linux/samples/bpf/sockex2_user.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2#include <stdio.h>
   3#include <assert.h>
   4#include <linux/bpf.h>
   5#include "libbpf.h"
   6#include "bpf_load.h"
   7#include "sock_example.h"
   8#include <unistd.h>
   9#include <arpa/inet.h>
  10#include <sys/resource.h>
  11
  12struct pair {
  13        __u64 packets;
  14        __u64 bytes;
  15};
  16
  17int main(int ac, char **argv)
  18{
  19        struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY};
  20        char filename[256];
  21        FILE *f;
  22        int i, sock;
  23
  24        snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
  25        setrlimit(RLIMIT_MEMLOCK, &r);
  26
  27        if (load_bpf_file(filename)) {
  28                printf("%s", bpf_log_buf);
  29                return 1;
  30        }
  31
  32        sock = open_raw_sock("lo");
  33
  34        assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,
  35                          sizeof(prog_fd[0])) == 0);
  36
  37        f = popen("ping -c5 localhost", "r");
  38        (void) f;
  39
  40        for (i = 0; i < 5; i++) {
  41                int key = 0, next_key;
  42                struct pair value;
  43
  44                while (bpf_map_get_next_key(map_fd[0], &key, &next_key) == 0) {
  45                        bpf_map_lookup_elem(map_fd[0], &next_key, &value);
  46                        printf("ip %s bytes %lld packets %lld\n",
  47                               inet_ntoa((struct in_addr){htonl(next_key)}),
  48                               value.bytes, value.packets);
  49                        key = next_key;
  50                }
  51                sleep(1);
  52        }
  53        return 0;
  54}
  55