mirror of
https://github.com/xdp-project/bpf-examples.git
synced 2024-05-06 15:54:53 +00:00
Add parsing of TCP FIN/RST to determine if connection is being closed, and if so delete state directly from BPF programs. Only enabled on tc-program, as verifier is unhappy about in on XDP side for some reason. Signed-off-by: Simon Sundberg <simon.sundberg@kau.se>
98 lines
3.4 KiB
C
98 lines
3.4 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <iproute2/bpf_elf.h>
|
|
|
|
#include "pping.h"
|
|
#include "pping_helpers.h"
|
|
|
|
#define RATE_LIMIT \
|
|
100000000UL // 100ms. Temporary solution, should be set by userspace
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
// TC-BFP for parsing packet identifier from egress traffic and add to map
|
|
SEC(TCBPF_PROG_SEC)
|
|
int pping_egress(struct __sk_buff *skb)
|
|
{
|
|
struct packet_id p_id = { 0 };
|
|
__u64 p_ts;
|
|
struct parsing_context pctx = {
|
|
.data = (void *)(long)skb->data,
|
|
.data_end = (void *)(long)skb->data_end,
|
|
.pkt_len = skb->len,
|
|
.nh = { .pos = pctx.data },
|
|
.is_egress = true,
|
|
};
|
|
bool flow_closing = false;
|
|
struct flow_state *f_state;
|
|
struct flow_state new_state = { 0 };
|
|
|
|
if (parse_packet_identifier(&pctx, &p_id, &flow_closing) < 0)
|
|
goto out;
|
|
|
|
// Delete flow and create no timestamp entry if flow is closing
|
|
if (flow_closing) {
|
|
bpf_map_delete_elem(&flow_state, &p_id.flow);
|
|
goto out;
|
|
}
|
|
|
|
// Check flow state
|
|
f_state = bpf_map_lookup_elem(&flow_state, &p_id.flow);
|
|
if (!f_state) { // No previous state - attempt to create it
|
|
bpf_map_update_elem(&flow_state, &p_id.flow, &new_state,
|
|
BPF_NOEXIST);
|
|
f_state = bpf_map_lookup_elem(&flow_state, &p_id.flow);
|
|
if (!f_state)
|
|
goto out;
|
|
}
|
|
|
|
// Check if identfier is new
|
|
/* The gap between checking and updating last_id may cause concurrency
|
|
* issues where multiple packets may simultaneously think they are the
|
|
* first with a new identifier. As long as all of the identifiers are
|
|
* the same though, only one should be able to create a timestamp entry.
|
|
|
|
* A bigger issue is that older identifiers (for example due to
|
|
* out-of-order packets) may pass this check and update the current
|
|
* identifier to an old one. This means that both the packet with the
|
|
* old identifier itself, as well the next packet with the current
|
|
* identifier, may be considered packets with new identifiers (even if
|
|
* both have been seen before). For TCP timestamps this could be
|
|
* prevented by changing the check to '>=' instead, but it may not be
|
|
* suitable for other protocols, such as QUIC and its spinbit.
|
|
*
|
|
* For now, just hope that the rate limit saves us from creating an
|
|
* incorrect timestamp. That may however also fail, either due to the
|
|
* to it happening in a time it's not limited by rate sampling, or
|
|
* because of rate check failing due to concurrency issues.
|
|
*/
|
|
if (f_state->last_id == p_id.identifier)
|
|
goto out;
|
|
f_state->last_id = p_id.identifier;
|
|
|
|
// Check rate-limit
|
|
/*
|
|
* The window between checking and updating last_timestamp may cause
|
|
* concurrency issues, where multiple packets simultaneously pass the
|
|
* rate limit. However, as long as they have the same identifier, only
|
|
* a single timestamp entry should successfully be created.
|
|
*/
|
|
p_ts = bpf_ktime_get_ns(); // or bpf_ktime_get_boot_ns
|
|
if (p_ts < f_state->last_timestamp ||
|
|
p_ts - f_state->last_timestamp < RATE_LIMIT)
|
|
goto out;
|
|
|
|
/*
|
|
* Updates attempt at creating timestamp, even if creation of timestamp
|
|
* fails (due to map being full). This should make the competition for
|
|
* the next available map slot somewhat fairer between heavy and sparse
|
|
* flows.
|
|
*/
|
|
f_state->last_timestamp = p_ts;
|
|
bpf_map_update_elem(&ts_start, &p_id, &p_ts, BPF_NOEXIST);
|
|
|
|
out:
|
|
return BPF_OK;
|
|
}
|