1. 30 Mar, 2022 3 commits
    • Jiri Olsa's avatar
      bpf: Fix sparse warnings in kprobe_multi_resolve_syms · d31e0386
      Jiri Olsa authored
      Adding missing __user tags to fix sparse warnings:
      
      kernel/trace/bpf_trace.c:2370:34: warning: incorrect type in argument 2 (different address spaces)
      kernel/trace/bpf_trace.c:2370:34:    expected void const [noderef] __user *from
      kernel/trace/bpf_trace.c:2370:34:    got void const *usyms
      kernel/trace/bpf_trace.c:2376:51: warning: incorrect type in argument 2 (different address spaces)
      kernel/trace/bpf_trace.c:2376:51:    expected char const [noderef] __user *src
      kernel/trace/bpf_trace.c:2376:51:    got char const *
      kernel/trace/bpf_trace.c:2443:49: warning: incorrect type in argument 1 (different address spaces)
      kernel/trace/bpf_trace.c:2443:49:    expected void const *usyms
      kernel/trace/bpf_trace.c:2443:49:    got void [noderef] __user *[assigned] usyms
      
      Fixes: 0dcac272 ("bpf: Add multi kprobe link")
      Reported-by: default avatarAlexei Starovoitov <ast@kernel.org>
      Reported-by: default avatarJakub Kicinski <kuba@kernel.org>
      Signed-off-by: default avatarJiri Olsa <jolsa@kernel.org>
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Link: https://lore.kernel.org/bpf/20220330110510.398558-1-jolsa@kernel.org
      d31e0386
    • Delyan Kratunov's avatar
      bpftool: Explicit errno handling in skeletons · 522574fd
      Delyan Kratunov authored
      Andrii noticed that since f97b8b9b ("bpftool: Fix a bug in subskeleton
      code generation") the subskeleton code allows bpf_object__destroy_subskeleton
      to overwrite the errno that subskeleton__open would return with. While this
      is not currently an issue, let's make it future-proof.
      
      This patch explicitly tracks err in subskeleton__open and skeleton__create
      (i.e. calloc failure is explicitly ENOMEM) and ensures that errno is -err on
      the error return path. The skeleton code had to be changed since maps and
      progs codegen is shared with subskeletons.
      
      Fixes: f97b8b9b ("bpftool: Fix a bug in subskeleton code generation")
      Signed-off-by: default avatarDelyan Kratunov <delyank@fb.com>
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Link: https://lore.kernel.org/bpf/3b6bfbb770c79ae64d8de26c1c1bd9d53a4b85f8.camel@fb.com
      522574fd
    • Jakub Kicinski's avatar
      Merge https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf · 77c9387c
      Jakub Kicinski authored
      Alexei Starovoitov says:
      
      ====================
      pull-request: bpf 2022-03-29
      
      We've added 16 non-merge commits during the last 1 day(s) which contain
      a total of 24 files changed, 354 insertions(+), 187 deletions(-).
      
      The main changes are:
      
      1) x86 specific bits of fprobe/rethook, from Masami and Peter.
      
      2) ice/xsk fixes, from Maciej and Magnus.
      
      3) Various small fixes, from Andrii, Yonghong, Geliang and others.
      
      * https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf:
        selftests/bpf: Fix clang compilation errors
        ice: xsk: Fix indexing in ice_tx_xsk_pool()
        ice: xsk: Stop Rx processing when ntc catches ntu
        ice: xsk: Eliminate unnecessary loop iteration
        xsk: Do not write NULL in SW ring at allocation failure
        x86,kprobes: Fix optprobe trampoline to generate complete pt_regs
        x86,rethook: Fix arch_rethook_trampoline() to generate a complete pt_regs
        x86,rethook,kprobes: Replace kretprobe with rethook on x86
        kprobes: Use rethook for kretprobe if possible
        bpftool: Fix generated code in codegen_asserts
        selftests/bpf: fix selftest after random: Urandom_read tracepoint removal
        bpf: Fix maximum permitted number of arguments check
        bpf: Sync comments for bpf_get_stack
        fprobe: Fix sparse warning for acccessing __rcu ftrace_hash
        fprobe: Fix smatch type mismatch warning
        bpf/bpftool: Add unprivileged_bpf_disabled check against value of 2
      ====================
      
      Link: https://lore.kernel.org/r/20220329234924.39053-1-alexei.starovoitov@gmail.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      77c9387c
  2. 29 Mar, 2022 26 commits
  3. 28 Mar, 2022 11 commits