228 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			228 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
/* Copyright (c) 2021 Facebook */
 | 
						|
 | 
						|
#include "vmlinux.h"
 | 
						|
#include <bpf/bpf_helpers.h>
 | 
						|
#include "bpf_misc.h"
 | 
						|
 | 
						|
char _license[] SEC("license") = "GPL";
 | 
						|
 | 
						|
struct callback_ctx {
 | 
						|
	int output;
 | 
						|
};
 | 
						|
 | 
						|
struct {
 | 
						|
	__uint(type, BPF_MAP_TYPE_HASH);
 | 
						|
	__uint(max_entries, 32);
 | 
						|
	__type(key, int);
 | 
						|
	__type(value, int);
 | 
						|
} map1 SEC(".maps");
 | 
						|
 | 
						|
/* These should be set by the user program */
 | 
						|
u32 nested_callback_nr_loops;
 | 
						|
u32 stop_index = -1;
 | 
						|
u32 nr_loops;
 | 
						|
int pid;
 | 
						|
int callback_selector;
 | 
						|
 | 
						|
/* Making these global variables so that the userspace program
 | 
						|
 * can verify the output through the skeleton
 | 
						|
 */
 | 
						|
int nr_loops_returned;
 | 
						|
int g_output;
 | 
						|
int err;
 | 
						|
 | 
						|
static int callback(__u32 index, void *data)
 | 
						|
{
 | 
						|
	struct callback_ctx *ctx = data;
 | 
						|
 | 
						|
	if (index >= stop_index)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	ctx->output += index;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int empty_callback(__u32 index, void *data)
 | 
						|
{
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int nested_callback2(__u32 index, void *data)
 | 
						|
{
 | 
						|
	nr_loops_returned += bpf_loop(nested_callback_nr_loops, callback, data, 0);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int nested_callback1(__u32 index, void *data)
 | 
						|
{
 | 
						|
	bpf_loop(nested_callback_nr_loops, nested_callback2, data, 0);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int test_prog(void *ctx)
 | 
						|
{
 | 
						|
	struct callback_ctx data = {};
 | 
						|
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	nr_loops_returned = bpf_loop(nr_loops, callback, &data, 0);
 | 
						|
 | 
						|
	if (nr_loops_returned < 0)
 | 
						|
		err = nr_loops_returned;
 | 
						|
	else
 | 
						|
		g_output = data.output;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int prog_null_ctx(void *ctx)
 | 
						|
{
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	nr_loops_returned = bpf_loop(nr_loops, empty_callback, NULL, 0);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int prog_invalid_flags(void *ctx)
 | 
						|
{
 | 
						|
	struct callback_ctx data = {};
 | 
						|
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	err = bpf_loop(nr_loops, callback, &data, 1);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int prog_nested_calls(void *ctx)
 | 
						|
{
 | 
						|
	struct callback_ctx data = {};
 | 
						|
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	nr_loops_returned = 0;
 | 
						|
	bpf_loop(nr_loops, nested_callback1, &data, 0);
 | 
						|
 | 
						|
	g_output = data.output;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int callback_set_f0(int i, void *ctx)
 | 
						|
{
 | 
						|
	g_output = 0xF0;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int callback_set_0f(int i, void *ctx)
 | 
						|
{
 | 
						|
	g_output = 0x0F;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * non-constant callback is a corner case for bpf_loop inline logic
 | 
						|
 */
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int prog_non_constant_callback(void *ctx)
 | 
						|
{
 | 
						|
	struct callback_ctx data = {};
 | 
						|
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	int (*callback)(int i, void *ctx);
 | 
						|
 | 
						|
	g_output = 0;
 | 
						|
 | 
						|
	if (callback_selector == 0x0F)
 | 
						|
		callback = callback_set_0f;
 | 
						|
	else
 | 
						|
		callback = callback_set_f0;
 | 
						|
 | 
						|
	bpf_loop(1, callback, NULL, 0);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int stack_check_inner_callback(void *ctx)
 | 
						|
{
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int map1_lookup_elem(int key)
 | 
						|
{
 | 
						|
	int *val = bpf_map_lookup_elem(&map1, &key);
 | 
						|
 | 
						|
	return val ? *val : -1;
 | 
						|
}
 | 
						|
 | 
						|
static void map1_update_elem(int key, int val)
 | 
						|
{
 | 
						|
	bpf_map_update_elem(&map1, &key, &val, BPF_ANY);
 | 
						|
}
 | 
						|
 | 
						|
static int stack_check_outer_callback(void *ctx)
 | 
						|
{
 | 
						|
	int a = map1_lookup_elem(1);
 | 
						|
	int b = map1_lookup_elem(2);
 | 
						|
	int c = map1_lookup_elem(3);
 | 
						|
	int d = map1_lookup_elem(4);
 | 
						|
	int e = map1_lookup_elem(5);
 | 
						|
	int f = map1_lookup_elem(6);
 | 
						|
 | 
						|
	bpf_loop(1, stack_check_inner_callback, NULL, 0);
 | 
						|
 | 
						|
	map1_update_elem(1, a + 1);
 | 
						|
	map1_update_elem(2, b + 1);
 | 
						|
	map1_update_elem(3, c + 1);
 | 
						|
	map1_update_elem(4, d + 1);
 | 
						|
	map1_update_elem(5, e + 1);
 | 
						|
	map1_update_elem(6, f + 1);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/* Some of the local variables in stack_check and
 | 
						|
 * stack_check_outer_callback would be allocated on stack by
 | 
						|
 * compiler. This test should verify that stack content for these
 | 
						|
 * variables is preserved between calls to bpf_loop (might be an issue
 | 
						|
 * if loop inlining allocates stack slots incorrectly).
 | 
						|
 */
 | 
						|
SEC("fentry/" SYS_PREFIX "sys_nanosleep")
 | 
						|
int stack_check(void *ctx)
 | 
						|
{
 | 
						|
	if (bpf_get_current_pid_tgid() >> 32 != pid)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	int a = map1_lookup_elem(7);
 | 
						|
	int b = map1_lookup_elem(8);
 | 
						|
	int c = map1_lookup_elem(9);
 | 
						|
	int d = map1_lookup_elem(10);
 | 
						|
	int e = map1_lookup_elem(11);
 | 
						|
	int f = map1_lookup_elem(12);
 | 
						|
 | 
						|
	bpf_loop(1, stack_check_outer_callback, NULL, 0);
 | 
						|
 | 
						|
	map1_update_elem(7,  a + 1);
 | 
						|
	map1_update_elem(8, b + 1);
 | 
						|
	map1_update_elem(9, c + 1);
 | 
						|
	map1_update_elem(10, d + 1);
 | 
						|
	map1_update_elem(11, e + 1);
 | 
						|
	map1_update_elem(12, f + 1);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 |