bpf: sockmap sample program
This program binds a program to a cgroup and then matches hard coded IP addresses and adds these to a sockmap. This will receive messages from the backend and send them to the client. client:X <---> frontend:10000 client:X <---> backend:10001 To keep things simple this is only designed for 1:1 connections using hard coded values. A more complete example would allow many backends and clients. To run, # sockmap <cgroup2_dir> Signed-off-by:John Fastabend <john.fastabend@gmail.com> Signed-off-by:
David S. Miller <davem@davemloft.net>
Showing
- samples/bpf/bpf_load.c 6 additions, 2 deletionssamples/bpf/bpf_load.c
- samples/sockmap/Makefile 78 additions, 0 deletionssamples/sockmap/Makefile
- samples/sockmap/sockmap_kern.c 110 additions, 0 deletionssamples/sockmap/sockmap_kern.c
- samples/sockmap/sockmap_user.c 286 additions, 0 deletionssamples/sockmap/sockmap_user.c
- tools/include/uapi/linux/bpf.h 45 additions, 1 deletiontools/include/uapi/linux/bpf.h
- tools/lib/bpf/bpf.c 11 additions, 3 deletionstools/lib/bpf/bpf.c
- tools/lib/bpf/bpf.h 4 additions, 0 deletionstools/lib/bpf/bpf.h
- tools/testing/selftests/bpf/bpf_helpers.h 7 additions, 0 deletionstools/testing/selftests/bpf/bpf_helpers.h
Loading
Please register or sign in to comment