| // SPDX-License-Identifier: GPL-2.0 |
| /* Copyright (c) 2020 Facebook */ |
| #include <linux/bpf.h> |
| #include <linux/btf.h> |
| #include <linux/btf_ids.h> |
| #include <linux/delay.h> |
| #include <linux/error-injection.h> |
| #include <linux/init.h> |
| #include <linux/module.h> |
| #include <linux/percpu-defs.h> |
| #include <linux/sysfs.h> |
| #include <linux/tracepoint.h> |
| #include "bpf_testmod.h" |
| #include "bpf_testmod_kfunc.h" |
| |
| #define CREATE_TRACE_POINTS |
| #include "bpf_testmod-events.h" |
| |
| typedef int (*func_proto_typedef)(long); |
| typedef int (*func_proto_typedef_nested1)(func_proto_typedef); |
| typedef int (*func_proto_typedef_nested2)(func_proto_typedef_nested1); |
| |
| DEFINE_PER_CPU(int, bpf_testmod_ksym_percpu) = 123; |
| long bpf_testmod_test_struct_arg_result; |
| |
| struct bpf_testmod_struct_arg_1 { |
| int a; |
| }; |
| struct bpf_testmod_struct_arg_2 { |
| long a; |
| long b; |
| }; |
| |
| struct bpf_testmod_struct_arg_3 { |
| int a; |
| int b[]; |
| }; |
| |
| struct bpf_testmod_struct_arg_4 { |
| u64 a; |
| int b; |
| }; |
| |
| __bpf_hook_start(); |
| |
| noinline int |
| bpf_testmod_test_struct_arg_1(struct bpf_testmod_struct_arg_2 a, int b, int c) { |
| bpf_testmod_test_struct_arg_result = a.a + a.b + b + c; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_2(int a, struct bpf_testmod_struct_arg_2 b, int c) { |
| bpf_testmod_test_struct_arg_result = a + b.a + b.b + c; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_3(int a, int b, struct bpf_testmod_struct_arg_2 c) { |
| bpf_testmod_test_struct_arg_result = a + b + c.a + c.b; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_4(struct bpf_testmod_struct_arg_1 a, int b, |
| int c, int d, struct bpf_testmod_struct_arg_2 e) { |
| bpf_testmod_test_struct_arg_result = a.a + b + c + d + e.a + e.b; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_5(void) { |
| bpf_testmod_test_struct_arg_result = 1; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_6(struct bpf_testmod_struct_arg_3 *a) { |
| bpf_testmod_test_struct_arg_result = a->b[0]; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_7(u64 a, void *b, short c, int d, void *e, |
| struct bpf_testmod_struct_arg_4 f) |
| { |
| bpf_testmod_test_struct_arg_result = a + (long)b + c + d + |
| (long)e + f.a + f.b; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_struct_arg_8(u64 a, void *b, short c, int d, void *e, |
| struct bpf_testmod_struct_arg_4 f, int g) |
| { |
| bpf_testmod_test_struct_arg_result = a + (long)b + c + d + |
| (long)e + f.a + f.b + g; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| noinline int |
| bpf_testmod_test_arg_ptr_to_struct(struct bpf_testmod_struct_arg_1 *a) { |
| bpf_testmod_test_struct_arg_result = a->a; |
| return bpf_testmod_test_struct_arg_result; |
| } |
| |
| __bpf_kfunc void |
| bpf_testmod_test_mod_kfunc(int i) |
| { |
| *(int *)this_cpu_ptr(&bpf_testmod_ksym_percpu) = i; |
| } |
| |
| __bpf_kfunc int bpf_iter_testmod_seq_new(struct bpf_iter_testmod_seq *it, s64 value, int cnt) |
| { |
| if (cnt < 0) { |
| it->cnt = 0; |
| return -EINVAL; |
| } |
| |
| it->value = value; |
| it->cnt = cnt; |
| |
| return 0; |
| } |
| |
| __bpf_kfunc s64 *bpf_iter_testmod_seq_next(struct bpf_iter_testmod_seq* it) |
| { |
| if (it->cnt <= 0) |
| return NULL; |
| |
| it->cnt--; |
| |
| return &it->value; |
| } |
| |
| __bpf_kfunc void bpf_iter_testmod_seq_destroy(struct bpf_iter_testmod_seq *it) |
| { |
| it->cnt = 0; |
| } |
| |
| __bpf_kfunc void bpf_kfunc_common_test(void) |
| { |
| } |
| |
| struct bpf_testmod_btf_type_tag_1 { |
| int a; |
| }; |
| |
| struct bpf_testmod_btf_type_tag_2 { |
| struct bpf_testmod_btf_type_tag_1 __user *p; |
| }; |
| |
| struct bpf_testmod_btf_type_tag_3 { |
| struct bpf_testmod_btf_type_tag_1 __percpu *p; |
| }; |
| |
| noinline int |
| bpf_testmod_test_btf_type_tag_user_1(struct bpf_testmod_btf_type_tag_1 __user *arg) { |
| BTF_TYPE_EMIT(func_proto_typedef); |
| BTF_TYPE_EMIT(func_proto_typedef_nested1); |
| BTF_TYPE_EMIT(func_proto_typedef_nested2); |
| return arg->a; |
| } |
| |
| noinline int |
| bpf_testmod_test_btf_type_tag_user_2(struct bpf_testmod_btf_type_tag_2 *arg) { |
| return arg->p->a; |
| } |
| |
| noinline int |
| bpf_testmod_test_btf_type_tag_percpu_1(struct bpf_testmod_btf_type_tag_1 __percpu *arg) { |
| return arg->a; |
| } |
| |
| noinline int |
| bpf_testmod_test_btf_type_tag_percpu_2(struct bpf_testmod_btf_type_tag_3 *arg) { |
| return arg->p->a; |
| } |
| |
| noinline int bpf_testmod_loop_test(int n) |
| { |
| /* Make sum volatile, so smart compilers, such as clang, will not |
| * optimize the code by removing the loop. |
| */ |
| volatile int sum = 0; |
| int i; |
| |
| /* the primary goal of this test is to test LBR. Create a lot of |
| * branches in the function, so we can catch it easily. |
| */ |
| for (i = 0; i < n; i++) |
| sum += i; |
| return sum; |
| } |
| |
| __weak noinline struct file *bpf_testmod_return_ptr(int arg) |
| { |
| static struct file f = {}; |
| |
| switch (arg) { |
| case 1: return (void *)EINVAL; /* user addr */ |
| case 2: return (void *)0xcafe4a11; /* user addr */ |
| case 3: return (void *)-EINVAL; /* canonical, but invalid */ |
| case 4: return (void *)(1ull << 60); /* non-canonical and invalid */ |
| case 5: return (void *)~(1ull << 30); /* trigger extable */ |
| case 6: return &f; /* valid addr */ |
| case 7: return (void *)((long)&f | 1); /* kernel tricks */ |
| default: return NULL; |
| } |
| } |
| |
| noinline int bpf_testmod_fentry_test1(int a) |
| { |
| return a + 1; |
| } |
| |
| noinline int bpf_testmod_fentry_test2(int a, u64 b) |
| { |
| return a + b; |
| } |
| |
| noinline int bpf_testmod_fentry_test3(char a, int b, u64 c) |
| { |
| return a + b + c; |
| } |
| |
| noinline int bpf_testmod_fentry_test7(u64 a, void *b, short c, int d, |
| void *e, char f, int g) |
| { |
| return a + (long)b + c + d + (long)e + f + g; |
| } |
| |
| noinline int bpf_testmod_fentry_test11(u64 a, void *b, short c, int d, |
| void *e, char f, int g, |
| unsigned int h, long i, __u64 j, |
| unsigned long k) |
| { |
| return a + (long)b + c + d + (long)e + f + g + h + i + j + k; |
| } |
| |
| int bpf_testmod_fentry_ok; |
| |
| noinline ssize_t |
| bpf_testmod_test_read(struct file *file, struct kobject *kobj, |
| struct bin_attribute *bin_attr, |
| char *buf, loff_t off, size_t len) |
| { |
| struct bpf_testmod_test_read_ctx ctx = { |
| .buf = buf, |
| .off = off, |
| .len = len, |
| }; |
| struct bpf_testmod_struct_arg_1 struct_arg1 = {10}, struct_arg1_2 = {-1}; |
| struct bpf_testmod_struct_arg_2 struct_arg2 = {2, 3}; |
| struct bpf_testmod_struct_arg_3 *struct_arg3; |
| struct bpf_testmod_struct_arg_4 struct_arg4 = {21, 22}; |
| int i = 1; |
| |
| while (bpf_testmod_return_ptr(i)) |
| i++; |
| |
| (void)bpf_testmod_test_struct_arg_1(struct_arg2, 1, 4); |
| (void)bpf_testmod_test_struct_arg_2(1, struct_arg2, 4); |
| (void)bpf_testmod_test_struct_arg_3(1, 4, struct_arg2); |
| (void)bpf_testmod_test_struct_arg_4(struct_arg1, 1, 2, 3, struct_arg2); |
| (void)bpf_testmod_test_struct_arg_5(); |
| (void)bpf_testmod_test_struct_arg_7(16, (void *)17, 18, 19, |
| (void *)20, struct_arg4); |
| (void)bpf_testmod_test_struct_arg_8(16, (void *)17, 18, 19, |
| (void *)20, struct_arg4, 23); |
| |
| (void)bpf_testmod_test_arg_ptr_to_struct(&struct_arg1_2); |
| |
| struct_arg3 = kmalloc((sizeof(struct bpf_testmod_struct_arg_3) + |
| sizeof(int)), GFP_KERNEL); |
| if (struct_arg3 != NULL) { |
| struct_arg3->b[0] = 1; |
| (void)bpf_testmod_test_struct_arg_6(struct_arg3); |
| kfree(struct_arg3); |
| } |
| |
| /* This is always true. Use the check to make sure the compiler |
| * doesn't remove bpf_testmod_loop_test. |
| */ |
| if (bpf_testmod_loop_test(101) > 100) |
| trace_bpf_testmod_test_read(current, &ctx); |
| |
| /* Magic number to enable writable tp */ |
| if (len == 64) { |
| struct bpf_testmod_test_writable_ctx writable = { |
| .val = 1024, |
| }; |
| trace_bpf_testmod_test_writable_bare(&writable); |
| if (writable.early_ret) |
| return snprintf(buf, len, "%d\n", writable.val); |
| } |
| |
| if (bpf_testmod_fentry_test1(1) != 2 || |
| bpf_testmod_fentry_test2(2, 3) != 5 || |
| bpf_testmod_fentry_test3(4, 5, 6) != 15 || |
| bpf_testmod_fentry_test7(16, (void *)17, 18, 19, (void *)20, |
| 21, 22) != 133 || |
| bpf_testmod_fentry_test11(16, (void *)17, 18, 19, (void *)20, |
| 21, 22, 23, 24, 25, 26) != 231) |
| goto out; |
| |
| bpf_testmod_fentry_ok = 1; |
| out: |
| return -EIO; /* always fail */ |
| } |
| EXPORT_SYMBOL(bpf_testmod_test_read); |
| ALLOW_ERROR_INJECTION(bpf_testmod_test_read, ERRNO); |
| |
| noinline ssize_t |
| bpf_testmod_test_write(struct file *file, struct kobject *kobj, |
| struct bin_attribute *bin_attr, |
| char *buf, loff_t off, size_t len) |
| { |
| struct bpf_testmod_test_write_ctx ctx = { |
| .buf = buf, |
| .off = off, |
| .len = len, |
| }; |
| |
| trace_bpf_testmod_test_write_bare(current, &ctx); |
| |
| return -EIO; /* always fail */ |
| } |
| EXPORT_SYMBOL(bpf_testmod_test_write); |
| ALLOW_ERROR_INJECTION(bpf_testmod_test_write, ERRNO); |
| |
| noinline int bpf_fentry_shadow_test(int a) |
| { |
| return a + 2; |
| } |
| EXPORT_SYMBOL_GPL(bpf_fentry_shadow_test); |
| |
| __bpf_hook_end(); |
| |
| static struct bin_attribute bin_attr_bpf_testmod_file __ro_after_init = { |
| .attr = { .name = "bpf_testmod", .mode = 0666, }, |
| .read = bpf_testmod_test_read, |
| .write = bpf_testmod_test_write, |
| }; |
| |
| BTF_KFUNCS_START(bpf_testmod_common_kfunc_ids) |
| BTF_ID_FLAGS(func, bpf_iter_testmod_seq_new, KF_ITER_NEW) |
| BTF_ID_FLAGS(func, bpf_iter_testmod_seq_next, KF_ITER_NEXT | KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_iter_testmod_seq_destroy, KF_ITER_DESTROY) |
| BTF_ID_FLAGS(func, bpf_kfunc_common_test) |
| BTF_KFUNCS_END(bpf_testmod_common_kfunc_ids) |
| |
| static const struct btf_kfunc_id_set bpf_testmod_common_kfunc_set = { |
| .owner = THIS_MODULE, |
| .set = &bpf_testmod_common_kfunc_ids, |
| }; |
| |
| __bpf_kfunc u64 bpf_kfunc_call_test1(struct sock *sk, u32 a, u64 b, u32 c, u64 d) |
| { |
| return a + b + c + d; |
| } |
| |
| __bpf_kfunc int bpf_kfunc_call_test2(struct sock *sk, u32 a, u32 b) |
| { |
| return a + b; |
| } |
| |
| __bpf_kfunc struct sock *bpf_kfunc_call_test3(struct sock *sk) |
| { |
| return sk; |
| } |
| |
| __bpf_kfunc long noinline bpf_kfunc_call_test4(signed char a, short b, int c, long d) |
| { |
| /* Provoke the compiler to assume that the caller has sign-extended a, |
| * b and c on platforms where this is required (e.g. s390x). |
| */ |
| return (long)a + (long)b + (long)c + d; |
| } |
| |
| static struct prog_test_ref_kfunc prog_test_struct = { |
| .a = 42, |
| .b = 108, |
| .next = &prog_test_struct, |
| .cnt = REFCOUNT_INIT(1), |
| }; |
| |
| __bpf_kfunc struct prog_test_ref_kfunc * |
| bpf_kfunc_call_test_acquire(unsigned long *scalar_ptr) |
| { |
| refcount_inc(&prog_test_struct.cnt); |
| return &prog_test_struct; |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_offset(struct prog_test_ref_kfunc *p) |
| { |
| WARN_ON_ONCE(1); |
| } |
| |
| __bpf_kfunc struct prog_test_member * |
| bpf_kfunc_call_memb_acquire(void) |
| { |
| WARN_ON_ONCE(1); |
| return NULL; |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_memb1_release(struct prog_test_member1 *p) |
| { |
| WARN_ON_ONCE(1); |
| } |
| |
| static int *__bpf_kfunc_call_test_get_mem(struct prog_test_ref_kfunc *p, const int size) |
| { |
| if (size > 2 * sizeof(int)) |
| return NULL; |
| |
| return (int *)p; |
| } |
| |
| __bpf_kfunc int *bpf_kfunc_call_test_get_rdwr_mem(struct prog_test_ref_kfunc *p, |
| const int rdwr_buf_size) |
| { |
| return __bpf_kfunc_call_test_get_mem(p, rdwr_buf_size); |
| } |
| |
| __bpf_kfunc int *bpf_kfunc_call_test_get_rdonly_mem(struct prog_test_ref_kfunc *p, |
| const int rdonly_buf_size) |
| { |
| return __bpf_kfunc_call_test_get_mem(p, rdonly_buf_size); |
| } |
| |
| /* the next 2 ones can't be really used for testing expect to ensure |
| * that the verifier rejects the call. |
| * Acquire functions must return struct pointers, so these ones are |
| * failing. |
| */ |
| __bpf_kfunc int *bpf_kfunc_call_test_acq_rdonly_mem(struct prog_test_ref_kfunc *p, |
| const int rdonly_buf_size) |
| { |
| return __bpf_kfunc_call_test_get_mem(p, rdonly_buf_size); |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_int_mem_release(int *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_pass_ctx(struct __sk_buff *skb) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_pass1(struct prog_test_pass1 *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_pass2(struct prog_test_pass2 *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_fail1(struct prog_test_fail1 *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_fail2(struct prog_test_fail2 *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_fail3(struct prog_test_fail3 *p) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_mem_len_pass1(void *mem, int mem__sz) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_mem_len_fail1(void *mem, int len) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_mem_len_fail2(u64 *mem, int len) |
| { |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_ref(struct prog_test_ref_kfunc *p) |
| { |
| /* p != NULL, but p->cnt could be 0 */ |
| } |
| |
| __bpf_kfunc void bpf_kfunc_call_test_destructive(void) |
| { |
| } |
| |
| __bpf_kfunc static u32 bpf_kfunc_call_test_static_unused_arg(u32 arg, u32 unused) |
| { |
| return arg; |
| } |
| |
| BTF_KFUNCS_START(bpf_testmod_check_kfunc_ids) |
| BTF_ID_FLAGS(func, bpf_testmod_test_mod_kfunc) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test1) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test2) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test3) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test4) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_mem_len_pass1) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_mem_len_fail1) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_mem_len_fail2) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_acquire, KF_ACQUIRE | KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_memb_acquire, KF_ACQUIRE | KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_memb1_release, KF_RELEASE) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_get_rdwr_mem, KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_get_rdonly_mem, KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_acq_rdonly_mem, KF_ACQUIRE | KF_RET_NULL) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_int_mem_release, KF_RELEASE) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_pass_ctx) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_pass1) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_pass2) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_fail1) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_fail2) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_fail3) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_ref, KF_TRUSTED_ARGS | KF_RCU) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_destructive, KF_DESTRUCTIVE) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_static_unused_arg) |
| BTF_ID_FLAGS(func, bpf_kfunc_call_test_offset) |
| BTF_KFUNCS_END(bpf_testmod_check_kfunc_ids) |
| |
| static int bpf_testmod_ops_init(struct btf *btf) |
| { |
| return 0; |
| } |
| |
| static bool bpf_testmod_ops_is_valid_access(int off, int size, |
| enum bpf_access_type type, |
| const struct bpf_prog *prog, |
| struct bpf_insn_access_aux *info) |
| { |
| return bpf_tracing_btf_ctx_access(off, size, type, prog, info); |
| } |
| |
| static int bpf_testmod_ops_init_member(const struct btf_type *t, |
| const struct btf_member *member, |
| void *kdata, const void *udata) |
| { |
| if (member->offset == offsetof(struct bpf_testmod_ops, data) * 8) { |
| /* For data fields, this function has to copy it and return |
| * 1 to indicate that the data has been handled by the |
| * struct_ops type, or the verifier will reject the map if |
| * the value of the data field is not zero. |
| */ |
| ((struct bpf_testmod_ops *)kdata)->data = ((struct bpf_testmod_ops *)udata)->data; |
| return 1; |
| } |
| return 0; |
| } |
| |
| static const struct btf_kfunc_id_set bpf_testmod_kfunc_set = { |
| .owner = THIS_MODULE, |
| .set = &bpf_testmod_check_kfunc_ids, |
| }; |
| |
| static const struct bpf_verifier_ops bpf_testmod_verifier_ops = { |
| .is_valid_access = bpf_testmod_ops_is_valid_access, |
| }; |
| |
| static int bpf_dummy_reg(void *kdata) |
| { |
| struct bpf_testmod_ops *ops = kdata; |
| |
| if (ops->test_1) |
| ops->test_1(); |
| /* Some test cases (ex. struct_ops_maybe_null) may not have test_2 |
| * initialized, so we need to check for NULL. |
| */ |
| if (ops->test_2) |
| ops->test_2(4, ops->data); |
| |
| return 0; |
| } |
| |
| static void bpf_dummy_unreg(void *kdata) |
| { |
| } |
| |
| static int bpf_testmod_test_1(void) |
| { |
| return 0; |
| } |
| |
| static void bpf_testmod_test_2(int a, int b) |
| { |
| } |
| |
| static int bpf_testmod_ops__test_maybe_null(int dummy, |
| struct task_struct *task__nullable) |
| { |
| return 0; |
| } |
| |
| static struct bpf_testmod_ops __bpf_testmod_ops = { |
| .test_1 = bpf_testmod_test_1, |
| .test_2 = bpf_testmod_test_2, |
| .test_maybe_null = bpf_testmod_ops__test_maybe_null, |
| }; |
| |
| struct bpf_struct_ops bpf_bpf_testmod_ops = { |
| .verifier_ops = &bpf_testmod_verifier_ops, |
| .init = bpf_testmod_ops_init, |
| .init_member = bpf_testmod_ops_init_member, |
| .reg = bpf_dummy_reg, |
| .unreg = bpf_dummy_unreg, |
| .cfi_stubs = &__bpf_testmod_ops, |
| .name = "bpf_testmod_ops", |
| .owner = THIS_MODULE, |
| }; |
| |
| static int bpf_dummy_reg2(void *kdata) |
| { |
| struct bpf_testmod_ops2 *ops = kdata; |
| |
| ops->test_1(); |
| return 0; |
| } |
| |
| static struct bpf_testmod_ops2 __bpf_testmod_ops2 = { |
| .test_1 = bpf_testmod_test_1, |
| }; |
| |
| struct bpf_struct_ops bpf_testmod_ops2 = { |
| .verifier_ops = &bpf_testmod_verifier_ops, |
| .init = bpf_testmod_ops_init, |
| .init_member = bpf_testmod_ops_init_member, |
| .reg = bpf_dummy_reg2, |
| .unreg = bpf_dummy_unreg, |
| .cfi_stubs = &__bpf_testmod_ops2, |
| .name = "bpf_testmod_ops2", |
| .owner = THIS_MODULE, |
| }; |
| |
| extern int bpf_fentry_test1(int a); |
| |
| static int bpf_testmod_init(void) |
| { |
| int ret; |
| |
| ret = register_btf_kfunc_id_set(BPF_PROG_TYPE_UNSPEC, &bpf_testmod_common_kfunc_set); |
| ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SCHED_CLS, &bpf_testmod_kfunc_set); |
| ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &bpf_testmod_kfunc_set); |
| ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_testmod_kfunc_set); |
| ret = ret ?: register_bpf_struct_ops(&bpf_bpf_testmod_ops, bpf_testmod_ops); |
| ret = ret ?: register_bpf_struct_ops(&bpf_testmod_ops2, bpf_testmod_ops2); |
| if (ret < 0) |
| return ret; |
| if (bpf_fentry_test1(0) < 0) |
| return -EINVAL; |
| return sysfs_create_bin_file(kernel_kobj, &bin_attr_bpf_testmod_file); |
| } |
| |
| static void bpf_testmod_exit(void) |
| { |
| /* Need to wait for all references to be dropped because |
| * bpf_kfunc_call_test_release() which currently resides in kernel can |
| * be called after bpf_testmod is unloaded. Once release function is |
| * moved into the module this wait can be removed. |
| */ |
| while (refcount_read(&prog_test_struct.cnt) > 1) |
| msleep(20); |
| |
| sysfs_remove_bin_file(kernel_kobj, &bin_attr_bpf_testmod_file); |
| } |
| |
| module_init(bpf_testmod_init); |
| module_exit(bpf_testmod_exit); |
| |
| MODULE_AUTHOR("Andrii Nakryiko"); |
| MODULE_DESCRIPTION("BPF selftests module"); |
| MODULE_LICENSE("Dual BSD/GPL"); |