summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/progs/test_global_func13.c
diff options
context:
space:
mode:
authorDmitrii Banshchikov <me@ubique.spb.ru>2021-02-12 23:56:42 +0300
committerAlexei Starovoitov <ast@kernel.org>2021-02-13 04:37:23 +0300
commit8b08807d039a843163fd4aeca93aec69dfc4fbcf (patch)
tree39b7ad2400b62446aa3bd60cb6168f911de4e5a7 /tools/testing/selftests/bpf/progs/test_global_func13.c
parente5069b9c23b3857db986c58801bebe450cff3392 (diff)
downloadlinux-8b08807d039a843163fd4aeca93aec69dfc4fbcf.tar.xz
selftests/bpf: Add unit tests for pointers in global functions
test_global_func9 - check valid pointer's scenarios test_global_func10 - check that a smaller type cannot be passed as a larger one test_global_func11 - check that CTX pointer cannot be passed test_global_func12 - check access to a null pointer test_global_func13 - check access to an arbitrary pointer value test_global_func14 - check that an opaque pointer cannot be passed test_global_func15 - check that a variable has an unknown value after it was passed to a global function by pointer test_global_func16 - check access to uninitialized stack memory test_global_func_args - check read and write operations through a pointer Signed-off-by: Dmitrii Banshchikov <me@ubique.spb.ru> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/bpf/20210212205642.620788-5-me@ubique.spb.ru
Diffstat (limited to 'tools/testing/selftests/bpf/progs/test_global_func13.c')
-rw-r--r--tools/testing/selftests/bpf/progs/test_global_func13.c24
1 files changed, 24 insertions, 0 deletions
diff --git a/tools/testing/selftests/bpf/progs/test_global_func13.c b/tools/testing/selftests/bpf/progs/test_global_func13.c
new file mode 100644
index 000000000000..ff8897c1ac22
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/test_global_func13.c
@@ -0,0 +1,24 @@
+// SPDX-License-Identifier: GPL-2.0-only
+#include <stddef.h>
+#include <linux/bpf.h>
+#include <bpf/bpf_helpers.h>
+
+struct S {
+ int x;
+};
+
+__noinline int foo(const struct S *s)
+{
+ if (s)
+ return bpf_get_prandom_u32() < s->x;
+
+ return 0;
+}
+
+SEC("cgroup_skb/ingress")
+int test_cls(struct __sk_buff *skb)
+{
+ const struct S *s = (const struct S *)(0xbedabeda);
+
+ return foo(s);
+}