diff options
author | Jesper Dangaard Brouer <brouer@redhat.com> | 2017-10-06 10:41:51 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-10-06 10:04:36 -0700 |
commit | c4eb7f4643ce3741e63b7d3f9b70bb7a637e738a (patch) | |
tree | 487dd38ac704263937622d1963786e191fb6083a /samples | |
parent | 280b058d4801cb431477dc101a776e4b24995f2f (diff) | |
download | linux-c4eb7f4643ce3741e63b7d3f9b70bb7a637e738a.tar.gz linux-c4eb7f4643ce3741e63b7d3f9b70bb7a637e738a.tar.bz2 linux-c4eb7f4643ce3741e63b7d3f9b70bb7a637e738a.zip |
samples/bpf: xdp_monitor increase memory rlimit
Other concurrent running programs, like perf or the XDP program what
needed to be monitored, might take up part of the max locked memory
limit. Thus, the xdp_monitor tool have to set the RLIMIT_MEMLOCK to
RLIM_INFINITY, as it cannot determine a more sane limit.
Using the man exit(3) specified EXIT_FAILURE return exit code, and
correct other users too.
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'samples')
-rw-r--r-- | samples/bpf/xdp_monitor_user.c | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/samples/bpf/xdp_monitor_user.c b/samples/bpf/xdp_monitor_user.c index 97c3456c11b2..eaba165b3549 100644 --- a/samples/bpf/xdp_monitor_user.c +++ b/samples/bpf/xdp_monitor_user.c @@ -20,6 +20,7 @@ static const char *__doc_err_only__= #include <unistd.h> #include <locale.h> +#include <sys/resource.h> #include <getopt.h> #include <net/if.h> #include <time.h> @@ -295,6 +296,7 @@ static void print_bpf_prog_info(void) int main(int argc, char **argv) { + struct rlimit r = {RLIM_INFINITY, RLIM_INFINITY}; int longindex = 0, opt; int ret = EXIT_SUCCESS; char bpf_obj_file[256]; @@ -325,13 +327,18 @@ int main(int argc, char **argv) } } + if (setrlimit(RLIMIT_MEMLOCK, &r)) { + perror("setrlimit(RLIMIT_MEMLOCK)"); + return EXIT_FAILURE; + } + if (load_bpf_file(bpf_obj_file)) { printf("ERROR - bpf_log_buf: %s", bpf_log_buf); - return 1; + return EXIT_FAILURE; } if (!prog_fd[0]) { printf("ERROR - load_bpf_file: %s\n", strerror(errno)); - return 1; + return EXIT_FAILURE; } if (debug) { |