Skip to content

Commit 9bc499b

Browse files
iii-iborkmann
authored andcommitted
bpf, selftests: Use bpf_probe_read_kernel
Since commit 0ebeea8 ("bpf: Restrict bpf_probe_read{, str}() only to archs where they work") 44 verifier tests fail on s390 due to not having bpf_probe_read anymore. Fix by using bpf_probe_read_kernel. Signed-off-by: Ilya Leoshkevich <[email protected]> Signed-off-by: Daniel Borkmann <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
1 parent 33d21f1 commit 9bc499b

File tree

4 files changed

+48
-48
lines changed

4 files changed

+48
-48
lines changed

tools/testing/selftests/bpf/verifier/const_or.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
BPF_MOV64_IMM(BPF_REG_2, 34),
77
BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 13),
88
BPF_MOV64_IMM(BPF_REG_3, 0),
9-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
9+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
1010
BPF_EXIT_INSN(),
1111
},
1212
.result = ACCEPT,
@@ -20,7 +20,7 @@
2020
BPF_MOV64_IMM(BPF_REG_2, 34),
2121
BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 24),
2222
BPF_MOV64_IMM(BPF_REG_3, 0),
23-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
23+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
2424
BPF_EXIT_INSN(),
2525
},
2626
.errstr = "invalid stack type R1 off=-48 access_size=58",
@@ -36,7 +36,7 @@
3636
BPF_MOV64_IMM(BPF_REG_4, 13),
3737
BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
3838
BPF_MOV64_IMM(BPF_REG_3, 0),
39-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
39+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
4040
BPF_EXIT_INSN(),
4141
},
4242
.result = ACCEPT,
@@ -51,7 +51,7 @@
5151
BPF_MOV64_IMM(BPF_REG_4, 24),
5252
BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
5353
BPF_MOV64_IMM(BPF_REG_3, 0),
54-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
54+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
5555
BPF_EXIT_INSN(),
5656
},
5757
.errstr = "invalid stack type R1 off=-48 access_size=58",

tools/testing/selftests/bpf/verifier/helper_access_var_len.c

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
BPF_MOV64_IMM(BPF_REG_4, 0),
2020
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
2121
BPF_MOV64_IMM(BPF_REG_3, 0),
22-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
22+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
2323
BPF_MOV64_IMM(BPF_REG_0, 0),
2424
BPF_EXIT_INSN(),
2525
},
@@ -36,7 +36,7 @@
3636
BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
3737
BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
3838
BPF_MOV64_IMM(BPF_REG_3, 0),
39-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
39+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
4040
BPF_EXIT_INSN(),
4141
},
4242
.errstr = "invalid indirect read from stack off -64+0 size 64",
@@ -55,7 +55,7 @@
5555
BPF_MOV64_IMM(BPF_REG_4, 0),
5656
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
5757
BPF_MOV64_IMM(BPF_REG_3, 0),
58-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
58+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
5959
BPF_MOV64_IMM(BPF_REG_0, 0),
6060
BPF_EXIT_INSN(),
6161
},
@@ -84,7 +84,7 @@
8484
BPF_MOV64_IMM(BPF_REG_4, 0),
8585
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
8686
BPF_MOV64_IMM(BPF_REG_3, 0),
87-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
87+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
8888
BPF_MOV64_IMM(BPF_REG_0, 0),
8989
BPF_EXIT_INSN(),
9090
},
@@ -112,7 +112,7 @@
112112
BPF_MOV64_IMM(BPF_REG_4, 0),
113113
BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
114114
BPF_MOV64_IMM(BPF_REG_3, 0),
115-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
115+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
116116
BPF_MOV64_IMM(BPF_REG_0, 0),
117117
BPF_EXIT_INSN(),
118118
},
@@ -132,7 +132,7 @@
132132
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 3),
133133
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
134134
BPF_MOV64_IMM(BPF_REG_3, 0),
135-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
135+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
136136
BPF_MOV64_IMM(BPF_REG_0, 0),
137137
BPF_EXIT_INSN(),
138138
},
@@ -152,7 +152,7 @@
152152
BPF_MOV64_IMM(BPF_REG_4, 0),
153153
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
154154
BPF_MOV64_IMM(BPF_REG_3, 0),
155-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
155+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
156156
BPF_MOV64_IMM(BPF_REG_0, 0),
157157
BPF_EXIT_INSN(),
158158
},
@@ -171,7 +171,7 @@
171171
BPF_MOV64_IMM(BPF_REG_4, 0),
172172
BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
173173
BPF_MOV64_IMM(BPF_REG_3, 0),
174-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
174+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
175175
BPF_MOV64_IMM(BPF_REG_0, 0),
176176
BPF_EXIT_INSN(),
177177
},
@@ -190,7 +190,7 @@
190190
BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
191191
BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 3),
192192
BPF_MOV64_IMM(BPF_REG_3, 0),
193-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
193+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
194194
BPF_MOV64_IMM(BPF_REG_0, 0),
195195
BPF_EXIT_INSN(),
196196
},
@@ -208,7 +208,7 @@
208208
BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
209209
BPF_JMP_IMM(BPF_JSGT, BPF_REG_2, 64, 3),
210210
BPF_MOV64_IMM(BPF_REG_3, 0),
211-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
211+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
212212
BPF_MOV64_IMM(BPF_REG_0, 0),
213213
BPF_EXIT_INSN(),
214214
},
@@ -233,7 +233,7 @@
233233
BPF_MOV64_IMM(BPF_REG_4, 0),
234234
BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
235235
BPF_MOV64_IMM(BPF_REG_3, 0),
236-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
236+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
237237
BPF_MOV64_IMM(BPF_REG_0, 0),
238238
BPF_EXIT_INSN(),
239239
},
@@ -259,7 +259,7 @@
259259
BPF_MOV64_IMM(BPF_REG_4, 0),
260260
BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
261261
BPF_MOV64_IMM(BPF_REG_3, 0),
262-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
262+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
263263
BPF_MOV64_IMM(BPF_REG_0, 0),
264264
BPF_EXIT_INSN(),
265265
},
@@ -286,7 +286,7 @@
286286
BPF_MOV64_IMM(BPF_REG_4, 0),
287287
BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
288288
BPF_MOV64_IMM(BPF_REG_3, 0),
289-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
289+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
290290
BPF_MOV64_IMM(BPF_REG_0, 0),
291291
BPF_EXIT_INSN(),
292292
},
@@ -313,7 +313,7 @@
313313
BPF_MOV64_IMM(BPF_REG_4, 0),
314314
BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
315315
BPF_MOV64_IMM(BPF_REG_3, 0),
316-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
316+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
317317
BPF_MOV64_IMM(BPF_REG_0, 0),
318318
BPF_EXIT_INSN(),
319319
},
@@ -468,7 +468,7 @@
468468
BPF_MOV64_IMM(BPF_REG_1, 0),
469469
BPF_MOV64_IMM(BPF_REG_2, 0),
470470
BPF_MOV64_IMM(BPF_REG_3, 0),
471-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
471+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
472472
BPF_EXIT_INSN(),
473473
},
474474
.errstr = "R1 type=inv expected=fp",
@@ -481,7 +481,7 @@
481481
BPF_MOV64_IMM(BPF_REG_1, 0),
482482
BPF_MOV64_IMM(BPF_REG_2, 1),
483483
BPF_MOV64_IMM(BPF_REG_3, 0),
484-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
484+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
485485
BPF_EXIT_INSN(),
486486
},
487487
.errstr = "R1 type=inv expected=fp",
@@ -495,7 +495,7 @@
495495
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
496496
BPF_MOV64_IMM(BPF_REG_2, 0),
497497
BPF_MOV64_IMM(BPF_REG_3, 0),
498-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
498+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
499499
BPF_EXIT_INSN(),
500500
},
501501
.result = ACCEPT,
@@ -513,7 +513,7 @@
513513
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
514514
BPF_MOV64_IMM(BPF_REG_2, 0),
515515
BPF_MOV64_IMM(BPF_REG_3, 0),
516-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
516+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
517517
BPF_EXIT_INSN(),
518518
},
519519
.fixup_map_hash_8b = { 3 },
@@ -534,7 +534,7 @@
534534
BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
535535
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
536536
BPF_MOV64_IMM(BPF_REG_3, 0),
537-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
537+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
538538
BPF_EXIT_INSN(),
539539
},
540540
.fixup_map_hash_8b = { 3 },
@@ -554,7 +554,7 @@
554554
BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
555555
BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 2),
556556
BPF_MOV64_IMM(BPF_REG_3, 0),
557-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
557+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
558558
BPF_EXIT_INSN(),
559559
},
560560
.fixup_map_hash_8b = { 3 },
@@ -580,7 +580,7 @@
580580
BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 63),
581581
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
582582
BPF_MOV64_IMM(BPF_REG_3, 0),
583-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
583+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
584584
BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
585585
BPF_EXIT_INSN(),
586586
},
@@ -607,7 +607,7 @@
607607
BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 32),
608608
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 32),
609609
BPF_MOV64_IMM(BPF_REG_3, 0),
610-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
610+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
611611
BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
612612
BPF_EXIT_INSN(),
613613
},

tools/testing/selftests/bpf/verifier/helper_value_access.c

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
1111
BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
1212
BPF_MOV64_IMM(BPF_REG_3, 0),
13-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
13+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
1414
BPF_EXIT_INSN(),
1515
},
1616
.fixup_map_hash_48b = { 3 },
@@ -29,7 +29,7 @@
2929
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3030
BPF_MOV64_IMM(BPF_REG_2, 8),
3131
BPF_MOV64_IMM(BPF_REG_3, 0),
32-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
32+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
3333
BPF_EXIT_INSN(),
3434
},
3535
.fixup_map_hash_48b = { 3 },
@@ -67,7 +67,7 @@
6767
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
6868
BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val) + 8),
6969
BPF_MOV64_IMM(BPF_REG_3, 0),
70-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
70+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
7171
BPF_EXIT_INSN(),
7272
},
7373
.fixup_map_hash_48b = { 3 },
@@ -87,7 +87,7 @@
8787
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
8888
BPF_MOV64_IMM(BPF_REG_2, -8),
8989
BPF_MOV64_IMM(BPF_REG_3, 0),
90-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
90+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
9191
BPF_EXIT_INSN(),
9292
},
9393
.fixup_map_hash_48b = { 3 },
@@ -109,7 +109,7 @@
109109
BPF_MOV64_IMM(BPF_REG_2,
110110
sizeof(struct test_val) - offsetof(struct test_val, foo)),
111111
BPF_MOV64_IMM(BPF_REG_3, 0),
112-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
112+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
113113
BPF_EXIT_INSN(),
114114
},
115115
.fixup_map_hash_48b = { 3 },
@@ -129,7 +129,7 @@
129129
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, offsetof(struct test_val, foo)),
130130
BPF_MOV64_IMM(BPF_REG_2, 8),
131131
BPF_MOV64_IMM(BPF_REG_3, 0),
132-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
132+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
133133
BPF_EXIT_INSN(),
134134
},
135135
.fixup_map_hash_48b = { 3 },
@@ -170,7 +170,7 @@
170170
BPF_MOV64_IMM(BPF_REG_2,
171171
sizeof(struct test_val) - offsetof(struct test_val, foo) + 8),
172172
BPF_MOV64_IMM(BPF_REG_3, 0),
173-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
173+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
174174
BPF_EXIT_INSN(),
175175
},
176176
.fixup_map_hash_48b = { 3 },
@@ -191,7 +191,7 @@
191191
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, offsetof(struct test_val, foo)),
192192
BPF_MOV64_IMM(BPF_REG_2, -8),
193193
BPF_MOV64_IMM(BPF_REG_3, 0),
194-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
194+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
195195
BPF_EXIT_INSN(),
196196
},
197197
.fixup_map_hash_48b = { 3 },
@@ -212,7 +212,7 @@
212212
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, offsetof(struct test_val, foo)),
213213
BPF_MOV64_IMM(BPF_REG_2, -1),
214214
BPF_MOV64_IMM(BPF_REG_3, 0),
215-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
215+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
216216
BPF_EXIT_INSN(),
217217
},
218218
.fixup_map_hash_48b = { 3 },
@@ -235,7 +235,7 @@
235235
BPF_MOV64_IMM(BPF_REG_2,
236236
sizeof(struct test_val) - offsetof(struct test_val, foo)),
237237
BPF_MOV64_IMM(BPF_REG_3, 0),
238-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
238+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
239239
BPF_EXIT_INSN(),
240240
},
241241
.fixup_map_hash_48b = { 3 },
@@ -256,7 +256,7 @@
256256
BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
257257
BPF_MOV64_IMM(BPF_REG_2, 8),
258258
BPF_MOV64_IMM(BPF_REG_3, 0),
259-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
259+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
260260
BPF_EXIT_INSN(),
261261
},
262262
.fixup_map_hash_48b = { 3 },
@@ -300,7 +300,7 @@
300300
sizeof(struct test_val) -
301301
offsetof(struct test_val, foo) + 8),
302302
BPF_MOV64_IMM(BPF_REG_3, 0),
303-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
303+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
304304
BPF_EXIT_INSN(),
305305
},
306306
.fixup_map_hash_48b = { 3 },
@@ -322,7 +322,7 @@
322322
BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
323323
BPF_MOV64_IMM(BPF_REG_2, -8),
324324
BPF_MOV64_IMM(BPF_REG_3, 0),
325-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
325+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
326326
BPF_EXIT_INSN(),
327327
},
328328
.fixup_map_hash_48b = { 3 },
@@ -344,7 +344,7 @@
344344
BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
345345
BPF_MOV64_IMM(BPF_REG_2, -1),
346346
BPF_MOV64_IMM(BPF_REG_3, 0),
347-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
347+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
348348
BPF_EXIT_INSN(),
349349
},
350350
.fixup_map_hash_48b = { 3 },
@@ -368,7 +368,7 @@
368368
BPF_MOV64_IMM(BPF_REG_2,
369369
sizeof(struct test_val) - offsetof(struct test_val, foo)),
370370
BPF_MOV64_IMM(BPF_REG_3, 0),
371-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
371+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
372372
BPF_EXIT_INSN(),
373373
},
374374
.fixup_map_hash_48b = { 3 },
@@ -390,7 +390,7 @@
390390
BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
391391
BPF_MOV64_IMM(BPF_REG_2, 8),
392392
BPF_MOV64_IMM(BPF_REG_3, 0),
393-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
393+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
394394
BPF_EXIT_INSN(),
395395
},
396396
.fixup_map_hash_48b = { 3 },
@@ -433,7 +433,7 @@
433433
BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
434434
BPF_MOV64_IMM(BPF_REG_2, 1),
435435
BPF_MOV64_IMM(BPF_REG_3, 0),
436-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
436+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
437437
BPF_EXIT_INSN(),
438438
},
439439
.fixup_map_hash_48b = { 3 },
@@ -458,7 +458,7 @@
458458
sizeof(struct test_val) -
459459
offsetof(struct test_val, foo) + 1),
460460
BPF_MOV64_IMM(BPF_REG_3, 0),
461-
BPF_EMIT_CALL(BPF_FUNC_probe_read),
461+
BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel),
462462
BPF_EXIT_INSN(),
463463
},
464464
.fixup_map_hash_48b = { 3 },

0 commit comments

Comments
 (0)