117 lines
2.5 KiB
C
117 lines
2.5 KiB
C
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
* License as published by the Free Software Foundation.
|
|
*/
|
|
#include <linux/kernel.h>
|
|
#include <linux/types.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/err.h>
|
|
#include <linux/bpf.h>
|
|
|
|
/* test stubs for BPF_MAP_TYPE_UNSPEC and for BPF_PROG_TYPE_UNSPEC
|
|
* to be used by user space verifier testsuite
|
|
*/
|
|
struct bpf_context {
|
|
u64 arg1;
|
|
u64 arg2;
|
|
};
|
|
|
|
static u64 test_func(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static struct bpf_func_proto test_funcs[] = {
|
|
[BPF_FUNC_unspec] = {
|
|
.func = test_func,
|
|
.gpl_only = true,
|
|
.ret_type = RET_PTR_TO_MAP_VALUE_OR_NULL,
|
|
.arg1_type = ARG_CONST_MAP_PTR,
|
|
.arg2_type = ARG_PTR_TO_MAP_KEY,
|
|
},
|
|
};
|
|
|
|
static const struct bpf_func_proto *test_func_proto(enum bpf_func_id func_id)
|
|
{
|
|
if (func_id < 0 || func_id >= ARRAY_SIZE(test_funcs))
|
|
return NULL;
|
|
return &test_funcs[func_id];
|
|
}
|
|
|
|
static const struct bpf_context_access {
|
|
int size;
|
|
enum bpf_access_type type;
|
|
} test_ctx_access[] = {
|
|
[offsetof(struct bpf_context, arg1)] = {
|
|
FIELD_SIZEOF(struct bpf_context, arg1),
|
|
BPF_READ
|
|
},
|
|
[offsetof(struct bpf_context, arg2)] = {
|
|
FIELD_SIZEOF(struct bpf_context, arg2),
|
|
BPF_READ
|
|
},
|
|
};
|
|
|
|
static bool test_is_valid_access(int off, int size, enum bpf_access_type type)
|
|
{
|
|
const struct bpf_context_access *access;
|
|
|
|
if (off < 0 || off >= ARRAY_SIZE(test_ctx_access))
|
|
return false;
|
|
|
|
access = &test_ctx_access[off];
|
|
if (access->size == size && (access->type & type))
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
static struct bpf_verifier_ops test_ops = {
|
|
.get_func_proto = test_func_proto,
|
|
.is_valid_access = test_is_valid_access,
|
|
};
|
|
|
|
static struct bpf_prog_type_list tl_prog = {
|
|
.ops = &test_ops,
|
|
.type = BPF_PROG_TYPE_UNSPEC,
|
|
};
|
|
|
|
static struct bpf_map *test_map_alloc(union bpf_attr *attr)
|
|
{
|
|
struct bpf_map *map;
|
|
|
|
map = kzalloc(sizeof(*map), GFP_USER);
|
|
if (!map)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
map->key_size = attr->key_size;
|
|
map->value_size = attr->value_size;
|
|
map->max_entries = attr->max_entries;
|
|
return map;
|
|
}
|
|
|
|
static void test_map_free(struct bpf_map *map)
|
|
{
|
|
kfree(map);
|
|
}
|
|
|
|
static struct bpf_map_ops test_map_ops = {
|
|
.map_alloc = test_map_alloc,
|
|
.map_free = test_map_free,
|
|
};
|
|
|
|
static struct bpf_map_type_list tl_map = {
|
|
.ops = &test_map_ops,
|
|
.type = BPF_MAP_TYPE_UNSPEC,
|
|
};
|
|
|
|
static int __init register_test_ops(void)
|
|
{
|
|
bpf_register_map_type(&tl_map);
|
|
bpf_register_prog_type(&tl_prog);
|
|
return 0;
|
|
}
|
|
late_initcall(register_test_ops);
|