summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c
diff options
context:
space:
mode:
authorMaxim Mikityanskiy <maxim@isovalent.com>2024-01-08 23:52:02 +0300
committerAlexei Starovoitov <ast@kernel.org>2024-01-24 01:40:23 +0300
commit8ecfc371d829bfed75e0ef2cab45b2290b982f64 (patch)
tree5d245cf62f2a544b828f743091ca1fbcde6ee8b6 /tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c
parent87e51ac6cb19c5d33d70d4cae9e26d2a3a5fcba0 (diff)
downloadlinux-8ecfc371d829bfed75e0ef2cab45b2290b982f64.tar.xz
bpf: Assign ID to scalars on spill
Currently, when a scalar bounded register is spilled to the stack, its ID is preserved, but only if was already assigned, i.e. if this register was MOVed before. Assign an ID on spill if none is set, so that equal scalars could be tracked if a register is spilled to the stack and filled into another register. One test is adjusted to reflect the change in register IDs. Signed-off-by: Maxim Mikityanskiy <maxim@isovalent.com> Acked-by: Eduard Zingerman <eddyz87@gmail.com> Link: https://lore.kernel.org/r/20240108205209.838365-9-maxtram95@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c')
-rw-r--r--tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c b/tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c
index be95570ab382..28b602ac9cbe 100644
--- a/tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c
+++ b/tools/testing/selftests/bpf/progs/verifier_direct_packet_access.c
@@ -568,7 +568,7 @@ l0_%=: r0 = 0; \
SEC("tc")
__description("direct packet access: test23 (x += pkt_ptr, 4)")
-__failure __msg("invalid access to packet, off=0 size=8, R5(id=2,off=0,r=0)")
+__failure __msg("invalid access to packet, off=0 size=8, R5(id=3,off=0,r=0)")
__flag(BPF_F_ANY_ALIGNMENT)
__naked void test23_x_pkt_ptr_4(void)
{