diff options
| author | Daniel T. Lee <[email protected]> | 2023-08-18 18:01:17 +0900 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2023-08-21 15:39:09 -0700 |
| commit | d93a7cf6ca2cfcd7de5d06f753ce8d5e863316ac (patch) | |
| tree | 327fa6cea4d2b66d51367834b8a357955a08c069 /tools/testing/selftests/bpf/progs/sendmsg_unix_prog.c | |
| parent | 92632115fb57ff9e368f256913e96d6fd5abf5ab (diff) | |
samples/bpf: fix broken map lookup probe
In the commit 7c4cd051add3 ("bpf: Fix syscall's stackmap lookup
potential deadlock"), a potential deadlock issue was addressed, which
resulted in *_map_lookup_elem not triggering BPF programs.
(prior to lookup, bpf_disable_instrumentation() is used)
To resolve the broken map lookup probe using "htab_map_lookup_elem",
this commit introduces an alternative approach. Instead, it utilize
"bpf_map_copy_value" and apply a filter specifically for the hash table
with map_type.
Signed-off-by: Daniel T. Lee <[email protected]>
Fixes: 7c4cd051add3 ("bpf: Fix syscall's stackmap lookup potential deadlock")
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/progs/sendmsg_unix_prog.c')
0 files changed, 0 insertions, 0 deletions