sockex1_user.c 1.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <stdio.h>
  3. #include <assert.h>
  4. #include <linux/bpf.h>
  5. #include <bpf/bpf.h>
  6. #include "bpf_load.h"
  7. #include "sock_example.h"
  8. #include <unistd.h>
  9. #include <arpa/inet.h>
  10. int main(int ac, char **argv)
  11. {
  12. char filename[256];
  13. FILE *f;
  14. int i, sock;
  15. snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
  16. if (load_bpf_file(filename)) {
  17. printf("%s", bpf_log_buf);
  18. return 1;
  19. }
  20. sock = open_raw_sock("lo");
  21. assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,
  22. sizeof(prog_fd[0])) == 0);
  23. f = popen("ping -c5 localhost", "r");
  24. (void) f;
  25. for (i = 0; i < 5; i++) {
  26. long long tcp_cnt, udp_cnt, icmp_cnt;
  27. int key;
  28. key = IPPROTO_TCP;
  29. assert(bpf_map_lookup_elem(map_fd[0], &key, &tcp_cnt) == 0);
  30. key = IPPROTO_UDP;
  31. assert(bpf_map_lookup_elem(map_fd[0], &key, &udp_cnt) == 0);
  32. key = IPPROTO_ICMP;
  33. assert(bpf_map_lookup_elem(map_fd[0], &key, &icmp_cnt) == 0);
  34. printf("TCP %lld UDP %lld ICMP %lld bytes\n",
  35. tcp_cnt, udp_cnt, icmp_cnt);
  36. sleep(1);
  37. }
  38. return 0;
  39. }