-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
selftests/bpf: verifier/prevent_map_lookup converted to inline assembly
Test verifier/prevent_map_lookup automatically converted to use inline assembly. This was a part of a series [1] but could not be applied becuase another patch from a series had to be witheld. [1] https://lore.kernel.org/bpf/20230421174234.2391278-1-eddyz87@gmail.com/ Signed-off-by: Eduard Zingerman <eddyz87@gmail.com> Link: https://lore.kernel.org/r/20230421204514.2450907-1-eddyz87@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
- Loading branch information
Eduard Zingerman
authored and
Alexei Starovoitov
committed
Apr 22, 2023
1 parent
6d26d98
commit 3515020
Showing
3 changed files
with
63 additions
and
29 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
61 changes: 61 additions & 0 deletions
61
tools/testing/selftests/bpf/progs/verifier_prevent_map_lookup.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,61 @@ | ||
// SPDX-License-Identifier: GPL-2.0 | ||
/* Converted from tools/testing/selftests/bpf/verifier/prevent_map_lookup.c */ | ||
|
||
#include <linux/bpf.h> | ||
#include <bpf/bpf_helpers.h> | ||
#include "bpf_misc.h" | ||
|
||
struct { | ||
__uint(type, BPF_MAP_TYPE_STACK_TRACE); | ||
__uint(max_entries, 1); | ||
__type(key, __u32); | ||
__type(value, __u64); | ||
} map_stacktrace SEC(".maps"); | ||
|
||
struct { | ||
__uint(type, BPF_MAP_TYPE_PROG_ARRAY); | ||
__uint(max_entries, 8); | ||
__uint(key_size, sizeof(int)); | ||
__array(values, void (void)); | ||
} map_prog2_socket SEC(".maps"); | ||
|
||
SEC("perf_event") | ||
__description("prevent map lookup in stack trace") | ||
__failure __msg("cannot pass map_type 7 into func bpf_map_lookup_elem") | ||
__naked void map_lookup_in_stack_trace(void) | ||
{ | ||
asm volatile (" \ | ||
r1 = 0; \ | ||
*(u64*)(r10 - 8) = r1; \ | ||
r2 = r10; \ | ||
r2 += -8; \ | ||
r1 = %[map_stacktrace] ll; \ | ||
call %[bpf_map_lookup_elem]; \ | ||
exit; \ | ||
" : | ||
: __imm(bpf_map_lookup_elem), | ||
__imm_addr(map_stacktrace) | ||
: __clobber_all); | ||
} | ||
|
||
SEC("socket") | ||
__description("prevent map lookup in prog array") | ||
__failure __msg("cannot pass map_type 3 into func bpf_map_lookup_elem") | ||
__failure_unpriv | ||
__naked void map_lookup_in_prog_array(void) | ||
{ | ||
asm volatile (" \ | ||
r1 = 0; \ | ||
*(u64*)(r10 - 8) = r1; \ | ||
r2 = r10; \ | ||
r2 += -8; \ | ||
r1 = %[map_prog2_socket] ll; \ | ||
call %[bpf_map_lookup_elem]; \ | ||
exit; \ | ||
" : | ||
: __imm(bpf_map_lookup_elem), | ||
__imm_addr(map_prog2_socket) | ||
: __clobber_all); | ||
} | ||
|
||
char _license[] SEC("license") = "GPL"; |
This file was deleted.
Oops, something went wrong.