summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/progs/verifier_raw_stack.c
diff options
context:
space:
mode:
authorAndrii Nakryiko <andrii@kernel.org>2024-01-03 10:37:57 -0800
committerAndrii Nakryiko <andrii@kernel.org>2024-01-03 10:37:57 -0800
commita640de4cf9fec0caf43ccb7404ec9f0fde9a6a65 (patch)
treed58e59ba6536fc754d8aed14bd7ef6a2a3fe2be0 /tools/testing/selftests/bpf/progs/verifier_raw_stack.c
parent2ab1efad60ad119b616722b81eeb73060728028c (diff)
parent72187506de4f19fcc8ae63a2b2f36d75e5259d9d (diff)
Merge branch 'bpf-simplify-checking-size-of-helper-accesses'
Andrei Matei says: ==================== bpf: Simplify checking size of helper accesses v3->v4: - kept only the minimal change, undoing debatable changes (Andrii) - dropped the second patch from before, with changes to the error message (Andrii) - extracted the new test into a separate patch (Andrii) - added Acked by Andrii v2->v3: - split the error-logging function to a separate patch (Andrii) - make the error buffers smaller (Andrii) - include size of memory region for PTR_TO_MEM (Andrii) - nits from Andrii and Eduard v1->v2: - make the error message include more info about the context of the zero-sized access (Andrii) ==================== Link: https://lore.kernel.org/r/20231221232225.568730-1-andreimatei1@gmail.com Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/progs/verifier_raw_stack.c')
-rw-r--r--tools/testing/selftests/bpf/progs/verifier_raw_stack.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/testing/selftests/bpf/progs/verifier_raw_stack.c b/tools/testing/selftests/bpf/progs/verifier_raw_stack.c
index f67390224a9c..7cc83acac727 100644
--- a/tools/testing/selftests/bpf/progs/verifier_raw_stack.c
+++ b/tools/testing/selftests/bpf/progs/verifier_raw_stack.c
@@ -64,7 +64,7 @@ __naked void load_bytes_negative_len_2(void)
SEC("tc")
__description("raw_stack: skb_load_bytes, zero len")
-__failure __msg("invalid zero-sized read")
+__failure __msg("R4 invalid zero-sized read: u64=[0,0]")
__naked void skb_load_bytes_zero_len(void)
{
asm volatile (" \