Adding verifier test for accessing u32 pointer argument in tracing programs. The test program loads 1nd argument of bpf_fentry_test9 function which is u32 pointer and checks that verifier allows that. Co-developed-by: Chengming Zhou <zhouchengming@bytedance.com> Signed-off-by: Chengming Zhou <zhouchengming@bytedance.com> Signed-off-by: Feng Zhou <zhoufeng.zf@bytedance.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Jiri Olsa <jolsa@kernel.org> Link: https://lore.kernel.org/bpf/20230410085908.98493-3-zhoufeng.zf@bytedance.com |
||
|---|---|---|
| .. | ||
| .gitignore | ||
| atomic_and.c | ||
| atomic_bounds.c | ||
| atomic_cmpxchg.c | ||
| atomic_fetch.c | ||
| atomic_fetch_add.c | ||
| atomic_invalid.c | ||
| atomic_or.c | ||
| atomic_xchg.c | ||
| atomic_xor.c | ||
| basic.c | ||
| basic_call.c | ||
| basic_instr.c | ||
| basic_stx_ldx.c | ||
| bounds.c | ||
| bpf_get_stack.c | ||
| bpf_loop_inline.c | ||
| bpf_st_mem.c | ||
| btf_ctx_access.c | ||
| calls.c | ||
| ctx.c | ||
| ctx_sk_lookup.c | ||
| ctx_skb.c | ||
| d_path.c | ||
| dead_code.c | ||
| direct_packet_access.c | ||
| direct_value_access.c | ||
| event_output.c | ||
| jeq_infer_not_null.c | ||
| jit.c | ||
| jmp32.c | ||
| jset.c | ||
| jump.c | ||
| junk_insn.c | ||
| ld_abs.c | ||
| ld_dw.c | ||
| ld_imm64.c | ||
| loops1.c | ||
| lwt.c | ||
| map_in_map.c | ||
| map_kptr.c | ||
| map_ptr_mixing.c | ||
| perf_event_sample_period.c | ||
| precise.c | ||
| prevent_map_lookup.c | ||
| ref_tracking.c | ||
| regalloc.c | ||
| runtime_jit.c | ||
| scale.c | ||
| search_pruning.c | ||
| sleepable.c | ||
| sock.c | ||
| spin_lock.c | ||
| subreg.c | ||
| unpriv.c | ||
| value_illegal_alu.c | ||
| value_ptr_arith.c | ||
| wide_access.c | ||