Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v5.16-rc7 55 lines 1.2 kB view raw
1// SPDX-License-Identifier: GPL-2.0 2#include <stdio.h> 3#include <assert.h> 4#include <linux/bpf.h> 5#include <bpf/bpf.h> 6#include <bpf/libbpf.h> 7#include "sock_example.h" 8#include <unistd.h> 9#include <arpa/inet.h> 10#include <sys/resource.h> 11 12struct pair { 13 __u64 packets; 14 __u64 bytes; 15}; 16 17int main(int ac, char **argv) 18{ 19 struct bpf_object *obj; 20 int map_fd, prog_fd; 21 char filename[256]; 22 int i, sock; 23 FILE *f; 24 25 snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); 26 27 if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER, 28 &obj, &prog_fd)) 29 return 1; 30 31 map_fd = bpf_object__find_map_fd_by_name(obj, "hash_map"); 32 33 sock = open_raw_sock("lo"); 34 35 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, 36 sizeof(prog_fd)) == 0); 37 38 f = popen("ping -4 -c5 localhost", "r"); 39 (void) f; 40 41 for (i = 0; i < 5; i++) { 42 int key = 0, next_key; 43 struct pair value; 44 45 while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) { 46 bpf_map_lookup_elem(map_fd, &next_key, &value); 47 printf("ip %s bytes %lld packets %lld\n", 48 inet_ntoa((struct in_addr){htonl(next_key)}), 49 value.bytes, value.packets); 50 key = next_key; 51 } 52 sleep(1); 53 } 54 return 0; 55}