sockmap_parse_prog.c 885 B

1234567891011121314151617181920212223242526272829303132333435363738
  1. #include <linux/bpf.h>
  2. #include "bpf_helpers.h"
  3. #include "bpf_util.h"
  4. #include "bpf_endian.h"
  5. int _version SEC("version") = 1;
  6. #define bpf_printk(fmt, ...) \
  7. ({ \
  8. char ____fmt[] = fmt; \
  9. bpf_trace_printk(____fmt, sizeof(____fmt), \
  10. ##__VA_ARGS__); \
  11. })
  12. SEC("sk_skb1")
  13. int bpf_prog1(struct __sk_buff *skb)
  14. {
  15. void *data_end = (void *)(long) skb->data_end;
  16. void *data = (void *)(long) skb->data;
  17. __u32 lport = skb->local_port;
  18. __u32 rport = skb->remote_port;
  19. char *d = data;
  20. if (data + 8 > data_end)
  21. return skb->len;
  22. /* This write/read is a bit pointless but tests the verifier and
  23. * strparser handler for read/write pkt data and access into sk
  24. * fields.
  25. */
  26. d[0] = 1;
  27. bpf_printk("parse: data[0] = (%u): local_port %i remote %i\n",
  28. d[0], lport, bpf_ntohl(rport));
  29. return skb->len;
  30. }
  31. char _license[] SEC("license") = "GPL";