Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v5.13-rc7 1266 lines 29 kB view raw
1// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) 2 3/* 4 * AF_XDP user-space access library. 5 * 6 * Copyright(c) 2018 - 2019 Intel Corporation. 7 * 8 * Author(s): Magnus Karlsson <magnus.karlsson@intel.com> 9 */ 10 11#include <errno.h> 12#include <stdlib.h> 13#include <string.h> 14#include <unistd.h> 15#include <arpa/inet.h> 16#include <asm/barrier.h> 17#include <linux/compiler.h> 18#include <linux/ethtool.h> 19#include <linux/filter.h> 20#include <linux/if_ether.h> 21#include <linux/if_packet.h> 22#include <linux/if_xdp.h> 23#include <linux/kernel.h> 24#include <linux/list.h> 25#include <linux/sockios.h> 26#include <net/if.h> 27#include <sys/ioctl.h> 28#include <sys/mman.h> 29#include <sys/socket.h> 30#include <sys/types.h> 31#include <linux/if_link.h> 32 33#include "bpf.h" 34#include "libbpf.h" 35#include "libbpf_internal.h" 36#include "xsk.h" 37 38#ifndef SOL_XDP 39 #define SOL_XDP 283 40#endif 41 42#ifndef AF_XDP 43 #define AF_XDP 44 44#endif 45 46#ifndef PF_XDP 47 #define PF_XDP AF_XDP 48#endif 49 50enum xsk_prog { 51 XSK_PROG_FALLBACK, 52 XSK_PROG_REDIRECT_FLAGS, 53}; 54 55struct xsk_umem { 56 struct xsk_ring_prod *fill_save; 57 struct xsk_ring_cons *comp_save; 58 char *umem_area; 59 struct xsk_umem_config config; 60 int fd; 61 int refcount; 62 struct list_head ctx_list; 63 bool rx_ring_setup_done; 64 bool tx_ring_setup_done; 65}; 66 67struct xsk_ctx { 68 struct xsk_ring_prod *fill; 69 struct xsk_ring_cons *comp; 70 __u32 queue_id; 71 struct xsk_umem *umem; 72 int refcount; 73 int ifindex; 74 struct list_head list; 75 int prog_fd; 76 int link_fd; 77 int xsks_map_fd; 78 char ifname[IFNAMSIZ]; 79 bool has_bpf_link; 80}; 81 82struct xsk_socket { 83 struct xsk_ring_cons *rx; 84 struct xsk_ring_prod *tx; 85 __u64 outstanding_tx; 86 struct xsk_ctx *ctx; 87 struct xsk_socket_config config; 88 int fd; 89}; 90 91struct xsk_nl_info { 92 bool xdp_prog_attached; 93 int ifindex; 94 int fd; 95}; 96 97/* Up until and including Linux 5.3 */ 98struct xdp_ring_offset_v1 { 99 __u64 producer; 100 __u64 consumer; 101 __u64 desc; 102}; 103 104/* Up until and including Linux 5.3 */ 105struct xdp_mmap_offsets_v1 { 106 struct xdp_ring_offset_v1 rx; 107 struct xdp_ring_offset_v1 tx; 108 struct xdp_ring_offset_v1 fr; 109 struct xdp_ring_offset_v1 cr; 110}; 111 112int xsk_umem__fd(const struct xsk_umem *umem) 113{ 114 return umem ? umem->fd : -EINVAL; 115} 116 117int xsk_socket__fd(const struct xsk_socket *xsk) 118{ 119 return xsk ? xsk->fd : -EINVAL; 120} 121 122static bool xsk_page_aligned(void *buffer) 123{ 124 unsigned long addr = (unsigned long)buffer; 125 126 return !(addr & (getpagesize() - 1)); 127} 128 129static void xsk_set_umem_config(struct xsk_umem_config *cfg, 130 const struct xsk_umem_config *usr_cfg) 131{ 132 if (!usr_cfg) { 133 cfg->fill_size = XSK_RING_PROD__DEFAULT_NUM_DESCS; 134 cfg->comp_size = XSK_RING_CONS__DEFAULT_NUM_DESCS; 135 cfg->frame_size = XSK_UMEM__DEFAULT_FRAME_SIZE; 136 cfg->frame_headroom = XSK_UMEM__DEFAULT_FRAME_HEADROOM; 137 cfg->flags = XSK_UMEM__DEFAULT_FLAGS; 138 return; 139 } 140 141 cfg->fill_size = usr_cfg->fill_size; 142 cfg->comp_size = usr_cfg->comp_size; 143 cfg->frame_size = usr_cfg->frame_size; 144 cfg->frame_headroom = usr_cfg->frame_headroom; 145 cfg->flags = usr_cfg->flags; 146} 147 148static int xsk_set_xdp_socket_config(struct xsk_socket_config *cfg, 149 const struct xsk_socket_config *usr_cfg) 150{ 151 if (!usr_cfg) { 152 cfg->rx_size = XSK_RING_CONS__DEFAULT_NUM_DESCS; 153 cfg->tx_size = XSK_RING_PROD__DEFAULT_NUM_DESCS; 154 cfg->libbpf_flags = 0; 155 cfg->xdp_flags = 0; 156 cfg->bind_flags = 0; 157 return 0; 158 } 159 160 if (usr_cfg->libbpf_flags & ~XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD) 161 return -EINVAL; 162 163 cfg->rx_size = usr_cfg->rx_size; 164 cfg->tx_size = usr_cfg->tx_size; 165 cfg->libbpf_flags = usr_cfg->libbpf_flags; 166 cfg->xdp_flags = usr_cfg->xdp_flags; 167 cfg->bind_flags = usr_cfg->bind_flags; 168 169 return 0; 170} 171 172static void xsk_mmap_offsets_v1(struct xdp_mmap_offsets *off) 173{ 174 struct xdp_mmap_offsets_v1 off_v1; 175 176 /* getsockopt on a kernel <= 5.3 has no flags fields. 177 * Copy over the offsets to the correct places in the >=5.4 format 178 * and put the flags where they would have been on that kernel. 179 */ 180 memcpy(&off_v1, off, sizeof(off_v1)); 181 182 off->rx.producer = off_v1.rx.producer; 183 off->rx.consumer = off_v1.rx.consumer; 184 off->rx.desc = off_v1.rx.desc; 185 off->rx.flags = off_v1.rx.consumer + sizeof(__u32); 186 187 off->tx.producer = off_v1.tx.producer; 188 off->tx.consumer = off_v1.tx.consumer; 189 off->tx.desc = off_v1.tx.desc; 190 off->tx.flags = off_v1.tx.consumer + sizeof(__u32); 191 192 off->fr.producer = off_v1.fr.producer; 193 off->fr.consumer = off_v1.fr.consumer; 194 off->fr.desc = off_v1.fr.desc; 195 off->fr.flags = off_v1.fr.consumer + sizeof(__u32); 196 197 off->cr.producer = off_v1.cr.producer; 198 off->cr.consumer = off_v1.cr.consumer; 199 off->cr.desc = off_v1.cr.desc; 200 off->cr.flags = off_v1.cr.consumer + sizeof(__u32); 201} 202 203static int xsk_get_mmap_offsets(int fd, struct xdp_mmap_offsets *off) 204{ 205 socklen_t optlen; 206 int err; 207 208 optlen = sizeof(*off); 209 err = getsockopt(fd, SOL_XDP, XDP_MMAP_OFFSETS, off, &optlen); 210 if (err) 211 return err; 212 213 if (optlen == sizeof(*off)) 214 return 0; 215 216 if (optlen == sizeof(struct xdp_mmap_offsets_v1)) { 217 xsk_mmap_offsets_v1(off); 218 return 0; 219 } 220 221 return -EINVAL; 222} 223 224static int xsk_create_umem_rings(struct xsk_umem *umem, int fd, 225 struct xsk_ring_prod *fill, 226 struct xsk_ring_cons *comp) 227{ 228 struct xdp_mmap_offsets off; 229 void *map; 230 int err; 231 232 err = setsockopt(fd, SOL_XDP, XDP_UMEM_FILL_RING, 233 &umem->config.fill_size, 234 sizeof(umem->config.fill_size)); 235 if (err) 236 return -errno; 237 238 err = setsockopt(fd, SOL_XDP, XDP_UMEM_COMPLETION_RING, 239 &umem->config.comp_size, 240 sizeof(umem->config.comp_size)); 241 if (err) 242 return -errno; 243 244 err = xsk_get_mmap_offsets(fd, &off); 245 if (err) 246 return -errno; 247 248 map = mmap(NULL, off.fr.desc + umem->config.fill_size * sizeof(__u64), 249 PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, fd, 250 XDP_UMEM_PGOFF_FILL_RING); 251 if (map == MAP_FAILED) 252 return -errno; 253 254 fill->mask = umem->config.fill_size - 1; 255 fill->size = umem->config.fill_size; 256 fill->producer = map + off.fr.producer; 257 fill->consumer = map + off.fr.consumer; 258 fill->flags = map + off.fr.flags; 259 fill->ring = map + off.fr.desc; 260 fill->cached_cons = umem->config.fill_size; 261 262 map = mmap(NULL, off.cr.desc + umem->config.comp_size * sizeof(__u64), 263 PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, fd, 264 XDP_UMEM_PGOFF_COMPLETION_RING); 265 if (map == MAP_FAILED) { 266 err = -errno; 267 goto out_mmap; 268 } 269 270 comp->mask = umem->config.comp_size - 1; 271 comp->size = umem->config.comp_size; 272 comp->producer = map + off.cr.producer; 273 comp->consumer = map + off.cr.consumer; 274 comp->flags = map + off.cr.flags; 275 comp->ring = map + off.cr.desc; 276 277 return 0; 278 279out_mmap: 280 munmap(map, off.fr.desc + umem->config.fill_size * sizeof(__u64)); 281 return err; 282} 283 284int xsk_umem__create_v0_0_4(struct xsk_umem **umem_ptr, void *umem_area, 285 __u64 size, struct xsk_ring_prod *fill, 286 struct xsk_ring_cons *comp, 287 const struct xsk_umem_config *usr_config) 288{ 289 struct xdp_umem_reg mr; 290 struct xsk_umem *umem; 291 int err; 292 293 if (!umem_area || !umem_ptr || !fill || !comp) 294 return -EFAULT; 295 if (!size && !xsk_page_aligned(umem_area)) 296 return -EINVAL; 297 298 umem = calloc(1, sizeof(*umem)); 299 if (!umem) 300 return -ENOMEM; 301 302 umem->fd = socket(AF_XDP, SOCK_RAW, 0); 303 if (umem->fd < 0) { 304 err = -errno; 305 goto out_umem_alloc; 306 } 307 308 umem->umem_area = umem_area; 309 INIT_LIST_HEAD(&umem->ctx_list); 310 xsk_set_umem_config(&umem->config, usr_config); 311 312 memset(&mr, 0, sizeof(mr)); 313 mr.addr = (uintptr_t)umem_area; 314 mr.len = size; 315 mr.chunk_size = umem->config.frame_size; 316 mr.headroom = umem->config.frame_headroom; 317 mr.flags = umem->config.flags; 318 319 err = setsockopt(umem->fd, SOL_XDP, XDP_UMEM_REG, &mr, sizeof(mr)); 320 if (err) { 321 err = -errno; 322 goto out_socket; 323 } 324 325 err = xsk_create_umem_rings(umem, umem->fd, fill, comp); 326 if (err) 327 goto out_socket; 328 329 umem->fill_save = fill; 330 umem->comp_save = comp; 331 *umem_ptr = umem; 332 return 0; 333 334out_socket: 335 close(umem->fd); 336out_umem_alloc: 337 free(umem); 338 return err; 339} 340 341struct xsk_umem_config_v1 { 342 __u32 fill_size; 343 __u32 comp_size; 344 __u32 frame_size; 345 __u32 frame_headroom; 346}; 347 348int xsk_umem__create_v0_0_2(struct xsk_umem **umem_ptr, void *umem_area, 349 __u64 size, struct xsk_ring_prod *fill, 350 struct xsk_ring_cons *comp, 351 const struct xsk_umem_config *usr_config) 352{ 353 struct xsk_umem_config config; 354 355 memcpy(&config, usr_config, sizeof(struct xsk_umem_config_v1)); 356 config.flags = 0; 357 358 return xsk_umem__create_v0_0_4(umem_ptr, umem_area, size, fill, comp, 359 &config); 360} 361COMPAT_VERSION(xsk_umem__create_v0_0_2, xsk_umem__create, LIBBPF_0.0.2) 362DEFAULT_VERSION(xsk_umem__create_v0_0_4, xsk_umem__create, LIBBPF_0.0.4) 363 364static enum xsk_prog get_xsk_prog(void) 365{ 366 enum xsk_prog detected = XSK_PROG_FALLBACK; 367 struct bpf_load_program_attr prog_attr; 368 struct bpf_create_map_attr map_attr; 369 __u32 size_out, retval, duration; 370 char data_in = 0, data_out; 371 struct bpf_insn insns[] = { 372 BPF_LD_MAP_FD(BPF_REG_1, 0), 373 BPF_MOV64_IMM(BPF_REG_2, 0), 374 BPF_MOV64_IMM(BPF_REG_3, XDP_PASS), 375 BPF_EMIT_CALL(BPF_FUNC_redirect_map), 376 BPF_EXIT_INSN(), 377 }; 378 int prog_fd, map_fd, ret; 379 380 memset(&map_attr, 0, sizeof(map_attr)); 381 map_attr.map_type = BPF_MAP_TYPE_XSKMAP; 382 map_attr.key_size = sizeof(int); 383 map_attr.value_size = sizeof(int); 384 map_attr.max_entries = 1; 385 386 map_fd = bpf_create_map_xattr(&map_attr); 387 if (map_fd < 0) 388 return detected; 389 390 insns[0].imm = map_fd; 391 392 memset(&prog_attr, 0, sizeof(prog_attr)); 393 prog_attr.prog_type = BPF_PROG_TYPE_XDP; 394 prog_attr.insns = insns; 395 prog_attr.insns_cnt = ARRAY_SIZE(insns); 396 prog_attr.license = "GPL"; 397 398 prog_fd = bpf_load_program_xattr(&prog_attr, NULL, 0); 399 if (prog_fd < 0) { 400 close(map_fd); 401 return detected; 402 } 403 404 ret = bpf_prog_test_run(prog_fd, 0, &data_in, 1, &data_out, &size_out, &retval, &duration); 405 if (!ret && retval == XDP_PASS) 406 detected = XSK_PROG_REDIRECT_FLAGS; 407 close(prog_fd); 408 close(map_fd); 409 return detected; 410} 411 412static int xsk_load_xdp_prog(struct xsk_socket *xsk) 413{ 414 static const int log_buf_size = 16 * 1024; 415 struct xsk_ctx *ctx = xsk->ctx; 416 char log_buf[log_buf_size]; 417 int prog_fd; 418 419 /* This is the fallback C-program: 420 * SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) 421 * { 422 * int ret, index = ctx->rx_queue_index; 423 * 424 * // A set entry here means that the correspnding queue_id 425 * // has an active AF_XDP socket bound to it. 426 * ret = bpf_redirect_map(&xsks_map, index, XDP_PASS); 427 * if (ret > 0) 428 * return ret; 429 * 430 * // Fallback for pre-5.3 kernels, not supporting default 431 * // action in the flags parameter. 432 * if (bpf_map_lookup_elem(&xsks_map, &index)) 433 * return bpf_redirect_map(&xsks_map, index, 0); 434 * return XDP_PASS; 435 * } 436 */ 437 struct bpf_insn prog[] = { 438 /* r2 = *(u32 *)(r1 + 16) */ 439 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 16), 440 /* *(u32 *)(r10 - 4) = r2 */ 441 BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_2, -4), 442 /* r1 = xskmap[] */ 443 BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), 444 /* r3 = XDP_PASS */ 445 BPF_MOV64_IMM(BPF_REG_3, 2), 446 /* call bpf_redirect_map */ 447 BPF_EMIT_CALL(BPF_FUNC_redirect_map), 448 /* if w0 != 0 goto pc+13 */ 449 BPF_JMP32_IMM(BPF_JSGT, BPF_REG_0, 0, 13), 450 /* r2 = r10 */ 451 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 452 /* r2 += -4 */ 453 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4), 454 /* r1 = xskmap[] */ 455 BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), 456 /* call bpf_map_lookup_elem */ 457 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem), 458 /* r1 = r0 */ 459 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), 460 /* r0 = XDP_PASS */ 461 BPF_MOV64_IMM(BPF_REG_0, 2), 462 /* if r1 == 0 goto pc+5 */ 463 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 5), 464 /* r2 = *(u32 *)(r10 - 4) */ 465 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_10, -4), 466 /* r1 = xskmap[] */ 467 BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), 468 /* r3 = 0 */ 469 BPF_MOV64_IMM(BPF_REG_3, 0), 470 /* call bpf_redirect_map */ 471 BPF_EMIT_CALL(BPF_FUNC_redirect_map), 472 /* The jumps are to this instruction */ 473 BPF_EXIT_INSN(), 474 }; 475 476 /* This is the post-5.3 kernel C-program: 477 * SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) 478 * { 479 * return bpf_redirect_map(&xsks_map, ctx->rx_queue_index, XDP_PASS); 480 * } 481 */ 482 struct bpf_insn prog_redirect_flags[] = { 483 /* r2 = *(u32 *)(r1 + 16) */ 484 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 16), 485 /* r1 = xskmap[] */ 486 BPF_LD_MAP_FD(BPF_REG_1, ctx->xsks_map_fd), 487 /* r3 = XDP_PASS */ 488 BPF_MOV64_IMM(BPF_REG_3, 2), 489 /* call bpf_redirect_map */ 490 BPF_EMIT_CALL(BPF_FUNC_redirect_map), 491 BPF_EXIT_INSN(), 492 }; 493 size_t insns_cnt[] = {sizeof(prog) / sizeof(struct bpf_insn), 494 sizeof(prog_redirect_flags) / sizeof(struct bpf_insn), 495 }; 496 struct bpf_insn *progs[] = {prog, prog_redirect_flags}; 497 enum xsk_prog option = get_xsk_prog(); 498 499 prog_fd = bpf_load_program(BPF_PROG_TYPE_XDP, progs[option], insns_cnt[option], 500 "LGPL-2.1 or BSD-2-Clause", 0, log_buf, 501 log_buf_size); 502 if (prog_fd < 0) { 503 pr_warn("BPF log buffer:\n%s", log_buf); 504 return prog_fd; 505 } 506 507 ctx->prog_fd = prog_fd; 508 return 0; 509} 510 511static int xsk_create_bpf_link(struct xsk_socket *xsk) 512{ 513 DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts); 514 struct xsk_ctx *ctx = xsk->ctx; 515 __u32 prog_id = 0; 516 int link_fd; 517 int err; 518 519 err = bpf_get_link_xdp_id(ctx->ifindex, &prog_id, xsk->config.xdp_flags); 520 if (err) { 521 pr_warn("getting XDP prog id failed\n"); 522 return err; 523 } 524 525 /* if there's a netlink-based XDP prog loaded on interface, bail out 526 * and ask user to do the removal by himself 527 */ 528 if (prog_id) { 529 pr_warn("Netlink-based XDP prog detected, please unload it in order to launch AF_XDP prog\n"); 530 return -EINVAL; 531 } 532 533 opts.flags = xsk->config.xdp_flags & ~(XDP_FLAGS_UPDATE_IF_NOEXIST | XDP_FLAGS_REPLACE); 534 535 link_fd = bpf_link_create(ctx->prog_fd, ctx->ifindex, BPF_XDP, &opts); 536 if (link_fd < 0) { 537 pr_warn("bpf_link_create failed: %s\n", strerror(errno)); 538 return link_fd; 539 } 540 541 ctx->link_fd = link_fd; 542 return 0; 543} 544 545static int xsk_get_max_queues(struct xsk_socket *xsk) 546{ 547 struct ethtool_channels channels = { .cmd = ETHTOOL_GCHANNELS }; 548 struct xsk_ctx *ctx = xsk->ctx; 549 struct ifreq ifr = {}; 550 int fd, err, ret; 551 552 fd = socket(AF_LOCAL, SOCK_DGRAM, 0); 553 if (fd < 0) 554 return -errno; 555 556 ifr.ifr_data = (void *)&channels; 557 memcpy(ifr.ifr_name, ctx->ifname, IFNAMSIZ - 1); 558 ifr.ifr_name[IFNAMSIZ - 1] = '\0'; 559 err = ioctl(fd, SIOCETHTOOL, &ifr); 560 if (err && errno != EOPNOTSUPP) { 561 ret = -errno; 562 goto out; 563 } 564 565 if (err) { 566 /* If the device says it has no channels, then all traffic 567 * is sent to a single stream, so max queues = 1. 568 */ 569 ret = 1; 570 } else { 571 /* Take the max of rx, tx, combined. Drivers return 572 * the number of channels in different ways. 573 */ 574 ret = max(channels.max_rx, channels.max_tx); 575 ret = max(ret, (int)channels.max_combined); 576 } 577 578out: 579 close(fd); 580 return ret; 581} 582 583static int xsk_create_bpf_maps(struct xsk_socket *xsk) 584{ 585 struct xsk_ctx *ctx = xsk->ctx; 586 int max_queues; 587 int fd; 588 589 max_queues = xsk_get_max_queues(xsk); 590 if (max_queues < 0) 591 return max_queues; 592 593 fd = bpf_create_map_name(BPF_MAP_TYPE_XSKMAP, "xsks_map", 594 sizeof(int), sizeof(int), max_queues, 0); 595 if (fd < 0) 596 return fd; 597 598 ctx->xsks_map_fd = fd; 599 600 return 0; 601} 602 603static void xsk_delete_bpf_maps(struct xsk_socket *xsk) 604{ 605 struct xsk_ctx *ctx = xsk->ctx; 606 607 bpf_map_delete_elem(ctx->xsks_map_fd, &ctx->queue_id); 608 close(ctx->xsks_map_fd); 609} 610 611static int xsk_lookup_bpf_maps(struct xsk_socket *xsk) 612{ 613 __u32 i, *map_ids, num_maps, prog_len = sizeof(struct bpf_prog_info); 614 __u32 map_len = sizeof(struct bpf_map_info); 615 struct bpf_prog_info prog_info = {}; 616 struct xsk_ctx *ctx = xsk->ctx; 617 struct bpf_map_info map_info; 618 int fd, err; 619 620 err = bpf_obj_get_info_by_fd(ctx->prog_fd, &prog_info, &prog_len); 621 if (err) 622 return err; 623 624 num_maps = prog_info.nr_map_ids; 625 626 map_ids = calloc(prog_info.nr_map_ids, sizeof(*map_ids)); 627 if (!map_ids) 628 return -ENOMEM; 629 630 memset(&prog_info, 0, prog_len); 631 prog_info.nr_map_ids = num_maps; 632 prog_info.map_ids = (__u64)(unsigned long)map_ids; 633 634 err = bpf_obj_get_info_by_fd(ctx->prog_fd, &prog_info, &prog_len); 635 if (err) 636 goto out_map_ids; 637 638 ctx->xsks_map_fd = -1; 639 640 for (i = 0; i < prog_info.nr_map_ids; i++) { 641 fd = bpf_map_get_fd_by_id(map_ids[i]); 642 if (fd < 0) 643 continue; 644 645 memset(&map_info, 0, map_len); 646 err = bpf_obj_get_info_by_fd(fd, &map_info, &map_len); 647 if (err) { 648 close(fd); 649 continue; 650 } 651 652 if (!strncmp(map_info.name, "xsks_map", sizeof(map_info.name))) { 653 ctx->xsks_map_fd = fd; 654 break; 655 } 656 657 close(fd); 658 } 659 660 if (ctx->xsks_map_fd == -1) 661 err = -ENOENT; 662 663out_map_ids: 664 free(map_ids); 665 return err; 666} 667 668static int xsk_set_bpf_maps(struct xsk_socket *xsk) 669{ 670 struct xsk_ctx *ctx = xsk->ctx; 671 672 return bpf_map_update_elem(ctx->xsks_map_fd, &ctx->queue_id, 673 &xsk->fd, 0); 674} 675 676static int xsk_link_lookup(int ifindex, __u32 *prog_id, int *link_fd) 677{ 678 struct bpf_link_info link_info; 679 __u32 link_len; 680 __u32 id = 0; 681 int err; 682 int fd; 683 684 while (true) { 685 err = bpf_link_get_next_id(id, &id); 686 if (err) { 687 if (errno == ENOENT) { 688 err = 0; 689 break; 690 } 691 pr_warn("can't get next link: %s\n", strerror(errno)); 692 break; 693 } 694 695 fd = bpf_link_get_fd_by_id(id); 696 if (fd < 0) { 697 if (errno == ENOENT) 698 continue; 699 pr_warn("can't get link by id (%u): %s\n", id, strerror(errno)); 700 err = -errno; 701 break; 702 } 703 704 link_len = sizeof(struct bpf_link_info); 705 memset(&link_info, 0, link_len); 706 err = bpf_obj_get_info_by_fd(fd, &link_info, &link_len); 707 if (err) { 708 pr_warn("can't get link info: %s\n", strerror(errno)); 709 close(fd); 710 break; 711 } 712 if (link_info.type == BPF_LINK_TYPE_XDP) { 713 if (link_info.xdp.ifindex == ifindex) { 714 *link_fd = fd; 715 if (prog_id) 716 *prog_id = link_info.prog_id; 717 break; 718 } 719 } 720 close(fd); 721 } 722 723 return err; 724} 725 726static bool xsk_probe_bpf_link(void) 727{ 728 DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts, 729 .flags = XDP_FLAGS_SKB_MODE); 730 struct bpf_load_program_attr prog_attr; 731 struct bpf_insn insns[2] = { 732 BPF_MOV64_IMM(BPF_REG_0, XDP_PASS), 733 BPF_EXIT_INSN() 734 }; 735 int prog_fd, link_fd = -1; 736 int ifindex_lo = 1; 737 bool ret = false; 738 int err; 739 740 err = xsk_link_lookup(ifindex_lo, NULL, &link_fd); 741 if (err) 742 return ret; 743 744 if (link_fd >= 0) 745 return true; 746 747 memset(&prog_attr, 0, sizeof(prog_attr)); 748 prog_attr.prog_type = BPF_PROG_TYPE_XDP; 749 prog_attr.insns = insns; 750 prog_attr.insns_cnt = ARRAY_SIZE(insns); 751 prog_attr.license = "GPL"; 752 753 prog_fd = bpf_load_program_xattr(&prog_attr, NULL, 0); 754 if (prog_fd < 0) 755 return ret; 756 757 link_fd = bpf_link_create(prog_fd, ifindex_lo, BPF_XDP, &opts); 758 close(prog_fd); 759 760 if (link_fd >= 0) { 761 ret = true; 762 close(link_fd); 763 } 764 765 return ret; 766} 767 768static int xsk_create_xsk_struct(int ifindex, struct xsk_socket *xsk) 769{ 770 char ifname[IFNAMSIZ]; 771 struct xsk_ctx *ctx; 772 char *interface; 773 774 ctx = calloc(1, sizeof(*ctx)); 775 if (!ctx) 776 return -ENOMEM; 777 778 interface = if_indextoname(ifindex, &ifname[0]); 779 if (!interface) { 780 free(ctx); 781 return -errno; 782 } 783 784 ctx->ifindex = ifindex; 785 memcpy(ctx->ifname, ifname, IFNAMSIZ -1); 786 ctx->ifname[IFNAMSIZ - 1] = 0; 787 788 xsk->ctx = ctx; 789 xsk->ctx->has_bpf_link = xsk_probe_bpf_link(); 790 791 return 0; 792} 793 794static int xsk_init_xdp_res(struct xsk_socket *xsk, 795 int *xsks_map_fd) 796{ 797 struct xsk_ctx *ctx = xsk->ctx; 798 int err; 799 800 err = xsk_create_bpf_maps(xsk); 801 if (err) 802 return err; 803 804 err = xsk_load_xdp_prog(xsk); 805 if (err) 806 goto err_load_xdp_prog; 807 808 if (ctx->has_bpf_link) 809 err = xsk_create_bpf_link(xsk); 810 else 811 err = bpf_set_link_xdp_fd(xsk->ctx->ifindex, ctx->prog_fd, 812 xsk->config.xdp_flags); 813 814 if (err) 815 goto err_attach_xdp_prog; 816 817 if (!xsk->rx) 818 return err; 819 820 err = xsk_set_bpf_maps(xsk); 821 if (err) 822 goto err_set_bpf_maps; 823 824 return err; 825 826err_set_bpf_maps: 827 if (ctx->has_bpf_link) 828 close(ctx->link_fd); 829 else 830 bpf_set_link_xdp_fd(ctx->ifindex, -1, 0); 831err_attach_xdp_prog: 832 close(ctx->prog_fd); 833err_load_xdp_prog: 834 xsk_delete_bpf_maps(xsk); 835 return err; 836} 837 838static int xsk_lookup_xdp_res(struct xsk_socket *xsk, int *xsks_map_fd, int prog_id) 839{ 840 struct xsk_ctx *ctx = xsk->ctx; 841 int err; 842 843 ctx->prog_fd = bpf_prog_get_fd_by_id(prog_id); 844 if (ctx->prog_fd < 0) { 845 err = -errno; 846 goto err_prog_fd; 847 } 848 err = xsk_lookup_bpf_maps(xsk); 849 if (err) 850 goto err_lookup_maps; 851 852 if (!xsk->rx) 853 return err; 854 855 err = xsk_set_bpf_maps(xsk); 856 if (err) 857 goto err_set_maps; 858 859 return err; 860 861err_set_maps: 862 close(ctx->xsks_map_fd); 863err_lookup_maps: 864 close(ctx->prog_fd); 865err_prog_fd: 866 if (ctx->has_bpf_link) 867 close(ctx->link_fd); 868 return err; 869} 870 871static int __xsk_setup_xdp_prog(struct xsk_socket *_xdp, int *xsks_map_fd) 872{ 873 struct xsk_socket *xsk = _xdp; 874 struct xsk_ctx *ctx = xsk->ctx; 875 __u32 prog_id = 0; 876 int err; 877 878 if (ctx->has_bpf_link) 879 err = xsk_link_lookup(ctx->ifindex, &prog_id, &ctx->link_fd); 880 else 881 err = bpf_get_link_xdp_id(ctx->ifindex, &prog_id, xsk->config.xdp_flags); 882 883 if (err) 884 return err; 885 886 err = !prog_id ? xsk_init_xdp_res(xsk, xsks_map_fd) : 887 xsk_lookup_xdp_res(xsk, xsks_map_fd, prog_id); 888 889 if (!err && xsks_map_fd) 890 *xsks_map_fd = ctx->xsks_map_fd; 891 892 return err; 893} 894 895static struct xsk_ctx *xsk_get_ctx(struct xsk_umem *umem, int ifindex, 896 __u32 queue_id) 897{ 898 struct xsk_ctx *ctx; 899 900 if (list_empty(&umem->ctx_list)) 901 return NULL; 902 903 list_for_each_entry(ctx, &umem->ctx_list, list) { 904 if (ctx->ifindex == ifindex && ctx->queue_id == queue_id) { 905 ctx->refcount++; 906 return ctx; 907 } 908 } 909 910 return NULL; 911} 912 913static void xsk_put_ctx(struct xsk_ctx *ctx, bool unmap) 914{ 915 struct xsk_umem *umem = ctx->umem; 916 struct xdp_mmap_offsets off; 917 int err; 918 919 if (--ctx->refcount) 920 return; 921 922 if (!unmap) 923 goto out_free; 924 925 err = xsk_get_mmap_offsets(umem->fd, &off); 926 if (err) 927 goto out_free; 928 929 munmap(ctx->fill->ring - off.fr.desc, off.fr.desc + umem->config.fill_size * 930 sizeof(__u64)); 931 munmap(ctx->comp->ring - off.cr.desc, off.cr.desc + umem->config.comp_size * 932 sizeof(__u64)); 933 934out_free: 935 list_del(&ctx->list); 936 free(ctx); 937} 938 939static struct xsk_ctx *xsk_create_ctx(struct xsk_socket *xsk, 940 struct xsk_umem *umem, int ifindex, 941 const char *ifname, __u32 queue_id, 942 struct xsk_ring_prod *fill, 943 struct xsk_ring_cons *comp) 944{ 945 struct xsk_ctx *ctx; 946 int err; 947 948 ctx = calloc(1, sizeof(*ctx)); 949 if (!ctx) 950 return NULL; 951 952 if (!umem->fill_save) { 953 err = xsk_create_umem_rings(umem, xsk->fd, fill, comp); 954 if (err) { 955 free(ctx); 956 return NULL; 957 } 958 } else if (umem->fill_save != fill || umem->comp_save != comp) { 959 /* Copy over rings to new structs. */ 960 memcpy(fill, umem->fill_save, sizeof(*fill)); 961 memcpy(comp, umem->comp_save, sizeof(*comp)); 962 } 963 964 ctx->ifindex = ifindex; 965 ctx->refcount = 1; 966 ctx->umem = umem; 967 ctx->queue_id = queue_id; 968 memcpy(ctx->ifname, ifname, IFNAMSIZ - 1); 969 ctx->ifname[IFNAMSIZ - 1] = '\0'; 970 971 ctx->fill = fill; 972 ctx->comp = comp; 973 list_add(&ctx->list, &umem->ctx_list); 974 return ctx; 975} 976 977static void xsk_destroy_xsk_struct(struct xsk_socket *xsk) 978{ 979 free(xsk->ctx); 980 free(xsk); 981} 982 983int xsk_socket__update_xskmap(struct xsk_socket *xsk, int fd) 984{ 985 xsk->ctx->xsks_map_fd = fd; 986 return xsk_set_bpf_maps(xsk); 987} 988 989int xsk_setup_xdp_prog(int ifindex, int *xsks_map_fd) 990{ 991 struct xsk_socket *xsk; 992 int res; 993 994 xsk = calloc(1, sizeof(*xsk)); 995 if (!xsk) 996 return -ENOMEM; 997 998 res = xsk_create_xsk_struct(ifindex, xsk); 999 if (res) { 1000 free(xsk); 1001 return -EINVAL; 1002 } 1003 1004 res = __xsk_setup_xdp_prog(xsk, xsks_map_fd); 1005 1006 xsk_destroy_xsk_struct(xsk); 1007 1008 return res; 1009} 1010 1011int xsk_socket__create_shared(struct xsk_socket **xsk_ptr, 1012 const char *ifname, 1013 __u32 queue_id, struct xsk_umem *umem, 1014 struct xsk_ring_cons *rx, 1015 struct xsk_ring_prod *tx, 1016 struct xsk_ring_prod *fill, 1017 struct xsk_ring_cons *comp, 1018 const struct xsk_socket_config *usr_config) 1019{ 1020 bool unmap, rx_setup_done = false, tx_setup_done = false; 1021 void *rx_map = NULL, *tx_map = NULL; 1022 struct sockaddr_xdp sxdp = {}; 1023 struct xdp_mmap_offsets off; 1024 struct xsk_socket *xsk; 1025 struct xsk_ctx *ctx; 1026 int err, ifindex; 1027 1028 if (!umem || !xsk_ptr || !(rx || tx)) 1029 return -EFAULT; 1030 1031 unmap = umem->fill_save != fill; 1032 1033 xsk = calloc(1, sizeof(*xsk)); 1034 if (!xsk) 1035 return -ENOMEM; 1036 1037 err = xsk_set_xdp_socket_config(&xsk->config, usr_config); 1038 if (err) 1039 goto out_xsk_alloc; 1040 1041 xsk->outstanding_tx = 0; 1042 ifindex = if_nametoindex(ifname); 1043 if (!ifindex) { 1044 err = -errno; 1045 goto out_xsk_alloc; 1046 } 1047 1048 if (umem->refcount++ > 0) { 1049 xsk->fd = socket(AF_XDP, SOCK_RAW, 0); 1050 if (xsk->fd < 0) { 1051 err = -errno; 1052 goto out_xsk_alloc; 1053 } 1054 } else { 1055 xsk->fd = umem->fd; 1056 rx_setup_done = umem->rx_ring_setup_done; 1057 tx_setup_done = umem->tx_ring_setup_done; 1058 } 1059 1060 ctx = xsk_get_ctx(umem, ifindex, queue_id); 1061 if (!ctx) { 1062 if (!fill || !comp) { 1063 err = -EFAULT; 1064 goto out_socket; 1065 } 1066 1067 ctx = xsk_create_ctx(xsk, umem, ifindex, ifname, queue_id, 1068 fill, comp); 1069 if (!ctx) { 1070 err = -ENOMEM; 1071 goto out_socket; 1072 } 1073 } 1074 xsk->ctx = ctx; 1075 xsk->ctx->has_bpf_link = xsk_probe_bpf_link(); 1076 1077 if (rx && !rx_setup_done) { 1078 err = setsockopt(xsk->fd, SOL_XDP, XDP_RX_RING, 1079 &xsk->config.rx_size, 1080 sizeof(xsk->config.rx_size)); 1081 if (err) { 1082 err = -errno; 1083 goto out_put_ctx; 1084 } 1085 if (xsk->fd == umem->fd) 1086 umem->rx_ring_setup_done = true; 1087 } 1088 if (tx && !tx_setup_done) { 1089 err = setsockopt(xsk->fd, SOL_XDP, XDP_TX_RING, 1090 &xsk->config.tx_size, 1091 sizeof(xsk->config.tx_size)); 1092 if (err) { 1093 err = -errno; 1094 goto out_put_ctx; 1095 } 1096 if (xsk->fd == umem->fd) 1097 umem->tx_ring_setup_done = true; 1098 } 1099 1100 err = xsk_get_mmap_offsets(xsk->fd, &off); 1101 if (err) { 1102 err = -errno; 1103 goto out_put_ctx; 1104 } 1105 1106 if (rx) { 1107 rx_map = mmap(NULL, off.rx.desc + 1108 xsk->config.rx_size * sizeof(struct xdp_desc), 1109 PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, 1110 xsk->fd, XDP_PGOFF_RX_RING); 1111 if (rx_map == MAP_FAILED) { 1112 err = -errno; 1113 goto out_put_ctx; 1114 } 1115 1116 rx->mask = xsk->config.rx_size - 1; 1117 rx->size = xsk->config.rx_size; 1118 rx->producer = rx_map + off.rx.producer; 1119 rx->consumer = rx_map + off.rx.consumer; 1120 rx->flags = rx_map + off.rx.flags; 1121 rx->ring = rx_map + off.rx.desc; 1122 rx->cached_prod = *rx->producer; 1123 rx->cached_cons = *rx->consumer; 1124 } 1125 xsk->rx = rx; 1126 1127 if (tx) { 1128 tx_map = mmap(NULL, off.tx.desc + 1129 xsk->config.tx_size * sizeof(struct xdp_desc), 1130 PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, 1131 xsk->fd, XDP_PGOFF_TX_RING); 1132 if (tx_map == MAP_FAILED) { 1133 err = -errno; 1134 goto out_mmap_rx; 1135 } 1136 1137 tx->mask = xsk->config.tx_size - 1; 1138 tx->size = xsk->config.tx_size; 1139 tx->producer = tx_map + off.tx.producer; 1140 tx->consumer = tx_map + off.tx.consumer; 1141 tx->flags = tx_map + off.tx.flags; 1142 tx->ring = tx_map + off.tx.desc; 1143 tx->cached_prod = *tx->producer; 1144 /* cached_cons is r->size bigger than the real consumer pointer 1145 * See xsk_prod_nb_free 1146 */ 1147 tx->cached_cons = *tx->consumer + xsk->config.tx_size; 1148 } 1149 xsk->tx = tx; 1150 1151 sxdp.sxdp_family = PF_XDP; 1152 sxdp.sxdp_ifindex = ctx->ifindex; 1153 sxdp.sxdp_queue_id = ctx->queue_id; 1154 if (umem->refcount > 1) { 1155 sxdp.sxdp_flags |= XDP_SHARED_UMEM; 1156 sxdp.sxdp_shared_umem_fd = umem->fd; 1157 } else { 1158 sxdp.sxdp_flags = xsk->config.bind_flags; 1159 } 1160 1161 err = bind(xsk->fd, (struct sockaddr *)&sxdp, sizeof(sxdp)); 1162 if (err) { 1163 err = -errno; 1164 goto out_mmap_tx; 1165 } 1166 1167 ctx->prog_fd = -1; 1168 1169 if (!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) { 1170 err = __xsk_setup_xdp_prog(xsk, NULL); 1171 if (err) 1172 goto out_mmap_tx; 1173 } 1174 1175 *xsk_ptr = xsk; 1176 umem->fill_save = NULL; 1177 umem->comp_save = NULL; 1178 return 0; 1179 1180out_mmap_tx: 1181 if (tx) 1182 munmap(tx_map, off.tx.desc + 1183 xsk->config.tx_size * sizeof(struct xdp_desc)); 1184out_mmap_rx: 1185 if (rx) 1186 munmap(rx_map, off.rx.desc + 1187 xsk->config.rx_size * sizeof(struct xdp_desc)); 1188out_put_ctx: 1189 xsk_put_ctx(ctx, unmap); 1190out_socket: 1191 if (--umem->refcount) 1192 close(xsk->fd); 1193out_xsk_alloc: 1194 free(xsk); 1195 return err; 1196} 1197 1198int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname, 1199 __u32 queue_id, struct xsk_umem *umem, 1200 struct xsk_ring_cons *rx, struct xsk_ring_prod *tx, 1201 const struct xsk_socket_config *usr_config) 1202{ 1203 if (!umem) 1204 return -EFAULT; 1205 1206 return xsk_socket__create_shared(xsk_ptr, ifname, queue_id, umem, 1207 rx, tx, umem->fill_save, 1208 umem->comp_save, usr_config); 1209} 1210 1211int xsk_umem__delete(struct xsk_umem *umem) 1212{ 1213 if (!umem) 1214 return 0; 1215 1216 if (umem->refcount) 1217 return -EBUSY; 1218 1219 close(umem->fd); 1220 free(umem); 1221 1222 return 0; 1223} 1224 1225void xsk_socket__delete(struct xsk_socket *xsk) 1226{ 1227 size_t desc_sz = sizeof(struct xdp_desc); 1228 struct xdp_mmap_offsets off; 1229 struct xsk_umem *umem; 1230 struct xsk_ctx *ctx; 1231 int err; 1232 1233 if (!xsk) 1234 return; 1235 1236 ctx = xsk->ctx; 1237 umem = ctx->umem; 1238 if (ctx->prog_fd != -1) { 1239 xsk_delete_bpf_maps(xsk); 1240 close(ctx->prog_fd); 1241 if (ctx->has_bpf_link) 1242 close(ctx->link_fd); 1243 } 1244 1245 err = xsk_get_mmap_offsets(xsk->fd, &off); 1246 if (!err) { 1247 if (xsk->rx) { 1248 munmap(xsk->rx->ring - off.rx.desc, 1249 off.rx.desc + xsk->config.rx_size * desc_sz); 1250 } 1251 if (xsk->tx) { 1252 munmap(xsk->tx->ring - off.tx.desc, 1253 off.tx.desc + xsk->config.tx_size * desc_sz); 1254 } 1255 } 1256 1257 xsk_put_ctx(ctx, true); 1258 1259 umem->refcount--; 1260 /* Do not close an fd that also has an associated umem connected 1261 * to it. 1262 */ 1263 if (xsk->fd != umem->fd) 1264 close(xsk->fd); 1265 free(xsk); 1266}