* [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
@ 2024-10-23 10:01 Jiri Olsa
2024-10-23 10:05 ` Peter Zijlstra
` (2 more replies)
0 siblings, 3 replies; 10+ messages in thread
From: Jiri Olsa @ 2024-10-23 10:01 UTC (permalink / raw)
To: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko
Cc: Sean Young, Peter Zijlstra, bpf, linux-perf-users,
Martin KaFai Lau, Song Liu, Yonghong Song, John Fastabend,
KP Singh, Stanislav Fomichev, Hao Luo
Peter reported that perf_event_detach_bpf_prog might skip to release
the bpf program for -ENOENT error from bpf_prog_array_copy.
This can't happen because bpf program is stored in perf event and is
detached and released only when perf event is freed.
Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
make sure the bpf program is released in any case.
Cc: Sean Young <sean@mess.org>
Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
Reported-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Jiri Olsa <jolsa@kernel.org>
---
kernel/trace/bpf_trace.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
index 95b6b3b16bac..2c064ba7b0bd 100644
--- a/kernel/trace/bpf_trace.c
+++ b/kernel/trace/bpf_trace.c
@@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
- if (ret == -ENOENT)
- goto unlock;
+ if (WARN_ON_ONCE(ret == -ENOENT))
+ goto put;
if (ret < 0) {
bpf_prog_array_delete_safe(old_array, event->prog);
} else {
@@ -2225,6 +2225,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
bpf_prog_array_free_sleepable(old_array);
}
+put:
bpf_prog_put(event->prog);
event->prog = NULL;
--
2.46.2
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-10-23 10:01 [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling Jiri Olsa
@ 2024-10-23 10:05 ` Peter Zijlstra
2024-10-23 10:32 ` Sean Young
2024-10-23 16:01 ` Andrii Nakryiko
2 siblings, 0 replies; 10+ messages in thread
From: Peter Zijlstra @ 2024-10-23 10:05 UTC (permalink / raw)
To: Jiri Olsa
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
bpf, linux-perf-users, Martin KaFai Lau, Song Liu, Yonghong Song,
John Fastabend, KP Singh, Stanislav Fomichev, Hao Luo
On Wed, Oct 23, 2024 at 12:01:31PM +0200, Jiri Olsa wrote:
> Peter reported that perf_event_detach_bpf_prog might skip to release
> the bpf program for -ENOENT error from bpf_prog_array_copy.
>
> This can't happen because bpf program is stored in perf event and is
> detached and released only when perf event is freed.
>
> Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> make sure the bpf program is released in any case.
>
> Cc: Sean Young <sean@mess.org>
> Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> Reported-by: Peter Zijlstra <peterz@infradead.org>
> Signed-off-by: Jiri Olsa <jolsa@kernel.org>
Thanks Jiri!
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
> ---
> kernel/trace/bpf_trace.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index 95b6b3b16bac..2c064ba7b0bd 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
>
> old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> - if (ret == -ENOENT)
> - goto unlock;
> + if (WARN_ON_ONCE(ret == -ENOENT))
> + goto put;
> if (ret < 0) {
> bpf_prog_array_delete_safe(old_array, event->prog);
> } else {
> @@ -2225,6 +2225,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> bpf_prog_array_free_sleepable(old_array);
> }
>
> +put:
> bpf_prog_put(event->prog);
> event->prog = NULL;
>
> --
> 2.46.2
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-10-23 10:01 [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling Jiri Olsa
2024-10-23 10:05 ` Peter Zijlstra
@ 2024-10-23 10:32 ` Sean Young
2024-10-23 16:01 ` Andrii Nakryiko
2 siblings, 0 replies; 10+ messages in thread
From: Sean Young @ 2024-10-23 10:32 UTC (permalink / raw)
To: Jiri Olsa
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Wed, Oct 23, 2024 at 12:01:31PM +0200, Jiri Olsa wrote:
> Peter reported that perf_event_detach_bpf_prog might skip to release
> the bpf program for -ENOENT error from bpf_prog_array_copy.
>
> This can't happen because bpf program is stored in perf event and is
> detached and released only when perf event is freed.
>
> Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> make sure the bpf program is released in any case.
Looks good. Should be unreachable anyway, so it doesn't matter. My
preference would be to just delete the lines, but no harm in belt and braces.
Acked-by: Sean Young <sean@mess.org>
>
> Cc: Sean Young <sean@mess.org>
> Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> Reported-by: Peter Zijlstra <peterz@infradead.org>
> Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> ---
> kernel/trace/bpf_trace.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index 95b6b3b16bac..2c064ba7b0bd 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
>
> old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> - if (ret == -ENOENT)
> - goto unlock;
> + if (WARN_ON_ONCE(ret == -ENOENT))
> + goto put;
> if (ret < 0) {
> bpf_prog_array_delete_safe(old_array, event->prog);
> } else {
> @@ -2225,6 +2225,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> bpf_prog_array_free_sleepable(old_array);
> }
>
> +put:
> bpf_prog_put(event->prog);
> event->prog = NULL;
>
> --
> 2.46.2
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-10-23 10:01 [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling Jiri Olsa
2024-10-23 10:05 ` Peter Zijlstra
2024-10-23 10:32 ` Sean Young
@ 2024-10-23 16:01 ` Andrii Nakryiko
2024-10-23 19:08 ` Jiri Olsa
2024-12-06 17:09 ` Jiri Olsa
2 siblings, 2 replies; 10+ messages in thread
From: Andrii Nakryiko @ 2024-10-23 16:01 UTC (permalink / raw)
To: Jiri Olsa
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
>
> Peter reported that perf_event_detach_bpf_prog might skip to release
> the bpf program for -ENOENT error from bpf_prog_array_copy.
>
> This can't happen because bpf program is stored in perf event and is
> detached and released only when perf event is freed.
>
> Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> make sure the bpf program is released in any case.
>
> Cc: Sean Young <sean@mess.org>
> Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> Reported-by: Peter Zijlstra <peterz@infradead.org>
> Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> ---
> kernel/trace/bpf_trace.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index 95b6b3b16bac..2c064ba7b0bd 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
>
> old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> - if (ret == -ENOENT)
> - goto unlock;
> + if (WARN_ON_ONCE(ret == -ENOENT))
> + goto put;
> if (ret < 0) {
> bpf_prog_array_delete_safe(old_array, event->prog);
seeing
if (ret < 0)
bpf_prog_array_delete_safe(old_array, event->prog);
I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
now I feel like just dropping WARN_ON_ONCE() is better.
> } else {
> @@ -2225,6 +2225,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> bpf_prog_array_free_sleepable(old_array);
> }
>
> +put:
> bpf_prog_put(event->prog);
> event->prog = NULL;
>
> --
> 2.46.2
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-10-23 16:01 ` Andrii Nakryiko
@ 2024-10-23 19:08 ` Jiri Olsa
2024-12-06 17:09 ` Jiri Olsa
1 sibling, 0 replies; 10+ messages in thread
From: Jiri Olsa @ 2024-10-23 19:08 UTC (permalink / raw)
To: Andrii Nakryiko
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Wed, Oct 23, 2024 at 09:01:02AM -0700, Andrii Nakryiko wrote:
> On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
> >
> > Peter reported that perf_event_detach_bpf_prog might skip to release
> > the bpf program for -ENOENT error from bpf_prog_array_copy.
> >
> > This can't happen because bpf program is stored in perf event and is
> > detached and released only when perf event is freed.
> >
> > Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> > make sure the bpf program is released in any case.
> >
> > Cc: Sean Young <sean@mess.org>
> > Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> > Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> > Reported-by: Peter Zijlstra <peterz@infradead.org>
> > Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> > ---
> > kernel/trace/bpf_trace.c | 5 +++--
> > 1 file changed, 3 insertions(+), 2 deletions(-)
> >
> > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > index 95b6b3b16bac..2c064ba7b0bd 100644
> > --- a/kernel/trace/bpf_trace.c
> > +++ b/kernel/trace/bpf_trace.c
> > @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> >
> > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> > - if (ret == -ENOENT)
> > - goto unlock;
> > + if (WARN_ON_ONCE(ret == -ENOENT))
> > + goto put;
> > if (ret < 0) {
> > bpf_prog_array_delete_safe(old_array, event->prog);
>
> seeing
>
> if (ret < 0)
> bpf_prog_array_delete_safe(old_array, event->prog);
>
> I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
> now I feel like just dropping WARN_ON_ONCE() is better.
heh, I was going back and forth with that and decided with 'safer' option,
but it's 2 of you now asking for that, I'll send v2 then
jirka
>
> > } else {
> > @@ -2225,6 +2225,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > bpf_prog_array_free_sleepable(old_array);
> > }
> >
> > +put:
> > bpf_prog_put(event->prog);
> > event->prog = NULL;
> >
> > --
> > 2.46.2
> >
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-10-23 16:01 ` Andrii Nakryiko
2024-10-23 19:08 ` Jiri Olsa
@ 2024-12-06 17:09 ` Jiri Olsa
2024-12-06 18:21 ` Andrii Nakryiko
1 sibling, 1 reply; 10+ messages in thread
From: Jiri Olsa @ 2024-12-06 17:09 UTC (permalink / raw)
To: Andrii Nakryiko
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Wed, Oct 23, 2024 at 09:01:02AM -0700, Andrii Nakryiko wrote:
> On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
> >
> > Peter reported that perf_event_detach_bpf_prog might skip to release
> > the bpf program for -ENOENT error from bpf_prog_array_copy.
> >
> > This can't happen because bpf program is stored in perf event and is
> > detached and released only when perf event is freed.
> >
> > Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> > make sure the bpf program is released in any case.
> >
> > Cc: Sean Young <sean@mess.org>
> > Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> > Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> > Reported-by: Peter Zijlstra <peterz@infradead.org>
> > Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> > ---
> > kernel/trace/bpf_trace.c | 5 +++--
> > 1 file changed, 3 insertions(+), 2 deletions(-)
> >
> > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > index 95b6b3b16bac..2c064ba7b0bd 100644
> > --- a/kernel/trace/bpf_trace.c
> > +++ b/kernel/trace/bpf_trace.c
> > @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> >
> > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> > - if (ret == -ENOENT)
> > - goto unlock;
> > + if (WARN_ON_ONCE(ret == -ENOENT))
> > + goto put;
> > if (ret < 0) {
> > bpf_prog_array_delete_safe(old_array, event->prog);
>
> seeing
>
> if (ret < 0)
> bpf_prog_array_delete_safe(old_array, event->prog);
>
> I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
> now I feel like just dropping WARN_ON_ONCE() is better.
hi,
there's syzbot report [1] where we could end up with following
- create perf event and set bpf program to it
- clone process -> create inherited event
- exit -> release both events
- first perf_event_detach_bpf_prog call will release tp_event->prog_array
and second perf_event_detach_bpf_prog will crash because
tp_event->prog_array is NULL
we can fix that quicly with change below, I guess we could add refcount
to bpf_prog_array_item and allow one of the parent/inherited events to
work while the other is gone.. but that might be too much, will check
jirka
[1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
---
diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
index fe57dfbf2a86..d4b45543ebc2 100644
--- a/kernel/trace/bpf_trace.c
+++ b/kernel/trace/bpf_trace.c
@@ -2251,6 +2251,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
goto unlock;
old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
+ if (!old_array)
+ goto put;
ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
if (ret < 0) {
bpf_prog_array_delete_safe(old_array, event->prog);
@@ -2259,6 +2261,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
bpf_prog_array_free_sleepable(old_array);
}
+put:
bpf_prog_put(event->prog);
event->prog = NULL;
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-12-06 17:09 ` Jiri Olsa
@ 2024-12-06 18:21 ` Andrii Nakryiko
2024-12-07 0:22 ` Jiri Olsa
0 siblings, 1 reply; 10+ messages in thread
From: Andrii Nakryiko @ 2024-12-06 18:21 UTC (permalink / raw)
To: Jiri Olsa
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Fri, Dec 6, 2024 at 9:09 AM Jiri Olsa <olsajiri@gmail.com> wrote:
>
> On Wed, Oct 23, 2024 at 09:01:02AM -0700, Andrii Nakryiko wrote:
> > On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
> > >
> > > Peter reported that perf_event_detach_bpf_prog might skip to release
> > > the bpf program for -ENOENT error from bpf_prog_array_copy.
> > >
> > > This can't happen because bpf program is stored in perf event and is
> > > detached and released only when perf event is freed.
> > >
> > > Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> > > make sure the bpf program is released in any case.
> > >
> > > Cc: Sean Young <sean@mess.org>
> > > Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> > > Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> > > Reported-by: Peter Zijlstra <peterz@infradead.org>
> > > Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> > > ---
> > > kernel/trace/bpf_trace.c | 5 +++--
> > > 1 file changed, 3 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > > index 95b6b3b16bac..2c064ba7b0bd 100644
> > > --- a/kernel/trace/bpf_trace.c
> > > +++ b/kernel/trace/bpf_trace.c
> > > @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > >
> > > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > > ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> > > - if (ret == -ENOENT)
> > > - goto unlock;
> > > + if (WARN_ON_ONCE(ret == -ENOENT))
> > > + goto put;
> > > if (ret < 0) {
> > > bpf_prog_array_delete_safe(old_array, event->prog);
> >
> > seeing
> >
> > if (ret < 0)
> > bpf_prog_array_delete_safe(old_array, event->prog);
> >
> > I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
> > now I feel like just dropping WARN_ON_ONCE() is better.
>
> hi,
> there's syzbot report [1] where we could end up with following
>
> - create perf event and set bpf program to it
> - clone process -> create inherited event
> - exit -> release both events
> - first perf_event_detach_bpf_prog call will release tp_event->prog_array
> and second perf_event_detach_bpf_prog will crash because
> tp_event->prog_array is NULL
>
> we can fix that quicly with change below, I guess we could add refcount
> to bpf_prog_array_item and allow one of the parent/inherited events to
> work while the other is gone.. but that might be too much, will check
>
> jirka
>
>
> [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
> ---
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index fe57dfbf2a86..d4b45543ebc2 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -2251,6 +2251,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> goto unlock;
>
> old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> + if (!old_array)
> + goto put;
How does this inherited event stuff work? You can have two separate
events sharing the same prog_array? What if we attach different
programs to each of those events, will both of them be called for
either of two events? That sounds broken, if that's true.
> ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> if (ret < 0) {
> bpf_prog_array_delete_safe(old_array, event->prog);
> @@ -2259,6 +2261,7 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> bpf_prog_array_free_sleepable(old_array);
> }
>
> +put:
> bpf_prog_put(event->prog);
> event->prog = NULL;
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-12-06 18:21 ` Andrii Nakryiko
@ 2024-12-07 0:22 ` Jiri Olsa
2024-12-09 17:49 ` Andrii Nakryiko
0 siblings, 1 reply; 10+ messages in thread
From: Jiri Olsa @ 2024-12-07 0:22 UTC (permalink / raw)
To: Andrii Nakryiko
Cc: Jiri Olsa, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Sean Young, Peter Zijlstra, bpf, linux-perf-users,
Martin KaFai Lau, Song Liu, Yonghong Song, John Fastabend,
KP Singh, Stanislav Fomichev, Hao Luo
On Fri, Dec 06, 2024 at 10:21:18AM -0800, Andrii Nakryiko wrote:
> On Fri, Dec 6, 2024 at 9:09 AM Jiri Olsa <olsajiri@gmail.com> wrote:
> >
> > On Wed, Oct 23, 2024 at 09:01:02AM -0700, Andrii Nakryiko wrote:
> > > On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
> > > >
> > > > Peter reported that perf_event_detach_bpf_prog might skip to release
> > > > the bpf program for -ENOENT error from bpf_prog_array_copy.
> > > >
> > > > This can't happen because bpf program is stored in perf event and is
> > > > detached and released only when perf event is freed.
> > > >
> > > > Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> > > > make sure the bpf program is released in any case.
> > > >
> > > > Cc: Sean Young <sean@mess.org>
> > > > Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> > > > Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> > > > Reported-by: Peter Zijlstra <peterz@infradead.org>
> > > > Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> > > > ---
> > > > kernel/trace/bpf_trace.c | 5 +++--
> > > > 1 file changed, 3 insertions(+), 2 deletions(-)
> > > >
> > > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > > > index 95b6b3b16bac..2c064ba7b0bd 100644
> > > > --- a/kernel/trace/bpf_trace.c
> > > > +++ b/kernel/trace/bpf_trace.c
> > > > @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > > >
> > > > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > > > ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> > > > - if (ret == -ENOENT)
> > > > - goto unlock;
> > > > + if (WARN_ON_ONCE(ret == -ENOENT))
> > > > + goto put;
> > > > if (ret < 0) {
> > > > bpf_prog_array_delete_safe(old_array, event->prog);
> > >
> > > seeing
> > >
> > > if (ret < 0)
> > > bpf_prog_array_delete_safe(old_array, event->prog);
> > >
> > > I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
> > > now I feel like just dropping WARN_ON_ONCE() is better.
> >
> > hi,
> > there's syzbot report [1] where we could end up with following
> >
> > - create perf event and set bpf program to it
> > - clone process -> create inherited event
> > - exit -> release both events
> > - first perf_event_detach_bpf_prog call will release tp_event->prog_array
> > and second perf_event_detach_bpf_prog will crash because
> > tp_event->prog_array is NULL
> >
> > we can fix that quicly with change below, I guess we could add refcount
> > to bpf_prog_array_item and allow one of the parent/inherited events to
> > work while the other is gone.. but that might be too much, will check
> >
> > jirka
> >
> >
> > [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
> > ---
> > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > index fe57dfbf2a86..d4b45543ebc2 100644
> > --- a/kernel/trace/bpf_trace.c
> > +++ b/kernel/trace/bpf_trace.c
> > @@ -2251,6 +2251,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > goto unlock;
> >
> > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > + if (!old_array)
> > + goto put;
>
> How does this inherited event stuff work? You can have two separate
> events sharing the same prog_array? What if we attach different
> programs to each of those events, will both of them be called for
> either of two events? That sounds broken, if that's true.
so perf event with attr.inherit=1 attached on task will get inherited
by child process.. the new child event shares the parent's bpf program
and tp_event (hence prog_array) which is global for tracepoint
AFAICS when child process exits the inherited event is destroyed and it
removes related tp_event->prog_array, so the parent event won't trigger
ever again, the test below shows that
test_tp_attach:FAIL:executed unexpected executed: actual 1 != expected 2
I'm not sure this is problem in practise, because nobody complained
about that ;-)
libbpf does not set attr.inherit=1 and creates system wide perf event,
so no problem there
jirka
---
diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index 66173ddb5a2d..2e96241b5030 100644
--- a/tools/lib/bpf/libbpf.c
+++ b/tools/lib/bpf/libbpf.c
@@ -12430,8 +12430,9 @@ static int perf_event_open_tracepoint(const char *tp_category,
attr.type = PERF_TYPE_TRACEPOINT;
attr.size = attr_sz;
attr.config = tp_id;
+ attr.inherit = 1;
- pfd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, 0 /* cpu */,
+ pfd = syscall(__NR_perf_event_open, &attr, 0 /* pid */, 0 /* cpu */,
-1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
if (pfd < 0) {
err = -errno;
diff --git a/tools/testing/selftests/bpf/prog_tests/tp_attach.c b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
new file mode 100644
index 000000000000..01bbf1d1ab52
--- /dev/null
+++ b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
@@ -0,0 +1,35 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <test_progs.h>
+#include "tp_attach.skel.h"
+
+void test_tp_attach(void)
+{
+ struct tp_attach *skel;
+ int pid;
+
+ skel = tp_attach__open_and_load();
+ if (!ASSERT_OK_PTR(skel, "tp_attach__open_and_load"))
+ return;
+
+ skel->bss->pid = getpid();
+
+ if (!ASSERT_OK(tp_attach__attach(skel), "tp_attach__attach"))
+ goto out;
+
+ getpid();
+
+ pid = fork();
+ if (!ASSERT_GE(pid, 0, "fork"))
+ goto out;
+ if (pid == 0)
+ _exit(0);
+ waitpid(pid, NULL, 0);
+
+ getpid();
+
+ ASSERT_EQ(skel->bss->executed, 2, "executed");
+
+out:
+ tp_attach__destroy(skel);
+}
diff --git a/tools/testing/selftests/bpf/progs/tp_attach.c b/tools/testing/selftests/bpf/progs/tp_attach.c
new file mode 100644
index 000000000000..d9450d2eac17
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/tp_attach.c
@@ -0,0 +1,17 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <vmlinux.h>
+#include <bpf/bpf_tracing.h>
+
+char _license[] SEC("license") = "GPL";
+
+int pid;
+int executed;
+
+SEC("tp/syscalls/sys_enter_getpid")
+int test(void *ctx)
+{
+ if (pid == (bpf_get_current_pid_tgid() >> 32))
+ executed++;
+ return 0;
+}
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-12-07 0:22 ` Jiri Olsa
@ 2024-12-09 17:49 ` Andrii Nakryiko
2024-12-10 0:01 ` Jiri Olsa
0 siblings, 1 reply; 10+ messages in thread
From: Andrii Nakryiko @ 2024-12-09 17:49 UTC (permalink / raw)
To: Jiri Olsa
Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Sean Young,
Peter Zijlstra, bpf, linux-perf-users, Martin KaFai Lau, Song Liu,
Yonghong Song, John Fastabend, KP Singh, Stanislav Fomichev,
Hao Luo
On Fri, Dec 6, 2024 at 4:22 PM Jiri Olsa <olsajiri@gmail.com> wrote:
>
> On Fri, Dec 06, 2024 at 10:21:18AM -0800, Andrii Nakryiko wrote:
> > On Fri, Dec 6, 2024 at 9:09 AM Jiri Olsa <olsajiri@gmail.com> wrote:
> > >
> > > On Wed, Oct 23, 2024 at 09:01:02AM -0700, Andrii Nakryiko wrote:
> > > > On Wed, Oct 23, 2024 at 3:01 AM Jiri Olsa <jolsa@kernel.org> wrote:
> > > > >
> > > > > Peter reported that perf_event_detach_bpf_prog might skip to release
> > > > > the bpf program for -ENOENT error from bpf_prog_array_copy.
> > > > >
> > > > > This can't happen because bpf program is stored in perf event and is
> > > > > detached and released only when perf event is freed.
> > > > >
> > > > > Let's make it obvious and add WARN_ON_ONCE on the -ENOENT check and
> > > > > make sure the bpf program is released in any case.
> > > > >
> > > > > Cc: Sean Young <sean@mess.org>
> > > > > Fixes: 170a7e3ea070 ("bpf: bpf_prog_array_copy() should return -ENOENT if exclude_prog not found")
> > > > > Closes: https://lore.kernel.org/lkml/20241022111638.GC16066@noisy.programming.kicks-ass.net/
> > > > > Reported-by: Peter Zijlstra <peterz@infradead.org>
> > > > > Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> > > > > ---
> > > > > kernel/trace/bpf_trace.c | 5 +++--
> > > > > 1 file changed, 3 insertions(+), 2 deletions(-)
> > > > >
> > > > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > > > > index 95b6b3b16bac..2c064ba7b0bd 100644
> > > > > --- a/kernel/trace/bpf_trace.c
> > > > > +++ b/kernel/trace/bpf_trace.c
> > > > > @@ -2216,8 +2216,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > > > >
> > > > > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > > > > ret = bpf_prog_array_copy(old_array, event->prog, NULL, 0, &new_array);
> > > > > - if (ret == -ENOENT)
> > > > > - goto unlock;
> > > > > + if (WARN_ON_ONCE(ret == -ENOENT))
> > > > > + goto put;
> > > > > if (ret < 0) {
> > > > > bpf_prog_array_delete_safe(old_array, event->prog);
> > > >
> > > > seeing
> > > >
> > > > if (ret < 0)
> > > > bpf_prog_array_delete_safe(old_array, event->prog);
> > > >
> > > > I think neither ret == -ENOENT nor WARN_ON_ONCE is necessary, tbh. So
> > > > now I feel like just dropping WARN_ON_ONCE() is better.
> > >
> > > hi,
> > > there's syzbot report [1] where we could end up with following
> > >
> > > - create perf event and set bpf program to it
> > > - clone process -> create inherited event
> > > - exit -> release both events
> > > - first perf_event_detach_bpf_prog call will release tp_event->prog_array
> > > and second perf_event_detach_bpf_prog will crash because
> > > tp_event->prog_array is NULL
> > >
> > > we can fix that quicly with change below, I guess we could add refcount
> > > to bpf_prog_array_item and allow one of the parent/inherited events to
> > > work while the other is gone.. but that might be too much, will check
> > >
> > > jirka
> > >
> > >
> > > [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
> > > ---
> > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > > index fe57dfbf2a86..d4b45543ebc2 100644
> > > --- a/kernel/trace/bpf_trace.c
> > > +++ b/kernel/trace/bpf_trace.c
> > > @@ -2251,6 +2251,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > > goto unlock;
> > >
> > > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > > + if (!old_array)
> > > + goto put;
> >
> > How does this inherited event stuff work? You can have two separate
> > events sharing the same prog_array? What if we attach different
> > programs to each of those events, will both of them be called for
> > either of two events? That sounds broken, if that's true.
>
> so perf event with attr.inherit=1 attached on task will get inherited
> by child process.. the new child event shares the parent's bpf program
> and tp_event (hence prog_array) which is global for tracepoint
>
> AFAICS when child process exits the inherited event is destroyed and it
> removes related tp_event->prog_array, so the parent event won't trigger
> ever again, the test below shows that
>
Doesn't this sound broken? Either event inheritance has to copy
prog_array and make them completely independent. Or inherited event
shouldn't remove the parent's program. Or something else, but the way
it is right now seems wrong, no?
I'm not sure what's the most appropriate behavior that would match
overall perf_event inheritance, but we should probably think about
this and fix it, instead of patching up the symptom with that NULL
check, no?
> test_tp_attach:FAIL:executed unexpected executed: actual 1 != expected 2
>
> I'm not sure this is problem in practise, because nobody complained
> about that ;-)
That's... not really a distinction of what is a problem or not ;)
>
> libbpf does not set attr.inherit=1 and creates system wide perf event,
> so no problem there
you can use all this outside of libbpf and lead to wrong behavior, so
worth thinking about this and fixing, IMO
>
> jirka
>
>
> ---
> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> index 66173ddb5a2d..2e96241b5030 100644
> --- a/tools/lib/bpf/libbpf.c
> +++ b/tools/lib/bpf/libbpf.c
> @@ -12430,8 +12430,9 @@ static int perf_event_open_tracepoint(const char *tp_category,
> attr.type = PERF_TYPE_TRACEPOINT;
> attr.size = attr_sz;
> attr.config = tp_id;
> + attr.inherit = 1;
>
> - pfd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, 0 /* cpu */,
> + pfd = syscall(__NR_perf_event_open, &attr, 0 /* pid */, 0 /* cpu */,
> -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
> if (pfd < 0) {
> err = -errno;
> diff --git a/tools/testing/selftests/bpf/prog_tests/tp_attach.c b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
> new file mode 100644
> index 000000000000..01bbf1d1ab52
> --- /dev/null
> +++ b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
> @@ -0,0 +1,35 @@
> +// SPDX-License-Identifier: GPL-2.0
> +
> +#include <test_progs.h>
> +#include "tp_attach.skel.h"
> +
> +void test_tp_attach(void)
> +{
> + struct tp_attach *skel;
> + int pid;
> +
> + skel = tp_attach__open_and_load();
> + if (!ASSERT_OK_PTR(skel, "tp_attach__open_and_load"))
> + return;
> +
> + skel->bss->pid = getpid();
> +
> + if (!ASSERT_OK(tp_attach__attach(skel), "tp_attach__attach"))
> + goto out;
> +
> + getpid();
> +
> + pid = fork();
> + if (!ASSERT_GE(pid, 0, "fork"))
> + goto out;
> + if (pid == 0)
> + _exit(0);
> + waitpid(pid, NULL, 0);
> +
> + getpid();
> +
> + ASSERT_EQ(skel->bss->executed, 2, "executed");
> +
> +out:
> + tp_attach__destroy(skel);
> +}
> diff --git a/tools/testing/selftests/bpf/progs/tp_attach.c b/tools/testing/selftests/bpf/progs/tp_attach.c
> new file mode 100644
> index 000000000000..d9450d2eac17
> --- /dev/null
> +++ b/tools/testing/selftests/bpf/progs/tp_attach.c
> @@ -0,0 +1,17 @@
> +// SPDX-License-Identifier: GPL-2.0
> +
> +#include <vmlinux.h>
> +#include <bpf/bpf_tracing.h>
> +
> +char _license[] SEC("license") = "GPL";
> +
> +int pid;
> +int executed;
> +
> +SEC("tp/syscalls/sys_enter_getpid")
> +int test(void *ctx)
> +{
> + if (pid == (bpf_get_current_pid_tgid() >> 32))
> + executed++;
> + return 0;
> +}
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling
2024-12-09 17:49 ` Andrii Nakryiko
@ 2024-12-10 0:01 ` Jiri Olsa
0 siblings, 0 replies; 10+ messages in thread
From: Jiri Olsa @ 2024-12-10 0:01 UTC (permalink / raw)
To: Andrii Nakryiko
Cc: Jiri Olsa, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko,
Sean Young, Peter Zijlstra, bpf, linux-perf-users,
Martin KaFai Lau, Song Liu, Yonghong Song, John Fastabend,
KP Singh, Stanislav Fomichev, Hao Luo
On Mon, Dec 09, 2024 at 09:49:01AM -0800, Andrii Nakryiko wrote:
SNIP
> > > > ---
> > > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > > > index fe57dfbf2a86..d4b45543ebc2 100644
> > > > --- a/kernel/trace/bpf_trace.c
> > > > +++ b/kernel/trace/bpf_trace.c
> > > > @@ -2251,6 +2251,8 @@ void perf_event_detach_bpf_prog(struct perf_event *event)
> > > > goto unlock;
> > > >
> > > > old_array = bpf_event_rcu_dereference(event->tp_event->prog_array);
> > > > + if (!old_array)
> > > > + goto put;
> > >
> > > How does this inherited event stuff work? You can have two separate
> > > events sharing the same prog_array? What if we attach different
> > > programs to each of those events, will both of them be called for
> > > either of two events? That sounds broken, if that's true.
> >
> > so perf event with attr.inherit=1 attached on task will get inherited
> > by child process.. the new child event shares the parent's bpf program
> > and tp_event (hence prog_array) which is global for tracepoint
> >
> > AFAICS when child process exits the inherited event is destroyed and it
> > removes related tp_event->prog_array, so the parent event won't trigger
> > ever again, the test below shows that
> >
>
> Doesn't this sound broken? Either event inheritance has to copy
> prog_array and make them completely independent. Or inherited event
> shouldn't remove the parent's program. Or something else, but the way
> it is right now seems wrong, no?
>
> I'm not sure what's the most appropriate behavior that would match
> overall perf_event inheritance, but we should probably think about
> this and fix it, instead of patching up the symptom with that NULL
> check, no?
>
> > test_tp_attach:FAIL:executed unexpected executed: actual 1 != expected 2
> >
> > I'm not sure this is problem in practise, because nobody complained
> > about that ;-)
>
> That's... not really a distinction of what is a problem or not ;)
>
> >
> > libbpf does not set attr.inherit=1 and creates system wide perf event,
> > so no problem there
>
> you can use all this outside of libbpf and lead to wrong behavior, so
> worth thinking about this and fixing, IMO
sure, let's fix that.. I like the solution where we let only the parent
to remove the program from prog_array looks good to me and is probably
simple enough.. but need to check what happens when parent dies first
I'll check on that, but perhaps we could go with the simple fix first
to fix the crash (it was the prior behaviour) and I'll send the fix on
top of that
jirka
>
> >
> > jirka
> >
> >
> > ---
> > diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> > index 66173ddb5a2d..2e96241b5030 100644
> > --- a/tools/lib/bpf/libbpf.c
> > +++ b/tools/lib/bpf/libbpf.c
> > @@ -12430,8 +12430,9 @@ static int perf_event_open_tracepoint(const char *tp_category,
> > attr.type = PERF_TYPE_TRACEPOINT;
> > attr.size = attr_sz;
> > attr.config = tp_id;
> > + attr.inherit = 1;
> >
> > - pfd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, 0 /* cpu */,
> > + pfd = syscall(__NR_perf_event_open, &attr, 0 /* pid */, 0 /* cpu */,
> > -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
> > if (pfd < 0) {
> > err = -errno;
> > diff --git a/tools/testing/selftests/bpf/prog_tests/tp_attach.c b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
> > new file mode 100644
> > index 000000000000..01bbf1d1ab52
> > --- /dev/null
> > +++ b/tools/testing/selftests/bpf/prog_tests/tp_attach.c
> > @@ -0,0 +1,35 @@
> > +// SPDX-License-Identifier: GPL-2.0
> > +
> > +#include <test_progs.h>
> > +#include "tp_attach.skel.h"
> > +
> > +void test_tp_attach(void)
> > +{
> > + struct tp_attach *skel;
> > + int pid;
> > +
> > + skel = tp_attach__open_and_load();
> > + if (!ASSERT_OK_PTR(skel, "tp_attach__open_and_load"))
> > + return;
> > +
> > + skel->bss->pid = getpid();
> > +
> > + if (!ASSERT_OK(tp_attach__attach(skel), "tp_attach__attach"))
> > + goto out;
> > +
> > + getpid();
> > +
> > + pid = fork();
> > + if (!ASSERT_GE(pid, 0, "fork"))
> > + goto out;
> > + if (pid == 0)
> > + _exit(0);
> > + waitpid(pid, NULL, 0);
> > +
> > + getpid();
> > +
> > + ASSERT_EQ(skel->bss->executed, 2, "executed");
> > +
> > +out:
> > + tp_attach__destroy(skel);
> > +}
> > diff --git a/tools/testing/selftests/bpf/progs/tp_attach.c b/tools/testing/selftests/bpf/progs/tp_attach.c
> > new file mode 100644
> > index 000000000000..d9450d2eac17
> > --- /dev/null
> > +++ b/tools/testing/selftests/bpf/progs/tp_attach.c
> > @@ -0,0 +1,17 @@
> > +// SPDX-License-Identifier: GPL-2.0
> > +
> > +#include <vmlinux.h>
> > +#include <bpf/bpf_tracing.h>
> > +
> > +char _license[] SEC("license") = "GPL";
> > +
> > +int pid;
> > +int executed;
> > +
> > +SEC("tp/syscalls/sys_enter_getpid")
> > +int test(void *ctx)
> > +{
> > + if (pid == (bpf_get_current_pid_tgid() >> 32))
> > + executed++;
> > + return 0;
> > +}
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2024-12-10 0:01 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-10-23 10:01 [PATCH bpf] bpf,perf: Fix perf_event_detach_bpf_prog error handling Jiri Olsa
2024-10-23 10:05 ` Peter Zijlstra
2024-10-23 10:32 ` Sean Young
2024-10-23 16:01 ` Andrii Nakryiko
2024-10-23 19:08 ` Jiri Olsa
2024-12-06 17:09 ` Jiri Olsa
2024-12-06 18:21 ` Andrii Nakryiko
2024-12-07 0:22 ` Jiri Olsa
2024-12-09 17:49 ` Andrii Nakryiko
2024-12-10 0:01 ` Jiri Olsa
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).