mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 14:53:58 -04:00
The fsession attach type is missed in the verifier log in check_get_func_ip(), bpf_check_attach_target() and check_attach_btf_id(). Update them to make the verifier log proper. Meanwhile, update the corresponding selftests. Acked-by: Leon Hwang <leon.hwang@linux.dev> Signed-off-by: Menglong Dong <dongml2@chinatelecom.cn> Link: https://lore.kernel.org/r/20260412060346.142007-2-dongml2@chinatelecom.cn Signed-off-by: Alexei Starovoitov <ast@kernel.org>
92 lines
1.8 KiB
C
92 lines
1.8 KiB
C
{
|
|
"sleepable fentry accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_TRACING,
|
|
.expected_attach_type = BPF_TRACE_FENTRY,
|
|
.kfunc = "bpf_fentry_test1",
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable fexit accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_TRACING,
|
|
.expected_attach_type = BPF_TRACE_FENTRY,
|
|
.kfunc = "bpf_fentry_test1",
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable fmod_ret accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_TRACING,
|
|
.expected_attach_type = BPF_MODIFY_RETURN,
|
|
.kfunc = "bpf_fentry_test1",
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable iter accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_TRACING,
|
|
.expected_attach_type = BPF_TRACE_ITER,
|
|
.kfunc = "task",
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable lsm accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_LSM,
|
|
.kfunc = "bpf",
|
|
.expected_attach_type = BPF_LSM_MAC,
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable uprobe accept",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_KPROBE,
|
|
.kfunc = "bpf_fentry_test1",
|
|
.result = ACCEPT,
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|
|
{
|
|
"sleepable raw tracepoint reject",
|
|
.insns = {
|
|
BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
BPF_EXIT_INSN(),
|
|
},
|
|
.prog_type = BPF_PROG_TYPE_TRACING,
|
|
.expected_attach_type = BPF_TRACE_RAW_TP,
|
|
.kfunc = "sched_switch",
|
|
.result = REJECT,
|
|
.errstr = "Only fentry/fexit/fsession/fmod_ret, lsm, iter, uprobe, and struct_ops programs can be sleepable",
|
|
.flags = BPF_F_SLEEPABLE,
|
|
.runs = -1,
|
|
},
|