Test if the verifier verifies nullable pointer arguments correctly for BPF struct_ops programs. "test_maybe_null" in struct bpf_testmod_ops is the operator defined for the test cases here. A BPF program should check a pointer for NULL beforehand to access the value pointed by the nullable pointer arguments, or the verifier should reject the programs. The test here includes two parts; the programs checking pointers properly and the programs not checking pointers beforehand. The test checks if the verifier accepts the programs checking properly and rejects the programs not checking at all. Signed-off-by: Kui-Feng Lee <thinker.li@gmail.com> Link: https://lore.kernel.org/r/20240209023750.1153905-5-thinker.li@gmail.com Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>
29 lines
698 B
C
29 lines
698 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2024 Meta Platforms, Inc. and affiliates. */
|
|
#include <vmlinux.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include "../bpf_testmod/bpf_testmod.h"
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
pid_t tgid = 0;
|
|
|
|
/* This is a test BPF program that uses struct_ops to access an argument
|
|
* that may be NULL. This is a test for the verifier to ensure that it can
|
|
* rip PTR_MAYBE_NULL correctly.
|
|
*/
|
|
SEC("struct_ops/test_maybe_null")
|
|
int BPF_PROG(test_maybe_null, int dummy,
|
|
struct task_struct *task)
|
|
{
|
|
if (task)
|
|
tgid = task->tgid;
|
|
|
|
return 0;
|
|
}
|
|
|
|
SEC(".struct_ops.link")
|
|
struct bpf_testmod_ops testmod_1 = {
|
|
.test_maybe_null = (void *)test_maybe_null,
|
|
};
|
|
|