^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) #include <stdio.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) #include <assert.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) #include <linux/bpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) #include <bpf/bpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) #include <bpf/libbpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) #include "sock_example.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) #include <unistd.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) #include <arpa/inet.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) int main(int ac, char **argv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) struct bpf_object *obj;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) int map_fd, prog_fd;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) char filename[256];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) int i, sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) FILE *f;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) &obj, &prog_fd))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) map_fd = bpf_object__find_map_fd_by_name(obj, "my_map");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) sock = open_raw_sock("lo");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) sizeof(prog_fd)) == 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) f = popen("ping -4 -c5 localhost", "r");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) (void) f;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) for (i = 0; i < 5; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) long long tcp_cnt, udp_cnt, icmp_cnt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) int key;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) key = IPPROTO_TCP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) assert(bpf_map_lookup_elem(map_fd, &key, &tcp_cnt) == 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) key = IPPROTO_UDP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) assert(bpf_map_lookup_elem(map_fd, &key, &udp_cnt) == 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) key = IPPROTO_ICMP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) assert(bpf_map_lookup_elem(map_fd, &key, &icmp_cnt) == 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) printf("TCP %lld UDP %lld ICMP %lld bytes\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) tcp_cnt, udp_cnt, icmp_cnt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) sleep(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) }