142984d7cSDaniel Borkmann #include <linux/unistd.h>
242984d7cSDaniel Borkmann #include <linux/bpf.h>
342984d7cSDaniel Borkmann
442984d7cSDaniel Borkmann #include <stdio.h>
542984d7cSDaniel Borkmann #include <stdlib.h>
642984d7cSDaniel Borkmann #include <stdint.h>
742984d7cSDaniel Borkmann #include <unistd.h>
842984d7cSDaniel Borkmann #include <string.h>
942984d7cSDaniel Borkmann #include <assert.h>
1042984d7cSDaniel Borkmann #include <errno.h>
1142984d7cSDaniel Borkmann
1242984d7cSDaniel Borkmann #include <sys/types.h>
1342984d7cSDaniel Borkmann #include <sys/socket.h>
1442984d7cSDaniel Borkmann
158d930450SJakub Kicinski #include <bpf/bpf.h>
168d930450SJakub Kicinski
177cf245a3SToke Høiland-Jørgensen #include <bpf/libbpf.h>
188d930450SJakub Kicinski #include "bpf_insn.h"
199899694aSJoe Stringer #include "sock_example.h"
20*b1fc28b3SLinkui Xiao #include "bpf_util.h"
2142984d7cSDaniel Borkmann
2242984d7cSDaniel Borkmann #define BPF_F_PIN (1 << 0)
2342984d7cSDaniel Borkmann #define BPF_F_GET (1 << 1)
2442984d7cSDaniel Borkmann #define BPF_F_PIN_GET (BPF_F_PIN | BPF_F_GET)
2542984d7cSDaniel Borkmann
2642984d7cSDaniel Borkmann #define BPF_F_KEY (1 << 2)
2742984d7cSDaniel Borkmann #define BPF_F_VAL (1 << 3)
2842984d7cSDaniel Borkmann #define BPF_F_KEY_VAL (BPF_F_KEY | BPF_F_VAL)
2942984d7cSDaniel Borkmann
3042984d7cSDaniel Borkmann #define BPF_M_UNSPEC 0
3142984d7cSDaniel Borkmann #define BPF_M_MAP 1
3242984d7cSDaniel Borkmann #define BPF_M_PROG 2
3342984d7cSDaniel Borkmann
34eef8a42dSWenbo Zhang char bpf_log_buf[BPF_LOG_BUF_SIZE];
35eef8a42dSWenbo Zhang
usage(void)3642984d7cSDaniel Borkmann static void usage(void)
3742984d7cSDaniel Borkmann {
3842984d7cSDaniel Borkmann printf("Usage: fds_example [...]\n");
3942984d7cSDaniel Borkmann printf(" -F <file> File to pin/get object\n");
4042984d7cSDaniel Borkmann printf(" -P |- pin object\n");
4142984d7cSDaniel Borkmann printf(" -G `- get object\n");
4242984d7cSDaniel Borkmann printf(" -m eBPF map mode\n");
4342984d7cSDaniel Borkmann printf(" -k <key> |- map key\n");
4442984d7cSDaniel Borkmann printf(" -v <value> `- map value\n");
4542984d7cSDaniel Borkmann printf(" -p eBPF prog mode\n");
4642984d7cSDaniel Borkmann printf(" -o <object> `- object file\n");
4742984d7cSDaniel Borkmann printf(" -h Display this help.\n");
4842984d7cSDaniel Borkmann }
4942984d7cSDaniel Borkmann
bpf_prog_create(const char * object)5042984d7cSDaniel Borkmann static int bpf_prog_create(const char *object)
5142984d7cSDaniel Borkmann {
52811b4f0dSArnaldo Carvalho de Melo static struct bpf_insn insns[] = {
5342984d7cSDaniel Borkmann BPF_MOV64_IMM(BPF_REG_0, 1),
5442984d7cSDaniel Borkmann BPF_EXIT_INSN(),
5542984d7cSDaniel Borkmann };
56*b1fc28b3SLinkui Xiao size_t insns_cnt = ARRAY_SIZE(insns);
571a9b268cSJakub Kicinski struct bpf_object *obj;
58c58f9815SAndrii Nakryiko int err;
5942984d7cSDaniel Borkmann
6042984d7cSDaniel Borkmann if (object) {
61c58f9815SAndrii Nakryiko obj = bpf_object__open_file(object, NULL);
62c58f9815SAndrii Nakryiko assert(!libbpf_get_error(obj));
63c58f9815SAndrii Nakryiko err = bpf_object__load(obj);
64c58f9815SAndrii Nakryiko assert(!err);
65c58f9815SAndrii Nakryiko return bpf_program__fd(bpf_object__next_program(obj, NULL));
6642984d7cSDaniel Borkmann } else {
67c58f9815SAndrii Nakryiko LIBBPF_OPTS(bpf_prog_load_opts, opts,
68c58f9815SAndrii Nakryiko .log_buf = bpf_log_buf,
69c58f9815SAndrii Nakryiko .log_size = BPF_LOG_BUF_SIZE,
70c58f9815SAndrii Nakryiko );
71c58f9815SAndrii Nakryiko
72c58f9815SAndrii Nakryiko return bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL",
73c58f9815SAndrii Nakryiko insns, insns_cnt, &opts);
7442984d7cSDaniel Borkmann }
7542984d7cSDaniel Borkmann }
7642984d7cSDaniel Borkmann
bpf_do_map(const char * file,uint32_t flags,uint32_t key,uint32_t value)7742984d7cSDaniel Borkmann static int bpf_do_map(const char *file, uint32_t flags, uint32_t key,
7842984d7cSDaniel Borkmann uint32_t value)
7942984d7cSDaniel Borkmann {
8042984d7cSDaniel Borkmann int fd, ret;
8142984d7cSDaniel Borkmann
8242984d7cSDaniel Borkmann if (flags & BPF_F_PIN) {
83c58f9815SAndrii Nakryiko fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, NULL, sizeof(uint32_t),
84c58f9815SAndrii Nakryiko sizeof(uint32_t), 1024, NULL);
8542984d7cSDaniel Borkmann printf("bpf: map fd:%d (%s)\n", fd, strerror(errno));
8642984d7cSDaniel Borkmann assert(fd > 0);
8742984d7cSDaniel Borkmann
8842984d7cSDaniel Borkmann ret = bpf_obj_pin(fd, file);
8942984d7cSDaniel Borkmann printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
9042984d7cSDaniel Borkmann assert(ret == 0);
9142984d7cSDaniel Borkmann } else {
9242984d7cSDaniel Borkmann fd = bpf_obj_get(file);
9342984d7cSDaniel Borkmann printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
9442984d7cSDaniel Borkmann assert(fd > 0);
9542984d7cSDaniel Borkmann }
9642984d7cSDaniel Borkmann
9742984d7cSDaniel Borkmann if ((flags & BPF_F_KEY_VAL) == BPF_F_KEY_VAL) {
98d40fc181SJoe Stringer ret = bpf_map_update_elem(fd, &key, &value, 0);
9942984d7cSDaniel Borkmann printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd, key, value,
10042984d7cSDaniel Borkmann ret, strerror(errno));
10142984d7cSDaniel Borkmann assert(ret == 0);
10242984d7cSDaniel Borkmann } else if (flags & BPF_F_KEY) {
103d40fc181SJoe Stringer ret = bpf_map_lookup_elem(fd, &key, &value);
10442984d7cSDaniel Borkmann printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd, key, value,
10542984d7cSDaniel Borkmann ret, strerror(errno));
10642984d7cSDaniel Borkmann assert(ret == 0);
10742984d7cSDaniel Borkmann }
10842984d7cSDaniel Borkmann
10942984d7cSDaniel Borkmann return 0;
11042984d7cSDaniel Borkmann }
11142984d7cSDaniel Borkmann
bpf_do_prog(const char * file,uint32_t flags,const char * object)11242984d7cSDaniel Borkmann static int bpf_do_prog(const char *file, uint32_t flags, const char *object)
11342984d7cSDaniel Borkmann {
11442984d7cSDaniel Borkmann int fd, sock, ret;
11542984d7cSDaniel Borkmann
11642984d7cSDaniel Borkmann if (flags & BPF_F_PIN) {
11742984d7cSDaniel Borkmann fd = bpf_prog_create(object);
11842984d7cSDaniel Borkmann printf("bpf: prog fd:%d (%s)\n", fd, strerror(errno));
11942984d7cSDaniel Borkmann assert(fd > 0);
12042984d7cSDaniel Borkmann
12142984d7cSDaniel Borkmann ret = bpf_obj_pin(fd, file);
12242984d7cSDaniel Borkmann printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
12342984d7cSDaniel Borkmann assert(ret == 0);
12442984d7cSDaniel Borkmann } else {
12542984d7cSDaniel Borkmann fd = bpf_obj_get(file);
12642984d7cSDaniel Borkmann printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
12742984d7cSDaniel Borkmann assert(fd > 0);
12842984d7cSDaniel Borkmann }
12942984d7cSDaniel Borkmann
13042984d7cSDaniel Borkmann sock = open_raw_sock("lo");
13142984d7cSDaniel Borkmann assert(sock > 0);
13242984d7cSDaniel Borkmann
13342984d7cSDaniel Borkmann ret = setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &fd, sizeof(fd));
13442984d7cSDaniel Borkmann printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock, fd,
13542984d7cSDaniel Borkmann ret, strerror(errno));
13642984d7cSDaniel Borkmann assert(ret == 0);
13742984d7cSDaniel Borkmann
13842984d7cSDaniel Borkmann return 0;
13942984d7cSDaniel Borkmann }
14042984d7cSDaniel Borkmann
main(int argc,char ** argv)14142984d7cSDaniel Borkmann int main(int argc, char **argv)
14242984d7cSDaniel Borkmann {
14342984d7cSDaniel Borkmann const char *file = NULL, *object = NULL;
14442984d7cSDaniel Borkmann uint32_t key = 0, value = 0, flags = 0;
14542984d7cSDaniel Borkmann int opt, mode = BPF_M_UNSPEC;
14642984d7cSDaniel Borkmann
14742984d7cSDaniel Borkmann while ((opt = getopt(argc, argv, "F:PGmk:v:po:")) != -1) {
14842984d7cSDaniel Borkmann switch (opt) {
14942984d7cSDaniel Borkmann /* General args */
15042984d7cSDaniel Borkmann case 'F':
15142984d7cSDaniel Borkmann file = optarg;
15242984d7cSDaniel Borkmann break;
15342984d7cSDaniel Borkmann case 'P':
15442984d7cSDaniel Borkmann flags |= BPF_F_PIN;
15542984d7cSDaniel Borkmann break;
15642984d7cSDaniel Borkmann case 'G':
15742984d7cSDaniel Borkmann flags |= BPF_F_GET;
15842984d7cSDaniel Borkmann break;
15942984d7cSDaniel Borkmann /* Map-related args */
16042984d7cSDaniel Borkmann case 'm':
16142984d7cSDaniel Borkmann mode = BPF_M_MAP;
16242984d7cSDaniel Borkmann break;
16342984d7cSDaniel Borkmann case 'k':
16442984d7cSDaniel Borkmann key = strtoul(optarg, NULL, 0);
16542984d7cSDaniel Borkmann flags |= BPF_F_KEY;
16642984d7cSDaniel Borkmann break;
16742984d7cSDaniel Borkmann case 'v':
16842984d7cSDaniel Borkmann value = strtoul(optarg, NULL, 0);
16942984d7cSDaniel Borkmann flags |= BPF_F_VAL;
17042984d7cSDaniel Borkmann break;
17142984d7cSDaniel Borkmann /* Prog-related args */
17242984d7cSDaniel Borkmann case 'p':
17342984d7cSDaniel Borkmann mode = BPF_M_PROG;
17442984d7cSDaniel Borkmann break;
17542984d7cSDaniel Borkmann case 'o':
17642984d7cSDaniel Borkmann object = optarg;
17742984d7cSDaniel Borkmann break;
17842984d7cSDaniel Borkmann default:
17942984d7cSDaniel Borkmann goto out;
18042984d7cSDaniel Borkmann }
18142984d7cSDaniel Borkmann }
18242984d7cSDaniel Borkmann
18342984d7cSDaniel Borkmann if (!(flags & BPF_F_PIN_GET) || !file)
18442984d7cSDaniel Borkmann goto out;
18542984d7cSDaniel Borkmann
18642984d7cSDaniel Borkmann switch (mode) {
18742984d7cSDaniel Borkmann case BPF_M_MAP:
18842984d7cSDaniel Borkmann return bpf_do_map(file, flags, key, value);
18942984d7cSDaniel Borkmann case BPF_M_PROG:
19042984d7cSDaniel Borkmann return bpf_do_prog(file, flags, object);
19142984d7cSDaniel Borkmann }
19242984d7cSDaniel Borkmann out:
19342984d7cSDaniel Borkmann usage();
19442984d7cSDaniel Borkmann return -1;
19542984d7cSDaniel Borkmann }
196