aboutsummaryrefslogtreecommitdiffstats
path: root/samples/bpf
diff options
context:
space:
mode:
authorDaniel Borkmann <daniel@iogearbox.net>2015-10-29 09:58:10 -0400
committerDavid S. Miller <davem@davemloft.net>2015-11-02 22:48:39 -0500
commit42984d7c1e563bf92e6ca7a0fd89f8e933f2162e (patch)
tree011745b348dfea74709648487aed31bb6f670329 /samples/bpf
parentb2197755b2633e164a439682fb05a9b5ea48f706 (diff)
bpf: add sample usages for persistent maps/progs
This patch adds a couple of stand-alone examples on how BPF_OBJ_PIN and BPF_OBJ_GET commands can be used. Example with maps: # ./fds_example -F /sys/fs/bpf/m -P -m -k 1 -v 42 bpf: map fd:3 (Success) bpf: pin ret:(0,Success) bpf: fd:3 u->(1:42) ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m -G -m -k 1 bpf: get fd:3 (Success) bpf: fd:3 l->(1):42 ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m -G -m -k 1 -v 24 bpf: get fd:3 (Success) bpf: fd:3 u->(1:24) ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m -G -m -k 1 bpf: get fd:3 (Success) bpf: fd:3 l->(1):24 ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m2 -P -m bpf: map fd:3 (Success) bpf: pin ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m2 -G -m -k 1 bpf: get fd:3 (Success) bpf: fd:3 l->(1):0 ret:(0,Success) # ./fds_example -F /sys/fs/bpf/m2 -G -m bpf: get fd:3 (Success) Example with progs: # ./fds_example -F /sys/fs/bpf/p -P -p bpf: prog fd:3 (Success) bpf: pin ret:(0,Success) bpf sock:4 <- fd:3 attached ret:(0,Success) # ./fds_example -F /sys/fs/bpf/p -G -p bpf: get fd:3 (Success) bpf: sock:4 <- fd:3 attached ret:(0,Success) # ./fds_example -F /sys/fs/bpf/p2 -P -p -o ./sockex1_kern.o bpf: prog fd:5 (Success) bpf: pin ret:(0,Success) bpf: sock:3 <- fd:5 attached ret:(0,Success) # ./fds_example -F /sys/fs/bpf/p2 -G -p bpf: get fd:3 (Success) bpf: sock:4 <- fd:3 attached ret:(0,Success) Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'samples/bpf')
-rw-r--r--samples/bpf/Makefile3
-rw-r--r--samples/bpf/fds_example.c183
-rw-r--r--samples/bpf/libbpf.c19
-rw-r--r--samples/bpf/libbpf.h3
4 files changed, 208 insertions, 0 deletions
diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile
index b30514514e37..79b4596b5f9a 100644
--- a/samples/bpf/Makefile
+++ b/samples/bpf/Makefile
@@ -4,6 +4,7 @@ obj- := dummy.o
4# List of programs to build 4# List of programs to build
5hostprogs-y := test_verifier test_maps 5hostprogs-y := test_verifier test_maps
6hostprogs-y += sock_example 6hostprogs-y += sock_example
7hostprogs-y += fds_example
7hostprogs-y += sockex1 8hostprogs-y += sockex1
8hostprogs-y += sockex2 9hostprogs-y += sockex2
9hostprogs-y += sockex3 10hostprogs-y += sockex3
@@ -19,6 +20,7 @@ hostprogs-y += lathist
19test_verifier-objs := test_verifier.o libbpf.o 20test_verifier-objs := test_verifier.o libbpf.o
20test_maps-objs := test_maps.o libbpf.o 21test_maps-objs := test_maps.o libbpf.o
21sock_example-objs := sock_example.o libbpf.o 22sock_example-objs := sock_example.o libbpf.o
23fds_example-objs := bpf_load.o libbpf.o fds_example.o
22sockex1-objs := bpf_load.o libbpf.o sockex1_user.o 24sockex1-objs := bpf_load.o libbpf.o sockex1_user.o
23sockex2-objs := bpf_load.o libbpf.o sockex2_user.o 25sockex2-objs := bpf_load.o libbpf.o sockex2_user.o
24sockex3-objs := bpf_load.o libbpf.o sockex3_user.o 26sockex3-objs := bpf_load.o libbpf.o sockex3_user.o
@@ -49,6 +51,7 @@ always += lathist_kern.o
49HOSTCFLAGS += -I$(objtree)/usr/include 51HOSTCFLAGS += -I$(objtree)/usr/include
50 52
51HOSTCFLAGS_bpf_load.o += -I$(objtree)/usr/include -Wno-unused-variable 53HOSTCFLAGS_bpf_load.o += -I$(objtree)/usr/include -Wno-unused-variable
54HOSTLOADLIBES_fds_example += -lelf
52HOSTLOADLIBES_sockex1 += -lelf 55HOSTLOADLIBES_sockex1 += -lelf
53HOSTLOADLIBES_sockex2 += -lelf 56HOSTLOADLIBES_sockex2 += -lelf
54HOSTLOADLIBES_sockex3 += -lelf 57HOSTLOADLIBES_sockex3 += -lelf
diff --git a/samples/bpf/fds_example.c b/samples/bpf/fds_example.c
new file mode 100644
index 000000000000..e2fd16c3d0f0
--- /dev/null
+++ b/samples/bpf/fds_example.c
@@ -0,0 +1,183 @@
1#include <linux/unistd.h>
2#include <linux/bpf.h>
3
4#include <stdio.h>
5#include <stdlib.h>
6#include <stdint.h>
7#include <unistd.h>
8#include <string.h>
9#include <assert.h>
10#include <errno.h>
11
12#include <sys/types.h>
13#include <sys/socket.h>
14
15#include "bpf_load.h"
16#include "libbpf.h"
17
18#define BPF_F_PIN (1 << 0)
19#define BPF_F_GET (1 << 1)
20#define BPF_F_PIN_GET (BPF_F_PIN | BPF_F_GET)
21
22#define BPF_F_KEY (1 << 2)
23#define BPF_F_VAL (1 << 3)
24#define BPF_F_KEY_VAL (BPF_F_KEY | BPF_F_VAL)
25
26#define BPF_M_UNSPEC 0
27#define BPF_M_MAP 1
28#define BPF_M_PROG 2
29
30static void usage(void)
31{
32 printf("Usage: fds_example [...]\n");
33 printf(" -F <file> File to pin/get object\n");
34 printf(" -P |- pin object\n");
35 printf(" -G `- get object\n");
36 printf(" -m eBPF map mode\n");
37 printf(" -k <key> |- map key\n");
38 printf(" -v <value> `- map value\n");
39 printf(" -p eBPF prog mode\n");
40 printf(" -o <object> `- object file\n");
41 printf(" -h Display this help.\n");
42}
43
44static int bpf_map_create(void)
45{
46 return bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(uint32_t),
47 sizeof(uint32_t), 1024);
48}
49
50static int bpf_prog_create(const char *object)
51{
52 static const struct bpf_insn insns[] = {
53 BPF_MOV64_IMM(BPF_REG_0, 1),
54 BPF_EXIT_INSN(),
55 };
56
57 if (object) {
58 assert(!load_bpf_file((char *)object));
59 return prog_fd[0];
60 } else {
61 return bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER,
62 insns, sizeof(insns), "GPL", 0);
63 }
64}
65
66static int bpf_do_map(const char *file, uint32_t flags, uint32_t key,
67 uint32_t value)
68{
69 int fd, ret;
70
71 if (flags & BPF_F_PIN) {
72 fd = bpf_map_create();
73 printf("bpf: map fd:%d (%s)\n", fd, strerror(errno));
74 assert(fd > 0);
75
76 ret = bpf_obj_pin(fd, file);
77 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
78 assert(ret == 0);
79 } else {
80 fd = bpf_obj_get(file);
81 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
82 assert(fd > 0);
83 }
84
85 if ((flags & BPF_F_KEY_VAL) == BPF_F_KEY_VAL) {
86 ret = bpf_update_elem(fd, &key, &value, 0);
87 printf("bpf: fd:%d u->(%u:%u) ret:(%d,%s)\n", fd, key, value,
88 ret, strerror(errno));
89 assert(ret == 0);
90 } else if (flags & BPF_F_KEY) {
91 ret = bpf_lookup_elem(fd, &key, &value);
92 printf("bpf: fd:%d l->(%u):%u ret:(%d,%s)\n", fd, key, value,
93 ret, strerror(errno));
94 assert(ret == 0);
95 }
96
97 return 0;
98}
99
100static int bpf_do_prog(const char *file, uint32_t flags, const char *object)
101{
102 int fd, sock, ret;
103
104 if (flags & BPF_F_PIN) {
105 fd = bpf_prog_create(object);
106 printf("bpf: prog fd:%d (%s)\n", fd, strerror(errno));
107 assert(fd > 0);
108
109 ret = bpf_obj_pin(fd, file);
110 printf("bpf: pin ret:(%d,%s)\n", ret, strerror(errno));
111 assert(ret == 0);
112 } else {
113 fd = bpf_obj_get(file);
114 printf("bpf: get fd:%d (%s)\n", fd, strerror(errno));
115 assert(fd > 0);
116 }
117
118 sock = open_raw_sock("lo");
119 assert(sock > 0);
120
121 ret = setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &fd, sizeof(fd));
122 printf("bpf: sock:%d <- fd:%d attached ret:(%d,%s)\n", sock, fd,
123 ret, strerror(errno));
124 assert(ret == 0);
125
126 return 0;
127}
128
129int main(int argc, char **argv)
130{
131 const char *file = NULL, *object = NULL;
132 uint32_t key = 0, value = 0, flags = 0;
133 int opt, mode = BPF_M_UNSPEC;
134
135 while ((opt = getopt(argc, argv, "F:PGmk:v:po:")) != -1) {
136 switch (opt) {
137 /* General args */
138 case 'F':
139 file = optarg;
140 break;
141 case 'P':
142 flags |= BPF_F_PIN;
143 break;
144 case 'G':
145 flags |= BPF_F_GET;
146 break;
147 /* Map-related args */
148 case 'm':
149 mode = BPF_M_MAP;
150 break;
151 case 'k':
152 key = strtoul(optarg, NULL, 0);
153 flags |= BPF_F_KEY;
154 break;
155 case 'v':
156 value = strtoul(optarg, NULL, 0);
157 flags |= BPF_F_VAL;
158 break;
159 /* Prog-related args */
160 case 'p':
161 mode = BPF_M_PROG;
162 break;
163 case 'o':
164 object = optarg;
165 break;
166 default:
167 goto out;
168 }
169 }
170
171 if (!(flags & BPF_F_PIN_GET) || !file)
172 goto out;
173
174 switch (mode) {
175 case BPF_M_MAP:
176 return bpf_do_map(file, flags, key, value);
177 case BPF_M_PROG:
178 return bpf_do_prog(file, flags, object);
179 }
180out:
181 usage();
182 return -1;
183}
diff --git a/samples/bpf/libbpf.c b/samples/bpf/libbpf.c
index 7e1efa7e2ed7..65a8d48d2799 100644
--- a/samples/bpf/libbpf.c
+++ b/samples/bpf/libbpf.c
@@ -103,6 +103,25 @@ int bpf_prog_load(enum bpf_prog_type prog_type,
103 return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); 103 return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
104} 104}
105 105
106int bpf_obj_pin(int fd, const char *pathname)
107{
108 union bpf_attr attr = {
109 .pathname = ptr_to_u64((void *)pathname),
110 .bpf_fd = fd,
111 };
112
113 return syscall(__NR_bpf, BPF_OBJ_PIN, &attr, sizeof(attr));
114}
115
116int bpf_obj_get(const char *pathname)
117{
118 union bpf_attr attr = {
119 .pathname = ptr_to_u64((void *)pathname),
120 };
121
122 return syscall(__NR_bpf, BPF_OBJ_GET, &attr, sizeof(attr));
123}
124
106int open_raw_sock(const char *name) 125int open_raw_sock(const char *name)
107{ 126{
108 struct sockaddr_ll sll; 127 struct sockaddr_ll sll;
diff --git a/samples/bpf/libbpf.h b/samples/bpf/libbpf.h
index b7f63c70b4a2..014aacf916e4 100644
--- a/samples/bpf/libbpf.h
+++ b/samples/bpf/libbpf.h
@@ -15,6 +15,9 @@ int bpf_prog_load(enum bpf_prog_type prog_type,
15 const struct bpf_insn *insns, int insn_len, 15 const struct bpf_insn *insns, int insn_len,
16 const char *license, int kern_version); 16 const char *license, int kern_version);
17 17
18int bpf_obj_pin(int fd, const char *pathname);
19int bpf_obj_get(const char *pathname);
20
18#define LOG_BUF_SIZE 65536 21#define LOG_BUF_SIZE 65536
19extern char bpf_log_buf[LOG_BUF_SIZE]; 22extern char bpf_log_buf[LOG_BUF_SIZE];
20 23