mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-27 22:53:55 +08:00
0adc3dd900
Signed-off-by: David Ahern <dsahern@gmail.com> Acked-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
290 lines
6.2 KiB
C
290 lines
6.2 KiB
C
/* eBPF example program:
|
|
*
|
|
* - Loads eBPF program
|
|
*
|
|
* The eBPF program sets the sk_bound_dev_if index in new AF_INET{6}
|
|
* sockets opened by processes in the cgroup.
|
|
*
|
|
* - Attaches the new program to a cgroup using BPF_PROG_ATTACH
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <net/if.h>
|
|
#include <inttypes.h>
|
|
#include <linux/bpf.h>
|
|
|
|
#include "libbpf.h"
|
|
|
|
char bpf_log_buf[BPF_LOG_BUF_SIZE];
|
|
|
|
static int prog_load(__u32 idx, __u32 mark, __u32 prio)
|
|
{
|
|
/* save pointer to context */
|
|
struct bpf_insn prog_start[] = {
|
|
BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
|
|
};
|
|
struct bpf_insn prog_end[] = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 1), /* r0 = verdict */
|
|
BPF_EXIT_INSN(),
|
|
};
|
|
|
|
/* set sk_bound_dev_if on socket */
|
|
struct bpf_insn prog_dev[] = {
|
|
BPF_MOV64_IMM(BPF_REG_3, idx),
|
|
BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, bound_dev_if)),
|
|
BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, bound_dev_if)),
|
|
};
|
|
|
|
/* set mark on socket */
|
|
struct bpf_insn prog_mark[] = {
|
|
/* get uid of process */
|
|
BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
|
|
BPF_FUNC_get_current_uid_gid),
|
|
BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffffffff),
|
|
|
|
/* if uid is 0, use given mark, else use the uid as the mark */
|
|
BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
|
|
BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
|
|
BPF_MOV64_IMM(BPF_REG_3, mark),
|
|
|
|
/* set the mark on the new socket */
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
|
|
BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)),
|
|
BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)),
|
|
};
|
|
|
|
/* set priority on socket */
|
|
struct bpf_insn prog_prio[] = {
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
|
|
BPF_MOV64_IMM(BPF_REG_3, prio),
|
|
BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, priority)),
|
|
BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, priority)),
|
|
};
|
|
|
|
struct bpf_insn *prog;
|
|
size_t insns_cnt;
|
|
void *p;
|
|
int ret;
|
|
|
|
insns_cnt = sizeof(prog_start) + sizeof(prog_end);
|
|
if (idx)
|
|
insns_cnt += sizeof(prog_dev);
|
|
|
|
if (mark)
|
|
insns_cnt += sizeof(prog_mark);
|
|
|
|
if (prio)
|
|
insns_cnt += sizeof(prog_prio);
|
|
|
|
p = prog = malloc(insns_cnt);
|
|
if (!prog) {
|
|
fprintf(stderr, "Failed to allocate memory for instructions\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
memcpy(p, prog_start, sizeof(prog_start));
|
|
p += sizeof(prog_start);
|
|
|
|
if (idx) {
|
|
memcpy(p, prog_dev, sizeof(prog_dev));
|
|
p += sizeof(prog_dev);
|
|
}
|
|
|
|
if (mark) {
|
|
memcpy(p, prog_mark, sizeof(prog_mark));
|
|
p += sizeof(prog_mark);
|
|
}
|
|
|
|
if (prio) {
|
|
memcpy(p, prog_prio, sizeof(prog_prio));
|
|
p += sizeof(prog_prio);
|
|
}
|
|
|
|
memcpy(p, prog_end, sizeof(prog_end));
|
|
p += sizeof(prog_end);
|
|
|
|
insns_cnt /= sizeof(struct bpf_insn);
|
|
|
|
ret = bpf_load_program(BPF_PROG_TYPE_CGROUP_SOCK, prog, insns_cnt,
|
|
"GPL", 0, bpf_log_buf, BPF_LOG_BUF_SIZE);
|
|
|
|
free(prog);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int get_bind_to_device(int sd, char *name, size_t len)
|
|
{
|
|
socklen_t optlen = len;
|
|
int rc;
|
|
|
|
name[0] = '\0';
|
|
rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
|
|
if (rc < 0)
|
|
perror("setsockopt(SO_BINDTODEVICE)");
|
|
|
|
return rc;
|
|
}
|
|
|
|
static unsigned int get_somark(int sd)
|
|
{
|
|
unsigned int mark = 0;
|
|
socklen_t optlen = sizeof(mark);
|
|
int rc;
|
|
|
|
rc = getsockopt(sd, SOL_SOCKET, SO_MARK, &mark, &optlen);
|
|
if (rc < 0)
|
|
perror("getsockopt(SO_MARK)");
|
|
|
|
return mark;
|
|
}
|
|
|
|
static unsigned int get_priority(int sd)
|
|
{
|
|
unsigned int prio = 0;
|
|
socklen_t optlen = sizeof(prio);
|
|
int rc;
|
|
|
|
rc = getsockopt(sd, SOL_SOCKET, SO_PRIORITY, &prio, &optlen);
|
|
if (rc < 0)
|
|
perror("getsockopt(SO_PRIORITY)");
|
|
|
|
return prio;
|
|
}
|
|
|
|
static int show_sockopts(int family)
|
|
{
|
|
unsigned int mark, prio;
|
|
char name[16];
|
|
int sd;
|
|
|
|
sd = socket(family, SOCK_DGRAM, 17);
|
|
if (sd < 0) {
|
|
perror("socket");
|
|
return 1;
|
|
}
|
|
|
|
if (get_bind_to_device(sd, name, sizeof(name)) < 0)
|
|
return 1;
|
|
|
|
mark = get_somark(sd);
|
|
prio = get_priority(sd);
|
|
|
|
close(sd);
|
|
|
|
printf("sd %d: dev %s, mark %u, priority %u\n", sd, name, mark, prio);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int usage(const char *argv0)
|
|
{
|
|
printf("Usage:\n");
|
|
printf(" Attach a program\n");
|
|
printf(" %s -b bind-to-dev -m mark -p prio cg-path\n", argv0);
|
|
printf("\n");
|
|
printf(" Detach a program\n");
|
|
printf(" %s -d cg-path\n", argv0);
|
|
printf("\n");
|
|
printf(" Show inherited socket settings (mark, priority, and device)\n");
|
|
printf(" %s [-6]\n", argv0);
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
__u32 idx = 0, mark = 0, prio = 0;
|
|
const char *cgrp_path = NULL;
|
|
int cg_fd, prog_fd, ret;
|
|
int family = PF_INET;
|
|
int do_attach = 1;
|
|
int rc;
|
|
|
|
while ((rc = getopt(argc, argv, "db:m:p:6")) != -1) {
|
|
switch (rc) {
|
|
case 'd':
|
|
do_attach = 0;
|
|
break;
|
|
case 'b':
|
|
idx = if_nametoindex(optarg);
|
|
if (!idx) {
|
|
idx = strtoumax(optarg, NULL, 0);
|
|
if (!idx) {
|
|
printf("Invalid device name\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case 'm':
|
|
mark = strtoumax(optarg, NULL, 0);
|
|
break;
|
|
case 'p':
|
|
prio = strtoumax(optarg, NULL, 0);
|
|
break;
|
|
case '6':
|
|
family = PF_INET6;
|
|
break;
|
|
default:
|
|
return usage(argv[0]);
|
|
}
|
|
}
|
|
|
|
if (optind == argc)
|
|
return show_sockopts(family);
|
|
|
|
cgrp_path = argv[optind];
|
|
if (!cgrp_path) {
|
|
fprintf(stderr, "cgroup path not given\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
if (do_attach && !idx && !mark && !prio) {
|
|
fprintf(stderr,
|
|
"One of device, mark or priority must be given\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
cg_fd = open(cgrp_path, O_DIRECTORY | O_RDONLY);
|
|
if (cg_fd < 0) {
|
|
printf("Failed to open cgroup path: '%s'\n", strerror(errno));
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
if (do_attach) {
|
|
prog_fd = prog_load(idx, mark, prio);
|
|
if (prog_fd < 0) {
|
|
printf("Failed to load prog: '%s'\n", strerror(errno));
|
|
printf("Output from kernel verifier:\n%s\n-------\n",
|
|
bpf_log_buf);
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
ret = bpf_prog_attach(prog_fd, cg_fd,
|
|
BPF_CGROUP_INET_SOCK_CREATE, 0);
|
|
if (ret < 0) {
|
|
printf("Failed to attach prog to cgroup: '%s'\n",
|
|
strerror(errno));
|
|
return EXIT_FAILURE;
|
|
}
|
|
} else {
|
|
ret = bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE);
|
|
if (ret < 0) {
|
|
printf("Failed to detach prog from cgroup: '%s'\n",
|
|
strerror(errno));
|
|
return EXIT_FAILURE;
|
|
}
|
|
}
|
|
|
|
close(cg_fd);
|
|
return EXIT_SUCCESS;
|
|
}
|