File: test_probe_user.c

package info (click to toggle)
linux 6.1.8-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 1,488,076 kB
  • sloc: ansic: 23,401,844; asm: 266,744; sh: 108,976; makefile: 49,705; python: 36,927; perl: 36,810; cpp: 6,044; yacc: 4,904; lex: 2,722; awk: 1,440; ruby: 25; sed: 5
file content (47 lines) | stat: -rw-r--r-- 1,045 bytes parent folder | download | duplicates (15)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
// SPDX-License-Identifier: GPL-2.0
#include "vmlinux.h"
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include <bpf/bpf_core_read.h>
#include "bpf_misc.h"

static struct sockaddr_in old;

static int handle_sys_connect_common(struct sockaddr_in *uservaddr)
{
	struct sockaddr_in new;

	bpf_probe_read_user(&old, sizeof(old), uservaddr);
	__builtin_memset(&new, 0xab, sizeof(new));
	bpf_probe_write_user(uservaddr, &new, sizeof(new));

	return 0;
}

SEC("ksyscall/connect")
int BPF_KSYSCALL(handle_sys_connect, int fd, struct sockaddr_in *uservaddr,
		 int addrlen)
{
	return handle_sys_connect_common(uservaddr);
}

#if defined(bpf_target_s390)
#ifndef SYS_CONNECT
#define SYS_CONNECT 3
#endif

SEC("ksyscall/socketcall")
int BPF_KSYSCALL(handle_sys_socketcall, int call, unsigned long *args)
{
	if (call == SYS_CONNECT) {
		struct sockaddr_in *uservaddr;

		bpf_probe_read_user(&uservaddr, sizeof(uservaddr), &args[1]);
		return handle_sys_connect_common(uservaddr);
	}

	return 0;
}
#endif

char _license[] SEC("license") = "GPL";