162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/* Copyright (c) 2021 Facebook */
362306a36Sopenharmony_ci
462306a36Sopenharmony_ci#include "vmlinux.h"
562306a36Sopenharmony_ci#include <bpf/bpf_helpers.h>
662306a36Sopenharmony_ci#include "bpf_misc.h"
762306a36Sopenharmony_ci
862306a36Sopenharmony_cichar _license[] SEC("license") = "GPL";
962306a36Sopenharmony_ci
1062306a36Sopenharmony_cistruct callback_ctx {
1162306a36Sopenharmony_ci	int output;
1262306a36Sopenharmony_ci};
1362306a36Sopenharmony_ci
1462306a36Sopenharmony_cistruct {
1562306a36Sopenharmony_ci	__uint(type, BPF_MAP_TYPE_HASH);
1662306a36Sopenharmony_ci	__uint(max_entries, 32);
1762306a36Sopenharmony_ci	__type(key, int);
1862306a36Sopenharmony_ci	__type(value, int);
1962306a36Sopenharmony_ci} map1 SEC(".maps");
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_ci/* These should be set by the user program */
2262306a36Sopenharmony_ciu32 nested_callback_nr_loops;
2362306a36Sopenharmony_ciu32 stop_index = -1;
2462306a36Sopenharmony_ciu32 nr_loops;
2562306a36Sopenharmony_ciint pid;
2662306a36Sopenharmony_ciint callback_selector;
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_ci/* Making these global variables so that the userspace program
2962306a36Sopenharmony_ci * can verify the output through the skeleton
3062306a36Sopenharmony_ci */
3162306a36Sopenharmony_ciint nr_loops_returned;
3262306a36Sopenharmony_ciint g_output;
3362306a36Sopenharmony_ciint err;
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_cistatic int callback(__u32 index, void *data)
3662306a36Sopenharmony_ci{
3762306a36Sopenharmony_ci	struct callback_ctx *ctx = data;
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_ci	if (index >= stop_index)
4062306a36Sopenharmony_ci		return 1;
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci	ctx->output += index;
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci	return 0;
4562306a36Sopenharmony_ci}
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_cistatic int empty_callback(__u32 index, void *data)
4862306a36Sopenharmony_ci{
4962306a36Sopenharmony_ci	return 0;
5062306a36Sopenharmony_ci}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_cistatic int nested_callback2(__u32 index, void *data)
5362306a36Sopenharmony_ci{
5462306a36Sopenharmony_ci	nr_loops_returned += bpf_loop(nested_callback_nr_loops, callback, data, 0);
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ci	return 0;
5762306a36Sopenharmony_ci}
5862306a36Sopenharmony_ci
5962306a36Sopenharmony_cistatic int nested_callback1(__u32 index, void *data)
6062306a36Sopenharmony_ci{
6162306a36Sopenharmony_ci	bpf_loop(nested_callback_nr_loops, nested_callback2, data, 0);
6262306a36Sopenharmony_ci	return 0;
6362306a36Sopenharmony_ci}
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
6662306a36Sopenharmony_ciint test_prog(void *ctx)
6762306a36Sopenharmony_ci{
6862306a36Sopenharmony_ci	struct callback_ctx data = {};
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
7162306a36Sopenharmony_ci		return 0;
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci	nr_loops_returned = bpf_loop(nr_loops, callback, &data, 0);
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	if (nr_loops_returned < 0)
7662306a36Sopenharmony_ci		err = nr_loops_returned;
7762306a36Sopenharmony_ci	else
7862306a36Sopenharmony_ci		g_output = data.output;
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	return 0;
8162306a36Sopenharmony_ci}
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
8462306a36Sopenharmony_ciint prog_null_ctx(void *ctx)
8562306a36Sopenharmony_ci{
8662306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
8762306a36Sopenharmony_ci		return 0;
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	nr_loops_returned = bpf_loop(nr_loops, empty_callback, NULL, 0);
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	return 0;
9262306a36Sopenharmony_ci}
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
9562306a36Sopenharmony_ciint prog_invalid_flags(void *ctx)
9662306a36Sopenharmony_ci{
9762306a36Sopenharmony_ci	struct callback_ctx data = {};
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
10062306a36Sopenharmony_ci		return 0;
10162306a36Sopenharmony_ci
10262306a36Sopenharmony_ci	err = bpf_loop(nr_loops, callback, &data, 1);
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	return 0;
10562306a36Sopenharmony_ci}
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
10862306a36Sopenharmony_ciint prog_nested_calls(void *ctx)
10962306a36Sopenharmony_ci{
11062306a36Sopenharmony_ci	struct callback_ctx data = {};
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
11362306a36Sopenharmony_ci		return 0;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci	nr_loops_returned = 0;
11662306a36Sopenharmony_ci	bpf_loop(nr_loops, nested_callback1, &data, 0);
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	g_output = data.output;
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_ci	return 0;
12162306a36Sopenharmony_ci}
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_cistatic int callback_set_f0(int i, void *ctx)
12462306a36Sopenharmony_ci{
12562306a36Sopenharmony_ci	g_output = 0xF0;
12662306a36Sopenharmony_ci	return 0;
12762306a36Sopenharmony_ci}
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_cistatic int callback_set_0f(int i, void *ctx)
13062306a36Sopenharmony_ci{
13162306a36Sopenharmony_ci	g_output = 0x0F;
13262306a36Sopenharmony_ci	return 0;
13362306a36Sopenharmony_ci}
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci/*
13662306a36Sopenharmony_ci * non-constant callback is a corner case for bpf_loop inline logic
13762306a36Sopenharmony_ci */
13862306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
13962306a36Sopenharmony_ciint prog_non_constant_callback(void *ctx)
14062306a36Sopenharmony_ci{
14162306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
14262306a36Sopenharmony_ci		return 0;
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	int (*callback)(int i, void *ctx);
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	g_output = 0;
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_ci	if (callback_selector == 0x0F)
14962306a36Sopenharmony_ci		callback = callback_set_0f;
15062306a36Sopenharmony_ci	else
15162306a36Sopenharmony_ci		callback = callback_set_f0;
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci	bpf_loop(1, callback, NULL, 0);
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	return 0;
15662306a36Sopenharmony_ci}
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_cistatic int stack_check_inner_callback(void *ctx)
15962306a36Sopenharmony_ci{
16062306a36Sopenharmony_ci	return 0;
16162306a36Sopenharmony_ci}
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_cistatic int map1_lookup_elem(int key)
16462306a36Sopenharmony_ci{
16562306a36Sopenharmony_ci	int *val = bpf_map_lookup_elem(&map1, &key);
16662306a36Sopenharmony_ci
16762306a36Sopenharmony_ci	return val ? *val : -1;
16862306a36Sopenharmony_ci}
16962306a36Sopenharmony_ci
17062306a36Sopenharmony_cistatic void map1_update_elem(int key, int val)
17162306a36Sopenharmony_ci{
17262306a36Sopenharmony_ci	bpf_map_update_elem(&map1, &key, &val, BPF_ANY);
17362306a36Sopenharmony_ci}
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_cistatic int stack_check_outer_callback(void *ctx)
17662306a36Sopenharmony_ci{
17762306a36Sopenharmony_ci	int a = map1_lookup_elem(1);
17862306a36Sopenharmony_ci	int b = map1_lookup_elem(2);
17962306a36Sopenharmony_ci	int c = map1_lookup_elem(3);
18062306a36Sopenharmony_ci	int d = map1_lookup_elem(4);
18162306a36Sopenharmony_ci	int e = map1_lookup_elem(5);
18262306a36Sopenharmony_ci	int f = map1_lookup_elem(6);
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	bpf_loop(1, stack_check_inner_callback, NULL, 0);
18562306a36Sopenharmony_ci
18662306a36Sopenharmony_ci	map1_update_elem(1, a + 1);
18762306a36Sopenharmony_ci	map1_update_elem(2, b + 1);
18862306a36Sopenharmony_ci	map1_update_elem(3, c + 1);
18962306a36Sopenharmony_ci	map1_update_elem(4, d + 1);
19062306a36Sopenharmony_ci	map1_update_elem(5, e + 1);
19162306a36Sopenharmony_ci	map1_update_elem(6, f + 1);
19262306a36Sopenharmony_ci
19362306a36Sopenharmony_ci	return 0;
19462306a36Sopenharmony_ci}
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci/* Some of the local variables in stack_check and
19762306a36Sopenharmony_ci * stack_check_outer_callback would be allocated on stack by
19862306a36Sopenharmony_ci * compiler. This test should verify that stack content for these
19962306a36Sopenharmony_ci * variables is preserved between calls to bpf_loop (might be an issue
20062306a36Sopenharmony_ci * if loop inlining allocates stack slots incorrectly).
20162306a36Sopenharmony_ci */
20262306a36Sopenharmony_ciSEC("fentry/" SYS_PREFIX "sys_nanosleep")
20362306a36Sopenharmony_ciint stack_check(void *ctx)
20462306a36Sopenharmony_ci{
20562306a36Sopenharmony_ci	if (bpf_get_current_pid_tgid() >> 32 != pid)
20662306a36Sopenharmony_ci		return 0;
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_ci	int a = map1_lookup_elem(7);
20962306a36Sopenharmony_ci	int b = map1_lookup_elem(8);
21062306a36Sopenharmony_ci	int c = map1_lookup_elem(9);
21162306a36Sopenharmony_ci	int d = map1_lookup_elem(10);
21262306a36Sopenharmony_ci	int e = map1_lookup_elem(11);
21362306a36Sopenharmony_ci	int f = map1_lookup_elem(12);
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci	bpf_loop(1, stack_check_outer_callback, NULL, 0);
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_ci	map1_update_elem(7,  a + 1);
21862306a36Sopenharmony_ci	map1_update_elem(8, b + 1);
21962306a36Sopenharmony_ci	map1_update_elem(9, c + 1);
22062306a36Sopenharmony_ci	map1_update_elem(10, d + 1);
22162306a36Sopenharmony_ci	map1_update_elem(11, e + 1);
22262306a36Sopenharmony_ci	map1_update_elem(12, f + 1);
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci	return 0;
22562306a36Sopenharmony_ci}
226