xref: /openbmc/linux/samples/bpf/test_cgrp2_sock2.c (revision b24413180f5600bcb3bb70fbed5cf186b60864bd)
1*b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
2554ae6e7SDavid Ahern /* eBPF example program:
3554ae6e7SDavid Ahern  *
4554ae6e7SDavid Ahern  * - Loads eBPF program
5554ae6e7SDavid Ahern  *
6554ae6e7SDavid Ahern  *   The eBPF program loads a filter from file and attaches the
7554ae6e7SDavid Ahern  *   program to a cgroup using BPF_PROG_ATTACH
8554ae6e7SDavid Ahern  */
9554ae6e7SDavid Ahern 
10554ae6e7SDavid Ahern #define _GNU_SOURCE
11554ae6e7SDavid Ahern 
12554ae6e7SDavid Ahern #include <stdio.h>
13554ae6e7SDavid Ahern #include <stdlib.h>
14554ae6e7SDavid Ahern #include <stddef.h>
15554ae6e7SDavid Ahern #include <string.h>
16554ae6e7SDavid Ahern #include <unistd.h>
17554ae6e7SDavid Ahern #include <assert.h>
18554ae6e7SDavid Ahern #include <errno.h>
19554ae6e7SDavid Ahern #include <fcntl.h>
20554ae6e7SDavid Ahern #include <net/if.h>
21554ae6e7SDavid Ahern #include <linux/bpf.h>
22554ae6e7SDavid Ahern 
23554ae6e7SDavid Ahern #include "libbpf.h"
24554ae6e7SDavid Ahern #include "bpf_load.h"
25554ae6e7SDavid Ahern 
26554ae6e7SDavid Ahern static int usage(const char *argv0)
27554ae6e7SDavid Ahern {
28554ae6e7SDavid Ahern 	printf("Usage: %s cg-path filter-path [filter-id]\n", argv0);
29554ae6e7SDavid Ahern 	return EXIT_FAILURE;
30554ae6e7SDavid Ahern }
31554ae6e7SDavid Ahern 
32554ae6e7SDavid Ahern int main(int argc, char **argv)
33554ae6e7SDavid Ahern {
34554ae6e7SDavid Ahern 	int cg_fd, ret, filter_id = 0;
35554ae6e7SDavid Ahern 
36554ae6e7SDavid Ahern 	if (argc < 3)
37554ae6e7SDavid Ahern 		return usage(argv[0]);
38554ae6e7SDavid Ahern 
39554ae6e7SDavid Ahern 	cg_fd = open(argv[1], O_DIRECTORY | O_RDONLY);
40554ae6e7SDavid Ahern 	if (cg_fd < 0) {
41554ae6e7SDavid Ahern 		printf("Failed to open cgroup path: '%s'\n", strerror(errno));
42554ae6e7SDavid Ahern 		return EXIT_FAILURE;
43554ae6e7SDavid Ahern 	}
44554ae6e7SDavid Ahern 
45554ae6e7SDavid Ahern 	if (load_bpf_file(argv[2]))
46554ae6e7SDavid Ahern 		return EXIT_FAILURE;
47554ae6e7SDavid Ahern 
48554ae6e7SDavid Ahern 	printf("Output from kernel verifier:\n%s\n-------\n", bpf_log_buf);
49554ae6e7SDavid Ahern 
50554ae6e7SDavid Ahern 	if (argc > 3)
51554ae6e7SDavid Ahern 		filter_id = atoi(argv[3]);
52554ae6e7SDavid Ahern 
53554ae6e7SDavid Ahern 	if (filter_id > prog_cnt) {
54554ae6e7SDavid Ahern 		printf("Invalid program id; program not found in file\n");
55554ae6e7SDavid Ahern 		return EXIT_FAILURE;
56554ae6e7SDavid Ahern 	}
57554ae6e7SDavid Ahern 
58554ae6e7SDavid Ahern 	ret = bpf_prog_attach(prog_fd[filter_id], cg_fd,
597f677633SAlexei Starovoitov 			      BPF_CGROUP_INET_SOCK_CREATE, 0);
60554ae6e7SDavid Ahern 	if (ret < 0) {
61554ae6e7SDavid Ahern 		printf("Failed to attach prog to cgroup: '%s'\n",
62554ae6e7SDavid Ahern 		       strerror(errno));
63554ae6e7SDavid Ahern 		return EXIT_FAILURE;
64554ae6e7SDavid Ahern 	}
65554ae6e7SDavid Ahern 
66554ae6e7SDavid Ahern 	return EXIT_SUCCESS;
67554ae6e7SDavid Ahern }
68