diff options
author | Jiri Olsa <jolsa@redhat.com> | 2021-12-08 20:32:41 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2021-12-13 09:24:21 -0800 |
commit | bb6728d756112596881a5fdf2040544031905840 (patch) | |
tree | d585a63c5c0c3f956cf605f9ce3cbe680dc93778 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c | |
parent | 4b443bc1785f28df56fdbd6a107dc68ef7d5aa8e (diff) |
bpf: Allow access to int pointer arguments in tracing programs
Adding support to access arguments with int pointer arguments
in tracing programs.
Currently we allow tracing programs to access only pointers to
string (char pointer), void pointers and pointers to structs.
If we try to access argument which is pointer to int, verifier
will fail to load the program with;
R1 type=ctx expected=fp
; int BPF_PROG(fmod_ret_test, int _a, __u64 _b, int _ret)
0: (bf) r6 = r1
; int BPF_PROG(fmod_ret_test, int _a, __u64 _b, int _ret)
1: (79) r9 = *(u64 *)(r6 +8)
func 'bpf_modify_return_test' arg1 type INT is not a struct
There is no harm for the program to access int pointer argument.
We are already doing that for string pointer, which is pointer
to int with 1 byte size.
Changing the is_string_ptr to generic integer check and renaming
it to btf_type_is_int.
Signed-off-by: Jiri Olsa <jolsa@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20211208193245.172141-2-jolsa@kernel.org
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions