mirror of
https://github.com/armbian/linux-cix.git
synced 2026-01-06 12:30:45 -08:00
samples/bpf: Remove the xdp_redirect* utilities
These utilities have all been ported to xdp-tools as functions of the xdp-bench utility. The four different utilities in samples are incorporated as separate subcommands to xdp-bench, with most of the command line parameters left intact, except that mandatory arguments are always positional in xdp-bench. For full usage details see the --help output of each command, or the xdp-bench man page. Some examples of how to convert usage to xdp-bench are: xdp_redirect eth0 eth1 --> xdp-bench redirect eth0 eth1 xdp_redirect_map eth0 eth1 --> xdp-bench redirect-map eth0 eth1 xdp_redirect_map_multi eth0 eth1 eth2 eth3 --> xdp-bench redirect-multi eth0 eth1 eth2 eth3 xdp_redirect_cpu -d eth0 -c 0 -c 1 --> xdp-bench redirect-cpu -c 0 -c 1 eth0 xdp_redirect_cpu -d eth0 -c 0 -c 1 -r eth1 --> xdp-bench redirect-cpu -c 0 -c 1 eth0 -r redirect -D eth1 Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Link: https://lore.kernel.org/r/20230824102255.1561885-3-toke@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
committed by
Alexei Starovoitov
parent
e7c9e73d08
commit
91dda69b08
@@ -51,11 +51,6 @@ tprogs-y += xdp_sample_pkts
|
||||
tprogs-y += ibumad
|
||||
tprogs-y += hbm
|
||||
|
||||
tprogs-y += xdp_redirect_cpu
|
||||
tprogs-y += xdp_redirect_map_multi
|
||||
tprogs-y += xdp_redirect_map
|
||||
tprogs-y += xdp_redirect
|
||||
|
||||
# Libbpf dependencies
|
||||
LIBBPF_SRC = $(TOOLS_PATH)/lib/bpf
|
||||
LIBBPF_OUTPUT = $(abspath $(BPF_SAMPLES_PATH))/libbpf
|
||||
@@ -111,10 +106,6 @@ xdp_sample_pkts-objs := xdp_sample_pkts_user.o
|
||||
ibumad-objs := ibumad_user.o
|
||||
hbm-objs := hbm.o $(CGROUP_HELPERS)
|
||||
|
||||
xdp_redirect_map_multi-objs := xdp_redirect_map_multi_user.o $(XDP_SAMPLE)
|
||||
xdp_redirect_cpu-objs := xdp_redirect_cpu_user.o $(XDP_SAMPLE)
|
||||
xdp_redirect_map-objs := xdp_redirect_map_user.o $(XDP_SAMPLE)
|
||||
xdp_redirect-objs := xdp_redirect_user.o $(XDP_SAMPLE)
|
||||
xdp_router_ipv4-objs := xdp_router_ipv4_user.o $(XDP_SAMPLE)
|
||||
|
||||
# Tell kbuild to always build the programs
|
||||
@@ -205,10 +196,6 @@ TPROGS_LDFLAGS := -L$(SYSROOT)/usr/lib
|
||||
endif
|
||||
|
||||
TPROGS_LDLIBS += $(LIBBPF) -lelf -lz
|
||||
TPROGLDLIBS_xdp_redirect += -lm
|
||||
TPROGLDLIBS_xdp_redirect_cpu += -lm
|
||||
TPROGLDLIBS_xdp_redirect_map += -lm
|
||||
TPROGLDLIBS_xdp_redirect_map_multi += -lm
|
||||
TPROGLDLIBS_xdp_router_ipv4 += -lm -pthread
|
||||
TPROGLDLIBS_tracex4 += -lrt
|
||||
TPROGLDLIBS_trace_output += -lrt
|
||||
@@ -323,10 +310,6 @@ $(obj)/$(TRACE_HELPERS) $(obj)/$(CGROUP_HELPERS) $(obj)/$(XDP_SAMPLE): | libbpf_
|
||||
|
||||
.PHONY: libbpf_hdrs
|
||||
|
||||
$(obj)/xdp_redirect_cpu_user.o: $(obj)/xdp_redirect_cpu.skel.h
|
||||
$(obj)/xdp_redirect_map_multi_user.o: $(obj)/xdp_redirect_map_multi.skel.h
|
||||
$(obj)/xdp_redirect_map_user.o: $(obj)/xdp_redirect_map.skel.h
|
||||
$(obj)/xdp_redirect_user.o: $(obj)/xdp_redirect.skel.h
|
||||
$(obj)/xdp_router_ipv4_user.o: $(obj)/xdp_router_ipv4.skel.h
|
||||
|
||||
$(obj)/tracex5.bpf.o: $(obj)/syscall_nrs.h
|
||||
@@ -379,10 +362,6 @@ endef
|
||||
|
||||
CLANG_SYS_INCLUDES = $(call get_sys_includes,$(CLANG))
|
||||
|
||||
$(obj)/xdp_redirect_cpu.bpf.o: $(obj)/xdp_sample.bpf.o
|
||||
$(obj)/xdp_redirect_map_multi.bpf.o: $(obj)/xdp_sample.bpf.o
|
||||
$(obj)/xdp_redirect_map.bpf.o: $(obj)/xdp_sample.bpf.o
|
||||
$(obj)/xdp_redirect.bpf.o: $(obj)/xdp_sample.bpf.o
|
||||
$(obj)/xdp_router_ipv4.bpf.o: $(obj)/xdp_sample.bpf.o
|
||||
|
||||
$(obj)/%.bpf.o: $(src)/%.bpf.c $(obj)/vmlinux.h $(src)/xdp_sample.bpf.h $(src)/xdp_sample_shared.h
|
||||
@@ -393,15 +372,9 @@ $(obj)/%.bpf.o: $(src)/%.bpf.c $(obj)/vmlinux.h $(src)/xdp_sample.bpf.h $(src)/x
|
||||
-I$(LIBBPF_INCLUDE) $(CLANG_SYS_INCLUDES) \
|
||||
-c $(filter %.bpf.c,$^) -o $@
|
||||
|
||||
LINKED_SKELS := xdp_redirect_cpu.skel.h xdp_redirect_map_multi.skel.h \
|
||||
xdp_redirect_map.skel.h xdp_redirect.skel.h \
|
||||
xdp_router_ipv4.skel.h
|
||||
LINKED_SKELS := xdp_router_ipv4.skel.h
|
||||
clean-files += $(LINKED_SKELS)
|
||||
|
||||
xdp_redirect_cpu.skel.h-deps := xdp_redirect_cpu.bpf.o xdp_sample.bpf.o
|
||||
xdp_redirect_map_multi.skel.h-deps := xdp_redirect_map_multi.bpf.o xdp_sample.bpf.o
|
||||
xdp_redirect_map.skel.h-deps := xdp_redirect_map.bpf.o xdp_sample.bpf.o
|
||||
xdp_redirect.skel.h-deps := xdp_redirect.bpf.o xdp_sample.bpf.o
|
||||
xdp_router_ipv4.skel.h-deps := xdp_router_ipv4.bpf.o xdp_sample.bpf.o
|
||||
|
||||
LINKED_BPF_SRCS := $(patsubst %.bpf.o,%.bpf.c,$(foreach skel,$(LINKED_SKELS),$($(skel)-deps)))
|
||||
|
||||
@@ -1,49 +0,0 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
/* Copyright (c) 2016 John Fastabend <john.r.fastabend@intel.com>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of version 2 of the GNU General Public
|
||||
* License as published by the Free Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* General Public License for more details.
|
||||
*/
|
||||
#include "vmlinux.h"
|
||||
#include "xdp_sample.bpf.h"
|
||||
#include "xdp_sample_shared.h"
|
||||
|
||||
const volatile int ifindex_out;
|
||||
|
||||
SEC("xdp")
|
||||
int xdp_redirect_prog(struct xdp_md *ctx)
|
||||
{
|
||||
void *data_end = (void *)(long)ctx->data_end;
|
||||
void *data = (void *)(long)ctx->data;
|
||||
u32 key = bpf_get_smp_processor_id();
|
||||
struct ethhdr *eth = data;
|
||||
struct datarec *rec;
|
||||
u64 nh_off;
|
||||
|
||||
nh_off = sizeof(*eth);
|
||||
if (data + nh_off > data_end)
|
||||
return XDP_DROP;
|
||||
|
||||
rec = bpf_map_lookup_elem(&rx_cnt, &key);
|
||||
if (!rec)
|
||||
return XDP_PASS;
|
||||
NO_TEAR_INC(rec->processed);
|
||||
|
||||
swap_src_dst_mac(data);
|
||||
return bpf_redirect(ifindex_out, 0);
|
||||
}
|
||||
|
||||
/* Redirect require an XDP bpf_prog loaded on the TX device */
|
||||
SEC("xdp")
|
||||
int xdp_redirect_dummy_prog(struct xdp_md *ctx)
|
||||
{
|
||||
return XDP_PASS;
|
||||
}
|
||||
|
||||
char _license[] SEC("license") = "GPL";
|
||||
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@@ -1,97 +0,0 @@
|
||||
/* Copyright (c) 2017 Covalent IO, Inc. http://covalent.io
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of version 2 of the GNU General Public
|
||||
* License as published by the Free Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* General Public License for more details.
|
||||
*/
|
||||
#define KBUILD_MODNAME "foo"
|
||||
|
||||
#include "vmlinux.h"
|
||||
#include "xdp_sample.bpf.h"
|
||||
#include "xdp_sample_shared.h"
|
||||
|
||||
/* The 2nd xdp prog on egress does not support skb mode, so we define two
|
||||
* maps, tx_port_general and tx_port_native.
|
||||
*/
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_DEVMAP);
|
||||
__uint(key_size, sizeof(int));
|
||||
__uint(value_size, sizeof(int));
|
||||
__uint(max_entries, 1);
|
||||
} tx_port_general SEC(".maps");
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_DEVMAP);
|
||||
__uint(key_size, sizeof(int));
|
||||
__uint(value_size, sizeof(struct bpf_devmap_val));
|
||||
__uint(max_entries, 1);
|
||||
} tx_port_native SEC(".maps");
|
||||
|
||||
/* store egress interface mac address */
|
||||
const volatile __u8 tx_mac_addr[ETH_ALEN];
|
||||
|
||||
static __always_inline int xdp_redirect_map(struct xdp_md *ctx, void *redirect_map)
|
||||
{
|
||||
void *data_end = (void *)(long)ctx->data_end;
|
||||
void *data = (void *)(long)ctx->data;
|
||||
u32 key = bpf_get_smp_processor_id();
|
||||
struct ethhdr *eth = data;
|
||||
struct datarec *rec;
|
||||
u64 nh_off;
|
||||
|
||||
nh_off = sizeof(*eth);
|
||||
if (data + nh_off > data_end)
|
||||
return XDP_DROP;
|
||||
|
||||
rec = bpf_map_lookup_elem(&rx_cnt, &key);
|
||||
if (!rec)
|
||||
return XDP_PASS;
|
||||
NO_TEAR_INC(rec->processed);
|
||||
swap_src_dst_mac(data);
|
||||
return bpf_redirect_map(redirect_map, 0, 0);
|
||||
}
|
||||
|
||||
SEC("xdp")
|
||||
int xdp_redirect_map_general(struct xdp_md *ctx)
|
||||
{
|
||||
return xdp_redirect_map(ctx, &tx_port_general);
|
||||
}
|
||||
|
||||
SEC("xdp")
|
||||
int xdp_redirect_map_native(struct xdp_md *ctx)
|
||||
{
|
||||
return xdp_redirect_map(ctx, &tx_port_native);
|
||||
}
|
||||
|
||||
SEC("xdp/devmap")
|
||||
int xdp_redirect_map_egress(struct xdp_md *ctx)
|
||||
{
|
||||
void *data_end = (void *)(long)ctx->data_end;
|
||||
void *data = (void *)(long)ctx->data;
|
||||
u8 *mac_addr = (u8 *) tx_mac_addr;
|
||||
struct ethhdr *eth = data;
|
||||
u64 nh_off;
|
||||
|
||||
nh_off = sizeof(*eth);
|
||||
if (data + nh_off > data_end)
|
||||
return XDP_DROP;
|
||||
|
||||
barrier_var(mac_addr); /* prevent optimizing out memcpy */
|
||||
__builtin_memcpy(eth->h_source, mac_addr, ETH_ALEN);
|
||||
|
||||
return XDP_PASS;
|
||||
}
|
||||
|
||||
/* Redirect require an XDP bpf_prog loaded on the TX device */
|
||||
SEC("xdp")
|
||||
int xdp_redirect_dummy_prog(struct xdp_md *ctx)
|
||||
{
|
||||
return XDP_PASS;
|
||||
}
|
||||
|
||||
char _license[] SEC("license") = "GPL";
|
||||
@@ -1,77 +0,0 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
#define KBUILD_MODNAME "foo"
|
||||
|
||||
#include "vmlinux.h"
|
||||
#include "xdp_sample.bpf.h"
|
||||
#include "xdp_sample_shared.h"
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_DEVMAP_HASH);
|
||||
__uint(key_size, sizeof(int));
|
||||
__uint(value_size, sizeof(int));
|
||||
__uint(max_entries, 32);
|
||||
} forward_map_general SEC(".maps");
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_DEVMAP_HASH);
|
||||
__uint(key_size, sizeof(int));
|
||||
__uint(value_size, sizeof(struct bpf_devmap_val));
|
||||
__uint(max_entries, 32);
|
||||
} forward_map_native SEC(".maps");
|
||||
|
||||
/* map to store egress interfaces mac addresses */
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_HASH);
|
||||
__type(key, u32);
|
||||
__type(value, __be64);
|
||||
__uint(max_entries, 32);
|
||||
} mac_map SEC(".maps");
|
||||
|
||||
static int xdp_redirect_map(struct xdp_md *ctx, void *forward_map)
|
||||
{
|
||||
u32 key = bpf_get_smp_processor_id();
|
||||
struct datarec *rec;
|
||||
|
||||
rec = bpf_map_lookup_elem(&rx_cnt, &key);
|
||||
if (!rec)
|
||||
return XDP_PASS;
|
||||
NO_TEAR_INC(rec->processed);
|
||||
|
||||
return bpf_redirect_map(forward_map, 0,
|
||||
BPF_F_BROADCAST | BPF_F_EXCLUDE_INGRESS);
|
||||
}
|
||||
|
||||
SEC("xdp")
|
||||
int xdp_redirect_map_general(struct xdp_md *ctx)
|
||||
{
|
||||
return xdp_redirect_map(ctx, &forward_map_general);
|
||||
}
|
||||
|
||||
SEC("xdp")
|
||||
int xdp_redirect_map_native(struct xdp_md *ctx)
|
||||
{
|
||||
return xdp_redirect_map(ctx, &forward_map_native);
|
||||
}
|
||||
|
||||
SEC("xdp/devmap")
|
||||
int xdp_devmap_prog(struct xdp_md *ctx)
|
||||
{
|
||||
void *data_end = (void *)(long)ctx->data_end;
|
||||
void *data = (void *)(long)ctx->data;
|
||||
u32 key = ctx->egress_ifindex;
|
||||
struct ethhdr *eth = data;
|
||||
__be64 *mac;
|
||||
u64 nh_off;
|
||||
|
||||
nh_off = sizeof(*eth);
|
||||
if (data + nh_off > data_end)
|
||||
return XDP_DROP;
|
||||
|
||||
mac = bpf_map_lookup_elem(&mac_map, &key);
|
||||
if (mac)
|
||||
__builtin_memcpy(eth->h_source, mac, ETH_ALEN);
|
||||
|
||||
return XDP_PASS;
|
||||
}
|
||||
|
||||
char _license[] SEC("license") = "GPL";
|
||||
@@ -1,232 +0,0 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
static const char *__doc__ =
|
||||
"XDP multi redirect tool, using BPF_MAP_TYPE_DEVMAP and BPF_F_BROADCAST flag for bpf_redirect_map\n"
|
||||
"Usage: xdp_redirect_map_multi <IFINDEX|IFNAME> <IFINDEX|IFNAME> ... <IFINDEX|IFNAME>\n";
|
||||
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/if_link.h>
|
||||
#include <assert.h>
|
||||
#include <getopt.h>
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <net/if.h>
|
||||
#include <unistd.h>
|
||||
#include <libgen.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/socket.h>
|
||||
#include <netinet/in.h>
|
||||
#include <linux/if_ether.h>
|
||||
#include <bpf/bpf.h>
|
||||
#include <bpf/libbpf.h>
|
||||
#include "bpf_util.h"
|
||||
#include "xdp_sample_user.h"
|
||||
#include "xdp_redirect_map_multi.skel.h"
|
||||
|
||||
#define MAX_IFACE_NUM 32
|
||||
static int ifaces[MAX_IFACE_NUM] = {};
|
||||
|
||||
static int mask = SAMPLE_RX_CNT | SAMPLE_REDIRECT_ERR_MAP_CNT |
|
||||
SAMPLE_EXCEPTION_CNT | SAMPLE_DEVMAP_XMIT_CNT |
|
||||
SAMPLE_DEVMAP_XMIT_CNT_MULTI | SAMPLE_SKIP_HEADING;
|
||||
|
||||
DEFINE_SAMPLE_INIT(xdp_redirect_map_multi);
|
||||
|
||||
static const struct option long_options[] = {
|
||||
{ "help", no_argument, NULL, 'h' },
|
||||
{ "skb-mode", no_argument, NULL, 'S' },
|
||||
{ "force", no_argument, NULL, 'F' },
|
||||
{ "load-egress", no_argument, NULL, 'X' },
|
||||
{ "stats", no_argument, NULL, 's' },
|
||||
{ "interval", required_argument, NULL, 'i' },
|
||||
{ "verbose", no_argument, NULL, 'v' },
|
||||
{}
|
||||
};
|
||||
|
||||
static int update_mac_map(struct bpf_map *map)
|
||||
{
|
||||
int mac_map_fd = bpf_map__fd(map);
|
||||
unsigned char mac_addr[6];
|
||||
unsigned int ifindex;
|
||||
int i, ret = -1;
|
||||
|
||||
for (i = 0; ifaces[i] > 0; i++) {
|
||||
ifindex = ifaces[i];
|
||||
|
||||
ret = get_mac_addr(ifindex, mac_addr);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "get interface %d mac failed\n",
|
||||
ifindex);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = bpf_map_update_elem(mac_map_fd, &ifindex, mac_addr, 0);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to update mac address for ifindex %d\n",
|
||||
ifindex);
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
struct bpf_devmap_val devmap_val = {};
|
||||
struct xdp_redirect_map_multi *skel;
|
||||
struct bpf_program *ingress_prog;
|
||||
bool xdp_devmap_attached = false;
|
||||
struct bpf_map *forward_map;
|
||||
int ret = EXIT_FAIL_OPTION;
|
||||
unsigned long interval = 2;
|
||||
char ifname[IF_NAMESIZE];
|
||||
unsigned int ifindex;
|
||||
bool generic = false;
|
||||
bool force = false;
|
||||
bool tried = false;
|
||||
bool error = true;
|
||||
int i, opt;
|
||||
|
||||
while ((opt = getopt_long(argc, argv, "hSFXi:vs",
|
||||
long_options, NULL)) != -1) {
|
||||
switch (opt) {
|
||||
case 'S':
|
||||
generic = true;
|
||||
/* devmap_xmit tracepoint not available */
|
||||
mask &= ~(SAMPLE_DEVMAP_XMIT_CNT |
|
||||
SAMPLE_DEVMAP_XMIT_CNT_MULTI);
|
||||
break;
|
||||
case 'F':
|
||||
force = true;
|
||||
break;
|
||||
case 'X':
|
||||
xdp_devmap_attached = true;
|
||||
break;
|
||||
case 'i':
|
||||
interval = strtoul(optarg, NULL, 0);
|
||||
break;
|
||||
case 'v':
|
||||
sample_switch_mode();
|
||||
break;
|
||||
case 's':
|
||||
mask |= SAMPLE_REDIRECT_MAP_CNT;
|
||||
break;
|
||||
case 'h':
|
||||
error = false;
|
||||
default:
|
||||
sample_usage(argv, long_options, __doc__, mask, error);
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
if (argc <= optind + 1) {
|
||||
sample_usage(argv, long_options, __doc__, mask, error);
|
||||
return ret;
|
||||
}
|
||||
|
||||
skel = xdp_redirect_map_multi__open();
|
||||
if (!skel) {
|
||||
fprintf(stderr, "Failed to xdp_redirect_map_multi__open: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end;
|
||||
}
|
||||
|
||||
ret = sample_init_pre_load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to sample_init_pre_load: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ret = EXIT_FAIL_OPTION;
|
||||
for (i = 0; i < MAX_IFACE_NUM && argv[optind + i]; i++) {
|
||||
ifaces[i] = if_nametoindex(argv[optind + i]);
|
||||
if (!ifaces[i])
|
||||
ifaces[i] = strtoul(argv[optind + i], NULL, 0);
|
||||
if (!if_indextoname(ifaces[i], ifname)) {
|
||||
fprintf(stderr, "Bad interface index or name\n");
|
||||
sample_usage(argv, long_options, __doc__, mask, true);
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
skel->rodata->from_match[i] = ifaces[i];
|
||||
skel->rodata->to_match[i] = ifaces[i];
|
||||
}
|
||||
|
||||
ret = xdp_redirect_map_multi__load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to xdp_redirect_map_multi__load: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
if (xdp_devmap_attached) {
|
||||
/* Update mac_map with all egress interfaces' mac addr */
|
||||
if (update_mac_map(skel->maps.mac_map) < 0) {
|
||||
fprintf(stderr, "Updating mac address failed\n");
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
}
|
||||
|
||||
ret = sample_init(skel, mask);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to initialize sample: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ingress_prog = skel->progs.xdp_redirect_map_native;
|
||||
forward_map = skel->maps.forward_map_native;
|
||||
|
||||
for (i = 0; ifaces[i] > 0; i++) {
|
||||
ifindex = ifaces[i];
|
||||
|
||||
ret = EXIT_FAIL_XDP;
|
||||
restart:
|
||||
/* bind prog_fd to each interface */
|
||||
if (sample_install_xdp(ingress_prog, ifindex, generic, force) < 0) {
|
||||
if (generic && !tried) {
|
||||
fprintf(stderr,
|
||||
"Trying fallback to sizeof(int) as value_size for devmap in generic mode\n");
|
||||
ingress_prog = skel->progs.xdp_redirect_map_general;
|
||||
forward_map = skel->maps.forward_map_general;
|
||||
tried = true;
|
||||
goto restart;
|
||||
}
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
/* Add all the interfaces to forward group and attach
|
||||
* egress devmap program if exist
|
||||
*/
|
||||
devmap_val.ifindex = ifindex;
|
||||
if (xdp_devmap_attached)
|
||||
devmap_val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_devmap_prog);
|
||||
ret = bpf_map_update_elem(bpf_map__fd(forward_map), &ifindex, &devmap_val, 0);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to update devmap value: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
}
|
||||
|
||||
ret = sample_run(interval, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed during sample run: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
ret = EXIT_OK;
|
||||
end_destroy:
|
||||
xdp_redirect_map_multi__destroy(skel);
|
||||
end:
|
||||
sample_exit(ret);
|
||||
}
|
||||
@@ -1,228 +0,0 @@
|
||||
// SPDX-License-Identifier: GPL-2.0-only
|
||||
/* Copyright (c) 2017 Covalent IO, Inc. http://covalent.io
|
||||
*/
|
||||
static const char *__doc__ =
|
||||
"XDP redirect tool, using BPF_MAP_TYPE_DEVMAP\n"
|
||||
"Usage: xdp_redirect_map <IFINDEX|IFNAME>_IN <IFINDEX|IFNAME>_OUT\n";
|
||||
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/if_link.h>
|
||||
#include <assert.h>
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdbool.h>
|
||||
#include <string.h>
|
||||
#include <net/if.h>
|
||||
#include <unistd.h>
|
||||
#include <libgen.h>
|
||||
#include <getopt.h>
|
||||
#include <bpf/bpf.h>
|
||||
#include <bpf/libbpf.h>
|
||||
#include "bpf_util.h"
|
||||
#include "xdp_sample_user.h"
|
||||
#include "xdp_redirect_map.skel.h"
|
||||
|
||||
static int mask = SAMPLE_RX_CNT | SAMPLE_REDIRECT_ERR_MAP_CNT |
|
||||
SAMPLE_EXCEPTION_CNT | SAMPLE_DEVMAP_XMIT_CNT_MULTI;
|
||||
|
||||
DEFINE_SAMPLE_INIT(xdp_redirect_map);
|
||||
|
||||
static const struct option long_options[] = {
|
||||
{ "help", no_argument, NULL, 'h' },
|
||||
{ "skb-mode", no_argument, NULL, 'S' },
|
||||
{ "force", no_argument, NULL, 'F' },
|
||||
{ "load-egress", no_argument, NULL, 'X' },
|
||||
{ "stats", no_argument, NULL, 's' },
|
||||
{ "interval", required_argument, NULL, 'i' },
|
||||
{ "verbose", no_argument, NULL, 'v' },
|
||||
{}
|
||||
};
|
||||
|
||||
static int verbose = 0;
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
struct bpf_devmap_val devmap_val = {};
|
||||
bool xdp_devmap_attached = false;
|
||||
struct xdp_redirect_map *skel;
|
||||
char str[2 * IF_NAMESIZE + 1];
|
||||
char ifname_out[IF_NAMESIZE];
|
||||
struct bpf_map *tx_port_map;
|
||||
char ifname_in[IF_NAMESIZE];
|
||||
int ifindex_in, ifindex_out;
|
||||
unsigned long interval = 2;
|
||||
int ret = EXIT_FAIL_OPTION;
|
||||
struct bpf_program *prog;
|
||||
bool generic = false;
|
||||
bool force = false;
|
||||
bool tried = false;
|
||||
bool error = true;
|
||||
int opt, key = 0;
|
||||
|
||||
while ((opt = getopt_long(argc, argv, "hSFXi:vs",
|
||||
long_options, NULL)) != -1) {
|
||||
switch (opt) {
|
||||
case 'S':
|
||||
generic = true;
|
||||
/* devmap_xmit tracepoint not available */
|
||||
mask &= ~(SAMPLE_DEVMAP_XMIT_CNT |
|
||||
SAMPLE_DEVMAP_XMIT_CNT_MULTI);
|
||||
break;
|
||||
case 'F':
|
||||
force = true;
|
||||
break;
|
||||
case 'X':
|
||||
xdp_devmap_attached = true;
|
||||
break;
|
||||
case 'i':
|
||||
interval = strtoul(optarg, NULL, 0);
|
||||
break;
|
||||
case 'v':
|
||||
sample_switch_mode();
|
||||
verbose = 1;
|
||||
break;
|
||||
case 's':
|
||||
mask |= SAMPLE_REDIRECT_MAP_CNT;
|
||||
break;
|
||||
case 'h':
|
||||
error = false;
|
||||
default:
|
||||
sample_usage(argv, long_options, __doc__, mask, error);
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
if (argc <= optind + 1) {
|
||||
sample_usage(argv, long_options, __doc__, mask, true);
|
||||
goto end;
|
||||
}
|
||||
|
||||
ifindex_in = if_nametoindex(argv[optind]);
|
||||
if (!ifindex_in)
|
||||
ifindex_in = strtoul(argv[optind], NULL, 0);
|
||||
|
||||
ifindex_out = if_nametoindex(argv[optind + 1]);
|
||||
if (!ifindex_out)
|
||||
ifindex_out = strtoul(argv[optind + 1], NULL, 0);
|
||||
|
||||
if (!ifindex_in || !ifindex_out) {
|
||||
fprintf(stderr, "Bad interface index or name\n");
|
||||
sample_usage(argv, long_options, __doc__, mask, true);
|
||||
goto end;
|
||||
}
|
||||
|
||||
skel = xdp_redirect_map__open();
|
||||
if (!skel) {
|
||||
fprintf(stderr, "Failed to xdp_redirect_map__open: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end;
|
||||
}
|
||||
|
||||
ret = sample_init_pre_load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to sample_init_pre_load: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
/* Load 2nd xdp prog on egress. */
|
||||
if (xdp_devmap_attached) {
|
||||
ret = get_mac_addr(ifindex_out, skel->rodata->tx_mac_addr);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to get interface %d mac address: %s\n",
|
||||
ifindex_out, strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
if (verbose)
|
||||
printf("Egress ifindex:%d using src MAC %02x:%02x:%02x:%02x:%02x:%02x\n",
|
||||
ifindex_out,
|
||||
skel->rodata->tx_mac_addr[0], skel->rodata->tx_mac_addr[1],
|
||||
skel->rodata->tx_mac_addr[2], skel->rodata->tx_mac_addr[3],
|
||||
skel->rodata->tx_mac_addr[4], skel->rodata->tx_mac_addr[5]);
|
||||
}
|
||||
|
||||
skel->rodata->from_match[0] = ifindex_in;
|
||||
skel->rodata->to_match[0] = ifindex_out;
|
||||
|
||||
ret = xdp_redirect_map__load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to xdp_redirect_map__load: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ret = sample_init(skel, mask);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to initialize sample: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
prog = skel->progs.xdp_redirect_map_native;
|
||||
tx_port_map = skel->maps.tx_port_native;
|
||||
restart:
|
||||
if (sample_install_xdp(prog, ifindex_in, generic, force) < 0) {
|
||||
/* First try with struct bpf_devmap_val as value for generic
|
||||
* mode, then fallback to sizeof(int) for older kernels.
|
||||
*/
|
||||
fprintf(stderr,
|
||||
"Trying fallback to sizeof(int) as value_size for devmap in generic mode\n");
|
||||
if (generic && !tried) {
|
||||
prog = skel->progs.xdp_redirect_map_general;
|
||||
tx_port_map = skel->maps.tx_port_general;
|
||||
tried = true;
|
||||
goto restart;
|
||||
}
|
||||
ret = EXIT_FAIL_XDP;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
/* Loading dummy XDP prog on out-device */
|
||||
sample_install_xdp(skel->progs.xdp_redirect_dummy_prog, ifindex_out, generic, force);
|
||||
|
||||
devmap_val.ifindex = ifindex_out;
|
||||
if (xdp_devmap_attached)
|
||||
devmap_val.bpf_prog.fd = bpf_program__fd(skel->progs.xdp_redirect_map_egress);
|
||||
ret = bpf_map_update_elem(bpf_map__fd(tx_port_map), &key, &devmap_val, 0);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to update devmap value: %s\n",
|
||||
strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ret = EXIT_FAIL;
|
||||
if (!if_indextoname(ifindex_in, ifname_in)) {
|
||||
fprintf(stderr, "Failed to if_indextoname for %d: %s\n", ifindex_in,
|
||||
strerror(errno));
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
if (!if_indextoname(ifindex_out, ifname_out)) {
|
||||
fprintf(stderr, "Failed to if_indextoname for %d: %s\n", ifindex_out,
|
||||
strerror(errno));
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
safe_strncpy(str, get_driver_name(ifindex_in), sizeof(str));
|
||||
printf("Redirecting from %s (ifindex %d; driver %s) to %s (ifindex %d; driver %s)\n",
|
||||
ifname_in, ifindex_in, str, ifname_out, ifindex_out, get_driver_name(ifindex_out));
|
||||
snprintf(str, sizeof(str), "%s->%s", ifname_in, ifname_out);
|
||||
|
||||
ret = sample_run(interval, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed during sample run: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
ret = EXIT_OK;
|
||||
end_destroy:
|
||||
xdp_redirect_map__destroy(skel);
|
||||
end:
|
||||
sample_exit(ret);
|
||||
}
|
||||
@@ -1,172 +0,0 @@
|
||||
// SPDX-License-Identifier: GPL-2.0-only
|
||||
/* Copyright (c) 2016 John Fastabend <john.r.fastabend@intel.com>
|
||||
*/
|
||||
static const char *__doc__ =
|
||||
"XDP redirect tool, using bpf_redirect helper\n"
|
||||
"Usage: xdp_redirect <IFINDEX|IFNAME>_IN <IFINDEX|IFNAME>_OUT\n";
|
||||
|
||||
#include <linux/bpf.h>
|
||||
#include <linux/if_link.h>
|
||||
#include <assert.h>
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdbool.h>
|
||||
#include <string.h>
|
||||
#include <net/if.h>
|
||||
#include <unistd.h>
|
||||
#include <libgen.h>
|
||||
#include <getopt.h>
|
||||
#include <bpf/bpf.h>
|
||||
#include <bpf/libbpf.h>
|
||||
#include "bpf_util.h"
|
||||
#include "xdp_sample_user.h"
|
||||
#include "xdp_redirect.skel.h"
|
||||
|
||||
static int mask = SAMPLE_RX_CNT | SAMPLE_REDIRECT_ERR_CNT |
|
||||
SAMPLE_EXCEPTION_CNT | SAMPLE_DEVMAP_XMIT_CNT_MULTI;
|
||||
|
||||
DEFINE_SAMPLE_INIT(xdp_redirect);
|
||||
|
||||
static const struct option long_options[] = {
|
||||
{"help", no_argument, NULL, 'h' },
|
||||
{"skb-mode", no_argument, NULL, 'S' },
|
||||
{"force", no_argument, NULL, 'F' },
|
||||
{"stats", no_argument, NULL, 's' },
|
||||
{"interval", required_argument, NULL, 'i' },
|
||||
{"verbose", no_argument, NULL, 'v' },
|
||||
{}
|
||||
};
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
int ifindex_in, ifindex_out, opt;
|
||||
char str[2 * IF_NAMESIZE + 1];
|
||||
char ifname_out[IF_NAMESIZE];
|
||||
char ifname_in[IF_NAMESIZE];
|
||||
int ret = EXIT_FAIL_OPTION;
|
||||
unsigned long interval = 2;
|
||||
struct xdp_redirect *skel;
|
||||
bool generic = false;
|
||||
bool force = false;
|
||||
bool error = true;
|
||||
|
||||
while ((opt = getopt_long(argc, argv, "hSFi:vs",
|
||||
long_options, NULL)) != -1) {
|
||||
switch (opt) {
|
||||
case 'S':
|
||||
generic = true;
|
||||
mask &= ~(SAMPLE_DEVMAP_XMIT_CNT |
|
||||
SAMPLE_DEVMAP_XMIT_CNT_MULTI);
|
||||
break;
|
||||
case 'F':
|
||||
force = true;
|
||||
break;
|
||||
case 'i':
|
||||
interval = strtoul(optarg, NULL, 0);
|
||||
break;
|
||||
case 'v':
|
||||
sample_switch_mode();
|
||||
break;
|
||||
case 's':
|
||||
mask |= SAMPLE_REDIRECT_CNT;
|
||||
break;
|
||||
case 'h':
|
||||
error = false;
|
||||
default:
|
||||
sample_usage(argv, long_options, __doc__, mask, error);
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
if (argc <= optind + 1) {
|
||||
sample_usage(argv, long_options, __doc__, mask, true);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ifindex_in = if_nametoindex(argv[optind]);
|
||||
if (!ifindex_in)
|
||||
ifindex_in = strtoul(argv[optind], NULL, 0);
|
||||
|
||||
ifindex_out = if_nametoindex(argv[optind + 1]);
|
||||
if (!ifindex_out)
|
||||
ifindex_out = strtoul(argv[optind + 1], NULL, 0);
|
||||
|
||||
if (!ifindex_in || !ifindex_out) {
|
||||
fprintf(stderr, "Bad interface index or name\n");
|
||||
sample_usage(argv, long_options, __doc__, mask, true);
|
||||
goto end;
|
||||
}
|
||||
|
||||
skel = xdp_redirect__open();
|
||||
if (!skel) {
|
||||
fprintf(stderr, "Failed to xdp_redirect__open: %s\n", strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end;
|
||||
}
|
||||
|
||||
ret = sample_init_pre_load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to sample_init_pre_load: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
skel->rodata->from_match[0] = ifindex_in;
|
||||
skel->rodata->to_match[0] = ifindex_out;
|
||||
skel->rodata->ifindex_out = ifindex_out;
|
||||
|
||||
ret = xdp_redirect__load(skel);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to xdp_redirect__load: %s\n", strerror(errno));
|
||||
ret = EXIT_FAIL_BPF;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ret = sample_init(skel, mask);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed to initialize sample: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
ret = EXIT_FAIL_XDP;
|
||||
if (sample_install_xdp(skel->progs.xdp_redirect_prog, ifindex_in,
|
||||
generic, force) < 0)
|
||||
goto end_destroy;
|
||||
|
||||
/* Loading dummy XDP prog on out-device */
|
||||
sample_install_xdp(skel->progs.xdp_redirect_dummy_prog, ifindex_out,
|
||||
generic, force);
|
||||
|
||||
ret = EXIT_FAIL;
|
||||
if (!if_indextoname(ifindex_in, ifname_in)) {
|
||||
fprintf(stderr, "Failed to if_indextoname for %d: %s\n", ifindex_in,
|
||||
strerror(errno));
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
if (!if_indextoname(ifindex_out, ifname_out)) {
|
||||
fprintf(stderr, "Failed to if_indextoname for %d: %s\n", ifindex_out,
|
||||
strerror(errno));
|
||||
goto end_destroy;
|
||||
}
|
||||
|
||||
safe_strncpy(str, get_driver_name(ifindex_in), sizeof(str));
|
||||
printf("Redirecting from %s (ifindex %d; driver %s) to %s (ifindex %d; driver %s)\n",
|
||||
ifname_in, ifindex_in, str, ifname_out, ifindex_out, get_driver_name(ifindex_out));
|
||||
snprintf(str, sizeof(str), "%s->%s", ifname_in, ifname_out);
|
||||
|
||||
ret = sample_run(interval, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Failed during sample run: %s\n", strerror(-ret));
|
||||
ret = EXIT_FAIL;
|
||||
goto end_destroy;
|
||||
}
|
||||
ret = EXIT_OK;
|
||||
end_destroy:
|
||||
xdp_redirect__destroy(skel);
|
||||
end:
|
||||
sample_exit(ret);
|
||||
}
|
||||
Reference in New Issue
Block a user