selftests/bpf: Check combination of jit blinding and pointers to bpf subprogs.
Check that ld_imm64 with src_reg=1 (aka BPF_PSEUDO_FUNC) works with jit_blinding. Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: Martin KaFai Lau <kafai@fb.com> Link: https://lore.kernel.org/bpf/20220513011025.13344-2-alexei.starovoitov@gmail.com
This commit is contained in:
parent
4b6313cf99
commit
365d519923
|
@ -89,6 +89,11 @@ int prog2(void *ctx)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int empty_callback(__u32 index, void *data)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
/* prog3 has the same section name as prog1 */
|
/* prog3 has the same section name as prog1 */
|
||||||
SEC("raw_tp/sys_enter")
|
SEC("raw_tp/sys_enter")
|
||||||
int prog3(void *ctx)
|
int prog3(void *ctx)
|
||||||
|
@ -98,6 +103,9 @@ int prog3(void *ctx)
|
||||||
if (!BPF_CORE_READ(t, pid) || !get_task_tgid((uintptr_t)t))
|
if (!BPF_CORE_READ(t, pid) || !get_task_tgid((uintptr_t)t))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
|
/* test that ld_imm64 with BPF_PSEUDO_FUNC doesn't get blinded */
|
||||||
|
bpf_loop(1, empty_callback, NULL, 0);
|
||||||
|
|
||||||
res3 = sub3(5) + 6; /* (5 + 3 + (4 + 1)) + 6 = 19 */
|
res3 = sub3(5) + 6; /* (5 + 3 + (4 + 1)) + 6 = 19 */
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue