hc
2024-10-09 05e59e5fb0064c97a1c10921ecd549f2d4a58565
kernel/samples/bpf/sockex1_user.c
....@@ -3,30 +3,33 @@
33 #include <assert.h>
44 #include <linux/bpf.h>
55 #include <bpf/bpf.h>
6
-#include "bpf_load.h"
6
+#include <bpf/libbpf.h>
77 #include "sock_example.h"
88 #include <unistd.h>
99 #include <arpa/inet.h>
1010
1111 int main(int ac, char **argv)
1212 {
13
+ struct bpf_object *obj;
14
+ int map_fd, prog_fd;
1315 char filename[256];
14
- FILE *f;
1516 int i, sock;
17
+ FILE *f;
1618
1719 snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
1820
19
- if (load_bpf_file(filename)) {
20
- printf("%s", bpf_log_buf);
21
+ if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER,
22
+ &obj, &prog_fd))
2123 return 1;
22
- }
24
+
25
+ map_fd = bpf_object__find_map_fd_by_name(obj, "my_map");
2326
2427 sock = open_raw_sock("lo");
2528
26
- assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,
27
- sizeof(prog_fd[0])) == 0);
29
+ assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
30
+ sizeof(prog_fd)) == 0);
2831
29
- f = popen("ping -c5 localhost", "r");
32
+ f = popen("ping -4 -c5 localhost", "r");
3033 (void) f;
3134
3235 for (i = 0; i < 5; i++) {
....@@ -34,13 +37,13 @@
3437 int key;
3538
3639 key = IPPROTO_TCP;
37
- assert(bpf_map_lookup_elem(map_fd[0], &key, &tcp_cnt) == 0);
40
+ assert(bpf_map_lookup_elem(map_fd, &key, &tcp_cnt) == 0);
3841
3942 key = IPPROTO_UDP;
40
- assert(bpf_map_lookup_elem(map_fd[0], &key, &udp_cnt) == 0);
43
+ assert(bpf_map_lookup_elem(map_fd, &key, &udp_cnt) == 0);
4144
4245 key = IPPROTO_ICMP;
43
- assert(bpf_map_lookup_elem(map_fd[0], &key, &icmp_cnt) == 0);
46
+ assert(bpf_map_lookup_elem(map_fd, &key, &icmp_cnt) == 0);
4447
4548 printf("TCP %lld UDP %lld ICMP %lld bytes\n",
4649 tcp_cnt, udp_cnt, icmp_cnt);