Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp403890pxj; Thu, 20 May 2021 12:02:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzvs5zR8czb6/ptXnNo0Pyo2VxvUqdnYNkS6a9A+XTMX46w8aFKGg9In5OvombnKlAeEvtY X-Received: by 2002:a05:6638:dd2:: with SMTP id m18mr8536170jaj.40.1621537320080; Thu, 20 May 2021 12:02:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621537320; cv=none; d=google.com; s=arc-20160816; b=Kb55Te+pgCsyqO6KVKYRDzIMsMLQ9MY20/2vRQxEmrh99E8u+RDyF48UC2VnneDZJZ w6mqRDG37p7AJdv/U/c+GtdP9aoX5KphQNHevBgcdVsISQMcQW3PUMRuQrWSCj2IDq1e AB5Y+sHcDEXAbXRnqZGYQYUzwRwCR8lLgprKREuLCuVduvYj6CR1JxcaPAK4SUQWGzLv sYpnyZMTBB9hfVX14oXbdUt92ZVCEiy5TP43BHgbR2Rf9We0aua7K/q3cngtUTzWUiKb yZd+lyZKPmMFYSqM6d21ITuJVu0flk3/lE2c7PlvfKZ/UtblJatYzYi/lumIEgR3R2OU 1/nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XU2RuXFTAz7kiQfabCq6tTUOhCcoxQv9YdBnoT0fGvg=; b=xJOxzL5m+cwI0DC77Vx2NhMNszYRxX31cLS8JBiG4aUvDH4YZzhS41QyIIm6gdBgSL petVgOVYAF0bxa2GwQ8Sr/G08LeasTpHDZG3HAVSSm9ilaYELUDU9fU4gHU+/4CF2vq1 ABQxNWlBwoQQeXAmL/IkoZWmnUgUSfAfE6OUT6r7KlC73/ZtxcOCbBRO2a+s/enp9VKO kb585DdiGIdAU+qoDsier5MMUEsG/aGMqkobv4+bIvMMb1BZ1SjVyQi6ULvCk8xms4SP fBXRQjor2ExTlj7DmyUcFXcSugm5+TXIvqJ/mdNd7CV+s7F2lsQbrBK/gpKR8mNURf6P Nxdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QE41QeH6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x5si3464600ilu.59.2021.05.20.12.01.46; Thu, 20 May 2021 12:02:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QE41QeH6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236409AbhETK2Q (ORCPT + 99 others); Thu, 20 May 2021 06:28:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:47766 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236476AbhETKPU (ORCPT ); Thu, 20 May 2021 06:15:20 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 343406198F; Thu, 20 May 2021 09:45:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621503934; bh=vkFFtSBmwEKNYszD+U0WXB2my47SbLhZne37+HJ8phQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QE41QeH6kYfkaURSWJl7BGBGY8PhpM7nGMZY0u1C//lXPkPysoW+A8mwtvW56zZKy 8gLnJSs5M0IQiyDVf5EHJubGUQvz2S7VExJWFpFqFYusDNV9tmXYTTsDrRREm19MQO ikn28Zi80sXy38BYdMPOzAJiAn+YhbY94wVuYi7E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , Frank van der Linden Subject: [PATCH 4.14 005/323] bpf: fix up selftests after backports were fixed Date: Thu, 20 May 2021 11:18:17 +0200 Message-Id: <20210520092120.308727153@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210520092120.115153432@linuxfoundation.org> References: <20210520092120.115153432@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank van der Linden After the backport of the changes to fix CVE 2019-7308, the selftests also need to be fixed up, as was done originally in mainline 80c9b2fae87b ("bpf: add various test cases to selftests"). 4.14 commit 03f11a51a19 ("bpf: Fix selftests are changes for CVE 2019-7308") did that, but since there was an error in the backport, some selftests did not change output. So, add them now that this error has been fixed, and their output has actually changed as expected. This adds the rest of the changed test outputs from 80c9b2fae87b. Fixes: 03f11a51a19 ("bpf: Fix selftests are changes for CVE 2019-7308") Signed-off-by: Frank van der Linden Signed-off-by: Greg Kroah-Hartman --- tools/testing/selftests/bpf/test_verifier.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) --- a/tools/testing/selftests/bpf/test_verifier.c +++ b/tools/testing/selftests/bpf/test_verifier.c @@ -6207,6 +6207,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6231,6 +6232,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6257,6 +6259,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R8 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6282,6 +6285,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R8 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6330,6 +6334,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6401,6 +6406,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6452,6 +6458,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6479,6 +6486,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6505,6 +6513,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6534,6 +6543,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R7 has unknown scalar with mixed signed bounds", .result = REJECT, }, { @@ -6592,6 +6602,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "unbounded min value", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, .result_unpriv = REJECT, }, @@ -6644,6 +6655,7 @@ static struct bpf_test tests[] = { }, .fixup_map1 = { 3 }, .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.", + .errstr_unpriv = "R1 has unknown scalar with mixed signed bounds", .result = REJECT, }, {