1df36e621SAndrii Nakryiko // SPDX-License-Identifier: GPL-2.0
2df36e621SAndrii Nakryiko // Copyright (c) 2019 Facebook
3df36e621SAndrii Nakryiko 
4df36e621SAndrii Nakryiko #include <linux/bpf.h>
5df36e621SAndrii Nakryiko #include <stdint.h>
6124a892dSAndrii Nakryiko #include <stdbool.h>
73e689141SToke Høiland-Jørgensen #include <bpf/bpf_helpers.h>
83e689141SToke Høiland-Jørgensen #include <bpf/bpf_core_read.h>
9df36e621SAndrii Nakryiko 
10df36e621SAndrii Nakryiko char _license[] SEC("license") = "GPL";
11df36e621SAndrii Nakryiko 
12393cdfbeSAndrii Nakryiko struct {
13df36e621SAndrii Nakryiko 	char in[256];
14df36e621SAndrii Nakryiko 	char out[256];
15124a892dSAndrii Nakryiko 	bool skip;
166147a140SAndrii Nakryiko 	uint64_t my_pid_tgid;
17393cdfbeSAndrii Nakryiko } data = {};
18df36e621SAndrii Nakryiko 
19ee2eb063SAndrii Nakryiko struct core_reloc_kernel_output {
20ee2eb063SAndrii Nakryiko 	int valid[10];
21d25c5e23SAndrii Nakryiko 	/* we have test_progs[-flavor], so cut flavor part */
22d25c5e23SAndrii Nakryiko 	char comm[sizeof("test_progs")];
23ee2eb063SAndrii Nakryiko 	int comm_len;
24*950b3477SDaniel Müller 	bool local_task_struct_matches;
25ee2eb063SAndrii Nakryiko };
26ee2eb063SAndrii Nakryiko 
27df36e621SAndrii Nakryiko struct task_struct {
28df36e621SAndrii Nakryiko 	int pid;
29df36e621SAndrii Nakryiko 	int tgid;
30ee2eb063SAndrii Nakryiko 	char comm[16];
31ee2eb063SAndrii Nakryiko 	struct task_struct *group_leader;
32df36e621SAndrii Nakryiko };
33df36e621SAndrii Nakryiko 
34*950b3477SDaniel Müller struct mm_struct___wrong {
35*950b3477SDaniel Müller     int abc_whatever_should_not_exist;
36*950b3477SDaniel Müller };
37*950b3477SDaniel Müller 
38*950b3477SDaniel Müller struct task_struct___local {
39*950b3477SDaniel Müller     int pid;
40*950b3477SDaniel Müller     struct mm_struct___wrong *mm;
41*950b3477SDaniel Müller };
42*950b3477SDaniel Müller 
43694731e8SAndrii Nakryiko #define CORE_READ(dst, src) bpf_core_read(dst, sizeof(*(dst)), src)
44694731e8SAndrii Nakryiko 
45df36e621SAndrii Nakryiko SEC("raw_tracepoint/sys_enter")
test_core_kernel(void * ctx)46df36e621SAndrii Nakryiko int test_core_kernel(void *ctx)
47df36e621SAndrii Nakryiko {
48*950b3477SDaniel Müller 	/* Support for the BPF_TYPE_MATCHES argument to the
49*950b3477SDaniel Müller 	 * __builtin_preserve_type_info builtin was added at some point during
50*950b3477SDaniel Müller 	 * development of clang 15 and it's what we require for this test.
51*950b3477SDaniel Müller 	 */
52*950b3477SDaniel Müller #if __has_builtin(__builtin_preserve_type_info) && __clang_major__ >= 15
53df36e621SAndrii Nakryiko 	struct task_struct *task = (void *)bpf_get_current_task();
54ee2eb063SAndrii Nakryiko 	struct core_reloc_kernel_output *out = (void *)&data.out;
55df36e621SAndrii Nakryiko 	uint64_t pid_tgid = bpf_get_current_pid_tgid();
56ee2eb063SAndrii Nakryiko 	uint32_t real_tgid = (uint32_t)pid_tgid;
57df36e621SAndrii Nakryiko 	int pid, tgid;
58df36e621SAndrii Nakryiko 
596147a140SAndrii Nakryiko 	if (data.my_pid_tgid != pid_tgid)
606147a140SAndrii Nakryiko 		return 0;
616147a140SAndrii Nakryiko 
62694731e8SAndrii Nakryiko 	if (CORE_READ(&pid, &task->pid) ||
63694731e8SAndrii Nakryiko 	    CORE_READ(&tgid, &task->tgid))
64df36e621SAndrii Nakryiko 		return 1;
65df36e621SAndrii Nakryiko 
66df36e621SAndrii Nakryiko 	/* validate pid + tgid matches */
67ee2eb063SAndrii Nakryiko 	out->valid[0] = (((uint64_t)pid << 32) | tgid) == pid_tgid;
68ee2eb063SAndrii Nakryiko 
69ee2eb063SAndrii Nakryiko 	/* test variadic BPF_CORE_READ macros */
70ee2eb063SAndrii Nakryiko 	out->valid[1] = BPF_CORE_READ(task,
71ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
72ee2eb063SAndrii Nakryiko 	out->valid[2] = BPF_CORE_READ(task,
73ee2eb063SAndrii Nakryiko 				      group_leader,
74ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
75ee2eb063SAndrii Nakryiko 	out->valid[3] = BPF_CORE_READ(task,
76ee2eb063SAndrii Nakryiko 				      group_leader, group_leader,
77ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
78ee2eb063SAndrii Nakryiko 	out->valid[4] = BPF_CORE_READ(task,
79ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
80ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
81ee2eb063SAndrii Nakryiko 	out->valid[5] = BPF_CORE_READ(task,
82ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
83ee2eb063SAndrii Nakryiko 				      group_leader,
84ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
85ee2eb063SAndrii Nakryiko 	out->valid[6] = BPF_CORE_READ(task,
86ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
87ee2eb063SAndrii Nakryiko 				      group_leader, group_leader,
88ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
89ee2eb063SAndrii Nakryiko 	out->valid[7] = BPF_CORE_READ(task,
90ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
91ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
92ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
93ee2eb063SAndrii Nakryiko 	out->valid[8] = BPF_CORE_READ(task,
94ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
95ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
96ee2eb063SAndrii Nakryiko 				      group_leader,
97ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
98ee2eb063SAndrii Nakryiko 	out->valid[9] = BPF_CORE_READ(task,
99ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
100ee2eb063SAndrii Nakryiko 				      group_leader, group_leader, group_leader,
101ee2eb063SAndrii Nakryiko 				      group_leader, group_leader,
102ee2eb063SAndrii Nakryiko 				      tgid) == real_tgid;
103ee2eb063SAndrii Nakryiko 
104ee2eb063SAndrii Nakryiko 	/* test BPF_CORE_READ_STR_INTO() returns correct code and contents */
105ee2eb063SAndrii Nakryiko 	out->comm_len = BPF_CORE_READ_STR_INTO(
106ee2eb063SAndrii Nakryiko 		&out->comm, task,
107ee2eb063SAndrii Nakryiko 		group_leader, group_leader, group_leader, group_leader,
108ee2eb063SAndrii Nakryiko 		group_leader, group_leader, group_leader, group_leader,
109ee2eb063SAndrii Nakryiko 		comm);
110df36e621SAndrii Nakryiko 
111*950b3477SDaniel Müller 	out->local_task_struct_matches = bpf_core_type_matches(struct task_struct___local);
112*950b3477SDaniel Müller #else
113*950b3477SDaniel Müller 	data.skip = true;
114*950b3477SDaniel Müller #endif
115df36e621SAndrii Nakryiko 	return 0;
116df36e621SAndrii Nakryiko }
117df36e621SAndrii Nakryiko 
118