errmsg[STRERR_BUFSIZE];
+ struct xdp_program *prog;
+ struct bpf_map *perf_map;
+ struct bpf_map *data_map;
+ struct trace_configuration trace_cfg;
+
+ if (!cfg || !progs)
+ return false;
+
+ silence_libbpf_logging();
+ silence_libxdp_logging();
+
+ opts.find_filename = "xdpdump_xdp.o";
+ opts.prog_name = "xdpdump";
+
+ prog = xdp_program__create(&opts);
+ if (libxdp_get_error(prog)) {
+ int err = libxdp_get_error(prog);
+
+ libxdp_strerror(err, errmsg, sizeof(errmsg));
+ pr_warn("ERROR: Can't open XDP trace program: %s(%d)\n",
+ errmsg, err);
+ return false;
+ }
+
+ perf_map = bpf_object__find_map_by_name(xdp_program__bpf_obj(prog),
+ "xdpdump_perf_map");
+ if (!perf_map) {
+ pr_warn("ERROR: Can't find xdpdump_perf_map in the xdp program!\n");
+ goto error_exit;
+ }
+
+ /* Set the trace configuration in the DATA map */
+ data_map = bpf_object__find_map_by_name(xdp_program__bpf_obj(prog),
+ "xdpdump_.data");
+ if (!data_map) {
+ pr_warn("ERROR: Can't find the .data MAP in the xdp program!\n");
+ goto error_exit;
+ }
+
+ if (bpf_map__value_size(data_map) != sizeof(trace_cfg)) {
+ pr_warn("ERROR: Can't find the correct sized .data MAP in the xdp program!\n");
+ goto error_exit;
+ }
+
+ trace_cfg.capture_if_ifindex = cfg->iface.ifindex;
+ trace_cfg.capture_snaplen = cfg->snaplen;
+ trace_cfg.capture_prog_index = 0;
+ if (bpf_map__set_initial_value(data_map, &trace_cfg,
+ sizeof(trace_cfg))) {
+ pr_warn("ERROR: Can't set initial .data MAP in the xdp program!\n");
+ goto error_exit;
+ }
+
+ do {
+ rc = xdp_program__attach(prog, cfg->iface.ifindex,
+ cfg->load_xdp_mode, 0);
+
+ } while (rc == -EPERM && !double_rlimit());
+
+ if (rc) {
+ libxdp_strerror(rc, errmsg, sizeof(errmsg));
+ pr_warn("ERROR: Can't attach XDP trace program: %s(%d)\n",
+ errmsg, rc);
+ goto error_exit;
+ }
+
+ fd = bpf_map__fd(perf_map);
+ if (fd < 0) {
+ pr_warn("ERROR: Can't get xdpdump_perf_map file descriptor: %s\n",
+ strerror(fd));
+
+ xdp_program__detach(prog, cfg->iface.ifindex,
+ cfg->load_xdp_mode, 0);
+ goto error_exit;
+ }
+
+ progs->progs[0].prog = prog;
+ progs->progs[0].func = xdp_program__name(prog);
+ progs->progs[0].rx_capture = RX_FLAG_FENTRY;
+ progs->progs[0].perf_map_fd = fd;
+ progs->nr_of_progs = 1;
+
+ return true;
+
+error_exit:
+ xdp_program__close(prog);
+ return false;
+}
+
+/*****************************************************************************
+ * unload_xdp_trace_program()
+ *****************************************************************************/
+static void unload_xdp_trace_program(struct dumpopt *cfg,
+ struct capture_programs *progs)
+{
+ if (!progs || progs->nr_of_progs != 1)
+ return;
+
+ xdp_program__detach(progs->progs[0].prog, cfg->iface.ifindex,
+ cfg->load_xdp_mode, 0);
+ xdp_program__close(progs->progs[0].prog);
+
+ progs->progs[0].prog = NULL;
+ progs->nr_of_progs = 0;
+}
+
+/*****************************************************************************
+ * capture_on_interface()
+ *****************************************************************************/
+static bool capture_on_interface(struct dumpopt *cfg)
+{
+ int err, cnt;
+ bool rc = false;
+ bool load_xdp = false;
+ bool promiscuous = false;
+ pcap_t *pcap = NULL;
+ pcap_dumper_t *pcap_dumper = NULL;
+ struct xpcapng_dumper *pcapng_dumper = NULL;
+ struct perf_buffer *perf_buf = NULL;
+ struct perf_event_attr perf_attr = {
+ .sample_type = PERF_SAMPLE_RAW | PERF_SAMPLE_TIME,
+ .type = PERF_TYPE_SOFTWARE,
+ .config = PERF_COUNT_SW_BPF_OUTPUT,
+ .sample_period = 1,
+ .wakeup_events = 1,
+ };
+ struct perf_handler_ctx perf_ctx;
+ struct xdp_multiprog *mp;
+ struct capture_programs tgt_progs = {};
+
+ mp = xdp_multiprog__get_from_ifindex(cfg->iface.ifindex);
+ if (IS_ERR_OR_NULL(mp) || xdp_multiprog__main_prog(mp) == NULL) {
+
+ if (!cfg->load_xdp) {
+ pr_warn("WARNING: Specified interface does not have an XDP program loaded%s,"
+ "\n capturing in legacy mode!\n",
+ IS_ERR_OR_NULL(mp) ? "" : " in software");
+
+ xdp_multiprog__close(mp);
+ return capture_on_legacy_interface(cfg);
+ }
+ pr_warn("WARNING: Specified interface does not have an XDP program loaded%s!\n"
+ " Will load a capture only XDP program!\n",
+ IS_ERR_OR_NULL(mp) ? "" : " in software");
+ load_xdp = true;
+ }
+
+ if (!load_xdp) {
+ if (find_target(cfg, mp, &tgt_progs))
+ goto error_exit;
+
+ if (tgt_progs.nr_of_progs == 0) {
+ pr_warn("ERROR: Failed finding any attached XDP program!\n");
+ goto error_exit;
+ }
+ }
+
+ /* Enable promiscuous mode if requested. */
+ if (cfg->promiscuous) {
+ err = set_if_promiscuous_mode(&cfg->iface, true,
+ &cfg->promiscuous);
+ if (err) {
+ pr_warn("ERROR: Failed setting promiscuous mode: %s(%d)\n",
+ strerror(-err), -err);
+ goto error_exit;
+ }
+ promiscuous = true;
+ }
+
+ /* Load and attach programs */
+ if (!load_xdp) {
+ if (!load_and_attach_traces(cfg, &tgt_progs)) {
+ /* Actual errors are reported in the above function. */
+ goto error_exit;
+ }
+ } else {
+ if (!load_xdp_trace_program(cfg, &tgt_progs)) {
+ /* Actual errors are reported in the above function. */
+ goto error_exit;
+ }
+ }
+
+ /* Open the pcap handle */
+ if (cfg->pcap_file) {
+
+ if (cfg->use_pcap) {
+ pcap = pcap_open_dead(DLT_EN10MB, cfg->snaplen);
+ if (!pcap) {
+ pr_warn("ERROR: Can't open pcap dead handler!\n");
+ goto error_exit;
+ }
+
+ pcap_dumper = pcap_dump_open(pcap, cfg->pcap_file);
+ if (!pcap_dumper) {
+ pr_warn("ERROR: Can't open pcap file for writing!\n");
+ goto error_exit;
+ }
+ } else {
+ char *program_info;
+ struct utsname utinfo;
+ char os_info[260];
+
+ memset(&utinfo, 0, sizeof(utinfo));
+ uname(&utinfo);
+
+ os_info[0] = 0;
+ if (try_snprintf(os_info, sizeof(os_info), "%s %s %s %s",
+ utinfo.sysname, utinfo.nodename,
+ utinfo.release, utinfo.version)) {
+ pr_warn("ERROR: Could not format OS information!\n");
+ goto error_exit;
+ }
+
+ program_info = get_loaded_program_info(cfg);
+ if (!program_info) {
+ pr_warn("ERROR: Could not format program information!\n");
+ goto error_exit;
+ }
+
+ pcapng_dumper = xpcapng_dump_open(cfg->pcap_file,
+ program_info,
+ utinfo.machine,
+ os_info,
+ "xdpdump v" TOOLS_VERSION);
+
+ free(program_info);
+ if (!pcapng_dumper) {
+ pr_warn("ERROR: Can't open PcapNG file for writing!\n");
+ goto error_exit;
+ }
+
+
+ if (!add_interfaces_to_pcapng(cfg, pcapng_dumper,
+ &tgt_progs)) {
+ /* Error output is handled in
+ * add_interfaces_to_pcapng()
+ */
+ goto error_exit;
+ }
+ }
+ }
+
+ /* No more error conditions, display some capture information */
+ fprintf(stderr, "listening on %s, ingress XDP program ",
+ cfg->iface.ifname);
+
+ for (unsigned int i = 0; i < tgt_progs.nr_of_progs; i++)
+ fprintf(stderr, "ID %u func %s, ",
+ xdp_program__id(tgt_progs.progs[i].prog),
+ tgt_progs.progs[i].func);
+
+ fprintf(stderr, "capture mode %s, capture size %d bytes\n",
+ get_capture_mode_string(tgt_progs.progs[0].rx_capture),
+ cfg->snaplen);
+
+ /* Setup perf context */
+ memset(&perf_ctx, 0, sizeof(perf_ctx));
+ perf_ctx.cfg = cfg;
+ perf_ctx.xdp_progs = &tgt_progs;
+ perf_ctx.pcap = pcap;
+ perf_ctx.pcap_dumper = pcap_dumper;
+ perf_ctx.pcapng_dumper = pcapng_dumper;
+ perf_ctx.epoch_delta = get_epoch_to_uptime_delta();
+
+ /* Determine the perf wakeup_events value to use */
+#ifdef HAVE_LIBBPF_PERF_BUFFER__CONSUME
+ if (cfg->pcap_file) {
+ if (cfg->pcap_file[0] == '-' && cfg->pcap_file[1] == 0) {
+ /* If we pipe trough stdio we do not want to buffer
+ * any packets in the perf ring.
+ */
+ perf_attr.wakeup_events = 1;
+ } else {
+ /*
+ * If no specific wakeup value is specified assume
+ * an average packet size of 2K we would like to
+ * fill without losing any packets.
+ */
+ uint32_t events = PERF_MMAP_PAGE_COUNT * getpagesize() /
+ (libbpf_num_possible_cpus() ?: 1) / 2048;
+
+ if (events > 0)
+ perf_attr.wakeup_events = min(PERF_MAX_WAKEUP_EVENTS,
+ events);
+ }
+ } else {
+ /* Only buffer in perf ring when using pcap_file */
+ perf_attr.wakeup_events = 1;
+ }
+ /* Cmdline option --perf-wakeup can override buffering levels */
+ if (cfg->perf_wakeup)
+ perf_attr.wakeup_events = cfg->perf_wakeup;
+#endif
+ pr_debug("perf-wakeup value uses is %u\n", perf_attr.wakeup_events);
+
+#ifdef HAVE_LIBBPF_PERF_BUFFER__NEW_RAW
+ /* the configure check looks for the 6-argument variant of the function */
+ perf_buf = perf_buffer__new_raw(tgt_progs.progs[0].perf_map_fd,
+ PERF_MMAP_PAGE_COUNT,
+ &perf_attr, handle_perf_event,
+ &perf_ctx, NULL);
+#else
+ struct perf_buffer_raw_opts perf_opts = {};
+
+ /* Setup perf ring buffers */
+ perf_opts.attr = &perf_attr;
+ perf_opts.event_cb = handle_perf_event;
+ perf_opts.ctx = &perf_ctx;
+ perf_buf = perf_buffer__new_raw(tgt_progs.progs[0].perf_map_fd,
+ PERF_MMAP_PAGE_COUNT,
+ &perf_opts);
+#endif
+
+ if (perf_buf == NULL) {
+ pr_warn("ERROR: Failed to allocate raw perf buffer: %s(%d)",
+ strerror(errno), errno);
+ goto error_exit;
+ }
+
+ /* Loop trough the dumper */
+ while (!exit_xdpdump) {
+ cnt = perf_buffer__poll(perf_buf, 1000);
+ if (cnt < 0 && errno != EINTR) {
+ pr_warn("ERROR: Perf buffer polling failed: %s(%d)",
+ strerror(errno), errno);
+ goto error_exit;
+ }
+ }
+#ifdef HAVE_LIBBPF_PERF_BUFFER__CONSUME
+ perf_buffer__consume(perf_buf);
+#endif
+
+ fprintf(stderr, "\n%"PRIu64" packets captured\n",
+ perf_ctx.captured_packets);
+ fprintf(stderr, "%"PRIu64" packets dropped by perf ring\n",
+ perf_ctx.missed_events);
+
+
+ rc = true;
+
+error_exit:
+ /* Cleanup all our resources */
+ if (promiscuous && cfg->promiscuous) {
+ err = set_if_promiscuous_mode(&cfg->iface, false, NULL);
+ if (err)
+ pr_warn("ERROR: Failed disabling promiscuous mode: "
+ "%s(%d)\n", strerror(-err), -err);
+ }
+
+ perf_buffer__free(perf_buf);
+ xpcapng_dump_close(pcapng_dumper);
+
+ if (pcap_dumper)
+ pcap_dump_close(pcap_dumper);
+
+ if (pcap)
+ pcap_close(pcap);
+
+ if (load_xdp)
+ unload_xdp_trace_program(cfg, &tgt_progs);
+ else
+ detach_traces(&tgt_progs);
+
+ xdp_multiprog__close(mp);
+ return rc;
+}
+
+/*****************************************************************************
+ * signal_handler()
+ *****************************************************************************/
+static void signal_handler(__unused int signo)
+{
+ exit_xdpdump = true;
+ if (exit_pcap)
+ pcap_breakloop(exit_pcap);
+}
+
+/*****************************************************************************
+ * main()
+ *****************************************************************************/
+int main(int argc, char **argv)
+{
+ if (parse_cmdline_args(argc, argv, xdpdump_options, &cfg_dumpopt,
+ PROG_NAME, PROG_NAME,
+ "XDPDump tool to dump network traffic",
+ &defaults_dumpopt) != 0)
+ return EXIT_FAILURE;
+
+ /* If all the options are parsed ok, make sure we are root! */
+ if (check_bpf_environ())
+ return EXIT_FAILURE;
+
+ if (cfg_dumpopt.snaplen == 0)
+ cfg_dumpopt.snaplen = DEFAULT_SNAP_LEN;
+
+ if (cfg_dumpopt.rx_capture == 0)
+ cfg_dumpopt.rx_capture = RX_FLAG_FENTRY;
+
+ /* See if we need to dump interfaces and exit */
+ if (cfg_dumpopt.list_interfaces) {
+ if (iface_print_status(NULL))
+ return EXIT_SUCCESS;
+ return EXIT_FAILURE;
+ }
+
+ /* Check if the system does not have more cores than we assume. */
+ if (sysconf(_SC_NPROCESSORS_CONF) > MAX_CPUS) {
+ pr_warn("ERROR: System has more cores (%ld) than maximum "
+ "supported (%d)!\n", sysconf(_SC_NPROCESSORS_CONF),
+ MAX_CPUS);
+ return EXIT_FAILURE;
+ }
+
+ /* From here on we assume we need to capture data on an interface */
+ if (signal(SIGINT, signal_handler) == SIG_ERR ||
+ signal(SIGHUP, signal_handler) == SIG_ERR ||
+ signal(SIGTERM, signal_handler) == SIG_ERR) {
+ pr_warn("ERROR: Failed assigning signal handler: %s\n",
+ strerror(errno));
+ return EXIT_FAILURE;
+ }
+
+ if (cfg_dumpopt.iface.ifname == NULL) {
+ pr_warn("ERROR: You must specific an interface to capture on!\n");
+ return EXIT_FAILURE;
+ }
+
+ if (!capture_on_interface(&cfg_dumpopt))
+ return EXIT_FAILURE;
+
+ return EXIT_SUCCESS;
+}