]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
selftests/bpf: Range analysis test case for JSET
authorPaul Chaignon <paul.chaignon@gmail.com>
Thu, 10 Jul 2025 18:21:41 +0000 (20:21 +0200)
committerAlexei Starovoitov <ast@kernel.org>
Fri, 11 Jul 2025 17:45:25 +0000 (10:45 -0700)
This patch adds coverage for the warning detected by syzkaller and fixed
in the previous patch. Without the previous patch, this test fails with:

  verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds
  violation u64=[0x0, 0x0] s64=[0x0, 0x0] u32=[0x1, 0x0] s32=[0x0, 0x0]
  var_off=(0x0, 0x0)(1)

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Acked-by: Yonghong Song <yonghong.song@linux.dev>
Link: https://lore.kernel.org/r/c7893be1170fdbcf64e0200c110cdbd360ce7086.1752171365.git.paul.chaignon@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
tools/testing/selftests/bpf/progs/verifier_bounds.c

index 6f986ae5085e23f094e9db3b5d510462edc1b2af..63b533ca49335482c3e10ebcf2b07179b9fffcf3 100644 (file)
@@ -2,6 +2,7 @@
 /* Converted from tools/testing/selftests/bpf/verifier/bounds.c */
 
 #include <linux/bpf.h>
+#include <../../../include/linux/filter.h>
 #include <bpf/bpf_helpers.h>
 #include "bpf_misc.h"
 
@@ -1532,4 +1533,21 @@ __naked void sub32_partial_overflow(void)
        : __clobber_all);
 }
 
+SEC("socket")
+__description("dead branch on jset, does not result in invariants violation error")
+__success __log_level(2)
+__retval(0) __flag(BPF_F_TEST_REG_INVARIANTS)
+__naked void jset_range_analysis(void)
+{
+       asm volatile ("                 \
+       call %[bpf_get_netns_cookie];   \
+       if r0 == 0 goto l0_%=;          \
+       if r0 & 0xffffffff goto +0;     \
+l0_%=: r0 = 0;                         \
+       exit;                           \
+"      :
+       : __imm(bpf_get_netns_cookie)
+       : __clobber_all);
+}
+
 char _license[] SEC("license") = "GPL";