~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/samples/bpf/fds_example.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 #include <linux/unistd.h>
  2 #include <linux/bpf.h>
  3 
  4 #include <stdio.h>
  5 #include <stdlib.h>
  6 #include <stdint.h>
  7 #include <unistd.h>
  8 #include <string.h>
  9 #include <assert.h>
 10 #include <errno.h>
 11 
 12 #include <sys/types.h>
 13 #include <sys/socket.h>
 14 
 15 #include <bpf/bpf.h>
 16 
 17 #include <bpf/libbpf.h>
 18 #include "bpf_insn.h"
 19 #include "sock_example.h"
 20 #include "bpf_util.h"
 21 
 22 #define BPF_F_PIN       (1 << 0)
 23 #define BPF_F_GET       (1 << 1)
 24 #define BPF_F_PIN_GET   (BPF_F_PIN | BPF_F_GET)
 25 
 26 #define BPF_F_KEY       (1 << 2)
 27 #define BPF_F_VAL       (1 << 3)
 28 #define BPF_F_KEY_VAL   (BPF_F_KEY | BPF_F_VAL)
 29 
 30 #define BPF_M_UNSPEC    0
 31 #define BPF_M_MAP       1
 32 #define BPF_M_PROG      2
 33 
 34 char bpf_log_buf[BPF_LOG_BUF_SIZE];
 35 
 36 static void usage(void)
 37 {
 38         printf("Usage: fds_example [...]\n");
 39         printf("       -F <file>   File to pin/get object\n");
 40         printf("       -P          |- pin object\n");
 41         printf("       -G          `- get object\n");
 42         printf("       -m          eBPF map mode\n");
 43         printf("       -k <key>    |- map key\n");
 44         printf("       -v <value>  `- map value\n");
 45         printf("       -p          eBPF prog mode\n");
 46         printf("       -o <object> `- object file\n");
 47         printf("       -h          Display this help.\n");
 48 }
 49 
 50 static int bpf_prog_create(const char *object)
 51 {
 52         static struct bpf_insn insns[] = {
 53                 BPF_MOV64_IMM(BPF_REG_0, 1),
 54                 BPF_EXIT_INSN(),
 55         };
 56         size_t insns_cnt = ARRAY_SIZE(insns);
 57         struct bpf_object *obj;
 58         int err;
 59 
 60         if (object) {
 61                 obj = bpf_object__open_file(object, NULL);
 62                 assert(!libbpf_get_error(obj));
 63                 err = bpf_object__load(obj);
 64                 assert(!err);
 65                 return bpf_program__fd(bpf_object__next_program(obj, NULL));
 66         } else {
 67                 LIBBPF_OPTS(bpf_prog_load_opts, opts,
 68                         .log_buf = bpf_log_buf,
 69                         .log_size = BPF_LOG_BUF_SIZE,
 70                 );
 71 
 72                 return bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL",
 73                                      insns, insns_cnt, &opts);
 74         }
 75 }
 76 
 77 static int bpf_do_map(const char *file, uint32_t flags, uint32_t key,
 78                       uint32_t value)
 79 {
 80         int fd, ret;
 81 
 82         if (flags & BPF_F_PIN) {
 83                 fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, NULL, sizeof(uint32_t),
 84                                     sizeof(uint32_t), 1024, NULL);
 85                 printf("bpf: map fd:%d (%s)\n", fd, strerror(errno));
 86                 assert(fd > 0);
 87 
 88                 ret = bpf_obj_pin(fd, file);
 89                 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
 90                 assert(ret == 0);
 91         } else {
 92                 fd = bpf_obj_get(file);
 93                 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
 94                 assert(fd > 0);
 95         }
 96 
 97         if ((flags & BPF_F_KEY_VAL) == BPF_F_KEY_VAL) {
 98                 ret = bpf_map_update_elem(fd, &key, &value, 0);
 99                 printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd, key, value,
100                        ret, strerror(errno));
101                 assert(ret == 0);
102         } else if (flags & BPF_F_KEY) {
103                 ret = bpf_map_lookup_elem(fd, &key, &value);
104                 printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd, key, value,
105                        ret, strerror(errno));
106                 assert(ret == 0);
107         }
108 
109         return 0;
110 }
111 
112 static int bpf_do_prog(const char *file, uint32_t flags, const char *object)
113 {
114         int fd, sock, ret;
115 
116         if (flags & BPF_F_PIN) {
117                 fd = bpf_prog_create(object);
118                 printf("bpf: prog fd:%d (%s)\n", fd, strerror(errno));
119                 assert(fd > 0);
120 
121                 ret = bpf_obj_pin(fd, file);
122                 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
123                 assert(ret == 0);
124         } else {
125                 fd = bpf_obj_get(file);
126                 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
127                 assert(fd > 0);
128         }
129 
130         sock = open_raw_sock("lo");
131         assert(sock > 0);
132 
133         ret = setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &fd, sizeof(fd));
134         printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock, fd,
135                ret, strerror(errno));
136         assert(ret == 0);
137 
138         return 0;
139 }
140 
141 int main(int argc, char **argv)
142 {
143         const char *file = NULL, *object = NULL;
144         uint32_t key = 0, value = 0, flags = 0;
145         int opt, mode = BPF_M_UNSPEC;
146 
147         while ((opt = getopt(argc, argv, "F:PGmk:v:po:")) != -1) {
148                 switch (opt) {
149                 /* General args */
150                 case 'F':
151                         file = optarg;
152                         break;
153                 case 'P':
154                         flags |= BPF_F_PIN;
155                         break;
156                 case 'G':
157                         flags |= BPF_F_GET;
158                         break;
159                 /* Map-related args */
160                 case 'm':
161                         mode = BPF_M_MAP;
162                         break;
163                 case 'k':
164                         key = strtoul(optarg, NULL, 0);
165                         flags |= BPF_F_KEY;
166                         break;
167                 case 'v':
168                         value = strtoul(optarg, NULL, 0);
169                         flags |= BPF_F_VAL;
170                         break;
171                 /* Prog-related args */
172                 case 'p':
173                         mode = BPF_M_PROG;
174                         break;
175                 case 'o':
176                         object = optarg;
177                         break;
178                 default:
179                         goto out;
180                 }
181         }
182 
183         if (!(flags & BPF_F_PIN_GET) || !file)
184                 goto out;
185 
186         switch (mode) {
187         case BPF_M_MAP:
188                 return bpf_do_map(file, flags, key, value);
189         case BPF_M_PROG:
190                 return bpf_do_prog(file, flags, object);
191         }
192 out:
193         usage();
194         return -1;
195 }
196 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php