hc
2023-12-11 d2ccde1c8e90d38cee87a1b0309ad2827f3fd30d
kernel/samples/bpf/sockex2_user.c
....@@ -3,7 +3,7 @@
33 #include <assert.h>
44 #include <linux/bpf.h>
55 #include <bpf/bpf.h>
6
-#include "bpf_load.h"
6
+#include <bpf/libbpf.h>
77 #include "sock_example.h"
88 #include <unistd.h>
99 #include <arpa/inet.h>
....@@ -17,32 +17,35 @@
1717 int main(int ac, char **argv)
1818 {
1919 struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY};
20
+ struct bpf_object *obj;
21
+ int map_fd, prog_fd;
2022 char filename[256];
21
- FILE *f;
2223 int i, sock;
24
+ FILE *f;
2325
2426 snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
2527 setrlimit(RLIMIT_MEMLOCK, &r);
2628
27
- if (load_bpf_file(filename)) {
28
- printf("%s", bpf_log_buf);
29
+ if (bpf_prog_load(filename, BPF_PROG_TYPE_SOCKET_FILTER,
30
+ &obj, &prog_fd))
2931 return 1;
30
- }
32
+
33
+ map_fd = bpf_object__find_map_fd_by_name(obj, "hash_map");
3134
3235 sock = open_raw_sock("lo");
3336
34
- assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,
35
- sizeof(prog_fd[0])) == 0);
37
+ assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,
38
+ sizeof(prog_fd)) == 0);
3639
37
- f = popen("ping -c5 localhost", "r");
40
+ f = popen("ping -4 -c5 localhost", "r");
3841 (void) f;
3942
4043 for (i = 0; i < 5; i++) {
4144 int key = 0, next_key;
4245 struct pair value;
4346
44
- while (bpf_map_get_next_key(map_fd[0], &key, &next_key) == 0) {
45
- bpf_map_lookup_elem(map_fd[0], &next_key, &value);
47
+ while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) {
48
+ bpf_map_lookup_elem(map_fd, &next_key, &value);
4649 printf("ip %s bytes %lld packets %lld\n",
4750 inet_ntoa((struct in_addr){htonl(next_key)}),
4851 value.bytes, value.packets);