162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* Copyright (c) 2021 Facebook */ 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include "vmlinux.h" 562306a36Sopenharmony_ci#include <bpf/bpf_helpers.h> 662306a36Sopenharmony_ci#include "bpf_misc.h" 762306a36Sopenharmony_ci 862306a36Sopenharmony_cichar _license[] SEC("license") = "GPL"; 962306a36Sopenharmony_ci 1062306a36Sopenharmony_cistruct callback_ctx { 1162306a36Sopenharmony_ci int output; 1262306a36Sopenharmony_ci}; 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_cistruct { 1562306a36Sopenharmony_ci __uint(type, BPF_MAP_TYPE_HASH); 1662306a36Sopenharmony_ci __uint(max_entries, 32); 1762306a36Sopenharmony_ci __type(key, int); 1862306a36Sopenharmony_ci __type(value, int); 1962306a36Sopenharmony_ci} map1 SEC(".maps"); 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci/* These should be set by the user program */ 2262306a36Sopenharmony_ciu32 nested_callback_nr_loops; 2362306a36Sopenharmony_ciu32 stop_index = -1; 2462306a36Sopenharmony_ciu32 nr_loops; 2562306a36Sopenharmony_ciint pid; 2662306a36Sopenharmony_ciint callback_selector; 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_ci/* Making these global variables so that the userspace program 2962306a36Sopenharmony_ci * can verify the output through the skeleton 3062306a36Sopenharmony_ci */ 3162306a36Sopenharmony_ciint nr_loops_returned; 3262306a36Sopenharmony_ciint g_output; 3362306a36Sopenharmony_ciint err; 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_cistatic int callback(__u32 index, void *data) 3662306a36Sopenharmony_ci{ 3762306a36Sopenharmony_ci struct callback_ctx *ctx = data; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci if (index >= stop_index) 4062306a36Sopenharmony_ci return 1; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ci ctx->output += index; 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci return 0; 4562306a36Sopenharmony_ci} 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_cistatic int empty_callback(__u32 index, void *data) 4862306a36Sopenharmony_ci{ 4962306a36Sopenharmony_ci return 0; 5062306a36Sopenharmony_ci} 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_cistatic int nested_callback2(__u32 index, void *data) 5362306a36Sopenharmony_ci{ 5462306a36Sopenharmony_ci nr_loops_returned += bpf_loop(nested_callback_nr_loops, callback, data, 0); 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci return 0; 5762306a36Sopenharmony_ci} 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_cistatic int nested_callback1(__u32 index, void *data) 6062306a36Sopenharmony_ci{ 6162306a36Sopenharmony_ci bpf_loop(nested_callback_nr_loops, nested_callback2, data, 0); 6262306a36Sopenharmony_ci return 0; 6362306a36Sopenharmony_ci} 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 6662306a36Sopenharmony_ciint test_prog(void *ctx) 6762306a36Sopenharmony_ci{ 6862306a36Sopenharmony_ci struct callback_ctx data = {}; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 7162306a36Sopenharmony_ci return 0; 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci nr_loops_returned = bpf_loop(nr_loops, callback, &data, 0); 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci if (nr_loops_returned < 0) 7662306a36Sopenharmony_ci err = nr_loops_returned; 7762306a36Sopenharmony_ci else 7862306a36Sopenharmony_ci g_output = data.output; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci return 0; 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 8462306a36Sopenharmony_ciint prog_null_ctx(void *ctx) 8562306a36Sopenharmony_ci{ 8662306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 8762306a36Sopenharmony_ci return 0; 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci nr_loops_returned = bpf_loop(nr_loops, empty_callback, NULL, 0); 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci return 0; 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 9562306a36Sopenharmony_ciint prog_invalid_flags(void *ctx) 9662306a36Sopenharmony_ci{ 9762306a36Sopenharmony_ci struct callback_ctx data = {}; 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 10062306a36Sopenharmony_ci return 0; 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_ci err = bpf_loop(nr_loops, callback, &data, 1); 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci return 0; 10562306a36Sopenharmony_ci} 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 10862306a36Sopenharmony_ciint prog_nested_calls(void *ctx) 10962306a36Sopenharmony_ci{ 11062306a36Sopenharmony_ci struct callback_ctx data = {}; 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 11362306a36Sopenharmony_ci return 0; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci nr_loops_returned = 0; 11662306a36Sopenharmony_ci bpf_loop(nr_loops, nested_callback1, &data, 0); 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci g_output = data.output; 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci return 0; 12162306a36Sopenharmony_ci} 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_cistatic int callback_set_f0(int i, void *ctx) 12462306a36Sopenharmony_ci{ 12562306a36Sopenharmony_ci g_output = 0xF0; 12662306a36Sopenharmony_ci return 0; 12762306a36Sopenharmony_ci} 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_cistatic int callback_set_0f(int i, void *ctx) 13062306a36Sopenharmony_ci{ 13162306a36Sopenharmony_ci g_output = 0x0F; 13262306a36Sopenharmony_ci return 0; 13362306a36Sopenharmony_ci} 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci/* 13662306a36Sopenharmony_ci * non-constant callback is a corner case for bpf_loop inline logic 13762306a36Sopenharmony_ci */ 13862306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 13962306a36Sopenharmony_ciint prog_non_constant_callback(void *ctx) 14062306a36Sopenharmony_ci{ 14162306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 14262306a36Sopenharmony_ci return 0; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci int (*callback)(int i, void *ctx); 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci g_output = 0; 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci if (callback_selector == 0x0F) 14962306a36Sopenharmony_ci callback = callback_set_0f; 15062306a36Sopenharmony_ci else 15162306a36Sopenharmony_ci callback = callback_set_f0; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci bpf_loop(1, callback, NULL, 0); 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci return 0; 15662306a36Sopenharmony_ci} 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_cistatic int stack_check_inner_callback(void *ctx) 15962306a36Sopenharmony_ci{ 16062306a36Sopenharmony_ci return 0; 16162306a36Sopenharmony_ci} 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_cistatic int map1_lookup_elem(int key) 16462306a36Sopenharmony_ci{ 16562306a36Sopenharmony_ci int *val = bpf_map_lookup_elem(&map1, &key); 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci return val ? *val : -1; 16862306a36Sopenharmony_ci} 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_cistatic void map1_update_elem(int key, int val) 17162306a36Sopenharmony_ci{ 17262306a36Sopenharmony_ci bpf_map_update_elem(&map1, &key, &val, BPF_ANY); 17362306a36Sopenharmony_ci} 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_cistatic int stack_check_outer_callback(void *ctx) 17662306a36Sopenharmony_ci{ 17762306a36Sopenharmony_ci int a = map1_lookup_elem(1); 17862306a36Sopenharmony_ci int b = map1_lookup_elem(2); 17962306a36Sopenharmony_ci int c = map1_lookup_elem(3); 18062306a36Sopenharmony_ci int d = map1_lookup_elem(4); 18162306a36Sopenharmony_ci int e = map1_lookup_elem(5); 18262306a36Sopenharmony_ci int f = map1_lookup_elem(6); 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci bpf_loop(1, stack_check_inner_callback, NULL, 0); 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_ci map1_update_elem(1, a + 1); 18762306a36Sopenharmony_ci map1_update_elem(2, b + 1); 18862306a36Sopenharmony_ci map1_update_elem(3, c + 1); 18962306a36Sopenharmony_ci map1_update_elem(4, d + 1); 19062306a36Sopenharmony_ci map1_update_elem(5, e + 1); 19162306a36Sopenharmony_ci map1_update_elem(6, f + 1); 19262306a36Sopenharmony_ci 19362306a36Sopenharmony_ci return 0; 19462306a36Sopenharmony_ci} 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci/* Some of the local variables in stack_check and 19762306a36Sopenharmony_ci * stack_check_outer_callback would be allocated on stack by 19862306a36Sopenharmony_ci * compiler. This test should verify that stack content for these 19962306a36Sopenharmony_ci * variables is preserved between calls to bpf_loop (might be an issue 20062306a36Sopenharmony_ci * if loop inlining allocates stack slots incorrectly). 20162306a36Sopenharmony_ci */ 20262306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep") 20362306a36Sopenharmony_ciint stack_check(void *ctx) 20462306a36Sopenharmony_ci{ 20562306a36Sopenharmony_ci if (bpf_get_current_pid_tgid() >> 32 != pid) 20662306a36Sopenharmony_ci return 0; 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_ci int a = map1_lookup_elem(7); 20962306a36Sopenharmony_ci int b = map1_lookup_elem(8); 21062306a36Sopenharmony_ci int c = map1_lookup_elem(9); 21162306a36Sopenharmony_ci int d = map1_lookup_elem(10); 21262306a36Sopenharmony_ci int e = map1_lookup_elem(11); 21362306a36Sopenharmony_ci int f = map1_lookup_elem(12); 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci bpf_loop(1, stack_check_outer_callback, NULL, 0); 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci map1_update_elem(7, a + 1); 21862306a36Sopenharmony_ci map1_update_elem(8, b + 1); 21962306a36Sopenharmony_ci map1_update_elem(9, c + 1); 22062306a36Sopenharmony_ci map1_update_elem(10, d + 1); 22162306a36Sopenharmony_ci map1_update_elem(11, e + 1); 22262306a36Sopenharmony_ci map1_update_elem(12, f + 1); 22362306a36Sopenharmony_ci 22462306a36Sopenharmony_ci return 0; 22562306a36Sopenharmony_ci} 226