From b88bb292821fd7742604ec4e280acebd9a049f62 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 27 Apr 2024 12:36:22 +0200 Subject: Adding upstream version 3.0.5. Signed-off-by: Daniel Baumann --- src/libknot/xdp/bpf-kernel.c | 159 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 159 insertions(+) create mode 100644 src/libknot/xdp/bpf-kernel.c (limited to 'src/libknot/xdp/bpf-kernel.c') diff --git a/src/libknot/xdp/bpf-kernel.c b/src/libknot/xdp/bpf-kernel.c new file mode 100644 index 0000000..a19a609 --- /dev/null +++ b/src/libknot/xdp/bpf-kernel.c @@ -0,0 +1,159 @@ +/* Copyright (C) 2020 CZ.NIC, z.s.p.o. + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . + */ + +#include +#include +#include +#include +#include + +#include "bpf-consts.h" +#include "../../contrib/libbpf/include/uapi/linux/bpf.h" +#include "../../contrib/libbpf/bpf/bpf_endian.h" +#include "../../contrib/libbpf/bpf/bpf_helpers.h" + +/* Don't fragment flag. */ +#define IP_DF 0x4000 + +/* Assume netdev has no more than 128 queues. */ +#define QUEUE_MAX 128 + +/* A set entry here means that the corresponding queue_id + * has an active AF_XDP socket bound to it. */ +struct bpf_map_def SEC("maps") qidconf_map = { + .type = BPF_MAP_TYPE_ARRAY, + .key_size = sizeof(int), + .value_size = sizeof(int), + .max_entries = QUEUE_MAX, +}; +struct bpf_map_def SEC("maps") xsks_map = { + .type = BPF_MAP_TYPE_XSKMAP, + .key_size = sizeof(int), + .value_size = sizeof(int), + .max_entries = QUEUE_MAX, +}; + +struct ipv6_frag_hdr { + unsigned char nexthdr; + unsigned char whatever[7]; +} __attribute__((packed)); + +SEC("xdp_redirect_udp") +int xdp_redirect_udp_func(struct xdp_md *ctx) +{ + const void *data = (void *)(long)ctx->data; + const void *data_end = (void *)(long)ctx->data_end; + + const struct ethhdr *eth = data; + const struct iphdr *ip4; + const struct ipv6hdr *ip6; + const struct udphdr *udp; + + __u8 ip_proto; + __u8 fragmented = 0; + + /* Parse Ethernet header. */ + if ((void *)eth + sizeof(*eth) > data_end) { + return XDP_DROP; + } + data += sizeof(*eth); + + /* Parse IPv4 or IPv6 header. */ + switch (eth->h_proto) { + case __constant_htons(ETH_P_IP): + ip4 = data; + if ((void *)ip4 + sizeof(*ip4) > data_end) { + return XDP_DROP; + } + if (ip4->version != 4) { + return XDP_DROP; + } + if (ip4->frag_off != 0 && + ip4->frag_off != __constant_htons(IP_DF)) { + fragmented = 1; + } + ip_proto = ip4->protocol; + udp = data + ip4->ihl * 4; + break; + case __constant_htons(ETH_P_IPV6): + ip6 = data; + if ((void *)ip6 + sizeof(*ip6) > data_end) { + return XDP_DROP; + } + if (ip6->version != 6) { + return XDP_DROP; + } + ip_proto = ip6->nexthdr; + data += sizeof(*ip6); + if (ip_proto == IPPROTO_FRAGMENT) { + fragmented = 1; + const struct ipv6_frag_hdr *frag = data; + if ((void *)frag + sizeof(*frag) > data_end) { + return XDP_DROP; + } + ip_proto = frag->nexthdr; + data += sizeof(*frag); + } + udp = data; + break; + default: + /* Also applies to VLAN. */ + return XDP_PASS; + } + + /* Treat UDP only. */ + if (ip_proto != IPPROTO_UDP) { + return XDP_PASS; + } + + /* Parse UDP header. */ + if ((void *)udp + sizeof(*udp) > data_end) { + return XDP_DROP; + } + + /* Check the UDP length. */ + if (data_end - (void *)udp < __bpf_ntohs(udp->len)) { + return XDP_DROP; + } + + /* Get the queue options. */ + int index = ctx->rx_queue_index; + int *qidconf = bpf_map_lookup_elem(&qidconf_map, &index); + if (!qidconf) { + return XDP_ABORTED; + } + + /* Treat specified destination ports only. */ + __u32 port_info = *qidconf; + switch (port_info & KNOT_XDP_LISTEN_PORT_MASK) { + case KNOT_XDP_LISTEN_PORT_DROP: + return XDP_DROP; + case KNOT_XDP_LISTEN_PORT_ALL: + break; + default: + if (udp->dest != port_info) { + return XDP_PASS; + } + } + + /* Drop fragmented UDP datagrams. */ + if (fragmented) { + return XDP_DROP; + } + + /* Forward the packet to user space. */ + return bpf_redirect_map(&xsks_map, index, 0); +} -- cgit v1.2.3