Blame view
samples/bpf/sockex3_user.c
2.5 KB
b24413180 License cleanup: ... |
1 |
// SPDX-License-Identifier: GPL-2.0 |
530b2c861 samples/bpf: bpf_... |
2 3 |
#include <stdio.h> #include <assert.h> |
2bf3e2ef4 samples: bpf: inc... |
4 |
#include <bpf/bpf.h> |
bc1a85977 samples, bpf: Ref... |
5 |
#include <bpf/libbpf.h> |
9899694a7 samples/bpf: Move... |
6 |
#include "sock_example.h" |
530b2c861 samples/bpf: bpf_... |
7 8 |
#include <unistd.h> #include <arpa/inet.h> |
eb88d5855 samples/bpf: set ... |
9 |
#include <sys/resource.h> |
530b2c861 samples/bpf: bpf_... |
10 |
|
32c009798 samples/bpf: fix ... |
11 |
struct flow_key_record { |
530b2c861 samples/bpf: bpf_... |
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 |
__be32 src; __be32 dst; union { __be32 ports; __be16 port16[2]; }; __u32 ip_proto; }; struct pair { __u64 packets; __u64 bytes; }; int main(int argc, char **argv) { |
bc1a85977 samples, bpf: Ref... |
28 |
int i, sock, key, fd, main_prog_fd, jmp_table_fd, hash_map_fd; |
eb88d5855 samples/bpf: set ... |
29 |
struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY}; |
bc1a85977 samples, bpf: Ref... |
30 31 |
struct bpf_program *prog; struct bpf_object *obj; |
698584dff samples, bpf: Rep... |
32 |
const char *section; |
530b2c861 samples/bpf: bpf_... |
33 34 |
char filename[256]; FILE *f; |
530b2c861 samples/bpf: bpf_... |
35 36 |
snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); |
eb88d5855 samples/bpf: set ... |
37 |
setrlimit(RLIMIT_MEMLOCK, &r); |
530b2c861 samples/bpf: bpf_... |
38 |
|
bc1a85977 samples, bpf: Ref... |
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 |
obj = bpf_object__open_file(filename, NULL); if (libbpf_get_error(obj)) { fprintf(stderr, "ERROR: opening BPF object file failed "); return 0; } /* load BPF program */ if (bpf_object__load(obj)) { fprintf(stderr, "ERROR: loading BPF object file failed "); goto cleanup; } jmp_table_fd = bpf_object__find_map_fd_by_name(obj, "jmp_table"); hash_map_fd = bpf_object__find_map_fd_by_name(obj, "hash_map"); if (jmp_table_fd < 0 || hash_map_fd < 0) { fprintf(stderr, "ERROR: finding a map in obj file failed "); goto cleanup; |
530b2c861 samples/bpf: bpf_... |
59 |
} |
bc1a85977 samples, bpf: Ref... |
60 61 |
bpf_object__for_each_program(prog, obj) { fd = bpf_program__fd(prog); |
698584dff samples, bpf: Rep... |
62 63 |
section = bpf_program__section_name(prog); if (sscanf(section, "socket/%d", &key) != 1) { |
bc1a85977 samples, bpf: Ref... |
64 65 66 67 68 69 70 71 72 73 |
fprintf(stderr, "ERROR: finding prog failed "); goto cleanup; } if (key == 0) main_prog_fd = fd; else bpf_map_update_elem(jmp_table_fd, &key, &fd, BPF_ANY); } |
a8744f252 bpf: Add test for... |
74 |
|
530b2c861 samples/bpf: bpf_... |
75 |
sock = open_raw_sock("lo"); |
bc1a85977 samples, bpf: Ref... |
76 77 |
/* attach BPF program to socket */ assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &main_prog_fd, |
530b2c861 samples/bpf: bpf_... |
78 79 80 |
sizeof(__u32)) == 0); if (argc > 1) |
5c3cf87d4 samples: bpf: for... |
81 |
f = popen("ping -4 -c5 localhost", "r"); |
530b2c861 samples/bpf: bpf_... |
82 83 84 85 86 |
else f = popen("netperf -l 4 localhost", "r"); (void) f; for (i = 0; i < 5; i++) { |
32c009798 samples/bpf: fix ... |
87 |
struct flow_key_record key = {}, next_key; |
530b2c861 samples/bpf: bpf_... |
88 89 90 91 92 |
struct pair value; sleep(1); printf("IP src.port -> dst.port bytes packets "); |
bc1a85977 samples, bpf: Ref... |
93 94 |
while (bpf_map_get_next_key(hash_map_fd, &key, &next_key) == 0) { bpf_map_lookup_elem(hash_map_fd, &next_key, &value); |
530b2c861 samples/bpf: bpf_... |
95 96 97 98 99 100 101 102 103 104 |
printf("%s.%05d -> %s.%05d %12lld %12lld ", inet_ntoa((struct in_addr){htonl(next_key.src)}), next_key.port16[0], inet_ntoa((struct in_addr){htonl(next_key.dst)}), next_key.port16[1], value.bytes, value.packets); key = next_key; } } |
bc1a85977 samples, bpf: Ref... |
105 106 107 |
cleanup: bpf_object__close(obj); |
530b2c861 samples/bpf: bpf_... |
108 109 |
return 0; } |