mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-16 00:34:20 +08:00
7cf245a37e
Fix all files in samples/bpf to include libbpf header files with the bpf/
prefix, to be consistent with external users of the library. Also ensure
that all includes of exported libbpf header files (those that are exported
on 'make install' of the library) use bracketed includes instead of quoted.
To make sure no new files are introduced that doesn't include the bpf/
prefix in its include, remove tools/lib/bpf from the include path entirely,
and use tools/lib instead.
Fixes: 6910d7d386
("selftests/bpf: Ensure bpf_helper_defs.h are taken from selftests dir")
Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Link: https://lore.kernel.org/bpf/157952560911.1683545.8795966751309534150.stgit@toke.dk
74 lines
1.4 KiB
C
74 lines
1.4 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/* Copyright (c) 2017 Facebook
|
|
*/
|
|
#include <uapi/linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
|
|
struct syscalls_enter_open_args {
|
|
unsigned long long unused;
|
|
long syscall_nr;
|
|
long filename_ptr;
|
|
long flags;
|
|
long mode;
|
|
};
|
|
|
|
struct syscalls_exit_open_args {
|
|
unsigned long long unused;
|
|
long syscall_nr;
|
|
long ret;
|
|
};
|
|
|
|
struct bpf_map_def SEC("maps") enter_open_map = {
|
|
.type = BPF_MAP_TYPE_ARRAY,
|
|
.key_size = sizeof(u32),
|
|
.value_size = sizeof(u32),
|
|
.max_entries = 1,
|
|
};
|
|
|
|
struct bpf_map_def SEC("maps") exit_open_map = {
|
|
.type = BPF_MAP_TYPE_ARRAY,
|
|
.key_size = sizeof(u32),
|
|
.value_size = sizeof(u32),
|
|
.max_entries = 1,
|
|
};
|
|
|
|
static __always_inline void count(void *map)
|
|
{
|
|
u32 key = 0;
|
|
u32 *value, init_val = 1;
|
|
|
|
value = bpf_map_lookup_elem(map, &key);
|
|
if (value)
|
|
*value += 1;
|
|
else
|
|
bpf_map_update_elem(map, &key, &init_val, BPF_NOEXIST);
|
|
}
|
|
|
|
SEC("tracepoint/syscalls/sys_enter_open")
|
|
int trace_enter_open(struct syscalls_enter_open_args *ctx)
|
|
{
|
|
count(&enter_open_map);
|
|
return 0;
|
|
}
|
|
|
|
SEC("tracepoint/syscalls/sys_enter_openat")
|
|
int trace_enter_open_at(struct syscalls_enter_open_args *ctx)
|
|
{
|
|
count(&enter_open_map);
|
|
return 0;
|
|
}
|
|
|
|
SEC("tracepoint/syscalls/sys_exit_open")
|
|
int trace_enter_exit(struct syscalls_exit_open_args *ctx)
|
|
{
|
|
count(&exit_open_map);
|
|
return 0;
|
|
}
|
|
|
|
SEC("tracepoint/syscalls/sys_exit_openat")
|
|
int trace_enter_exit_at(struct syscalls_exit_open_args *ctx)
|
|
{
|
|
count(&exit_open_map);
|
|
return 0;
|
|
}
|