#include "bpf_experimental.h" #include "bpf_misc.h" struct val_t { long b, c, d; }; struct val2_t { long b; }; struct val_with_ptr_t { char *p; }; struct val_with_rb_root_t { struct bpf_spin_lock lock; }; struct val_600b_t { char b[600]; }; struct elem { long sum; struct val_t __percpu_kptr *pc; }; struct { __uint(type, BPF_MAP_TYPE_ARRAY); __uint(max_entries, 1); __type(key, int); __type(value, struct elem); } array SEC(".maps"); long ret; SEC("?fentry/bpf_fentry_test1") __failure __msg("store to referenced kptr disallowed") int BPF_PROG(test_array_map_1) { struct val_t __percpu_kptr *p; struct elem *e; int index = 0; e = bpf_map_lookup_elem(&array, &index); if (!e) return 0; p = bpf_percpu_obj_new(struct val_t); if (!p) return 0; p = bpf_kptr_xchg(&e->pc, p); if (p) bpf_percpu_obj_drop(p); e->pc = (struct val_t __percpu_kptr *)ret; return 0; } SEC("?fentry/bpf_fentry_test1") __failure __msg("invalid kptr access, R2 type=percpu_ptr_val2_t expected=ptr_val_t") int BPF_PROG(test_array_map_2) { struct val2_t __percpu_kptr *p2; struct val_t __percpu_kptr *p; struct elem *e; int index = 0; e = bpf_map_lookup_elem(&array, &index); if (!e) return 0; p2 = bpf_percpu_obj_new(struct val2_t); if (!p2) return 0; p = bpf_kptr_xchg(&e->pc, p2); if (p) bpf_percpu_obj_drop(p); return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("R1 type=scalar expected=percpu_ptr_, percpu_rcu_ptr_, percpu_trusted_ptr_") int BPF_PROG(test_array_map_3) { struct val_t __percpu_kptr *p, *p1; struct val_t *v; struct elem *e; int index = 0; e = bpf_map_lookup_elem(&array, &index); if (!e) return 0; p = bpf_percpu_obj_new(struct val_t); if (!p) return 0; p1 = bpf_kptr_xchg(&e->pc, p); if (p1) bpf_percpu_obj_drop(p1); v = bpf_this_cpu_ptr(p); ret = v->b; return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("arg#0 expected for bpf_percpu_obj_drop_impl()") int BPF_PROG(test_array_map_4) { struct val_t __percpu_kptr *p; p = bpf_percpu_obj_new(struct val_t); if (!p) return 0; bpf_obj_drop(p); return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("arg#0 expected for bpf_obj_drop_impl()") int BPF_PROG(test_array_map_5) { struct val_t *p; p = bpf_obj_new(struct val_t); if (!p) return 0; bpf_percpu_obj_drop(p); return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("bpf_percpu_obj_new type ID argument must be of a struct of scalars") int BPF_PROG(test_array_map_6) { struct val_with_ptr_t __percpu_kptr *p; p = bpf_percpu_obj_new(struct val_with_ptr_t); if (!p) return 0; bpf_percpu_obj_drop(p); return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("bpf_percpu_obj_new type ID argument must not contain special fields") int BPF_PROG(test_array_map_7) { struct val_with_rb_root_t __percpu_kptr *p; p = bpf_percpu_obj_new(struct val_with_rb_root_t); if (!p) return 0; bpf_percpu_obj_drop(p); return 0; } SEC("?fentry.s/bpf_fentry_test1") __failure __msg("bpf_percpu_obj_new type size (600) is greater than 512") int BPF_PROG(test_array_map_8) { struct val_600b_t __percpu_kptr *p; p = bpf_percpu_obj_new(struct val_600b_t); if (!p) return 0; bpf_percpu_obj_drop(p); return 0; } char _license[] SEC("license") = "GPL";