blob: 92e0118e712affefa17833484c06f519a43bf503 [file] [log] [blame]
/* SPDX-License-Identifier: GPL-2.0 */
/* Copyright (c) 2021 Hengqi Chen */
#include <vmlinux.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_core_read.h>
#include <bpf/bpf_tracing.h>
#include "gethostlatency.h"
#define MAX_ENTRIES 10240
const volatile pid_t target_pid = 0;
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, MAX_ENTRIES);
__type(key, __u32);
__type(value, struct event);
} starts SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY);
__uint(key_size, sizeof(__u32));
__uint(value_size, sizeof(__u32));
} events SEC(".maps");
static int probe_entry(struct pt_regs *ctx)
{
if (!PT_REGS_PARM1(ctx))
return 0;
__u64 pid_tgid = bpf_get_current_pid_tgid();
__u32 pid = pid_tgid >> 32;
__u32 tid = (__u32)pid_tgid;
struct event event = {};
if (target_pid && target_pid != pid)
return 0;
event.time = bpf_ktime_get_ns();
event.pid = pid;
bpf_get_current_comm(&event.comm, sizeof(event.comm));
bpf_probe_read_user(&event.host, sizeof(event.host), (void *)PT_REGS_PARM1(ctx));
bpf_map_update_elem(&starts, &tid, &event, BPF_ANY);
return 0;
}
static int probe_return(struct pt_regs *ctx)
{
__u32 tid = (__u32)bpf_get_current_pid_tgid();
struct event *eventp;
eventp = bpf_map_lookup_elem(&starts, &tid);
if (!eventp)
return 0;
/* update time from timestamp to delta */
eventp->time = bpf_ktime_get_ns() - eventp->time;
bpf_perf_event_output(ctx, &events, BPF_F_CURRENT_CPU, eventp, sizeof(*eventp));
bpf_map_delete_elem(&starts, &tid);
return 0;
}
SEC("kprobe/handle_entry")
int BPF_KPROBE(handle_entry)
{
return probe_entry(ctx);
}
SEC("kretprobe/handle_return")
int BPF_KRETPROBE(handle_return)
{
return probe_return(ctx);
}
char LICENSE[] SEC("license") = "GPL";