mirror of
https://github.com/DragonOS-Community/DragonOS.git
synced 2025-06-08 18:26:48 +00:00
* feat(kprobe): Add basic kprobe support for x86_64 * feat: add ebpf support (#912) - 实现bpf()一部分命令,包括几种基本map,相关的helper函数 - 实现部分perf相关的数据结构 - 暂时为文件实现简单mmap - 实现一个使用kprobe统计syscall 调用次数的ebpf程序 对eBPF支持程度(基本): - 简单的eBPF程序(没有指定特殊的Map) - 使用内核已经实现的Map的eBPF程序 - 可以和kprobe配合使用 - 内核Map相关的接口定义已经实现,添加新的Map较为简单 不支持的功能: - 区分不同的eBPF程序类型(Network/Cgroup)并限定可调用的helper函数集 - 与内核其它跟踪机制配合(tracepoint) - 其它helper和Map todo - [ ] 修改mmap,需要讨论,因为这个和块缓存层相关 - [x] 添加文档 - [x] 修复可能的错误 - [x] 增加rbpf版本信息 * feat: add /sys/devices/system/cpu/possible file * feat: add /sys/devices/system/cpu/online
178 lines
5.3 KiB
Rust
178 lines
5.3 KiB
Rust
// SPDX-License-Identifier: (Apache-2.0 OR MIT)
|
|
// Converted from the tests for uBPF <https://github.com/iovisor/ubpf>
|
|
// Copyright 2015 Big Switch Networks, Inc
|
|
// Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
|
|
|
|
// The tests contained in this file are extracted from the unit tests of uBPF software. Each test
|
|
// in this file has a name in the form `test_verifier_<name>`, and corresponds to the
|
|
// (human-readable) code in `ubpf/tree/master/tests/<name>`, available at
|
|
// <https://github.com/iovisor/ubpf/tree/master/tests> (hyphen had to be replaced with underscores
|
|
// as Rust will not accept them in function names). It is strongly advised to refer to the uBPF
|
|
// version to understand what these program do.
|
|
//
|
|
// Each program was assembled from the uBPF version with the assembler provided by uBPF itself, and
|
|
// available at <https://github.com/iovisor/ubpf/tree/master/ubpf>.
|
|
// The very few modifications that have been realized should be indicated.
|
|
|
|
// These are unit tests for the eBPF “verifier”.
|
|
|
|
extern crate rbpf;
|
|
|
|
use rbpf::{assembler::assemble, ebpf};
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: unsupported argument for LE/BE (insn #0)")]
|
|
fn test_verifier_err_endian_size() {
|
|
let prog = &[
|
|
0xdc, 0x01, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: incomplete LD_DW instruction (insn #0)")]
|
|
fn test_verifier_err_incomplete_lddw() {
|
|
// Note: ubpf has test-err-incomplete-lddw2, which is the same
|
|
let prog = &[
|
|
0x18, 0x00, 0x00, 0x00, 0x88, 0x77, 0x66, 0x55, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: infinite loop")]
|
|
fn test_verifier_err_infinite_loop() {
|
|
let prog = assemble(
|
|
"
|
|
ja -1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: invalid destination register (insn #0)")]
|
|
fn test_verifier_err_invalid_reg_dst() {
|
|
let prog = assemble(
|
|
"
|
|
mov r11, 1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: invalid source register (insn #0)")]
|
|
fn test_verifier_err_invalid_reg_src() {
|
|
let prog = assemble(
|
|
"
|
|
mov r0, r11
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: jump to middle of LD_DW at #2 (insn #0)")]
|
|
fn test_verifier_err_jmp_lddw() {
|
|
let prog = assemble(
|
|
"
|
|
ja +1
|
|
lddw r0, 0x1122334455667788
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: jump out of code to #3 (insn #0)")]
|
|
fn test_verifier_err_jmp_out() {
|
|
let prog = assemble(
|
|
"
|
|
ja +2
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: program does not end with “EXIT” instruction")]
|
|
fn test_verifier_err_no_exit() {
|
|
let prog = assemble(
|
|
"
|
|
mov32 r0, 0",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn test_verifier_err_no_exit_backward_jump() {
|
|
let prog = assemble(
|
|
"
|
|
ja +1
|
|
exit
|
|
ja -2",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: eBPF program length limited to 1000000, here 1000001")]
|
|
fn test_verifier_err_too_many_instructions() {
|
|
// uBPF uses 65637 instructions, because it sets its limit at 65636.
|
|
// We use the classic 4096 limit from kernel, so no need to produce as many instructions.
|
|
let mut prog = (0..(1_000_000 * ebpf::INSN_SIZE))
|
|
.map(|x| match x % 8 {
|
|
0 => 0xb7,
|
|
1 => 0x01,
|
|
_ => 0,
|
|
})
|
|
.collect::<Vec<u8>>();
|
|
prog.append(&mut vec![0x95, 0, 0, 0, 0, 0, 0, 0]);
|
|
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: unknown eBPF opcode 0x6 (insn #0)")]
|
|
fn test_verifier_err_unknown_opcode() {
|
|
let prog = &[
|
|
0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: cannot write into register r10 (insn #0)")]
|
|
fn test_verifier_err_write_r10() {
|
|
let prog = assemble(
|
|
"
|
|
mov r10, 1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|