]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
selftests/bpf: Load struct_ops map in global_maps_resize test
authorDavid Vernet <void@manifault.com>
Thu, 25 Jul 2024 03:22:14 +0000 (22:22 -0500)
committerAndrii Nakryiko <andrii@kernel.org>
Mon, 29 Jul 2024 22:05:09 +0000 (15:05 -0700)
In prog_tests/test_global_maps_resize.c, we test various use cases for
resizing global maps. Commit 7244100e0389 ("libbpf: Don't take direct
pointers into BTF data from st_ops") updated libbpf to not store pointers
to volatile BTF data, which for some users, was causing a UAF when resizing
a datasec array.

Let's ensure we have coverage for resizing datasec arrays with struct_ops
progs by also including a struct_ops map and struct_ops prog in the
test_global_map_resize skeleton. The map is automatically loaded, so we
don't need to do anything other than add it to the BPF prog being tested
to get the coverage.

Signed-off-by: David Vernet <void@manifault.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20240725032214.50676-1-void@manifault.com
tools/testing/selftests/bpf/progs/test_global_map_resize.c

index 1fbb73d3e5d5a0139d5653ae6b5e2fbcfd87f2e1..714b29c7f8b27c3ec9da9665608a08ce98033052 100644 (file)
@@ -3,6 +3,7 @@
 
 #include "vmlinux.h"
 #include <bpf/bpf_helpers.h>
+#include <bpf/bpf_tracing.h>
 
 char _license[] SEC("license") = "GPL";
 
@@ -60,3 +61,18 @@ int data_array_sum(void *ctx)
 
        return 0;
 }
+
+SEC("struct_ops/test_1")
+int BPF_PROG(test_1)
+{
+       return 0;
+}
+
+struct bpf_testmod_ops {
+       int (*test_1)(void);
+};
+
+SEC(".struct_ops.link")
+struct bpf_testmod_ops st_ops_resize = {
+       .test_1 = (void *)test_1
+};