File: test_struct_ops_maybe_null.c

package info (click to toggle)
linux 6.19.2-1~exp1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 1,759,612 kB
  • sloc: ansic: 27,004,852; asm: 273,402; sh: 151,313; python: 81,277; makefile: 58,544; perl: 34,311; xml: 21,064; cpp: 5,984; yacc: 4,841; lex: 2,901; awk: 1,707; sed: 30; ruby: 25
file content (46 lines) | stat: -rw-r--r-- 1,265 bytes parent folder | download | duplicates (23)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2024 Meta Platforms, Inc. and affiliates. */
#include <test_progs.h>

#include "struct_ops_maybe_null.skel.h"
#include "struct_ops_maybe_null_fail.skel.h"

/* Test that the verifier accepts a program that access a nullable pointer
 * with a proper check.
 */
static void maybe_null(void)
{
	struct struct_ops_maybe_null *skel;

	skel = struct_ops_maybe_null__open_and_load();
	if (!ASSERT_OK_PTR(skel, "struct_ops_module_open_and_load"))
		return;

	struct_ops_maybe_null__destroy(skel);
}

/* Test that the verifier rejects a program that access a nullable pointer
 * without a check beforehand.
 */
static void maybe_null_fail(void)
{
	struct struct_ops_maybe_null_fail *skel;

	skel = struct_ops_maybe_null_fail__open_and_load();
	if (ASSERT_ERR_PTR(skel, "struct_ops_module_fail__open_and_load"))
		return;

	struct_ops_maybe_null_fail__destroy(skel);
}

void test_struct_ops_maybe_null(void)
{
	/* The verifier verifies the programs at load time, so testing both
	 * programs in the same compile-unit is complicated. We run them in
	 * separate objects to simplify the testing.
	 */
	if (test__start_subtest("maybe_null"))
		maybe_null();
	if (test__start_subtest("maybe_null_fail"))
		maybe_null_fail();
}