diff options
author | John Fastabend <john.fastabend@gmail.com> | 2017-08-15 22:33:32 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-08-16 11:27:53 -0700 |
commit | 69e8cc134bcbf0ccfcf852c400b8e6788d1d0038 (patch) | |
tree | 181f7fc9d1a8204f93aa705e2725e7c5b766610c /samples/bpf/syscall_tp_user.c | |
parent | 8a31db5615667956c513d205cfb06885c3ec6d0b (diff) | |
download | blackbird-op-linux-69e8cc134bcbf0ccfcf852c400b8e6788d1d0038.tar.gz blackbird-op-linux-69e8cc134bcbf0ccfcf852c400b8e6788d1d0038.zip |
bpf: sockmap sample program
This program binds a program to a cgroup and then matches hard
coded IP addresses and adds these to a sockmap.
This will receive messages from the backend and send them to
the client.
client:X <---> frontend:10000 client:X <---> backend:10001
To keep things simple this is only designed for 1:1 connections
using hard coded values. A more complete example would allow many
backends and clients.
To run,
# sockmap <cgroup2_dir>
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'samples/bpf/syscall_tp_user.c')
0 files changed, 0 insertions, 0 deletions