blob: 88a26f3ce2017adeff80110854f9a16158673a15 [file] [log] [blame]
Daniel Borkmann42984d72015-10-29 14:58:10 +01001#include <linux/unistd.h>
2#include <linux/bpf.h>
3
4#include <stdio.h>
5#include <stdlib.h>
6#include <stdint.h>
7#include <unistd.h>
8#include <string.h>
9#include <assert.h>
10#include <errno.h>
11
12#include <sys/types.h>
13#include <sys/socket.h>
14
Jakub Kicinski8d930452018-05-14 22:35:03 -070015#include <bpf/bpf.h>
16
Toke Høiland-Jørgensen7cf245a2020-01-20 14:06:49 +010017#include <bpf/libbpf.h>
Jakub Kicinski8d930452018-05-14 22:35:03 -070018#include "bpf_insn.h"
Joe Stringer98996942016-12-08 18:46:20 -080019#include "sock_example.h"
Linkui Xiaob1fc28b2022-07-12 15:23:02 +080020#include "bpf_util.h"
Daniel Borkmann42984d72015-10-29 14:58:10 +010021
22#define BPF_F_PIN (1 << 0)
23#define BPF_F_GET (1 << 1)
24#define BPF_F_PIN_GET (BPF_F_PIN | BPF_F_GET)
25
26#define BPF_F_KEY (1 << 2)
27#define BPF_F_VAL (1 << 3)
28#define BPF_F_KEY_VAL (BPF_F_KEY | BPF_F_VAL)
29
30#define BPF_M_UNSPEC 0
31#define BPF_M_MAP 1
32#define BPF_M_PROG 2
33
Wenbo Zhangeef8a42d2020-07-10 05:20:35 -040034char bpf_log_buf[BPF_LOG_BUF_SIZE];
35
Daniel Borkmann42984d72015-10-29 14:58:10 +010036static void usage(void)
37{
38 printf("Usage: fds_example [...]\n");
39 printf(" -F <file> File to pin/get object\n");
40 printf(" -P |- pin object\n");
41 printf(" -G `- get object\n");
42 printf(" -m eBPF map mode\n");
43 printf(" -k <key> |- map key\n");
44 printf(" -v <value> `- map value\n");
45 printf(" -p eBPF prog mode\n");
46 printf(" -o <object> `- object file\n");
47 printf(" -h Display this help.\n");
48}
49
Daniel Borkmann42984d72015-10-29 14:58:10 +010050static int bpf_prog_create(const char *object)
51{
Arnaldo Carvalho de Melo811b4f02016-12-20 11:03:13 -030052 static struct bpf_insn insns[] = {
Daniel Borkmann42984d72015-10-29 14:58:10 +010053 BPF_MOV64_IMM(BPF_REG_0, 1),
54 BPF_EXIT_INSN(),
55 };
Linkui Xiaob1fc28b2022-07-12 15:23:02 +080056 size_t insns_cnt = ARRAY_SIZE(insns);
Jakub Kicinski1a9b2682019-02-27 19:04:13 -080057 struct bpf_object *obj;
Andrii Nakryikoc58f9812021-12-01 15:28:23 -080058 int err;
Daniel Borkmann42984d72015-10-29 14:58:10 +010059
60 if (object) {
Andrii Nakryikoc58f9812021-12-01 15:28:23 -080061 obj = bpf_object__open_file(object, NULL);
62 assert(!libbpf_get_error(obj));
63 err = bpf_object__load(obj);
64 assert(!err);
65 return bpf_program__fd(bpf_object__next_program(obj, NULL));
Daniel Borkmann42984d72015-10-29 14:58:10 +010066 } else {
Andrii Nakryikoc58f9812021-12-01 15:28:23 -080067 LIBBPF_OPTS(bpf_prog_load_opts, opts,
68 .log_buf = bpf_log_buf,
69 .log_size = BPF_LOG_BUF_SIZE,
70 );
71
72 return bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL",
73 insns, insns_cnt, &opts);
Daniel Borkmann42984d72015-10-29 14:58:10 +010074 }
75}
76
77static int bpf_do_map(const char *file, uint32_t flags, uint32_t key,
78 uint32_t value)
79{
80 int fd, ret;
81
82 if (flags & BPF_F_PIN) {
Andrii Nakryikoc58f9812021-12-01 15:28:23 -080083 fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, NULL, sizeof(uint32_t),
84 sizeof(uint32_t), 1024, NULL);
Daniel Borkmann42984d72015-10-29 14:58:10 +010085 printf("bpf: map fd:%d (%s)\n", fd, strerror(errno));
86 assert(fd > 0);
87
88 ret = bpf_obj_pin(fd, file);
89 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
90 assert(ret == 0);
91 } else {
92 fd = bpf_obj_get(file);
93 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
94 assert(fd > 0);
95 }
96
97 if ((flags & BPF_F_KEY_VAL) == BPF_F_KEY_VAL) {
Joe Stringerd40fc182016-12-14 14:43:38 -080098 ret = bpf_map_update_elem(fd, &key, &value, 0);
Daniel Borkmann42984d72015-10-29 14:58:10 +010099 printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd, key, value,
100 ret, strerror(errno));
101 assert(ret == 0);
102 } else if (flags & BPF_F_KEY) {
Joe Stringerd40fc182016-12-14 14:43:38 -0800103 ret = bpf_map_lookup_elem(fd, &key, &value);
Daniel Borkmann42984d72015-10-29 14:58:10 +0100104 printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd, key, value,
105 ret, strerror(errno));
106 assert(ret == 0);
107 }
108
109 return 0;
110}
111
112static int bpf_do_prog(const char *file, uint32_t flags, const char *object)
113{
114 int fd, sock, ret;
115
116 if (flags & BPF_F_PIN) {
117 fd = bpf_prog_create(object);
118 printf("bpf: prog fd:%d (%s)\n", fd, strerror(errno));
119 assert(fd > 0);
120
121 ret = bpf_obj_pin(fd, file);
122 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
123 assert(ret == 0);
124 } else {
125 fd = bpf_obj_get(file);
126 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
127 assert(fd > 0);
128 }
129
130 sock = open_raw_sock("lo");
131 assert(sock > 0);
132
133 ret = setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &fd, sizeof(fd));
134 printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock, fd,
135 ret, strerror(errno));
136 assert(ret == 0);
137
138 return 0;
139}
140
141int main(int argc, char **argv)
142{
143 const char *file = NULL, *object = NULL;
144 uint32_t key = 0, value = 0, flags = 0;
145 int opt, mode = BPF_M_UNSPEC;
146
147 while ((opt = getopt(argc, argv, "F:PGmk:v:po:")) != -1) {
148 switch (opt) {
149 /* General args */
150 case 'F':
151 file = optarg;
152 break;
153 case 'P':
154 flags |= BPF_F_PIN;
155 break;
156 case 'G':
157 flags |= BPF_F_GET;
158 break;
159 /* Map-related args */
160 case 'm':
161 mode = BPF_M_MAP;
162 break;
163 case 'k':
164 key = strtoul(optarg, NULL, 0);
165 flags |= BPF_F_KEY;
166 break;
167 case 'v':
168 value = strtoul(optarg, NULL, 0);
169 flags |= BPF_F_VAL;
170 break;
171 /* Prog-related args */
172 case 'p':
173 mode = BPF_M_PROG;
174 break;
175 case 'o':
176 object = optarg;
177 break;
178 default:
179 goto out;
180 }
181 }
182
183 if (!(flags & BPF_F_PIN_GET) || !file)
184 goto out;
185
186 switch (mode) {
187 case BPF_M_MAP:
188 return bpf_do_map(file, flags, key, value);
189 case BPF_M_PROG:
190 return bpf_do_prog(file, flags, object);
191 }
192out:
193 usage();
194 return -1;
195}