1 #include <linux/unistd.h>
12 #include <sys/types.h>
13 #include <sys/socket.h>
17 #include <bpf/libbpf.h>
19 #include "sock_example.h"
21 #define BPF_F_PIN (1 << 0)
22 #define BPF_F_GET (1 << 1)
23 #define BPF_F_PIN_GET (BPF_F_PIN | BPF_F_GET)
25 #define BPF_F_KEY (1 << 2)
26 #define BPF_F_VAL (1 << 3)
27 #define BPF_F_KEY_VAL (BPF_F_KEY | BPF_F_VAL)
29 #define BPF_M_UNSPEC 0
33 char bpf_log_buf[BPF_LOG_BUF_SIZE];
35 static void usage(void)
37 printf("Usage: fds_example [...]\n");
38 printf(" -F <file> File to pin/get object\n");
39 printf(" -P |- pin object\n");
40 printf(" -G `- get object\n");
41 printf(" -m eBPF map mode\n");
42 printf(" -k <key> |- map key\n");
43 printf(" -v <value> `- map value\n");
44 printf(" -p eBPF prog mode\n");
45 printf(" -o <object> `- object file\n");
46 printf(" -h Display this help.\n");
49 static int bpf_map_create(void)
51 return bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(uint32_t),
52 sizeof(uint32_t), 1024, 0);
55 static int bpf_prog_create(const char *object)
57 static struct bpf_insn insns[] = {
58 BPF_MOV64_IMM(BPF_REG_0, 1),
61 size_t insns_cnt = sizeof(insns) / sizeof(struct bpf_insn);
62 struct bpf_object *obj;
66 assert(!bpf_prog_load(object, BPF_PROG_TYPE_UNSPEC,
70 return bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER,
71 insns, insns_cnt, "GPL", 0,
72 bpf_log_buf, BPF_LOG_BUF_SIZE);
76 static int bpf_do_map(const char *file, uint32_t flags, uint32_t key,
81 if (flags & BPF_F_PIN) {
82 fd = bpf_map_create();
83 printf("bpf: map fd:%d (%s)\n", fd, strerror(errno));
86 ret = bpf_obj_pin(fd, file);
87 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
90 fd = bpf_obj_get(file);
91 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
95 if ((flags & BPF_F_KEY_VAL) == BPF_F_KEY_VAL) {
96 ret = bpf_map_update_elem(fd, &key, &value, 0);
97 printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd, key, value,
98 ret, strerror(errno));
100 } else if (flags & BPF_F_KEY) {
101 ret = bpf_map_lookup_elem(fd, &key, &value);
102 printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd, key, value,
103 ret, strerror(errno));
110 static int bpf_do_prog(const char *file, uint32_t flags, const char *object)
114 if (flags & BPF_F_PIN) {
115 fd = bpf_prog_create(object);
116 printf("bpf: prog fd:%d (%s)\n", fd, strerror(errno));
119 ret = bpf_obj_pin(fd, file);
120 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
123 fd = bpf_obj_get(file);
124 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
128 sock = open_raw_sock("lo");
131 ret = setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &fd, sizeof(fd));
132 printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock, fd,
133 ret, strerror(errno));
139 int main(int argc, char **argv)
141 const char *file = NULL, *object = NULL;
142 uint32_t key = 0, value = 0, flags = 0;
143 int opt, mode = BPF_M_UNSPEC;
145 while ((opt = getopt(argc, argv, "F:PGmk:v:po:")) != -1) {
157 /* Map-related args */
162 key = strtoul(optarg, NULL, 0);
166 value = strtoul(optarg, NULL, 0);
169 /* Prog-related args */
181 if (!(flags & BPF_F_PIN_GET) || !file)
186 return bpf_do_map(file, flags, key, value);
188 return bpf_do_prog(file, flags, object);