Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
fbe33108 AS |
2 | #include <stdio.h> |
3 | #include <assert.h> | |
4 | #include <linux/bpf.h> | |
2bf3e2ef | 5 | #include <bpf/bpf.h> |
7cf245a3 | 6 | #include <bpf/libbpf.h> |
9899694a | 7 | #include "sock_example.h" |
fbe33108 AS |
8 | #include <unistd.h> |
9 | #include <arpa/inet.h> | |
eb88d585 | 10 | #include <sys/resource.h> |
fbe33108 | 11 | |
614cd3bd AS |
12 | struct pair { |
13 | __u64 packets; | |
14 | __u64 bytes; | |
15 | }; | |
16 | ||
fbe33108 AS |
17 | int main(int ac, char **argv) |
18 | { | |
1a9b268c JK |
19 | struct bpf_object *obj; |
20 | int map_fd, prog_fd; | |
fbe33108 | 21 | char filename[256]; |
fbe33108 | 22 | int i, sock; |
1a9b268c | 23 | FILE *f; |
fbe33108 AS |
24 | |
25 | snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); | |
26 | ||
1a9b268c JK |
27 | if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER, |
28 | &obj, &prog_fd)) | |
fbe33108 | 29 | return 1; |
1a9b268c JK |
30 | |
31 | map_fd = bpf_object__find_map_fd_by_name(obj, "hash_map"); | |
fbe33108 AS |
32 | |
33 | sock = open_raw_sock("lo"); | |
34 | ||
1a9b268c JK |
35 | assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, |
36 | sizeof(prog_fd)) == 0); | |
fbe33108 | 37 | |
5c3cf87d | 38 | f = popen("ping -4 -c5 localhost", "r"); |
fbe33108 AS |
39 | (void) f; |
40 | ||
41 | for (i = 0; i < 5; i++) { | |
42 | int key = 0, next_key; | |
614cd3bd | 43 | struct pair value; |
fbe33108 | 44 | |
1a9b268c JK |
45 | while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) { |
46 | bpf_map_lookup_elem(map_fd, &next_key, &value); | |
614cd3bd | 47 | printf("ip %s bytes %lld packets %lld\n", |
fbe33108 | 48 | inet_ntoa((struct in_addr){htonl(next_key)}), |
614cd3bd | 49 | value.bytes, value.packets); |
fbe33108 AS |
50 | key = next_key; |
51 | } | |
52 | sleep(1); | |
53 | } | |
54 | return 0; | |
55 | } |