Commit cbb110bc authored by Eduard Zingerman's avatar Eduard Zingerman Committed by Alexei Starovoitov

selftests/bpf: populate map_array_ro map for verifier_array_access test

Two test cases:
- "valid read map access into a read-only array 1" and
- "valid read map access into a read-only array 2"

Expect that map_array_ro map is filled with mock data. This logic was
not taken into acount during initial test conversion.

This commit modifies prog_tests/verifier.c entry point for this test
to fill the map.

Fixes: a3c830ae ("selftests/bpf: verifier/array_access.c converted to inline assembly")
Signed-off-by: default avatarEduard Zingerman <eddyz87@gmail.com>
Link: https://lore.kernel.org/r/20230420232317.2181776-5-eddyz87@gmail.comSigned-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
parent 5b22f4d1
...@@ -44,8 +44,17 @@ ...@@ -44,8 +44,17 @@
#include "verifier_xdp.skel.h" #include "verifier_xdp.skel.h"
#include "verifier_xdp_direct_packet_access.skel.h" #include "verifier_xdp_direct_packet_access.skel.h"
#define MAX_ENTRIES 11
struct test_val {
unsigned int index;
int foo[MAX_ENTRIES];
};
__maybe_unused __maybe_unused
static void run_tests_aux(const char *skel_name, skel_elf_bytes_fn elf_bytes_factory) static void run_tests_aux(const char *skel_name,
skel_elf_bytes_fn elf_bytes_factory,
pre_execution_cb pre_execution_cb)
{ {
struct test_loader tester = {}; struct test_loader tester = {};
__u64 old_caps; __u64 old_caps;
...@@ -58,6 +67,7 @@ static void run_tests_aux(const char *skel_name, skel_elf_bytes_fn elf_bytes_fac ...@@ -58,6 +67,7 @@ static void run_tests_aux(const char *skel_name, skel_elf_bytes_fn elf_bytes_fac
return; return;
} }
test_loader__set_pre_execution_cb(&tester, pre_execution_cb);
test_loader__run_subtests(&tester, skel_name, elf_bytes_factory); test_loader__run_subtests(&tester, skel_name, elf_bytes_factory);
test_loader_fini(&tester); test_loader_fini(&tester);
...@@ -66,10 +76,9 @@ static void run_tests_aux(const char *skel_name, skel_elf_bytes_fn elf_bytes_fac ...@@ -66,10 +76,9 @@ static void run_tests_aux(const char *skel_name, skel_elf_bytes_fn elf_bytes_fac
PRINT_FAIL("failed to restore CAP_SYS_ADMIN: %i, %s\n", err, strerror(err)); PRINT_FAIL("failed to restore CAP_SYS_ADMIN: %i, %s\n", err, strerror(err));
} }
#define RUN(skel) run_tests_aux(#skel, skel##__elf_bytes) #define RUN(skel) run_tests_aux(#skel, skel##__elf_bytes, NULL)
void test_verifier_and(void) { RUN(verifier_and); } void test_verifier_and(void) { RUN(verifier_and); }
void test_verifier_array_access(void) { RUN(verifier_array_access); }
void test_verifier_basic_stack(void) { RUN(verifier_basic_stack); } void test_verifier_basic_stack(void) { RUN(verifier_basic_stack); }
void test_verifier_bounds_deduction(void) { RUN(verifier_bounds_deduction); } void test_verifier_bounds_deduction(void) { RUN(verifier_bounds_deduction); }
void test_verifier_bounds_deduction_non_const(void) { RUN(verifier_bounds_deduction_non_const); } void test_verifier_bounds_deduction_non_const(void) { RUN(verifier_bounds_deduction_non_const); }
...@@ -108,3 +117,30 @@ void test_verifier_var_off(void) { RUN(verifier_var_off); } ...@@ -108,3 +117,30 @@ void test_verifier_var_off(void) { RUN(verifier_var_off); }
void test_verifier_xadd(void) { RUN(verifier_xadd); } void test_verifier_xadd(void) { RUN(verifier_xadd); }
void test_verifier_xdp(void) { RUN(verifier_xdp); } void test_verifier_xdp(void) { RUN(verifier_xdp); }
void test_verifier_xdp_direct_packet_access(void) { RUN(verifier_xdp_direct_packet_access); } void test_verifier_xdp_direct_packet_access(void) { RUN(verifier_xdp_direct_packet_access); }
static int init_array_access_maps(struct bpf_object *obj)
{
struct bpf_map *array_ro;
struct test_val value = {
.index = (6 + 1) * sizeof(int),
.foo[6] = 0xabcdef12,
};
int err, key = 0;
array_ro = bpf_object__find_map_by_name(obj, "map_array_ro");
if (!ASSERT_OK_PTR(array_ro, "lookup map_array_ro"))
return -EINVAL;
err = bpf_map_update_elem(bpf_map__fd(array_ro), &key, &value, 0);
if (!ASSERT_OK(err, "map_array_ro update"))
return err;
return 0;
}
void test_verifier_array_access(void)
{
run_tests_aux("verifier_array_access",
verifier_array_access__elf_bytes,
init_array_access_maps);
}
...@@ -330,7 +330,7 @@ l0_%=: exit; \ ...@@ -330,7 +330,7 @@ l0_%=: exit; \
SEC("socket") SEC("socket")
__description("valid read map access into a read-only array 1") __description("valid read map access into a read-only array 1")
__success __success_unpriv /* __retval(28) temporarily disable */ __success __success_unpriv __retval(28)
__naked void a_read_only_array_1_1(void) __naked void a_read_only_array_1_1(void)
{ {
asm volatile (" \ asm volatile (" \
...@@ -351,7 +351,7 @@ l0_%=: exit; \ ...@@ -351,7 +351,7 @@ l0_%=: exit; \
SEC("tc") SEC("tc")
__description("valid read map access into a read-only array 2") __description("valid read map access into a read-only array 2")
__success /* __retval(65507) temporarily disable */ __success __retval(65507)
__naked void a_read_only_array_2_1(void) __naked void a_read_only_array_2_1(void)
{ {
asm volatile (" \ asm volatile (" \
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment