258 lines
6 KiB
C
258 lines
6 KiB
C
/*
|
|
* eBPF user space agent part
|
|
*
|
|
* Simple, _self-contained_ user space agent for the eBPF kernel
|
|
* ebpf_prog.c program, which gets all map fds passed from tc via unix
|
|
* domain socket in one transaction and can thus keep referencing
|
|
* them from user space in order to read out (or possibly modify)
|
|
* map data. Here, just as a minimal example to display counters.
|
|
*
|
|
* The agent only uses the bpf(2) syscall API to read or possibly
|
|
* write to eBPF maps, it doesn't need to be aware of the low-level
|
|
* bytecode parts and/or ELF parsing bits.
|
|
*
|
|
* ! For more details, see header comment in bpf_prog.c !
|
|
*
|
|
* gcc bpf_agent.c -o bpf_agent -Wall -O2
|
|
*
|
|
* For example, a more complex user space agent could run on each
|
|
* host, reading and writing into eBPF maps used by tc classifier
|
|
* and actions. It would thus allow for implementing a distributed
|
|
* tc architecture, for example, which would push down central
|
|
* policies into eBPF maps, and thus altering run-time behaviour.
|
|
*
|
|
* -- Happy eBPF hacking! ;)
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <unistd.h>
|
|
#include <stdint.h>
|
|
#include <assert.h>
|
|
|
|
#include <sys/un.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/socket.h>
|
|
|
|
/* Just some misc macros as min(), offsetof(), etc. */
|
|
#include "../../include/utils.h"
|
|
/* Common code from fd passing. */
|
|
#include "../../include/bpf_scm.h"
|
|
/* Common, shared definitions with ebpf_prog.c */
|
|
#include "bpf_shared.h"
|
|
/* Mini syscall wrapper */
|
|
#include "bpf_sys.h"
|
|
|
|
static void bpf_dump_drops(int fd)
|
|
{
|
|
int cpu, max;
|
|
|
|
max = sysconf(_SC_NPROCESSORS_ONLN);
|
|
|
|
printf(" `- number of drops:");
|
|
for (cpu = 0; cpu < max; cpu++) {
|
|
long drops;
|
|
|
|
assert(bpf_lookup_elem(fd, &cpu, &drops) == 0);
|
|
printf("\tcpu%d: %5ld", cpu, drops);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
static void bpf_dump_queue(int fd)
|
|
{
|
|
/* Just for the same of the example. */
|
|
int max_queue = 4, i;
|
|
|
|
printf(" | nic queues:");
|
|
for (i = 0; i < max_queue; i++) {
|
|
struct count_queue cq;
|
|
int ret;
|
|
|
|
memset(&cq, 0, sizeof(cq));
|
|
ret = bpf_lookup_elem(fd, &i, &cq);
|
|
assert(ret == 0 || (ret < 0 && errno == ENOENT));
|
|
|
|
printf("\tq%d:[pkts: %ld, mis: %ld]",
|
|
i, cq.total, cq.mismatch);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
static void bpf_dump_proto(int fd)
|
|
{
|
|
uint8_t protos[] = { IPPROTO_TCP, IPPROTO_UDP, IPPROTO_ICMP };
|
|
char *names[] = { "tcp", "udp", "icmp" };
|
|
int i;
|
|
|
|
printf(" ` protos:");
|
|
for (i = 0; i < ARRAY_SIZE(protos); i++) {
|
|
struct count_tuple ct;
|
|
int ret;
|
|
|
|
memset(&ct, 0, sizeof(ct));
|
|
ret = bpf_lookup_elem(fd, &protos[i], &ct);
|
|
assert(ret == 0 || (ret < 0 && errno == ENOENT));
|
|
|
|
printf("\t%s:[pkts: %ld, bytes: %ld]",
|
|
names[i], ct.packets, ct.bytes);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
static void bpf_dump_map_data(int *tfd)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < 30; i++) {
|
|
const int period = 5;
|
|
|
|
printf("data, period: %dsec\n", period);
|
|
|
|
bpf_dump_drops(tfd[BPF_MAP_ID_DROPS]);
|
|
bpf_dump_queue(tfd[BPF_MAP_ID_QUEUE]);
|
|
bpf_dump_proto(tfd[BPF_MAP_ID_PROTO]);
|
|
|
|
sleep(period);
|
|
}
|
|
}
|
|
|
|
static void bpf_info_loop(int *fds, struct bpf_map_aux *aux)
|
|
{
|
|
int i, tfd[BPF_MAP_ID_MAX];
|
|
|
|
printf("ver: %d\nobj: %s\ndev: %lu\nino: %lu\nmaps: %u\n",
|
|
aux->uds_ver, aux->obj_name, aux->obj_st.st_dev,
|
|
aux->obj_st.st_ino, aux->num_ent);
|
|
|
|
for (i = 0; i < aux->num_ent; i++) {
|
|
printf("map%d:\n", i);
|
|
printf(" `- fd: %u\n", fds[i]);
|
|
printf(" | serial: %u\n", aux->ent[i].id);
|
|
printf(" | type: %u\n", aux->ent[i].type);
|
|
printf(" | max elem: %u\n", aux->ent[i].max_elem);
|
|
printf(" | size key: %u\n", aux->ent[i].size_key);
|
|
printf(" ` size val: %u\n", aux->ent[i].size_value);
|
|
|
|
tfd[aux->ent[i].id] = fds[i];
|
|
}
|
|
|
|
bpf_dump_map_data(tfd);
|
|
}
|
|
|
|
static void bpf_map_get_from_env(int *tfd)
|
|
{
|
|
char key[64], *val;
|
|
int i;
|
|
|
|
for (i = 0; i < BPF_MAP_ID_MAX; i++) {
|
|
memset(key, 0, sizeof(key));
|
|
snprintf(key, sizeof(key), "BPF_MAP%d", i);
|
|
|
|
val = getenv(key);
|
|
assert(val != NULL);
|
|
|
|
tfd[i] = atoi(val);
|
|
}
|
|
}
|
|
|
|
static int bpf_map_set_recv(int fd, int *fds, struct bpf_map_aux *aux,
|
|
unsigned int entries)
|
|
{
|
|
struct bpf_map_set_msg msg;
|
|
int *cmsg_buf, min_fd, i;
|
|
char *amsg_buf, *mmsg_buf;
|
|
|
|
cmsg_buf = bpf_map_set_init(&msg, NULL, 0);
|
|
amsg_buf = (char *)msg.aux.ent;
|
|
mmsg_buf = (char *)&msg.aux;
|
|
|
|
for (i = 0; i < entries; i += min_fd) {
|
|
struct cmsghdr *cmsg;
|
|
int ret;
|
|
|
|
min_fd = min(BPF_SCM_MAX_FDS * 1U, entries - i);
|
|
|
|
bpf_map_set_init_single(&msg, min_fd);
|
|
|
|
ret = recvmsg(fd, &msg.hdr, 0);
|
|
if (ret <= 0)
|
|
return ret ? : -1;
|
|
|
|
cmsg = CMSG_FIRSTHDR(&msg.hdr);
|
|
if (!cmsg || cmsg->cmsg_type != SCM_RIGHTS)
|
|
return -EINVAL;
|
|
if (msg.hdr.msg_flags & MSG_CTRUNC)
|
|
return -EIO;
|
|
|
|
min_fd = (cmsg->cmsg_len - sizeof(*cmsg)) / sizeof(fd);
|
|
if (min_fd > entries || min_fd <= 0)
|
|
return -1;
|
|
|
|
memcpy(&fds[i], cmsg_buf, sizeof(fds[0]) * min_fd);
|
|
memcpy(&aux->ent[i], amsg_buf, sizeof(aux->ent[0]) * min_fd);
|
|
memcpy(aux, mmsg_buf, offsetof(struct bpf_map_aux, ent));
|
|
|
|
if (i + min_fd == aux->num_ent)
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
int fds[BPF_SCM_MAX_FDS];
|
|
struct bpf_map_aux aux;
|
|
struct sockaddr_un addr;
|
|
int fd, ret, i;
|
|
|
|
/* When arguments are being passed, we take it as a path
|
|
* to a Unix domain socket, otherwise we grab the fds
|
|
* from the environment to demonstrate both possibilities.
|
|
*/
|
|
if (argc == 1) {
|
|
int tfd[BPF_MAP_ID_MAX];
|
|
|
|
bpf_map_get_from_env(tfd);
|
|
bpf_dump_map_data(tfd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
fd = socket(AF_UNIX, SOCK_DGRAM, 0);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "Cannot open socket: %s\n",
|
|
strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sun_family = AF_UNIX;
|
|
strncpy(addr.sun_path, argv[argc - 1], sizeof(addr.sun_path));
|
|
|
|
ret = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
|
|
if (ret < 0) {
|
|
fprintf(stderr, "Cannot bind to socket: %s\n",
|
|
strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
memset(fds, 0, sizeof(fds));
|
|
memset(&aux, 0, sizeof(aux));
|
|
|
|
ret = bpf_map_set_recv(fd, fds, &aux, BPF_SCM_MAX_FDS);
|
|
if (ret >= 0)
|
|
bpf_info_loop(fds, &aux);
|
|
|
|
for (i = 0; i < aux.num_ent; i++)
|
|
close(fds[i]);
|
|
|
|
close(fd);
|
|
return 0;
|
|
}
|