1 #include <linux/unistd.h>
12 #include <sys/types.h>
13 #include <sys/socket.h>
17 #include <bpf/libbpf.h>
19 #include "sock_example.h"
22 #define BPF_F_PIN (1 << 0)
23 #define BPF_F_GET (1 << 1)
24 #define BPF_F_PIN_GET (BPF_F_PIN | BPF_F_GET)
26 #define BPF_F_KEY (1 << 2)
27 #define BPF_F_VAL (1 << 3)
28 #define BPF_F_KEY_VAL (BPF_F_KEY | BPF_F_VAL)
30 #define BPF_M_UNSPEC 0
34 char bpf_log_buf
[BPF_LOG_BUF_SIZE
];
36 static void usage(void)
38 printf("Usage: fds_example [...]\n");
39 printf(" -F <file> File to pin/get object\n");
40 printf(" -P |- pin object\n");
41 printf(" -G `- get object\n");
42 printf(" -m eBPF map mode\n");
43 printf(" -k <key> |- map key\n");
44 printf(" -v <value> `- map value\n");
45 printf(" -p eBPF prog mode\n");
46 printf(" -o <object> `- object file\n");
47 printf(" -h Display this help.\n");
50 static int bpf_prog_create(const char *object
)
52 static struct bpf_insn insns
[] = {
53 BPF_MOV64_IMM(BPF_REG_0
, 1),
56 size_t insns_cnt
= ARRAY_SIZE(insns
);
57 struct bpf_object
*obj
;
61 obj
= bpf_object__open_file(object
, NULL
);
62 assert(!libbpf_get_error(obj
));
63 err
= bpf_object__load(obj
);
65 return bpf_program__fd(bpf_object__next_program(obj
, NULL
));
67 LIBBPF_OPTS(bpf_prog_load_opts
, opts
,
68 .log_buf
= bpf_log_buf
,
69 .log_size
= BPF_LOG_BUF_SIZE
,
72 return bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER
, NULL
, "GPL",
73 insns
, insns_cnt
, &opts
);
77 static int bpf_do_map(const char *file
, uint32_t flags
, uint32_t key
,
82 if (flags
& BPF_F_PIN
) {
83 fd
= bpf_map_create(BPF_MAP_TYPE_ARRAY
, NULL
, sizeof(uint32_t),
84 sizeof(uint32_t), 1024, NULL
);
85 printf("bpf: map fd:%d (%s)\n", fd
, strerror(errno
));
88 ret
= bpf_obj_pin(fd
, file
);
89 printf("bpf: pin ret:(%d,%s)\n", ret
, strerror(errno
));
92 fd
= bpf_obj_get(file
);
93 printf("bpf: get fd:%d (%s)\n", fd
, strerror(errno
));
97 if ((flags
& BPF_F_KEY_VAL
) == BPF_F_KEY_VAL
) {
98 ret
= bpf_map_update_elem(fd
, &key
, &value
, 0);
99 printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd
, key
, value
,
100 ret
, strerror(errno
));
102 } else if (flags
& BPF_F_KEY
) {
103 ret
= bpf_map_lookup_elem(fd
, &key
, &value
);
104 printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd
, key
, value
,
105 ret
, strerror(errno
));
112 static int bpf_do_prog(const char *file
, uint32_t flags
, const char *object
)
116 if (flags
& BPF_F_PIN
) {
117 fd
= bpf_prog_create(object
);
118 printf("bpf: prog fd:%d (%s)\n", fd
, strerror(errno
));
121 ret
= bpf_obj_pin(fd
, file
);
122 printf("bpf: pin ret:(%d,%s)\n", ret
, strerror(errno
));
125 fd
= bpf_obj_get(file
);
126 printf("bpf: get fd:%d (%s)\n", fd
, strerror(errno
));
130 sock
= open_raw_sock("lo");
133 ret
= setsockopt(sock
, SOL_SOCKET
, SO_ATTACH_BPF
, &fd
, sizeof(fd
));
134 printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock
, fd
,
135 ret
, strerror(errno
));
141 int main(int argc
, char **argv
)
143 const char *file
= NULL
, *object
= NULL
;
144 uint32_t key
= 0, value
= 0, flags
= 0;
145 int opt
, mode
= BPF_M_UNSPEC
;
147 while ((opt
= getopt(argc
, argv
, "F:PGmk:v:po:")) != -1) {
159 /* Map-related args */
164 key
= strtoul(optarg
, NULL
, 0);
168 value
= strtoul(optarg
, NULL
, 0);
171 /* Prog-related args */
183 if (!(flags
& BPF_F_PIN_GET
) || !file
)
188 return bpf_do_map(file
, flags
, key
, value
);
190 return bpf_do_prog(file
, flags
, object
);