bpf: explicitly prohibit ctx_{in, out} in non-skb BPF_PROG_TEST_RUN
authorStanislav Fomichev <sdf@google.com>
Thu, 11 Apr 2019 22:47:07 +0000 (15:47 -0700)
committerDaniel Borkmann <daniel@iogearbox.net>
Thu, 11 Apr 2019 22:53:00 +0000 (00:53 +0200)
This should allow us later to extend BPF_PROG_TEST_RUN for non-skb case
and be sure that nobody is erroneously setting ctx_{in,out}.

Fixes: b0b9395d865e ("bpf: support input __sk_buff context in BPF_PROG_TEST_RUN")
Reported-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Stanislav Fomichev <sdf@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
net/bpf/test_run.c

index cbd4fb65aa4fd647e60eec1aad7446e73bebf617..2221573dacdb71b9acd118de89d25916f7b2af72 100644 (file)
@@ -347,6 +347,9 @@ int bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr,
        void *data;
        int ret;
 
+       if (kattr->test.ctx_in || kattr->test.ctx_out)
+               return -EINVAL;
+
        data = bpf_test_init(kattr, size, XDP_PACKET_HEADROOM + NET_IP_ALIGN, 0);
        if (IS_ERR(data))
                return PTR_ERR(data);
@@ -390,6 +393,9 @@ int bpf_prog_test_run_flow_dissector(struct bpf_prog *prog,
        if (prog->type != BPF_PROG_TYPE_FLOW_DISSECTOR)
                return -EINVAL;
 
+       if (kattr->test.ctx_in || kattr->test.ctx_out)
+               return -EINVAL;
+
        data = bpf_test_init(kattr, size, NET_SKB_PAD + NET_IP_ALIGN,
                             SKB_DATA_ALIGN(sizeof(struct skb_shared_info)));
        if (IS_ERR(data))