Patch "libbpf: Fix unintentional success return code in bpf_object__load" has been added to the 5.9-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    libbpf: Fix unintentional success return code in bpf_object__load

to the 5.9-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     libbpf-fix-unintentional-success-return-code-in-bpf_.patch
and it can be found in the queue-5.9 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit 59447084a981b34fbf05a65fca3ef41f8a0c9b60
Author: Alex Gartrell <alexgartrell@xxxxxxxxx>
Date:   Wed Aug 26 00:55:49 2020 -0700

    libbpf: Fix unintentional success return code in bpf_object__load
    
    [ Upstream commit ef05afa66c59c2031a3798916ef3ff3778232129 ]
    
    There are code paths where EINVAL is returned directly without setting
    errno. In that case, errno could be 0, which would mask the
    failure. For example, if a careless programmer set log_level to 10000
    out of laziness, they would have to spend a long time trying to figure
    out why.
    
    Fixes: 4f33ddb4e3e2 ("libbpf: Propagate EPERM to caller on program load")
    Signed-off-by: Alex Gartrell <alexgartrell@xxxxxxxxx>
    Signed-off-by: Alexei Starovoitov <ast@xxxxxxxxxx>
    Link: https://lore.kernel.org/bpf/20200826075549.1858580-1-alexgartrell@xxxxxxxxx
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index e493d6048143f..8b71a31ca4a97 100644
--- a/tools/lib/bpf/libbpf.c
+++ b/tools/lib/bpf/libbpf.c
@@ -5425,7 +5425,7 @@ load_program(struct bpf_program *prog, struct bpf_insn *insns, int insns_cnt,
 		free(log_buf);
 		goto retry_load;
 	}
-	ret = -errno;
+	ret = errno ? -errno : -LIBBPF_ERRNO__LOAD;
 	cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
 	pr_warn("load bpf program failed: %s\n", cp);
 	pr_perm_msg(ret);



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux