mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-24 20:54:10 +08:00
7cf245a37e
Fix all files in samples/bpf to include libbpf header files with the bpf/
prefix, to be consistent with external users of the library. Also ensure
that all includes of exported libbpf header files (those that are exported
on 'make install' of the library) use bracketed includes instead of quoted.
To make sure no new files are introduced that doesn't include the bpf/
prefix in its include, remove tools/lib/bpf from the include path entirely,
and use tools/lib instead.
Fixes: 6910d7d386
("selftests/bpf: Ensure bpf_helper_defs.h are taken from selftests dir")
Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Link: https://lore.kernel.org/bpf/157952560911.1683545.8795966751309534150.stgit@toke.dk
54 lines
1.7 KiB
C
54 lines
1.7 KiB
C
/* Copyright (c) 2016 Sargun Dhillon <sargun@sargun.me>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
* License as published by the Free Software Foundation.
|
|
*/
|
|
#include <linux/skbuff.h>
|
|
#include <linux/netdevice.h>
|
|
#include <uapi/linux/bpf.h>
|
|
#include <linux/version.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
|
|
struct bpf_map_def SEC("maps") dnat_map = {
|
|
.type = BPF_MAP_TYPE_HASH,
|
|
.key_size = sizeof(struct sockaddr_in),
|
|
.value_size = sizeof(struct sockaddr_in),
|
|
.max_entries = 256,
|
|
};
|
|
|
|
/* kprobe is NOT a stable ABI
|
|
* kernel functions can be removed, renamed or completely change semantics.
|
|
* Number of arguments and their positions can change, etc.
|
|
* In such case this bpf+kprobe example will no longer be meaningful
|
|
*
|
|
* This example sits on a syscall, and the syscall ABI is relatively stable
|
|
* of course, across platforms, and over time, the ABI may change.
|
|
*/
|
|
SEC("kprobe/sys_connect")
|
|
int bpf_prog1(struct pt_regs *ctx)
|
|
{
|
|
struct sockaddr_in new_addr, orig_addr = {};
|
|
struct sockaddr_in *mapped_addr;
|
|
void *sockaddr_arg = (void *)PT_REGS_PARM2(ctx);
|
|
int sockaddr_len = (int)PT_REGS_PARM3(ctx);
|
|
|
|
if (sockaddr_len > sizeof(orig_addr))
|
|
return 0;
|
|
|
|
if (bpf_probe_read_user(&orig_addr, sizeof(orig_addr), sockaddr_arg) != 0)
|
|
return 0;
|
|
|
|
mapped_addr = bpf_map_lookup_elem(&dnat_map, &orig_addr);
|
|
if (mapped_addr != NULL) {
|
|
memcpy(&new_addr, mapped_addr, sizeof(new_addr));
|
|
bpf_probe_write_user(sockaddr_arg, &new_addr,
|
|
sizeof(new_addr));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
u32 _version SEC("version") = LINUX_VERSION_CODE;
|