|
115 | 115 | { "bpf_kfunc_call_test_release", 5 },
|
116 | 116 | },
|
117 | 117 | },
|
| 118 | +{ |
| 119 | + "calls: invalid kfunc call: reg->off must be zero when passed to release kfunc", |
| 120 | + .insns = { |
| 121 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_10), |
| 122 | + BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8), |
| 123 | + BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 0), |
| 124 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 125 | + BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), |
| 126 | + BPF_EXIT_INSN(), |
| 127 | + BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8), |
| 128 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), |
| 129 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 130 | + BPF_MOV64_IMM(BPF_REG_0, 0), |
| 131 | + BPF_EXIT_INSN(), |
| 132 | + }, |
| 133 | + .prog_type = BPF_PROG_TYPE_SCHED_CLS, |
| 134 | + .result = REJECT, |
| 135 | + .errstr = "R1 with ref_obj_id=2 must have zero offset when passed to release kfunc", |
| 136 | + .fixup_kfunc_btf_id = { |
| 137 | + { "bpf_kfunc_call_test_acquire", 3 }, |
| 138 | + { "bpf_kfunc_call_memb_release", 8 }, |
| 139 | + }, |
| 140 | +}, |
| 141 | +{ |
| 142 | + "calls: invalid kfunc call: PTR_TO_BTF_ID with negative offset", |
| 143 | + .insns = { |
| 144 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_10), |
| 145 | + BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8), |
| 146 | + BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 0), |
| 147 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 148 | + BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), |
| 149 | + BPF_EXIT_INSN(), |
| 150 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), |
| 151 | + BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -4), |
| 152 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 153 | + BPF_MOV64_IMM(BPF_REG_0, 0), |
| 154 | + BPF_EXIT_INSN(), |
| 155 | + }, |
| 156 | + .prog_type = BPF_PROG_TYPE_SCHED_CLS, |
| 157 | + .fixup_kfunc_btf_id = { |
| 158 | + { "bpf_kfunc_call_test_acquire", 3 }, |
| 159 | + { "bpf_kfunc_call_test_release", 8 }, |
| 160 | + }, |
| 161 | + .result_unpriv = REJECT, |
| 162 | + .result = REJECT, |
| 163 | + .errstr = "negative offset ptr_ ptr R1 off=-4 disallowed", |
| 164 | +}, |
| 165 | +{ |
| 166 | + "calls: invalid kfunc call: PTR_TO_BTF_ID with variable offset", |
| 167 | + .insns = { |
| 168 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_10), |
| 169 | + BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8), |
| 170 | + BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 0), |
| 171 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 172 | + BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), |
| 173 | + BPF_EXIT_INSN(), |
| 174 | + BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), |
| 175 | + BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_0, 4), |
| 176 | + BPF_JMP_IMM(BPF_JLE, BPF_REG_2, 4, 3), |
| 177 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 178 | + BPF_MOV64_IMM(BPF_REG_0, 0), |
| 179 | + BPF_EXIT_INSN(), |
| 180 | + BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 3), |
| 181 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 182 | + BPF_MOV64_IMM(BPF_REG_0, 0), |
| 183 | + BPF_EXIT_INSN(), |
| 184 | + BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2), |
| 185 | + BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, BPF_PSEUDO_KFUNC_CALL, 0, 0), |
| 186 | + BPF_MOV64_IMM(BPF_REG_0, 0), |
| 187 | + BPF_EXIT_INSN(), |
| 188 | + }, |
| 189 | + .prog_type = BPF_PROG_TYPE_SCHED_CLS, |
| 190 | + .fixup_kfunc_btf_id = { |
| 191 | + { "bpf_kfunc_call_test_acquire", 3 }, |
| 192 | + { "bpf_kfunc_call_test_release", 9 }, |
| 193 | + { "bpf_kfunc_call_test_release", 13 }, |
| 194 | + { "bpf_kfunc_call_test_release", 17 }, |
| 195 | + }, |
| 196 | + .result_unpriv = REJECT, |
| 197 | + .result = REJECT, |
| 198 | + .errstr = "variable ptr_ access var_off=(0x0; 0x7) disallowed", |
| 199 | +}, |
118 | 200 | {
|
119 | 201 | "calls: basic sanity",
|
120 | 202 | .insns = {
|
|
0 commit comments