1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71
|
// SPDX-License-Identifier: GPL-2.0
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include <stdbool.h>
#include "bpf_kfuncs.h"
#include "bpf_misc.h"
char _license[] SEC("license") = "GPL";
__u64 uprobe_multi_func_1_addr = 0;
__u64 uprobe_multi_func_2_addr = 0;
__u64 uprobe_multi_func_3_addr = 0;
__u64 uprobe_session_result[3] = {};
__u64 uprobe_multi_sleep_result = 0;
void *user_ptr = 0;
int pid = 0;
static int uprobe_multi_check(void *ctx, bool is_return)
{
const __u64 funcs[] = {
uprobe_multi_func_1_addr,
uprobe_multi_func_2_addr,
uprobe_multi_func_3_addr,
};
unsigned int i;
__u64 addr;
if (bpf_get_current_pid_tgid() >> 32 != pid)
return 1;
addr = bpf_get_func_ip(ctx);
for (i = 0; i < ARRAY_SIZE(funcs); i++) {
if (funcs[i] == addr) {
uprobe_session_result[i]++;
break;
}
}
/* only uprobe_multi_func_2 executes return probe */
if ((addr == uprobe_multi_func_1_addr) ||
(addr == uprobe_multi_func_3_addr))
return 1;
return 0;
}
SEC("uprobe.session//proc/self/exe:uprobe_multi_func_*")
int uprobe(struct pt_regs *ctx)
{
return uprobe_multi_check(ctx, bpf_session_is_return());
}
static __always_inline bool verify_sleepable_user_copy(void)
{
char data[9];
bpf_copy_from_user(data, sizeof(data), user_ptr);
return bpf_strncmp(data, sizeof(data), "test_data") == 0;
}
SEC("uprobe.session.s//proc/self/exe:uprobe_multi_func_*")
int uprobe_sleepable(struct pt_regs *ctx)
{
if (verify_sleepable_user_copy())
uprobe_multi_sleep_result++;
return uprobe_multi_check(ctx, bpf_session_is_return());
}
|