Skip to content
  1. Jan 28, 2022
  2. Jan 27, 2022
    • Jakub Kicinski's avatar
      bpf: remove unused static inlines · 8033c6c2
      Jakub Kicinski authored
      
      
      Remove two dead stubs, sk_msg_clear_meta() was never
      used, use of xskq_cons_is_full() got replaced by
      xsk_tx_writeable() in v5.10.
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      Link: https://lore.kernel.org/r/20220126185412.2776254-1-kuba@kernel.org
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      8033c6c2
    • Andrii Nakryiko's avatar
      selftests/bpf: fix uprobe offset calculation in selftests · ff943683
      Andrii Nakryiko authored
      
      
      Fix how selftests determine relative offset of a function that is
      uprobed. Previously, there was an assumption that uprobed function is
      always in the first executable region, which is not always the case
      (libbpf CI hits this case now). So get_base_addr() approach in isolation
      doesn't work anymore. So teach get_uprobe_offset() to determine correct
      memory mapping and calculate uprobe offset correctly.
      
      While at it, I merged together two implementations of
      get_uprobe_offset() helper, moving powerpc64-specific logic inside (had
      to add extra {} block to avoid unused variable error for insn).
      
      Also ensured that uprobed functions are never inlined, but are still
      static (and thus local to each selftest), by using a no-op asm volatile
      block internally. I didn't want to keep them global __weak, because some
      tests use uprobe's ref counter offset (to test USDT-like logic) which is
      not compatible with non-refcounted uprobe. So it's nicer to have each
      test uprobe target local to the file and guaranteed to not be inlined or
      skipped by the compiler (which can happen with static functions,
      especially if compiling selftests with -O2).
      
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/r/20220126193058.3390292-1-andrii@kernel.org
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      ff943683
    • Yonghong Song's avatar
      selftests/bpf: Fix a clang compilation error · e5465a90
      Yonghong Song authored
      
      
      Compiling kernel and selftests/bpf with latest llvm like blow:
        make -j LLVM=1
        make -C tools/testing/selftests/bpf -j LLVM=1
      I hit the following compilation error:
        /.../prog_tests/log_buf.c:215:6: error: variable 'log_buf' is used uninitialized whenever 'if' condition is true [-Werror,-Wsometimes-uninitialized]
                if (!ASSERT_OK_PTR(raw_btf_data, "raw_btf_data_good"))
                    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        /.../prog_tests/log_buf.c:264:7: note: uninitialized use occurs here
                free(log_buf);
                     ^~~~~~~
        /.../prog_tests/log_buf.c:215:2: note: remove the 'if' if its condition is always false
                if (!ASSERT_OK_PTR(raw_btf_data, "raw_btf_data_good"))
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        /.../prog_tests/log_buf.c:205:15: note: initialize the variable 'log_buf' to silence this warning
                char *log_buf;
                             ^
                              = NULL
        1 error generated.
      
      Compiler rightfully detected that log_buf is uninitialized in one of failure path as indicated
      in the above.
      
      Proper initialization of 'log_buf' variable fixed the issue.
      
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220126181940.4105997-1-yhs@fb.com
      e5465a90
  3. Jan 26, 2022
  4. Jan 25, 2022
    • Andrii Nakryiko's avatar
      Merge branch 'Fix the incorrect register read for syscalls on x86_64' · 74bb0f0c
      Andrii Nakryiko authored
      
      
      Kenta Tada says:
      
      ====================
      Currently, rcx is read as the fourth parameter of syscall on x86_64.
      But x86_64 Linux System Call convention uses r10 actually.
      This commit adds the wrapper for users who want to access to
      syscall params to analyze the user space.
      
      Changelog:
      ----------
      v1 -> v2:
      - Rebase to current bpf-next
      https://lore.kernel.org/bpf/20211222213924.1869758-1-andrii@kernel.org/
      
      v2 -> v3:
      - Modify the definition of SYSCALL macros for only targeted archs.
      - Define __BPF_TARGET_MISSING variants for completeness.
      - Remove CORE variants. These macros will not be used.
      - Add a selftest.
      
      v3 -> v4:
      - Modify a selftest not to use serial tests.
      - Modify a selftest to use ASSERT_EQ().
      - Extract syscall wrapper for all the other tests.
      - Add CORE variants.
      
      v4 -> v5:
      - Modify the CORE variant macro not to read memory directly.
      - Remove the unnecessary comment.
      - Add a selftest for the CORE variant.
      ====================
      
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      74bb0f0c
    • Kenta Tada's avatar
      selftests/bpf: Add a test to confirm PT_REGS_PARM4_SYSCALL · 77fc0330
      Kenta Tada authored
      
      
      Add a selftest to verify the behavior of PT_REGS_xxx
      and the CORE variant.
      
      Signed-off-by: default avatarKenta Tada <Kenta.Tada@sony.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220124141622.4378-4-Kenta.Tada@sony.com
      77fc0330
    • Kenta Tada's avatar
      libbpf: Fix the incorrect register read for syscalls on x86_64 · d084df3b
      Kenta Tada authored
      
      
      Currently, rcx is read as the fourth parameter of syscall on x86_64.
      But x86_64 Linux System Call convention uses r10 actually.
      This commit adds the wrapper for users who want to access to
      syscall params to analyze the user space.
      
      Signed-off-by: default avatarKenta Tada <Kenta.Tada@sony.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220124141622.4378-3-Kenta.Tada@sony.com
      d084df3b
    • Kenta Tada's avatar
      selftests/bpf: Extract syscall wrapper · 78a20541
      Kenta Tada authored
      
      
      Extract the helper to set up SYS_PREFIX for fentry and kprobe selftests
      that use __x86_sys_* attach functions.
      
      Suggested-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Signed-off-by: default avatarKenta Tada <Kenta.Tada@sony.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220124141622.4378-2-Kenta.Tada@sony.com
      78a20541
    • Christy Lee's avatar
      libbpf: Mark bpf_object__open_xattr() deprecated · fc763870
      Christy Lee authored
      
      
      Mark bpf_object__open_xattr() as deprecated, use
      bpf_object__open_file() instead.
      
        [0] Closes: https://github.com/libbpf/libbpf/issues/287
      
      Signed-off-by: default avatarChristy Lee <christylee@fb.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220125010917.679975-1-christylee@fb.com
      fc763870
    • Andrii Nakryiko's avatar
      Merge branch 'deprecate bpf_object__open_buffer() API' · bfc0a2e9
      Andrii Nakryiko authored
      
      
      Christy Lee says:
      
      ====================
      
      Deprecate bpf_object__open_buffer() API, replace all usage
      with bpf_object__open_mem().
      
      ====================
      
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      bfc0a2e9
    • Christy Lee's avatar
      perf: Stop using bpf_object__open_buffer() API · 5a34d98b
      Christy Lee authored
      
      
      bpf_object__open_buffer() API is deprecated, use the unified opts
      bpf_object__open_mem() API in perf instead. This requires at least
      libbpf 0.0.6.
      
      Signed-off-by: default avatarChristy Lee <christylee@fb.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220125005923.418339-3-christylee@fb.com
      5a34d98b
    • Christy Lee's avatar
      libbpf: Mark bpf_object__open_buffer() API deprecated · 9f45f70a
      Christy Lee authored
      
      
      Deprecate bpf_object__open_buffer() API in favor of the unified
      opts-based bpf_object__open_mem() API.
      
      Signed-off-by: default avatarChristy Lee <christylee@fb.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/bpf/20220125005923.418339-2-christylee@fb.com
      9f45f70a
    • Alexei Starovoitov's avatar
      Merge branch 'Add bpf_copy_from_user_task helper and sleepable bpf iterator programs' · c45c79e5
      Alexei Starovoitov authored
      
      
      Kenny Yu says:
      
      ====================
      
      This patch series makes the following changes:
      * Adds a new bpf helper `bpf_copy_from_user_task` to read user space
        memory from a different task.
      * Adds the ability to create sleepable bpf iterator programs.
      
      As an example of how this will be used, at Meta we are using bpf task
      iterator programs and this new bpf helper to read C++ async stack traces of
      a running process for debugging C++ binaries in production.
      
      Changes since v6:
      * Split first patch into two patches: first patch to add support
        for bpf iterators to use sleepable helpers, and the second to add
        the new bpf helper.
      * Simplify implementation of `bpf_copy_from_user_task` based on feedback.
      * Add to docs that the destination buffer will be zero-ed on error.
      
      Changes since v5:
      * Rename `bpf_access_process_vm` to `bpf_copy_from_user_task`.
      * Change return value to be all-or-nothing. If we get a partial read,
        memset all bytes to 0 and return -EFAULT.
      * Add to docs that the helper can only be used by sleepable BPF programs.
      * Fix nits in selftests.
      
      Changes since v4:
      * Make `flags` into u64.
      * Use `user_ptr` arg name to be consistent with `bpf_copy_from_user`.
      * Add an extra check in selftests to verify access_process_vm calls
        succeeded.
      
      Changes since v3:
      * Check if `flags` is 0 and return -EINVAL if not.
      * Rebase on latest bpf-next branch and fix merge conflicts.
      
      Changes since v2:
      * Reorder arguments in `bpf_access_process_vm` to match existing related
        bpf helpers (e.g. `bpf_probe_read_kernel`, `bpf_probe_read_user`,
        `bpf_copy_from_user`).
      * `flags` argument is provided for future extensibility and is not
        currently used, and we always invoke `access_process_vm` with no flags.
      * Merge bpf helper patch and `bpf_iter_run_prog` patch together for better
        bisectability in case of failures.
      * Clean up formatting and comments in selftests.
      
      Changes since v1:
      * Fixed "Invalid wait context" issue in `bpf_iter_run_prog` by using
        `rcu_read_lock_trace()` for sleepable bpf iterator programs.
      ====================
      
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      c45c79e5
    • Kenny Yu's avatar
      selftests/bpf: Add test for sleepable bpf iterator programs · 45105c2e
      Kenny Yu authored
      
      
      This adds a test for bpf iterator programs to make use of sleepable
      bpf helpers.
      
      Signed-off-by: default avatarKenny Yu <kennyyu@fb.com>
      Acked-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/r/20220124185403.468466-5-kennyyu@fb.com
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      45105c2e
    • Kenny Yu's avatar
      libbpf: Add "iter.s" section for sleepable bpf iterator programs · a8b77f74
      Kenny Yu authored
      
      
      This adds a new bpf section "iter.s" to allow bpf iterator programs to
      be sleepable.
      
      Signed-off-by: default avatarKenny Yu <kennyyu@fb.com>
      Acked-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/r/20220124185403.468466-4-kennyyu@fb.com
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      a8b77f74
    • Kenny Yu's avatar
      bpf: Add bpf_copy_from_user_task() helper · 376040e4
      Kenny Yu authored
      
      
      This adds a helper for bpf programs to read the memory of other
      tasks.
      
      As an example use case at Meta, we are using a bpf task iterator program
      and this new helper to print C++ async stack traces for all threads of
      a given process.
      
      Signed-off-by: default avatarKenny Yu <kennyyu@fb.com>
      Acked-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/r/20220124185403.468466-3-kennyyu@fb.com
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      376040e4
    • Kenny Yu's avatar
      bpf: Add support for bpf iterator programs to use sleepable helpers · b77fb25d
      Kenny Yu authored
      
      
      This patch allows bpf iterator programs to use sleepable helpers by
      changing `bpf_iter_run_prog` to use the appropriate synchronization.
      With sleepable bpf iterator programs, we can no longer use
      `rcu_read_lock()` and must use `rcu_read_lock_trace()` instead
      to protect the bpf program.
      
      Signed-off-by: default avatarKenny Yu <kennyyu@fb.com>
      Acked-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Link: https://lore.kernel.org/r/20220124185403.468466-2-kennyyu@fb.com
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      b77fb25d
    • Jakub Kicinski's avatar
      Merge https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next · caaba961
      Jakub Kicinski authored
      
      
      Daniel Borkmann says:
      
      ====================
      pull-request: bpf-next 2022-01-24
      
      We've added 80 non-merge commits during the last 14 day(s) which contain
      a total of 128 files changed, 4990 insertions(+), 895 deletions(-).
      
      The main changes are:
      
      1) Add XDP multi-buffer support and implement it for the mvneta driver,
         from Lorenzo Bianconi, Eelco Chaudron and Toke Høiland-Jørgensen.
      
      2) Add unstable conntrack lookup helpers for BPF by using the BPF kfunc
         infra, from Kumar Kartikeya Dwivedi.
      
      3) Extend BPF cgroup programs to export custom ret value to userspace via
         two helpers bpf_get_retval() and bpf_set_retval(), from YiFei Zhu.
      
      4) Add support for AF_UNIX iterator batching, from Kuniyuki Iwashima.
      
      5) Complete missing UAPI BPF helper description and change bpf_doc.py script
         to enforce consistent & complete helper documentation, from Usama Arif.
      
      6) Deprecate libbpf's legacy BPF map definitions and streamline XDP APIs to
         follow tc-based APIs, from Andrii Nakryiko.
      
      7) Support BPF_PROG_QUERY for BPF programs attached to sockmap, from Di Zhu.
      
      8) Deprecate libbpf's bpf_map__def() API and replace users with proper getters
         and setters, from Christy Lee.
      
      9) Extend libbpf's btf__add_btf() with an additional hashmap for strings to
         reduce overhead, from Kui-Feng Lee.
      
      10) Fix bpftool and libbpf error handling related to libbpf's hashmap__new()
          utility function, from Mauricio Vásquez.
      
      11) Add support to BTF program names in bpftool's program dump, from Raman Shukhau.
      
      12) Fix resolve_btfids build to pick up host flags, from Connor O'Brien.
      
      * https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next: (80 commits)
        selftests, bpf: Do not yet switch to new libbpf XDP APIs
        selftests, xsk: Fix rx_full stats test
        bpf: Fix flexible_array.cocci warnings
        xdp: disable XDP_REDIRECT for xdp frags
        bpf: selftests: add CPUMAP/DEVMAP selftests for xdp frags
        bpf: selftests: introduce bpf_xdp_{load,store}_bytes selftest
        net: xdp: introduce bpf_xdp_pointer utility routine
        bpf: generalise tail call map compatibility check
        libbpf: Add SEC name for xdp frags programs
        bpf: selftests: update xdp_adjust_tail selftest to include xdp frags
        bpf: test_run: add xdp_shared_info pointer in bpf_test_finish signature
        bpf: introduce frags support to bpf_prog_test_run_xdp()
        bpf: move user_size out of bpf_test_init
        bpf: add frags support to xdp copy helpers
        bpf: add frags support to the bpf_xdp_adjust_tail() API
        bpf: introduce bpf_xdp_get_buff_len helper
        net: mvneta: enable jumbo frames if the loaded XDP program support frags
        bpf: introduce BPF_F_XDP_HAS_FRAGS flag in prog_flags loading the ebpf program
        net: mvneta: add frags support to XDP_TX
        xdp: add frags support to xdp_return_{buff/frame}
        ...
      ====================
      
      Link: https://lore.kernel.org/r/20220124221235.18993-1-daniel@iogearbox.net
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      caaba961
    • Daniel Borkmann's avatar
      selftests, bpf: Do not yet switch to new libbpf XDP APIs · 0bfb95f5
      Daniel Borkmann authored
      Revert commit 54435652 ("selftests/bpf: switch to new libbpf XDP APIs")
      for now given this will heavily conflict with 4b27480d
      
       ("bpf/selftests:
      convert xdp_link test to ASSERT_* macros") upon merge. Andrii agreed to redo
      the conversion cleanly after trees merged.
      
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Acked-by: default avatarAlexei Starovoitov <ast@kernel.org>
      Acked-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      0bfb95f5
    • Jakub Kicinski's avatar
      Merge tag 'linux-can-fixes-for-5.17-20220124' of... · e52984be
      Jakub Kicinski authored
      
      Merge tag 'linux-can-fixes-for-5.17-20220124' of git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can
      
      Marc Kleine-Budde says:
      
      ====================
      pull-request: can 2022-01-24
      
      The first patch updates the email address of Brian Silverman from his
      former employer to his private address.
      
      The next patch fixes DT bindings information for the tcan4x5x SPI CAN
      driver.
      
      The following patch targets the m_can driver and fixes the
      introduction of FIFO bulk read support.
      
      Another patch for the tcan4x5x driver, which fixes the max register
      value for the regmap config.
      
      The last patch for the flexcan driver marks the RX mailbox support for
      the MCF5441X as support.
      
      * tag 'linux-can-fixes-for-5.17-20220124' of git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can:
        can: flexcan: mark RX via mailboxes as supported on MCF5441X
        can: tcan4x5x: regmap: fix max register value
        can: m_can: m_can_fifo_{read,write}: don't read or write from/to FIFO if length is 0
        dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config
        mailmap: update email address of Brian Silverman
      ====================
      
      Link: https://lore.kernel.org/r/20220124175955.3464134-1-mkl@pengutronix.de
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      e52984be
    • Marc Kleine-Budde's avatar
      can: flexcan: mark RX via mailboxes as supported on MCF5441X · f04aefd4
      Marc Kleine-Budde authored
      Most flexcan IP cores support 2 RX modes:
      - FIFO
      - mailbox
      
      The flexcan IP core on the MCF5441X cannot receive CAN RTR messages
      via mailboxes. However the mailbox mode is more performant. The commit
      
      | 1c45f577
      
       ("can: flexcan: add ethtool support to change rx-rtr setting during runtime")
      
      added support to switch from FIFO to mailbox mode on these cores.
      
      After testing the mailbox mode on the MCF5441X by Angelo Dureghello,
      this patch marks it (without RTR capability) as supported. Further the
      IP core overview table is updated, that RTR reception via mailboxes is
      not supported.
      
      Link: https://lore.kernel.org/all/20220121084425.3141218-1-mkl@pengutronix.de
      Tested-by: default avatarAngelo Dureghello <angelo@kernel-space.org>
      Signed-off-by: default avatarMarc Kleine-Budde <mkl@pengutronix.de>
      f04aefd4
    • Marc Kleine-Budde's avatar
      can: tcan4x5x: regmap: fix max register value · e59986de
      Marc Kleine-Budde authored
      The MRAM of the tcan4x5x has a size of 2K and starts at 0x8000. There
      are no further registers in the tcan4x5x making 0x87fc the biggest
      addressable register.
      
      This patch fixes the max register value of the regmap config from
      0x8ffc to 0x87fc.
      
      Fixes: 6e1caaf8
      
       ("can: tcan4x5x: fix max register value")
      Link: https://lore.kernel.org/all/20220119064011.2943292-1-mkl@pengutronix.de
      Signed-off-by: default avatarMarc Kleine-Budde <mkl@pengutronix.de>
      e59986de
    • Marc Kleine-Budde's avatar
      can: m_can: m_can_fifo_{read,write}: don't read or write from/to FIFO if length is 0 · db72589c
      Marc Kleine-Budde authored
      In order to optimize FIFO access, especially on m_can cores attached
      to slow busses like SPI, in patch
      
      | e3938177 ("can: m_can: Disable IRQs on FIFO bus errors")
      
      bulk read/write support has been added to the m_can_fifo_{read,write}
      functions.
      
      That change leads to the tcan driver to call
      regmap_bulk_{read,write}() with a length of 0 (for CAN frames with 0
      data length). regmap treats this as an error:
      
      | tcan4x5x spi1.0 tcan4x5x0: FIFO write returned -22
      
      This patch fixes the problem by not calling the
      cdev->ops->{read,write)_fifo() in case of a 0 length read/write.
      
      Fixes: e3938177
      
       ("can: m_can: Disable IRQs on FIFO bus errors")
      Link: https://lore.kernel.org/all/20220114155751.2651888-1-mkl@pengutronix.de
      Cc: stable@vger.kernel.org
      Cc: Matt Kline <matt@bitbashing.io>
      Cc: Chandrasekar Ramakrishnan <rcsekar@samsung.com>
      Reported-by: default avatarMichael Anochin <anochin@photo-meter.com>
      Signed-off-by: default avatarMarc Kleine-Budde <mkl@pengutronix.de>
      db72589c
    • Marc Kleine-Budde's avatar
      dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config · 17a30422
      Marc Kleine-Budde authored
      This tcan4x5x only comes with 2K of MRAM, a RX FIFO with a dept of 32
      doesn't fit into the MRAM. Use a depth of 16 instead.
      
      Fixes: 4edd396a
      
       ("dt-bindings: can: tcan4x5x: Add DT bindings for TCAN4x5X driver")
      Link: https://lore.kernel.org/all/20220119062951.2939851-1-mkl@pengutronix.de
      Signed-off-by: default avatarMarc Kleine-Budde <mkl@pengutronix.de>
      17a30422
    • Marc Kleine-Budde's avatar
      mailmap: update email address of Brian Silverman · 984d1eff
      Marc Kleine-Budde authored
      
      
      Brian Silverman's address at bluerivertech.com is not valid anymore,
      use Brian's private email address instead.
      
      Link: https://lore.kernel.org/all/20220110082359.2019735-1-mkl@pengutronix.de
      Cc: Brian Silverman <bsilver16384@gmail.com>
      Signed-off-by: default avatarMarc Kleine-Budde <mkl@pengutronix.de>
      984d1eff
    • Magnus Karlsson's avatar
      selftests, xsk: Fix rx_full stats test · b4ec6a19
      Magnus Karlsson authored
      Fix the rx_full stats test so that it correctly reports pass even when
      the fill ring is not full of buffers.
      
      Fixes: 872a1184
      
       ("selftests: xsk: Put the same buffer only once in the fill ring")
      Signed-off-by: default avatarMagnus Karlsson <magnus.karlsson@intel.com>
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Tested-by: default avatarMaciej Fijalkowski <maciej.fijalkowski@intel.com>
      Acked-by: default avatarMaciej Fijalkowski <maciej.fijalkowski@intel.com>
      Link: https://lore.kernel.org/bpf/20220121123508.12759-1-magnus.karlsson@gmail.com
      b4ec6a19
    • kernel test robot's avatar
      bpf: Fix flexible_array.cocci warnings · ed8bb032
      kernel test robot authored
      Zero-length and one-element arrays are deprecated, see:
      Documentation/process/deprecated.rst
      
      Flexible-array members should be used instead.
      
      Generated by: scripts/coccinelle/misc/flexible_array.cocci
      
      Fixes: c1ff181f
      
       ("selftests/bpf: Extend kfunc selftests")
      Reported-by: default avatarkernel test robot <lkp@intel.com>
      Signed-off-by: default avatarkernel test robot <lkp@intel.com>
      Signed-off-by: default avatarJulia Lawall <julia.lawall@inria.fr>
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Cc: Kumar Kartikeya Dwivedi <memxor@gmail.com>
      Link: https://lore.kernel.org/bpf/alpine.DEB.2.22.394.2201221206320.12220@hadrien
      ed8bb032
  5. Jan 24, 2022