Linux Audio

Check our new training course

Loading...
v6.8
  1/* eBPF example program:
  2 *
  3 * - Loads eBPF program
  4 *
  5 *   The eBPF program sets the sk_bound_dev_if index in new AF_INET{6}
  6 *   sockets opened by processes in the cgroup.
  7 *
  8 * - Attaches the new program to a cgroup using BPF_PROG_ATTACH
  9 */
 10
 11#define _GNU_SOURCE
 12
 13#include <stdio.h>
 14#include <stdlib.h>
 15#include <stddef.h>
 16#include <string.h>
 17#include <unistd.h>
 18#include <assert.h>
 19#include <errno.h>
 20#include <fcntl.h>
 21#include <net/if.h>
 22#include <inttypes.h>
 23#include <linux/bpf.h>
 24#include <bpf/bpf.h>
 25
 26#include "bpf_insn.h"
 27
 28char bpf_log_buf[BPF_LOG_BUF_SIZE];
 29
 30static int prog_load(__u32 idx, __u32 mark, __u32 prio)
 31{
 32	/* save pointer to context */
 33	struct bpf_insn prog_start[] = {
 34		BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
 35	};
 36	struct bpf_insn prog_end[] = {
 37		BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 = verdict */
 38		BPF_EXIT_INSN(),
 39	};
 40
 41	/* set sk_bound_dev_if on socket */
 42	struct bpf_insn prog_dev[] = {
 43		BPF_MOV64_IMM(BPF_REG_3, idx),
 44		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, bound_dev_if)),
 45		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, bound_dev_if)),
 46	};
 47
 48	/* set mark on socket */
 49	struct bpf_insn prog_mark[] = {
 50		/* get uid of process */
 51		BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
 52			     BPF_FUNC_get_current_uid_gid),
 53		BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff),
 54
 55		/* if uid is 0, use given mark, else use the uid as the mark */
 56		BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
 57		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
 58		BPF_MOV64_IMM(BPF_REG_3, mark),
 59
 60		/* set the mark on the new socket */
 61		BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
 62		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)),
 63		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)),
 64	};
 65
 66	/* set priority on socket */
 67	struct bpf_insn prog_prio[] = {
 68		BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
 69		BPF_MOV64_IMM(BPF_REG_3, prio),
 70		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, priority)),
 71		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, priority)),
 72	};
 73	LIBBPF_OPTS(bpf_prog_load_opts, opts,
 74		.log_buf = bpf_log_buf,
 75		.log_size = BPF_LOG_BUF_SIZE,
 76	);
 77
 78	struct bpf_insn *prog;
 79	size_t insns_cnt;
 80	void *p;
 81	int ret;
 82
 83	insns_cnt = sizeof(prog_start) + sizeof(prog_end);
 84	if (idx)
 85		insns_cnt += sizeof(prog_dev);
 86
 87	if (mark)
 88		insns_cnt += sizeof(prog_mark);
 89
 90	if (prio)
 91		insns_cnt += sizeof(prog_prio);
 92
 93	p = prog = malloc(insns_cnt);
 94	if (!prog) {
 95		fprintf(stderr, "Failed to allocate memory for instructions\n");
 96		return EXIT_FAILURE;
 97	}
 98
 99	memcpy(p, prog_start, sizeof(prog_start));
100	p += sizeof(prog_start);
101
102	if (idx) {
103		memcpy(p, prog_dev, sizeof(prog_dev));
104		p += sizeof(prog_dev);
105	}
106
107	if (mark) {
108		memcpy(p, prog_mark, sizeof(prog_mark));
109		p += sizeof(prog_mark);
110	}
111
112	if (prio) {
113		memcpy(p, prog_prio, sizeof(prog_prio));
114		p += sizeof(prog_prio);
115	}
116
117	memcpy(p, prog_end, sizeof(prog_end));
118	p += sizeof(prog_end);
119
120	insns_cnt /= sizeof(struct bpf_insn);
121
122	ret = bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCK, NULL, "GPL",
123			    prog, insns_cnt, &opts);
124
125	free(prog);
126
127	return ret;
128}
129
130static int get_bind_to_device(int sd, char *name, size_t len)
131{
132	socklen_t optlen = len;
133	int rc;
134
135	name[0] = '\0';
136	rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
137	if (rc < 0)
138		perror("setsockopt(SO_BINDTODEVICE)");
139
140	return rc;
141}
142
143static unsigned int get_somark(int sd)
144{
145	unsigned int mark = 0;
146	socklen_t optlen = sizeof(mark);
147	int rc;
148
149	rc = getsockopt(sd, SOL_SOCKET, SO_MARK, &mark, &optlen);
150	if (rc < 0)
151		perror("getsockopt(SO_MARK)");
152
153	return mark;
154}
155
156static unsigned int get_priority(int sd)
157{
158	unsigned int prio = 0;
159	socklen_t optlen = sizeof(prio);
160	int rc;
161
162	rc = getsockopt(sd, SOL_SOCKET, SO_PRIORITY, &prio, &optlen);
163	if (rc < 0)
164		perror("getsockopt(SO_PRIORITY)");
165
166	return prio;
167}
168
169static int show_sockopts(int family)
170{
171	unsigned int mark, prio;
172	char name[16];
173	int sd;
174
175	sd = socket(family, SOCK_DGRAM, 17);
176	if (sd < 0) {
177		perror("socket");
178		return 1;
179	}
180
181	if (get_bind_to_device(sd, name, sizeof(name)) < 0)
182		return 1;
183
184	mark = get_somark(sd);
185	prio = get_priority(sd);
186
187	close(sd);
188
189	printf("sd %d: dev %s, mark %u, priority %u\n", sd, name, mark, prio);
190
191	return 0;
192}
193
194static int usage(const char *argv0)
195{
196	printf("Usage:\n");
197	printf("  Attach a program\n");
198	printf("  %s -b bind-to-dev -m mark -p prio cg-path\n", argv0);
199	printf("\n");
200	printf("  Detach a program\n");
201	printf("  %s -d cg-path\n", argv0);
202	printf("\n");
203	printf("  Show inherited socket settings (mark, priority, and device)\n");
204	printf("  %s [-6]\n", argv0);
205	return EXIT_FAILURE;
206}
207
208int main(int argc, char **argv)
209{
210	__u32 idx = 0, mark = 0, prio = 0;
211	const char *cgrp_path = NULL;
212	int cg_fd, prog_fd, ret;
213	int family = PF_INET;
214	int do_attach = 1;
215	int rc;
216
217	while ((rc = getopt(argc, argv, "db:m:p:6")) != -1) {
218		switch (rc) {
219		case 'd':
220			do_attach = 0;
221			break;
222		case 'b':
223			idx = if_nametoindex(optarg);
224			if (!idx) {
225				idx = strtoumax(optarg, NULL, 0);
226				if (!idx) {
227					printf("Invalid device name\n");
228					return EXIT_FAILURE;
229				}
230			}
231			break;
232		case 'm':
233			mark = strtoumax(optarg, NULL, 0);
234			break;
235		case 'p':
236			prio = strtoumax(optarg, NULL, 0);
237			break;
238		case '6':
239			family = PF_INET6;
240			break;
241		default:
242			return usage(argv[0]);
243		}
244	}
245
246	if (optind == argc)
247		return show_sockopts(family);
248
249	cgrp_path = argv[optind];
250	if (!cgrp_path) {
251		fprintf(stderr, "cgroup path not given\n");
252		return EXIT_FAILURE;
253	}
254
255	if (do_attach && !idx && !mark && !prio) {
256		fprintf(stderr,
257			"One of device, mark or priority must be given\n");
258		return EXIT_FAILURE;
259	}
260
261	cg_fd = open(cgrp_path, O_DIRECTORY | O_RDONLY);
262	if (cg_fd < 0) {
263		printf("Failed to open cgroup path: '%s'\n", strerror(errno));
264		return EXIT_FAILURE;
265	}
266
267	if (do_attach) {
268		prog_fd = prog_load(idx, mark, prio);
269		if (prog_fd < 0) {
270			printf("Failed to load prog: '%s'\n", strerror(errno));
271			printf("Output from kernel verifier:\n%s\n-------\n",
272			       bpf_log_buf);
273			return EXIT_FAILURE;
274		}
275
276		ret = bpf_prog_attach(prog_fd, cg_fd,
277				      BPF_CGROUP_INET_SOCK_CREATE, 0);
278		if (ret < 0) {
279			printf("Failed to attach prog to cgroup: '%s'\n",
280			       strerror(errno));
281			return EXIT_FAILURE;
282		}
283	} else {
284		ret = bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE);
285		if (ret < 0) {
286			printf("Failed to detach prog from cgroup: '%s'\n",
287			       strerror(errno));
288			return EXIT_FAILURE;
289		}
290	}
291
292	close(cg_fd);
293	return EXIT_SUCCESS;
294}
v5.4
  1/* eBPF example program:
  2 *
  3 * - Loads eBPF program
  4 *
  5 *   The eBPF program sets the sk_bound_dev_if index in new AF_INET{6}
  6 *   sockets opened by processes in the cgroup.
  7 *
  8 * - Attaches the new program to a cgroup using BPF_PROG_ATTACH
  9 */
 10
 11#define _GNU_SOURCE
 12
 13#include <stdio.h>
 14#include <stdlib.h>
 15#include <stddef.h>
 16#include <string.h>
 17#include <unistd.h>
 18#include <assert.h>
 19#include <errno.h>
 20#include <fcntl.h>
 21#include <net/if.h>
 22#include <inttypes.h>
 23#include <linux/bpf.h>
 24#include <bpf/bpf.h>
 25
 26#include "bpf_insn.h"
 27
 28char bpf_log_buf[BPF_LOG_BUF_SIZE];
 29
 30static int prog_load(__u32 idx, __u32 mark, __u32 prio)
 31{
 32	/* save pointer to context */
 33	struct bpf_insn prog_start[] = {
 34		BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
 35	};
 36	struct bpf_insn prog_end[] = {
 37		BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 = verdict */
 38		BPF_EXIT_INSN(),
 39	};
 40
 41	/* set sk_bound_dev_if on socket */
 42	struct bpf_insn prog_dev[] = {
 43		BPF_MOV64_IMM(BPF_REG_3, idx),
 44		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, bound_dev_if)),
 45		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, bound_dev_if)),
 46	};
 47
 48	/* set mark on socket */
 49	struct bpf_insn prog_mark[] = {
 50		/* get uid of process */
 51		BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
 52			     BPF_FUNC_get_current_uid_gid),
 53		BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff),
 54
 55		/* if uid is 0, use given mark, else use the uid as the mark */
 56		BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
 57		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
 58		BPF_MOV64_IMM(BPF_REG_3, mark),
 59
 60		/* set the mark on the new socket */
 61		BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
 62		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)),
 63		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)),
 64	};
 65
 66	/* set priority on socket */
 67	struct bpf_insn prog_prio[] = {
 68		BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
 69		BPF_MOV64_IMM(BPF_REG_3, prio),
 70		BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, priority)),
 71		BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, priority)),
 72	};
 
 
 
 
 73
 74	struct bpf_insn *prog;
 75	size_t insns_cnt;
 76	void *p;
 77	int ret;
 78
 79	insns_cnt = sizeof(prog_start) + sizeof(prog_end);
 80	if (idx)
 81		insns_cnt += sizeof(prog_dev);
 82
 83	if (mark)
 84		insns_cnt += sizeof(prog_mark);
 85
 86	if (prio)
 87		insns_cnt += sizeof(prog_prio);
 88
 89	p = prog = malloc(insns_cnt);
 90	if (!prog) {
 91		fprintf(stderr, "Failed to allocate memory for instructions\n");
 92		return EXIT_FAILURE;
 93	}
 94
 95	memcpy(p, prog_start, sizeof(prog_start));
 96	p += sizeof(prog_start);
 97
 98	if (idx) {
 99		memcpy(p, prog_dev, sizeof(prog_dev));
100		p += sizeof(prog_dev);
101	}
102
103	if (mark) {
104		memcpy(p, prog_mark, sizeof(prog_mark));
105		p += sizeof(prog_mark);
106	}
107
108	if (prio) {
109		memcpy(p, prog_prio, sizeof(prog_prio));
110		p += sizeof(prog_prio);
111	}
112
113	memcpy(p, prog_end, sizeof(prog_end));
114	p += sizeof(prog_end);
115
116	insns_cnt /= sizeof(struct bpf_insn);
117
118	ret = bpf_load_program(BPF_PROG_TYPE_CGROUP_SOCK, prog, insns_cnt,
119				"GPL", 0, bpf_log_buf, BPF_LOG_BUF_SIZE);
120
121	free(prog);
122
123	return ret;
124}
125
126static int get_bind_to_device(int sd, char *name, size_t len)
127{
128	socklen_t optlen = len;
129	int rc;
130
131	name[0] = '\0';
132	rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
133	if (rc < 0)
134		perror("setsockopt(SO_BINDTODEVICE)");
135
136	return rc;
137}
138
139static unsigned int get_somark(int sd)
140{
141	unsigned int mark = 0;
142	socklen_t optlen = sizeof(mark);
143	int rc;
144
145	rc = getsockopt(sd, SOL_SOCKET, SO_MARK, &mark, &optlen);
146	if (rc < 0)
147		perror("getsockopt(SO_MARK)");
148
149	return mark;
150}
151
152static unsigned int get_priority(int sd)
153{
154	unsigned int prio = 0;
155	socklen_t optlen = sizeof(prio);
156	int rc;
157
158	rc = getsockopt(sd, SOL_SOCKET, SO_PRIORITY, &prio, &optlen);
159	if (rc < 0)
160		perror("getsockopt(SO_PRIORITY)");
161
162	return prio;
163}
164
165static int show_sockopts(int family)
166{
167	unsigned int mark, prio;
168	char name[16];
169	int sd;
170
171	sd = socket(family, SOCK_DGRAM, 17);
172	if (sd < 0) {
173		perror("socket");
174		return 1;
175	}
176
177	if (get_bind_to_device(sd, name, sizeof(name)) < 0)
178		return 1;
179
180	mark = get_somark(sd);
181	prio = get_priority(sd);
182
183	close(sd);
184
185	printf("sd %d: dev %s, mark %u, priority %u\n", sd, name, mark, prio);
186
187	return 0;
188}
189
190static int usage(const char *argv0)
191{
192	printf("Usage:\n");
193	printf("  Attach a program\n");
194	printf("  %s -b bind-to-dev -m mark -p prio cg-path\n", argv0);
195	printf("\n");
196	printf("  Detach a program\n");
197	printf("  %s -d cg-path\n", argv0);
198	printf("\n");
199	printf("  Show inherited socket settings (mark, priority, and device)\n");
200	printf("  %s [-6]\n", argv0);
201	return EXIT_FAILURE;
202}
203
204int main(int argc, char **argv)
205{
206	__u32 idx = 0, mark = 0, prio = 0;
207	const char *cgrp_path = NULL;
208	int cg_fd, prog_fd, ret;
209	int family = PF_INET;
210	int do_attach = 1;
211	int rc;
212
213	while ((rc = getopt(argc, argv, "db:m:p:6")) != -1) {
214		switch (rc) {
215		case 'd':
216			do_attach = 0;
217			break;
218		case 'b':
219			idx = if_nametoindex(optarg);
220			if (!idx) {
221				idx = strtoumax(optarg, NULL, 0);
222				if (!idx) {
223					printf("Invalid device name\n");
224					return EXIT_FAILURE;
225				}
226			}
227			break;
228		case 'm':
229			mark = strtoumax(optarg, NULL, 0);
230			break;
231		case 'p':
232			prio = strtoumax(optarg, NULL, 0);
233			break;
234		case '6':
235			family = PF_INET6;
236			break;
237		default:
238			return usage(argv[0]);
239		}
240	}
241
242	if (optind == argc)
243		return show_sockopts(family);
244
245	cgrp_path = argv[optind];
246	if (!cgrp_path) {
247		fprintf(stderr, "cgroup path not given\n");
248		return EXIT_FAILURE;
249	}
250
251	if (do_attach && !idx && !mark && !prio) {
252		fprintf(stderr,
253			"One of device, mark or priority must be given\n");
254		return EXIT_FAILURE;
255	}
256
257	cg_fd = open(cgrp_path, O_DIRECTORY | O_RDONLY);
258	if (cg_fd < 0) {
259		printf("Failed to open cgroup path: '%s'\n", strerror(errno));
260		return EXIT_FAILURE;
261	}
262
263	if (do_attach) {
264		prog_fd = prog_load(idx, mark, prio);
265		if (prog_fd < 0) {
266			printf("Failed to load prog: '%s'\n", strerror(errno));
267			printf("Output from kernel verifier:\n%s\n-------\n",
268			       bpf_log_buf);
269			return EXIT_FAILURE;
270		}
271
272		ret = bpf_prog_attach(prog_fd, cg_fd,
273				      BPF_CGROUP_INET_SOCK_CREATE, 0);
274		if (ret < 0) {
275			printf("Failed to attach prog to cgroup: '%s'\n",
276			       strerror(errno));
277			return EXIT_FAILURE;
278		}
279	} else {
280		ret = bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE);
281		if (ret < 0) {
282			printf("Failed to detach prog from cgroup: '%s'\n",
283			       strerror(errno));
284			return EXIT_FAILURE;
285		}
286	}
287
288	close(cg_fd);
289	return EXIT_SUCCESS;
290}