18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 28c2ecf20Sopenharmony_ci// Copyright (c) 2019 Facebook 38c2ecf20Sopenharmony_ci#include <linux/bpf.h> 48c2ecf20Sopenharmony_ci#include <stdbool.h> 58c2ecf20Sopenharmony_ci#include <bpf/bpf_helpers.h> 68c2ecf20Sopenharmony_ci#include <bpf/bpf_endian.h> 78c2ecf20Sopenharmony_ci#include <bpf/bpf_tracing.h> 88c2ecf20Sopenharmony_ci 98c2ecf20Sopenharmony_cichar _license[] SEC("license") = "GPL"; 108c2ecf20Sopenharmony_cistruct { 118c2ecf20Sopenharmony_ci __uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY); 128c2ecf20Sopenharmony_ci __uint(key_size, sizeof(int)); 138c2ecf20Sopenharmony_ci __uint(value_size, sizeof(int)); 148c2ecf20Sopenharmony_ci} perf_buf_map SEC(".maps"); 158c2ecf20Sopenharmony_ci 168c2ecf20Sopenharmony_ci#define _(P) (__builtin_preserve_access_index(P)) 178c2ecf20Sopenharmony_ci 188c2ecf20Sopenharmony_ci/* define few struct-s that bpf program needs to access */ 198c2ecf20Sopenharmony_cistruct callback_head { 208c2ecf20Sopenharmony_ci struct callback_head *next; 218c2ecf20Sopenharmony_ci void (*func)(struct callback_head *head); 228c2ecf20Sopenharmony_ci}; 238c2ecf20Sopenharmony_cistruct dev_ifalias { 248c2ecf20Sopenharmony_ci struct callback_head rcuhead; 258c2ecf20Sopenharmony_ci}; 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_cistruct net_device /* same as kernel's struct net_device */ { 288c2ecf20Sopenharmony_ci int ifindex; 298c2ecf20Sopenharmony_ci struct dev_ifalias *ifalias; 308c2ecf20Sopenharmony_ci}; 318c2ecf20Sopenharmony_ci 328c2ecf20Sopenharmony_citypedef struct { 338c2ecf20Sopenharmony_ci int counter; 348c2ecf20Sopenharmony_ci} atomic_t; 358c2ecf20Sopenharmony_citypedef struct refcount_struct { 368c2ecf20Sopenharmony_ci atomic_t refs; 378c2ecf20Sopenharmony_ci} refcount_t; 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_cistruct sk_buff { 408c2ecf20Sopenharmony_ci /* field names and sizes should match to those in the kernel */ 418c2ecf20Sopenharmony_ci unsigned int len, data_len; 428c2ecf20Sopenharmony_ci __u16 mac_len, hdr_len, queue_mapping; 438c2ecf20Sopenharmony_ci struct net_device *dev; 448c2ecf20Sopenharmony_ci /* order of the fields doesn't matter */ 458c2ecf20Sopenharmony_ci refcount_t users; 468c2ecf20Sopenharmony_ci unsigned char *data; 478c2ecf20Sopenharmony_ci char __pkt_type_offset[0]; 488c2ecf20Sopenharmony_ci char cb[48]; 498c2ecf20Sopenharmony_ci}; 508c2ecf20Sopenharmony_ci 518c2ecf20Sopenharmony_cistruct meta { 528c2ecf20Sopenharmony_ci int ifindex; 538c2ecf20Sopenharmony_ci __u32 cb32_0; 548c2ecf20Sopenharmony_ci __u8 cb8_0; 558c2ecf20Sopenharmony_ci}; 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci/* TRACE_EVENT(kfree_skb, 588c2ecf20Sopenharmony_ci * TP_PROTO(struct sk_buff *skb, void *location), 598c2ecf20Sopenharmony_ci */ 608c2ecf20Sopenharmony_ciSEC("tp_btf/kfree_skb") 618c2ecf20Sopenharmony_ciint BPF_PROG(trace_kfree_skb, struct sk_buff *skb, void *location) 628c2ecf20Sopenharmony_ci{ 638c2ecf20Sopenharmony_ci struct net_device *dev; 648c2ecf20Sopenharmony_ci struct callback_head *ptr; 658c2ecf20Sopenharmony_ci void *func; 668c2ecf20Sopenharmony_ci int users; 678c2ecf20Sopenharmony_ci unsigned char *data; 688c2ecf20Sopenharmony_ci unsigned short pkt_data; 698c2ecf20Sopenharmony_ci struct meta meta = {}; 708c2ecf20Sopenharmony_ci char pkt_type; 718c2ecf20Sopenharmony_ci __u32 *cb32; 728c2ecf20Sopenharmony_ci __u8 *cb8; 738c2ecf20Sopenharmony_ci 748c2ecf20Sopenharmony_ci __builtin_preserve_access_index(({ 758c2ecf20Sopenharmony_ci users = skb->users.refs.counter; 768c2ecf20Sopenharmony_ci data = skb->data; 778c2ecf20Sopenharmony_ci dev = skb->dev; 788c2ecf20Sopenharmony_ci ptr = dev->ifalias->rcuhead.next; 798c2ecf20Sopenharmony_ci func = ptr->func; 808c2ecf20Sopenharmony_ci cb8 = (__u8 *)&skb->cb; 818c2ecf20Sopenharmony_ci cb32 = (__u32 *)&skb->cb; 828c2ecf20Sopenharmony_ci })); 838c2ecf20Sopenharmony_ci 848c2ecf20Sopenharmony_ci meta.ifindex = _(dev->ifindex); 858c2ecf20Sopenharmony_ci meta.cb8_0 = cb8[8]; 868c2ecf20Sopenharmony_ci meta.cb32_0 = cb32[2]; 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_ci bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); 898c2ecf20Sopenharmony_ci pkt_type &= 7; 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_ci /* read eth proto */ 928c2ecf20Sopenharmony_ci bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci bpf_printk("rcuhead.next %llx func %llx\n", ptr, func); 958c2ecf20Sopenharmony_ci bpf_printk("skb->len %d users %d pkt_type %x\n", 968c2ecf20Sopenharmony_ci _(skb->len), users, pkt_type); 978c2ecf20Sopenharmony_ci bpf_printk("skb->queue_mapping %d\n", _(skb->queue_mapping)); 988c2ecf20Sopenharmony_ci bpf_printk("dev->ifindex %d data %llx pkt_data %x\n", 998c2ecf20Sopenharmony_ci meta.ifindex, data, pkt_data); 1008c2ecf20Sopenharmony_ci bpf_printk("cb8_0:%x cb32_0:%x\n", meta.cb8_0, meta.cb32_0); 1018c2ecf20Sopenharmony_ci 1028c2ecf20Sopenharmony_ci if (users != 1 || pkt_data != bpf_htons(0x86dd) || meta.ifindex != 1) 1038c2ecf20Sopenharmony_ci /* raw tp ignores return value */ 1048c2ecf20Sopenharmony_ci return 0; 1058c2ecf20Sopenharmony_ci 1068c2ecf20Sopenharmony_ci /* send first 72 byte of the packet to user space */ 1078c2ecf20Sopenharmony_ci bpf_skb_output(skb, &perf_buf_map, (72ull << 32) | BPF_F_CURRENT_CPU, 1088c2ecf20Sopenharmony_ci &meta, sizeof(meta)); 1098c2ecf20Sopenharmony_ci return 0; 1108c2ecf20Sopenharmony_ci} 1118c2ecf20Sopenharmony_ci 1128c2ecf20Sopenharmony_cistatic volatile struct { 1138c2ecf20Sopenharmony_ci bool fentry_test_ok; 1148c2ecf20Sopenharmony_ci bool fexit_test_ok; 1158c2ecf20Sopenharmony_ci} result; 1168c2ecf20Sopenharmony_ci 1178c2ecf20Sopenharmony_ciSEC("fentry/eth_type_trans") 1188c2ecf20Sopenharmony_ciint BPF_PROG(fentry_eth_type_trans, struct sk_buff *skb, struct net_device *dev, 1198c2ecf20Sopenharmony_ci unsigned short protocol) 1208c2ecf20Sopenharmony_ci{ 1218c2ecf20Sopenharmony_ci int len, ifindex; 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci __builtin_preserve_access_index(({ 1248c2ecf20Sopenharmony_ci len = skb->len; 1258c2ecf20Sopenharmony_ci ifindex = dev->ifindex; 1268c2ecf20Sopenharmony_ci })); 1278c2ecf20Sopenharmony_ci 1288c2ecf20Sopenharmony_ci /* fentry sees full packet including L2 header */ 1298c2ecf20Sopenharmony_ci if (len != 74 || ifindex != 1) 1308c2ecf20Sopenharmony_ci return 0; 1318c2ecf20Sopenharmony_ci result.fentry_test_ok = true; 1328c2ecf20Sopenharmony_ci return 0; 1338c2ecf20Sopenharmony_ci} 1348c2ecf20Sopenharmony_ci 1358c2ecf20Sopenharmony_ciSEC("fexit/eth_type_trans") 1368c2ecf20Sopenharmony_ciint BPF_PROG(fexit_eth_type_trans, struct sk_buff *skb, struct net_device *dev, 1378c2ecf20Sopenharmony_ci unsigned short protocol) 1388c2ecf20Sopenharmony_ci{ 1398c2ecf20Sopenharmony_ci int len, ifindex; 1408c2ecf20Sopenharmony_ci 1418c2ecf20Sopenharmony_ci __builtin_preserve_access_index(({ 1428c2ecf20Sopenharmony_ci len = skb->len; 1438c2ecf20Sopenharmony_ci ifindex = dev->ifindex; 1448c2ecf20Sopenharmony_ci })); 1458c2ecf20Sopenharmony_ci 1468c2ecf20Sopenharmony_ci /* fexit sees packet without L2 header that eth_type_trans should have 1478c2ecf20Sopenharmony_ci * consumed. 1488c2ecf20Sopenharmony_ci */ 1498c2ecf20Sopenharmony_ci if (len != 60 || protocol != bpf_htons(0x86dd) || ifindex != 1) 1508c2ecf20Sopenharmony_ci return 0; 1518c2ecf20Sopenharmony_ci result.fexit_test_ok = true; 1528c2ecf20Sopenharmony_ci return 0; 1538c2ecf20Sopenharmony_ci} 154