18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci// Copyright (c) 2019 Facebook
38c2ecf20Sopenharmony_ci#include <linux/bpf.h>
48c2ecf20Sopenharmony_ci#include <stdbool.h>
58c2ecf20Sopenharmony_ci#include <bpf/bpf_helpers.h>
68c2ecf20Sopenharmony_ci#include <bpf/bpf_endian.h>
78c2ecf20Sopenharmony_ci#include <bpf/bpf_tracing.h>
88c2ecf20Sopenharmony_ci
98c2ecf20Sopenharmony_cichar _license[] SEC("license") = "GPL";
108c2ecf20Sopenharmony_cistruct {
118c2ecf20Sopenharmony_ci	__uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY);
128c2ecf20Sopenharmony_ci	__uint(key_size, sizeof(int));
138c2ecf20Sopenharmony_ci	__uint(value_size, sizeof(int));
148c2ecf20Sopenharmony_ci} perf_buf_map SEC(".maps");
158c2ecf20Sopenharmony_ci
168c2ecf20Sopenharmony_ci#define _(P) (__builtin_preserve_access_index(P))
178c2ecf20Sopenharmony_ci
188c2ecf20Sopenharmony_ci/* define few struct-s that bpf program needs to access */
198c2ecf20Sopenharmony_cistruct callback_head {
208c2ecf20Sopenharmony_ci	struct callback_head *next;
218c2ecf20Sopenharmony_ci	void (*func)(struct callback_head *head);
228c2ecf20Sopenharmony_ci};
238c2ecf20Sopenharmony_cistruct dev_ifalias {
248c2ecf20Sopenharmony_ci	struct callback_head rcuhead;
258c2ecf20Sopenharmony_ci};
268c2ecf20Sopenharmony_ci
278c2ecf20Sopenharmony_cistruct net_device /* same as kernel's struct net_device */ {
288c2ecf20Sopenharmony_ci	int ifindex;
298c2ecf20Sopenharmony_ci	struct dev_ifalias *ifalias;
308c2ecf20Sopenharmony_ci};
318c2ecf20Sopenharmony_ci
328c2ecf20Sopenharmony_citypedef struct {
338c2ecf20Sopenharmony_ci        int counter;
348c2ecf20Sopenharmony_ci} atomic_t;
358c2ecf20Sopenharmony_citypedef struct refcount_struct {
368c2ecf20Sopenharmony_ci        atomic_t refs;
378c2ecf20Sopenharmony_ci} refcount_t;
388c2ecf20Sopenharmony_ci
398c2ecf20Sopenharmony_cistruct sk_buff {
408c2ecf20Sopenharmony_ci	/* field names and sizes should match to those in the kernel */
418c2ecf20Sopenharmony_ci	unsigned int len, data_len;
428c2ecf20Sopenharmony_ci	__u16 mac_len, hdr_len, queue_mapping;
438c2ecf20Sopenharmony_ci	struct net_device *dev;
448c2ecf20Sopenharmony_ci	/* order of the fields doesn't matter */
458c2ecf20Sopenharmony_ci	refcount_t users;
468c2ecf20Sopenharmony_ci	unsigned char *data;
478c2ecf20Sopenharmony_ci	char __pkt_type_offset[0];
488c2ecf20Sopenharmony_ci	char cb[48];
498c2ecf20Sopenharmony_ci};
508c2ecf20Sopenharmony_ci
518c2ecf20Sopenharmony_cistruct meta {
528c2ecf20Sopenharmony_ci	int ifindex;
538c2ecf20Sopenharmony_ci	__u32 cb32_0;
548c2ecf20Sopenharmony_ci	__u8 cb8_0;
558c2ecf20Sopenharmony_ci};
568c2ecf20Sopenharmony_ci
578c2ecf20Sopenharmony_ci/* TRACE_EVENT(kfree_skb,
588c2ecf20Sopenharmony_ci *         TP_PROTO(struct sk_buff *skb, void *location),
598c2ecf20Sopenharmony_ci */
608c2ecf20Sopenharmony_ciSEC("tp_btf/kfree_skb")
618c2ecf20Sopenharmony_ciint BPF_PROG(trace_kfree_skb, struct sk_buff *skb, void *location)
628c2ecf20Sopenharmony_ci{
638c2ecf20Sopenharmony_ci	struct net_device *dev;
648c2ecf20Sopenharmony_ci	struct callback_head *ptr;
658c2ecf20Sopenharmony_ci	void *func;
668c2ecf20Sopenharmony_ci	int users;
678c2ecf20Sopenharmony_ci	unsigned char *data;
688c2ecf20Sopenharmony_ci	unsigned short pkt_data;
698c2ecf20Sopenharmony_ci	struct meta meta = {};
708c2ecf20Sopenharmony_ci	char pkt_type;
718c2ecf20Sopenharmony_ci	__u32 *cb32;
728c2ecf20Sopenharmony_ci	__u8 *cb8;
738c2ecf20Sopenharmony_ci
748c2ecf20Sopenharmony_ci	__builtin_preserve_access_index(({
758c2ecf20Sopenharmony_ci		users = skb->users.refs.counter;
768c2ecf20Sopenharmony_ci		data = skb->data;
778c2ecf20Sopenharmony_ci		dev = skb->dev;
788c2ecf20Sopenharmony_ci		ptr = dev->ifalias->rcuhead.next;
798c2ecf20Sopenharmony_ci		func = ptr->func;
808c2ecf20Sopenharmony_ci		cb8 = (__u8 *)&skb->cb;
818c2ecf20Sopenharmony_ci		cb32 = (__u32 *)&skb->cb;
828c2ecf20Sopenharmony_ci	}));
838c2ecf20Sopenharmony_ci
848c2ecf20Sopenharmony_ci	meta.ifindex = _(dev->ifindex);
858c2ecf20Sopenharmony_ci	meta.cb8_0 = cb8[8];
868c2ecf20Sopenharmony_ci	meta.cb32_0 = cb32[2];
878c2ecf20Sopenharmony_ci
888c2ecf20Sopenharmony_ci	bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset));
898c2ecf20Sopenharmony_ci	pkt_type &= 7;
908c2ecf20Sopenharmony_ci
918c2ecf20Sopenharmony_ci	/* read eth proto */
928c2ecf20Sopenharmony_ci	bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12);
938c2ecf20Sopenharmony_ci
948c2ecf20Sopenharmony_ci	bpf_printk("rcuhead.next %llx func %llx\n", ptr, func);
958c2ecf20Sopenharmony_ci	bpf_printk("skb->len %d users %d pkt_type %x\n",
968c2ecf20Sopenharmony_ci		   _(skb->len), users, pkt_type);
978c2ecf20Sopenharmony_ci	bpf_printk("skb->queue_mapping %d\n", _(skb->queue_mapping));
988c2ecf20Sopenharmony_ci	bpf_printk("dev->ifindex %d data %llx pkt_data %x\n",
998c2ecf20Sopenharmony_ci		   meta.ifindex, data, pkt_data);
1008c2ecf20Sopenharmony_ci	bpf_printk("cb8_0:%x cb32_0:%x\n", meta.cb8_0, meta.cb32_0);
1018c2ecf20Sopenharmony_ci
1028c2ecf20Sopenharmony_ci	if (users != 1 || pkt_data != bpf_htons(0x86dd) || meta.ifindex != 1)
1038c2ecf20Sopenharmony_ci		/* raw tp ignores return value */
1048c2ecf20Sopenharmony_ci		return 0;
1058c2ecf20Sopenharmony_ci
1068c2ecf20Sopenharmony_ci	/* send first 72 byte of the packet to user space */
1078c2ecf20Sopenharmony_ci	bpf_skb_output(skb, &perf_buf_map, (72ull << 32) | BPF_F_CURRENT_CPU,
1088c2ecf20Sopenharmony_ci		       &meta, sizeof(meta));
1098c2ecf20Sopenharmony_ci	return 0;
1108c2ecf20Sopenharmony_ci}
1118c2ecf20Sopenharmony_ci
1128c2ecf20Sopenharmony_cistatic volatile struct {
1138c2ecf20Sopenharmony_ci	bool fentry_test_ok;
1148c2ecf20Sopenharmony_ci	bool fexit_test_ok;
1158c2ecf20Sopenharmony_ci} result;
1168c2ecf20Sopenharmony_ci
1178c2ecf20Sopenharmony_ciSEC("fentry/eth_type_trans")
1188c2ecf20Sopenharmony_ciint BPF_PROG(fentry_eth_type_trans, struct sk_buff *skb, struct net_device *dev,
1198c2ecf20Sopenharmony_ci	     unsigned short protocol)
1208c2ecf20Sopenharmony_ci{
1218c2ecf20Sopenharmony_ci	int len, ifindex;
1228c2ecf20Sopenharmony_ci
1238c2ecf20Sopenharmony_ci	__builtin_preserve_access_index(({
1248c2ecf20Sopenharmony_ci		len = skb->len;
1258c2ecf20Sopenharmony_ci		ifindex = dev->ifindex;
1268c2ecf20Sopenharmony_ci	}));
1278c2ecf20Sopenharmony_ci
1288c2ecf20Sopenharmony_ci	/* fentry sees full packet including L2 header */
1298c2ecf20Sopenharmony_ci	if (len != 74 || ifindex != 1)
1308c2ecf20Sopenharmony_ci		return 0;
1318c2ecf20Sopenharmony_ci	result.fentry_test_ok = true;
1328c2ecf20Sopenharmony_ci	return 0;
1338c2ecf20Sopenharmony_ci}
1348c2ecf20Sopenharmony_ci
1358c2ecf20Sopenharmony_ciSEC("fexit/eth_type_trans")
1368c2ecf20Sopenharmony_ciint BPF_PROG(fexit_eth_type_trans, struct sk_buff *skb, struct net_device *dev,
1378c2ecf20Sopenharmony_ci	     unsigned short protocol)
1388c2ecf20Sopenharmony_ci{
1398c2ecf20Sopenharmony_ci	int len, ifindex;
1408c2ecf20Sopenharmony_ci
1418c2ecf20Sopenharmony_ci	__builtin_preserve_access_index(({
1428c2ecf20Sopenharmony_ci		len = skb->len;
1438c2ecf20Sopenharmony_ci		ifindex = dev->ifindex;
1448c2ecf20Sopenharmony_ci	}));
1458c2ecf20Sopenharmony_ci
1468c2ecf20Sopenharmony_ci	/* fexit sees packet without L2 header that eth_type_trans should have
1478c2ecf20Sopenharmony_ci	 * consumed.
1488c2ecf20Sopenharmony_ci	 */
1498c2ecf20Sopenharmony_ci	if (len != 60 || protocol != bpf_htons(0x86dd) || ifindex != 1)
1508c2ecf20Sopenharmony_ci		return 0;
1518c2ecf20Sopenharmony_ci	result.fexit_test_ok = true;
1528c2ecf20Sopenharmony_ci	return 0;
1538c2ecf20Sopenharmony_ci}
154