mirror of
https://github.com/varun-r-mallya/Python-BPF.git
synced 2025-12-31 21:06:25 +00:00
add another c example
This commit is contained in:
39
examples/c-form/ex3-2.bpf.c
Normal file
39
examples/c-form/ex3-2.bpf.c
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
#include <linux/bpf.h>
|
||||||
|
#include <bpf/bpf_helpers.h>
|
||||||
|
|
||||||
|
#define u64 unsigned long long
|
||||||
|
|
||||||
|
// Define the map
|
||||||
|
struct {
|
||||||
|
__uint(type, BPF_MAP_TYPE_HASH);
|
||||||
|
__type(key, u64);
|
||||||
|
__type(value, u64);
|
||||||
|
__uint(max_entries, 1);
|
||||||
|
} last SEC(".maps");
|
||||||
|
|
||||||
|
// Handler for syscall entry
|
||||||
|
SEC("tracepoint/syscalls/sys_enter_execve")
|
||||||
|
int hello(void *ctx) {
|
||||||
|
bpf_printk("entered");
|
||||||
|
bpf_printk("multi constant support");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handler for syscall exit
|
||||||
|
SEC("tracepoint/syscalls/sys_exit_execve")
|
||||||
|
long hello_again(void *ctx) {
|
||||||
|
bpf_printk("exited");
|
||||||
|
|
||||||
|
// Create a key for map lookup
|
||||||
|
u64 key = 0;
|
||||||
|
|
||||||
|
// Simple lookup without conditionals
|
||||||
|
u64 *tsp = bpf_map_lookup_elem(&last, &key);
|
||||||
|
|
||||||
|
// Get current timestamp
|
||||||
|
u64 ts = bpf_ktime_get_ns();
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
char LICENSE[] SEC("license") = "GPL";
|
||||||
Reference in New Issue
Block a user