Kernel  |  3.18

下载     查看原文件
C++程序  |  117行  |  2.53 KB
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 */
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/err.h>
#include <linux/bpf.h>

/* test stubs for BPF_MAP_TYPE_UNSPEC and for BPF_PROG_TYPE_UNSPEC
 * to be used by user space verifier testsuite
 */
struct bpf_context {
	u64 arg1;
	u64 arg2;
};

static u64 test_func(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5)
{
	return 0;
}

static struct bpf_func_proto test_funcs[] = {
	[BPF_FUNC_unspec] = {
		.func = test_func,
		.gpl_only = true,
		.ret_type = RET_PTR_TO_MAP_VALUE_OR_NULL,
		.arg1_type = ARG_CONST_MAP_PTR,
		.arg2_type = ARG_PTR_TO_MAP_KEY,
	},
};

static const struct bpf_func_proto *test_func_proto(enum bpf_func_id func_id)
{
	if (func_id < 0 || func_id >= ARRAY_SIZE(test_funcs))
		return NULL;
	return &test_funcs[func_id];
}

static const struct bpf_context_access {
	int size;
	enum bpf_access_type type;
} test_ctx_access[] = {
	[offsetof(struct bpf_context, arg1)] = {
		FIELD_SIZEOF(struct bpf_context, arg1),
		BPF_READ
	},
	[offsetof(struct bpf_context, arg2)] = {
		FIELD_SIZEOF(struct bpf_context, arg2),
		BPF_READ
	},
};

static bool test_is_valid_access(int off, int size, enum bpf_access_type type)
{
	const struct bpf_context_access *access;

	if (off < 0 || off >= ARRAY_SIZE(test_ctx_access))
		return false;

	access = &test_ctx_access[off];
	if (access->size == size && (access->type & type))
		return true;

	return false;
}

static struct bpf_verifier_ops test_ops = {
	.get_func_proto = test_func_proto,
	.is_valid_access = test_is_valid_access,
};

static struct bpf_prog_type_list tl_prog = {
	.ops = &test_ops,
	.type = BPF_PROG_TYPE_UNSPEC,
};

static struct bpf_map *test_map_alloc(union bpf_attr *attr)
{
	struct bpf_map *map;

	map = kzalloc(sizeof(*map), GFP_USER);
	if (!map)
		return ERR_PTR(-ENOMEM);

	map->key_size = attr->key_size;
	map->value_size = attr->value_size;
	map->max_entries = attr->max_entries;
	return map;
}

static void test_map_free(struct bpf_map *map)
{
	kfree(map);
}

static struct bpf_map_ops test_map_ops = {
	.map_alloc = test_map_alloc,
	.map_free = test_map_free,
};

static struct bpf_map_type_list tl_map = {
	.ops = &test_map_ops,
	.type = BPF_MAP_TYPE_UNSPEC,
};

static int __init register_test_ops(void)
{
	bpf_register_map_type(&tl_map);
	bpf_register_prog_type(&tl_prog);
	return 0;
}
late_initcall(register_test_ops);