Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
fbe33108 AS |
2 | #include <stdio.h> |
3 | #include <assert.h> | |
4 | #include <linux/bpf.h> | |
2bf3e2ef | 5 | #include <bpf/bpf.h> |
fbe33108 | 6 | #include "bpf_load.h" |
9899694a | 7 | #include "sock_example.h" |
fbe33108 AS |
8 | #include <unistd.h> |
9 | #include <arpa/inet.h> | |
eb88d585 | 10 | #include <sys/resource.h> |
fbe33108 | 11 | |
614cd3bd AS |
12 | struct pair { |
13 | __u64 packets; | |
14 | __u64 bytes; | |
15 | }; | |
16 | ||
fbe33108 AS |
17 | int main(int ac, char **argv) |
18 | { | |
eb88d585 | 19 | struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY}; |
fbe33108 AS |
20 | char filename[256]; |
21 | FILE *f; | |
22 | int i, sock; | |
23 | ||
24 | snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); | |
eb88d585 | 25 | setrlimit(RLIMIT_MEMLOCK, &r); |
fbe33108 AS |
26 | |
27 | if (load_bpf_file(filename)) { | |
28 | printf("%s", bpf_log_buf); | |
29 | return 1; | |
30 | } | |
31 | ||
32 | sock = open_raw_sock("lo"); | |
33 | ||
34 | assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, | |
35 | sizeof(prog_fd[0])) == 0); | |
36 | ||
37 | f = popen("ping -c5 localhost", "r"); | |
38 | (void) f; | |
39 | ||
40 | for (i = 0; i < 5; i++) { | |
41 | int key = 0, next_key; | |
614cd3bd | 42 | struct pair value; |
fbe33108 | 43 | |
d40fc181 JS |
44 | while (bpf_map_get_next_key(map_fd[0], &key, &next_key) == 0) { |
45 | bpf_map_lookup_elem(map_fd[0], &next_key, &value); | |
614cd3bd | 46 | printf("ip %s bytes %lld packets %lld\n", |
fbe33108 | 47 | inet_ntoa((struct in_addr){htonl(next_key)}), |
614cd3bd | 48 | value.bytes, value.packets); |
fbe33108 AS |
49 | key = next_key; |
50 | } | |
51 | sleep(1); | |
52 | } | |
53 | return 0; | |
54 | } |