Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp8271106rwn; Wed, 14 Sep 2022 11:35:32 -0700 (PDT) X-Google-Smtp-Source: AA6agR5xQK2szaW6+DS86cP2RzRR4s1PQChIxZEpICQBlAoKSZiGYtRLPA1y7KjFL2AQzS0V8NoR X-Received: by 2002:a17:906:7c8f:b0:771:3912:3942 with SMTP id w15-20020a1709067c8f00b0077139123942mr25082511ejo.387.1663180531868; Wed, 14 Sep 2022 11:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663180531; cv=none; d=google.com; s=arc-20160816; b=M9r1jnj1RVgVlvkZz1dP+4gePesT0EqpU0LdqvPh8tpMFJAIbUfF5F22daz7gNLsLl XxQDb4rD1z3CcGqDnSOqh45XP8LsErsG2mkDjpeKIaPUDsF1/igila+HF+Z+cvfLFl6m 3lYsGHOtyLL8u1cbc+h2jXkKQnjTTDkpFseROS5zrFyrbqiFytjKpliCriE+14lo9nl9 QNY+RuK+0AvWWlr3OA/hku01M3u6KeaHZcdE9hUscfQngbLhT76IRG2WY/zmAQuFUOW+ GIGVHJ0KW47L3VT2ILPIYU/NeNart9MKe18uvxuEnyDMGrY99MDuFfLo7foMNHPvs9Iu NtdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=vnzfdOKLIVU+LdB7pkSZ/shmrsmivP69BUtxhc7yWtE=; b=KOxTJAKGZufGI/0lEBPT/D5wrYEsaT+LdGrtdEEin+Xn7cGo4RG3aWj/FcJZCPlabi 69Zw34Li9YeQX+BA+Zxh5qc+Qb2w/YafhAoEgkJd0bfmYnjFr9KTUjNgWEiaUnYO3phw 38r0p8peh0KXTAP3sakMfk0wPu+LgY5+aiFx30rsNBgLkHn9UygR+yBBVtFiTYv5mHlP 4nfaYAheykWTrnT0LtNcKZiEjHkJYyZ77jsSdDrFPcFICyVgpfFG+eMr+MKriS8FhFnq ZZObbjqRGXYsxVn8qqNx0NLg6PiWjGpXNkZrk6c+f01yN1JWLlOV0Mjvn7R3hgEBhn9B 3wzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PbLrNz1m; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n10-20020a05640205ca00b0044ea569baa2si11600468edx.557.2022.09.14.11.35.05; Wed, 14 Sep 2022 11:35:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PbLrNz1m; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229789AbiINSQD (ORCPT + 99 others); Wed, 14 Sep 2022 14:16:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53738 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229946AbiINSP4 (ORCPT ); Wed, 14 Sep 2022 14:15:56 -0400 Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D4DE057250 for ; Wed, 14 Sep 2022 11:15:51 -0700 (PDT) Received: by mail-qk1-x733.google.com with SMTP id f13so7285014qkk.6 for ; Wed, 14 Sep 2022 11:15:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=vnzfdOKLIVU+LdB7pkSZ/shmrsmivP69BUtxhc7yWtE=; b=PbLrNz1muqGs6C2HXcUX4tKV1A1V2Ij/BZpI5N2It7JtkIv1Bb/kpImcy3pk/XutUf 90pTyjGz8aibHmEnsqFGLU9MrUm/I5rJBmGNWFa4SJalsWGWljw4jxAJ6NIQEW2CMR1f /seGqG7fItGckxJI+pbNkWw20UUEOxsw98as/2B3LiS/s1CR5xGQAFJIxQGH8LWlPbRk /31DQKQKRTvSGzkHU68SP0lMsUvWq4MEO7JHPifyW89v2XHqTgoTdj1HLxa3nLMutkZT E9ws02CnMpCnSxVFDVjjRLbrHNamxrrgoJGIwc8CyQ5t2OzBo/hA4uoQkrwXtsn9GpK/ 495A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=vnzfdOKLIVU+LdB7pkSZ/shmrsmivP69BUtxhc7yWtE=; b=rgaUQUfMcf5bMWNwF/bOkbyzQH2iJ8dphaURkdUZJyabxLe9/ZKUlPe0nCc9cK3Wle lGsJXWu5lrfXutOyq04390oLB2HGBd3PNEEQcEomQDbNKkgCAAD4rsox1+Vb1XeR8Iad 2XkEGrYzPvAAvEnT3/aZLCNvf64POVBdvevO2c3KDMpfuMMjt6TxnXEzIusEL1s9CVlm nDUyDhKbT+q4ij0hrAxezd9jQ5EPQAxchvgxe5inRTJPnS1lxDGA8ZISuYG242hgVJ4b e3IHKItcf+jdbCG2hQ76i1L8OiBcnaZ3awiTrW+DPciimKGIEhoA0oQXj0FKQBwh0gac ovZw== X-Gm-Message-State: ACgBeo3zu5w7O8GUzoo6rB/oUdwHUbzwj/IJx9Pp28WKyE0hzi88uizr a4nEP0Pt03ZVXLZh23qW8PLvHRt2oQ3tZDPSjQ177g== X-Received: by 2002:a37:63d1:0:b0:6ce:5f67:47bc with SMTP id x200-20020a3763d1000000b006ce5f6747bcmr8489977qkb.682.1663179350617; Wed, 14 Sep 2022 11:15:50 -0700 (PDT) MIME-Version: 1.0 References: <20220914123423.24368-1-liuxin350@huawei.com> In-Reply-To: <20220914123423.24368-1-liuxin350@huawei.com> From: Hao Luo Date: Wed, 14 Sep 2022 11:15:39 -0700 Message-ID: Subject: Re: [PATCH] libbpf: adjust OPTS_VALID logic, so that it can be used correctly To: Xin Liu Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, jolsa@kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yanan@huawei.com, wuchangye@huawei.com, xiesongyang@huawei.com, zhudi2@huawei.com, kongweibin2@huawei.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Xin, On Wed, Sep 14, 2022 at 5:35 AM Xin Liu wrote: > > We found that function btf_dump__dump_type_data can be called by the user > as an api, but in this function, the `opts` parameter may be used as a > null pointer, because OPTS_VALID can't properly prevent opts used as null > pointers during verification. Therefore, we fix this problem through this > modification. > > This modification has no impact on other places where OPTS_VALID has been > used. I think this is a bug of btf_dump__dump_type_data(), not OPTS_VALID. It seems allowing OPTS_VALID to accept NULL is the intended behavior. > [...] >