123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156 |
- /* eBPF mini library */
- #include <stdlib.h>
- #include <stdio.h>
- #include <linux/unistd.h>
- #include <unistd.h>
- #include <string.h>
- #include <linux/netlink.h>
- #include <linux/bpf.h>
- #include <errno.h>
- #include <net/ethernet.h>
- #include <net/if.h>
- #include <linux/if_packet.h>
- #include <arpa/inet.h>
- #include "libbpf.h"
- static __u64 ptr_to_u64(void *ptr)
- {
- return (__u64) (unsigned long) ptr;
- }
- int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
- int max_entries, int map_flags)
- {
- union bpf_attr attr = {
- .map_type = map_type,
- .key_size = key_size,
- .value_size = value_size,
- .max_entries = max_entries,
- .map_flags = map_flags,
- };
- return syscall(__NR_bpf, BPF_MAP_CREATE, &attr, sizeof(attr));
- }
- int bpf_update_elem(int fd, void *key, void *value, unsigned long long flags)
- {
- union bpf_attr attr = {
- .map_fd = fd,
- .key = ptr_to_u64(key),
- .value = ptr_to_u64(value),
- .flags = flags,
- };
- return syscall(__NR_bpf, BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr));
- }
- int bpf_lookup_elem(int fd, void *key, void *value)
- {
- union bpf_attr attr = {
- .map_fd = fd,
- .key = ptr_to_u64(key),
- .value = ptr_to_u64(value),
- };
- return syscall(__NR_bpf, BPF_MAP_LOOKUP_ELEM, &attr, sizeof(attr));
- }
- int bpf_delete_elem(int fd, void *key)
- {
- union bpf_attr attr = {
- .map_fd = fd,
- .key = ptr_to_u64(key),
- };
- return syscall(__NR_bpf, BPF_MAP_DELETE_ELEM, &attr, sizeof(attr));
- }
- int bpf_get_next_key(int fd, void *key, void *next_key)
- {
- union bpf_attr attr = {
- .map_fd = fd,
- .key = ptr_to_u64(key),
- .next_key = ptr_to_u64(next_key),
- };
- return syscall(__NR_bpf, BPF_MAP_GET_NEXT_KEY, &attr, sizeof(attr));
- }
- #define ROUND_UP(x, n) (((x) + (n) - 1u) & ~((n) - 1u))
- char bpf_log_buf[LOG_BUF_SIZE];
- int bpf_prog_load(enum bpf_prog_type prog_type,
- const struct bpf_insn *insns, int prog_len,
- const char *license, int kern_version)
- {
- union bpf_attr attr = {
- .prog_type = prog_type,
- .insns = ptr_to_u64((void *) insns),
- .insn_cnt = prog_len / sizeof(struct bpf_insn),
- .license = ptr_to_u64((void *) license),
- .log_buf = ptr_to_u64(bpf_log_buf),
- .log_size = LOG_BUF_SIZE,
- .log_level = 1,
- };
- /* assign one field outside of struct init to make sure any
- * padding is zero initialized
- */
- attr.kern_version = kern_version;
- bpf_log_buf[0] = 0;
- return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
- }
- int bpf_obj_pin(int fd, const char *pathname)
- {
- union bpf_attr attr = {
- .pathname = ptr_to_u64((void *)pathname),
- .bpf_fd = fd,
- };
- return syscall(__NR_bpf, BPF_OBJ_PIN, &attr, sizeof(attr));
- }
- int bpf_obj_get(const char *pathname)
- {
- union bpf_attr attr = {
- .pathname = ptr_to_u64((void *)pathname),
- };
- return syscall(__NR_bpf, BPF_OBJ_GET, &attr, sizeof(attr));
- }
- int open_raw_sock(const char *name)
- {
- struct sockaddr_ll sll;
- int sock;
- sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL));
- if (sock < 0) {
- printf("cannot create raw socket\n");
- return -1;
- }
- memset(&sll, 0, sizeof(sll));
- sll.sll_family = AF_PACKET;
- sll.sll_ifindex = if_nametoindex(name);
- sll.sll_protocol = htons(ETH_P_ALL);
- if (bind(sock, (struct sockaddr *)&sll, sizeof(sll)) < 0) {
- printf("bind to %s: %s\n", name, strerror(errno));
- close(sock);
- return -1;
- }
- return sock;
- }
- int perf_event_open(struct perf_event_attr *attr, int pid, int cpu,
- int group_fd, unsigned long flags)
- {
- return syscall(__NR_perf_event_open, attr, pid, cpu,
- group_fd, flags);
- }
|