2014-12-02 00:06:38 +01:00
|
|
|
#include <uapi/linux/bpf.h>
|
|
|
|
#include <uapi/linux/if_ether.h>
|
2015-03-13 19:57:43 +01:00
|
|
|
#include <uapi/linux/if_packet.h>
|
2014-12-02 00:06:38 +01:00
|
|
|
#include <uapi/linux/ip.h>
|
|
|
|
#include "bpf_helpers.h"
|
|
|
|
|
|
|
|
struct bpf_map_def SEC("maps") my_map = {
|
|
|
|
.type = BPF_MAP_TYPE_ARRAY,
|
|
|
|
.key_size = sizeof(u32),
|
|
|
|
.value_size = sizeof(long),
|
|
|
|
.max_entries = 256,
|
|
|
|
};
|
|
|
|
|
|
|
|
SEC("socket1")
|
2015-03-13 19:57:43 +01:00
|
|
|
int bpf_prog1(struct __sk_buff *skb)
|
2014-12-02 00:06:38 +01:00
|
|
|
{
|
|
|
|
int index = load_byte(skb, ETH_HLEN + offsetof(struct iphdr, protocol));
|
|
|
|
long *value;
|
|
|
|
|
2015-03-13 19:57:43 +01:00
|
|
|
if (skb->pkt_type != PACKET_OUTGOING)
|
|
|
|
return 0;
|
|
|
|
|
2014-12-02 00:06:38 +01:00
|
|
|
value = bpf_map_lookup_elem(&my_map, &index);
|
|
|
|
if (value)
|
2015-03-13 19:57:43 +01:00
|
|
|
__sync_fetch_and_add(value, skb->len);
|
2014-12-02 00:06:38 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|