Searched hist:"22 ed8d5a46520ef0f060e7c0ee91f1cc6f684400" (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | kfunc_call_fail.c | diff 22ed8d5a46520ef0f060e7c0ee91f1cc6f684400 Tue Sep 06 10:13:03 CDT 2022 Benjamin Tissoires <benjamin.tissoires@redhat.com> selftests/bpf: Add tests for kfunc returning a memory pointer
We add 2 new kfuncs that are following the RET_PTR_TO_MEM capability from the previous commit. Then we test them in selftests: the first tests are testing valid case, and are not failing, and the later ones are actually preventing the program to be loaded because they are wrong.
To work around that, we mark the failing ones as not autoloaded (with SEC("?tc")), and we manually enable them one by one, ensuring the verifier rejects them.
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com> Link: https://lore.kernel.org/r/20220906151303.2780789-8-benjamin.tissoires@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
|
H A D | kfunc_call_test.c | diff 22ed8d5a46520ef0f060e7c0ee91f1cc6f684400 Tue Sep 06 10:13:03 CDT 2022 Benjamin Tissoires <benjamin.tissoires@redhat.com> selftests/bpf: Add tests for kfunc returning a memory pointer
We add 2 new kfuncs that are following the RET_PTR_TO_MEM capability from the previous commit. Then we test them in selftests: the first tests are testing valid case, and are not failing, and the later ones are actually preventing the program to be loaded because they are wrong.
To work around that, we mark the failing ones as not autoloaded (with SEC("?tc")), and we manually enable them one by one, ensuring the verifier rejects them.
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com> Link: https://lore.kernel.org/r/20220906151303.2780789-8-benjamin.tissoires@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | kfunc_call.c | diff 22ed8d5a46520ef0f060e7c0ee91f1cc6f684400 Tue Sep 06 10:13:03 CDT 2022 Benjamin Tissoires <benjamin.tissoires@redhat.com> selftests/bpf: Add tests for kfunc returning a memory pointer
We add 2 new kfuncs that are following the RET_PTR_TO_MEM capability from the previous commit. Then we test them in selftests: the first tests are testing valid case, and are not failing, and the later ones are actually preventing the program to be loaded because they are wrong.
To work around that, we mark the failing ones as not autoloaded (with SEC("?tc")), and we manually enable them one by one, ensuring the verifier rejects them.
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com> Link: https://lore.kernel.org/r/20220906151303.2780789-8-benjamin.tissoires@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
|
/openbmc/linux/net/bpf/ |
H A D | test_run.c | diff 22ed8d5a46520ef0f060e7c0ee91f1cc6f684400 Tue Sep 06 10:13:03 CDT 2022 Benjamin Tissoires <benjamin.tissoires@redhat.com> selftests/bpf: Add tests for kfunc returning a memory pointer
We add 2 new kfuncs that are following the RET_PTR_TO_MEM capability from the previous commit. Then we test them in selftests: the first tests are testing valid case, and are not failing, and the later ones are actually preventing the program to be loaded because they are wrong.
To work around that, we mark the failing ones as not autoloaded (with SEC("?tc")), and we manually enable them one by one, ensuring the verifier rejects them.
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com> Link: https://lore.kernel.org/r/20220906151303.2780789-8-benjamin.tissoires@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
|