提交 c1eff801 编写于 作者: M Matt Smith 提交者: Zheng Zengkai

selftests/bpf: Add checks for X__elf_bytes() skeleton helper

mainline inclusion
from mainline-5.16-rc1
commit 980a1a4c
category: feature
bugzilla: https://gitee.com/openeuler/kernel/issues/I5EUVD
CVE: NA

Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=980a1a4c342f353a62d64174d0a6a9466a741273

-------------------------------------------------

This patch adds two checks for the X__elf_bytes BPF skeleton helper
method. The first asserts that the pointer returned from the helper
method is valid, the second asserts that the provided size pointer is
set.
Signed-off-by: NMatt Smith <alastorze@fb.com>
Signed-off-by: NAndrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20210901194439.3853238-4-alastorze@fb.com
(cherry picked from commit 980a1a4c)
Signed-off-by: NWang Yufen <wangyufen@huawei.com>
上级 6d12ed33
...@@ -18,6 +18,8 @@ void test_skeleton(void) ...@@ -18,6 +18,8 @@ void test_skeleton(void)
struct test_skeleton__data *data; struct test_skeleton__data *data;
struct test_skeleton__rodata *rodata; struct test_skeleton__rodata *rodata;
struct test_skeleton__kconfig *kcfg; struct test_skeleton__kconfig *kcfg;
const void *elf_bytes;
size_t elf_bytes_sz = 0;
skel = test_skeleton__open(); skel = test_skeleton__open();
if (CHECK(!skel, "skel_open", "failed to open skeleton\n")) if (CHECK(!skel, "skel_open", "failed to open skeleton\n"))
...@@ -91,6 +93,10 @@ void test_skeleton(void) ...@@ -91,6 +93,10 @@ void test_skeleton(void)
CHECK(bss->kern_ver != kcfg->LINUX_KERNEL_VERSION, "ext2", CHECK(bss->kern_ver != kcfg->LINUX_KERNEL_VERSION, "ext2",
"got %d != exp %d\n", bss->kern_ver, kcfg->LINUX_KERNEL_VERSION); "got %d != exp %d\n", bss->kern_ver, kcfg->LINUX_KERNEL_VERSION);
elf_bytes = test_skeleton__elf_bytes(&elf_bytes_sz);
ASSERT_OK_PTR(elf_bytes, "elf_bytes");
ASSERT_GE(elf_bytes_sz, 0, "elf_bytes_sz");
cleanup: cleanup:
test_skeleton__destroy(skel); test_skeleton__destroy(skel);
} }
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册