bpf: Undo internal BPF_PROBE_MEM in BPF insns dump
authorAndrii Nakryiko <andriin@fb.com>
Sat, 13 Jun 2020 00:21:15 +0000 (17:21 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 24 Jun 2020 15:49:12 +0000 (17:49 +0200)
commitbd12abafd9c173e3ee4a6179ae940d106987acf8
tree31bb1cde991cb7a61c05778f938f1a1a9ebc74f0
parent845357b602f6f2e0e3b47425e8764947460c7aa2
bpf: Undo internal BPF_PROBE_MEM in BPF insns dump

[ Upstream commit 29fcb05bbf1a7008900bb9bee347bdbfc7171036 ]

BPF_PROBE_MEM is kernel-internal implmementation details. When dumping BPF
instructions to user-space, it needs to be replaced back with BPF_MEM mode.

Fixes: 2a02759ef5f8 ("bpf: Add support for BTF pointers to interpreter")
Signed-off-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20200613002115.1632142-1-andriin@fb.com
Signed-off-by: Sasha Levin <sashal@kernel.org>
kernel/bpf/syscall.c