mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

The selftests build four kernel modules which use copy-pasted Makefile targets. This is a bit messy, and doesn't scale so well when we add more modules, so let's consolidate these rules into a single rule generated for each module name, and move the module sources into a single directory. To avoid parallel builds of the different modules stepping on each other's toes during the 'modpost' phase of the Kbuild 'make modules', the module files should really be a grouped target. However, make only added explicit support for grouped targets in version 4.3, which is newer than the minimum version supported by the kernel. However, make implicitly treats pattern matching rules with multiple targets as a grouped target, so we can work around this by turning the rule into a pattern matching target. We do this by replacing '.ko' with '%ko' in the targets with subst(). Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: Viktor Malik <vmalik@redhat.com> Link: https://lore.kernel.org/bpf/20241204-bpf-selftests-mod-compile-v5-1-b96231134a49@redhat.com
125 lines
2.8 KiB
C
125 lines
2.8 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
#include "vmlinux.h"
|
|
#include "bpf_experimental.h"
|
|
#include <bpf/bpf_helpers.h>
|
|
#include "bpf_misc.h"
|
|
#include "../test_kmods/bpf_testmod_kfunc.h"
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__success
|
|
int iter_next_trusted(const void *ctx)
|
|
{
|
|
struct task_struct *cur_task = bpf_get_current_task_btf();
|
|
struct bpf_iter_task_vma vma_it;
|
|
struct vm_area_struct *vma_ptr;
|
|
|
|
bpf_iter_task_vma_new(&vma_it, cur_task, 0);
|
|
|
|
vma_ptr = bpf_iter_task_vma_next(&vma_it);
|
|
if (vma_ptr == NULL)
|
|
goto out;
|
|
|
|
bpf_kfunc_trusted_vma_test(vma_ptr);
|
|
out:
|
|
bpf_iter_task_vma_destroy(&vma_it);
|
|
return 0;
|
|
}
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__failure __msg("Possibly NULL pointer passed to trusted arg0")
|
|
int iter_next_trusted_or_null(const void *ctx)
|
|
{
|
|
struct task_struct *cur_task = bpf_get_current_task_btf();
|
|
struct bpf_iter_task_vma vma_it;
|
|
struct vm_area_struct *vma_ptr;
|
|
|
|
bpf_iter_task_vma_new(&vma_it, cur_task, 0);
|
|
|
|
vma_ptr = bpf_iter_task_vma_next(&vma_it);
|
|
|
|
bpf_kfunc_trusted_vma_test(vma_ptr);
|
|
|
|
bpf_iter_task_vma_destroy(&vma_it);
|
|
return 0;
|
|
}
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__success
|
|
int iter_next_rcu(const void *ctx)
|
|
{
|
|
struct task_struct *cur_task = bpf_get_current_task_btf();
|
|
struct bpf_iter_task task_it;
|
|
struct task_struct *task_ptr;
|
|
|
|
bpf_iter_task_new(&task_it, cur_task, 0);
|
|
|
|
task_ptr = bpf_iter_task_next(&task_it);
|
|
if (task_ptr == NULL)
|
|
goto out;
|
|
|
|
bpf_kfunc_rcu_task_test(task_ptr);
|
|
out:
|
|
bpf_iter_task_destroy(&task_it);
|
|
return 0;
|
|
}
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__failure __msg("Possibly NULL pointer passed to trusted arg0")
|
|
int iter_next_rcu_or_null(const void *ctx)
|
|
{
|
|
struct task_struct *cur_task = bpf_get_current_task_btf();
|
|
struct bpf_iter_task task_it;
|
|
struct task_struct *task_ptr;
|
|
|
|
bpf_iter_task_new(&task_it, cur_task, 0);
|
|
|
|
task_ptr = bpf_iter_task_next(&task_it);
|
|
|
|
bpf_kfunc_rcu_task_test(task_ptr);
|
|
|
|
bpf_iter_task_destroy(&task_it);
|
|
return 0;
|
|
}
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__failure __msg("R1 must be referenced or trusted")
|
|
int iter_next_rcu_not_trusted(const void *ctx)
|
|
{
|
|
struct task_struct *cur_task = bpf_get_current_task_btf();
|
|
struct bpf_iter_task task_it;
|
|
struct task_struct *task_ptr;
|
|
|
|
bpf_iter_task_new(&task_it, cur_task, 0);
|
|
|
|
task_ptr = bpf_iter_task_next(&task_it);
|
|
if (task_ptr == NULL)
|
|
goto out;
|
|
|
|
bpf_kfunc_trusted_task_test(task_ptr);
|
|
out:
|
|
bpf_iter_task_destroy(&task_it);
|
|
return 0;
|
|
}
|
|
|
|
SEC("raw_tp/sys_enter")
|
|
__failure __msg("R1 cannot write into rdonly_mem")
|
|
/* Message should not be 'R1 cannot write into rdonly_trusted_mem' */
|
|
int iter_next_ptr_mem_not_trusted(const void *ctx)
|
|
{
|
|
struct bpf_iter_num num_it;
|
|
int *num_ptr;
|
|
|
|
bpf_iter_num_new(&num_it, 0, 10);
|
|
|
|
num_ptr = bpf_iter_num_next(&num_it);
|
|
if (num_ptr == NULL)
|
|
goto out;
|
|
|
|
bpf_kfunc_trusted_num_test(num_ptr);
|
|
out:
|
|
bpf_iter_num_destroy(&num_it);
|
|
return 0;
|
|
}
|