123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451 |
- // SPDX-License-Identifier: GPL-2.0+
- /*
- * Copyright (C) 2021 Felix Fietkau <nbd@nbd.name>
- */
- #define KBUILD_MODNAME "foo"
- #include <uapi/linux/bpf.h>
- #include <uapi/linux/if_ether.h>
- #include <uapi/linux/if_packet.h>
- #include <uapi/linux/ip.h>
- #include <uapi/linux/ipv6.h>
- #include <uapi/linux/in.h>
- #include <uapi/linux/tcp.h>
- #include <uapi/linux/udp.h>
- #include <uapi/linux/filter.h>
- #include <uapi/linux/pkt_cls.h>
- #include <linux/ip.h>
- #include <net/ipv6.h>
- #include <bpf/bpf_helpers.h>
- #include <bpf/bpf_endian.h>
- #include "bpf_skb_utils.h"
- #include "qosify-bpf.h"
- #define INET_ECN_MASK 3
- #define FLOW_CHECK_INTERVAL ((u32)((1000000000ULL) >> 24))
- #define FLOW_TIMEOUT ((u32)((30ULL * 1000000000ULL) >> 24))
- #define FLOW_BULK_TIMEOUT 5
- #define EWMA_SHIFT 12
- const volatile static uint32_t module_flags = 0;
- struct flow_bucket {
- __u32 last_update;
- __u32 pkt_len_avg;
- __u32 pkt_count;
- __u32 bulk_timeout;
- };
- struct {
- __uint(type, BPF_MAP_TYPE_ARRAY);
- __uint(pinning, 1);
- __type(key, __u32);
- __type(value, struct qosify_config);
- __uint(max_entries, 1);
- } config SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_ARRAY);
- __uint(pinning, 1);
- __type(key, __u32);
- __type(value, __u8);
- __uint(max_entries, 1 << 16);
- } tcp_ports SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_ARRAY);
- __uint(pinning, 1);
- __type(key, __u32);
- __type(value, __u8);
- __uint(max_entries, 1 << 16);
- } udp_ports SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_LRU_HASH);
- __uint(pinning, 1);
- __type(key, __u32);
- __type(value, struct flow_bucket);
- __uint(max_entries, QOSIFY_FLOW_BUCKETS);
- } flow_map SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_HASH);
- __uint(pinning, 1);
- __uint(key_size, sizeof(struct in_addr));
- __type(value, struct qosify_ip_map_val);
- __uint(max_entries, 100000);
- __uint(map_flags, BPF_F_NO_PREALLOC);
- } ipv4_map SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_HASH);
- __uint(pinning, 1);
- __uint(key_size, sizeof(struct in6_addr));
- __type(value, struct qosify_ip_map_val);
- __uint(max_entries, 100000);
- __uint(map_flags, BPF_F_NO_PREALLOC);
- } ipv6_map SEC(".maps");
- struct {
- __uint(type, BPF_MAP_TYPE_ARRAY);
- __uint(pinning, 1);
- __type(key, __u32);
- __type(value, struct qosify_class);
- __uint(max_entries, QOSIFY_MAX_CLASS_ENTRIES +
- QOSIFY_DEFAULT_CLASS_ENTRIES);
- } class_map SEC(".maps");
- static struct qosify_config *get_config(void)
- {
- __u32 key = 0;
- return bpf_map_lookup_elem(&config, &key);
- }
- static __always_inline __u32 cur_time(void)
- {
- __u32 val = bpf_ktime_get_ns() >> 24;
- if (!val)
- val = 1;
- return val;
- }
- static __always_inline __u32 ewma(__u32 *avg, __u32 val)
- {
- if (*avg)
- *avg = (*avg * 3) / 4 + (val << EWMA_SHIFT) / 4;
- else
- *avg = val << EWMA_SHIFT;
- return *avg >> EWMA_SHIFT;
- }
- static __always_inline __u8 dscp_val(struct qosify_dscp_val *val, bool ingress)
- {
- __u8 ival = val->ingress;
- __u8 eval = val->egress;
- return ingress ? ival : eval;
- }
- static __always_inline void
- ipv4_change_dsfield(struct __sk_buff *skb, __u32 offset,
- __u8 mask, __u8 value, bool force)
- {
- struct iphdr *iph;
- __u32 check;
- __u8 dsfield;
- iph = skb_ptr(skb, offset, sizeof(*iph));
- if (!iph)
- return;
- check = bpf_ntohs(iph->check);
- if ((iph->tos & mask) && !force)
- return;
- dsfield = (iph->tos & mask) | value;
- if (iph->tos == dsfield)
- return;
- check += iph->tos;
- if ((check + 1) >> 16)
- check = (check + 1) & 0xffff;
- check -= dsfield;
- check += check >> 16;
- iph->check = bpf_htons(check);
- iph->tos = dsfield;
- }
- static __always_inline void
- ipv6_change_dsfield(struct __sk_buff *skb, __u32 offset,
- __u8 mask, __u8 value, bool force)
- {
- struct ipv6hdr *ipv6h;
- __u16 *p;
- __u16 val;
- ipv6h = skb_ptr(skb, offset, sizeof(*ipv6h));
- if (!ipv6h)
- return;
- p = (__u16 *)ipv6h;
- if (((*p >> 4) & mask) && !force)
- return;
- val = (*p & bpf_htons((((__u16)mask << 4) | 0xf00f))) | bpf_htons((__u16)value << 4);
- if (val == *p)
- return;
- *p = val;
- }
- static void
- parse_l4proto(struct qosify_config *config, struct skb_parser_info *info,
- bool ingress, __u8 *out_val)
- {
- struct udphdr *udp;
- __u32 src, dest, key;
- __u8 *value;
- __u8 proto = info->proto;
- udp = skb_info_ptr(info, sizeof(*udp));
- if (!udp)
- return;
- if (config && (proto == IPPROTO_ICMP || proto == IPPROTO_ICMPV6)) {
- *out_val = config->dscp_icmp;
- return;
- }
- src = READ_ONCE(udp->source);
- dest = READ_ONCE(udp->dest);
- if (ingress)
- key = src;
- else
- key = dest;
- if (proto == IPPROTO_TCP) {
- value = bpf_map_lookup_elem(&tcp_ports, &key);
- } else {
- if (proto != IPPROTO_UDP)
- key = 0;
- value = bpf_map_lookup_elem(&udp_ports, &key);
- }
- if (value)
- *out_val = *value;
- }
- static __always_inline void
- check_flow_bulk(struct qosify_flow_config *config, struct __sk_buff *skb,
- struct flow_bucket *flow, __u8 *out_val)
- {
- bool trigger = false;
- __s32 delta;
- __u32 time;
- int segs = 1;
- if (!config->bulk_trigger_pps)
- return;
- time = cur_time();
- if (!flow->last_update)
- goto reset;
- delta = time - flow->last_update;
- if ((u32)delta > FLOW_TIMEOUT)
- goto reset;
- if (skb->gso_segs)
- segs = skb->gso_segs;
- flow->pkt_count += segs;
- if (flow->pkt_count > config->bulk_trigger_pps) {
- flow->bulk_timeout = config->bulk_trigger_timeout + 1;
- trigger = true;
- }
- if (delta >= FLOW_CHECK_INTERVAL) {
- if (flow->bulk_timeout && !trigger)
- flow->bulk_timeout--;
- goto clear;
- }
- goto out;
- reset:
- flow->pkt_len_avg = 0;
- clear:
- flow->pkt_count = 1;
- flow->last_update = time;
- out:
- if (flow->bulk_timeout)
- *out_val = config->dscp_bulk;
- }
- static __always_inline void
- check_flow_prio(struct qosify_flow_config *config, struct __sk_buff *skb,
- struct flow_bucket *flow, __u8 *out_val)
- {
- int cur_len = skb->len;
- if (flow->bulk_timeout)
- return;
- if (!config->prio_max_avg_pkt_len)
- return;
- if (skb->gso_segs > 1)
- cur_len /= skb->gso_segs;
- if (ewma(&flow->pkt_len_avg, cur_len) <= config->prio_max_avg_pkt_len)
- *out_val = config->dscp_prio;
- }
- static __always_inline void
- check_flow(struct qosify_flow_config *config, struct __sk_buff *skb,
- __u8 *out_val)
- {
- struct flow_bucket flow_data;
- struct flow_bucket *flow;
- __u32 hash;
- if (!config)
- return;
- hash = bpf_get_hash_recalc(skb);
- flow = bpf_map_lookup_elem(&flow_map, &hash);
- if (!flow) {
- memset(&flow_data, 0, sizeof(flow_data));
- bpf_map_update_elem(&flow_map, &hash, &flow_data, BPF_ANY);
- flow = bpf_map_lookup_elem(&flow_map, &hash);
- if (!flow)
- return;
- }
- check_flow_bulk(config, skb, flow, out_val);
- check_flow_prio(config, skb, flow, out_val);
- }
- static __always_inline struct qosify_ip_map_val *
- parse_ipv4(struct qosify_config *config, struct skb_parser_info *info,
- bool ingress, __u8 *out_val)
- {
- struct iphdr *iph;
- __u8 ipproto;
- int hdr_len;
- void *key;
- iph = skb_parse_ipv4(info, sizeof(struct udphdr));
- if (!iph)
- return NULL;
- parse_l4proto(config, info, ingress, out_val);
- if (ingress)
- key = &iph->saddr;
- else
- key = &iph->daddr;
- return bpf_map_lookup_elem(&ipv4_map, key);
- }
- static __always_inline struct qosify_ip_map_val *
- parse_ipv6(struct qosify_config *config, struct skb_parser_info *info,
- bool ingress, __u8 *out_val)
- {
- struct ipv6hdr *iph;
- __u8 ipproto;
- void *key;
- iph = skb_parse_ipv6(info, sizeof(struct udphdr));
- if (!iph)
- return NULL;
- if (ingress)
- key = &iph->saddr;
- else
- key = &iph->daddr;
- parse_l4proto(config, info, ingress, out_val);
- return bpf_map_lookup_elem(&ipv6_map, key);
- }
- static __always_inline int
- dscp_lookup_class(uint8_t *dscp, bool ingress, struct qosify_class **out_class)
- {
- struct qosify_class *class;
- __u8 fallback_flag;
- __u32 key;
- if (!(*dscp & QOSIFY_DSCP_CLASS_FLAG))
- return 0;
- fallback_flag = *dscp & QOSIFY_DSCP_FALLBACK_FLAG;
- key = *dscp & QOSIFY_DSCP_VALUE_MASK;
- class = bpf_map_lookup_elem(&class_map, &key);
- if (!class)
- return -1;
- if (!(class->flags & QOSIFY_CLASS_FLAG_PRESENT))
- return -1;
- *dscp = dscp_val(&class->val, ingress);
- *dscp |= fallback_flag;
- *out_class = class;
- return 0;
- }
- SEC("tc")
- int classify(struct __sk_buff *skb)
- {
- struct skb_parser_info info;
- bool ingress = module_flags & QOSIFY_INGRESS;
- struct qosify_config *config;
- struct qosify_class *class = NULL;
- struct qosify_ip_map_val *ip_val;
- __u32 iph_offset;
- __u8 dscp = 0;
- void *iph;
- bool force;
- int type;
- config = get_config();
- if (!config)
- return TC_ACT_UNSPEC;
- skb_parse_init(&info, skb);
- if (module_flags & QOSIFY_IP_ONLY) {
- type = info.proto = skb->protocol;
- } else if (skb_parse_ethernet(&info)) {
- skb_parse_vlan(&info);
- skb_parse_vlan(&info);
- type = info.proto;
- } else {
- return TC_ACT_UNSPEC;
- }
- iph_offset = info.offset;
- if (type == bpf_htons(ETH_P_IP))
- ip_val = parse_ipv4(config, &info, ingress, &dscp);
- else if (type == bpf_htons(ETH_P_IPV6))
- ip_val = parse_ipv6(config, &info, ingress, &dscp);
- else
- return TC_ACT_UNSPEC;
- if (ip_val) {
- if (!ip_val->seen)
- ip_val->seen = 1;
- dscp = ip_val->dscp;
- }
- if (dscp_lookup_class(&dscp, ingress, &class))
- return TC_ACT_UNSPEC;
- if (class) {
- check_flow(&class->config, skb, &dscp);
- if (dscp_lookup_class(&dscp, ingress, &class))
- return TC_ACT_UNSPEC;
- }
- dscp &= GENMASK(5, 0);
- dscp <<= 2;
- force = !(dscp & QOSIFY_DSCP_FALLBACK_FLAG);
- if (type == bpf_htons(ETH_P_IP))
- ipv4_change_dsfield(skb, iph_offset, INET_ECN_MASK, dscp, force);
- else if (type == bpf_htons(ETH_P_IPV6))
- ipv6_change_dsfield(skb, iph_offset, INET_ECN_MASK, dscp, force);
- return TC_ACT_UNSPEC;
- }
- char _license[] SEC("license") = "GPL";
|