From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7408BC433F5 for ; Wed, 8 Dec 2021 19:33:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239605AbhLHTgf (ORCPT ); Wed, 8 Dec 2021 14:36:35 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]:46549 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239598AbhLHTgf (ORCPT ); Wed, 8 Dec 2021 14:36:35 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1638991983; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xfqpItyomI+dtyHvU+6aTJqTVDXGGgAkWkumRRvbZyA=; b=O518/tH6XaZM/8U1qxYCOS5VNQI1783AkbdQftHqTERWpkBA4hwRSr3UFW3imBa08iquy1 ftHMggtBgjJLvsMNaVQfjEiGEZfSvnsDt6eU0fYclHalZ+QZEk5sQyhjqU2uo4n73BfAGu af30w6zyr4RvHiAqcclNVFo80lRE90M= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-573-FKr7LDZkNwmzpw8PvlvblA-1; Wed, 08 Dec 2021 14:33:01 -0500 X-MC-Unique: FKr7LDZkNwmzpw8PvlvblA-1 Received: by mail-wr1-f71.google.com with SMTP id q7-20020adff507000000b0017d160d35a8so665651wro.4 for ; Wed, 08 Dec 2021 11:33:01 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=xfqpItyomI+dtyHvU+6aTJqTVDXGGgAkWkumRRvbZyA=; b=ujLnQfEEKxWHSk1cw/Wa6AmqXu2FROE7gblfA6+tM8tS4W8Lj/59ukPBJvZA6WzKK+ EXU5hyqTsMM9wGLiPdGL8bNu8p0W7luZ9eBbR8NLWoZfkd6K/nAC4NUtmVP7wqv5j2Qv IxBFkgEXQeuhjFo1Tr7ebHa6POsulcLcWZELbT+oq2Xj/rmsijmY1YN5l6BXqm4HbdSt 7nEzPKsJ3iwbKLJanFSOgX8wlgY+Om36vT/YMlna/2ucjfbLdKv7x437TyUZqIjWwWQg 2fycUaawp5dYJsP2+yjehtwRbWmXeSV+IUxbX3eaXCjcEAQq/+8LsZfSc27P/OFSjQN1 XHQQ== X-Gm-Message-State: AOAM533MD/u9caKzOrB7jAysW01vRw4l8Is4QAbWbQPwKs6TcvGwxyDm zshwQTn8zUKSN4igwBS9rVRrRIdAzOC6olc0BGDPaDikY9HoJzYQDtFajz0RWES5vG4PHwZnHD4 WXbdephiRi5We X-Received: by 2002:a5d:464c:: with SMTP id j12mr800146wrs.150.1638991980626; Wed, 08 Dec 2021 11:33:00 -0800 (PST) X-Google-Smtp-Source: ABdhPJy5IsXY/f0H2nXLi7o/OKZGN3lrtAfbpaKvcdnoxc58VS16OwBy9wF0WvldUD4loH89qQ7JnA== X-Received: by 2002:a5d:464c:: with SMTP id j12mr800119wrs.150.1638991980427; Wed, 08 Dec 2021 11:33:00 -0800 (PST) Received: from krava.redhat.com (nat-pool-brq-u.redhat.com. [213.175.37.12]) by smtp.gmail.com with ESMTPSA id t127sm6704194wma.9.2021.12.08.11.32.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 08 Dec 2021 11:33:00 -0800 (PST) From: Jiri Olsa X-Google-Original-From: Jiri Olsa To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh Subject: [PATCHv2 bpf-next 2/5] selftests/bpf: Add test to access int ptr argument in tracing program Date: Wed, 8 Dec 2021 20:32:42 +0100 Message-Id: <20211208193245.172141-3-jolsa@kernel.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211208193245.172141-1-jolsa@kernel.org> References: <20211208193245.172141-1-jolsa@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Adding verifier test for accessing int pointer argument in tracing programs. The test program loads 2nd argument of bpf_modify_return_test function which is int pointer and checks that verifier allows that. Signed-off-by: Jiri Olsa --- .../testing/selftests/bpf/verifier/btf_ctx_access.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 tools/testing/selftests/bpf/verifier/btf_ctx_access.c diff --git a/tools/testing/selftests/bpf/verifier/btf_ctx_access.c b/tools/testing/selftests/bpf/verifier/btf_ctx_access.c new file mode 100644 index 000000000000..6340db6b46dc --- /dev/null +++ b/tools/testing/selftests/bpf/verifier/btf_ctx_access.c @@ -0,0 +1,12 @@ +{ + "btf_ctx_access accept", + .insns = { + BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 8), /* load 2nd argument value (int pointer) */ + BPF_MOV64_IMM(BPF_REG_0, 0), + BPF_EXIT_INSN(), + }, + .result = ACCEPT, + .prog_type = BPF_PROG_TYPE_TRACING, + .expected_attach_type = BPF_TRACE_FENTRY, + .kfunc = "bpf_modify_return_test", +}, -- 2.33.1