1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2020 Facebook */
5 #include <bpf/bpf_helpers.h>
6 #include <bpf/bpf_tracing.h>
7 #include <bpf/bpf_core_read.h>
8 #include "../test_kmods/bpf_testmod.h"
10 __u32 raw_tp_read_sz = 0;
12 SEC("raw_tp/bpf_testmod_test_read")
13 int BPF_PROG(handle_raw_tp,
14 struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx)
16 raw_tp_read_sz = BPF_CORE_READ(read_ctx, len);
20 __u32 raw_tp_bare_write_sz = 0;
22 SEC("raw_tp/bpf_testmod_test_write_bare")
23 int BPF_PROG(handle_raw_tp_bare,
24 struct task_struct *task, struct bpf_testmod_test_write_ctx *write_ctx)
26 raw_tp_bare_write_sz = BPF_CORE_READ(write_ctx, len);
30 int raw_tp_writable_bare_in_val = 0;
31 int raw_tp_writable_bare_early_ret = 0;
32 int raw_tp_writable_bare_out_val = 0;
34 SEC("raw_tp.w/bpf_testmod_test_writable_bare")
35 int BPF_PROG(handle_raw_tp_writable_bare,
36 struct bpf_testmod_test_writable_ctx *writable)
38 raw_tp_writable_bare_in_val = writable->val;
39 writable->early_ret = raw_tp_writable_bare_early_ret;
40 writable->val = raw_tp_writable_bare_out_val;
44 __u32 tp_btf_read_sz = 0;
46 SEC("tp_btf/bpf_testmod_test_read")
47 int BPF_PROG(handle_tp_btf,
48 struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx)
50 tp_btf_read_sz = read_ctx->len;
54 __u32 fentry_read_sz = 0;
56 SEC("fentry/bpf_testmod_test_read")
57 int BPF_PROG(handle_fentry,
58 struct file *file, struct kobject *kobj,
59 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
65 __u32 fentry_manual_read_sz = 0;
68 int BPF_PROG(handle_fentry_manual,
69 struct file *file, struct kobject *kobj,
70 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
72 fentry_manual_read_sz = len;
76 __u32 fentry_explicit_read_sz = 0;
78 SEC("fentry/bpf_testmod:bpf_testmod_test_read")
79 int BPF_PROG(handle_fentry_explicit,
80 struct file *file, struct kobject *kobj,
81 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
83 fentry_explicit_read_sz = len;
88 __u32 fentry_explicit_manual_read_sz = 0;
91 int BPF_PROG(handle_fentry_explicit_manual,
92 struct file *file, struct kobject *kobj,
93 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
95 fentry_explicit_manual_read_sz = len;
99 __u32 fexit_read_sz = 0;
102 SEC("fexit/bpf_testmod_test_read")
103 int BPF_PROG(handle_fexit,
104 struct file *file, struct kobject *kobj,
105 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len,
113 SEC("fexit/bpf_testmod_return_ptr")
114 int BPF_PROG(handle_fexit_ret, int arg, struct file *ret)
118 bpf_probe_read_kernel(&buf, 8, ret);
119 bpf_probe_read_kernel(&buf, 8, (char *)ret + 256);
120 *(volatile long long *)ret;
121 *(volatile int *)&ret->f_mode;
125 __u32 fmod_ret_read_sz = 0;
127 SEC("fmod_ret/bpf_testmod_test_read")
128 int BPF_PROG(handle_fmod_ret,
129 struct file *file, struct kobject *kobj,
130 struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
132 fmod_ret_read_sz = len;
133 return 0; /* don't override the exit code */
136 SEC("kprobe.multi/bpf_testmod_test_read")
137 int BPF_PROG(kprobe_multi)
142 char _license[] SEC("license") = "GPL";