^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) #include <linux/ptrace.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) #include <linux/version.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) #include <uapi/linux/bpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) #include <bpf/bpf_helpers.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) #include "trace_common.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) struct {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) __uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) __uint(key_size, sizeof(int));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) __uint(value_size, sizeof(u32));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) __uint(max_entries, 2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) } my_map SEC(".maps");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) SEC("kprobe/" SYSCALL(sys_write))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) int bpf_prog1(struct pt_regs *ctx)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) struct S {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) u64 pid;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) u64 cookie;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) } data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) data.pid = bpf_get_current_pid_tgid();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) data.cookie = 0x12345678;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) bpf_perf_event_output(ctx, &my_map, 0, &data, sizeof(data));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) char _license[] SEC("license") = "GPL";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) u32 _version SEC("version") = LINUX_VERSION_CODE;