diff mbox series

[bpf] libbpf: reset errno after probing kernel features

Message ID 20201130154143.292882-1-toke@redhat.com (mailing list archive)
State Rejected
Delegated to: BPF
Headers show
Series [bpf] libbpf: reset errno after probing kernel features | expand

Checks

Context Check Description
netdev/cover_letter success Link
netdev/fixes_present success Link
netdev/patch_count success Link
netdev/tree_selection success Clearly marked for bpf
netdev/subject_prefix success Link
netdev/source_inline success Was 0 now: 0
netdev/verify_signedoff success Link
netdev/module_param success Was 0 now: 0
netdev/build_32bit success Errors and warnings before: 0 this patch: 0
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/verify_fixes success Link
netdev/checkpatch warning WARNING: From:/Signed-off-by: email name mismatch: 'From: "Toke Høiland-Jørgensen" <toke@redhat.com>' != 'Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>'
netdev/build_allmodconfig_warn success Errors and warnings before: 0 this patch: 0
netdev/header_inline success Link
netdev/stable success Stable not CCed

Commit Message

Toke Høiland-Jørgensen Nov. 30, 2020, 3:41 p.m. UTC
The kernel feature probing results in 'errno' being set if the probing
fails (as is often the case). This can stick around and leak to the caller,
which can lead to confusion later. So let's make sure we always reset errno
after calling a probe function.

Fixes: 47b6cb4d0add ("libbpf: Make kernel feature probing lazy")
Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
---
 tools/lib/bpf/libbpf.c | 2 ++
 1 file changed, 2 insertions(+)

Comments

Andrii Nakryiko Nov. 30, 2020, 10:24 p.m. UTC | #1
On Mon, Nov 30, 2020 at 7:42 AM Toke Høiland-Jørgensen <toke@redhat.com> wrote:
>
> The kernel feature probing results in 'errno' being set if the probing
> fails (as is often the case). This can stick around and leak to the caller,
> which can lead to confusion later. So let's make sure we always reset errno
> after calling a probe function.

What specifically is the problem and what sort of confusion we are
talking about here? You are not supposed to check errno, unless the
function returned -1 or other error result.

In some cases, you have to reset errno manually just to avoid
confusion (see how strtol() is used, as an example).

I.e., I don't see the problem here, any printf() technically can set
errno to <0, we don't reset errno after each printf call though,
right?

>
> Fixes: 47b6cb4d0add ("libbpf: Make kernel feature probing lazy")
> Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
> ---
>  tools/lib/bpf/libbpf.c | 2 ++
>  1 file changed, 2 insertions(+)
>
> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> index 28baee7ba1ca..8d05132e1945 100644
> --- a/tools/lib/bpf/libbpf.c
> +++ b/tools/lib/bpf/libbpf.c
> @@ -4021,6 +4021,8 @@ static bool kernel_supports(enum kern_feature_id feat_id)
>                         pr_warn("Detection of kernel %s support failed: %d\n", feat->desc, ret);
>                         WRITE_ONCE(feat->res, FEAT_MISSING);
>                 }
> +               /* reset errno after probing to prevent leaking it to caller */
> +               errno = 0;
>         }
>
>         return READ_ONCE(feat->res) == FEAT_SUPPORTED;
> --
> 2.29.2
>
Toke Høiland-Jørgensen Nov. 30, 2020, 10:40 p.m. UTC | #2
Andrii Nakryiko <andrii.nakryiko@gmail.com> writes:

> On Mon, Nov 30, 2020 at 7:42 AM Toke Høiland-Jørgensen <toke@redhat.com> wrote:
>>
>> The kernel feature probing results in 'errno' being set if the probing
>> fails (as is often the case). This can stick around and leak to the caller,
>> which can lead to confusion later. So let's make sure we always reset errno
>> after calling a probe function.
>
> What specifically is the problem and what sort of confusion we are
> talking about here? You are not supposed to check errno, unless the
> function returned -1 or other error result.
>
> In some cases, you have to reset errno manually just to avoid
> confusion (see how strtol() is used, as an example).
>
> I.e., I don't see the problem here, any printf() technically can set
> errno to <0, we don't reset errno after each printf call though,
> right?

Well yeah, technically things work fine in the common case. But this
errno thing sent me on quite the wild goose chase when trying to find
the root cause of the pinning issue I also sent a patch for...

So since reseting errno doesn't hurt either I figured I'd save others
ending up in similar trouble. If it's not to your taste feel free to
just drop the patch :)

-Toke
Andrii Nakryiko Dec. 1, 2020, 12:18 a.m. UTC | #3
On Mon, Nov 30, 2020 at 2:41 PM Toke Høiland-Jørgensen <toke@redhat.com> wrote:
>
> Andrii Nakryiko <andrii.nakryiko@gmail.com> writes:
>
> > On Mon, Nov 30, 2020 at 7:42 AM Toke Høiland-Jørgensen <toke@redhat.com> wrote:
> >>
> >> The kernel feature probing results in 'errno' being set if the probing
> >> fails (as is often the case). This can stick around and leak to the caller,
> >> which can lead to confusion later. So let's make sure we always reset errno
> >> after calling a probe function.
> >
> > What specifically is the problem and what sort of confusion we are
> > talking about here? You are not supposed to check errno, unless the
> > function returned -1 or other error result.
> >
> > In some cases, you have to reset errno manually just to avoid
> > confusion (see how strtol() is used, as an example).
> >
> > I.e., I don't see the problem here, any printf() technically can set
> > errno to <0, we don't reset errno after each printf call though,
> > right?
>
> Well yeah, technically things work fine in the common case. But this

It works fine in all cases. Assuming "errno != 0 means last
libc/syscall failed" is just wrong.

> errno thing sent me on quite the wild goose chase when trying to find
> the root cause of the pinning issue I also sent a patch for...
>
> So since reseting errno doesn't hurt either I figured I'd save others
> ending up in similar trouble. If it's not to your taste feel free to
> just drop the patch :)

Yep, let's just drop it, no need to create a bad precedent.

>
> -Toke
>
diff mbox series

Patch

diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index 28baee7ba1ca..8d05132e1945 100644
--- a/tools/lib/bpf/libbpf.c
+++ b/tools/lib/bpf/libbpf.c
@@ -4021,6 +4021,8 @@  static bool kernel_supports(enum kern_feature_id feat_id)
 			pr_warn("Detection of kernel %s support failed: %d\n", feat->desc, ret);
 			WRITE_ONCE(feat->res, FEAT_MISSING);
 		}
+		/* reset errno after probing to prevent leaking it to caller */
+		errno = 0;
 	}
 
 	return READ_ONCE(feat->res) == FEAT_SUPPORTED;