]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
selftests/bpf: add test for nullable PTR_TO_BUF access
authorQi Tang <tpluszz77@gmail.com>
Tue, 7 Apr 2026 14:54:21 +0000 (22:54 +0800)
committerAlexei Starovoitov <ast@kernel.org>
Tue, 7 Apr 2026 22:53:45 +0000 (15:53 -0700)
Add iter_buf_null_fail with two tests and a test runner:
  - iter_buf_null_deref: verifier must reject direct dereference of
    ctx->key (PTR_TO_BUF | PTR_MAYBE_NULL) without a null check
  - iter_buf_null_check_ok: verifier must accept dereference after
    an explicit null check

Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Reviewed-by: Amery Hung <ameryhung@gmail.com>
Signed-off-by: Qi Tang <tpluszz77@gmail.com>
Link: https://lore.kernel.org/r/20260407145421.4315-1-tpluszz77@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
tools/testing/selftests/bpf/prog_tests/iter_buf_null_fail.c [new file with mode: 0644]
tools/testing/selftests/bpf/progs/iter_buf_null_fail.c [new file with mode: 0644]

diff --git a/tools/testing/selftests/bpf/prog_tests/iter_buf_null_fail.c b/tools/testing/selftests/bpf/prog_tests/iter_buf_null_fail.c
new file mode 100644 (file)
index 0000000..ea97787
--- /dev/null
@@ -0,0 +1,9 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <test_progs.h>
+#include "iter_buf_null_fail.skel.h"
+
+void test_iter_buf_null_fail(void)
+{
+       RUN_TESTS(iter_buf_null_fail);
+}
diff --git a/tools/testing/selftests/bpf/progs/iter_buf_null_fail.c b/tools/testing/selftests/bpf/progs/iter_buf_null_fail.c
new file mode 100644 (file)
index 0000000..3daad40
--- /dev/null
@@ -0,0 +1,39 @@
+// SPDX-License-Identifier: GPL-2.0
+/* Copyright (c) 2026 Qi Tang */
+
+#include <vmlinux.h>
+#include <bpf/bpf_helpers.h>
+#include "bpf_misc.h"
+
+char _license[] SEC("license") = "GPL";
+
+/* Verify that the verifier rejects direct access to nullable PTR_TO_BUF. */
+SEC("iter/bpf_map_elem")
+__failure __msg("invalid mem access")
+int iter_buf_null_deref(struct bpf_iter__bpf_map_elem *ctx)
+{
+       /*
+        * ctx->key is PTR_TO_BUF | PTR_MAYBE_NULL | MEM_RDONLY.
+        * Direct access without null check must be rejected.
+        */
+       volatile __u32 v = *(__u32 *)ctx->key;
+
+       (void)v;
+       return 0;
+}
+
+/* Verify that access after a null check is still accepted. */
+SEC("iter/bpf_map_elem")
+__success
+int iter_buf_null_check_ok(struct bpf_iter__bpf_map_elem *ctx)
+{
+       __u32 *key = ctx->key;
+
+       if (!key)
+               return 0;
+
+       volatile __u32 v = *key;
+
+       (void)v;
+       return 0;
+}