mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-10-31 16:38:12 +00:00
1410620cf2
This adds further tests to ensure access permissions and restrictions are applied properly for some map types such as sock-map. It also adds another negative tests to assert static functions cannot be replaced. In the 'unreliable' mode it still fails with error 'tracing progs cannot use bpf_spin_lock yet' with the change in the verifier Signed-off-by: Udip Pant <udippant@fb.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20200825232003.2877030-5-udippant@fb.com
40 lines
768 B
C
40 lines
768 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
// Copyright (c) 2020 Facebook
|
|
|
|
#include <linux/ptrace.h>
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
|
|
#define VAR_NUM 2
|
|
|
|
struct hmap_elem {
|
|
struct bpf_spin_lock lock;
|
|
int var[VAR_NUM];
|
|
};
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_HASH);
|
|
__uint(max_entries, 1);
|
|
__type(key, __u32);
|
|
__type(value, struct hmap_elem);
|
|
} hash_map SEC(".maps");
|
|
|
|
SEC("freplace/handle_kprobe")
|
|
int new_handle_kprobe(struct pt_regs *ctx)
|
|
{
|
|
struct hmap_elem zero = {}, *val;
|
|
int key = 0;
|
|
|
|
val = bpf_map_lookup_elem(&hash_map, &key);
|
|
if (!val)
|
|
return 1;
|
|
/* spin_lock in hash map */
|
|
bpf_spin_lock(&val->lock);
|
|
val->var[0] = 99;
|
|
bpf_spin_unlock(&val->lock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|