sockex1_user.c 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <stdio.h>
  3. #include <assert.h>
  4. #include <linux/bpf.h>
  5. #include <bpf/bpf.h>
  6. #include <bpf/libbpf.h>
  7. #include "sock_example.h"
  8. #include <unistd.h>
  9. #include <arpa/inet.h>
  10. int main(int ac, char **argv)
  11. {
  12. struct bpf_object *obj;
  13. struct bpf_program *prog;
  14. int map_fd, prog_fd;
  15. char filename[256];
  16. int i, sock, err;
  17. FILE *f;
  18. snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
  19. obj = bpf_object__open_file(filename, NULL);
  20. if (libbpf_get_error(obj))
  21. return 1;
  22. prog = bpf_object__next_program(obj, NULL);
  23. bpf_program__set_type(prog, BPF_PROG_TYPE_SOCKET_FILTER);
  24. err = bpf_object__load(obj);
  25. if (err)
  26. return 1;
  27. prog_fd = bpf_program__fd(prog);
  28. map_fd = bpf_object__find_map_fd_by_name(obj, "my_map");
  29. sock = open_raw_sock("lo");
  30. assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
  31. sizeof(prog_fd)) == 0);
  32. f = popen("ping -4 -c5 localhost", "r");
  33. (void) f;
  34. for (i = 0; i < 5; i++) {
  35. long long tcp_cnt, udp_cnt, icmp_cnt;
  36. int key;
  37. key = IPPROTO_TCP;
  38. assert(bpf_map_lookup_elem(map_fd, &key, &tcp_cnt) == 0);
  39. key = IPPROTO_UDP;
  40. assert(bpf_map_lookup_elem(map_fd, &key, &udp_cnt) == 0);
  41. key = IPPROTO_ICMP;
  42. assert(bpf_map_lookup_elem(map_fd, &key, &icmp_cnt) == 0);
  43. printf("TCP %lld UDP %lld ICMP %lld bytes\n",
  44. tcp_cnt, udp_cnt, icmp_cnt);
  45. sleep(1);
  46. }
  47. return 0;
  48. }