Skip to content

Commit 73964e9

Browse files
jrifeAlexei Starovoitov
authored andcommitted
selftests/bpf: Migrate recvmsg* return code tests to verifier_sock_addr.c
This set of tests check that the BPF verifier rejects programs with invalid return codes (recvmsg4 and recvmsg6 hooks can only return 1). This patch replaces the tests in test_sock_addr.c with verifier_sock_addr.c, a new verifier prog_tests for sockaddr hooks, in a step towards fully retiring test_sock_addr.c. Signed-off-by: Jordan Rife <jrife@google.com> Link: https://lore.kernel.org/r/20240510190246.3247730-2-jrife@google.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
1 parent 20a759d commit 73964e9

3 files changed

Lines changed: 39 additions & 70 deletions

File tree

tools/testing/selftests/bpf/prog_tests/verifier.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,7 @@
6666
#include "verifier_sdiv.skel.h"
6767
#include "verifier_search_pruning.skel.h"
6868
#include "verifier_sock.skel.h"
69+
#include "verifier_sock_addr.skel.h"
6970
#include "verifier_spill_fill.skel.h"
7071
#include "verifier_spin_lock.skel.h"
7172
#include "verifier_stack_ptr.skel.h"
@@ -181,6 +182,7 @@ void test_verifier_scalar_ids(void) { RUN(verifier_scalar_ids); }
181182
void test_verifier_sdiv(void) { RUN(verifier_sdiv); }
182183
void test_verifier_search_pruning(void) { RUN(verifier_search_pruning); }
183184
void test_verifier_sock(void) { RUN(verifier_sock); }
185+
void test_verifier_sock_addr(void) { RUN(verifier_sock_addr); }
184186
void test_verifier_spill_fill(void) { RUN(verifier_spill_fill); }
185187
void test_verifier_spin_lock(void) { RUN(verifier_spin_lock); }
186188
void test_verifier_stack_ptr(void) { RUN(verifier_stack_ptr); }
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
// SPDX-License-Identifier: GPL-2.0
2+
/* Copyright (c) 2024 Google LLC */
3+
4+
#include <linux/bpf.h>
5+
#include <bpf/bpf_helpers.h>
6+
#include <bpf_sockopt_helpers.h>
7+
#include "bpf_misc.h"
8+
9+
SEC("cgroup/recvmsg4")
10+
__success
11+
int recvmsg4_good_return_code(struct bpf_sock_addr *ctx)
12+
{
13+
return 1;
14+
}
15+
16+
SEC("cgroup/recvmsg4")
17+
__failure __msg("At program exit the register R0 has smin=0 smax=0 should have been in [1, 1]")
18+
int recvmsg4_bad_return_code(struct bpf_sock_addr *ctx)
19+
{
20+
return 0;
21+
}
22+
23+
SEC("cgroup/recvmsg6")
24+
__success
25+
int recvmsg6_good_return_code(struct bpf_sock_addr *ctx)
26+
{
27+
return 1;
28+
}
29+
30+
SEC("cgroup/recvmsg6")
31+
__failure __msg("At program exit the register R0 has smin=0 smax=0 should have been in [1, 1]")
32+
int recvmsg6_bad_return_code(struct bpf_sock_addr *ctx)
33+
{
34+
return 0;
35+
}
36+
37+
char _license[] SEC("license") = "GPL";

tools/testing/selftests/bpf/test_sock_addr.c

Lines changed: 0 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,6 @@ static int connect4_prog_load(const struct sock_addr_test *test);
9494
static int connect6_prog_load(const struct sock_addr_test *test);
9595
static int sendmsg_allow_prog_load(const struct sock_addr_test *test);
9696
static int sendmsg_deny_prog_load(const struct sock_addr_test *test);
97-
static int recvmsg_allow_prog_load(const struct sock_addr_test *test);
98-
static int recvmsg_deny_prog_load(const struct sock_addr_test *test);
9997
static int sendmsg4_rw_asm_prog_load(const struct sock_addr_test *test);
10098
static int sendmsg6_rw_asm_prog_load(const struct sock_addr_test *test);
10199
static int sendmsg6_rw_v4mapped_prog_load(const struct sock_addr_test *test);
@@ -373,64 +371,6 @@ static struct sock_addr_test tests[] = {
373371
SRC6_REWRITE_IP,
374372
SYSCALL_EPERM,
375373
},
376-
377-
/* recvmsg */
378-
{
379-
"recvmsg4: return code ok",
380-
recvmsg_allow_prog_load,
381-
BPF_CGROUP_UDP4_RECVMSG,
382-
BPF_CGROUP_UDP4_RECVMSG,
383-
AF_INET,
384-
SOCK_DGRAM,
385-
NULL,
386-
0,
387-
NULL,
388-
0,
389-
NULL,
390-
ATTACH_OKAY,
391-
},
392-
{
393-
"recvmsg4: return code !ok",
394-
recvmsg_deny_prog_load,
395-
BPF_CGROUP_UDP4_RECVMSG,
396-
BPF_CGROUP_UDP4_RECVMSG,
397-
AF_INET,
398-
SOCK_DGRAM,
399-
NULL,
400-
0,
401-
NULL,
402-
0,
403-
NULL,
404-
LOAD_REJECT,
405-
},
406-
{
407-
"recvmsg6: return code ok",
408-
recvmsg_allow_prog_load,
409-
BPF_CGROUP_UDP6_RECVMSG,
410-
BPF_CGROUP_UDP6_RECVMSG,
411-
AF_INET6,
412-
SOCK_DGRAM,
413-
NULL,
414-
0,
415-
NULL,
416-
0,
417-
NULL,
418-
ATTACH_OKAY,
419-
},
420-
{
421-
"recvmsg6: return code !ok",
422-
recvmsg_deny_prog_load,
423-
BPF_CGROUP_UDP6_RECVMSG,
424-
BPF_CGROUP_UDP6_RECVMSG,
425-
AF_INET6,
426-
SOCK_DGRAM,
427-
NULL,
428-
0,
429-
NULL,
430-
0,
431-
NULL,
432-
LOAD_REJECT,
433-
},
434374
};
435375

436376
static int load_insns(const struct sock_addr_test *test,
@@ -527,16 +467,6 @@ static int sendmsg_deny_prog_load(const struct sock_addr_test *test)
527467
return xmsg_ret_only_prog_load(test, /*rc*/ 0);
528468
}
529469

530-
static int recvmsg_allow_prog_load(const struct sock_addr_test *test)
531-
{
532-
return xmsg_ret_only_prog_load(test, /*rc*/ 1);
533-
}
534-
535-
static int recvmsg_deny_prog_load(const struct sock_addr_test *test)
536-
{
537-
return xmsg_ret_only_prog_load(test, /*rc*/ 0);
538-
}
539-
540470
static int sendmsg4_rw_asm_prog_load(const struct sock_addr_test *test)
541471
{
542472
struct sockaddr_in dst4_rw_addr;

0 commit comments

Comments
 (0)