sockex2_user.c 1.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. #include <stdio.h>
  2. #include <assert.h>
  3. #include <linux/bpf.h>
  4. #include "libbpf.h"
  5. #include "bpf_load.h"
  6. #include <unistd.h>
  7. #include <arpa/inet.h>
  8. #include <sys/resource.h>
  9. struct pair {
  10. __u64 packets;
  11. __u64 bytes;
  12. };
  13. int main(int ac, char **argv)
  14. {
  15. struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY};
  16. char filename[256];
  17. FILE *f;
  18. int i, sock;
  19. snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
  20. setrlimit(RLIMIT_MEMLOCK, &r);
  21. if (load_bpf_file(filename)) {
  22. printf("%s", bpf_log_buf);
  23. return 1;
  24. }
  25. sock = open_raw_sock("lo");
  26. assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,
  27. sizeof(prog_fd[0])) == 0);
  28. f = popen("ping -c5 localhost", "r");
  29. (void) f;
  30. for (i = 0; i < 5; i++) {
  31. int key = 0, next_key;
  32. struct pair value;
  33. while (bpf_get_next_key(map_fd[0], &key, &next_key) == 0) {
  34. bpf_lookup_elem(map_fd[0], &next_key, &value);
  35. printf("ip %s bytes %lld packets %lld\n",
  36. inet_ntoa((struct in_addr){htonl(next_key)}),
  37. value.bytes, value.packets);
  38. key = next_key;
  39. }
  40. sleep(1);
  41. }
  42. return 0;
  43. }