linux/samples/bpf/sockex1_user.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2#include <stdio.h>
   3#include <assert.h>
   4#include <linux/bpf.h>
   5#include <bpf/bpf.h>
   6#include <bpf/libbpf.h>
   7#include "sock_example.h"
   8#include <unistd.h>
   9#include <arpa/inet.h>
  10
  11int main(int ac, char **argv)
  12{
  13        struct bpf_object *obj;
  14        int map_fd, prog_fd;
  15        char filename[256];
  16        int i, sock;
  17        FILE *f;
  18
  19        snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
  20
  21        if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER,
  22                          &obj, &prog_fd))
  23                return 1;
  24
  25        map_fd = bpf_object__find_map_fd_by_name(obj, "my_map");
  26
  27        sock = open_raw_sock("lo");
  28
  29        assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
  30                          sizeof(prog_fd)) == 0);
  31
  32        f = popen("ping -4 -c5 localhost", "r");
  33        (void) f;
  34
  35        for (i = 0; i < 5; i++) {
  36                long long tcp_cnt, udp_cnt, icmp_cnt;
  37                int key;
  38
  39                key = IPPROTO_TCP;
  40                assert(bpf_map_lookup_elem(map_fd, &key, &tcp_cnt) == 0);
  41
  42                key = IPPROTO_UDP;
  43                assert(bpf_map_lookup_elem(map_fd, &key, &udp_cnt) == 0);
  44
  45                key = IPPROTO_ICMP;
  46                assert(bpf_map_lookup_elem(map_fd, &key, &icmp_cnt) == 0);
  47
  48                printf("TCP %lld UDP %lld ICMP %lld bytes\n",
  49                       tcp_cnt, udp_cnt, icmp_cnt);
  50                sleep(1);
  51        }
  52
  53        return 0;
  54}
  55