Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at master 171 lines 4.0 kB view raw
1// SPDX-License-Identifier: GPL-2.0 2 3#include "vmlinux.h" 4#include "bpf_experimental.h" 5#include <bpf/bpf_helpers.h> 6#include "bpf_misc.h" 7#include "../test_kmods/bpf_testmod_kfunc.h" 8 9char _license[] SEC("license") = "GPL"; 10 11SEC("raw_tp/sys_enter") 12__success 13int iter_next_trusted(const void *ctx) 14{ 15 struct task_struct *cur_task = bpf_get_current_task_btf(); 16 struct bpf_iter_task_vma vma_it; 17 struct vm_area_struct *vma_ptr; 18 19 bpf_iter_task_vma_new(&vma_it, cur_task, 0); 20 21 vma_ptr = bpf_iter_task_vma_next(&vma_it); 22 if (vma_ptr == NULL) 23 goto out; 24 25 bpf_kfunc_trusted_vma_test(vma_ptr); 26out: 27 bpf_iter_task_vma_destroy(&vma_it); 28 return 0; 29} 30 31SEC("raw_tp/sys_enter") 32__failure __msg("Possibly NULL pointer passed to trusted arg0") 33int iter_next_trusted_or_null(const void *ctx) 34{ 35 struct task_struct *cur_task = bpf_get_current_task_btf(); 36 struct bpf_iter_task_vma vma_it; 37 struct vm_area_struct *vma_ptr; 38 39 bpf_iter_task_vma_new(&vma_it, cur_task, 0); 40 41 vma_ptr = bpf_iter_task_vma_next(&vma_it); 42 43 bpf_kfunc_trusted_vma_test(vma_ptr); 44 45 bpf_iter_task_vma_destroy(&vma_it); 46 return 0; 47} 48 49SEC("raw_tp/sys_enter") 50__success 51int iter_next_rcu(const void *ctx) 52{ 53 struct task_struct *cur_task = bpf_get_current_task_btf(); 54 struct bpf_iter_task task_it; 55 struct task_struct *task_ptr; 56 57 bpf_iter_task_new(&task_it, cur_task, 0); 58 59 task_ptr = bpf_iter_task_next(&task_it); 60 if (task_ptr == NULL) 61 goto out; 62 63 bpf_kfunc_rcu_task_test(task_ptr); 64out: 65 bpf_iter_task_destroy(&task_it); 66 return 0; 67} 68 69SEC("raw_tp/sys_enter") 70__failure __msg("Possibly NULL pointer passed to trusted arg0") 71int iter_next_rcu_or_null(const void *ctx) 72{ 73 struct task_struct *cur_task = bpf_get_current_task_btf(); 74 struct bpf_iter_task task_it; 75 struct task_struct *task_ptr; 76 77 bpf_iter_task_new(&task_it, cur_task, 0); 78 79 task_ptr = bpf_iter_task_next(&task_it); 80 81 bpf_kfunc_rcu_task_test(task_ptr); 82 83 bpf_iter_task_destroy(&task_it); 84 return 0; 85} 86 87SEC("raw_tp/sys_enter") 88__failure __msg("R1 must be referenced or trusted") 89int iter_next_rcu_not_trusted(const void *ctx) 90{ 91 struct task_struct *cur_task = bpf_get_current_task_btf(); 92 struct bpf_iter_task task_it; 93 struct task_struct *task_ptr; 94 95 bpf_iter_task_new(&task_it, cur_task, 0); 96 97 task_ptr = bpf_iter_task_next(&task_it); 98 if (task_ptr == NULL) 99 goto out; 100 101 bpf_kfunc_trusted_task_test(task_ptr); 102out: 103 bpf_iter_task_destroy(&task_it); 104 return 0; 105} 106 107SEC("raw_tp/sys_enter") 108__failure __msg("R1 cannot write into rdonly_mem") 109/* Message should not be 'R1 cannot write into rdonly_trusted_mem' */ 110int iter_next_ptr_mem_not_trusted(const void *ctx) 111{ 112 struct bpf_iter_num num_it; 113 int *num_ptr; 114 115 bpf_iter_num_new(&num_it, 0, 10); 116 117 num_ptr = bpf_iter_num_next(&num_it); 118 if (num_ptr == NULL) 119 goto out; 120 121 bpf_kfunc_trusted_num_test(num_ptr); 122out: 123 bpf_iter_num_destroy(&num_it); 124 return 0; 125} 126 127SEC("?fentry.s/" SYS_PREFIX "sys_getpgid") 128__failure __msg("kernel func bpf_kfunc_ret_rcu_test requires RCU critical section protection") 129int iter_ret_rcu_test_protected(const void *ctx) 130{ 131 struct task_struct *p; 132 133 p = bpf_kfunc_ret_rcu_test(); 134 return p->pid; 135} 136 137SEC("?fentry.s/" SYS_PREFIX "sys_getpgid") 138__failure __msg("R1 type=rcu_ptr_or_null_ expected=") 139int iter_ret_rcu_test_type(const void *ctx) 140{ 141 struct task_struct *p; 142 143 bpf_rcu_read_lock(); 144 p = bpf_kfunc_ret_rcu_test(); 145 bpf_this_cpu_ptr(p); 146 bpf_rcu_read_unlock(); 147 return 0; 148} 149 150SEC("?fentry.s/" SYS_PREFIX "sys_getpgid") 151__failure __msg("kernel func bpf_kfunc_ret_rcu_test_nostruct requires RCU critical section protection") 152int iter_ret_rcu_test_protected_nostruct(const void *ctx) 153{ 154 void *p; 155 156 p = bpf_kfunc_ret_rcu_test_nostruct(4); 157 return *(int *)p; 158} 159 160SEC("?fentry.s/" SYS_PREFIX "sys_getpgid") 161__failure __msg("R1 type=rdonly_rcu_mem_or_null expected=") 162int iter_ret_rcu_test_type_nostruct(const void *ctx) 163{ 164 void *p; 165 166 bpf_rcu_read_lock(); 167 p = bpf_kfunc_ret_rcu_test_nostruct(4); 168 bpf_this_cpu_ptr(p); 169 bpf_rcu_read_unlock(); 170 return 0; 171}