mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	This modification doesn't change behaviour of the syscall_tp But such code is often used as a reference so it should be correct anyway Signed-off-by: Denys Zagorui <dzagorui@cisco.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/bpf/20231019113521.4103825-1-dzagorui@cisco.com
		
			
				
	
	
		
			102 lines
		
	
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			102 lines
		
	
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0-only
 | 
						|
/* Copyright (c) 2017 Facebook
 | 
						|
 */
 | 
						|
#include <uapi/linux/bpf.h>
 | 
						|
#include <bpf/bpf_helpers.h>
 | 
						|
 | 
						|
#if !defined(__aarch64__)
 | 
						|
struct syscalls_enter_open_args {
 | 
						|
	unsigned long long unused;
 | 
						|
	long syscall_nr;
 | 
						|
	long filename_ptr;
 | 
						|
	long flags;
 | 
						|
	long mode;
 | 
						|
};
 | 
						|
#endif
 | 
						|
 | 
						|
struct syscalls_exit_open_args {
 | 
						|
	unsigned long long unused;
 | 
						|
	long syscall_nr;
 | 
						|
	long ret;
 | 
						|
};
 | 
						|
 | 
						|
struct syscalls_enter_open_at_args {
 | 
						|
	unsigned long long unused;
 | 
						|
	long syscall_nr;
 | 
						|
	long long dfd;
 | 
						|
	long filename_ptr;
 | 
						|
	long flags;
 | 
						|
	long mode;
 | 
						|
};
 | 
						|
 | 
						|
struct {
 | 
						|
	__uint(type, BPF_MAP_TYPE_ARRAY);
 | 
						|
	__type(key, u32);
 | 
						|
	__type(value, u32);
 | 
						|
	__uint(max_entries, 1);
 | 
						|
} enter_open_map SEC(".maps");
 | 
						|
 | 
						|
struct {
 | 
						|
	__uint(type, BPF_MAP_TYPE_ARRAY);
 | 
						|
	__type(key, u32);
 | 
						|
	__type(value, u32);
 | 
						|
	__uint(max_entries, 1);
 | 
						|
} exit_open_map SEC(".maps");
 | 
						|
 | 
						|
static __always_inline void count(void *map)
 | 
						|
{
 | 
						|
	u32 key = 0;
 | 
						|
	u32 *value, init_val = 1;
 | 
						|
 | 
						|
	value = bpf_map_lookup_elem(map, &key);
 | 
						|
	if (value)
 | 
						|
		*value += 1;
 | 
						|
	else
 | 
						|
		bpf_map_update_elem(map, &key, &init_val, BPF_NOEXIST);
 | 
						|
}
 | 
						|
 | 
						|
#if !defined(__aarch64__)
 | 
						|
SEC("tracepoint/syscalls/sys_enter_open")
 | 
						|
int trace_enter_open(struct syscalls_enter_open_args *ctx)
 | 
						|
{
 | 
						|
	count(&enter_open_map);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
SEC("tracepoint/syscalls/sys_enter_openat")
 | 
						|
int trace_enter_open_at(struct syscalls_enter_open_at_args *ctx)
 | 
						|
{
 | 
						|
	count(&enter_open_map);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("tracepoint/syscalls/sys_enter_openat2")
 | 
						|
int trace_enter_open_at2(struct syscalls_enter_open_at_args *ctx)
 | 
						|
{
 | 
						|
	count(&enter_open_map);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
#if !defined(__aarch64__)
 | 
						|
SEC("tracepoint/syscalls/sys_exit_open")
 | 
						|
int trace_enter_exit(struct syscalls_exit_open_args *ctx)
 | 
						|
{
 | 
						|
	count(&exit_open_map);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
SEC("tracepoint/syscalls/sys_exit_openat")
 | 
						|
int trace_enter_exit_at(struct syscalls_exit_open_args *ctx)
 | 
						|
{
 | 
						|
	count(&exit_open_map);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("tracepoint/syscalls/sys_exit_openat2")
 | 
						|
int trace_enter_exit_at2(struct syscalls_exit_open_args *ctx)
 | 
						|
{
 | 
						|
	count(&exit_open_map);
 | 
						|
	return 0;
 | 
						|
}
 |