!146 backport patches from upstream
From: @zhang-mingyi66 Reviewed-by: @bitcoffee Signed-off-by: @bitcoffee
This commit is contained in:
commit
163379aa12
@ -0,0 +1,53 @@
|
||||
From 1867490d8fc635c552569d51c48debff588d2191 Mon Sep 17 00:00:00 2001
|
||||
From: Andreas Ziegler <ziegler.andreas@siemens.com>
|
||||
Date: Wed, 3 Jul 2024 10:34:36 +0200
|
||||
Subject: [PATCH] libbpf: Add NULL checks to bpf_object__{prev_map,next_map}
|
||||
|
||||
In the current state, an erroneous call to
|
||||
bpf_object__find_map_by_name(NULL, ...) leads to a segmentation
|
||||
fault through the following call chain:
|
||||
|
||||
bpf_object__find_map_by_name(obj = NULL, ...)
|
||||
-> bpf_object__for_each_map(pos, obj = NULL)
|
||||
-> bpf_object__next_map((obj = NULL), NULL)
|
||||
-> return (obj = NULL)->maps
|
||||
|
||||
While calling bpf_object__find_map_by_name with obj = NULL is
|
||||
obviously incorrect, this should not lead to a segmentation
|
||||
fault but rather be handled gracefully.
|
||||
|
||||
As __bpf_map__iter already handles this situation correctly, we
|
||||
can delegate the check for the regular case there and only add
|
||||
a check in case the prev or next parameter is NULL.
|
||||
|
||||
Signed-off-by: Andreas Ziegler <ziegler.andreas@siemens.com>
|
||||
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
|
||||
Link: https://lore.kernel.org/bpf/20240703083436.505124-1-ziegler.andreas@siemens.com
|
||||
---
|
||||
src/libbpf.c | 4 ++--
|
||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/src/libbpf.c b/src/libbpf.c
|
||||
index 4a28fac49..30f121754 100644
|
||||
--- a/src/libbpf.c
|
||||
+++ b/src/libbpf.c
|
||||
@@ -10375,7 +10375,7 @@ __bpf_map__iter(const struct bpf_map *m, const struct bpf_object *obj, int i)
|
||||
struct bpf_map *
|
||||
bpf_object__next_map(const struct bpf_object *obj, const struct bpf_map *prev)
|
||||
{
|
||||
- if (prev == NULL)
|
||||
+ if (prev == NULL && obj != NULL)
|
||||
return obj->maps;
|
||||
|
||||
return __bpf_map__iter(prev, obj, 1);
|
||||
@@ -10384,7 +10384,7 @@ bpf_object__next_map(const struct bpf_object *obj, const struct bpf_map *prev)
|
||||
struct bpf_map *
|
||||
bpf_object__prev_map(const struct bpf_object *obj, const struct bpf_map *next)
|
||||
{
|
||||
- if (next == NULL) {
|
||||
+ if (next == NULL && obj != NULL) {
|
||||
if (!obj->nr_maps)
|
||||
return NULL;
|
||||
return obj->maps + obj->nr_maps - 1;
|
||||
--
|
||||
2.33.0
|
||||
@ -0,0 +1,49 @@
|
||||
From 89ca11a79bb93824e82897bdb48727b5d75e469a Mon Sep 17 00:00:00 2001
|
||||
From: Andrey Grafin <conquistador@yandex-team.ru>
|
||||
Date: Wed, 17 Jan 2024 16:06:18 +0300
|
||||
Subject: [PATCH] libbpf: Apply map_set_def_max_entries() for inner_maps on
|
||||
creation
|
||||
|
||||
This patch allows to auto create BPF_MAP_TYPE_ARRAY_OF_MAPS and
|
||||
BPF_MAP_TYPE_HASH_OF_MAPS with values of BPF_MAP_TYPE_PERF_EVENT_ARRAY
|
||||
by bpf_object__load().
|
||||
|
||||
Previous behaviour created a zero filled btf_map_def for inner maps and
|
||||
tried to use it for a map creation but the linux kernel forbids to create
|
||||
a BPF_MAP_TYPE_PERF_EVENT_ARRAY map with max_entries=0.
|
||||
|
||||
Fixes: 646f02ffdd49 ("libbpf: Add BTF-defined map-in-map support")
|
||||
Signed-off-by: Andrey Grafin <conquistador@yandex-team.ru>
|
||||
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
|
||||
Acked-by: Yonghong Song <yonghong.song@linux.dev>
|
||||
Acked-by: Hou Tao <houtao1@huawei.com>
|
||||
Link: https://lore.kernel.org/bpf/20240117130619.9403-1-conquistador@yandex-team.ru
|
||||
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
|
||||
---
|
||||
src/libbpf.c | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/src/libbpf.c b/src/libbpf.c
|
||||
index afd09571c..b8b00da62 100644
|
||||
--- a/src/libbpf.c
|
||||
+++ b/src/libbpf.c
|
||||
@@ -70,6 +70,7 @@
|
||||
|
||||
static struct bpf_map *bpf_object__add_map(struct bpf_object *obj);
|
||||
static bool prog_is_subprog(const struct bpf_object *obj, const struct bpf_program *prog);
|
||||
+static int map_set_def_max_entries(struct bpf_map *map);
|
||||
|
||||
static int __base_pr(enum libbpf_print_level level, const char *format,
|
||||
va_list args)
|
||||
@@ -5172,6 +5173,9 @@ static int bpf_object__create_map(struct bpf_object *obj, struct bpf_map *map, b
|
||||
|
||||
if (bpf_map_type__is_map_in_map(def->type)) {
|
||||
if (map->inner_map) {
|
||||
+ err = map_set_def_max_entries(map->inner_map);
|
||||
+ if (err)
|
||||
+ return err;
|
||||
err = bpf_object__create_map(obj, map->inner_map, true);
|
||||
if (err) {
|
||||
pr_warn("map '%s': failed to create inner map: %d\n",
|
||||
--
|
||||
2.33.0
|
||||
@ -0,0 +1,42 @@
|
||||
From c975797ebecb07934d1399e1595db8e0d55bec04 Mon Sep 17 00:00:00 2001
|
||||
From: David Michael <fedora.dm0@gmail.com>
|
||||
Date: Sun, 13 Nov 2022 15:52:17 -0500
|
||||
Subject: [PATCH] libbpf: Fix uninitialized warning in btf_dump_dump_type_data
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
GCC 11.3.0 fails to compile btf_dump.c due to the following error,
|
||||
which seems to originate in btf_dump_struct_data where the returned
|
||||
value would be uninitialized if btf_vlen returns zero.
|
||||
|
||||
btf_dump.c: In function ‘btf_dump_dump_type_data’:
|
||||
btf_dump.c:2363:12: error: ‘err’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
|
||||
2363 | if (err < 0)
|
||||
| ^
|
||||
|
||||
Fixes: 920d16af9b42 ("libbpf: BTF dumper support for typed data")
|
||||
Signed-off-by: David Michael <fedora.dm0@gmail.com>
|
||||
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
|
||||
Acked-by: Stanislav Fomichev <sdf@google.com>
|
||||
Acked-by: Alan Maguire <alan.maguire@oracle.com>
|
||||
Link: https://lore.kernel.org/bpf/87zgcu60hq.fsf@gmail.com
|
||||
---
|
||||
src/btf_dump.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/src/btf_dump.c b/src/btf_dump.c
|
||||
index 12f7039e0..e9f849d82 100644
|
||||
--- a/src/btf_dump.c
|
||||
+++ b/src/btf_dump.c
|
||||
@@ -1989,7 +1989,7 @@ static int btf_dump_struct_data(struct btf_dump *d,
|
||||
{
|
||||
const struct btf_member *m = btf_members(t);
|
||||
__u16 n = btf_vlen(t);
|
||||
- int i, err;
|
||||
+ int i, err = 0;
|
||||
|
||||
/* note that we increment depth before calling btf_dump_print() below;
|
||||
* this is intentional. btf_dump_data_newline() will not print a
|
||||
--
|
||||
2.33.0
|
||||
12
libbpf.spec
12
libbpf.spec
@ -4,7 +4,7 @@
|
||||
|
||||
Name: %{githubname}
|
||||
Version: %{githubver}
|
||||
Release: 15
|
||||
Release: 16
|
||||
Summary: Libbpf library
|
||||
|
||||
License: LGPLv2 or BSD
|
||||
@ -44,6 +44,10 @@ Patch0027: backport-libbpf-Initialize-err-in-probe_map_create.patch
|
||||
Patch0028: backport-libbpf-Modify-the-function-name-in-libbpf.c-to-match.patch
|
||||
Patch0029: backport-libbpf-Fix-an-error-in-64bit-relocation-value-comput.patch
|
||||
Patch0030: backport-libbpf-Avoid-uninitialized-value-in-BPF_CORE_READ_BI.patch
|
||||
Patch0031: backport-libbpf-Add-NULL-checks-to-bpf_object__prev_map,next_.patch
|
||||
Patch0032: backport-libbpf-Apply-map_set_def_max_entries-for-inner_maps-.patch
|
||||
Patch0033: backport-libbpf-Fix-uninitialized-warning-in-btf_dump_dump_ty.patch
|
||||
|
||||
|
||||
# This package supersedes libbpf from kernel-tools,
|
||||
# which has default Epoch: 0. By having Epoch: 1
|
||||
@ -96,6 +100,12 @@ developing applications that use %{name}
|
||||
%{_libdir}/libbpf.a
|
||||
|
||||
%changelog
|
||||
* Wed Oct 09 2024 zhangmingyi <zhangmingyi5@huawei.com> 2:0.8.1-16
|
||||
- backport patch from upstream:
|
||||
backport-libbpf-Add-NULL-checks-to-bpf_object__prev_map,next_.patch
|
||||
backport-libbpf-Apply-map_set_def_max_entries-for-inner_maps-.patch
|
||||
backport-libbpf-Fix-uninitialized-warning-in-btf_dump_dump_ty.patch
|
||||
|
||||
* Wed Sep 25 2024 zhangmingyi <zhangmingyi5@huawei.com> 2:0.8.1-15
|
||||
- backport patch from upstream:
|
||||
backport-libbpf-Avoid-uninitialized-value-in-BPF_CORE_READ_BI.patch
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user