aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/bpf/verifier/int_ptr.c
diff options
context:
space:
mode:
authorAndrei Matei <andreimatei1@gmail.com>2021-02-06 20:10:25 -0500
committerAlexei Starovoitov <ast@kernel.org>2021-02-10 10:44:19 -0800
commita680cb3d8e3f4f84205720b90c926579d04eedb6 (patch)
tree188871999a147071d840bd74f261e59004e06888 /tools/testing/selftests/bpf/verifier/int_ptr.c
parentbpf: Allow variable-offset stack access (diff)
downloadlinux-dev-a680cb3d8e3f4f84205720b90c926579d04eedb6.tar.xz
linux-dev-a680cb3d8e3f4f84205720b90c926579d04eedb6.zip
selftest/bpf: Adjust expected verifier errors
The verifier errors around stack accesses have changed slightly in the previous commit (generally for the better). Signed-off-by: Andrei Matei <andreimatei1@gmail.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20210207011027.676572-3-andreimatei1@gmail.com
Diffstat (limited to 'tools/testing/selftests/bpf/verifier/int_ptr.c')
-rw-r--r--tools/testing/selftests/bpf/verifier/int_ptr.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/tools/testing/selftests/bpf/verifier/int_ptr.c b/tools/testing/selftests/bpf/verifier/int_ptr.c
index ca3b4729df66..070893fb2900 100644
--- a/tools/testing/selftests/bpf/verifier/int_ptr.c
+++ b/tools/testing/selftests/bpf/verifier/int_ptr.c
@@ -27,7 +27,7 @@
},
.result = REJECT,
.prog_type = BPF_PROG_TYPE_CGROUP_SYSCTL,
- .errstr = "invalid indirect read from stack off -16+0 size 8",
+ .errstr = "invalid indirect read from stack R4 off -16+0 size 8",
},
{
"ARG_PTR_TO_LONG half-uninitialized",
@@ -59,7 +59,7 @@
},
.result = REJECT,
.prog_type = BPF_PROG_TYPE_CGROUP_SYSCTL,
- .errstr = "invalid indirect read from stack off -16+4 size 8",
+ .errstr = "invalid indirect read from stack R4 off -16+4 size 8",
},
{
"ARG_PTR_TO_LONG misaligned",
@@ -125,7 +125,7 @@
},
.result = REJECT,
.prog_type = BPF_PROG_TYPE_CGROUP_SYSCTL,
- .errstr = "invalid stack type R4 off=-4 access_size=8",
+ .errstr = "invalid indirect access to stack R4 off=-4 size=8",
},
{
"ARG_PTR_TO_LONG initialized",