diff options
author | Dmitrii Banshchikov <me@ubique.spb.ru> | 2021-02-12 23:56:42 +0300 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2021-02-13 04:37:23 +0300 |
commit | 8b08807d039a843163fd4aeca93aec69dfc4fbcf (patch) | |
tree | 39b7ad2400b62446aa3bd60cb6168f911de4e5a7 /tools/testing/selftests/bpf/progs/test_global_func13.c | |
parent | e5069b9c23b3857db986c58801bebe450cff3392 (diff) | |
download | linux-8b08807d039a843163fd4aeca93aec69dfc4fbcf.tar.xz |
selftests/bpf: Add unit tests for pointers in global functions
test_global_func9 - check valid pointer's scenarios
test_global_func10 - check that a smaller type cannot be passed as a
larger one
test_global_func11 - check that CTX pointer cannot be passed
test_global_func12 - check access to a null pointer
test_global_func13 - check access to an arbitrary pointer value
test_global_func14 - check that an opaque pointer cannot be passed
test_global_func15 - check that a variable has an unknown value after
it was passed to a global function by pointer
test_global_func16 - check access to uninitialized stack memory
test_global_func_args - check read and write operations through a pointer
Signed-off-by: Dmitrii Banshchikov <me@ubique.spb.ru>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20210212205642.620788-5-me@ubique.spb.ru
Diffstat (limited to 'tools/testing/selftests/bpf/progs/test_global_func13.c')
-rw-r--r-- | tools/testing/selftests/bpf/progs/test_global_func13.c | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/tools/testing/selftests/bpf/progs/test_global_func13.c b/tools/testing/selftests/bpf/progs/test_global_func13.c new file mode 100644 index 000000000000..ff8897c1ac22 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/test_global_func13.c @@ -0,0 +1,24 @@ +// SPDX-License-Identifier: GPL-2.0-only +#include <stddef.h> +#include <linux/bpf.h> +#include <bpf/bpf_helpers.h> + +struct S { + int x; +}; + +__noinline int foo(const struct S *s) +{ + if (s) + return bpf_get_prandom_u32() < s->x; + + return 0; +} + +SEC("cgroup_skb/ingress") +int test_cls(struct __sk_buff *skb) +{ + const struct S *s = (const struct S *)(0xbedabeda); + + return foo(s); +} |