|  | // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) | 
|  | /* Copyright (c) 2018 Facebook */ | 
|  |  | 
|  | #include <stdlib.h> | 
|  | #include <memory.h> | 
|  | #include <unistd.h> | 
|  | #include <linux/bpf.h> | 
|  | #include <linux/rtnetlink.h> | 
|  | #include <sys/socket.h> | 
|  | #include <errno.h> | 
|  | #include <time.h> | 
|  |  | 
|  | #include "bpf.h" | 
|  | #include "libbpf.h" | 
|  | #include "nlattr.h" | 
|  |  | 
|  | #ifndef SOL_NETLINK | 
|  | #define SOL_NETLINK 270 | 
|  | #endif | 
|  |  | 
|  | typedef int (*__dump_nlmsg_t)(struct nlmsghdr *nlmsg, libbpf_dump_nlmsg_t, | 
|  | void *cookie); | 
|  |  | 
|  | struct xdp_id_md { | 
|  | int ifindex; | 
|  | __u32 flags; | 
|  | __u32 id; | 
|  | }; | 
|  |  | 
|  | int libbpf_netlink_open(__u32 *nl_pid) | 
|  | { | 
|  | struct sockaddr_nl sa; | 
|  | socklen_t addrlen; | 
|  | int one = 1, ret; | 
|  | int sock; | 
|  |  | 
|  | memset(&sa, 0, sizeof(sa)); | 
|  | sa.nl_family = AF_NETLINK; | 
|  |  | 
|  | sock = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE); | 
|  | if (sock < 0) | 
|  | return -errno; | 
|  |  | 
|  | if (setsockopt(sock, SOL_NETLINK, NETLINK_EXT_ACK, | 
|  | &one, sizeof(one)) < 0) { | 
|  | fprintf(stderr, "Netlink error reporting not supported\n"); | 
|  | } | 
|  |  | 
|  | if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) < 0) { | 
|  | ret = -errno; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | addrlen = sizeof(sa); | 
|  | if (getsockname(sock, (struct sockaddr *)&sa, &addrlen) < 0) { | 
|  | ret = -errno; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | if (addrlen != sizeof(sa)) { | 
|  | ret = -LIBBPF_ERRNO__INTERNAL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | *nl_pid = sa.nl_pid; | 
|  | return sock; | 
|  |  | 
|  | cleanup: | 
|  | close(sock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int bpf_netlink_recv(int sock, __u32 nl_pid, int seq, | 
|  | __dump_nlmsg_t _fn, libbpf_dump_nlmsg_t fn, | 
|  | void *cookie) | 
|  | { | 
|  | bool multipart = true; | 
|  | struct nlmsgerr *err; | 
|  | struct nlmsghdr *nh; | 
|  | char buf[4096]; | 
|  | int len, ret; | 
|  |  | 
|  | while (multipart) { | 
|  | multipart = false; | 
|  | len = recv(sock, buf, sizeof(buf), 0); | 
|  | if (len < 0) { | 
|  | ret = -errno; | 
|  | goto done; | 
|  | } | 
|  |  | 
|  | if (len == 0) | 
|  | break; | 
|  |  | 
|  | for (nh = (struct nlmsghdr *)buf; NLMSG_OK(nh, len); | 
|  | nh = NLMSG_NEXT(nh, len)) { | 
|  | if (nh->nlmsg_pid != nl_pid) { | 
|  | ret = -LIBBPF_ERRNO__WRNGPID; | 
|  | goto done; | 
|  | } | 
|  | if (nh->nlmsg_seq != seq) { | 
|  | ret = -LIBBPF_ERRNO__INVSEQ; | 
|  | goto done; | 
|  | } | 
|  | if (nh->nlmsg_flags & NLM_F_MULTI) | 
|  | multipart = true; | 
|  | switch (nh->nlmsg_type) { | 
|  | case NLMSG_ERROR: | 
|  | err = (struct nlmsgerr *)NLMSG_DATA(nh); | 
|  | if (!err->error) | 
|  | continue; | 
|  | ret = err->error; | 
|  | libbpf_nla_dump_errormsg(nh); | 
|  | goto done; | 
|  | case NLMSG_DONE: | 
|  | return 0; | 
|  | default: | 
|  | break; | 
|  | } | 
|  | if (_fn) { | 
|  | ret = _fn(nh, fn, cookie); | 
|  | if (ret) | 
|  | return ret; | 
|  | } | 
|  | } | 
|  | } | 
|  | ret = 0; | 
|  | done: | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int bpf_set_link_xdp_fd(int ifindex, int fd, __u32 flags) | 
|  | { | 
|  | int sock, seq = 0, ret; | 
|  | struct nlattr *nla, *nla_xdp; | 
|  | struct { | 
|  | struct nlmsghdr  nh; | 
|  | struct ifinfomsg ifinfo; | 
|  | char             attrbuf[64]; | 
|  | } req; | 
|  | __u32 nl_pid = 0; | 
|  |  | 
|  | sock = libbpf_netlink_open(&nl_pid); | 
|  | if (sock < 0) | 
|  | return sock; | 
|  |  | 
|  | memset(&req, 0, sizeof(req)); | 
|  | req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); | 
|  | req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK; | 
|  | req.nh.nlmsg_type = RTM_SETLINK; | 
|  | req.nh.nlmsg_pid = 0; | 
|  | req.nh.nlmsg_seq = ++seq; | 
|  | req.ifinfo.ifi_family = AF_UNSPEC; | 
|  | req.ifinfo.ifi_index = ifindex; | 
|  |  | 
|  | /* started nested attribute for XDP */ | 
|  | nla = (struct nlattr *)(((char *)&req) | 
|  | + NLMSG_ALIGN(req.nh.nlmsg_len)); | 
|  | nla->nla_type = NLA_F_NESTED | IFLA_XDP; | 
|  | nla->nla_len = NLA_HDRLEN; | 
|  |  | 
|  | /* add XDP fd */ | 
|  | nla_xdp = (struct nlattr *)((char *)nla + nla->nla_len); | 
|  | nla_xdp->nla_type = IFLA_XDP_FD; | 
|  | nla_xdp->nla_len = NLA_HDRLEN + sizeof(int); | 
|  | memcpy((char *)nla_xdp + NLA_HDRLEN, &fd, sizeof(fd)); | 
|  | nla->nla_len += nla_xdp->nla_len; | 
|  |  | 
|  | /* if user passed in any flags, add those too */ | 
|  | if (flags) { | 
|  | nla_xdp = (struct nlattr *)((char *)nla + nla->nla_len); | 
|  | nla_xdp->nla_type = IFLA_XDP_FLAGS; | 
|  | nla_xdp->nla_len = NLA_HDRLEN + sizeof(flags); | 
|  | memcpy((char *)nla_xdp + NLA_HDRLEN, &flags, sizeof(flags)); | 
|  | nla->nla_len += nla_xdp->nla_len; | 
|  | } | 
|  |  | 
|  | req.nh.nlmsg_len += NLA_ALIGN(nla->nla_len); | 
|  |  | 
|  | if (send(sock, &req, req.nh.nlmsg_len, 0) < 0) { | 
|  | ret = -errno; | 
|  | goto cleanup; | 
|  | } | 
|  | ret = bpf_netlink_recv(sock, nl_pid, seq, NULL, NULL, NULL); | 
|  |  | 
|  | cleanup: | 
|  | close(sock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int __dump_link_nlmsg(struct nlmsghdr *nlh, | 
|  | libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie) | 
|  | { | 
|  | struct nlattr *tb[IFLA_MAX + 1], *attr; | 
|  | struct ifinfomsg *ifi = NLMSG_DATA(nlh); | 
|  | int len; | 
|  |  | 
|  | len = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)); | 
|  | attr = (struct nlattr *) ((void *) ifi + NLMSG_ALIGN(sizeof(*ifi))); | 
|  | if (libbpf_nla_parse(tb, IFLA_MAX, attr, len, NULL) != 0) | 
|  | return -LIBBPF_ERRNO__NLPARSE; | 
|  |  | 
|  | return dump_link_nlmsg(cookie, ifi, tb); | 
|  | } | 
|  |  | 
|  | static unsigned char get_xdp_id_attr(unsigned char mode, __u32 flags) | 
|  | { | 
|  | if (mode != XDP_ATTACHED_MULTI) | 
|  | return IFLA_XDP_PROG_ID; | 
|  | if (flags & XDP_FLAGS_DRV_MODE) | 
|  | return IFLA_XDP_DRV_PROG_ID; | 
|  | if (flags & XDP_FLAGS_HW_MODE) | 
|  | return IFLA_XDP_HW_PROG_ID; | 
|  | if (flags & XDP_FLAGS_SKB_MODE) | 
|  | return IFLA_XDP_SKB_PROG_ID; | 
|  |  | 
|  | return IFLA_XDP_UNSPEC; | 
|  | } | 
|  |  | 
|  | static int get_xdp_id(void *cookie, void *msg, struct nlattr **tb) | 
|  | { | 
|  | struct nlattr *xdp_tb[IFLA_XDP_MAX + 1]; | 
|  | struct xdp_id_md *xdp_id = cookie; | 
|  | struct ifinfomsg *ifinfo = msg; | 
|  | unsigned char mode, xdp_attr; | 
|  | int ret; | 
|  |  | 
|  | if (xdp_id->ifindex && xdp_id->ifindex != ifinfo->ifi_index) | 
|  | return 0; | 
|  |  | 
|  | if (!tb[IFLA_XDP]) | 
|  | return 0; | 
|  |  | 
|  | ret = libbpf_nla_parse_nested(xdp_tb, IFLA_XDP_MAX, tb[IFLA_XDP], NULL); | 
|  | if (ret) | 
|  | return ret; | 
|  |  | 
|  | if (!xdp_tb[IFLA_XDP_ATTACHED]) | 
|  | return 0; | 
|  |  | 
|  | mode = libbpf_nla_getattr_u8(xdp_tb[IFLA_XDP_ATTACHED]); | 
|  | if (mode == XDP_ATTACHED_NONE) | 
|  | return 0; | 
|  |  | 
|  | xdp_attr = get_xdp_id_attr(mode, xdp_id->flags); | 
|  | if (!xdp_attr || !xdp_tb[xdp_attr]) | 
|  | return 0; | 
|  |  | 
|  | xdp_id->id = libbpf_nla_getattr_u32(xdp_tb[xdp_attr]); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags) | 
|  | { | 
|  | struct xdp_id_md xdp_id = {}; | 
|  | int sock, ret; | 
|  | __u32 nl_pid = 0; | 
|  | __u32 mask; | 
|  |  | 
|  | if (flags & ~XDP_FLAGS_MASK) | 
|  | return -EINVAL; | 
|  |  | 
|  | /* Check whether the single {HW,DRV,SKB} mode is set */ | 
|  | flags &= (XDP_FLAGS_SKB_MODE | XDP_FLAGS_DRV_MODE | XDP_FLAGS_HW_MODE); | 
|  | mask = flags - 1; | 
|  | if (flags && flags & mask) | 
|  | return -EINVAL; | 
|  |  | 
|  | sock = libbpf_netlink_open(&nl_pid); | 
|  | if (sock < 0) | 
|  | return sock; | 
|  |  | 
|  | xdp_id.ifindex = ifindex; | 
|  | xdp_id.flags = flags; | 
|  |  | 
|  | ret = libbpf_nl_get_link(sock, nl_pid, get_xdp_id, &xdp_id); | 
|  | if (!ret) | 
|  | *prog_id = xdp_id.id; | 
|  |  | 
|  | close(sock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int libbpf_nl_get_link(int sock, unsigned int nl_pid, | 
|  | libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie) | 
|  | { | 
|  | struct { | 
|  | struct nlmsghdr nlh; | 
|  | struct ifinfomsg ifm; | 
|  | } req = { | 
|  | .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)), | 
|  | .nlh.nlmsg_type = RTM_GETLINK, | 
|  | .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST, | 
|  | .ifm.ifi_family = AF_PACKET, | 
|  | }; | 
|  | int seq = time(NULL); | 
|  |  | 
|  | req.nlh.nlmsg_seq = seq; | 
|  | if (send(sock, &req, req.nlh.nlmsg_len, 0) < 0) | 
|  | return -errno; | 
|  |  | 
|  | return bpf_netlink_recv(sock, nl_pid, seq, __dump_link_nlmsg, | 
|  | dump_link_nlmsg, cookie); | 
|  | } | 
|  |  | 
|  | static int __dump_class_nlmsg(struct nlmsghdr *nlh, | 
|  | libbpf_dump_nlmsg_t dump_class_nlmsg, | 
|  | void *cookie) | 
|  | { | 
|  | struct nlattr *tb[TCA_MAX + 1], *attr; | 
|  | struct tcmsg *t = NLMSG_DATA(nlh); | 
|  | int len; | 
|  |  | 
|  | len = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*t)); | 
|  | attr = (struct nlattr *) ((void *) t + NLMSG_ALIGN(sizeof(*t))); | 
|  | if (libbpf_nla_parse(tb, TCA_MAX, attr, len, NULL) != 0) | 
|  | return -LIBBPF_ERRNO__NLPARSE; | 
|  |  | 
|  | return dump_class_nlmsg(cookie, t, tb); | 
|  | } | 
|  |  | 
|  | int libbpf_nl_get_class(int sock, unsigned int nl_pid, int ifindex, | 
|  | libbpf_dump_nlmsg_t dump_class_nlmsg, void *cookie) | 
|  | { | 
|  | struct { | 
|  | struct nlmsghdr nlh; | 
|  | struct tcmsg t; | 
|  | } req = { | 
|  | .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)), | 
|  | .nlh.nlmsg_type = RTM_GETTCLASS, | 
|  | .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST, | 
|  | .t.tcm_family = AF_UNSPEC, | 
|  | .t.tcm_ifindex = ifindex, | 
|  | }; | 
|  | int seq = time(NULL); | 
|  |  | 
|  | req.nlh.nlmsg_seq = seq; | 
|  | if (send(sock, &req, req.nlh.nlmsg_len, 0) < 0) | 
|  | return -errno; | 
|  |  | 
|  | return bpf_netlink_recv(sock, nl_pid, seq, __dump_class_nlmsg, | 
|  | dump_class_nlmsg, cookie); | 
|  | } | 
|  |  | 
|  | static int __dump_qdisc_nlmsg(struct nlmsghdr *nlh, | 
|  | libbpf_dump_nlmsg_t dump_qdisc_nlmsg, | 
|  | void *cookie) | 
|  | { | 
|  | struct nlattr *tb[TCA_MAX + 1], *attr; | 
|  | struct tcmsg *t = NLMSG_DATA(nlh); | 
|  | int len; | 
|  |  | 
|  | len = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*t)); | 
|  | attr = (struct nlattr *) ((void *) t + NLMSG_ALIGN(sizeof(*t))); | 
|  | if (libbpf_nla_parse(tb, TCA_MAX, attr, len, NULL) != 0) | 
|  | return -LIBBPF_ERRNO__NLPARSE; | 
|  |  | 
|  | return dump_qdisc_nlmsg(cookie, t, tb); | 
|  | } | 
|  |  | 
|  | int libbpf_nl_get_qdisc(int sock, unsigned int nl_pid, int ifindex, | 
|  | libbpf_dump_nlmsg_t dump_qdisc_nlmsg, void *cookie) | 
|  | { | 
|  | struct { | 
|  | struct nlmsghdr nlh; | 
|  | struct tcmsg t; | 
|  | } req = { | 
|  | .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)), | 
|  | .nlh.nlmsg_type = RTM_GETQDISC, | 
|  | .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST, | 
|  | .t.tcm_family = AF_UNSPEC, | 
|  | .t.tcm_ifindex = ifindex, | 
|  | }; | 
|  | int seq = time(NULL); | 
|  |  | 
|  | req.nlh.nlmsg_seq = seq; | 
|  | if (send(sock, &req, req.nlh.nlmsg_len, 0) < 0) | 
|  | return -errno; | 
|  |  | 
|  | return bpf_netlink_recv(sock, nl_pid, seq, __dump_qdisc_nlmsg, | 
|  | dump_qdisc_nlmsg, cookie); | 
|  | } | 
|  |  | 
|  | static int __dump_filter_nlmsg(struct nlmsghdr *nlh, | 
|  | libbpf_dump_nlmsg_t dump_filter_nlmsg, | 
|  | void *cookie) | 
|  | { | 
|  | struct nlattr *tb[TCA_MAX + 1], *attr; | 
|  | struct tcmsg *t = NLMSG_DATA(nlh); | 
|  | int len; | 
|  |  | 
|  | len = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*t)); | 
|  | attr = (struct nlattr *) ((void *) t + NLMSG_ALIGN(sizeof(*t))); | 
|  | if (libbpf_nla_parse(tb, TCA_MAX, attr, len, NULL) != 0) | 
|  | return -LIBBPF_ERRNO__NLPARSE; | 
|  |  | 
|  | return dump_filter_nlmsg(cookie, t, tb); | 
|  | } | 
|  |  | 
|  | int libbpf_nl_get_filter(int sock, unsigned int nl_pid, int ifindex, int handle, | 
|  | libbpf_dump_nlmsg_t dump_filter_nlmsg, void *cookie) | 
|  | { | 
|  | struct { | 
|  | struct nlmsghdr nlh; | 
|  | struct tcmsg t; | 
|  | } req = { | 
|  | .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)), | 
|  | .nlh.nlmsg_type = RTM_GETTFILTER, | 
|  | .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST, | 
|  | .t.tcm_family = AF_UNSPEC, | 
|  | .t.tcm_ifindex = ifindex, | 
|  | .t.tcm_parent = handle, | 
|  | }; | 
|  | int seq = time(NULL); | 
|  |  | 
|  | req.nlh.nlmsg_seq = seq; | 
|  | if (send(sock, &req, req.nlh.nlmsg_len, 0) < 0) | 
|  | return -errno; | 
|  |  | 
|  | return bpf_netlink_recv(sock, nl_pid, seq, __dump_filter_nlmsg, | 
|  | dump_filter_nlmsg, cookie); | 
|  | } |