This source file includes following definitions.
- ip_decrease_ttl
- xdp_fwd_flags
- SEC
- SEC
1
2
3
4
5
6
7
8
9
10
11
12
13 #define KBUILD_MODNAME "foo"
14 #include <uapi/linux/bpf.h>
15 #include <linux/in.h>
16 #include <linux/if_ether.h>
17 #include <linux/if_packet.h>
18 #include <linux/if_vlan.h>
19 #include <linux/ip.h>
20 #include <linux/ipv6.h>
21
22 #include "bpf_helpers.h"
23
24 #define IPV6_FLOWINFO_MASK cpu_to_be32(0x0FFFFFFF)
25
26 struct {
27 __uint(type, BPF_MAP_TYPE_DEVMAP);
28 __uint(key_size, sizeof(int));
29 __uint(value_size, sizeof(int));
30 __uint(max_entries, 64);
31 } xdp_tx_ports SEC(".maps");
32
33
34 static __always_inline int ip_decrease_ttl(struct iphdr *iph)
35 {
36 u32 check = (__force u32)iph->check;
37
38 check += (__force u32)htons(0x0100);
39 iph->check = (__force __sum16)(check + (check >= 0xFFFF));
40 return --iph->ttl;
41 }
42
43 static __always_inline int xdp_fwd_flags(struct xdp_md *ctx, u32 flags)
44 {
45 void *data_end = (void *)(long)ctx->data_end;
46 void *data = (void *)(long)ctx->data;
47 struct bpf_fib_lookup fib_params;
48 struct ethhdr *eth = data;
49 struct ipv6hdr *ip6h;
50 struct iphdr *iph;
51 u16 h_proto;
52 u64 nh_off;
53 int rc;
54
55 nh_off = sizeof(*eth);
56 if (data + nh_off > data_end)
57 return XDP_DROP;
58
59 __builtin_memset(&fib_params, 0, sizeof(fib_params));
60
61 h_proto = eth->h_proto;
62 if (h_proto == htons(ETH_P_IP)) {
63 iph = data + nh_off;
64
65 if (iph + 1 > data_end)
66 return XDP_DROP;
67
68 if (iph->ttl <= 1)
69 return XDP_PASS;
70
71 fib_params.family = AF_INET;
72 fib_params.tos = iph->tos;
73 fib_params.l4_protocol = iph->protocol;
74 fib_params.sport = 0;
75 fib_params.dport = 0;
76 fib_params.tot_len = ntohs(iph->tot_len);
77 fib_params.ipv4_src = iph->saddr;
78 fib_params.ipv4_dst = iph->daddr;
79 } else if (h_proto == htons(ETH_P_IPV6)) {
80 struct in6_addr *src = (struct in6_addr *) fib_params.ipv6_src;
81 struct in6_addr *dst = (struct in6_addr *) fib_params.ipv6_dst;
82
83 ip6h = data + nh_off;
84 if (ip6h + 1 > data_end)
85 return XDP_DROP;
86
87 if (ip6h->hop_limit <= 1)
88 return XDP_PASS;
89
90 fib_params.family = AF_INET6;
91 fib_params.flowinfo = *(__be32 *)ip6h & IPV6_FLOWINFO_MASK;
92 fib_params.l4_protocol = ip6h->nexthdr;
93 fib_params.sport = 0;
94 fib_params.dport = 0;
95 fib_params.tot_len = ntohs(ip6h->payload_len);
96 *src = ip6h->saddr;
97 *dst = ip6h->daddr;
98 } else {
99 return XDP_PASS;
100 }
101
102 fib_params.ifindex = ctx->ingress_ifindex;
103
104 rc = bpf_fib_lookup(ctx, &fib_params, sizeof(fib_params), flags);
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121 if (rc == BPF_FIB_LKUP_RET_SUCCESS) {
122
123
124
125
126
127
128
129
130 if (!bpf_map_lookup_elem(&xdp_tx_ports, &fib_params.ifindex))
131 return XDP_PASS;
132
133 if (h_proto == htons(ETH_P_IP))
134 ip_decrease_ttl(iph);
135 else if (h_proto == htons(ETH_P_IPV6))
136 ip6h->hop_limit--;
137
138 memcpy(eth->h_dest, fib_params.dmac, ETH_ALEN);
139 memcpy(eth->h_source, fib_params.smac, ETH_ALEN);
140 return bpf_redirect_map(&xdp_tx_ports, fib_params.ifindex, 0);
141 }
142
143 return XDP_PASS;
144 }
145
146 SEC("xdp_fwd")
147 int xdp_fwd_prog(struct xdp_md *ctx)
148 {
149 return xdp_fwd_flags(ctx, 0);
150 }
151
152 SEC("xdp_fwd_direct")
153 int xdp_fwd_direct_prog(struct xdp_md *ctx)
154 {
155 return xdp_fwd_flags(ctx, BPF_FIB_LOOKUP_DIRECT);
156 }
157
158 char _license[] SEC("license") = "GPL";