diff options
| author | Kumar Kartikeya Dwivedi <[email protected]> | 2024-11-04 17:19:59 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2024-11-04 19:37:36 +0000 |
| commit | d798ce3f4cab1b0d886b19ec5cc8e6b3d7e35081 (patch) | |
| tree | b956b98fc4eb826326bb8e321144ce40e4bc63ab /tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c | |
| parent | selftests/bpf: Clean up open-coded gettid syscall invocations (diff) | |
| download | kernel-d798ce3f4cab1b0d886b19ec5cc8e6b3d7e35081.tar.gz kernel-d798ce3f4cab1b0d886b19ec5cc8e6b3d7e35081.zip | |
selftests/bpf: Add tests for raw_tp null handling
Ensure that trusted PTR_TO_BTF_ID accesses perform PROBE_MEM handling in
raw_tp program. Without the previous fix, this selftest crashes the
kernel due to a NULL-pointer dereference. Also ensure that dead code
elimination does not kick in for checks on the pointer.
Reviewed-by: Jiri Olsa <[email protected]>
Signed-off-by: Kumar Kartikeya Dwivedi <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c')
| -rw-r--r-- | tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c index 8835761d9a12..4e6a9e9c0368 100644 --- a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c +++ b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c @@ -380,6 +380,8 @@ bpf_testmod_test_read(struct file *file, struct kobject *kobj, (void)bpf_testmod_test_arg_ptr_to_struct(&struct_arg1_2); + (void)trace_bpf_testmod_test_raw_tp_null(NULL); + struct_arg3 = kmalloc((sizeof(struct bpf_testmod_struct_arg_3) + sizeof(int)), GFP_KERNEL); if (struct_arg3 != NULL) { |
