blob: 4ad896782f77cade74585d929e0443051a68552a [file] [log] [blame]
David Ahernfe616052018-05-09 20:34:27 -07001// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2017-18 David Ahern <dsahern@gmail.com>
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of version 2 of the GNU General Public
6 * License as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 */
13
14#include <linux/bpf.h>
15#include <linux/if_link.h>
16#include <linux/limits.h>
17#include <net/if.h>
18#include <errno.h>
19#include <stdio.h>
20#include <stdlib.h>
21#include <stdbool.h>
22#include <string.h>
23#include <unistd.h>
24#include <fcntl.h>
25#include <libgen.h>
26
Toke Høiland-Jørgensen7cf245a2020-01-20 14:06:49 +010027#include <bpf/libbpf.h>
Jakub Kicinski2bf3e2e2018-05-14 22:35:02 -070028#include <bpf/bpf.h>
David Ahernfe616052018-05-09 20:34:27 -070029
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +010030static __u32 xdp_flags = XDP_FLAGS_UPDATE_IF_NOEXIST;
31
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +020032static int do_attach(int idx, int prog_fd, int map_fd, const char *name)
David Ahernfe616052018-05-09 20:34:27 -070033{
34 int err;
35
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +010036 err = bpf_set_link_xdp_fd(idx, prog_fd, xdp_flags);
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +020037 if (err < 0) {
David Ahernfe616052018-05-09 20:34:27 -070038 printf("ERROR: failed to attach program to %s\n", name);
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +020039 return err;
40 }
41
42 /* Adding ifindex as a possible egress TX port */
43 err = bpf_map_update_elem(map_fd, &idx, &idx, 0);
44 if (err)
45 printf("ERROR: failed using device %s as TX-port\n", name);
David Ahernfe616052018-05-09 20:34:27 -070046
47 return err;
48}
49
50static int do_detach(int idx, const char *name)
51{
52 int err;
53
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +010054 err = bpf_set_link_xdp_fd(idx, -1, xdp_flags);
David Ahernfe616052018-05-09 20:34:27 -070055 if (err < 0)
56 printf("ERROR: failed to detach program from %s\n", name);
57
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +020058 /* TODO: Remember to cleanup map, when adding use of shared map
59 * bpf_map_delete_elem((map_fd, &idx);
60 */
David Ahernfe616052018-05-09 20:34:27 -070061 return err;
62}
63
64static void usage(const char *prog)
65{
66 fprintf(stderr,
67 "usage: %s [OPTS] interface-list\n"
68 "\nOPTS:\n"
69 " -d detach program\n"
Wang Haibf067f12021-06-15 21:55:54 +080070 " -S use skb-mode\n"
71 " -F force loading prog\n"
David Ahernfe616052018-05-09 20:34:27 -070072 " -D direct table lookups (skip fib rules)\n",
73 prog);
74}
75
76int main(int argc, char **argv)
77{
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -070078 struct bpf_prog_load_attr prog_load_attr = {
79 .prog_type = BPF_PROG_TYPE_XDP,
80 };
81 const char *prog_name = "xdp_fwd";
Kui-Feng Lee7490d592021-12-13 19:59:29 -080082 struct bpf_program *prog = NULL;
83 struct bpf_program *pos;
84 const char *sec_name;
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +020085 int prog_fd, map_fd = -1;
David Ahernfe616052018-05-09 20:34:27 -070086 char filename[PATH_MAX];
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -070087 struct bpf_object *obj;
David Ahernfe616052018-05-09 20:34:27 -070088 int opt, i, idx, err;
David Ahernfe616052018-05-09 20:34:27 -070089 int attach = 1;
90 int ret = 0;
91
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +010092 while ((opt = getopt(argc, argv, ":dDSF")) != -1) {
David Ahernfe616052018-05-09 20:34:27 -070093 switch (opt) {
94 case 'd':
95 attach = 0;
96 break;
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +010097 case 'S':
98 xdp_flags |= XDP_FLAGS_SKB_MODE;
99 break;
100 case 'F':
101 xdp_flags &= ~XDP_FLAGS_UPDATE_IF_NOEXIST;
102 break;
David Ahernfe616052018-05-09 20:34:27 -0700103 case 'D':
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700104 prog_name = "xdp_fwd_direct";
David Ahernfe616052018-05-09 20:34:27 -0700105 break;
106 default:
107 usage(basename(argv[0]));
108 return 1;
109 }
110 }
111
Toke Høiland-Jørgensend50ecc42019-12-16 12:07:42 +0100112 if (!(xdp_flags & XDP_FLAGS_SKB_MODE))
113 xdp_flags |= XDP_FLAGS_DRV_MODE;
114
David Ahernfe616052018-05-09 20:34:27 -0700115 if (optind == argc) {
116 usage(basename(argv[0]));
117 return 1;
118 }
119
120 if (attach) {
121 snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700122 prog_load_attr.file = filename;
David Ahernfe616052018-05-09 20:34:27 -0700123
124 if (access(filename, O_RDONLY) < 0) {
125 printf("error accessing file %s: %s\n",
126 filename, strerror(errno));
127 return 1;
128 }
129
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +0200130 err = bpf_prog_load_xattr(&prog_load_attr, &obj, &prog_fd);
131 if (err) {
132 printf("Does kernel support devmap lookup?\n");
133 /* If not, the error message will be:
134 * "cannot pass map_type 14 into func bpf_map_lookup_elem#1"
135 */
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700136 return 1;
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +0200137 }
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700138
Kui-Feng Lee7490d592021-12-13 19:59:29 -0800139 bpf_object__for_each_program(pos, obj) {
140 sec_name = bpf_program__section_name(pos);
141 if (sec_name && !strcmp(sec_name, prog_name)) {
142 prog = pos;
143 break;
144 }
145 }
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700146 prog_fd = bpf_program__fd(prog);
147 if (prog_fd < 0) {
148 printf("program not found: %s\n", strerror(prog_fd));
David Ahernfe616052018-05-09 20:34:27 -0700149 return 1;
150 }
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700151 map_fd = bpf_map__fd(bpf_object__find_map_by_name(obj,
Jesper Dangaard Brouer3783d432019-08-08 18:17:37 +0200152 "xdp_tx_ports"));
Jakub Kicinskie1a40ef2018-07-26 14:32:20 -0700153 if (map_fd < 0) {
154 printf("map not found: %s\n", strerror(map_fd));
David Ahernfe616052018-05-09 20:34:27 -0700155 return 1;
156 }
157 }
David Ahernfe616052018-05-09 20:34:27 -0700158
159 for (i = optind; i < argc; ++i) {
160 idx = if_nametoindex(argv[i]);
161 if (!idx)
162 idx = strtoul(argv[i], NULL, 0);
163
164 if (!idx) {
165 fprintf(stderr, "Invalid arg\n");
166 return 1;
167 }
168 if (!attach) {
169 err = do_detach(idx, argv[i]);
170 if (err)
171 ret = err;
172 } else {
Jesper Dangaard Brouera32a32c2019-08-08 18:17:42 +0200173 err = do_attach(idx, prog_fd, map_fd, argv[i]);
David Ahernfe616052018-05-09 20:34:27 -0700174 if (err)
175 ret = err;
176 }
177 }
178
179 return ret;
180}