1 | // SPDX-License-Identifier: GPL-2.0 |
2 | #include <stdio.h> |
3 | #include <assert.h> |
4 | #include <linux/bpf.h> |
5 | #include <bpf/bpf.h> |
6 | #include <bpf/libbpf.h> |
7 | #include "sock_example.h" |
8 | #include <unistd.h> |
9 | #include <arpa/inet.h> |
10 | |
11 | struct pair { |
12 | __u64 packets; |
13 | __u64 bytes; |
14 | }; |
15 | |
16 | int main(int ac, char **argv) |
17 | { |
18 | struct bpf_program *prog; |
19 | struct bpf_object *obj; |
20 | int map_fd, prog_fd; |
21 | char filename[256]; |
22 | int i, sock, err; |
23 | FILE *f; |
24 | |
25 | snprintf(s: filename, maxlen: sizeof(filename), format: "%s_kern.o" , argv[0]); |
26 | obj = bpf_object__open_file(filename, NULL); |
27 | if (libbpf_get_error(obj)) |
28 | return 1; |
29 | |
30 | prog = bpf_object__next_program(obj, NULL); |
31 | bpf_program__set_type(prog, BPF_PROG_TYPE_SOCKET_FILTER); |
32 | |
33 | err = bpf_object__load(obj); |
34 | if (err) |
35 | return 1; |
36 | |
37 | prog_fd = bpf_program__fd(prog); |
38 | map_fd = bpf_object__find_map_fd_by_name(obj, "hash_map" ); |
39 | |
40 | sock = open_raw_sock(name: "lo" ); |
41 | |
42 | assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, |
43 | sizeof(prog_fd)) == 0); |
44 | |
45 | f = popen(command: "ping -4 -c5 localhost" , modes: "r" ); |
46 | (void) f; |
47 | |
48 | for (i = 0; i < 5; i++) { |
49 | int key = 0, next_key; |
50 | struct pair value; |
51 | |
52 | while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) { |
53 | bpf_map_lookup_elem(map_fd, &next_key, &value); |
54 | printf(format: "ip %s bytes %lld packets %lld\n" , |
55 | inet_ntoa(in: (struct in_addr){htonl(next_key)}), |
56 | value.bytes, value.packets); |
57 | key = next_key; |
58 | } |
59 | sleep(seconds: 1); |
60 | } |
61 | return 0; |
62 | } |
63 | |