Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /* Copyright (c) 2013-2015 PLUMgrid, http://plumgrid.com
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  * This program is free software; you can redistribute it and/or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  * modify it under the terms of version 2 of the GNU General Public
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5)  * License as published by the Free Software Foundation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7) #include <linux/skbuff.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8) #include <linux/netdevice.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9) #include <linux/version.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10) #include <uapi/linux/bpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11) #include <bpf/bpf_helpers.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12) #include <bpf/bpf_tracing.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13) #include "trace_common.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15) struct {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) 	__uint(type, BPF_MAP_TYPE_HASH);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) 	__type(key, long);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) 	__type(value, long);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) 	__uint(max_entries, 1024);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) } my_map SEC(".maps");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) /* kprobe is NOT a stable ABI. If kernel internals change this bpf+kprobe
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23)  * example will no longer be meaningful
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25) SEC("kprobe/kfree_skb")
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26) int bpf_prog2(struct pt_regs *ctx)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) 	long loc = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) 	long init_val = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 	long *value;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	/* read ip of kfree_skb caller.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) 	 * non-portable version of __builtin_return_address(0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) 	BPF_KPROBE_READ_RET_IP(loc, ctx);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 	value = bpf_map_lookup_elem(&my_map, &loc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) 	if (value)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) 		*value += 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) 		bpf_map_update_elem(&my_map, &loc, &init_val, BPF_ANY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) static unsigned int log2(unsigned int v)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 	unsigned int r;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 	unsigned int shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 	r = (v > 0xFFFF) << 4; v >>= r;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 	shift = (v > 0xFF) << 3; v >>= shift; r |= shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 	shift = (v > 0xF) << 2; v >>= shift; r |= shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) 	shift = (v > 0x3) << 1; v >>= shift; r |= shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 	r |= (v >> 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) 	return r;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) static unsigned int log2l(unsigned long v)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) 	unsigned int hi = v >> 32;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) 	if (hi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) 		return log2(hi) + 32;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 		return log2(v);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) struct hist_key {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 	char comm[16];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 	u64 pid_tgid;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 	u64 uid_gid;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 	u64 index;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) struct {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 	__uint(type, BPF_MAP_TYPE_PERCPU_HASH);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) 	__uint(key_size, sizeof(struct hist_key));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 	__uint(value_size, sizeof(long));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) 	__uint(max_entries, 1024);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) } my_hist_map SEC(".maps");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) SEC("kprobe/" SYSCALL(sys_write))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) int bpf_prog3(struct pt_regs *ctx)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) 	long write_size = PT_REGS_PARM3(ctx);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 	long init_val = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) 	long *value;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 	struct hist_key key;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) 	key.index = log2l(write_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) 	key.pid_tgid = bpf_get_current_pid_tgid();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) 	key.uid_gid = bpf_get_current_uid_gid();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 	bpf_get_current_comm(&key.comm, sizeof(key.comm));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) 	value = bpf_map_lookup_elem(&my_hist_map, &key);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) 	if (value)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) 		__sync_fetch_and_add(value, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 		bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) char _license[] SEC("license") = "GPL";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) u32 _version SEC("version") = LINUX_VERSION_CODE;