Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1004739yba; Thu, 4 Apr 2019 02:12:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/4bM2+stLeMqW915nh9SptqlBvgFkHO6ah8RdXboFLPdri9kGy1Wxja0biH0pG8ha/n9A X-Received: by 2002:a17:902:d701:: with SMTP id w1mr5344389ply.124.1554369178210; Thu, 04 Apr 2019 02:12:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554369178; cv=none; d=google.com; s=arc-20160816; b=rSLI829fx3mzwKiXtILc2qpgo6XusJS+q4BZ+rqUxw9ZtcMLd87vNT8OfIOh/mqJgz 7FwQIwS8NNrJeIrc5dEH8TMb61FCJ73RpmhozGg7M1ByeIdmslL7SWBVPolsUQwc8AwF AP5umTM5hjVGLwIzR0CdkRAWU/Ekrq6jK5ixKBCCWAM379jClJUFEPE7Kl+GTC4B93rU 31n/NZAmuc9IGWF0WXZjCAiCwud0xh+LDg5JuoYcwzGFQ5iKa2tnEai2U4LDhHakMLAr +Qe2p6Cs5XN2SqmseSAXHJESnEfBnK2Cvd3aY5Wa0kG2rTx5lns/ff5yPA4QnInzFq0/ sdQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=joV0r1EzYoc74sHHbLvFdeBp1DxN4cgrkwhI3G//YEo=; b=uuXISPamlZU8SS7LA5MvO1c9KXvED9cFIYJckQOaLTr6SMGZn3GCMF6qDQqkh1o2zm RZnyWwBbYa0AeGfxHnKi6z4YaFkqX/B/bdOh6PCHUWcu56DvwcYFqhuvzQrm2UsvwOnZ nec+G3d8VuYdvI6Jw6X1qEvjtW1ZTD7wa7dAhXsKTzBLfc3iiJOz0/nrj2oF784Ptnl7 Y/UQHLIgtL9UqpW0n/P4+xndYWlr2uGg8D3HAkihXctZeIru/riQgqdmw5GOcDIIS/zk lyIC9DKFXlDyM65YlG/MOihdMQxcA4pKOaqWwVsaq468nT52hSf/5nK6E/e1f7tGlwMa 3CbQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XTsCyCQV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k1si9294670pgq.219.2019.04.04.02.12.43; Thu, 04 Apr 2019 02:12:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XTsCyCQV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733083AbfDDJKy (ORCPT + 99 others); Thu, 4 Apr 2019 05:10:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:50676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732400AbfDDJKx (ORCPT ); Thu, 4 Apr 2019 05:10:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6307820693; Thu, 4 Apr 2019 09:10:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554369052; bh=H3zYd6LHv8vPWev23ZRMQ85KTBmETVrvz+AKsxpdCEE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XTsCyCQVySGneS87In+BT8+vITsu4Ugl0CuPpQlyp1jEicW1cOMewggPFbgG98orC H5yx8b5pEMkRlp8taOwgNLQ3xq8f6rdUii3H/WzMQOANXxW5wo8iEk8yFbEWKccSWZ 26Yla6icubltucnY1RsTJLyB6YdyrqTaZQDfbImE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yonghong Song , Andrii Nakryiko , Alexei Starovoitov , Sasha Levin Subject: [PATCH 5.0 065/246] tools/bpf: selftests: add map lookup to test_map_in_map bpf prog Date: Thu, 4 Apr 2019 10:46:05 +0200 Message-Id: <20190404084621.431369805@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084619.236418459@linuxfoundation.org> References: <20190404084619.236418459@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 9eca5083757b679b37f210092c871916c2c222d0 ] The bpf_map_lookup_elem is added in the bpf program. Without previous patch, the test change will trigger the following error: $ ./test_maps ... ; value_p = bpf_map_lookup_elem(map, &key); 20: (bf) r1 = r7 21: (bf) r2 = r8 22: (85) call bpf_map_lookup_elem#1 ; if (!value_p || *value_p != 123) 23: (15) if r0 == 0x0 goto pc+16 R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm ; if (!value_p || *value_p != 123) 24: (61) r1 = *(u32 *)(r0 +0) R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm bpf_spin_lock cannot be accessed directly by load/store With the kernel fix in the previous commit, the error goes away. Signed-off-by: Yonghong Song Acked-by: Andrii Nakryiko Signed-off-by: Alexei Starovoitov Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_map_in_map.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tools/testing/selftests/bpf/test_map_in_map.c b/tools/testing/selftests/bpf/test_map_in_map.c index ce923e67e08e..2985f262846e 100644 --- a/tools/testing/selftests/bpf/test_map_in_map.c +++ b/tools/testing/selftests/bpf/test_map_in_map.c @@ -27,6 +27,7 @@ SEC("xdp_mimtest") int xdp_mimtest0(struct xdp_md *ctx) { int value = 123; + int *value_p; int key = 0; void *map; @@ -35,6 +36,9 @@ int xdp_mimtest0(struct xdp_md *ctx) return XDP_DROP; bpf_map_update_elem(map, &key, &value, 0); + value_p = bpf_map_lookup_elem(map, &key); + if (!value_p || *value_p != 123) + return XDP_DROP; map = bpf_map_lookup_elem(&mim_hash, &key); if (!map) -- 2.19.1