|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | /* Copyright (c) 2020 Facebook */ | 
|  |  | 
|  | #include "vmlinux.h" | 
|  | #include <bpf/bpf_helpers.h> | 
|  | #include <bpf/bpf_tracing.h> | 
|  | #include <bpf/bpf_core_read.h> | 
|  | #include "../bpf_testmod/bpf_testmod.h" | 
|  |  | 
|  | __u32 raw_tp_read_sz = 0; | 
|  |  | 
|  | SEC("raw_tp/bpf_testmod_test_read") | 
|  | int BPF_PROG(handle_raw_tp, | 
|  | struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx) | 
|  | { | 
|  | raw_tp_read_sz = BPF_CORE_READ(read_ctx, len); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 raw_tp_bare_write_sz = 0; | 
|  |  | 
|  | SEC("raw_tp/bpf_testmod_test_write_bare") | 
|  | int BPF_PROG(handle_raw_tp_bare, | 
|  | struct task_struct *task, struct bpf_testmod_test_write_ctx *write_ctx) | 
|  | { | 
|  | raw_tp_bare_write_sz = BPF_CORE_READ(write_ctx, len); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int raw_tp_writable_bare_in_val = 0; | 
|  | int raw_tp_writable_bare_early_ret = 0; | 
|  | int raw_tp_writable_bare_out_val = 0; | 
|  |  | 
|  | SEC("raw_tp.w/bpf_testmod_test_writable_bare") | 
|  | int BPF_PROG(handle_raw_tp_writable_bare, | 
|  | struct bpf_testmod_test_writable_ctx *writable) | 
|  | { | 
|  | raw_tp_writable_bare_in_val = writable->val; | 
|  | writable->early_ret = raw_tp_writable_bare_early_ret; | 
|  | writable->val = raw_tp_writable_bare_out_val; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 tp_btf_read_sz = 0; | 
|  |  | 
|  | SEC("tp_btf/bpf_testmod_test_read") | 
|  | int BPF_PROG(handle_tp_btf, | 
|  | struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx) | 
|  | { | 
|  | tp_btf_read_sz = read_ctx->len; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 fentry_read_sz = 0; | 
|  |  | 
|  | SEC("fentry/bpf_testmod_test_read") | 
|  | int BPF_PROG(handle_fentry, | 
|  | struct file *file, struct kobject *kobj, | 
|  | struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len) | 
|  | { | 
|  | fentry_read_sz = len; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 fentry_manual_read_sz = 0; | 
|  |  | 
|  | SEC("fentry") | 
|  | int BPF_PROG(handle_fentry_manual, | 
|  | struct file *file, struct kobject *kobj, | 
|  | struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len) | 
|  | { | 
|  | fentry_manual_read_sz = len; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 fexit_read_sz = 0; | 
|  | int fexit_ret = 0; | 
|  |  | 
|  | SEC("fexit/bpf_testmod_test_read") | 
|  | int BPF_PROG(handle_fexit, | 
|  | struct file *file, struct kobject *kobj, | 
|  | struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len, | 
|  | int ret) | 
|  | { | 
|  | fexit_read_sz = len; | 
|  | fexit_ret = ret; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("fexit/bpf_testmod_return_ptr") | 
|  | int BPF_PROG(handle_fexit_ret, int arg, struct file *ret) | 
|  | { | 
|  | long buf = 0; | 
|  |  | 
|  | bpf_probe_read_kernel(&buf, 8, ret); | 
|  | bpf_probe_read_kernel(&buf, 8, (char *)ret + 256); | 
|  | *(volatile long long *)ret; | 
|  | *(volatile int *)&ret->f_mode; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __u32 fmod_ret_read_sz = 0; | 
|  |  | 
|  | SEC("fmod_ret/bpf_testmod_test_read") | 
|  | int BPF_PROG(handle_fmod_ret, | 
|  | struct file *file, struct kobject *kobj, | 
|  | struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len) | 
|  | { | 
|  | fmod_ret_read_sz = len; | 
|  | return 0; /* don't override the exit code */ | 
|  | } | 
|  |  | 
|  | SEC("kprobe.multi/bpf_testmod_test_read") | 
|  | int BPF_PROG(kprobe_multi) | 
|  | { | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | char _license[] SEC("license") = "GPL"; |