summaryrefslogtreecommitdiff
path: root/kernel/bpf/test_stub.c
blob: fcaddff4003e27561c63f67d934360cfb2adeeb6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 */
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/err.h>
#include <linux/bpf.h>

/* test stubs for BPF_MAP_TYPE_UNSPEC and for BPF_PROG_TYPE_UNSPEC
 * to be used by user space verifier testsuite
 */
struct bpf_context {
	u64 arg1;
	u64 arg2;
};

static u64 test_func(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5)
{
	return 0;
}

static struct bpf_func_proto test_funcs[] = {
	[BPF_FUNC_unspec] = {
		.func = test_func,
		.gpl_only = true,
		.ret_type = RET_PTR_TO_MAP_VALUE_OR_NULL,
		.arg1_type = ARG_CONST_MAP_PTR,
		.arg2_type = ARG_PTR_TO_MAP_KEY,
	},
};

static const struct bpf_func_proto *test_func_proto(enum bpf_func_id func_id)
{
	if (func_id < 0 || func_id >= ARRAY_SIZE(test_funcs))
		return NULL;
	return &test_funcs[func_id];
}

static const struct bpf_context_access {
	int size;
	enum bpf_access_type type;
} test_ctx_access[] = {
	[offsetof(struct bpf_context, arg1)] = {
		FIELD_SIZEOF(struct bpf_context, arg1),
		BPF_READ
	},
	[offsetof(struct bpf_context, arg2)] = {
		FIELD_SIZEOF(struct bpf_context, arg2),
		BPF_READ
	},
};

static bool test_is_valid_access(int off, int size, enum bpf_access_type type)
{
	const struct bpf_context_access *access;

	if (off < 0 || off >= ARRAY_SIZE(test_ctx_access))
		return false;

	access = &test_ctx_access[off];
	if (access->size == size && (access->type & type))
		return true;

	return false;
}

static struct bpf_verifier_ops test_ops = {
	.get_func_proto = test_func_proto,
	.is_valid_access = test_is_valid_access,
};

static struct bpf_prog_type_list tl_prog = {
	.ops = &test_ops,
	.type = BPF_PROG_TYPE_UNSPEC,
};

static struct bpf_map *test_map_alloc(union bpf_attr *attr)
{
	struct bpf_map *map;

	map = kzalloc(sizeof(*map), GFP_USER);
	if (!map)
		return ERR_PTR(-ENOMEM);

	map->key_size = attr->key_size;
	map->value_size = attr->value_size;
	map->max_entries = attr->max_entries;
	return map;
}

static void test_map_free(struct bpf_map *map)
{
	kfree(map);
}

static struct bpf_map_ops test_map_ops = {
	.map_alloc = test_map_alloc,
	.map_free = test_map_free,
};

static struct bpf_map_type_list tl_map = {
	.ops = &test_map_ops,
	.type = BPF_MAP_TYPE_UNSPEC,
};

static int __init register_test_ops(void)
{
	bpf_register_map_type(&tl_map);
	bpf_register_prog_type(&tl_prog);
	return 0;
}
late_initcall(register_test_ops);