diff options
author | Benjamin Tissoires <benjamin.tissoires@redhat.com> | 2022-09-06 17:13:00 +0200 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2022-09-07 11:04:27 -0700 |
commit | fb66223a244f252273995557b23e0fa53092e92c (patch) | |
tree | dcf688c426b2db8ce56f2b755be5f0e7c50b2d38 /kernel/bpf/btf.c | |
parent | 15baa55ff5b00b81bcd9874b89cb8e0b0daaa13d (diff) | |
download | lwn-fb66223a244f252273995557b23e0fa53092e92c.tar.gz lwn-fb66223a244f252273995557b23e0fa53092e92c.zip |
selftests/bpf: add test for accessing ctx from syscall program type
We need to also export the kfunc set to the syscall program type,
and then add a couple of eBPF programs that are testing those calls.
The first one checks for valid access, and the second one is OK
from a static analysis point of view but fails at run time because
we are trying to access outside of the allocated memory.
Signed-off-by: Benjamin Tissoires <benjamin.tissoires@redhat.com>
Link: https://lore.kernel.org/r/20220906151303.2780789-5-benjamin.tissoires@redhat.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'kernel/bpf/btf.c')
0 files changed, 0 insertions, 0 deletions