2015-05-19 23:59:06 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <linux/bpf.h>
|
|
|
|
#include "libbpf.h"
|
|
|
|
#include "bpf_load.h"
|
2016-12-09 02:46:20 +00:00
|
|
|
#include "sock_example.h"
|
2015-05-19 23:59:06 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <arpa/inet.h>
|
2016-06-22 04:05:58 +00:00
|
|
|
#include <sys/resource.h>
|
2015-05-19 23:59:06 +00:00
|
|
|
|
2016-09-23 20:40:04 +00:00
|
|
|
struct bpf_flow_keys {
|
2015-05-19 23:59:06 +00:00
|
|
|
__be32 src;
|
|
|
|
__be32 dst;
|
|
|
|
union {
|
|
|
|
__be32 ports;
|
|
|
|
__be16 port16[2];
|
|
|
|
};
|
|
|
|
__u32 ip_proto;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct pair {
|
|
|
|
__u64 packets;
|
|
|
|
__u64 bytes;
|
|
|
|
};
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
2016-06-22 04:05:58 +00:00
|
|
|
struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY};
|
2015-05-19 23:59:06 +00:00
|
|
|
char filename[256];
|
|
|
|
FILE *f;
|
|
|
|
int i, sock;
|
|
|
|
|
|
|
|
snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]);
|
2016-06-22 04:05:58 +00:00
|
|
|
setrlimit(RLIMIT_MEMLOCK, &r);
|
2015-05-19 23:59:06 +00:00
|
|
|
|
|
|
|
if (load_bpf_file(filename)) {
|
|
|
|
printf("%s", bpf_log_buf);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock = open_raw_sock("lo");
|
|
|
|
|
|
|
|
assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd[4],
|
|
|
|
sizeof(__u32)) == 0);
|
|
|
|
|
|
|
|
if (argc > 1)
|
|
|
|
f = popen("ping -c5 localhost", "r");
|
|
|
|
else
|
|
|
|
f = popen("netperf -l 4 localhost", "r");
|
|
|
|
(void) f;
|
|
|
|
|
|
|
|
for (i = 0; i < 5; i++) {
|
2016-09-23 20:40:04 +00:00
|
|
|
struct bpf_flow_keys key = {}, next_key;
|
2015-05-19 23:59:06 +00:00
|
|
|
struct pair value;
|
|
|
|
|
|
|
|
sleep(1);
|
|
|
|
printf("IP src.port -> dst.port bytes packets\n");
|
samples/bpf: Make samples more libbpf-centric
Switch all of the sample code to use the function names from
tools/lib/bpf so that they're consistent with that, and to declare their
own log buffers. This allow the next commit to be purely devoted to
getting rid of the duplicate library in samples/bpf.
Committer notes:
Testing it:
On a fedora rawhide container, with clang/llvm 3.9, sharing the host
linux kernel git tree:
# make O=/tmp/build/linux/ headers_install
# make O=/tmp/build/linux -C samples/bpf/
Since I forgot to make it privileged, just tested it outside the
container, using what it generated:
# uname -a
Linux jouet 4.9.0-rc8+ #1 SMP Mon Dec 12 11:20:49 BRT 2016 x86_64 x86_64 x86_64 GNU/Linux
# cd /var/lib/docker/devicemapper/mnt/c43e09a53ff56c86a07baf79847f00e2cc2a17a1e2220e1adbf8cbc62734feda/rootfs/tmp/build/linux/samples/bpf/
# ls -la offwaketime
-rwxr-xr-x. 1 root root 24200 Dec 15 12:19 offwaketime
# file offwaketime
offwaketime: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=c940d3f127d5e66cdd680e42d885cb0b64f8a0e4, not stripped
# readelf -SW offwaketime_kern.o | grep PROGBITS
[ 2] .text PROGBITS 0000000000000000 000040 000000 00 AX 0 0 4
[ 3] kprobe/try_to_wake_up PROGBITS 0000000000000000 000040 0000d8 00 AX 0 0 8
[ 5] tracepoint/sched/sched_switch PROGBITS 0000000000000000 000118 000318 00 AX 0 0 8
[ 7] maps PROGBITS 0000000000000000 000430 000050 00 WA 0 0 4
[ 8] license PROGBITS 0000000000000000 000480 000004 00 WA 0 0 1
[ 9] version PROGBITS 0000000000000000 000484 000004 00 WA 0 0 4
# ./offwaketime | head -5
swapper/1;start_secondary;cpu_startup_entry;schedule_preempt_disabled;schedule;__schedule;-;---;; 106
CPU 0/KVM;entry_SYSCALL_64_fastpath;sys_ioctl;do_vfs_ioctl;kvm_vcpu_ioctl;kvm_arch_vcpu_ioctl_run;kvm_vcpu_block;schedule;__schedule;-;try_to_wake_up;swake_up_locked;swake_up;apic_timer_expired;apic_timer_fn;__hrtimer_run_queues;hrtimer_interrupt;local_apic_timer_interrupt;smp_apic_timer_interrupt;__irqentry_text_start;cpuidle_enter;call_cpuidle;cpu_startup_entry;start_secondary;;swapper/3 2
Compositor;entry_SYSCALL_64_fastpath;sys_futex;do_futex;futex_wait;futex_wait_queue_me;schedule;__schedule;-;try_to_wake_up;futex_requeue;do_futex;sys_futex;entry_SYSCALL_64_fastpath;;SoftwareVsyncTh 5
firefox;entry_SYSCALL_64_fastpath;sys_poll;do_sys_poll;poll_schedule_timeout;schedule_hrtimeout_range;schedule_hrtimeout_range_clock;schedule;__schedule;-;try_to_wake_up;pollwake;__wake_up_common;__wake_up_sync_key;pipe_write;__vfs_write;vfs_write;sys_write;entry_SYSCALL_64_fastpath;;Timer 13
JS Helper;entry_SYSCALL_64_fastpath;sys_futex;do_futex;futex_wait;futex_wait_queue_me;schedule;__schedule;-;try_to_wake_up;do_futex;sys_futex;entry_SYSCALL_64_fastpath;;firefox 2
#
Signed-off-by: Joe Stringer <joe@ovn.org>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Alexei Starovoitov <ast@fb.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Wang Nan <wangnan0@huawei.com>
Cc: netdev@vger.kernel.org
Link: http://lkml.kernel.org/r/20161214224342.12858-2-joe@ovn.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2016-12-14 22:43:38 +00:00
|
|
|
while (bpf_map_get_next_key(map_fd[2], &key, &next_key) == 0) {
|
|
|
|
bpf_map_lookup_elem(map_fd[2], &next_key, &value);
|
2015-05-19 23:59:06 +00:00
|
|
|
printf("%s.%05d -> %s.%05d %12lld %12lld\n",
|
|
|
|
inet_ntoa((struct in_addr){htonl(next_key.src)}),
|
|
|
|
next_key.port16[0],
|
|
|
|
inet_ntoa((struct in_addr){htonl(next_key.dst)}),
|
|
|
|
next_key.port16[1],
|
|
|
|
value.bytes, value.packets);
|
|
|
|
key = next_key;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|