// SPDX-License-Identifier: GPL-2.0 #define BPF_NO_KFUNC_PROTOTYPES #include #include #include #define ETH_P_IP 0x0800 #define ETH_P_IPV6 0x86dd #define IP_MF 0x2000 /* "More Fragments" */ #define IP_OFFSET 0x1fff /* "Fragment Offset" */ #define AF_INET 2 #define AF_INET6 10 struct bpf_flowtable_opts___local { s32 error; }; struct flow_offload_tuple_rhash * bpf_xdp_flow_lookup(struct xdp_md *, struct bpf_fib_lookup *, struct bpf_flowtable_opts___local *, u32) __ksym; struct { __uint(type, BPF_MAP_TYPE_ARRAY); __type(key, __u32); __type(value, __u32); __uint(max_entries, 1); } stats SEC(".maps"); static bool xdp_flowtable_offload_check_iphdr(struct iphdr *iph) { /* ip fragmented traffic */ if (iph->frag_off & bpf_htons(IP_MF | IP_OFFSET)) return false; /* ip options */ if (iph->ihl * 4 != sizeof(*iph)) return false; if (iph->ttl <= 1) return false; return true; } static bool xdp_flowtable_offload_check_tcp_state(void *ports, void *data_end, u8 proto) { if (proto == IPPROTO_TCP) { struct tcphdr *tcph = ports; if (tcph + 1 > data_end) return false; if (tcph->fin || tcph->rst) return false; } return true; } struct flow_ports___local { __be16 source, dest; } __attribute__((preserve_access_index)); SEC("xdp.frags") int xdp_flowtable_do_lookup(struct xdp_md *ctx) { void *data_end = (void *)(long)ctx->data_end; struct bpf_flowtable_opts___local opts = {}; struct flow_offload_tuple_rhash *tuplehash; struct bpf_fib_lookup tuple = { .ifindex = ctx->ingress_ifindex, }; void *data = (void *)(long)ctx->data; struct ethhdr *eth = data; struct flow_ports___local *ports; __u32 *val, key = 0; if (eth + 1 > data_end) return XDP_DROP; switch (eth->h_proto) { case bpf_htons(ETH_P_IP): { struct iphdr *iph = data + sizeof(*eth); ports = (struct flow_ports___local *)(iph + 1); if (ports + 1 > data_end) return XDP_PASS; /* sanity check on ip header */ if (!xdp_flowtable_offload_check_iphdr(iph)) return XDP_PASS; if (!xdp_flowtable_offload_check_tcp_state(ports, data_end, iph->protocol)) return XDP_PASS; tuple.family = AF_INET; tuple.tos = iph->tos; tuple.l4_protocol = iph->protocol; tuple.tot_len = bpf_ntohs(iph->tot_len); tuple.ipv4_src = iph->saddr; tuple.ipv4_dst = iph->daddr; tuple.sport = ports->source; tuple.dport = ports->dest; break; } case bpf_htons(ETH_P_IPV6): { struct in6_addr *src = (struct in6_addr *)tuple.ipv6_src; struct in6_addr *dst = (struct in6_addr *)tuple.ipv6_dst; struct ipv6hdr *ip6h = data + sizeof(*eth); ports = (struct flow_ports___local *)(ip6h + 1); if (ports + 1 > data_end) return XDP_PASS; if (ip6h->hop_limit <= 1) return XDP_PASS; if (!xdp_flowtable_offload_check_tcp_state(ports, data_end, ip6h->nexthdr)) return XDP_PASS; tuple.family = AF_INET6; tuple.l4_protocol = ip6h->nexthdr; tuple.tot_len = bpf_ntohs(ip6h->payload_len); *src = ip6h->saddr; *dst = ip6h->daddr; tuple.sport = ports->source; tuple.dport = ports->dest; break; } default: return XDP_PASS; } tuplehash = bpf_xdp_flow_lookup(ctx, &tuple, &opts, sizeof(opts)); if (!tuplehash) return XDP_PASS; val = bpf_map_lookup_elem(&stats, &key); if (val) __sync_add_and_fetch(val, 1); return XDP_PASS; } char _license[] SEC("license") = "GPL";